To accomplish its mission, the FBI relies heavily upon its law enforcement and intelligence partners around the nation and around the globe. By combining our resources and our collective expertise, we are able to investigate national security threats that cross both geographical and jurisdictional boundaries.
The FBI continues to work with tribes through the Tribal Law and Order Act of 2010 to help tribal governments better address the unique public safety challenges and disproportionately high rates of violence and victimization in many tribal communities.
ISIL's widespread reach through the Internet and social media is most concerning, as the group has proven dangerously competent at employing such tools for its nefarious strategy. ISIL uses high-quality, traditional media platforms as well as widespread social media campaigns to propagate its extremist ideology.
An element of virtually every national security threat and crime problem the FBI faces is cyber-based or facilitated. We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists.
The FBI is engaged in a myriad of efforts to combat cyber threats, from efforts focused on threat identification and sharing inside and outside of government, to our internal emphasis on developing and retaining new talent and changing the way we operate to evolve with the cyber threat.
Although individual states have primary responsibility for conducting fair and impartial elections, the FBI becomes involved when paramount federal interests are affected or electoral abuse occurs.
Only a crazy person wouldn't fear approaching a car with tinted windows during a late-night car stop, or pounding up a flight of stairs to execute a search warrant, or fast-roping from a helicopter down into hostile fire. Real agents, like real people, feel that fear in the pit of their stomachs.
What makes the bravery of the men and women of the FBI so special is that they know exactly what they're in for. They spend weeks and weeks in an academy learning just how hard and dangerous this work is. Then they raise their right hands and take an oath and do that work anyway.
I was a high school senior and home alone one night with my younger brother. And a guy - gunman - kicked in our front door at our home in New Jersey and held the two of us captive. We escaped. He caught us again. We escaped again. So, a pretty horrific experience.
There are two things that matter in a criminal investigation of a subject.What did the person do, and when they did that thing, what were they thinking? When you look at the hundred-years-plus of the Justice Department investigation and prosecution of mishandling of classified information, those two questions are obviously present.Collection: Thinking
The FBI also discovered several thousand work-related e-mails that were not in the group of 30,000 that were returned by Secretary Clinton to State in 2014... I should add here that we found no evidence that any of the additional work-related e-mails were intentionally deleted in an effort to conceal them.Collection: Effort
In their minds, the murderers and accomplices of Germany, and Poland, and Hungary, and so many, many other places didn't do something evil. They convinced themselves it was the right thing to do, the thing they had to do. That's what people do. And that should truly frighten us.Collection: People
We have no basis to conclude she [Hillary Clinton] lied to the FBI.Collection: Lied
Only a very small number of the e-mails containing classified information bore markings indicating the presence of classified information. But even if information is not marked 'classified' in an e-mail, participants who know or should know that the subject matter is classified are still obligated to protect it.Collection: Numbers
There is evidence that Democrates were extremely careless in their handling of very sensitive, highly classified information.Collection: Information
Really bad people around the world, because of the genius of American innovation, use our products and infrastructure for their emails, for their communications.Collection: Communication
Our focus is and should be on the leakers, not those that are obtaining it as part of legitimate newsgathering.Collection: Focus
I'm in the business where I can't ever say there's no risk associated with someone.Collection: Risk
Our process inside the United States government has gotten much better at making sure we touch all possible source of information about a refugee. The interview process has gotten more robust, so we've gotten our act together in that respect. The challenge remains, especially with respect to folks coming from Syria, we're unlikely to have anything in our holdings. That is, with people coming from Iraq, the United States government was there for a very long period of time. We had biometrics, we had source information. We're unlikely to have that kind of picture about someone coming from Syria.Collection: Government
In my view, a huge portion of WikiLeaks's activities has nothing to do with legitimate newsgathering, informing the public, commenting on important public controversies, but is simply about releasing classified information to damage the United States of America.Collection: Important
The more able we are to keep guns out the hand so criminals and spouse abusers all - the better. So the more information we have the better for law enforcement perspective.Collection: Gun
I shouldn't talk about individuals in an open forum, at least without thinking about it better.Collection: Thinking
We did not find direct evidence that Secretary Clinton’s personal e-mail domain, in its various configurations since 2009, was successfully hacked. But, given the nature of the system and of the actors potentially involved, we assess that we would be unlikely to see such direct evidence.Collection: Would Be
Our need for public safety and our need for privacy are crashing into each other and we've got to sort that out.Collection: Safety
I care a lot about privacy. I also care an awful lot about public safety. There continues to be a huge collision between those two things we care about.Collection: Safety
We're conducting an investigation to understand whether there was any coordination between the Russian efforts and anybody associated with the Trump campaign.Collection: Effort
WikiLeaks is a important focus of our attention.Collection: Focus
We do assess that hostile actors gained access to the private commercial email accounts of people with whom Secretary Hillary Clinton was in regular contact from her personal account.Collection: People
Secretary Hillary Clinton used several different servers and administrators of those servers during her four years at the State Department. She also used numerous mobile devices to send and to read email on that personal domain.Collection: Years
She [Hillary Clinton] used her personal email extensively while outside the United States, including sending and receiving work-related emails in the territory of sophisticated adversaries.Collection: Receiving
Our investigation looked at whether there is evidence classified information was improperly stored or transmitted on that personal system, in violation of a federal statute making it a felony to mishandle classified information either intentionally or in a grossly negligent way, or a second statute making it a misdemeanor to knowingly remove classified information from appropriate systems or storage facilities.Collection: Information
The lawyers doing the sorting for Secretary Clinton in 2014 did not individually read the content of all of her e-mails, as we did for those available to us; instead, they relied on header information and used search terms to try to find all work-related e-mails among the reportedly more than 60,000 total e-mails remaining on Secretary Clinton’s personal system in 2014.Collection: Trying
The Clinton investigation was a completed investigation that the FBI had been deeply involved in, so I had an opportunity to understand all the facts and apply those facts against the law as I understood them. This investigation was under way - still going when I was fired. So it's nowhere near in the same place.Collection: Opportunity
In our counterterrorism cases and our counterintelligence cases, we can issue all kinds of - of layers of approval in the FBI, a national security letter to find out the subscriber to a particular telephone number and to find out what numbers that telephone number was in contact with. Not the content of those communications, but just the connection.Collection: Communication
It is a little bit difficult to talk about things that do involve classified matters in public. But I think the public needs to know that there are multiple oversight layers, including the FISA Court, congressional oversight, internal oversight within the FBI and intelligence community, that protects Americans from - under - their - their privacy rights while targeting terrorists and people who are trying to kill us.Collection: Thinking
What we want to work with manufacturers on is to figure out how can we accommodate both interests in a sensible way? How can we optimize the privacy, security features of their devices and allow court orders to be complied with?Collection: Privacy
We all love privacy. We all care about public safety. And none of - at least people that I hang around with, none of us want back doors. We don't want access to devices built-in in some way.Collection: People
I don't know enough about the legislation , but I think the more information you can put in the hands of the people who are vetting, people who are going to be near children, the better.Collection: Children
What we do is we combine information collected from any lawful source in a single FBI database so we don't miss a dot when we're conducting investigations in the United States. What we make sure of, though, is nobody gets to see FISA information of any kind unless they've had the appropriate training and have the appropriate oversight.Collection: Missing
The Obama administration was not in a position where they were seeking legislation. I don't know yet how President Trump intends to approach this. I know he spoke about it during the campaign. I know he cares about it, but it's premature for me to say.Collection: President
Half of the devices that we encounter in terrorism cases, in counterintelligence cases, in gang cases, in child pornography cases, cannot be opened with any technique. That is a big problem. And so the shadow continues to fall.Collection: Children
Sometimes the FBI is assigned to do background checks on people who are coming into government in the executive office of the president. Other times, not. A lot of times there are people who are arriving with clearances that already exist.Collection: People
If conduct is intentional, it could subject some of the criminal liability.Collection: Liability