Thank you for the kind introduction. It is wonderful to see some many friends here. Some i have not seen in a year or two it seems. Backgroundre on my than what harvey said and i want lawecall it for the students are younger attorneys here because it is kind of integral to my life in Public Service. In 1982, i am sure we have people that were not born that, i was a law clerk. It is wonderful to be a law clerk but you also have to immediately start looking for your next job which i was. And i had a background in finance and i am a cpa so i thought i would be a perfect commercial litigator. Or so i thought. I was interviewing with the chicago law firms. Myself further, the largest law firms had about 230 partners in the chicago area to show you how things have changed. But i needed litigation experience i thought and so i applied for the attorney generals honors program. Behold, they want a four year commitment. When you are 27 years old, four years seems like a lifetime. And i very much wrong my hands wrung my hands over the decision to give four years of my life to Public Service. Approximately am 36 years later. But i guess what i want to say by veryit has gone quickly. I have enjoyed it immensely and would not have traded it for any other opportunities in the world professionally. Showing you how little i know. Which leads me to a public at service announce that is a Public Service announcement which is the office of the attorney general at the fbi. We have 100 94 attorneys and three branches, litigation, National Security, cyber law, and the investigative Administrative Law branch. With a large number of issues, just like any corporation would. We have 37,000 employees and 18,000 contractors. We normally have about 15 vacancies. There is a rigorous process, a polygraph and a background check. It cannot be that hard because i passed it. But we are always looking for smart, ambitious attorneys looking for an exciting career and you will not find a better mission at any company or institution in the United States protecting the American People and upholding the constitution of the United States. Our employees every day when they walk into the hoover building. The fbi has been in the news on occasion lately. Topics i willsome will tryscuss and i not to run out the clock so harvey will not have to give me the hook sign. Thei want to talk about recent opinion concerning our core procedures. And cyber ifom act we have a test to get that far into my remarks. The recent Court Opinions on fbi theg procedures judge, who i think you will hear from tomorrow, so he will get rebuttal time, found the revised procedures that we submitted were not appropriate. The querying procedures were inconsistent with the requirements to keep records of and u. S. Person query term it was inadequate in our query justifications. And they were inconsistent with section 702 e and the Fourth Amendment. The procedure is which now have been approved by the court rate we will retain querying withes in a manner written justification before the employee reviews the contact with retrieved by the query. We are in the process of making technical changes to the system and the training that we provide to our agents. But i would like to talk a little bit about some things involving our query procedures and the opinions. After the judge issued his opinion, the director ordered the creation of a Compliance Review Team to review the howes opinion and evaluate we can improve our querying procedures. The fbi takes this very seriously, its responsibilities and we took this as a proactive step several from our decision to appeal. Because of our commitment to compliance. Frequently says, and i have heard him say it dozens of times, we need to do the right thing, the right way and that was all in his efforts to do that. We believe it is important for the fisk, congress, and the American Public to have confidence in our procedures and our compliance rate. The judge has approved the modified procedures with new requirements which means we are now consistent with the Fourth Amendment and pfizer. The Compliance Team will continue its work and evaluate whether additional steps beyond our new compliance can lead us to address further concerns. Opinion discussed the fbis policy on queries because it is routine in and and encouraged practice for the bureau to query the section 702 collection in furthering law and gathering procedures. Routinely query the collection in order to proactively identify thread information and the collection and the need for the personnel to comply the query standard. But, most of the compliance incidents cited in the opinion involved efforts by the bureau to be proactive and identify thread information that we were holding in our collection. Some of those compliance incidents involved what we would call threat identification queries where fbi personnel attempted to proactively identify threats the bureau was unaware of. One of the compliance incidents queries of identifiers associated with individuals in a position to exploit what the bureau believed was a boulder ability. Other incidents involved proactively vetting specific individuals in order to threats posed by disclosing classified or Sensitive Information to them. Involvedidents potential confidential sources. It is important to remember that policies of encouraging queries of our collection is born out of Lessons Learned from 9 11 and the four could attack. Fort hood attack. The commissions both talked about the importance of identifying thread information in the fbi systems and encouraged the bureau to develop a federated search capability to facilitate the identification of threat information queries. Historically, the view has been that the more cure queries the bureau runs, the greater the likelihood it will identify threat information. But, we recognize the importance that every one of those queries has to be consistent with our procedures. The fbi has to strive to stay within the middle ground where we are aggressively looking for threats to the American Public in our 702 collection without violating the query standard. If we are not aggressive enough, the American Public is at risk. If we are too aggressive, we will have compliance incidents thea road and erode confidence we have from the fisk , congress, and the American Public and that is why the middle ground is so important and we are committed to staying within it. The Compliance Review Team will continue to carefully consider the fisk concerns about our query policy while being mindful that to change the policy could potentially impact our ability to identify thread information. The fisk also identified what it complicationsed and applying the query standard and suggested Bureau Personnel may not necessarily understand the retrieve standard. A query has to be likely to return information of a crime or foreign intelligence information. Intensive which means the application of the standard can be challenging and reasonable minds can disagree. The most obvious way to address that concern is through additional training which has been one of our focuses for quite some time. For more than a year, the department of justice and fbi attorneys have been given in person giving in person training on the standard. The fbi also rolled out new mandatory training that will focus on the query standard. That training is designed to enhance personnels understanding of the query and enable them to differentiate. The team will continue to evaluate if additional apps are needed after december. A couple of words about the usa freedom act. December which i assume most people know and it has three primary authorities as concerns the fbi. Section 215 Business Records, wolfg wiretaps, the lone provision which applies to nonus persons and International Terrorism with no requirement to show a connection to a foreign government. I will go in more detail. As i said, they are all expiring in the tools are critical to what we have available for our National Security investigations. The bureau has a solid years long record of successfully using both the Business Records provision and the roving wiretap provision. Tose provisions are integral our investigations. They provide the building blocks, in many cases, and the ability to keep pace with the threat and to avoid missing critical intelligence. Provisionss records deals primarily with transactional events. That is electronic communications, transactional records suchness as hotel receipts, Storage Facility receipts and supply records. These types of records are collected in virtually every single criminal case. Request Business Record our court are quite reviewed and in all cases, the fisk must find reasonable grounds that the records are relevant to an authorized investigation. , thesest every respect requests are similar to a grand jury subpoena that does not undergo court supervision. Likewise, the roving wiretaps are subject to Court Approval and supervision. The fbi has to show a specific target of a fisa investigation ordered engaged actively in activity that is wording thwarting our surveillance. If the f the eye is the fbi even ifch a showing you take steps to avoid that surveillance such as burner phones. Again, the roving authority is substantially the same as that used in a title iii wiretap. Wolf provision, as i indicated, is very narrow. Its limited applicability does not diminish its possibility. It can be used in the surveillance only of nonus persons. It allows the bureau to obtain a fisa order targeting a nonus person engaging in International Terrorism or the preparation thereof even if the bureau cannot show the target is doing that on behalf of a foreign power. And that is a Real Advantage for us. Radicalizationt is on the rise and we are seeing more and more homegrown act errors. Can be inspired to act on behalf of a foreign power such as a terrorist group. But, rather than being directed to do so, and this increases the likelihood that the fbi will wolfto be live on the lone provision. I would like to move to cyber a little bit. Me whatrequently ask has changed in the practice of law in the 37 years i have been a lawyer. And it has always been a very easy answer for me. Isre are two things one digital evidence and just the digital footprint that affects us all instead of a onetime talking about evidence with a number of boxes. Now, we talk about gigabytes and terabyte. Terabytes. Partther aspect which is of your program is the international affect. Back in the mid1980s, when we mlab that was a big deal. It seems almost every investigation whether National Security or otherwise involves some type of acquisition of foreign evidence. [indiscernible] it is a mutual Legal Assistance treaty which is in my view a somewhat cumbersome process that allows us to receive evidence from a foreign nation. And it takes a great deal of time and in fact, it is part of what was the of a test for the cloud act which we are hoping and the devil is always in the details, that if we can move forward with the cloud act, it may solve some of those problems and make the acquisition of foreign evidence easier which is our hope. Cyber and encryption challenges. , the challenge of cyber and technology are enabling criminals and foreign adversaries. Here are new venues of attacks greater attacks surface. From any location near or far from our target. A lowcost barrier to entry. It is easier to mask or hide the attribution. And the tools are cheaply and widely available. There are cyber mercenaries that will hack for hire. This affects everyone even those who may never own a computer or a cell phone. Because the attacks are on the power grid, critical infrastructure, on thirdparty protection of pii, the opm is an example. Financialords and records. All of this occurs against a background that has many tools for cybersecurity. The technical tools of ,ncryption, antivirus, firewall multifactor a benefit haitian, multifactor authentication, the legal restrictions of nda sanctions, supply chain requirements, regulations and contractual agreement. Policy and process. Social media. And the terms of use policy. Incidence response plans. Identity authentication. Dual approval requirements. And restricted access. The training that all of us do each and every year in all of our entities, information sharing that we have on base thats. But, a lot of focus today is on the issue of legal access. Attorneyl go some of and i will a echo William Barrs statements. Provides privacy and cybersecurity benefits. Communications, networks, data storage, online transactions, protects personal information. Enablesryption also terrorists, criminals, and foreign adversaries. It allows the Sexual Exploitation and abusing of children. To commite conspiring crimes or planned terrorist attacks, recruiting, stealing intellectual property, and undermining our Democratic Values and institutions. Encryption leaves Surface Service providers unable to provide content in response to lawful Court Ordered requests based on probable cause. I will repeat that they cannot respond to court orders for readable content. It impacts communications in transit or stored in electronic data. It degrades the ability to detect and prevent, to arrest and prosecute. A law free zone for criminal behavior. Said, attorney general taking our Virtual World more secure, no one argues with that but making our virtual word and dutch world more secure cannot come at the expense of making us more vulnerable to the real world. A week goes by that the fbi does not is not confronted with an investigation impacted by the issue of encryption. Concerns. Are real real problems. The state and local Law Enforcement authorities are hurt worse because they have fewer resources and tools to address this. These problems mexican cartels that use whatsapp to coordinate their drug shipments and the murder of police officers. Attacks in the 2015 garland, texas where two islamic extremist carried out and isis claimed attack. One terrorist exchanged 100 instant messages with an overseas terrorist using an end to end encrypted app. Gun violence. Church shooting in southern springs, texas where a government killed 26 people where a gunman killed 26 people. Even with more advanced commercial tools, 600 plus days later, the fbi still is not able access thee code to phone. It still could take years. Gang activities and murders. They use encrypted apps to greenlight assassinations. This is not a theoretical problem. There is positive engagement we have to have to improve Public Safety. With access to such communication and with the cooperation of partnerships with Communication Services and their platforms, we have achieved great success. Eight general attorney and others wrote a letter to the ceo of facebook. More than 90 of the 18. 4 million total reports that year. Facebook acted against 27 million pieces of terrorist content between october 2017 and march 2019. More than 99 of the content facebook took action against both for child Sexual Exploitation and terrorism was identified by its system rather than users of reports. However, if facebook implements this end to end encryption as expects to lose a great deal of reporting. Is the way forward . Some suggested that the government can use metadata. I can to you from personal experience as an investigator and a prosecutor that metadata doesnot equal the content, not equal the value of content. Some suggest that we could use Artificial Intelligence to increasingly advance our use of metadata. That simply oversimplifies the problem and really, it does not address the problem. Sameata cannot provide the type or depths of intelligence that content can. No one in Law Enforcement believes metadata can replace content. Metrics, quite frankly, do not speak for themselves. There is no barometer that can measure the value of cybersecurity against the value of preventing child abuse, mass shootings, and terrorist attacks. Legislation, we look to the Technology Providers to help provide Public Safety and access to information needed in criminal and National Security investigations. Has the Technology Skill and the ability to determine how best to design products to allow for lawful access when needed. Barr said, general welcome to civil society. We regularly expect and often mandy if necessary that our Companies Take steps to ensure that their products and services do not impose negative externalities on the public interest. The department of defense does implements is requirements for cybersecurity standard on all of its contractors. The nist standards supply cybersecurity goals. They do not describe the tools or process. On its own designed approach to the environment. Be an analysis of the relative cost and benefit to society. It is not reasonable to incur massive further cost to move slightly closer to a perfect cybersecurity optimality at the cost of a massive degrading of Public Safety. Frombi has started to hear crypto experts and there are solutions that can account for strong cybersecurity and the need for lawful access. Ability inve owner products even with encryption. The residual risk of vulnerability resulting from incorporating a lawful access mechanism has not been shown to be materially greater than those that are already in an unmodified product. And i am just on time at 12 44. Hope you enjoy the rest of your conference because i did not get to a couple of things. Particularly, i mentioned economic espionage and maligned for an influence on election. Two issues we are dealing with every day at the bureau as are our friends in the intelligence community. Our colleagues there. Thank you. [applause] we are not going to take questions because we have to clear the tables. You may stay in place. Presentation will take place at 1 00. Unless you want to take some questions. Mr. Boente i would be happy to take a question. I may not answer it but would be happy to take them. [laughter] any questions . Glenn, you dont have a question . Mr. Boente thank you, glenn. Ok, one question in the back. Can you make it assisting and to the point succinct and to the point . What about civil liability for companies that choose to market encrypted devices . If the encrypted device is found in connection with a criminal act or terrorist act that ipso facto there is a presumption it was used to facilitate the crime creating liability. And then companies can build that into the cost of the device. It is a legislative issue. As we stand right now, i dont think we have anything about that. I have not heard that actually as a proposal. It may be a legislative proposal although it strikes me that it would be very difficult the put the proper to put the proper guardrails on it. It would be interesting to see that as a proposal because we do not want someone we do not want to stifle commerce too much. And it strikes me that i guess i would have to see the details of it. But i am having a hard time imagining it right now. It not only gets you out of jail but it also gets you a free refreshment at the bar if you need. Thank you, again. Mr. Boente thank you for your attention. This afternoon at the white house, President Trump will present the president ial citizens medal to several recipients at 6 00 p. M. Here on cspan. A look at our prime time schedule on the cspan networks. Starting at 8 00 eastern on cspan, remarks from mike pence event politics and eggs in new hampshire. And we hear a 2006 law that creates a revenue license. And on cspan3, it is American History tv with programs on past president ial impeachment proceedings. Cspans washington journal live every day with news and policy issues that impact you. Coming up friday morning, the wilsons enters anke and what discusses efforts by the u. S. And mexico to battle mexican drug cartels. And then Maurice Mitchell talks about his Political Party roots and priorities and its recent endorsement of elizabeth warren. David mcintosh on his organizations strategy for campaign 2020 and its defense of president in the impeachment inquiry. Watch cspans washington 7 00 eastern. At join the discussion. , Robert Wilkie discusses oversight issues at his department and what is being done to ensure the care of u. S. Veterans. He will be speaking at the National Press club live at 1 00 eastern on cspan3. And cspans campaign 2020 coverage continues with joe biden holding a Campaign Rally with voters and supporters in new hampshire. It also plans to file his candidacy paperwork at the statehouse in concord. That is at 1 00 p. M. Eastern on cspan. And President Trump will visit atlanta where he will launch his campaigns black voices for trump campaign. At 3 00 p. M. Eastern on cspan. Marks the 30th anniversary of the fall of the berlin wall, a symbol of the divide between the east and the west during the cold war. American history tv and cspans washington journal is our live from the museum in washington, d. C. We begin with the head of georgetown universitys head of the eurasian studies. And the author of after the berlin wall. Steve vogel who covered the follow the berlin wall for the washington post. And Kerry Kristofferson talks about their cold war exhibit. Watch