Good afternoon. My name is tom johnson. Im proud to say along with murray a supporter, i am a cofounder of what we think is the new Atlantic Press club. Today is the second largest press club in america. It is by far the number one press club in america. Of the a joint meeting leaders of the Commerce Club in the press club. The time, he ago, leader ofan and the the, you can idea to bring mediaer the atlanta members, have speakers that would have the message be important to the community. Late general betray us and we can go down the list. I knew absolutely nobody on that staff in 1965. I had no political connections. I was not part of the president ial family is in my last name is johnson. [laughter] agent inly for me, the charge of president johnsons protection of the time was Rufus Youngblood from my hometown. He and i became good friends. Hurled,ufus who literally hurled, johnson to the report of a limousine and placed aftern body on top of lbj the fatal shots were fired at president kennedy on the faith in thel november day president ial motorcade. My friendship with rufus was the beginning of a 53year association. With the United States secret service. Asker. T an i have never asked them to do anything for me. But i want you to know i developed the utmost respect for this organization. After the kennedy assassination, rufus and an agent replaced resident kennedys detail president ial protection. Then secrethe arvice director, after who major secret Service Facility was named, those two agents successfully pulled off an edgar hoover to have the fbi takeover over president ial protection after the dallas assassination. Much to mr. Hoovers disappointment, president johnson did not transfer or anyntial protection other elements of the secret service to the fbi. I also felt without the decision and the respect the president johnson had for his agents and the agency had gotten to know quite well, there might not be a secret service of today. There absolutely is your no organization that i would respect that more aberration than the men and women of the secret service and i emphasized the men and women of the secret service. There were no women as agents. But i have seen them stand at during the rain, sleet, freezing weather. I have seen them slathered with paint as they walked to alongside president ial limos. I have seen them deal with abusive white house Staff Members and abusive president s and with abusive reporters and media. Almost nothing that i guess they have not experienced. Smashing bones, almost hearing the crack in his foot. Worked overtime, many hours of which were not paid. They work on thanksgiving, christmas, and many other most peoplele suffer the troops are home and their families. Mccarthy places body in front of president reagan and took the bullet himself as john hinckley. Ired at president reagan one bullet ricocheted and hit president reagan. Those are only a few examples of the time when the women and men of the secret Service Placed themselves in the line of fire to protect president ial families and others. You might just think about last year. The multiple president ial candidates, 17 i think, at one point. They protected the pope as he toured washington and new england. They protected countless others. Multiple foreign trips with the president and the vice president. President trump is a large extended family, the protection of the president s homes and offices in new york and florida as well as the other continuing to invest investigative duties. Asked by thei was aputy director to access couple of major projects. Give me an opportunity to go back and work with the event leadership. One of the outcomes of that, in addition to some important the changeson, was we made outside and inside the government. Nside, the fbi and cia they were the best Public Affairs officers we could find and i am delighted for you to know the only person across the board in all categories as catherine middle on. Stand up and say hello. [applause] much to the dismay of the university of texas longhorns, chose a newump director of the secret service and he is a genuine american. It is not like people to even talk about his record. [laughter] he rose to become a Major General of the United States. Arine corps he was highly decorated as a Fighter Pilot. He was one of those very rare Fighter Pilots described by talking. He served as acting director of the u. S. Customs and borders agency. He has been in many leadership positions. His number one job than, was protecting americas borders. The has continued to be task. He served in the marines for 35 years and got his bachelors from an end. He has got every award you can imagine. Am very honored he accepted what i think is his first Major Community events of its type and here to meet our leaders. Director ran don hays. Randolph hayes. [applause] thank you so much. It is a great honor to be here. I want to recognize all the a areas we have the atlanti in the room here. Particularly, our Law Enforcement partners. It is an important part of our mission sets on the protection side. Once again, it is an honor to adjust you off and a privilege to work with each one of you in this room. As i said today, particularly with our Law Enforcement partners so thanks for that. I will talk today about cipher. As it particularly impacts the Financial Sector of the United States. I am sure that is some interest to all. It is one of the primary missions that sets the secret service. We are required to protect the president. Were responsible for financial crimes and counterfeiting and supporting state and local agencies in terms of child exploitation. I want to adjust particularly the cipher area today. I will divide the sound into a number of parts and talk about havempact of cyber overall my wallet back and it has some cash in it. Not to nearly the amount of money i have. It is all electronic and everybody in this room would say cashbased electronics. , counterfeiting is still an area of concern for us. The biggest crimes in the amount of dollars going out in the cyber area. A big concern for us. And thealk about that Computer Forensics institute that to you. I will talk about our partnerships and Current Trends we are seeing. One of them being jacked putting. I will explain that in a few minutes. Future challenges. I will take questions. I will say i am not going to adjust protective operations. I think were familiar with that mission. If you have questions, i am happy to answer those. Im not going to devote any time to it for my presentation. As we all know, modern technology has substantially changed the work of Law Enforcement. The secret service adapted this earlier on as Payment Systems began to digitize and the environment changed. Eventually, you had no choice and that was just how it was. The environment has changed. Environment,et the the evidence in criminal investigations has changed because it is scattered across a number of jurisdictions. It may be across a number of technology providers. Rising, at t, microsoft, google, amazon, facebook, etc. May have some data. Rangece found in a wide of digital devices. Iphone, android, laptop computer. It is spread across a wide area. That presents challenges for us in terms of investigations. People are using cyberspace more to collaborate with each other to reach victims around the world while maintaining anonymity. They elicit good and information globally and organize for terrorist attacks. That is primarily an fbi mission something you are doing across cyber. It allows them to be knowledgeable of Computer Forensics, digital investigation. They identify the bad actors and have to collect evidence from a friday of Information Systems. That is why the secret service to adjust the issue started a national Computer Forensics institute. In 2017,ed to report the institute was authorized by congress officially, and formally recognized as the nations only formally funded Training Center to instruct state and local Law Enforcement and prosecutors and judges in current cyber trends, digital evidence, cyber crime investigated methods and challenges. One thing we do is to bring this into the core, they have a fiveoh 46week course five or six week course. The criminal evidence has spread across the different domains and across different devices, so it is very important to criminal investigators and prosecutors and judges that they understand how to work with the information. Provided training in this area for 600 state and local Law Enforcement officers. It is based on our cyber investigations strategies. We partner with academia, private industry, Law Enforcement, in the legal community. The part or ships are critical in combating cybercrime. As an example, the atlanta ec tf hosted a tabletop exercise partners here locally. The purpose of the exercise is cybermote awareness would incidents and how it could possibly impacts businesses. I will give you examples later on. Those who work in this realm are regime, the cyber area, are clever and how they exercise their criminal schemes. The secret service believed preparedness is important. Our proponents of information sharing. Briefly on partnerships, i would like to knowledge extraordinary partnerships with Law Enforcement communities here in georgia. Georgia state patrol, atlanta fire department. All of these are critical to us. One thing the service actively recruit do was to recruit partnerships and local communities. Part of guys we need the partnerships and we have to do protective operations for the president and other protective. Also, the collaboration between us and local communities with how we can best knock down the criminal enterprises that operating. Part twos overall, and i think you we have a strong also inship here and georgia. As an example, the recent visit to the College Football championship demonstrated how critical partnerships are to us. Without those partnerships we literally cannot part operate in these areas. We do not have enough people to against venue like that the threats that are commonly conveyed against the president. I just want to publicly knowledge the tremendous work we have in the advancing community in the atlanta community. Thank you very much for your cooperation and outstanding daytoday work. Thank you again. Current trends. Know, modern Financial Systems depend on technology, convenience, and efficiency. This reality increasingly exposes the Financial System sits transnational cyber threats. Examples are network intrusions, malware to obtain payment card information, and from a point of sale systems like your local macys or department stores. Using ransomware to hold critical information at risk. Access youronger files and theyre asking you to pay a fee. It is blackmail to access your data. We have business email compromise schemes were colonels take over internal business email systems in the direct transfers to domestic or foreign bank accounts. I have numbers of examples of imoe with a hack a ceos address and use it to solicit Payment Information and they use it with account managers to transfer money to overseas are domestic accounts and the quickly move them out into bitcoins our cyber currency that is hard to trace. We have a transnational jackration conducting putting jack putting. Jack putting is a form of malicious cyber activity that modifies the Computer System on an atm to cause the at t despite all that want what happens if they come in and unlock the atm that allows a key them access to the computer and the atm machine itself. They been the machine back up and they leave. If you knew the machine if , it the machine communicates with the folks who are running the malware and they download the entire contents of the dispenser into his back. , depending on how much money is in the machine, it can run from 10,000 to millions of dollars based on where the mostne is located in places use it like 7eleven or Something Like that. It is a very clever scheme. Theythe caches downloaded, reconnected to the internet and then all the bank knows that the machine is out of money. It was prevalent overseas in europe and also in south america and mexico. You can get a lot of money out of the machines in a hurry. It is about 40 bills for 20 seconds or Something Like that so it comes out pretty fast. If you see somebody standing by a machine with a back in their hands [laughter] i would just point out they are not there using their atm cards, right . Machines,f the bigger even though it downloads a lot of can take them an hour so for some of the larger machines it has a lot of cash in it and i talked about malware, ransomware, network intrusion. A famous cyber criminal was convicted in seattle for his role in a hacking scheme that 170 million in losses. He received a 27year sentence. His convicted within atlanta and las vegas. We located him and on his laptop he had more than 1. 7 million stolen credit cards. There are places you can go to obtain these stolen credit card numbers. You cant as an average citizen, but the point is, there is a lot of information out there that is stolen in available to criminals if they know where to get it and want to pay money for it. In this case, 1. 7 mine cards and he is spending a long time in prison as a result. There are more opportunities than ever for transnational criminal activities. The trends are related to major data breaches show there is increasing sophistication and to increasing financial impact. We also see more countries participating. Years ago i would have never thought of iran or north korea as a cyber player but in more recent years you see them coming to the mainstream to be involved in this criminal world. So let me talk for a few minutes about the role of u. S. Financial and Payment Systems. To understand the gravity of the subject i just discussed you have to understand the importance of the u. S. Dollar worldwide. The u. S. Dollar is still the worlds foremost reserve currency. I know the chinese have made progress but still the u. S. Dollar is the foremost World Reserve currency. Most are held outside the United States. 10 countries use the u. S. Dollar as their official currency. It is the u. S. Financial sector at the forefront of adopting modern communications technology. Obviously it is very important to us. This creates substantial Cyber Security risks. The industry estimates hundreds of billions of dollars of potential financial losses from malicious cyber activity. Lets think about criminal threats as a risk to financial and Payment Systems. Financial gain, as you expect, is a difficult driver of why a criminal would do this kind of cyber crime. And Financial Systems are a common target for both domestic and transnational terminals. These criminals use a number of different organizations to attack these systems. Some may have a core group in the city of they are going to attack. Some might have a globally dispersed network that have never met in person but they are able to connect themselves online virtually. Core members are usually located in a country where there is a limited Law Enforcement cooperation with the United States. There is a high degree of corruption and knows countries. The most significant threat to our nations Payment System is transnational cybercrime networks that emerged in the former soviet union space in eastern europe. This is where we see a large amount of our activity coming out of these areas, where they are operating remotely to perpetrate these cyber crimes, and we cant get to them because they are overseas. These are countries we do not enjoy extradition treaties with. So it is challenging for the secret service to get our hands on them. Once we have the sufficient information on them, we attempt to access them if they travel. We have a number of folks who we are sitting on in Different Countries right now who are awaiting extradition to the United States because they have committed cyber crimes. So that is how we tackle that. But this network of russian speakers in this case, is reaching the Global Information system. So they literally steal billions of dollars from the u. S. Organizations, they manipulate equity markets, they build and employ their own cyber attack capabilities. And so we consider these transnational organizations to be our top priority in this sector of cybercrime. Let me pause there for a second. I think as i look at our agents, we have accomplished a number of russian extraditions that have resulted in hundreds of millions of dollars of losses being prevented in u. S. Businesses. So are often successful in these cases, foreign governments interfere with extradition proceedings which violate their commitment to assist Law Enforcement. So a number of the countries with which we have extradition awaiting the russian government has actually come in and tried to pull their citizen back into russia even though we have an extradition awaiting on that particular individual. And theyve gone so far as to say they are accused of a crime in russia, but they are very interested in these cyber criminals not being lost to the United States and not being used potentially as informants to us or potentially being convicted and held in prison. They are very interested in that not happening. So they our place, basically, is that we want to be relentless in pursuing them. They are having a substantial impact on our Financial Systems and we want to make sure we do the best job we possibly can as the secret service to ensure this does not continue. We work closely with a number of organizations that have had these crimes happen against them. We normally work with them so we can develop information to get prosecutions and convictions. A very important area to us. Let me talk now for a few minutes about digital currencies. This would be things like bitcoin, ethereum, opportunities currencies,digital i couldnt possibly list them all. But they are creating new opportunities for criminals to participate in illicit activity. They are used in Money Laundering. There is a growing challenge posed by crypto ransomware. They have the potential to disrupt financial and Payment Systems. These are significant areas that we are trying to work in. A number of our agents specialize in these Digital Currency areas. Mehave investigated let give you two examples. We have investigated and apprehending the operators of two currencies. Ending their operations. The first is called liberty reserve. It was the largest Money Laundering case ever prosecuted in the u. S. Which involved over 6 billion of proceeds. Crypto currencies. The secret service is working actively with partners at treasury and across Law Enforcement to combat the use of crypto currencies. For illicit purposes. They are very clever in using these cryptocurrencies and also in these business email hacks. I will do just another example of that. One company was going to make their initial Public Offering of stocks via crypto currency. I believe they were using ethereum, but i could be mistaken. The ceo had his email hacked and the hacker sent the ipo out. With his basically account 0,000 went right into that account. As soon as it got to the account obviously it was a different ethereum of account he moved it over to a place it is hard for us to interact. We got some of the money back with a seizure warrant but part of it was lost. It just shows how clever they are. They hatched the actual ceos hacked the actual ceos account. Very clever on their part, very devious, and we have in this case, we havent identified the perpetrator but we did get some of the money back. We are still working that case. Let me talk now about some current and future challenges. I would just say that the subject of encryption is a matter for Law Enforcement that we are facing continuously as we go forward with technology. There should be no doubt about the negative consequences, the negative impacts certain implementations of encryption is having on Public Safety and the work of Law Enforcement. According to the House Homeland SecurityCommittee Staff report entitled, going dark, all the Digital Technology has brought value to the marketplace and devices with end to end encryption has presented Law Enforcement with new challenges. That actors are taking advantage in order to hide in the dark and conceal evidence. We all understand that members of the public including myself have a reasonable expectation of privacy as guaranteed under the constitution. In that regard the secret Service Needs to support the use of encryption. You can imagine, if we did not have encryption, how would you do your financial work . Do you want to send your credit card information over a nonsecure internet line . Do banks want to use nonencrypted information . Obviously not. We are big supporters of encryption overall. However, we are concerned about the increasing use of pervasive encryption that impacts our ability to investigate crime and identify and aid victims. Devices and services that encrypt data in this matter indeed the ability of Law Enforcement to conduct timely and thorough investigations. I will give you another quote here from the new york countys district attorneys office. He says Smartphone Encryption keeps digital evidence beyond the reach of Law Enforcement agencies with valid search warrants, making it difficult to build cases against perpetrators and deliver justice for crime victims. The Deputy Attorney general here recently stated that our society has had a system where evidence of criminal wrongdoing was totally impervious to detection, especially when officers obtain a court authorized warrant. In fact in our investigation, the most significant transnational cyber criminals have been dark for a substantial period of time. So to say that Digital Sources of evidence are no longer available and we now depend more on human sources to infiltrate or because this is the encryption im talking about. In fiscal year 2017, encryption was encountered in 46 of exams computer forensic exams conducted by the secret service. Preventing us from protecting victims. Fbi director Christopher Wray recently said to gain access to more than 7000 devices. He said being unable to access more than 7000 devices is a major Public Safety issue. Are notnued, we interested in the millions of devices of everyday citizens. We are interested in devices that have been used to plan terrorist or other criminal activities. I am not talking about Law Enforcement getting your phone because we feel like. Were talking about we have a valid warrant from a court to access the device. I would just mentioned, the secret service side, mobile phone encryption is especially problematic. In 2010 we successfully examined more than 2000 mobile phones. In 2017, the number dropped to 500. If you think about the explosion of smartphones between 2010 in 2017, percentagewise, that is a huge change for us being able to access the devices. While we recognize mobile device encryption is designed to protect the privacy of users, it also puts users at risk by hindering Law Enforcements ability to apprehend criminals. So the resulting impact is criminal activity continues. A lot of this information is stored on these devices and being unable to impact them being able to unlock them definitely impacts our ability to introduce the information into evidence in a court trial. The increasing use of unrecoverable encryption is detrimental to our ability at to effectively support the National Center of missing and exploited children. In 2017 we encountered encryption in 21 computer forensic exams focused on child exploitation. Our state and local Law Enforcement partners reported encountering encryption in 360 of their exams and child pornography cases. That prevented us from using the evidence in court and obtaining possible convictions. What are possible solutions . At this time, there has been no viable legislation to really address the challenge. Industry and advocacy groups are highly organized on this subject. In years past, being very much against it. It is, in a sense, bipartisan. There is opposition both on the republican and democratic side, and there is also support for it under republican and democratic sides. So it is an area of concern for Law Enforcement. We will continue to work with our partners to find ways to adapt investigations using communications technology, including the use of encryption. So we are determined to try to work under authorized court warrants. We will work with congress, the department of justice, and our friends at state and local Law Enforcement agencies to make this more of a reality. We will continue to work with companies and the Technology Industry to help them understand the way their products and services are being misused by criminals. I would just say addressing this issue is of paramount importance to us within the Law Enforcement community. Im sure you can talk to other officers around the world room who work in these areas, they will relate to you the significance of it. If we work stepbystep, we can protect the privacy of citizens at the same time we can allow Law Enforcement to do their work and ensure that criminals who are committing crimes are convicted and put in jail, where they receive their due punishment and also through due process. Im going to pause and move on to questions. But before i do that i want to thank you for the opportunity to speak with you. As you can see, this cyber area is not coming, it is upon us. The criminals that work in this area are very clever in their schemes. The jackpotting one is a great example of that. Focusing on the security of the banking sector, for the secret service, is critical. I might just point out that is why the service was created. It was not created to protect the president. The founding of it was right after the civil war. It was one of lincolns last acts to authorize a service that would work against counterfeiting, which was prolific. About 40 or 50 of notes in circulation were counterfeit. They were substantially impacting our Financial Sector. It is still our mission set, it is a different realm now in cyber but still very important overall. I am going to pause there and take questions. [applause] cspan, an opportunity to get to you, if you would come to where the mics are, we will take a few questions. How does it feel to be the first outsider to head the United States secret service . Randolph good question. I think it is a tremendous organization. Im very impressed by the quality of the people in the organization who we recruit. We have a number of former agents in the room here. They can speak to that also. The men and women who make up the secret service are of an exceptional quality. It is very much my privilege to be able to lead the organization. It is just a tremendous honor to be there. Identify yourself, if you would please. Im the director of the Georgia Bureau of investigations. I wanted to publicly thank the secret service for the support given to the state of georgia in our child sex trafficking and child pornography investigations. Your agency is a key partner and we would not have the successes which we had without the secret service. Randolph thank you, appreciate it. My question is this. The cyber investigation Training Center in alabama is a critical cornerstone of training state and local Law Enforcement officers on how to conduct cyber investigations. Theres a waiting list for state and local investigators to attend this course. So my question is, is there any plans to expand the capabilities of that center to train more state and local Law Enforcement . Randolph quick answer, yes. We have requested, through the department of Homeland Security and through the office of management and the budget to increase the overall budget of the secret service by about 470 million per year. Part of that is to bring the national Computer Forensics institute up to full capacity. Right now it operates probably at about 33 capacity. There are plenty of facilities in alabama to train folks. That is not a question for us. We can probably about triple the current work. Again, it is money to do that. We put about 10 million per year into it now. We would like to ramp that up to about 25 million, 30 million per year. Our intent is to start doing that in 2019, 2020, 2021. Assuming we get the budget increase we were asking for. It is important that we recognize that without that, a lot of Law Enforcement agencies are just kind of left without any capacity to work in the cyber area. They cant access the information off devices and cant introduce it into evidence without some kind of expertise. So that is our plan. We have bankers in the room. What do the local bankers do to make sure they are taking advantage of the resources that you are describing . Randolph i think for ncfi ncfi is focused on Law Enforcement. I would just say working with our local cybercrime taskforces is where i would go. Theres one in atlanta. Thats how we got the information out of the jackpotting. We discovered, as soon as we posted that information, that there was more going on than we expected. That is the best place to connect in terms of cybercrime, financial crime. I would access them right there. We have a very robust staff in washington, d. C. They work in that area also and they hook right in to our local Electronic Crimes Taskforces. Director, im president of a local company here in atlanta. We are definitely seeing an increase in bot technology. Faceless and borderless crimes. Dot specific recommendations you have for private enterprises to engage with you organization to help follow these folks and try to prosecute them . Randolph again, the best place to hook in is with our Electronic Crimes Task force. We are seeing more of those botnets that basically roam the internet looking for open devices that they can access. That was a problem, we had a camera hack at one of the municipalities where they lost control of their cameras. That was a botnet. Obviously, the ectf will tell you standard information which is to make sure your software is updated, make sure the patches are on your devices. For the more technical parts, i would refer to the ectf, is where i would go. The field office of the greater atlanta area. Stand so they can see who you are. [laughter] we didnt talk yet about president ial protection. You have perhaps the largest family largest offices in new york and in florida, and almost ofthe largest number protectees, people who in the past were not protected by the secret service. I mean, that must give enormous stress to the system. Particularly like here when the super bowl was coming to the the College Championship here. Give us some sense of what that is all about. Randolph one thing i should clarify is, the statutes that direct protection of the president and his family are unchanged. Ok . So that is nothing new. Any president who would be elected with that large of an immediate family would receive protection by law. That is in the statutes. The fact that the trump family is larger, there is obviously more stress on the service, but that has been the law for years. So it is not like that is really an issue for us. It has put a stress in the service. We are attempting to grow the service from our current size at 6000 upwards of 8000, 9000 officers and agents. So we can more adequately handle a family but also so that we can do more investigative work in the field as a just described. This stuff im talking about is very complex. You need very highly skilled agents to work in these areas. So having more of them available in the field to support our u. S. Attorneys so they can bring cases to trial is vital. Without that investigative background, there is not much the u. S. Attorneys are dependent on us and other Law Enforcement agencies to bring cases to him with adequate information so we can take it to court and possibly get a conviction. Tom come on up. If you want, if you could come over, because you are in the line of the cameras fire. There you go. Franklin, president emeritus, morehouse college. As you know, atlanta has an ensemble of institutions. The question is what you are doing with the Higher Education sector . What do you need from us, and are you hiring students . Randolph first off, advertise for us. We want to get out to all of these institutions. Im doing recruiting today, by the way. [laughter] just so were clear. So i think, locally, id look into the field office and make sure were getting out to your institutions. That is critical to us, to get out there and do recruiting. We do run a number of things called elacs, consolidating hiring centers in different parts of the country. It is a good way for someone interested in the secret service to apply to the agency and work their way through the hiring process in a very quick fashion. I would just mention those to you also. I think tying into the local special agent, making sure we are actually getting onto your institutions, hitting them adequately i think is very important to us. Tom director, you have the head of worldwide operations for cnn in the room. Jack womack. Tell us about the relationship with the agency today with the media. Randolph so, i think we tr to be proactive with the media overall. The media has a story to tell, we have a story to tell. I think im impressed with what i see in the media in terms of the interaction we are having to get the story out overall. I am pleased with that. I dont really have any complaints about that. I think its good. Tom not yet. [laughter] randolph theres always a negative story, right . Frank brown. For a young man like that, what does it take to get to your level . Tom what does it take for young men like those sitting over here to get to your level . Does that mean to be a marine Fighter Pilot . [laughter] what does it take to get to that level of responsibility . Randolph first off is the basics, education. So if you want to be in the secret service, to compete adequately, you have to have a college education. After that is hard work, consistency in your job performance, doing that day after day, innovating in what you are doing, making sure that you take care of your people. Part of what i do obviously is leadership. A key part of that is how you look out for your organization and how you take care of those that are inside the organization overall. Those are some of the things. I dont know if there is a particular magic pathway to director of the secret service. I should just tell you, this was unexpected for me. I was not planning on being the secret service director. Here i am. Obviously that is what appointments are like. I do think those basics are where you want to start to work from. Tom other questions . Here is one coming. Where should i stand . Please. E over here, bob wright, retired military and ceo of an ai company in atlanta. The past 10 years, it has been a very difficult challenging in the community of nations achieving all of the successes that we have to counter the cyber threat, but we have had successes. And if you were to look at stretch goals 10 years from now, what would you like to see take place in a Global Operating system to where we can thwart this threat . Randolph goodness, thats a hard question, i will have to say. From my standpoint, it is more capacity to investigate the crimes. I think in the Financial Sector itself, it is how we secure the Financial Sector. Encryption by the way is part of that, as you are aware. Encryption is a plus and a minus. Ensuring diligence and training on the part of those operating your systems i think is important. A lot of the examples i gave you are people who are basically just fooled. They are fooled by a very simple email. Divulge voltage they information that they shouldnt. This is one of the vulnerabilities. That information is used for nefarious activities against a company. The stretch goal for this is that, obviously, we have more investigative capacity, we have more expertise in the cyber areas, and we have more expertise on the industry side in terms of preventing these kinds of intrusions into the systems. Because a lot of them are maybe not as complicated as we think they are. They involve some basic breakdowns in the Information Systems in some of these companies. Some of it is as simple as updating software, or using software that is antiquated. In some systems, they are still using cobal. I went to school in the 1970s. Cobal is what we used in the 1970s. It is still running some operating systems and they dont patch well. So the updating does that. For companies, there has to be a certain amount of money devoted to Information Technology refreshment. It is not just whether the computer stops working, it is whether you can run it with the latest security and patches. Because the criminals are very innovative. They are always constantly updating and finding new ways to get into our systems. Tom Dave Wilkinson was one of the two agents on 9 11 with the president bush 43. Dave wilkinson, one of the only aircraft in the sky was air force one but he told the president of the United States that he could not return to washington from florida, told the president of the United States he could not return from new orleans, and he told the president , who had ordered air force one to return, that he couldnt. The agent said to the president , mr. President , what did your mother tell you that you should do . President bush said, always listen to the United States secret service. Dave wilkerson is the former agent in charge of atlanta, former agent in charge in austin, texas. He has done an incredible job of bringing Law Enforcement together in many ways. My question is, how safe are our cities today from another 9 11 . Randolph another tough question. [laughter] randolph i think safer than they have been. We expect the unexpected. So part of our challenge is to think ahead about what potential threats might look like in those areas, these counterterrorism areas. We think about, in protecting the president , where we put him, where he is, and where he shouldnt be. A lot of that revolves around how we develop information and intelligence toward threats around the president overall. I should mention that threats against the presidency are pretty much consistent, about the same they have been for 10 years. So if people think it is a matter of personality, its not. Part of that, protecting cities, is thinking about the outrageous or the unexpected and how you can counter and work against it. There is a mindset of doing that. When we think about what happened on 9 11, it was totally unexpected. Theres more of that mindset in Law Enforcement and certainly in the secret service as you think about protecting those who are in high levels of office. Tom before we break, the u. S. Attorney for the Northern District was sally yates. Many of you in the room know her. She had high visibility. Many of you have not met the current u. S. Attorney for the Northern District of georgia. I want him just to stand, please. [applause] tom i thank you for joining with us today to give you insight into the secret service. You should also know that the press club and the Commerce Club have invited to provide fairness, Christopher Wray, the current fbi director, to come back home and will perhaps speak here and try to balance off the success that the director of the secret service has had today. Thank you all for coming. The director will be here a very few minutes before he has to head back to washington. Thank you for coming today to what i hope you felt was a very important speech. [applause] [captions Copyright National cable satellite corp. 2018] [captioning performed by the national captioning institute, which is responsible for its caption content and accuracy. Visit ncicap. Org] announcer coming up tonight on cspan, at 10 00 p. M. Eastern, Federal Reserve chair Jerome Powell testifies before the House Financial Services committee. Than a conversation on Monetary Policy with former fed chairs janet yellen and ben bernanke. Later, the october 2017 Supreme Court oral argument in jennings v. Rodriguez. The court ruled today that detained immigrants did not have a right to timely bond hearings. Cspans washington journal, live every day with news and policy issues that impact you. Coming up wednesday morning, we will talk about the legacy of the late reverend billy graham and president trumps relationship with evangelicals with tony perkins, president of the Family Research council. Then we are live in santa fe, new mexico for the next stop on the 50 capital store. Joining us is former new mexico governor Bill Richardson on key issues facing his stay in the country. Also, new mexico speaker of the discuss howe on to National Issues are playing out in the state legislature. Be sure to watch cspans washington journal live at 7 00 eastern wednesday morning. Join the discussion. Federal reserve chair Jerome Powell testified before the House Financial Services committee to deliver the Central Banks semi annual Monetary Policy report. He said the economic outlook