- Warren Buffet
- Abraham Lincoln
- Charlie Chaplin
- Mary Anne Radmacher
- Alice Walker
- Albert Einstein
- Steve Martin
- Mark Twain
- Michel Montaigne
- Voltaire
Find most favourite and famour Authors from A.A Milne to Zoe Kravitz.
Technology has forever changed the world we live in. We're online, in one way or another, all day long. Our phones and computers have become reflections of our personalities, our interests, and our identities. They hold much that is important to us.
James Comey
Hate crimes are different from other crimes. They strike at the heart of one's identity - they strike at our sense of self, our sense of belonging. The end result is loss - loss of trust, loss of dignity, and in the worst case, loss of life.
There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese, and those who don't know they've been hacked by the Chinese.
I believe that the Holocaust is the most significant event in human history.
We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas - things of incredible value to all of us. They seek to strike our critical infrastructure and to harm our economy.
The spine of the FBI is the rule of law. The spine of the FBI is a commitment to doing the right thing, in the right way, while protecting civil liberties.
Public corruption is the FBI's top criminal priority. The threat - which involves the corruption of local, state, and federally elected, appointed, or contracted officials - strikes at the heart of government, eroding public confidence and undermining the strength of our democracy.
Undisclosed and illegal payments, kickbacks, and bribes became a way of doing business at FIFA.
Only a crazy person wouldn't fear approaching a car with tinted windows during a late-night car stop, or pounding up a flight of stairs to execute a search warrant, or fast-roping from a helicopter down into hostile fire. Real agents, like real people, feel that fear in the pit of their stomachs.
For me, law school was a time of joy and hope. Joy in learning my way around the law - learning how to orbit a problem and to ask myself hard questions and to be asked hard questions. Hope that I could be of some use, to be part of the greater good - to make the world a little bit better.
The fact of the matter is that the United States faces real threats from criminals, terrorists, spies, and malicious cyber actors.
Stuff doesn't matter - boats, cars, fancy things don't matter. What matters, what will matter to me, is the love of the people around me, and did I take a chance? Did I seize an opportunity to do something for people with the talents that I was lucky enough to be given? Did I make a difference in the lives of people who needed me?
The people of the FBI are sworn to protect both security and liberty. It isn't a question of conflict. We must care deeply about protecting liberty through due process of law, while also safeguarding the citizens we serve - in every investigation.
Encryption threatens to lead all of us to a very dark place.
Our obligation is to refuse to let bad win, to refuse to let evil hold the field.
As all of our lives become digital, the logic of encryption is all of our lives will be covered by strong encryption, and therefore all of our lives - including the lives of criminals and terrorists and spies - will be in a place that is utterly unavailable to court-ordered process. And that, I think, to a democracy should be very, very concerning.
Although we did not find clear evidence that Secretary Clinton or her colleagues intended to violate laws governing the handling of classified information, there is evidence that they were extremely careless in their handling of very sensitive, highly classified information.
Martha Stewart is being prosecuted not for who she is but what she did.
We have built as a government something called the National Cyber Investigative Joint Task Force, NCIJTF, where 19 federal agencies sit together and divide up the work. See the threat, see the challenge, divide it up and share information.
The need for reflection and restraint of power is what led Louis Freeh to order that all new agent classes visit the Holocaust Museum here in Washington so they could see and feel and hear in a palpable way the consequences of abuse of power on a massive, almost unimaginable scale.
When I worked as a prosecutor in Richmond, Virginia in the 1990s, that city, like so much of America, was experiencing horrific levels of violent crime. But to describe it that way obscures an important truth: for the most part, white people weren't dying; black people were dying. Most white people could drive around the problem.
We can only query against that which we have collected. And so if someone has never made a ripple in the pond in Syria in a way that would get their identity or their interest reflected in our database, we can query our database until the cows come home, but there will be nothing show up because we have no record of them.
As so often happened during the dot-com bubble days, the revenues that AOL and PurchasePro were counting on did not materialize. And instead of confronting that harsh reality, AOL and PurchasePro cooked up a scheme to inflate PurchasePro's revenues.
I don't know if it's true or not that folks are less likely to tell police when they see things.
Each FBI employee understands that to defeat the key threats facing our nation, we must constantly strive to be more efficient and more effective. Just as our adversaries continue to evolve, so, too, must the FBI.
In 1983, my second year of law school, I became the only white player in the Ogden Park Basketball League at 65th and Racine. My teammates joked that I integrated the league, which I guess is true. They weren't so much focused on integration as on winning, and they knew you can't teach height. 'He can't jump, but he sure is tall.'
If you've ever talked to a special agent that you know well, and you ask he or she about a dangerous encounter they were involved in, they'll almost always give you the same answer: 'Yeah, I did it, but I was scared to heck the whole time.'
Many of us develop different flavors of cynicism that we work hard to resist because they can be lazy mental shortcuts.
AOL had a very strong motive to create the appearance of high revenues for PurchasePro because the value of the warrants AOL had received in the deal depended on PurchasePro's performance.
Senator Schumer is a partisan.
The promise I've tried to honor my entire career, that the rule of law and the design of the founders, right, the oversight of courts and the oversight of Congress will be at the heart of what the FBI does.
Serious debates are taking place about how law enforcement personnel relate to the communities they serve, about the appropriate use of force.
Not all of the Islamic State killers are going to die on the battlefield.
As technology advances, so too does terrorists' use of technology to communicate - both to inspire and recruit. The widespread use of technology propagates the persistent terrorist message to attack U.S. interests, whether in the homeland or abroad.
I was born into an Irish Catholic family in the New York area in this great, wonderful, and safe country, but the Holocaust has always haunted me, and it has long stood as a stumbling block to faith. How could such a thing be? How is that consistent with the concept of a loving God?
The people of the FBI sacrifice much for their country, and I am proud to lead this organization of dedicated agents, analysts, and professional staff.
There's a perception that police are less likely to do the marginal additional policing that suppresses crime: the getting out of your car at 2 in the morning and saying to a group of guys, 'What are you doing here?'
I love strong encryption. It protects us in so many ways from bad people. But it takes us to a place - absolute privacy - that we have not been to before.
We face two overlapping challenges. The first concerns real-time court-ordered interception of what we call 'data in motion,' such as phone calls, e-mail, and live chat sessions. The second challenge concerns court-ordered access to data stored on our devices, such as e-mail, text messages, photos, and videos - or what we call 'data at rest.'
There is no such thing as absolute privacy in America.
Cisco projects that in 2020, now just five years away, there will be seven billion people on the earth and 50 billion devices connected to the Internet. Six-and-a-half devices on average per person. As a father of five young adults and teenagers, I think we are - in my household, we've exceeded the 6.5 number.
I come from a law enforcement family. My grandfather, William J. Comey, was a police officer. Pop Comey is one of my heroes. I have a picture of him on my wall in my office at the FBI, reminding me of the legacy I've inherited and that I must honor.
We have perpetrated a myth in our society that being brave means not being afraid, but that's wrong.
The private sector is the key player in cyber security. Private sector companies are the primary victims of cyber intrusions. And they also possess the information, the expertise, and the knowledge to address cyber intrusions and cyber crime in general.
The notion that we would market devices that would allow someone to place themselves beyond the law troubles me a lot.
ISIL's widespread reach through the Internet and social media is most concerning, as the group has proven dangerously competent at employing such tools for its nefarious strategy. ISIL uses high-quality, traditional media platforms as well as widespread social media campaigns to propagate its extremist ideology.
I'm a big fan of the rule of law.
Unfortunately, changing forms of Internet communication are quickly outpacing laws and technology designed to allow for the lawful intercept of communication content.
The FBI has built up substantial expertise to address cyber threats, both in the homeland and overseas. Here at home, the FBI serves as the executive agent for the National Cyber Investigative Joint Task Force (NCIJTF), which joins together 19 intelligence, law enforcement, and military agencies to coordinate cyber threat investigations.
I was a high school senior and home alone one night with my younger brother. And a guy - gunman - kicked in our front door at our home in New Jersey and held the two of us captive. We escaped. He caught us again. We escaped again. So, a pretty horrific experience.