Birth: December 14, 1960
The more able we are to keep guns out the hand so criminals and spouse abusers all - the better. So the more information we have the better for law e….
There are two things that matter in a criminal investigation of a subject.What did the person do, and when they did that thing, what were they thinki….
We did not find direct evidence that Secretary Clinton’s personal e-mail domain, in its various configurations since 2009, was successfully hacked. B….
I shouldn't talk about individuals in an open forum, at least without thinking about it better..
She [Hillary Clinton] used her personal email extensively while outside the United States, including sending and receiving work-related emails in the….
The Clinton investigation was a completed investigation that the FBI had been deeply involved in, so I had an opportunity to understand all the facts….
WikiLeaks is a important focus of our attention..
There is evidence that Democrates were extremely careless in their handling of very sensitive, highly classified information..
It is a little bit difficult to talk about things that do involve classified matters in public. But I think the public needs to know that there are m….
The lawyers doing the sorting for Secretary Clinton in 2014 did not individually read the content of all of her e-mails, as we did for those availabl….
Secretary Hillary Clinton used several different servers and administrators of those servers during her four years at the State Department. She also ….
I believe that Americans should be deeply skeptical of government power. You cannot trust people in power. The founders knew that. That's why they di….
Although we did not find clear evidence that Secretary Clinton or her colleagues intended to violate laws governing the handling of classified inform….
We do assess that hostile actors gained access to the private commercial email accounts of people with whom Secretary Hillary Clinton was in regular ….
In our counterterrorism cases and our counterintelligence cases, we can issue all kinds of - of layers of approval in the FBI, a national security le….
Half of the devices that we encounter in terrorism cases, in counterintelligence cases, in gang cases, in child pornography cases, cannot be opened w….
There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese..
Our investigation looked at whether there is evidence classified information was improperly stored or transmitted on that personal system, in violati….
Our process inside the United States government has gotten much better at making sure we touch all possible source of information about a refugee. Th….
Sometimes the FBI is assigned to do background checks on people who are coming into government in the executive office of the president. Other times,….
Only a very small number of the e-mails containing classified information bore markings indicating the presence of classified information. But even i….