James Comey
James Comey
James Brien "Jim" Comey, Jr.is an American lawyer. Comey is the current Director of the Federal Bureau of Investigation...
NationalityAmerican
ProfessionPublic Servant
Date of Birth14 December 1960
CountryUnited States of America
both homeland message persistent technology terrorist whether widespread
As technology advances, so too does terrorists' use of technology to communicate - both to inspire and recruit. The widespread use of technology propagates the persistent terrorist message to attack U.S. interests, whether in the homeland or abroad.
actively adept carry counter criminals current emerging enable enhance exploiting fbi law mask national range terrorists training wide
Terrorists and criminals are increasingly adept at exploiting cutting-edge technologies to carry out or to mask their crimes. To counter current and emerging threats, the FBI actively deploys a wide range of technology-based tools, capabilities, and training that enable and enhance intelligence, national security, and law enforcement operations.
ages allowed assess conduct either homeland horizontal identify internet social spot states terrorists travel united vulnerable widespread
Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States - spot, assess, recruit, and radicalize - either to travel or to conduct a homeland attack.
against boston distinct extremists homegrown marathon motives particular present remains remind share states terrorist threat typical united violent
The Boston Marathon bombings in April 2013 remind us that the terrorist threat against the United States remains persistent. The threat from homegrown violent extremists is of particular concern. These individuals present unique challenges because they do not share a typical profile; their experiences and motives are often distinct and personal.
advances benefits consider criminals lives might technology terrorists
The benefits of our increasingly digital lives have been accompanied by new dangers, and we have been forced to consider how criminals and terrorists might use advances in technology to their advantage.
covered criminals including lives spies terrorists therefore utterly
As all of our lives become digital, the logic of encryption is all of our lives will be covered by strong encryption, and therefore all of our lives - including the lives of criminals and terrorists and spies - will be in a place that is utterly unavailable to court-ordered process. And that, I think, to a democracy should be very, very concerning.
accomplish both collective combining cross fbi intelligence nation national partners resources threats
To accomplish its mission, the FBI relies heavily upon its law enforcement and intelligence partners around the nation and around the globe. By combining our resources and our collective expertise, we are able to investigate national security threats that cross both geographical and jurisdictional boundaries.
describe drive horrific levels people prosecutor truth violent virginia white worked
When I worked as a prosecutor in Richmond, Virginia in the 1990s, that city, like so much of America, was experiencing horrific levels of violent crime. But to describe it that way obscures an important truth: for the most part, white people weren't dying; black people were dying. Most white people could drive around the problem.
allow changing communication designed forms intercept lawful quickly technology
Unfortunately, changing forms of Internet communication are quickly outpacing laws and technology designed to allow for the lawful intercept of communication content.
knocking life looking open opened sends stranger
When someone sends you an email, they are knocking on your door. And when you open the attachment, without looking through the peephole to see who it is, you just opened the door and let a stranger into your life, where everything you care about is.
address companies cyber key knowledge player possess primary private sector victims
The private sector is the key player in cyber security. Private sector companies are the primary victims of cyber intrusions. And they also possess the information, the expertise, and the knowledge to address cyber intrusions and cyber crime in general.
activity criminal dragged government
Was he dragged into criminal activity to which he was not predisposed, by a government overbearing his will?
alive august kicking until
was alive and kicking up until August 2004.
family inherited legacy office picture police pop reminding wall william
I come from a law enforcement family. My grandfather, William J. Comey, was a police officer. Pop Comey is one of my heroes. I have a picture of him on my wall in my office at the FBI, reminding me of the legacy I've inherited and that I must honor.