A Quote by James Comey

The diverse threats we face are increasingly cyber-based. Much of America's most sensitive data is stored on computers. We are losing data, money, and ideas through cyber intrusions. This threatens innovation and, as citizens, we are also increasingly vulnerable to losing our personal information.
The private sector is the key player in cyber security. Private sector companies are the primary victims of cyber intrusions. And they also possess the information, the expertise, and the knowledge to address cyber intrusions and cyber crime in general.
An element of virtually every national security threat and crime problem the FBI faces is cyber-based or facilitated. We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists.
The U.S. has the most advanced cyber-weaponry on the planet, and t if you look at the U.S. from the perspective of the Chinese People's Liberation Army, which runs most of its cyber activities, they look at you and they see Google and Facebook - the two largest depositories of personal data in the world - and they see the reach of the National Security Agency, which has huge digital capacity to know what is going on around the world. So the Chinese would see cyber as an un-level playing field, because the U.S. holds all sorts of advantages.
Development of a framework for the reporting of cyber incidents between government and industry is considered a priority. This includes the government sharing information with industry and, where possible, providing the research community with cyber-security event data.
More organizations than ever are conducting business online. An expanding digital footprint and increasingly sophisticated cyber attacks have created a growing urgency to secure that data and the resources organizations are deploying.
My view is that the cyber threat is bigger than any one government agency - or even the government itself. But the FBI brings a rare combination of scope and scale, experience, and tools to the mix. We investigate criminal activity like intrusions and cyber attacks, but we also investigate national security threats like foreign influence.
We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas - things of incredible value to all of us. They seek to strike our critical infrastructure and to harm our economy.
The issue is we're losing leverage. Governments are increasingly getting more power and we are increasingly losing our ability to control that power, and even to be aware of that power.
Data isn't information. ... Information, unlike data, is useful. While there's a gulf between data and information, there's a wide ocean between information and knowledge. What turns the gears in our brains isn't information, but ideas, inventions, and inspiration. Knowledge-not information-implies understanding. And beyond knowledge lies what we should be seeking: wisdom.
It ends a 40-year ban on exporting U.S. oil. It's changed - it's included in its cyber-security legislation - that says to private companies, hey, if you share with us your data on your cyber-attacks, your potential cyber-attacks, we'll give you liability protection. And they authorized a health care program for 9/11 responders for 75 years to cover the length of their lifespans.
Intuition becomes increasingly valuable in the new information society precisely because there is so much data.
As we become so visible in the digital world and leave an endless trail of data behind us, exactly who has our data and what they do with it becomes increasingly important.
As we all become increasingly reliant on social networking websites and new technologies to stay connected, it's important to remain cognizant of how private personal information and data is handled.
Eventually, we need to have computers that work differently from the way they do today and have for the past 60-plus years. We're capturing and generating increasingly massive amounts of data, but we can't make computers that keep up with it. One of the most promising solutions is to make computers that work more the way brains work.
Some of the greatest national security threats we face cannot be defeated or defended by traditional military hardware, but only by greatly enhanced cyberspace warfare, including both offensive cyber-warfare and cyber-security.
Radio astronomy reflects our fascination with how audio can be used to understand information or ideas. Just as scientists visualize data through charts and pictures, we can use 'data sonification' to translate radio signals into sound that help us better understand some of our most enigmatic planetary systems.
This site uses cookies to ensure you get the best experience. More info...
Got it!