Quotes of All Topics . Occasions . Authors
In today's YouTube world, are officers reluctant to get out of their cars and do the work that controls violent crime? Are officers answering 911 calls but avoiding the informal contact that keeps bad guys from standing around, especially with guns?
I come from a law enforcement family. My grandfather, William J. Comey, was a police officer. Pop Comey is one of my heroes. I have a picture of him on my wall in my office at the FBI, reminding me of the legacy I've inherited and that I must honor.
As technology advances, so too does terrorists' use of technology to communicate - both to inspire and recruit. The widespread use of technology propagates the persistent terrorist message to attack U.S. interests, whether in the homeland or abroad.
As Director of the FBI, I am sworn to ensure that my special agents have what they need to protect themselves and the citizens of this country, and that they are trained to properly use and properly deploy that equipment in the right times and places.
The FBI continues to work with tribes through the Tribal Law and Order Act of 2010 to help tribal governments better address the unique public safety challenges and disproportionately high rates of violence and victimization in many tribal communities.
The Obama administration was not in a position where they were seeking legislation. I don't know yet how President Trump intends to approach this. I know he spoke about it during the campaign. I know he cares about it, but it's premature for me to say.
The private sector is the key player in cyber security. Private sector companies are the primary victims of cyber intrusions. And they also possess the information, the expertise, and the knowledge to address cyber intrusions and cyber crime in general.
Some believe that the FBI has these phenomenal capabilities to access any information at any time - that we can get what we want, when we want it, by flipping some sort of switch. It may be true in the movies or on TV. It is simply not the case in real life.
It's not about the stuff. The issue is how we use that stuff and how do we train people to use that stuff. Do we use that stuff to confront people who are protesting in a community? Do we use a sniper rifle to see closer in a crowd? That's where it breaks down.
In my view, a huge portion of WikiLeaks's activities has nothing to do with legitimate newsgathering, informing the public, commenting on important public controversies, but is simply about releasing classified information to damage the United States of America.
I was a high school senior and home alone one night with my younger brother. And a guy - gunman - kicked in our front door at our home in New Jersey and held the two of us captive. We escaped. He caught us again. We escaped again. So, a pretty horrific experience.
The Internet is the most dangerous parking lot imaginable. But if you were crossing a mall parking lot late at night, your entire sense of danger would be heightened. You would stand straight. You'd walk quickly. You'd know where you were going. You would look for light.
Law enforcement's biased view of the Irish lives on in the nickname we still use for the vehicles we use to transport groups of prisoners. It is, after all, the 'paddy wagon.' The Irish had tough times, but little compares to the experience on our soil of black Americans.
Although we did not find clear evidence that Secretary Clinton or her colleagues intended to violate laws governing the handling of classified information, there is evidence that they were extremely careless in their handling of very sensitive, highly classified information.
In their minds, the murderers and accomplices of Germany, and Poland, and Hungary, and so many, many other places didn't do something evil. They convinced themselves it was the right thing to do, the thing they had to do. That's what people do. And that should truly frighten us.
FBI Miami is one of the top five offices. Not only are they responsible for all the work that goes on here in South Florida, but they are one of my international offices, so they cover kidnappings or counterintelligence matters or counterterrorism matters in the whole hemisphere.
What makes the bravery of the men and women of the FBI so special is that they know exactly what they're in for. They spend weeks and weeks in an academy learning just how hard and dangerous this work is. Then they raise their right hands and take an oath and do that work anyway.
The need for reflection and restraint of power is what led Louis Freeh to order that all new agent classes visit the Holocaust Museum here in Washington so they could see and feel and hear in a palpable way the consequences of abuse of power on a massive, almost unimaginable scale.
Public corruption is the FBI's top criminal priority. The threat - which involves the corruption of local, state, and federally elected, appointed, or contracted officials - strikes at the heart of government, eroding public confidence and undermining the strength of our democracy.
I was born into an Irish Catholic family in the New York area in this great, wonderful, and safe country, but the Holocaust has always haunted me, and it has long stood as a stumbling block to faith. How could such a thing be? How is that consistent with the concept of a loving God?
The FBI is engaged in a myriad of efforts to combat cyber threats, from efforts focused on threat identification and sharing inside and outside of government, to our internal emphasis on developing and retaining new talent and changing the way we operate to evolve with the cyber threat.
We did not find direct evidence that Secretary Clinton’s personal e-mail domain, in its various configurations since 2009, was successfully hacked. But, given the nature of the system and of the actors potentially involved, we assess that we would be unlikely to see such direct evidence.
For me, law school was a time of joy and hope. Joy in learning my way around the law - learning how to orbit a problem and to ask myself hard questions and to be asked hard questions. Hope that I could be of some use, to be part of the greater good - to make the world a little bit better.
Only a crazy person wouldn't fear approaching a car with tinted windows during a late-night car stop, or pounding up a flight of stairs to execute a search warrant, or fast-roping from a helicopter down into hostile fire. Real agents, like real people, feel that fear in the pit of their stomachs.
The diverse threats we face are increasingly cyber-based. Much of America's most sensitive data is stored on computers. We are losing data, money, and ideas through cyber intrusions. This threatens innovation and, as citizens, we are also increasingly vulnerable to losing our personal information.
Prosecutors necessarily weigh a number of factors before bringing charges. There are obvious considerations, like the strength of the evidence, especially regarding intent. Responsible decisions also consider the context of a person's actions and how similar situations have been handled in the past.
We in the FBI have created a malware repository and analysis tool known as the Binary Analysis Characterization and Storage System, or BACSS, which provides near real-time investigative information. BACSS helps us link malware in different jurisdictions and paint a picture of cyber threats worldwide.
We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas - things of incredible value to all of us. They seek to strike our critical infrastructure and to harm our economy.
The FBI also discovered several thousand work-related e-mails that were not in the group of 30,000 that were returned by Secretary Clinton to State in 2014... I should add here that we found no evidence that any of the additional work-related e-mails were intentionally deleted in an effort to conceal them.
The destructive malware attack against Sony Pictures Entertainment (SPE) in late 2014 was an unprecedented cyber event for the United States in its scope, destructiveness, and economic implications. The FBI responded to this attack with an investigation that was groundbreaking in its scope and collaboration.
To accomplish its mission, the FBI relies heavily upon its law enforcement and intelligence partners around the nation and around the globe. By combining our resources and our collective expertise, we are able to investigate national security threats that cross both geographical and jurisdictional boundaries.
Cisco projects that in 2020, now just five years away, there will be seven billion people on the earth and 50 billion devices connected to the Internet. Six-and-a-half devices on average per person. As a father of five young adults and teenagers, I think we are - in my household, we've exceeded the 6.5 number.
Only a very small number of the e-mails containing classified information bore markings indicating the presence of classified information. But even if information is not marked 'classified' in an e-mail, participants who know or should know that the subject matter is classified are still obligated to protect it.
ISIL's widespread reach through the Internet and social media is most concerning, as the group has proven dangerously competent at employing such tools for its nefarious strategy. ISIL uses high-quality, traditional media platforms as well as widespread social media campaigns to propagate its extremist ideology.
The Clinton investigation was a completed investigation that the FBI had been deeply involved in, so I had an opportunity to understand all the facts and apply those facts against the law as I understood them. This investigation was under way - still going when I was fired. So it's nowhere near in the same place.
Just as our adversaries and threats continue to evolve, so, too, must the FBI. The key to this evolution lies with our greatest assets: our people and our partnerships. Every FBI professional understands that thwarting the threats facing our nation means constantly striving to be more effective and more efficient.
We can only query against that which we have collected. And so if someone has never made a ripple in the pond in Syria in a way that would get their identity or their interest reflected in our database, we can query our database until the cows come home, but there will be nothing show up because we have no record of them.
When I worked as a prosecutor in Richmond, Virginia in the 1990s, that city, like so much of America, was experiencing horrific levels of violent crime. But to describe it that way obscures an important truth: for the most part, white people weren't dying; black people were dying. Most white people could drive around the problem.
In 1983, my second year of law school, I became the only white player in the Ogden Park Basketball League at 65th and Racine. My teammates joked that I integrated the league, which I guess is true. They weren't so much focused on integration as on winning, and they knew you can't teach height. 'He can't jump, but he sure is tall.'
The attorney general called and asked me if I was willing to be interviewed for FBI director. And the truth is I told him I didn't think so, that I thought it was too much for my family. But that I would sleep on it and call him back in the morning. And so I went to bed that night convinced I was going to call him back and say no.
Stuff doesn't matter - boats, cars, fancy things don't matter. What matters, what will matter to me, is the love of the people around me, and did I take a chance? Did I seize an opportunity to do something for people with the talents that I was lucky enough to be given? Did I make a difference in the lives of people who needed me?
There are two things that matter in a criminal investigation of a subject.What did the person do, and when they did that thing, what were they thinking? When you look at the hundred-years-plus of the Justice Department investigation and prosecution of mishandling of classified information, those two questions are obviously present.
What we do is we combine information collected from any lawful source in a single FBI database so we don't miss a dot when we're conducting investigations in the United States. What we make sure of, though, is nobody gets to see FISA information of any kind unless they've had the appropriate training and have the appropriate oversight.
Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States - spot, assess, recruit, and radicalize - either to travel or to conduct a homeland attack.
The FBI has built up substantial expertise to address cyber threats, both in the homeland and overseas. Here at home, the FBI serves as the executive agent for the National Cyber Investigative Joint Task Force (NCIJTF), which joins together 19 intelligence, law enforcement, and military agencies to coordinate cyber threat investigations.
Secretary Clinton used several different servers and administrators of those servers during her four years at the State Department and used numerous mobile devices to view and send e-mail on that personal domain. As new servers and equipment were employed, older servers were taken out of service, stored, and decommissioned in various ways.
Those of us in law enforcement must redouble our efforts to resist bias and prejudice. We must better understand the people we serve and protect - by trying to know, deep in our gut, what it feels like to be a law-abiding young black man walking on the street and encountering law enforcement. We must understand how that young man may see us.
We face two overlapping challenges. The first concerns real-time court-ordered interception of what we call 'data in motion,' such as phone calls, e-mail, and live chat sessions. The second challenge concerns court-ordered access to data stored on our devices, such as e-mail, text messages, photos, and videos - or what we call 'data at rest.'
Lives are saved when those potential killers are confronted by a police officer, a strong police presence and actual, honest-to-goodness, up-close 'What are you guys doing on this corner at 1 o'clock in the morning' policing. We need to be careful it doesn't drift away from us in the age of viral videos, or there will be profound consequences.
As all of our lives become digital, the logic of encryption is all of our lives will be covered by strong encryption, and therefore all of our lives - including the lives of criminals and terrorists and spies - will be in a place that is utterly unavailable to court-ordered process. And that, I think, to a democracy should be very, very concerning.