Our need for public safety and our need for privacy are crashing into each other and we've got to sort that out.
James ComeySecretary Hillary Clinton used several different servers and administrators of those servers during her four years at the State Department. She also used numerous mobile devices to send and to read email on that personal domain.
James ComeyWe do assess that hostile actors gained access to the private commercial email accounts of people with whom Secretary Hillary Clinton was in regular contact from her personal account.
James ComeyIn my view, a huge portion of WikiLeaks's activities has nothing to do with legitimate newsgathering, informing the public, commenting on important public controversies, but is simply about releasing classified information to damage the United States of America.
James ComeyThe lawyers doing the sorting for Secretary Clinton in 2014 did not individually read the content of all of her e-mails, as we did for those available to us; instead, they relied on header information and used search terms to try to find all work-related e-mails among the reportedly more than 60,000 total e-mails remaining on Secretary Clintonโs personal system in 2014.
James ComeyThere is evidence that Democrates were extremely careless in their handling of very sensitive, highly classified information.
James ComeyThere are two things that matter in a criminal investigation of a subject.What did the person do, and when they did that thing, what were they thinking? When you look at the hundred-years-plus of the Justice Department investigation and prosecution of mishandling of classified information, those two questions are obviously present.
James ComeyThe Obama administration was not in a position where they were seeking legislation. I don't know yet how President Trump intends to approach this. I know he spoke about it during the campaign. I know he cares about it, but it's premature for me to say.
James ComeyWe did not find direct evidence that Secretary Clintonโs personal e-mail domain, in its various configurations since 2009, was successfully hacked. But, given the nature of the system and of the actors potentially involved, we assess that we would be unlikely to see such direct evidence.
James ComeyOur investigation looked at whether there is evidence classified information was improperly stored or transmitted on that personal system, in violation of a federal statute making it a felony to mishandle classified information either intentionally or in a grossly negligent way, or a second statute making it a misdemeanor to knowingly remove classified information from appropriate systems or storage facilities.
James ComeyThe Clinton investigation was a completed investigation that the FBI had been deeply involved in, so I had an opportunity to understand all the facts and apply those facts against the law as I understood them. This investigation was under way - still going when I was fired. So it's nowhere near in the same place.
James ComeyThere are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese.
James ComeyWhat we want to work with manufacturers on is to figure out how can we accommodate both interests in a sensible way? How can we optimize the privacy, security features of their devices and allow court orders to be complied with?
James ComeyI don't know enough about the legislation , but I think the more information you can put in the hands of the people who are vetting, people who are going to be near children, the better.
James ComeyHalf of the devices that we encounter in terrorism cases, in counterintelligence cases, in gang cases, in child pornography cases, cannot be opened with any technique. That is a big problem. And so the shadow continues to fall.
James ComeyOur process inside the United States government has gotten much better at making sure we touch all possible source of information about a refugee. The interview process has gotten more robust, so we've gotten our act together in that respect. The challenge remains, especially with respect to folks coming from Syria, we're unlikely to have anything in our holdings. That is, with people coming from Iraq, the United States government was there for a very long period of time. We had biometrics, we had source information. We're unlikely to have that kind of picture about someone coming from Syria.
James ComeyWe're conducting an investigation to understand whether there was any coordination between the Russian efforts and anybody associated with the Trump campaign.
James ComeySometimes the FBI is assigned to do background checks on people who are coming into government in the executive office of the president. Other times, not. A lot of times there are people who are arriving with clearances that already exist.
James ComeyThe more able we are to keep guns out the hand so criminals and spouse abusers all - the better. So the more information we have the better for law enforcement perspective.
James ComeyWhat we do is we combine information collected from any lawful source in a single FBI database so we don't miss a dot when we're conducting investigations in the United States. What we make sure of, though, is nobody gets to see FISA information of any kind unless they've had the appropriate training and have the appropriate oversight.
James ComeyOnly a very small number of the e-mails containing classified information bore markings indicating the presence of classified information. But even if information is not marked 'classified' in an e-mail, participants who know or should know that the subject matter is classified are still obligated to protect it.
James ComeyI shouldn't talk about individuals in an open forum, at least without thinking about it better.
James ComeyWe all love privacy. We all care about public safety. And none of - at least people that I hang around with, none of us want back doors. We don't want access to devices built-in in some way.
James ComeyIt is a little bit difficult to talk about things that do involve classified matters in public. But I think the public needs to know that there are multiple oversight layers, including the FISA Court, congressional oversight, internal oversight within the FBI and intelligence community, that protects Americans from - under - their - their privacy rights while targeting terrorists and people who are trying to kill us.
James ComeyReally bad people around the world, because of the genius of American innovation, use our products and infrastructure for their emails, for their communications.
James ComeyI believe that Americans should be deeply skeptical of government power. You cannot trust people in power. The founders knew that. That's why they divided power among three branches, to set interest against interest.
James ComeyOur focus is and should be on the leakers, not those that are obtaining it as part of legitimate newsgathering.
James ComeyI care a lot about privacy. I also care an awful lot about public safety. There continues to be a huge collision between those two things we care about.
James ComeyShe [Hillary Clinton] used her personal email extensively while outside the United States, including sending and receiving work-related emails in the territory of sophisticated adversaries.
James ComeyThe FBI also discovered several thousand work-related e-mails that were not in the group of 30,000 that were returned by Secretary Clinton to State in 2014... I should add here that we found no evidence that any of the additional work-related e-mails were intentionally deleted in an effort to conceal them.
James ComeyIn our counterterrorism cases and our counterintelligence cases, we can issue all kinds of - of layers of approval in the FBI, a national security letter to find out the subscriber to a particular telephone number and to find out what numbers that telephone number was in contact with. Not the content of those communications, but just the connection.
James Comey