In our counterterrorism cases and our counterintelligence cases, we can issue all kinds of - of layers of approval in the FBI, a national security letter to find out the subscriber to a particular telephone number and to find out what numbers that telephone number was in contact with. Not the content of those communications, but just the connection.
James ComeyWe did not find direct evidence that Secretary Clintonโs personal e-mail domain, in its various configurations since 2009, was successfully hacked. But, given the nature of the system and of the actors potentially involved, we assess that we would be unlikely to see such direct evidence.
James ComeyOur need for public safety and our need for privacy are crashing into each other and we've got to sort that out.
James Comey