In our counterterrorism cases and our counterintelligence cases, we can issue all kinds of - of layers of approval in the FBI, a national security letter to find out the subscriber to a particular telephone number and to find out what numbers that telephone number was in contact with. Not the content of those communications, but just the connection.
James ComeySecretary Hillary Clinton used several different servers and administrators of those servers during her four years at the State Department. She also used numerous mobile devices to send and to read email on that personal domain.
James ComeyThere are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese.
James ComeyI believe that Americans should be deeply skeptical of government power. You cannot trust people in power. The founders knew that. That's why they divided power among three branches, to set interest against interest.
James ComeyI shouldn't talk about individuals in an open forum, at least without thinking about it better.
James ComeyOur focus is and should be on the leakers, not those that are obtaining it as part of legitimate newsgathering.
James ComeyOnly a very small number of the e-mails containing classified information bore markings indicating the presence of classified information. But even if information is not marked 'classified' in an e-mail, participants who know or should know that the subject matter is classified are still obligated to protect it.
James Comey