Would strongly suggest we move that up and set those dates to the appropriate authorities. Bring it up about 10 days and then see what happens to the situation because host thank you for calling. Bill joins us from new jersey. Line for independents. Go ahead. Caller i have several problems, but the one to address right now is the immigration. Why cant we go back to the days of the 1950s and 1960s when we used to only allow so many people at a time instead of hundreds of thousands that come in here and take our country over . Why cant it just be a few hundred at a time . It that works out, let another few hundred and. This let a fewour people are starving to death and theres nothing we can do. Tax, tax tax to pay for these programs. Host valerie in california. Democratic caller. Immigration, what do you think . Caller i think this last incident with the illegal alien killing the woman in san francisco, its been all pushed over and needs to be addressed in the gun laws. If that gun had not been stored improperly that was a problem. I live in california. I live in a latin society. I love it. This is where i was born and raised. Im ashamed of all the people talking about how we should close our borders. Were going to return the statue of liberty . Host what do you think of the sanctuary city concept . Caller rick perry has tried to be we have sanctuary because this is our culture here. What are we going to do . Start arresting them in arizona because they are mexican or guatemalan . Were not going to do that in california. Host Mexican Foreign minister in this story Mexican Foreign minister makes rare visit to texas to strengthen ties. In a rare visit to texas, the Mexican Foreign minister urged u. S. Politicians to see his country more as friend than foe. U. S. Politicians who u. S. Mexico Security Problems to reap political benefits are reacting to a lot. Asked about trumps remarks, he called them ignorant. Bruce joining us from florida. Go ahead, bruce. Im a policeman in florida. Anytime we took up an illegal and called immigration, they would not come get him. What really bothers me is, when i was growing up, we would run across the river for fish and chips and stick by customs, etc. If i did that today, i would be imprisoned fined the mexicans come across the border and get free room and board until they are sent back come if they are sent back. Host gerald on the line for independents. What are your thoughts . Are you with us . We will move along to alicia in kansas. Line for democrats. Caller im tired of people saying that i was born in texas. Im tired of people saying they are coming over here to take the jobs. There are some good people and bad people. The lady before me said they are taking the jobs over. What jobs . I used to work out picking cotton. I dont understand what jobs. Im tired of people saying they are taking jobs over. Host line for republicans. Go ahead. Caller there is a number of problems that are going on right now. I was born and raised in southern california. I have seen pretty much firsthand the stuff that goes on. The money needs to be cut off. At some point. Theyve waited until its too late to do much about it. They say its in the 20 million Illegal Immigrants that are here. Its more than that. Its not just mexico. Its also other countries. I dont know what they plan on doing about it and the taxpayers are footing the bill. Its out of control. I watch and see whats going on within their collecting a lot of money the numbers of people here on a daily basis on how many billions of dollars a year are being spent on a freebie they are rewarded for coming here illegally. There is no consequences, no prosecution. Its unbelievable to me. Do you have another comment . Thank you for calling. Denver, colorado. Dan joins us on the line for independents. Caller we should id chip all the Illegal Immigrants. And apart them all. Keep the nicelooking women. I sort of feel like Tommy Lee Jones in no country for old men. Host dennis and riverside california. Line for democrats. Caller im a u. S. Citizen and taxpayer at the border. As a chicano, i have faced the reality of our Immigration Enforcement activities. As a u. S. Citizen born in california. Im concerned that when we characterize these children that are coming out of a need to free the conditions that our military interventions and economic exploitation and political has asserted in Central America for over 120 years, im concerned that this provides a platform for people to exert racist rhetoric we are facing with the unaccompanied minors. An issue of basic human right. These children are targeted by gangs, targeted by International Criminal organizations. They often have to do with drug sales. We have a tremendous demand for that in the unites states of america. We are the most wealthy country in the world. These are countries that we have extracted a lot of wealth from. Back in the 1950s, attorneys for the they were able to convince the Eisenhower Administration to exert a lot of covert operations to destabilize democratically elected president s in order to respond to companies. Many decades later, and as weve seen the key militant result of our interventions, including the Reagan Administration who legally illegally we have the cumulative effect. It was george w. Bush who signed the most recent reauthorization of the Human Trafficking bill that provided certain protections, including hearings that these children would be able to be protected. Those are factors that americans should be aware of. Host thank you very much for calling. This from the hill. Trump rights momentum to arizona rides momentum to arizona. Donald trump brings his spotlight to arizona he is joining forces at a rally saturday afternoon with the sheriff and immigration hardliner whose as aliens can expect a free write to jail. Ride to jail. On the outcome of the Homeland Security we will hear from jeh johnson. He spoke earlier this week about Cyber Security efforts including whats being done to address the Government Data breach at opm. This event took place at the center for strategic and international studies. [captioning performed by the national captioning institute, which is responsible for its caption content and accuracy. Visit ncicap. Org] [captions Copyright National cable satellite corp. 2015] at the end of the program today please stay in your seats until the secretary can leave, and then and this is a little but unusual please leave a soon as you can. We happen to have another secretary visiting today. The secretarygeneral of the communist party of vietnam who is following, so we have a pretty highsecurity event here a couple of highsecurity events in a row. We do a lot of events as you know, but this is a bit of a juggling act today. With that, it is my pleasure to welcome my colleague, the very distinguished and honorable sean okeefe. Sean is former secretary of the navy, former director of nasa, and being a tulane graduate, i feel compelled to say former chancellor of lsu, and he is actually wearing lsu tigers today, so go tigers. Sean is here at csis as a Senior Advisor with the maxwell school. Some of my favorite people are in the front row. Judge webster, mr. Hand, so good to see you all. Thank you for being here. With that, i would like to produce the honorable sean okeefe. [applause] mr. Okeefe thank you, andrew. I appreciate the opportunity to be here to moderate this particular session on such an important occasion. While some of that may be in reference to this mornings event, which we will hear more from the secretary in a minute i think the other thing we need to reflect on a bit is we just emerged from yet another uneventful National Holiday this past weekend, with absolutely no incidents whatsoever. Yet the reason for that is not accidental. It is a consequence of the diligence of extraordinary people, thousands of them on our behalf, who dedicate themselves to assuring that freedom to do the kinds of things that we did this past weekend, celebrating the birth of this nation, and also to recognize the extraordinary opportunities we have because of what they do. They get virtually no recognition for those nonevents. The gentleman who represents all of them here is a distinguished Public Servant who has spent a considerable period of his professional life in public service. Having started, certainly being involved as a professional attorney, he has risen through a number of different positions as the general counsel of the air force, the assistant u. S. Attorney of the Southern District of new york, as the general counsel of the defense department, prior to becoming the secretary of Homeland Security. He is the fourth to occupy that particular capacity. In each of these roles, he has distinguished himself as an exemplary Public Servant who has focused on the challenges of the kinds of jobs and issues that ultimately have been brought to head in this capacity, protecting all of us as the secretary of the department of Homeland Security. The honorable jeh johnson. [applause] sec. Johnson thank you very much, sean. Can everybody hear me . Ok. Thank you very much. Its great to be back here at csis. Thank you for allowing me to speak here today. I want to open my remarks by talking about todays events. The topic of this speech is Cyber Security. Related to Cyber Security, it appears that today we had system malfunctions at united, at the new york Stock Exchange, and the wall street journal. I have spoken to the cfo of united myself. It appears, from what we know at this stage, that the malfunctions at united and the Stock Exchange were not the result of any nefarious actor. We know less about the wall street journal at this point, except that their system is up again, as is the United Airlines system. Cyber security is a top priority for me, for the president , and for this administration. It is my personal mission to significantly enhance the department of Homeland Securitys role in the Cyber Security of our nation. Today i provide a status report on our efforts for the federal civilian, dotgov world in particular. I also emphasize the importance of passing new Cyber Security legislation, and soon, in this congress. I applaud the congress for their bipartisan efforts so far. I will begin this speech like i end most of them. I tell audiences that Homeland Security is a balance. A balance between basic physical security and the freedoms we expect as americans. As i have said many times, i can build you a perfectly safe city, but it will look like a prison. We can build more walls, install more invasive screening, interrogate more people, and make everyone suspicious of each other, but not at the cost of who we are as a nation of people who cherish privacy, value the freedom to travel in associate and celebrate our diversity. The same is true of Cyber Security. Cyber security involves striking a balance. I can build you a perfectly safe email system, but your contact will be limited to about 10 people. And you will be disconnected entirely from the internet and the outside world. This, too, would be like a prison. The reality is we live in an interconnected, networked world. Cyber security must be a balance between the basic security of online information and the ability to communicate with and benefit from the networked world. In the meantime, the reach of the internet is growing at an exponential rate. Today, there are more connected devices than human beings on the planet. In just five years, the number of devices connected to the internet is estimated to exceed 50 billion. At the same time, Cyber Threats are increasing in frequency, scale, sophistication, and severity. The ranges of cyber threat actors, methods of attack, and targeted victims are also expanding. This affects everyone, both in government and the private sector, across the country and across the globe. Not a week goes by without a news report of another organization being hacked. These threats come from a range of actors, including nationstates with highly sophisticated capabilities profitmotivated criminals, and ideologicallymotivated hackers or extremists. In the case of the breach of the office of Personnel Management a large amount of highly personal and Sensitive Information was taken by a very sophisticated actor. We have determined that federal personnel rectors were in fact taken by this actor. Dhs, the fbi, and the nsa have also determined opms system containing information was compromised. Opm provided notice to approximately 4. 2 Million People impacted by the data breach involving employee personnel records. Opm is still working with an Interagency Team to address the total number of people affected by the breach involving security clearance Background Investigation information. The opm breach also remains the subject of an ongoing investigation. We have strong evidence about the identity of the actors behind the breach. As the dni said last week, there is a leading suspect, but we are not prepared to publicly identify those actors at this time. To be frank, our federal Cyber Security is not where it needs to be. But we have taken and are taking accelerated and aggressive action to get there. In response to the opm breach, on june 12, the white house announced the establishment of a Cyber Security sprint team comprised of omb, nsa, dhs, and dod personnel to conduct a 30day review of the federal governments Cyber Security policies, procedures, and practices. On a reprioritized basis, we are deploying teams to assess the highest value systems across the federal civilian government and hunt for and remove adversaries identified in the system. This response to the opm breach is part of a much broader federal Cyber Security effort that has been underway for some time. There is a great deal that has been done and is being done now to secure our networks. We do in fact block a large number of intrusions, including those by state actors. But we can and must do more. As ive said before, congress can help. By law, each head of the federal department or agency is primarily responsible for his or her own Cyber Security. The department of Homeland Security has overall responsibility for protecting federal civilian systems from Cyber Threats, helping agencies better defend themselves, and providing Response Teams to assist agencies during significant incidents. National Security Systems such as those used by the military and the Intelligence Community are secured by the department of defense and the dni. There is no one Silver Bullet for Cyber Security. The key is to install multiple layers of protection to best secure our networks. The department of National Security integration system is the u. S. Governments 24 7 hub for Cyber Security information sharing, incident response, and coordination. 13 u. S. Departments and agencies and 16 private sector entities have regular dedicated liaisons, while over 100 private sector entities collaborate and share information with the nccic on a routine basis. Given the central importance to the dhs mission, i have elevated it within our structure so its leaders have a reporting relationship directly to me. They share information on Cyber Threats and incidents and provides onsite assistance to victims of cyber issues. In this fiscal year alone, they have shared over 6000 alerts and warnings and responded onsite to 32 incidents. Over double the number of onsite responses for the entire prior year. It is also the place where we manage the einstein system. Einstein is the first basic layer of protection. We provide at the Network Perimeter at each federal civilian department and agency. Einstein consists of three einstein one and two sit at the perimeter of the Agency Networks. Einstein one observes and records basic information about all activity entering and exiting an agency network. It is like a recording camera sitting on the perimeter fence to be reviewed when or if a certain individual enters or exits the compound. Einstein two detects known prohibited adversaries that have entered or exited and alerts us to them. Einstein one and two detect and identify malicious activity. We share that information with all departments and agencies. This affords those agencies the opportunity to take appropriate actions to protect themselves. By the end of 2005, einstein one and two were deployed to protect only three federal agencies. Today, both protect all federal civilian traffic routed through a secure gateway to the internet. Then there is einstein three accelerated, also known as e3a. E3a resides with Internet Service providers serving the federal government. E3a has the capacity to both identify and block known malicious traffic. Like the system that protects the department of defense, one key value of e3a is that it is an intrusion detection and Protection System that uses classified information to protect unclassified information. E3a was first employed in 2013. By december 2014, e3a protected 237,414 department personnel. Today it protects over 931,000 federal personnel, or approximately 45 of the federal civilian government. I have directed that dhs make e3a fully available to all federal departments and agencies and have challenged us to make aspects of e3a available to all federal civilian departments and agencies by the end of 2015. E3a has demonstrated its value. Since its introduction, e3a has blocked over 550,000 requests to access potentially malicious websites. These attempts are often associated with adversaries who are already on federal networks, attempting to communicate with their home base and steal data from Agency Networks. Importantly, einstein 3a is also a platform for future technologies and capabilities to do more. This includes technology that will automatically identify suspicious internet traffic for further inspection. Even if we do not already know about the particular Cyber Security threat. As an additional line of defense, the department of Homeland Security helps federal agencies identify and fix problems in near realtime using continuous diagnostics and mitigation programs, or cdm, as we call it. Once fully deployed, cdm will monitor networks internally for vulnerabilities that could be exploited by bad actors that have reached the perimeter. Cdm will allow them to identify, prioritize, and fix the most significant problems first. It will also provide dhs with Situational Awareness about government wide risk for the broader or Cyber Security mission. Cdm is divided into three phases. The first phase, being deployed now, checks to ensure that all computers and software on Agency Networks are secure. The second phase will be monitoring users of Agency Networks and ensure they do not engage in unauthorized activity. The third phase will assess activity happening inside Agency Networks to identify anomalies and alert security personnel. To date, we have made the first phase of cdm available to eight agencies, covering 50 of the federal civilian government. I have directed and we expect that dhs make the first phase of cdm pools available to 97 of the federal civilian government by the end of this fiscal year. Im also requesting authorization from congress to provide additional funding to speed up cdm phase two. As our detection methods continue to improve, more of them will come to light. In fact, opm was able to detect the recent breach as a direct result of implementing new tools and best practices recommended by dhs. As we are able to see unblock more events, we will thereby identify more malicious activity and frustrated and never cherries attempts to access and nefarious attempts to access Sensitive Information and systems. Nccic also provides onsite assistance to federal agencies as well as private Companies Operating critical infrastructure. We in effect may cast calls. When an incident like the opm breach occurs, it helps us find the adversary, drive them out, and restore service. It also coordinates responses to significant incidents when other Government Agencies give them the information they need to respond effectively and ensure unity of effort. By the Authority Given to me by congress and the federal Information Security modernization act of 2014, i can now as secretary of Homeland Security issue binding operational directives to federal departments and agencies. A binding operational directive is a direction to agencies to mitigate a risk to their information system. I issued the first binding operational directive on may 21 of this year. This directive required agencies to properly fix critical vulnerabilities identified by our program on their networks. We know that we must drive change from the top. Thus, working with omb, we notified departments and agency heads so they are aware of the status of their own Agency Efforts to comply with my directive. Department and agencies responded quickly and have already reduced critical vulnerabilities covered by the binding operational directives by more than 60 . Next, information sharing is also fundamental to achieving our mission. In order to sufficiently address the rapidly evolving threats to our cyber systems, we must be able to share cyber information as quickly and in as close to real time as possible. To accelerate the speed and expand the breadth of information sharing, we are taking three actions. First, we are supporting the development of information sharing and analysis organizations, as called for in the president s executive order 13691, which he signed on february 13 of this year. Next month, we will as directed by the president select the organization that will develop best practices. By supporting the development, we want to help companies regardless of size, location, or sector share information with their peers and with the department of Homeland Security. Second, i have directed an aggressive schedule for deployment of nextgeneration information sharing techniques. Dhs itself now has a system to automate sharing of cyber threat indicators, and we are working to share those capabilities across the federal government and across the private sector so we can send and receive information in near realtime. One agency is already receiving cyber threat information via this Automated System over a month ahead of the original schedule. We expect multiple agencies and threat sector partners will begin sharing and receiving information through this Automated System by october of this year. Third, we are working closely with other agencies of our government to stand up to Cyber Threats, intelligence integration centers, or ctiic. It provide timely information to share with our partners. Finally, there is more congress can do. Congress has a role in Cyber Security to ensure that we have adequate resources and budget and the Legal Authority to pursue our mission. Last year, in addition to passing the federal Information Security monitoring act, Congress Gave us the ability to and codified the role of nccic as a federal interface. But there is more congress can do. The recent breaches in Cyber Security demonstrate years and see of acting now. We appreciate the good bipartisan work on Cyber Security legislation now underway in congress. We believe there should be three basic things in any cyber legislation. First, congress should expressly authorize the einstein program. This would eliminate any remaining legal obstacles to its deployment across federal government. The house has passed hr1731, which accomplishes this by ensuring agencies understand they are legally permitted to disclose Network Traffic to dhs for narrowly tailored purposes. Second, we must incentivize the private sector to share cyber threat indicators with the federal government in a manner that provides protection from civil and criminal liability for private entities that share threat indicators with us and protects privacy. Third, we need a National Data breach reporting system in lieu of the existing patchwork of state laws on the subject and enhance criminal penalties for cybercrime. In the meantime, as i have described above here, we are moving forward. As we improve our defenses cyber adversaries will continue to improve their own efforts to break through. This problem is not unique to the government. It is shared across the global Cyber Security community. Our adversaries are constantly evolving. So must our tools to combat them. We cannot detect and stop every single intrusion. That is not news. So often the most sophisticated actors penetrate the gate because they know they can count on a single user letting his guard down to an act of spearfishing. But my message today is we have increased and will continue to increase the instances in which attempted intrusions are either stopped at the gate or rooted out from inside the system before they cause damage. We are taking action. We are aggressively strengthening our defenses. We are accelerating the deployment of the tools we have and working to bring new ones online. Thank you very much. [applause] mr. Okeefe thank you, sir. Appreciate that. Sec. Johnson thank you, mr. Secretary. Mr. Okeefe thank you, mr. Secretary. Sec. Johnson secretary of the navy is a lot cooler job. [laughter] mr. Okeefe yeah, but you had the coast guard. That is one of the tops in my book, the coast guard. Sec. Johnson i did not have aircraft carriers. Sean, can i take a liberty and recognize the admiral and director . I saw your portrait. Thank you for being here. Mr. Okeefe outstanding. Its a great pleasure to see you. Absolutely, thank you all for being here. It was an extraordinary commentary, mr. Secretary, that you offered on a variety of different elements of the cyber challenge. How would you characterize the nature of u. S. Vulnerability right now to cyber . Sec. Johnson well, part of it is what i said at the end, what amazes me when i look into a lot of intrusions, including some really big ones, by multiple different types of actors, they very often start with the most basic act of spearfishing, where somebody is allowed in the gate, penetrates the network simply because an employee clicked on something he or she should not have. The most sophisticated actors count on penetrating a system in that way. Which means that a lot of our Cyber Security efforts have to be rooted simply an education of whatever workforce we have. Second, there are some really sophisticated actors out there with varying different motives. I think we all know them. And we have right now underway what i consider a very aggressive effort to raise the number of instances in which we are successful in blocking the efforts to infiltrate the system. As i said in my remarks, we are not where we need to be, and i have made a personal mission of getting us to raise that bar to a better place. Mr. Okeefe fascinating. Part of the commentary that you offered, too, in terms of trying to mitigate against this is to act as the primary federal Department Agency for the purpose of broader cooperation of information, the einstein system was the example. That has gained great coverage in the course of the opm incidents. How so many of your team have testified as to how that works and how effective it is. It has been a very broad press coverage there that i think has educated the public more broadly to understand what the scope of that system is and how useful it could become. Beyond the point of simply i should not say simply beyond the point of coordinating this important information, it then highlights more abilities to each federal agency, when you look at the full scope of all the federal interests that have ascribed the role in the Cyber Security challenge, ranging from the Intelligence Community and the defense department, of course, but also the treasury department, through the fbi, a wide range of agencies all have a stake in this how do you coordinate that wideranging set of efforts beyond simple information sharing . Sec. Johnson that is on us to do, that is on dhs to do. You are correct that there are a number of federal departments and agencies with a Cyber Security role. Each agency and department has its own Cyber Security responsibility with respect to its own system. But there are a lot of federal Agency Departments that have a broader Cyber Security mission and its on us in government, most prominently the Intelligence Community, dhs, and the fbi, and dod, to coordinate our efforts to effectively partner. Dhs is the civilian interface for Cyber Security. Fbi has the Law Enforcement investigative mission. The Intelligence Community has their mission, obviously. But the way we see it and the way we are setting this up, dhs and the nccic in particular is the primary portal for the civilian private sector and the federal civilian dotgov world. It is on us, and i have encouraged our people to do this, to effectively work with and partner with other agencies who have a role in this process to coordinate the efforts. The nccic is essentially a multiagency entity. As i mentioned in my prepared remarks, one of the things that we are doing with considerable urgency is getting to near realtime information sharing. So when something comes in the door, we can do the proper vetting for privacy and so forth and get it out in automated fashion to the players who need the information. Mr. Okeefe and your final comment on the role of congress in this, i assume, is in part to highlight the fact that we are consistently looking for the authorities of the department of Home Security to direct the priorities to the appropriate challenges. Is that a fair assumption as well . Sec. Johnson yes. We got some Cyber Security legislation at the end of last year, which is good, but there is more we can do. Im encourage there is a lot of bipartisan support. The house bill, as i mentioned in my remarks, passed by a wide bipartisan margin, 350 votes in the house, for a difficult subject. So im encouraged by that. There is a lot of activity right now in congress. Im hoping we get cyber legislation. It really is to codify our legal authorities and to encourage information sharing by the private sector. A very significant component of that, which the president supports is limiting potential criminal and civil liability for those who share cyber threat indicators with us. That was a big threshold to cross. We support it. We think it is good. From my corporate lawyer days, i know how board of directors think. Limiting liability for sharing cyber threat indicators is meant to be strong encouragement and inducement to help us in the Cyber Security mission for the country. Mr. Okeefe before i open up the door for other comments and questions, i want to followup on that last comment that you made, because you are far more aware of this than probably anybody. Industries help us in various markets, widely diverse markets. They have been progressively making choices of our own to erect our own defenses and Cyber Security systems. Sec. Johnson right, and they should. Mr. Okeefe before they go down the path to spend the enormous amount of money to do that because it is often varied and uniquely positioned, what would be your best advice to any ceo or board of directors prior to making those investments on how they all to think about going about structuring their own defenses . Sec. Johnson well, i will start with an observation. One observation is in the private sector there are companies and sectors that are very sophisticated when it comes to Cyber Security, then there are others in the food chain that are not. They needed a lot of help and a lot of learning. There are ways for some of the more sophisticated players to encourage the less sophisticated to do that. My advice would be invest in the latest and best technology. There are lots of Cyber Security firms out there that are in a position to advise. There are some good ones. But also, the key to Cyber Security, even if you have the best technology in place, is information sharing. That is where dhs can come in, that is where part of the private sector can come in and play a role. Information sharing is key, even among the most sophisticated actors. You cannot act in a vacuum. You dont want to be out there all alone. And effectively partnering within the federal government and with the federal government. Those are the three tenets as i see them. Mr. Okeefe excellent, thank you. Sec. Johnson one other thing id like to add, sean mr. Okeefe sorry. Sec. Johnson you touched on this in the beginning of your remarks about july 4. Very often, in public reports, we see a lot of concern expressed about specific events emanating from statements made by us in government. But very often we dont finish reading the entire paragraph or the entire sentence. And so i gave a statement the week before july 4, and it was consistent with many statements i have made, which is the public needs to continue to be vigilant around holidays, Public Events but we encourage people to continue to go to Public Events, celebrate the country, and not be afraid. We are a free society. As i said, we cherish the freedom to associate, the freedom to travel, and we should continue to do that. The Homeland Security threat is definitely there. But i dont want to see people run and hide. I dont want to see people stay in bed all day. I think we need to and should continue about our daily lives participate, support large Public Events. One of my best lines is that terrorism cannot prevail if people refuse to be terrorized. I have seen just in my time in office, 18 months, when an attack occurs, americans whether Oklahoma City or boston or the United States military, anyplace else, come back stronger. I think that is part of who we are as americans, and we need to continue to do that. Mr. Okeefe thank you, thats very helpful. Sec. Johnson ok, turn me over to questions. Mr. Okeefe yes, maam . Yes, thats you. Jennifer thanks for your speech and discussion. Jennifer with the media group in china. The u. S. And china agree to further explore initiative to carry out Group Communication and coordination on Cyber Security issues. What are the initiatives from the u. S. Perspectives, and are there any concrete ideas for the next round of operations between the two countries and your expectations on Cyber Security issues, discussions in the september visit . Thank you so much. Sec. Johnson i went to beijing myself in april. I met with a number of Chinese Government officials. I have encouraged us to find Common Ground where we can in terms of information sharing. In my time in office, we have done that to a limited extent. But it is also a work in progress. I think we have differing views on a lot of fundamental issues and a lot of fundamental understandings about the nature of Cyber Security. So it continues to be a work in progress, but i think that a dialogue can be good and is good. Mr. Okeefe yes, sir . John john weiler, i. T. Acquisition council. I have to agree with all your statements, especially the one about the urgency for bringing in the latest technology especially the networks that are much more secure than the antiquated systems. My colleagues at itac have said the up to me of that is the acquisition process. Can you talk to us about dhs efforts to speed the need at removing barriers to goals . Sec. Johnson the answer is, yes, we are doing that. As part of our unity of Effort Initiative on my watch, which i announced and created last spring, we are reforming our acquisition process. And we have an initiative to do that, to remove a lot of the barriers. Part of the initiative we have taken and acquisitions is consult the private sector. In my professional life, i actually have lived most of that professional life in the private sector as a Service Provider meaning a lawyer. And so we have an Acquisition Reform Initiative underway right now. It was recently formed. We have a terrific new undersecretary for management, confirmed by the senate of a vote of 952, who was my former client. He used to be the executive Vice President for administration at johnson johnson. In many ways, j j resembles dhs. It is a large, decentralized conglomerate of health care companies. Russ was the vp for administration and oversaw a lot of their aspects of their business. So he is with us now, he has come out of retirement to take this job