A Quote by Christopher A. Wray

Our adversaries - terrorists, foreign intelligence services, and criminals - take advantage of modern technology to hide their communications; recruit followers; and plan, conduct, and encourage espionage, cyber attacks, or terrorism to disperse information on different methods to attack the U.S. homeland and to facilitate other illegal activities.
Cyber criminals often operate through online forums, selling illicit goods and services, including tools that lower the barrier to entry for aspiring criminals and that can be used to facilitate malicious cyber activity.
As technology advances, so too does terrorists' use of technology to communicate - both to inspire and recruit. The widespread use of technology propagates the persistent terrorist message to attack U.S. interests, whether in the homeland or abroad.
ISIS uses traditional media platforms as well as widespread social media campaigns to propagate its ideology. With the broad distribution of social media, terrorists can spot, assess, recruit, and radicalize vulnerable persons of all ages in the U.S. either to travel to foreign lands or to conduct an attack on the homeland.
In terms of my conversations with [Vladimir] Putin, these are conversations that took place before the election. As I indicated, there has been very clear proof that they have engaged in cyber attacks. This isn't new. It's not unique to Russia. There are a number of states where we've seen low-level cyber attacks and industrial espionage and, you know, other behavior that we think should be out of bounds.
Cyber terrorists are no different from other terrorists: No matter where they hide, we will track them down and seek to bring them to the United States to face justice.
Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States - spot, assess, recruit, and radicalize - either to travel or to conduct a homeland attack.
The original PATRIOT Act greatly increased our nation's ability to share intelligence information, made better use of technology, and provided terrorism investigators tools that have long been available in cases involving illegal drugs and organized crime.
I'm trying to fight the terrorism that's actually causing the other forms of terrorism. You know, the root cause of terrorism is the stuff that the U.S. government allows to happen, and the foreign policies that we have in place in different countries that inspire people to become terrorists. And it's easy for us because it's just some oil.
The attack on the law firms and attacks like that are industrial espionage, searching for copyrighted materials to lift and so on; it's not quite the same as cyber-warfare. They are regarded as related. The Chinese are trying to steal an economic march on the West, which is a consequence of the fact that we outsourced all of our manufacturing to China in the 1990s.
In my fight against terrorism, to me, the biggest terrorist is Obama in the United States of America. For me, I'm trying to fight the terrorism that's actually causing the other forms of terrorism. The root cause of the terrorism is the stuff that you as a government allow to happen and the foreign policies that we have in place in different countries that inspire people to become terrorists. And it's easy for us because it's really just some oil, which we can really get on our own.
The great challenge facing us today is to learn once again how to talk to one another, not simply how to generate and consume information. The latter is a tendency which our important and influential modern communications media can encourage. Information is important, but it is not enough. All too often things get simplified, different positions and viewpoints are pitted against one another, and people are invited to take sides, rather than to see things as a whole.
I was an Army intelligence agent and a veteran during the Cold War, assigned to West Germany. I was the chairman of the National Commission on Homeland Security and Terrorism for the United States for five years. I was a person who has dealt extensively with these homeland security issues. I was a governor during the 9/11 attack.
Our intelligence agencies will continue to gather information about the intentions of governments - as opposed to ordinary citizens - around the world, in the same way that the intelligence services of every other nation does. We will not apologize simply because our services may be more effective.
U.S. intelligence services routinely use collection methods against foreigners that foreseeably - with certainty - ingest high volumes of U.S. communications as well.
Unlike previous wars, our enemy now is a stateless network of religious extremists. They do not obey the laws of war, they hide among peaceful populations and launch surprise attacks on civilians. They have no armed forces per se, no territory or citizens to defend and no fear of dying during their attacks. Information is our primary weapon against this enemy, and intelligence gathered from captured operatives is perhaps the most effective means of preventing future attacks.
I accept the proposition that there has been a significant improvement in underlying productivity growth in the United States, that it is very closely tied to improvements in information and communications technology, and that it is likely to spread around the world. But I resist the new economy label because it seems to encourage a disrespect for the old rules that could seriously undermine our success in taking advantage of the new opportunities.
This site uses cookies to ensure you get the best experience. More info...
Got it!