- Warren Buffet
- Abraham Lincoln
- Charlie Chaplin
- Mary Anne Radmacher
- Alice Walker
- Albert Einstein
- Steve Martin
- Mark Twain
- Michel Montaigne
- Voltaire
Find most favourite and famour Authors from A.A Milne to Zoe Kravitz.
The threat that ISIL presents and poses to the United States is very different in kind, in type and degree than al Qaeda.
James Comey
Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States - spot, assess, recruit, and radicalize - either to travel or to conduct a homeland attack.
The diverse threats we face are increasingly cyber-based. Much of America's most sensitive data is stored on computers. We are losing data, money, and ideas through cyber intrusions. This threatens innovation and, as citizens, we are also increasingly vulnerable to losing our personal information.
In today's YouTube world, are officers reluctant to get out of their cars and do the work that controls violent crime? Are officers answering 911 calls but avoiding the informal contact that keeps bad guys from standing around, especially with guns?
I know there are other Elton Simpsons out there. But I also know there are Elton Simpsons out there I cannot see.
It's not about the stuff. The issue is how we use that stuff and how do we train people to use that stuff. Do we use that stuff to confront people who are protesting in a community? Do we use a sniper rifle to see closer in a crowd? That's where it breaks down.
What makes the bravery of the men and women of the FBI so special is that they know exactly what they're in for. They spend weeks and weeks in an academy learning just how hard and dangerous this work is. Then they raise their right hands and take an oath and do that work anyway.
Although individual states have primary responsibility for conducting fair and impartial elections, the FBI becomes involved when paramount federal interests are affected or electoral abuse occurs.
One of the hardest things I do as FBI Director is call the chiefs and sheriffs in departments around the nation when officers have been killed in the line of duty. I call to express my sorrow and offer the FBI's help.
With respect to potential computer intrusion by hostile actors, we did not find direct evidence that Secretary Clinton's personal e-mail domain, in its various configurations since 2009, was successfully hacked.
I saw something in the news, so I copied it. I put a piece of tape - I have obviously a laptop, personal laptop - I put a piece of tape over the camera. Because I saw somebody smarter than I am had a piece of tape over their camera.
I believe that Americans should be deeply skeptical of government power. You cannot trust people in power. The founders knew that. That's why they divided power among three branches, to set interest against interest.
Those of us in law enforcement must redouble our efforts to resist bias and prejudice. We must better understand the people we serve and protect - by trying to know, deep in our gut, what it feels like to be a law-abiding young black man walking on the street and encountering law enforcement. We must understand how that young man may see us.
Even if information is not marked classified in an email, participants who know or should know that the subject matter is classified are still obligated to protect it.
At some point, there is going to be a terrorist diaspora out of Syria like we've never seen before.
To accomplish its mission, the FBI relies heavily upon its law enforcement and intelligence partners around the nation and around the globe. By combining our resources and our collective expertise, we are able to investigate national security threats that cross both geographical and jurisdictional boundaries.
Lives are saved when those potential killers are confronted by a police officer, a strong police presence and actual, honest-to-goodness, up-close 'What are you guys doing on this corner at 1 o'clock in the morning' policing. We need to be careful it doesn't drift away from us in the age of viral videos, or there will be profound consequences.
Some believe that the FBI has these phenomenal capabilities to access any information at any time - that we can get what we want, when we want it, by flipping some sort of switch. It may be true in the movies or on TV. It is simply not the case in real life.
Law enforcement's biased view of the Irish lives on in the nickname we still use for the vehicles we use to transport groups of prisoners. It is, after all, the 'paddy wagon.' The Irish had tough times, but little compares to the experience on our soil of black Americans.
I believe the job of the FBI Director is to be as transparent as possible with the American people because we work for them.
As a communication medium, social media is a critical tool for terror groups to exploit.
I was born in 1960 into a more violent America than we had in 2014. We haven't been in such a good place for more than 50 years.
We often speak of domestic terrorism and hate crimes in the same breath, and there is a fine line between the two, and certainly overlap in some cases.
Hate crimes impact not just individuals but entire communities. When a family is attacked because of the color of their skin, it's not just the family that feels violated, but every resident of that neighborhood.
Terrorists, in ungoverned spaces, disseminate poisonous propaganda and training materials to attract troubled souls around the world to their cause.
The destructive malware attack against Sony Pictures Entertainment (SPE) in late 2014 was an unprecedented cyber event for the United States in its scope, destructiveness, and economic implications. The FBI responded to this attack with an investigation that was groundbreaking in its scope and collaboration.
The benefits of our increasingly digital lives have been accompanied by new dangers, and we have been forced to consider how criminals and terrorists might use advances in technology to their advantage.
My wife Patrice, in addition to being enormously supportive, has taught me a lot about life. She might argue it's because I have so much to learn. One of the most important things I've learned is the art of listening.
We in the FBI have created a malware repository and analysis tool known as the Binary Analysis Characterization and Storage System, or BACSS, which provides near real-time investigative information. BACSS helps us link malware in different jurisdictions and paint a picture of cyber threats worldwide.
Privacy is tremendously important. I believe the American people, and all people, should be skeptical of government power, should ask hard questions: What is the authority? What is the oversight? That's the way it ought to be.
As Director of the FBI, I am sworn to ensure that my special agents have what they need to protect themselves and the citizens of this country, and that they are trained to properly use and properly deploy that equipment in the right times and places.
Just as our adversaries and threats continue to evolve, so, too, must the FBI. The key to this evolution lies with our greatest assets: our people and our partnerships. Every FBI professional understands that thwarting the threats facing our nation means constantly striving to be more effective and more efficient.
The FBI continues to work with tribes through the Tribal Law and Order Act of 2010 to help tribal governments better address the unique public safety challenges and disproportionately high rates of violence and victimization in many tribal communities.
An element of virtually every national security threat and crime problem the FBI faces is cyber-based or facilitated. We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists.
The FBI is engaged in a myriad of efforts to combat cyber threats, from efforts focused on threat identification and sharing inside and outside of government, to our internal emphasis on developing and retaining new talent and changing the way we operate to evolve with the cyber threat.
The attorney general called and asked me if I was willing to be interviewed for FBI director. And the truth is I told him I didn't think so, that I thought it was too much for my family. But that I would sleep on it and call him back in the morning. And so I went to bed that night convinced I was going to call him back and say no.
Cybercrime is becoming everything in crime. Again, because people have connected their entire lives to the Internet, that's where those who want to steal money or hurt kids or defraud go. So it's an epidemic for reasons that make sense.
When someone sends you an email, they are knocking on your door. And when you open the attachment, without looking through the peephole to see who it is, you just opened the door and let a stranger into your life, where everything you care about is.
The threat that ISIL presents and poses to the United States is very different in kind, in type and degree than al Qaeda. ISIL is not your parents' al Qaeda. It's a very different model.
The lesson is the importance of never becoming untethered to oversight and accountability.
We've made great progress coordinating better as a government.
The Internet is the most dangerous parking lot imaginable. But if you were crossing a mall parking lot late at night, your entire sense of danger would be heightened. You would stand straight. You'd walk quickly. You'd know where you were going. You would look for light.
There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese.
Folks are wandering around that proverbial parking lot of the Internet all day long, without giving it a thought to whose attachments they're opening, what sites they're visiting. And that makes it easy for the bad guys.
ISIL is not your parents' al Qaeda. It's a very different model.
ISIL does something al-Qaida would never imagine: they test people by tasking them.
Secretary Clinton used several different servers and administrators of those servers during her four years at the State Department and used numerous mobile devices to view and send e-mail on that personal domain. As new servers and equipment were employed, older servers were taken out of service, stored, and decommissioned in various ways.
Prosecutors necessarily weigh a number of factors before bringing charges. There are obvious considerations, like the strength of the evidence, especially regarding intent. Responsible decisions also consider the context of a person's actions and how similar situations have been handled in the past.
We do assess that hostile actors gained access to the private commercial e-mail accounts of people with whom Secretary Clinton was in regular contact from her personal account.
People view the police not as allies, but as antagonists, and think of them not with respect or gratitude, but with suspicion and distrust.