Zitat des Tages von James Comey:
We investigate in secret so that we don't smear innocent people.
We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas - things of incredible value to all of us. They seek to strike our critical infrastructure and to harm our economy.
The Internet offers the ability for people to consume poison and radicalize entirely in private, either through a device they're holding in their hands or inside their house.
Technology has forever changed the world we live in. We're online, in one way or another, all day long. Our phones and computers have become reflections of our personalities, our interests, and our identities. They hold much that is important to us.
What makes the bravery of the men and women of the FBI so special is that they know exactly what they're in for. They spend weeks and weeks in an academy learning just how hard and dangerous this work is. Then they raise their right hands and take an oath and do that work anyway.
AOL had a very strong motive to create the appearance of high revenues for PurchasePro because the value of the warrants AOL had received in the deal depended on PurchasePro's performance.
The need for reflection and restraint of power is what led Louis Freeh to order that all new agent classes visit the Holocaust Museum here in Washington so they could see and feel and hear in a palpable way the consequences of abuse of power on a massive, almost unimaginable scale.
The fact of the matter is that the United States faces real threats from criminals, terrorists, spies, and malicious cyber actors.
The spine of the FBI is the rule of law. The spine of the FBI is a commitment to doing the right thing, in the right way, while protecting civil liberties.
The FBI has built up substantial expertise to address cyber threats, both in the homeland and overseas. Here at home, the FBI serves as the executive agent for the National Cyber Investigative Joint Task Force (NCIJTF), which joins together 19 intelligence, law enforcement, and military agencies to coordinate cyber threat investigations.
As Director of the FBI, I am sworn to ensure that my special agents have what they need to protect themselves and the citizens of this country, and that they are trained to properly use and properly deploy that equipment in the right times and places.
We have perpetrated a myth in our society that being brave means not being afraid, but that's wrong.
As all of our lives become digital, the logic of encryption is all of our lives will be covered by strong encryption, and therefore all of our lives - including the lives of criminals and terrorists and spies - will be in a place that is utterly unavailable to court-ordered process. And that, I think, to a democracy should be very, very concerning.
Stuff doesn't matter - boats, cars, fancy things don't matter. What matters, what will matter to me, is the love of the people around me, and did I take a chance? Did I seize an opportunity to do something for people with the talents that I was lucky enough to be given? Did I make a difference in the lives of people who needed me?
Cisco projects that in 2020, now just five years away, there will be seven billion people on the earth and 50 billion devices connected to the Internet. Six-and-a-half devices on average per person. As a father of five young adults and teenagers, I think we are - in my household, we've exceeded the 6.5 number.
I worry a bit about the unknowns when it comes to travelers to the war zones in Syria and Iraq. Who don't I see? And I worry about the people who may be in their basements radicalizing that I can't see.
FBI Miami is one of the top five offices. Not only are they responsible for all the work that goes on here in South Florida, but they are one of my international offices, so they cover kidnappings or counterintelligence matters or counterterrorism matters in the whole hemisphere.
The FBI is engaged in a myriad of efforts to combat cyber threats, from efforts focused on threat identification and sharing inside and outside of government, to our internal emphasis on developing and retaining new talent and changing the way we operate to evolve with the cyber threat.
It's not about the stuff. The issue is how we use that stuff and how do we train people to use that stuff. Do we use that stuff to confront people who are protesting in a community? Do we use a sniper rifle to see closer in a crowd? That's where it breaks down.
The private sector is the key player in cyber security. Private sector companies are the primary victims of cyber intrusions. And they also possess the information, the expertise, and the knowledge to address cyber intrusions and cyber crime in general.
I come from a law enforcement family. My grandfather, William J. Comey, was a police officer. Pop Comey is one of my heroes. I have a picture of him on my wall in my office at the FBI, reminding me of the legacy I've inherited and that I must honor.
Martha Stewart is being prosecuted not for who she is but what she did.
Some believe that the FBI has these phenomenal capabilities to access any information at any time - that we can get what we want, when we want it, by flipping some sort of switch. It may be true in the movies or on TV. It is simply not the case in real life.
There is no such thing as absolute privacy in America.
Law enforcement's biased view of the Irish lives on in the nickname we still use for the vehicles we use to transport groups of prisoners. It is, after all, the 'paddy wagon.' The Irish had tough times, but little compares to the experience on our soil of black Americans.
The threat here focuses primarily on troubled souls in America who are being inspired or enabled online to do something violent for ISIL.
I believe the job of the FBI Director is to be as transparent as possible with the American people because we work for them.
Terrorists, in ungoverned spaces, disseminate poisonous propaganda and training materials to attract troubled souls around the world to their cause.
Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States - spot, assess, recruit, and radicalize - either to travel or to conduct a homeland attack.
When I worked as a prosecutor in Richmond, Virginia in the 1990s, that city, like so much of America, was experiencing horrific levels of violent crime. But to describe it that way obscures an important truth: for the most part, white people weren't dying; black people were dying. Most white people could drive around the problem.
The Chattanooga killer was inspired by a foreign terror organization. It's hard to entangle which particular source... there are lots of competing poisons out there.
We can only query against that which we have collected. And so if someone has never made a ripple in the pond in Syria in a way that would get their identity or their interest reflected in our database, we can query our database until the cows come home, but there will be nothing show up because we have no record of them.
With respect to potential computer intrusion by hostile actors, we did not find direct evidence that Secretary Clinton's personal e-mail domain, in its various configurations since 2009, was successfully hacked.
They do not want people committing violence, either in their community or in the name of their faith, and so some of our most productive relationships are with people who see things and tell us things who happen to be Muslim.
There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese, and those who don't know they've been hacked by the Chinese.
People view the police not as allies, but as antagonists, and think of them not with respect or gratitude, but with suspicion and distrust.