James Comey

Public Servant

246 Quotes

Encryption threatens to lead all of us to a very dark place.

We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas - things of incredible value to all of us. They seek to strike our critical infrastructure and to harm our economy.

Encryption threatens to lead all of us to a very dark place.

We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas - things of incredible value to all of us. They seek to strike our critical infrastructure and to harm our economy.

Even if information is not marked classified in an email, participants who know or should know that the subject matter is classified are still obligated to protect it.

The need for reflection and restraint of power is what led Louis Freeh to order that all new agent classes visit the Holocaust Museum here in Washington so they could see and feel and hear in a palpable way the consequences of abuse of power on a massive, almost unimaginable scale.

Senator Schumer is a partisan.

Although individual states have primary responsibility for conducting fair and impartial elections, the FBI becomes involved when paramount federal interests are affected or electoral abuse occurs.

In 1983, my second year of law school, I became the only white player in the Ogden Park Basketball League at 65th and Racine. My teammates joked that I integrated the league, which I guess is true. They weren't so much focused on integration as on winning, and they knew you can't teach height. 'He can't jump, but he sure is tall.'

A lot of terrorists fled out of Afghanistan.

AOL had a very strong motive to create the appearance of high revenues for PurchasePro because the value of the warrants AOL had received in the deal depended on PurchasePro's performance.

Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States - spot, assess, recruit, and radicalize - either to travel or to conduct a homeland attack.

At some point, there is going to be a terrorist diaspora out of Syria like we've never seen before.

With respect to potential computer intrusion by hostile actors, we did not find direct evidence that Secretary Clinton's personal e-mail domain, in its various configurations since 2009, was successfully hacked.

We do assess that hostile actors gained access to the private commercial e-mail accounts of people with whom Secretary Clinton was in regular contact from her personal account.

WhatsApp has over a billion customers, and they are overwhelmingly good people. But in that billion customers are terrorists and criminals... It's a huge feature of terrorist tradecraft.

There's a perception that police are less likely to do the marginal additional policing that suppresses crime: the getting out of your car at 2 in the morning and saying to a group of guys, 'What are you doing here?'

We all, white and black, carry various biases around with us.

We have perpetrated a myth in our society that being brave means not being afraid, but that's wrong.

An element of virtually every national security threat and crime problem the FBI faces is cyber-based or facilitated. We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists.

1 of 13
1 2 3 4 5 6 7 8 9 10 11 12 13