So what kind of notifications is the IT security team required to make before deploying these tools, and what is the purpose of the notifications?
What has been done to mitigate the potential damage to people whose files were compromised?
You've been very upfront about trying to root out some of the bribery and corruption involved in the agency.
I know that you've opened up an investigation into the FBI's handling of the Clinton email case.
I think it was reported that you were only trying to look at the FBI.
So what tools can Congress provide that could aid in preventing some of these improper payments?
Well, we want to work with you on that because this is important. I want the border secured.
But why would you--I mean, to me, it is not a question of--I mean, if you have an infant that is born alive, I mean, we ...
If there is something that you don't like as a policymaker, cigarettes, let's say, and you tax it, you will get less peo...
I think that by not answering the question, I think you have answered it, which is effectively, under your testimony, yo...
The American people deserve to know where candidates for President stand on something so foundationally intrinsic to the...