In our counterterrorism cases and our counterintelligence cases, we can issue all kinds of - of layers of approval in the FBI, a national security letter to find out the subscriber to a particular telephone number and to find out what numbers that telephone number was in contact with. Not the content of those communications, but just the connection.
James ComeyIn my view, a huge portion of WikiLeaks's activities has nothing to do with legitimate newsgathering, informing the public, commenting on important public controversies, but is simply about releasing classified information to damage the United States of America.
James ComeyWe all love privacy. We all care about public safety. And none of - at least people that I hang around with, none of us want back doors. We don't want access to devices built-in in some way.
James ComeyThe lawyers doing the sorting for Secretary Clinton in 2014 did not individually read the content of all of her e-mails, as we did for those available to us; instead, they relied on header information and used search terms to try to find all work-related e-mails among the reportedly more than 60,000 total e-mails remaining on Secretary Clintonโs personal system in 2014.
James ComeyI care a lot about privacy. I also care an awful lot about public safety. There continues to be a huge collision between those two things we care about.
James ComeyWe did not find direct evidence that Secretary Clintonโs personal e-mail domain, in its various configurations since 2009, was successfully hacked. But, given the nature of the system and of the actors potentially involved, we assess that we would be unlikely to see such direct evidence.
James Comey