History of the secret service. The Atlanta Press club posted this earlier this month. Good afternoon. Name is tom johnson. I am proud to say that i am a cofounder of what we think is the new Atlanta Press club. It is second only to the National Press club. In quality it is the number one press club in america. This is a joint meeting read several years ago pete and i peak was then, i guess at that time he was chairman of the board for the Woodruff Foundation and later the Commerce Club we thought it would be a real good thing to bring together the strengths of the atlanta media and the atlanta Business Community into this, and particularly at time to time to have speakers with a message that we felt was important to this community, as well as to the nation. We have had speakers like general betray us general petreaus. We can go down the list. I knew absolutely no one on Lyndon Johnsons staff in 65. I had no political connections. I was not part of the president ial family, even though my last name in fact is johnson. [applause] [laughter] but fortunately for me the agent in charge of president johnsons protection was a man named rufus hometown ofrom my decatur. Who her old s literally hurled Vice President johnson to the floorboard of a limousine in dallas and placed his own body on top of lbj after the fatal shots were fired at president novembern that fateful 22, 1963 in the president ial motorcade. Secrete never asked the service to do anything for me, but i have enormous respect for this organization. After the kennedy assassination, rufus and another agent replace president kennedys detail four president ial protection. Along with the then secret rowley,director james those two agents and the successfully pulled off an effort by thenfbi director J Edgar Hoover to have the fbi takeover president ial protection after the dallas assassination. Much to mr. Hoovers disappointment, president johnson did not transfer president ial protection or any other elements of the secret service to the fbi. I have often felt that without that decision and respect president johnson had for his agents and agency a gotten to his agents and the agency had gotten to know quite well, there might not be the secret service of today. There is absolutely no organization for which have more respect or admiration than the women and men of the secret service. And i emphasize the women and men because in earlier years there were no women as agents. But i have seen them stand at their post in a storms, rain, sleet, freezing weather. I have seen them splattered with red paint by protesters as they walked alongside the president ial limousine. I have seen them deal with abusive white house staff and abusive president s and abusive reporters and media. There is almost nothing that i guess, and one way or the other, that they have not explored. I once i heavily armored president ial limousine crush the bones of an agents foot. Many hours of overtime are not paid were not paid the weight they are today. They work on thanksgiving and other holidays where most of our government officials and employees are home with their families, except for our armed services. I watched one take a bullet as John Hinckley fired at ronald reagan. One of those bullets ricocheted and hit president reagan. Those are not the only times that of men and women of the secret service have placed themselves in the line of fire to protect the president. You might think about last year when multiple president ial candidates, 17 i think at one point, they protected the pope as they toured, they protected countless others. Multiple foreign trips for the president and Vice President. The protective challenges of a new president , president , President Trump, has a large, extended family. Protection of both of the present pro homes in new york as well as florida, as well as continuing their investigative duties. During 2016, i was asked by the former director and Deputy Director to assist on major projects. I did so. Total privacy, total anonymity. It gave me an opportunity to go back and work with the thenleadership. One of the outcomes of that in addition to some important reorganization was a search we made from outside and inside the government, inside the cia, fbi, and i am delighted the only person who got a 10 across the board in all categories is here. Just stand up. And say hello. [applause] much to the dismay of the university of texas longhorns, President Trump chose the aggies. He is a genuine American Hero who does not even want people to talk about his record. And, director alles was very highly decorated as a Fighter Pilot, major general, one of those very rare top guns. He fearlessly served as director of the u. S. Border agency and has been in many other leadership positions. His number one job was protecting americas borders then. It has continued to be quite a task. He was in the marines 35 years. Masters degree from and down. Naval war college. He is every award you can imagine. I am honored he accepted what i think is his first Major Community event of its type and that is here in atlanta. Ladies and gentlemen, director randolph alles. [applause]. Director alles thanks so much, tom. It is an honor to be here. I want to recognize the leaders from the atlanta area and this room. I also want to thank our Law Enforcement partners who are critical to what the secret service does. It is an important part of our mission set. It is an honor to address you all and a privilege to work with each one of you. Particularly with our Law Enforcement partners. I want to talk to you about cyber. As it particularly impacts the Financial Sector of the United States. I am sure that is of interest to you all. It is one of the mission of the secret service. By statute, we are obligated to protect the president and other designees. We are responsible for financial crimes, counterfeiting, and supporting state and local agencies in terms of child exploitation. Those are our primary Statutory Mission sets. I will talk about the cyber area today. I will talk about the impact of cyber overall and the Financial Sector. I have my wallet back here. It has some cash in it, all right . It does not have nearly the amount of money i have, it is all electronic right . It is no longer a cash economy, per se. It is all electronic. So criminals worked their way into the Electronic System and manipulate it. This is a big concern as we see in our investigative areas. Counterfeiting is still an area of concern, especially for Small Business owners. It is a big deal to lose cash to them. But the biggest concern is in the cyber area. I will talk about the National Computer for in six institute. I will talk about our partnerships. I will talk about jack potting. Future challenges. I am not going to address protective operations. If you have questions i am happy to answer those, but i am not going to devote any time to it in my presentation. As we all know, modern technology has substantially changed the work of Law Enforcement. The secret service was forced to adapt to this in the 1970s as Payment Systems began to digitize and the environment changed. In the marine corps, my paycheck was originally paper and then it was mandated electronic. The environment has changed. The evidence and criminal investigations is changed because it is scattered across jurisdictions and maybe across a number of technology providers. Verizon, at t, microsoft, facebook, they might have some data. Evidence might be found in a wide range of visual devices. Android, laptop. Across a wide area. It brings a challenge for investigations. Criminals are using cyberspace more to collaborate with each other, to form transnational organizations, to organize criminal schemes, to reach victims around the world while maintaining anonymity. They traffic and illicit information globally and illicit information globally. It is something they are doing across cyber. These investigations require Law Enforcement investigators to be knowledgeable of computer ran six, digital investigations. We need to identify these bad actors. The secret service, to address this issue and 2008 started a National Computer for in six institute. I am pleased to report an 2017 that institute was authorized by congress and recognize. It is the nations only federally funded Training Center dedicated to training state and local Law Enforcement and prosecutors and judges and current cyber crime trends, digital evidence, investigative methods, and prosecutorial challenges. Im number of small municipalities throughout the country would have no capacity to work here. They get a five or six week of course of instruction with us and we provide them with computers to do investigations. A lot of criminal investigation is now spread across different domains and devices. It is important to criminal investigators and prosecutors and judges know how to work with this information. It is not a coming trend, it is here today. We have provided training for 328 prosecutors, 628 Law Enforcement officers and it is based on cyber investigative strategy that relies on partnering with academia, private industry, Law Enforcement, and the legal community. The partnerships are typical in combating cybercrime. A few weeks ago, the atlanta task force hosted a tabletop exercise with 80 partners locally. The purpose was to promote awareness and understanding of how a cyber incident could impact businesses. I will give you examples later. Working in this regime, the cyber area, they are very clever and how they exercise their criminal schemes. Preparedness is important. Information sharing. On the subject of partnerships i would like to knowledge the Extraordinary Partnership the secret service enjoys with the Law Enforcement in georgia. I met the head of dbi, the atlanta leased department, the Georgia State patrol, the georgia fire department. These are out critical to us. One thing the service tries to do is recruit partnerships and local communities. We need those partnerships when we have to be protective operations. Also, it is a collaboration between us and local communities on how we can best knockdown these criminal enterprises. It is very important to us overall and i thank you that we have a strong relationship here in atlanta and also in georgia. As an example, the recent visit to the College Football championship demonstrated how critical the partnerships are. Without those partnerships we could not operate in these areas. We do not have enough people to secure a venue against the threats that are commonly conveyed against the president. I would like to knowledge the tremendous work we have in the community in particular to those locally. Thank you very much for your cooperation and your outstanding work. Let me move on to current trending. Modern Financial Systems depend on technology, convenience, and efficiency. This exposes Financial Systems to transnational cyber threats. Examples are network intrusions, malware to obtain Payment Information and pointofsale systems like macys or department stores. Using ransomware to hold personal information. Somebody uploads ransomware on your computer and you can no longer access your files. They ask you to pay a fee. It is blackmail to access your data. We have business immunocompromised schemes. Criminals take over systems and do fraudulent transfers to domestic or foreign bank accounts. They hack a ceos email address and use it to solicit Payment Information and use that with account managers to transfer money to overseas or domestic accounts and quickly move it out of the mystic accounts and out of the domestic accounts and do bitcoins or others hard to trace. They are using those and other Money Laundering platforms. We have a Transnational Corporation who is conducting a jackpotting operation. It is a form of that causes the atms to dispense funding. They unlock it with a common key and that allows them access to the computer in the atm machine itself. With that access, they cannot get into the cash dispenser. They actually load malware onto the machine and they booted backup and relieved. Ok . If you come to use the machine is a standard citizen and put your card and it will say it is out of service. Once that is done, the cash mule shows up with a bad at the preappointed time and communicates with the folks running the malware and they command the machine to download the entire contents of the dispenser into his back. Depending upon how much money is in the machine, it can run from 10,000 up to millions of dollars depending upon where the machine is located. They have systems in places like 7eleven and places like that, not the bank atms. Some driveins and places like that. It is a clever scheme. Once the cash is uploaded, the cash real leaves, comes back later, reconnect to the internet and all the bank knows is the machine is out of money and when they go to access it they discover they have been robbed. Very clever how they do that. Were put a bulleted out about that. It was overseas in europe and south america, mexico. We had not seen it here until recently. They can get a lot of money out of the machine in a hurry. It downloads about 40 bills every 20 seconds or Something Like that. It cap some out pretty fast. So if you see anybody standing by a machine with a bag and their hand i would point out they are not there using their atm card, write . Even though it downloads 40 and 20 seconds, it could take them an hour or so for some of the larger machines of it has a lot of cash. We are working with the banks and local Law Enforcement to knock that down. A second example is some cases involve multiple of the elements i described earlier. I talked about malware, ransomware, network intrusion. A famous cyber criminal was convicted in seattle for his role in a hacking scheme that caused 3700 millions in losses. He received a 27year sentence. His convict within atlanta and las vegas. We located him and on his laptop he had more than 1. 7 million stolen credit cards. There are places you can go to obtain these stolen credit card numbers. You cant as an average citizen by the point is, there is a lot of information out there that is stolen in available to criminals if they know where to get it and want to pay money for it. In this case, 1. 7 mine carts and he is spending a long time in prison. 1. 7 million cards and he is spending a lot of time in prison as a result. The trends are related to major data breaches showing there is increasing sophistication and to increasing financial impact. We see more countries participating. Years ago, we did not think of her veranda or north korea as a cyber player but we see them iran or north korea as a cyber player but we see them increasingly now. Lets talk about u. S. Financial Payment Systems. To understand the gravity, you have to understand the importance of the u. S. Dollar worldwide. The u. S. Dollar is still the worlds foremost reserve current scene. I know the chinese have made progress but still the u. S. Dollar is the foremost World Reserve currency. Most are held outside the United States. 10 countries use the u. S. Dollar as their official currency. This creates substantial Cyber Security risks. The industry estimates hundreds of billions of dollars of attentional losses from cyber activity. Lets think about criminal threats as a risk to financial and Payment Systems. Financial systems are common target for both domestic and transnational terminals. Trimbles use a number of different organizations to attack systems. Some may have a core group in the city. Some might have a globally dispersed network that has never met in person but are able a globally dispersed network where they may be able to connect online virtually. Core members are usually located in a country where there is a high degree of corruption. The most significant threat to our nations Payment System is transnational cybercrime networks that emerged in the former soviet union space in eastern europe. This is where i see a large amount of our activity coming out of these areas, where they operate remotely to orchestrate these cyber crimes, and we cant get to them because they are overseas. These are countries that we do not enjoy extradition treaties with. Once we have the sufficient information on them, we attempt to access them if they travel. We have a number of folks who we are sitting on in Different Countries right now who are awaiting extradition to the United States because they committed cyber crimes. This network, russian speakers in this case, is reaching the Global Information system. They steal billions of dollars from the u. S. Organizations, they manipulate equity markets, they build and employ their own cyber attack capabilities. We consider them to be our top priority in this sector of cybercrime. Let me pause for a second. As i look at our agents, we have accomplished a number of extraditions that have resulted in hundreds of millions of dollars of losses being prevented in u. S. Businesses. Our office is successful in these cases, foreign governments interfere with extradition agreements. With a number of the countries with which we have extradition awaiting the russian government has actually come in and tried to pull their citizen back into russia even though we have an extradition awaiting on that individual. Theyve gone so far as to say they are accused of a crime in russia, but they are interested in these cyber criminals not being lost to the United States and being informants to us or potentially being convicted and held in prison. Our place, basically, is that we want to be relentless in pursuing them. They are having a substantial impact on our Financial Systems and we want to do the best job we can to ensure this does not continue. We worked closely with a number of organizations. We normally work with them so we can develop information to get prosecutions and convictions. It is a very important area to us. Let me talk for a few minutes about digital currencies. This would be things like bitcoin, ethereum, opportunities for criminals to participate in criminal activity. They are used in Money Laundering. There is a growing challenge posed by crypto ransomware. They disrupt financial Payment Systems. These are significant areas that we are trying to work in. We have let me give you two examples. We have invested in apprehending the operators of two currencies. The first is called liberty reserve. It was the largest Money Laundering case ever prosecuted in the u. S. With over 6 billion of proceeds. The secret service is working actively with partners at treasury and across Law Enforcement to combat the use of crypto currencies. They are very clever in using these cryptocurrencies and also these business email hacks. One company was going to use their initial Public Offering of stocks with a crypto currency. I believe they were using ethereum, but i could be mistaken. The ceo had his email hacked and the hacker sent the ipo out. A half 1 million went right in. As soon as it got to the account a different ethereum of account he moved it over to a place it is hard for us to interact. We got some of the money back with a seizure warrant but part of it was lost. It shows how clever they are. Very clever on their part, very devious, and we have in this case, we havent identified the perpetrator but we did get some of the money back. Let me talk now about some current and future challenges. I would say that the subject of encryption is a matter for Law Enforcement that we are facing continuously as we go forward with technology. There should be no doubt about the negative impacts certain implementations of encryption can have. According to the House Homeland SecurityCommittee Staff report entitled, going dark, it has brought value to the marketplace and devices with end to end encryption has presented Law Enforcement with different challenges. It has allowed criminals to conceal their activities. We all understand that members of the public have a reasonable expectation of privacy as guaranteed under the constitution. You can imagine, if we did not have encryption, how would you do your financial work . If you wanted to send your credit card information over a nonsecure internet line banks going to other banks for transfer. We are big supporters of encryption overall. We are concerned about the increasing use of pervasive encryption that impacts our ability to investigate crime and identify and aid victims. It can impede the Law Enforcements ability to conduct timely and thorough investigations. Another quote here from the new york countys district attorneys office. He says Smartphone Encryption keeps digital evidence beyond the reach of Law Enforcement agencies with valid search warrants, making it more difficult to provide justice for victims. It was recently stated that our society has had a system where evidence of criminal wrongdoing was impervious to detection, especially when a warrant is obtained. In our investigation, the most significant transnational cyber criminals have been dark for a substantial period of time. To say that Digital Sources of evidence are no longer available and that we now depend more on human sources to penetrate the networks. In fiscal year 2017, encryption was encountered in 46 of exams conducted by the secret service. The fbi director recently said to gain access to more than 7000 devices. He said not being able to access more than 7000 devices is a major issue. He went on that, we are not interested in millions of devices owned by citizens. We are interested in devices used to plan terrorist or other criminal activities. We are not talking about Law Enforcement getting your phone because we feel like. We have a valid warrant from a court to access your device. The secret service side, mobile phone encryption is especially problematic. In 2010, we examined more than 2000 mobile phones. In 2017, the number dropped to 500. If you think about the explosion of smartphones in that time, percentagewise, that is a huge change for us. While we recognize mobile device encryption is designed to protect the privacy of users, it also puts users at risk by hindering Law Enforcement. A lot of this information is stored and not being able to unlock them definitely impacts our ability to introduce the information into evidence. The increasing use of unrecoverable encryption is detrimental to our ability at the National Center of missing and exploited children. In 2017, 21 computer forensic exams focused on child exploitation. Our state and local Law Enforcement partners reported that there was encryption in 360 of their exams. What are possible solutions . At this time, there has been no viable legislation to really address the challenge. Groups are highly organized on this subject. It is, in a sense, bipartisan. There is opposition both on the republican and democratic side, and also support on the republican and democratic sides. It is an area of concern for Law Enforcement. We will continue to work with all partners to find ways to adapt investigations using communications technology, including the use of encryption. We are determined to work under authorized court warrants. We will work with congress, the department of justice, and our friends at state and local Law Enforcement to make this more of a reality. We will continue to work with companies and the Technology Industry to help them understand the way their products and services are being misused by criminals. Addressing this issue is of paramount importance to us. If you talk to the officers around the room involved in these areas, they will relate to you the significance of it. If we work stepbystep, we can protect the privacy of citizens at the same time we can allow Law Enforcement to do their work and ensure that criminals committing crimes are convicted and put in jail, where they receive their due punishment also through due process. Im going to pause and move on to questions. Before i do that, im going to thank you for the opportunity to speak with you. As you can see, this cyber area is upon us. The criminals that work in this area are very clever in their schemes. The jackpotting one is a good example of that. Focusing on the security of the banking sector, for the secret service, is critical. Ill just point out that is why the service was created. The founding of it was right after the civil war. It was one of lincolns last acts to authorize a service that would work against counterfeiting, which was prolific. About 40 of notes in circulation were counterfeit. They were substantially impacting our Financial Sector. It is a different realm now in cyber but still very important overall. Let me pause there and take questions. [applause] cspan, an opportunity to get to you, will you please come to where the mics are . How does it feel to be the first outsider to head the United States secret service . Randolph good question. I think it is a tremendous organization. Im very impressed by the quality of the people in the organization. We have a number of former agents in the room here. They can speak to that also. The men and women who make up the secret service are of an exceptional quality. It is just a tremendous honor to be there. On the director of the Georgia Bureau of investigations. I wanted to publicly thank the secret service to the support given to the state of georgia in our child sex trafficking and child pornography investigations. We would not have the successes that we had without the secret service. The cyber investigation Training Center in alabama is a critical cornerstone of training state and local Law Enforcement officers on how to conduct cyber investigations. Theres a waiting list for investigators to attend this course. Is there any plans to expand the capabilities of that center . Randolph quick answer, yes. We have requested, through the department of Homeland Security and office of management and the budget to increase the overall secret Service Budget by about 470 million per year. Part of that is to bring the National ComputerForensics Institute up to full capacity. Right now, it is at about 33 capacity. There are plenty of facilities in alabama to train folks. We can probably about triple the current work. We put about 10 million per year into it now. We would like to wrap that up to about 25 million, 30 million per year. Our intent is to start doing that in 2019, 2020, 2021. Without that, a lot of Law Enforcement agencies are left without any capacity to work in the cyber area. They cant get information off devices and cant introduce it into evidence without some sort of expertise. We have bankers in the room. What do the local bankers do to make sure they are taking advantage of the resources you are describing . Randolph ncfi is focused on Law Enforcement. Working with our local cybercrime taskforces would be the way to go. Theres one in atlanta. Thats how we got the information out of the jackpotting. We discovered, as soon as we posted that information, that there was more going on than we expected. Financial crime, cybercrime. I would access them right there. We have a very robust staff in washington, d. C. They hook right in to our local Electronic Crimes Taskforces. Im president of a local company here in atlanta. We are definitely seeing an increase in bot technology. Private enterprises that join with your organization and follow these folks. Randolph the best place to hook and is with our Electronic Crimes Task force. We are seeing more of those botnets that basically roam the internet looking for open devices they can access. We had a camera hack at one of the municipalities where they lost control of their cameras. That was a botnet. Obviously, the ectf will tell you to make sure your software is updated, make sure the patches are on your devices. For the more technical parts, the ectf is where i would go. The field office of the greater atlanta area. [indiscernible] [laughter] we didnt talk yet about president ial protection. You have perhaps the largest Family Offices in new york and in florida, and almost the largest set of protectees, people who in the past were not protected by the secret service. That must give enormous stress to the system. The super bowl, the College Championship here. Give us some sense of what that is all about. Randolph one thing i should clarify is, the statutes that direct protection of the president and his family are unchanged. Theres nothing new. Any president who would be elected with that large of an immediate family would receive protection by law. The fact that the trump family is larger, there is obviously more stress on the service, but that has been the law for years. It has put a stress in the service. We are attempting to grow the service from our current size at 6000 two upwards of 8000, 9000 officers and agents. Also, so we can do more investigative work in the field. This stuff i talking about is very complex. You need very highly skilled agents to work in these areas. To have more of them available in the field to support our u. S. Attorneys so they can bring cases to trial is vital. The u. S. Attorneys are dependent on us and other Law Enforcement agencies to bring cases to him so we can take it to court and possibly get a conviction. Tom if you want, if you could come over, because you are in the line of the cameras fire. President emeritus, morehouse college. As you know, georgia has an ensemble of institutions is what you are doing with the higher and sector what do you need from us . Randolph first off, advertise for us. We want to get out to all of these institutions. Im doing recruiting today, by the way. I think, locally, i look into the field office and make sure were getting out to your institutions. That is critical to us, to get out there and do recruiting. We do run a number of things called elacs, consolidating hiring centers in different parts of the country. Its a great way for individuals to apply to the agency and work their way through the hiring process in a quick fashion. I think, tying into the local special agent, making sure we are getting onto your institutions, hitting them adequately. Tom director, you have the head of worldwide operations for cnn in the room. Tell us about the relationship with the agency today with the media. Randolph we tried to be proactive with the media overall. I think im impressed with what i see in the media in terms of the interaction we are having to get the story out overall. I dont really have any complaints about that. Tom not yet. Randolph theres always a negative story, right . Frank brown. For a young man like that, what does it take to get to your level . Tom what does it take for young man over here to get to your level . Does that mean to be a marine Fighter Pilot . What does it take to get to that level of responsibility . Randolph first off is the basics, education. If you want to be in the secret service, to compete adequately, you have to have a college education. After that, hard work, consistency in your job performance, innovating and what you are doing, making sure that you take care of your people. Part of what i do obviously his leadership. A key part of that is how you look out for your organization and how you take care of those inside the organization. I dont know if there is a particular magic pathway to director of the secret service. This was unexpected for me. I was not planning on being the secret service director. Here i am. That is what appointments are like. I do think those basics are where you want to work from. Tom other questions . Where should i stand . Retired military and ceo of an ai company in atlanta. For the past 10 years, it has been a challenge achieving all of the successes that we have to counter the cyber threat, but we have had successes. If you were to look at stretch goals 10 years from now, what would you like to see take place in a Global Operating system to where we can thwart this threat . Randolph thats a hard question. I will have to say. From my standpoint, it is more capacity to investigate the crimes. I think, in the Financial Sector itself, it is how we secure the Financial Sector. Encryption is part of that, as you are aware. It is a plus and a minus. Ensuring diligence and training on the part of those operating their systems. A lot of the examples i gave you are people who are basically fooled. They are fooled by a simple email. They diebolds information that they shouldnt. This is one of the vulnerabilities. That information is used for nefarious activities against a company. The stretch goal for this is that, obviously, we have investigative capacity, more expertise in the cyber areas, and we have more expertise on the industry side in terms of preventing these kinds of intrusions into the system. A lot of them are maybe not as complicated as we think they are. They involve some basic breakdowns in the Information Systems in some of these companies. Some of it is as simple as updating software or using software that is antiquated. In some systems, they are still using coball, what we used in the 70s. It is still running some operating systems and they dont patch well. For companies, there has to be a certain amount of money devoted to Information Technology refreshment. It is not whether the computer stops working, it is whether you can run it with the latest security and patches. Criminals are very innovative. They are always constantly updating and finding new ways to get into our systems. Dave wilkinson was one of the two agents on 9 11 with the president. One of the only aircraft in the sky was air force one but he told the president he could not return to washington from florida, told him he could not return from new orleans, and he told the president , who had ordered air force one to return, that he couldnt. He told the president , what did your mother tell you that you should do . President bush said, always listen to the United States secret service. Dave wilkerson is the former agent in charge of atlanta, former agent in charge in austin, texas. He has done a tremendous job bringing Law Enforcement together in many ways. My question is, how safe are our cities today from another 9 11 . Randolph another tough question. [laughter] i think safer than they have been. We expect the unexpected. Part of our challenges to think ahead about what potential threats might look like in those areas, the counterterrorism areas. We think about, in protecting the president , where we put him, where he is, and where he shouldnt be. A lot of that revolves around how we develop intelligence toward threats around the president. Threats against the presidency are pretty much consistent, about the same they have been for 10 years. People who think it is a matter of personality, its not. Part of that, protecting cities, is thinking about the outrageous or the unexpected and how you can counter or work against it. When we think about what happened on 9 11, it was totally unexpected. Theres more of that mindset in Law Enforcement and certainly the secret service as you think about protecting those who are in high levels of office. Tom before we break, the u. S. Attorney for the Northern District was sally yates. Many of you in the room know her. Many of you have not met the current u. S. Attorney for the district of georgia. [applause] i thank you for joining with us today to give you insight into the secret service. You should also know that the press club and the Commerce Club they have invited christopher wray, the fbi director, to come back home, and he will try to balance off the success that the director of the secret service has had today. The director will be here a very few minutes before he asked to head back to washington. Thank you for coming today to what i think was a very important speech. [captions Copyright National cable satellite corp. 2018] [captioning performed by the national captioning institute, which is responsible for its caption content and accuracy. Visit ncicap. Org] later today, a live preview of a new series of landmark acs from the National Constitution center in philadelphia