- Warren Buffet
- Abraham Lincoln
- Charlie Chaplin
- Mary Anne Radmacher
- Alice Walker
- Albert Einstein
- Steve Martin
- Mark Twain
- Michel Montaigne
- Voltaire
Find one of the best and famous quote catagorized into topics like inspirational, motivations, deep, thoughtful, art, success, passion, frindship, life, love and many more.
Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States - spot, assess, recruit, and radicalize - either to travel or to conduct a homeland attack.
James Comey
The threat that ISIL presents and poses to the United States is very different in kind, in type and degree than al Qaeda.
I was a high school senior and home alone one night with my younger brother. And a guy - gunman - kicked in our front door at our home in New Jersey and held the two of us captive. We escaped. He caught us again. We escaped again. So, a pretty horrific experience.
The FBI has built up substantial expertise to address cyber threats, both in the homeland and overseas. Here at home, the FBI serves as the executive agent for the National Cyber Investigative Joint Task Force (NCIJTF), which joins together 19 intelligence, law enforcement, and military agencies to coordinate cyber threat investigations.
Unfortunately, changing forms of Internet communication are quickly outpacing laws and technology designed to allow for the lawful intercept of communication content.
I'm a big fan of the rule of law.
ISIL's widespread reach through the Internet and social media is most concerning, as the group has proven dangerously competent at employing such tools for its nefarious strategy. ISIL uses high-quality, traditional media platforms as well as widespread social media campaigns to propagate its extremist ideology.
The notion that we would market devices that would allow someone to place themselves beyond the law troubles me a lot.
The private sector is the key player in cyber security. Private sector companies are the primary victims of cyber intrusions. And they also possess the information, the expertise, and the knowledge to address cyber intrusions and cyber crime in general.
We have perpetrated a myth in our society that being brave means not being afraid, but that's wrong.
I come from a law enforcement family. My grandfather, William J. Comey, was a police officer. Pop Comey is one of my heroes. I have a picture of him on my wall in my office at the FBI, reminding me of the legacy I've inherited and that I must honor.
Cisco projects that in 2020, now just five years away, there will be seven billion people on the earth and 50 billion devices connected to the Internet. Six-and-a-half devices on average per person. As a father of five young adults and teenagers, I think we are - in my household, we've exceeded the 6.5 number.
There is no such thing as absolute privacy in America.
We face two overlapping challenges. The first concerns real-time court-ordered interception of what we call 'data in motion,' such as phone calls, e-mail, and live chat sessions. The second challenge concerns court-ordered access to data stored on our devices, such as e-mail, text messages, photos, and videos - or what we call 'data at rest.'
I love strong encryption. It protects us in so many ways from bad people. But it takes us to a place - absolute privacy - that we have not been to before.
There's a perception that police are less likely to do the marginal additional policing that suppresses crime: the getting out of your car at 2 in the morning and saying to a group of guys, 'What are you doing here?'
The people of the FBI sacrifice much for their country, and I am proud to lead this organization of dedicated agents, analysts, and professional staff.
I was born into an Irish Catholic family in the New York area in this great, wonderful, and safe country, but the Holocaust has always haunted me, and it has long stood as a stumbling block to faith. How could such a thing be? How is that consistent with the concept of a loving God?
As technology advances, so too does terrorists' use of technology to communicate - both to inspire and recruit. The widespread use of technology propagates the persistent terrorist message to attack U.S. interests, whether in the homeland or abroad.
Not all of the Islamic State killers are going to die on the battlefield.
Serious debates are taking place about how law enforcement personnel relate to the communities they serve, about the appropriate use of force.
The promise I've tried to honor my entire career, that the rule of law and the design of the founders, right, the oversight of courts and the oversight of Congress will be at the heart of what the FBI does.
Senator Schumer is a partisan.
AOL had a very strong motive to create the appearance of high revenues for PurchasePro because the value of the warrants AOL had received in the deal depended on PurchasePro's performance.