James Comey
James Comey
James Brien "Jim" Comey, Jr.is an American lawyer. Comey is the current Director of the Federal Bureau of Investigation...
NationalityAmerican
ProfessionPublic Servant
Date of Birth14 December 1960
CountryUnited States of America
against boston distinct extremists homegrown marathon motives particular present remains remind share states terrorist threat typical united violent
The Boston Marathon bombings in April 2013 remind us that the terrorist threat against the United States remains persistent. The threat from homegrown violent extremists is of particular concern. These individuals present unique challenges because they do not share a typical profile; their experiences and motives are often distinct and personal.
advances benefits consider criminals lives might technology terrorists
The benefits of our increasingly digital lives have been accompanied by new dangers, and we have been forced to consider how criminals and terrorists might use advances in technology to their advantage.
ages allowed assess conduct either homeland horizontal identify internet social spot states terrorists travel united vulnerable widespread
Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States - spot, assess, recruit, and radicalize - either to travel or to conduct a homeland attack.
both homeland message persistent technology terrorist whether widespread
As technology advances, so too does terrorists' use of technology to communicate - both to inspire and recruit. The widespread use of technology propagates the persistent terrorist message to attack U.S. interests, whether in the homeland or abroad.
communication critical groups terror
As a communication medium, social media is a critical tool for terror groups to exploit.
covered criminals including lives spies terrorists therefore utterly
As all of our lives become digital, the logic of encryption is all of our lives will be covered by strong encryption, and therefore all of our lives - including the lives of criminals and terrorists and spies - will be in a place that is utterly unavailable to court-ordered process. And that, I think, to a democracy should be very, very concerning.
actively adept carry counter criminals current emerging enable enhance exploiting fbi law mask national range terrorists training wide
Terrorists and criminals are increasingly adept at exploiting cutting-edge technologies to carry out or to mask their crimes. To counter current and emerging threats, the FBI actively deploys a wide range of technology-based tools, capabilities, and training that enable and enhance intelligence, national security, and law enforcement operations.
became focused guess integrated knew league park player second sure teach teammates white year
In 1983, my second year of law school, I became the only white player in the Ogden Park Basketball League at 65th and Racine. My teammates joked that I integrated the league, which I guess is true. They weren't so much focused on integration as on winning, and they knew you can't teach height. 'He can't jump, but he sure is tall.'
asked attorney bed call convinced family fbi general morning night sleep truth willing
The attorney general called and asked me if I was willing to be interviewed for FBI director. And the truth is I told him I didn't think so, that I thought it was too much for my family. But that I would sleep on it and call him back in the morning. And so I went to bed that night convinced I was going to call him back and say no.
changing combat developing efforts emphasis engaged evolve fbi focused government inside internal myriad operate outside retaining sharing threat
The FBI is engaged in a myriad of efforts to combat cyber threats, from efforts focused on threat identification and sharing inside and outside of government, to our internal emphasis on developing and retaining new talent and changing the way we operate to evolve with the cyber threat.
address agencies agent both built coordinate cyber executive expertise fbi force home homeland joint military national serves task threat
The FBI has built up substantial expertise to address cyber threats, both in the homeland and overseas. Here at home, the FBI serves as the executive agent for the National Cyber Investigative Joint Task Force (NCIJTF), which joins together 19 intelligence, law enforcement, and military agencies to coordinate cyber threat investigations.
act address challenges continues fbi help high law order public rates tribal tribes unique work
The FBI continues to work with tribes through the Tribal Law and Order Act of 2010 to help tribal governments better address the unique public safety challenges and disproportionately high rates of violence and victimization in many tribal communities.
sort view
I view this as sort of a model,
applies court criminal judge obtain order power regular
That's a power that regular criminal investigators have had for hundreds of years. It now applies to counterterrorism investigators. They have to go to a judge and get a court order to obtain the records.