When I worked as a prosecutor in Richmond, Virginia in the 1990s, that city, like so much of America, was experiencing horrific levels of violent crime. But to describe it that way obscures an important truth: for the most part, white people weren't dying; black people were dying. Most white people could drive around the problem.
We can only query against that which we have collected. And so if someone has never made a ripple in the pond in Syria in a way that would get their identity or their interest reflected in our database, we can query our database until the cows come home, but there will be nothing show up because we have no record of them.
In 1983, my second year of law school, I became the only white player in the Ogden Park Basketball League at 65th and Racine. My teammates joked that I integrated the league, which I guess is true. They weren't so much focused on integration as on winning, and they knew you can't teach height. 'He can't jump, but he sure is tall.'
We face two overlapping challenges. The first concerns real-time court-ordered interception of what we call 'data in motion,' such as phone calls, e-mail, and live chat sessions. The second challenge concerns court-ordered access to data stored on our devices, such as e-mail, text messages, photos, and videos - or what we call 'data at rest.'
Cisco projects that in 2020, now just five years away, there will be seven billion people on the earth and 50 billion devices connected to the Internet. Six-and-a-half devices on average per person. As a father of five young adults and teenagers, I think we are - in my household, we've exceeded the 6.5 number.
ISIL's widespread reach through the Internet and social media is most concerning, as the group has proven dangerously competent at employing such tools for its nefarious strategy. ISIL uses high-quality, traditional media platforms as well as widespread social media campaigns to propagate its extremist ideology.
The FBI has built up substantial expertise to address cyber threats, both in the homeland and overseas. Here at home, the FBI serves as the executive agent for the National Cyber Investigative Joint Task Force (NCIJTF), which joins together 19 intelligence, law enforcement, and military agencies to coordinate cyber threat investigations.
Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States - spot, assess, recruit, and radicalize - either to travel or to conduct a homeland attack.
The diverse threats we face are increasingly cyber-based. Much of America's most sensitive data is stored on computers. We are losing data, money, and ideas through cyber intrusions. This threatens innovation and, as citizens, we are also increasingly vulnerable to losing our personal information.
Those of us in law enforcement must redouble our efforts to resist bias and prejudice. We must better understand the people we serve and protect - by trying to know, deep in our gut, what it feels like to be a law-abiding young black man walking on the street and encountering law enforcement. We must understand how that young man may see us.
To accomplish its mission, the FBI relies heavily upon its law enforcement and intelligence partners around the nation and around the globe. By combining our resources and our collective expertise, we are able to investigate national security threats that cross both geographical and jurisdictional boundaries.
Lives are saved when those potential killers are confronted by a police officer, a strong police presence and actual, honest-to-goodness, up-close 'What are you guys doing on this corner at 1 o'clock in the morning' policing. We need to be careful it doesn't drift away from us in the age of viral videos, or there will be profound consequences.