People view the police not as allies, but as antagonists, and think of them not with respect or gratitude, but with suspicion and distrust.

We do assess that hostile actors gained access to the private commercial e-mail accounts of people with whom Secretary Clinton was in regular contact from her personal account.

Prosecutors necessarily weigh a number of factors before bringing charges. There are obvious considerations, like the strength of the evidence, especially regarding intent. Responsible decisions also consider the context of a person's actions and how similar situations have been handled in the past.

Secretary Clinton used several different servers and administrators of those servers during her four years at the State Department and used numerous mobile devices to view and send e-mail on that personal domain. As new servers and equipment were employed, older servers were taken out of service, stored, and decommissioned in various ways.

ISIL does something al-Qaida would never imagine: they test people by tasking them.

ISIL is not your parents' al Qaeda. It's a very different model.

Folks are wandering around that proverbial parking lot of the Internet all day long, without giving it a thought to whose attachments they're opening, what sites they're visiting. And that makes it easy for the bad guys.

There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese.

The Internet is the most dangerous parking lot imaginable. But if you were crossing a mall parking lot late at night, your entire sense of danger would be heightened. You would stand straight. You'd walk quickly. You'd know where you were going. You would look for light.

We've made great progress coordinating better as a government.

The lesson is the importance of never becoming untethered to oversight and accountability.

The threat that ISIL presents and poses to the United States is very different in kind, in type and degree than al Qaeda. ISIL is not your parents' al Qaeda. It's a very different model.

When someone sends you an email, they are knocking on your door. And when you open the attachment, without looking through the peephole to see who it is, you just opened the door and let a stranger into your life, where everything you care about is.

Cybercrime is becoming everything in crime. Again, because people have connected their entire lives to the Internet, that's where those who want to steal money or hurt kids or defraud go. So it's an epidemic for reasons that make sense.

The attorney general called and asked me if I was willing to be interviewed for FBI director. And the truth is I told him I didn't think so, that I thought it was too much for my family. But that I would sleep on it and call him back in the morning. And so I went to bed that night convinced I was going to call him back and say no.

The FBI is engaged in a myriad of efforts to combat cyber threats, from efforts focused on threat identification and sharing inside and outside of government, to our internal emphasis on developing and retaining new talent and changing the way we operate to evolve with the cyber threat.

An element of virtually every national security threat and crime problem the FBI faces is cyber-based or facilitated. We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists.

The FBI continues to work with tribes through the Tribal Law and Order Act of 2010 to help tribal governments better address the unique public safety challenges and disproportionately high rates of violence and victimization in many tribal communities.

Just as our adversaries and threats continue to evolve, so, too, must the FBI. The key to this evolution lies with our greatest assets: our people and our partnerships. Every FBI professional understands that thwarting the threats facing our nation means constantly striving to be more effective and more efficient.

As Director of the FBI, I am sworn to ensure that my special agents have what they need to protect themselves and the citizens of this country, and that they are trained to properly use and properly deploy that equipment in the right times and places.

Privacy is tremendously important. I believe the American people, and all people, should be skeptical of government power, should ask hard questions: What is the authority? What is the oversight? That's the way it ought to be.

We in the FBI have created a malware repository and analysis tool known as the Binary Analysis Characterization and Storage System, or BACSS, which provides near real-time investigative information. BACSS helps us link malware in different jurisdictions and paint a picture of cyber threats worldwide.

My wife Patrice, in addition to being enormously supportive, has taught me a lot about life. She might argue it's because I have so much to learn. One of the most important things I've learned is the art of listening.

The benefits of our increasingly digital lives have been accompanied by new dangers, and we have been forced to consider how criminals and terrorists might use advances in technology to their advantage.