In our counterterrorism cases and our counterintelligence cases, we can issue all kinds of - of layers of approval in the FBI, a national security letter to find out the subscriber to a particular telephone number and to find out what numbers that telephone number was in contact with. Not the content of those communications, but just the connection.
James ComeyThere are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese.
James ComeySometimes the FBI is assigned to do background checks on people who are coming into government in the executive office of the president. Other times, not. A lot of times there are people who are arriving with clearances that already exist.
James ComeyWe did not find direct evidence that Secretary Clintonโs personal e-mail domain, in its various configurations since 2009, was successfully hacked. But, given the nature of the system and of the actors potentially involved, we assess that we would be unlikely to see such direct evidence.
James ComeyHalf of the devices that we encounter in terrorism cases, in counterintelligence cases, in gang cases, in child pornography cases, cannot be opened with any technique. That is a big problem. And so the shadow continues to fall.
James ComeyThere is evidence that Democrates were extremely careless in their handling of very sensitive, highly classified information.
James ComeyIt is a little bit difficult to talk about things that do involve classified matters in public. But I think the public needs to know that there are multiple oversight layers, including the FISA Court, congressional oversight, internal oversight within the FBI and intelligence community, that protects Americans from - under - their - their privacy rights while targeting terrorists and people who are trying to kill us.
James Comey