James Comey
James Comey
James Brien "Jim" Comey, Jr.is an American lawyer. Comey is the current Director of the Federal Bureau of Investigation...
NationalityAmerican
ProfessionPublic Servant
Date of Birth14 December 1960
CountryUnited States of America
faces malicious states threats united
The fact of the matter is that the United States faces real threats from criminals, terrorists, spies, and malicious cyber actors.
al poses states threat type united
The threat that ISIL presents and poses to the United States is very different in kind, in type and degree than al Qaeda. ISIL is not your parents' al Qaeda. It's a very different model.
ages allowed assess conduct either homeland horizontal identify internet social spot states terrorists travel united vulnerable widespread
Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States - spot, assess, recruit, and radicalize - either to travel or to conduct a homeland attack.
against boston distinct extremists homegrown marathon motives particular present remains remind share states terrorist threat typical united violent
The Boston Marathon bombings in April 2013 remind us that the terrorist threat against the United States remains persistent. The threat from homegrown violent extremists is of particular concern. These individuals present unique challenges because they do not share a typical profile; their experiences and motives are often distinct and personal.
affected although becomes conducting electoral fbi federal impartial individual interests involved paramount primary responsibility states
Although individual states have primary responsibility for conducting fair and impartial elections, the FBI becomes involved when paramount federal interests are affected or electoral abuse occurs.
against attack entertainment event fbi pictures scope sony states united
The destructive malware attack against Sony Pictures Entertainment (SPE) in late 2014 was an unprecedented cyber event for the United States in its scope, destructiveness, and economic implications. The FBI responded to this attack with an investigation that was groundbreaking in its scope and collaboration.
accomplish both collective combining cross fbi intelligence nation national partners resources threats
To accomplish its mission, the FBI relies heavily upon its law enforcement and intelligence partners around the nation and around the globe. By combining our resources and our collective expertise, we are able to investigate national security threats that cross both geographical and jurisdictional boundaries.
both homeland message persistent technology terrorist whether widespread
As technology advances, so too does terrorists' use of technology to communicate - both to inspire and recruit. The widespread use of technology propagates the persistent terrorist message to attack U.S. interests, whether in the homeland or abroad.
describe drive horrific levels people prosecutor truth violent virginia white worked
When I worked as a prosecutor in Richmond, Virginia in the 1990s, that city, like so much of America, was experiencing horrific levels of violent crime. But to describe it that way obscures an important truth: for the most part, white people weren't dying; black people were dying. Most white people could drive around the problem.
allow changing communication designed forms intercept lawful quickly technology
Unfortunately, changing forms of Internet communication are quickly outpacing laws and technology designed to allow for the lawful intercept of communication content.
knocking life looking open opened sends stranger
When someone sends you an email, they are knocking on your door. And when you open the attachment, without looking through the peephole to see who it is, you just opened the door and let a stranger into your life, where everything you care about is.
address companies cyber key knowledge player possess primary private sector victims
The private sector is the key player in cyber security. Private sector companies are the primary victims of cyber intrusions. And they also possess the information, the expertise, and the knowledge to address cyber intrusions and cyber crime in general.
activity criminal dragged government
Was he dragged into criminal activity to which he was not predisposed, by a government overbearing his will?
alive august kicking until
was alive and kicking up until August 2004.