comparemela.com

City, in this region, but because Boston College is a a leader in thinking and educating on these incredibly important issues. So this is a great place to have it. Hope you will do it many more times. You are stuck with me for about another six and half years as id love to be invited back again. Odyssey in place called irish hall is a neat place to have this, given my background. What i want to do is share with you some thoughts about how the fbi things about the threat we all face, now the fbi is trying to address that threat, a key part of that approach is going to involve the partnerships that special agent in charge shall refer to. Once im done yammering at you i would love to be quiet and take your questions. Hope with type of that. You can ask me about anything. I am very slippery. I can avoid anything i dont want to talk about. The questions had to come from our tables, not our partners in the back. Let me begin by talking about the threat. To state the obvious, the threats are too fast, too big, and to widespread for any of us to address them alone. The way we think about fighting terrorism is very similar, the threats are to see, moving quickly. We need to Work Together to address them. That is every bit as to when it comes to cyber threats. Let me start with who we think of as the bad actors. I think of it as a stack of bad actors, kind of an evil layer cake. At the top of that stack from the fbis perspective are nationstates. Think china, russia, iran, north korea. Thats the top of the stack we focus on. Just below that and often closely related or multinational syndicates that are involved increasingly specialized roles to steal information, to steal money, to steal innovation through the cyber vector, and oftentimes doing it on behalf of nationstates, oftentimes doing it on behalf of anybody else whos willing to pay for it. So nationstates. International cyber syndicates. The next layer down, actually the group of people we would lump together on the insider threat. That is employees, workers, contractors who, for any number of motivations, might be moved to penetrate and network that is well defended from the outside by penetrating it from the inside. They can be motivated by personal grudges, i ideological beliefs, my money. Next down the stack, hactivists. This is a motley crew of people of all different motivations, some political, some financial, some emotional to try and conduct cyber intrusions. Actually the bottom of the stack, terrorists. The reason i put them at the bottom of the stack is that terrorists are adept at using the internet to communicate and recruit, to proselytize, but theyre not yet turned to using the internet as a tool of destruction in the way that logic tells us certainly will come in the future. So those are the threat actors. How do they operate . They are increasingly sophisticated focusing on larger targets. And looking to exploit the weakest link, which is human beings. Because as strong as we make our intrusion detection systems, as good as our firewalls are, we are only as good as the cybersecurity, the cyber hiding of her individual employees. So the whole stack of actors is focused on social engineering, to find out how our people think and work and operate, and see if there isnt through that expanded attack service away into even a well defended network. What are they after . Obvious, information, access, advantage. Its not just even about the loss of data. Increasingly, we are worried about the corruption of data. Think about the harm someone could do by an intrusion at a blood bank in changing blood types, and intrusion in a Financial Institution and changing just a few digits in the holdings of an institution. And of course were worried about the lack of access to data that shuts a business down. Thanks sony which ill talk about more in a second. E imcts vious as well. These are more than just a tax on our infrastructure. They are attacks on employees and customers. They are attacks on repetition. Reputation. They are attacks on our economy and our security and their increasingly attacks on our fundamental rights, the rights guaranteed to us as free people especially here in this great country. So what can we do . We cannot prevent every attack. The attack service is too big. The weakness of systems and people pronounced and ubiquitous, but this behavior is subject to deterrence. People conducting cyber intrusions are not high on crack. They are not motivated, inflamed by jealousy or some passion that often motivates people to bad acts. There is a lot of thinking that goes into cyber intrusions, and in that thinking we believe theres an opportunity to influence behavior, to cause, impose some thoughtfulness on people as they put fingers to keyboard. To do that we believe we have to be more productive and less reactive. We think there are three things that we can do together to address this threat. First, reduce vulnerabilities overall comment that involves us in the fbi helping you in the private sector and our partners that the government understand what are the bad guys doing, how are they coming after us, what other tactics, techniques, what are their fingerprints . By sharing that information we allow you to harden your targets against the bad guys. We also think part of this is making cybersecurity a priority at all levels. Im talking to a people who get it, but its a very, very important that cybersecurity not be one risk assigned to some guy in the basement of your enterprise to focus on. Because the threat threatens the entire enterprise so it must be thought of as an enterprise risk. It must be thought of at the board level, as something has to be embedded in every single thing that an enterprise does. Second, weve got to Work Together to try to reduce the threat, and i talked about that and dont hit that more when explain exactly what the fbi is doing. We need to find people responsible for the intrusions and hold them accountable in order to force upon bad actors some reflection before the act. And the third thing is, once any of us are yet we had to be effective at mitigating the damage. We think we have a role to play in helping victims understand just what has happened to them so they can get themselves back on their feet. Thats what we think we can all do together, but i want to focus on exactly what the fbi strategy is to ask when you ask questions you can poke at it and give me feedback. There are five parts to the fbis strategy to address all things cyber, and they are pretty simple. First, we are trying to focus, and by that we mean focus ourselves in a better way, and we are doing that a number of different ways inside the fbi that may not be apparent to you from the outside so i want to go into some detail here. The normal way the fbi assigned to work is by asking a basic question, where did it happen . Wherever it happened, we assigned to the field office where the place is. So where did the bank robbery occur . It occurred in the Boston Division of the Boston Division will work it. Where were these children victimized and hard . That happened in the Boston Division as of the Boston Division will work it. But when it comes to cyber, that framework breaks down because where it happened, if thats all you ask, you may end up with some fairly random manifestation of a threat that is coming from someplace on the other side of the earth, that is hitting many different places in the United States and around the world. It just happens to pop in a particular site of intrusion in a particular place. We think if we assigned to work based on that often random manifestation of the threat, we may not be at our best. We have developed something called the Cyber Threat Team model where were doing something due to assign work in the fbi. We are assigning cyber intrusion work based on who shows the chops to address that threat. Which field office has demonstrated the greatest ability to respond and detect, respond to and for a particular sophisticated adversary works whichever field office estimates that the best ability that we would give it to the field office. We call that the strap office, strategic office. Anthen because physical manifestation is a real thing and their executives that need to be talked to, the two enterprises have to be visited and interviewed, the physical machines have to be examined that sit in a particular place, we allow up to four other offices to help you we call those attack offices. To make sure this doesnt become chaotic, air Traffic Control for this effort is run from the Cyber Division in headquarters, a particular field office that a issue its upgrade at a threat to be in little rock, even though the physical manifestation of intrusion are in indianapolis and seattle and dallas. Those offices will help little rock but it will go to little rock if theyve shown there good against this threat. This has a knot and attend a consequence of generating competition in the fbi. We want people working to try and steal ownership of a threat from other parts of the enterprise. I dont mean steel by being sneaky. I mean by showing we have the chops in boston, you ought to give us this aspect of the chinese threat because we shown we can work it in a great way. We think i will have the effect the competition of lifting the entire Cyber Program in a good way. Second, we have come up with the concept that we barred from the world of counterterrorism here because counterterrorism requires respond at a moments notice that are horrific and maybe anywhere around the country, around the world. We have what are called fly teams when it comes to counterterrorism. Experts in different aspects of respond to an attack who have a go bag with them at all times when something happens in the United States, around the world, the fly team goes in hits that spot. So we search expertise to that place. We are going with the same sort of thing with cyber grou with cs on the gulf the Cyber Action Team, cat, where we have experts who know at a moments notice that to be prepared even though its a virtual world, you have to be prepared to be physically present at the site of a cyber intrusion and emergency event. These are experts who are all over the country but they are part of the Cyber Action Team and know thats one of the responsibilities. And last, in every field office to make this work we have Cyber Task Forces. Whereas you from hank shaw, we live the concept that we do nothing alone. We bring together rate talent from threat to Division Like boston to form a Cyber Task Force so we have the chops in each of our field offices to respond to threats, to collect evidence, to think in a great way about how the threat is moving. And the most important the cyber taskforces, to share information with the private sector and get appropriate information from the private sector. So thats one way where trying to focus ourselves the second way were trying to focus ourselves is by stealing your talent. By stealing the great people who work for you and you get your interests are not entirely aligned here, by attracting great talent to work for the fbi, to respond to the sophisticated threat. We all face the same challenge here, a shortage of cyber trained talent. Heres the challenge we face. We cannot compete with you on dell. You have more dough to pay people than we do. You dont come to the fbi for the living. If you did w rely to you during the recruiting process. [laughing] and theres no going back. We compete with you by telling everyone your lives are empty pursuits of money. Ours are meaningful [laughing] min pursues other protection of the American People. We badmouth you up a storm. I want to be transparent about that but the pitch we make to people is, come be part of this mission. Come be part of something that is really hard, that is really stressful, that does not pay a lot of money, that does not offer you a lot of sleep. How awesome does that sound . The good news is, theres a whole lot of young people who want to be part of that mission. Want to be part of doing good for a living. The New York Times did a survey i read last year of over 50,000 young people and asked him to name the ideal employer. 50,000. The fbi was number five. Apple was number four which is a painful thing to contemplate. Often its not a Great Company but went to be in ahead of them and terms of attracting people to be part of this mission. One of our major challenges is, summed up by one of my daughters, who said to me, that, the problem is you are the man. Which i thought was a call from it so i said than thank you, i e man. [laughing] and she said, no, i dont mean that in a good way. The problem is you are the man. Who would want to work for the man . My reaction is, youre right but you because if people really knew what this man andoman, the fbi are like, they would want to be part of this mission. So we are about trying to get out across this land and show people what this is like. The fbi is an addictive life. Almost no one leaves. No matter what you look like, no matter what your background, you become a special agent, our turnover is about the same. About. 5 . It is addictive work and so were about trying to show people, including your talent, what its like to be part of this mission. And part of avoiding this you are the man trap, is to be a little cooler that i may appear, to offer these talented young people and enterprise that is more agile than it might expect we are not going to beanbag chairs and granola and whiteboards but we are trying to to that. To make sure that his great young people understand that although we are enormous, there are opportunities for innovation and agility inside the fbi that they may not realize. New responses to old problems will come from those creative young people who joined the fbi. Something else we face as a challenge, to be a cyber special agent of the fbi, you need several buckets of attributes here we need integrity, nonnegotiable. We need physicality. If youre going to carry a weapon of the United States of america you better be able to run, bike and shoot, even if youre specially mostly keeps you behind a keyboard. And we need high intelligence and a specialized kind of intelligence. Those are rare attributes in nature here we will often find people of high integrity, high intelligence who cant do a pushup, or we might find people who can do pushups and a great behind a computer but you want to smoke weed on the way to an interview. We need to figure out how to find people high in integrity, physicality and intelligence. One of the things were considering is can we grow more of her own . Attract those great people of integrity, a physicality, of intelligence and and grow our own specialization inside the fbi to meet the need for the talent we have today. So i dont want to give away to me more of our secrets about how were going to approach this, but among the things were done to think about is are there better ways to offer an interchange between public and private . The sabres and made everybody next our neighbors to everybody else. Belarus and boston are next for neighbors on the internet. The bad guys have made a small paved the way we have to respond is by shrinking it back on behalf of the good people. The first thing we need to do is make sure we are clear inside the government on who has the responsibility is feared at the end of the end the president the end of president obamas administration, he offered his clarity so wanted that makes the thin spirit i hope you know if youre at this conference the fbis responsibilities threat response. To figure out what the bad guys are doing, respond to intrusions coming to understand the threats and a great way. The department of Homeland Security is responsible for threat mitigation, especially helping people hard in the targets to a weight being victimized and be great at helping people get back on their feet. The director of National Intelligence responsible for making sure we all have the intelligent we need to understand threat admittedly responsibly. Heres the deal. It shouldnt matter who you call appeared one of the things have gotten better at as the country since september 11th as it does not matter to whom he reported terrorist threat. If you have a tip and walk up to a sheriff or Police Officer or an fbi agent, it doesnt matter because the information will get to the joint Terrorism Task force almost in that way. We have to get to the same place when it comes to cyber. Its not your job to figure out exactly whos doing what. We have priority, but you dont need to remember that. We are getting pretty darn close where no matter who you him for information tickets to the people who need to act on it. That should be our responsibility and not yours. Around the world we make the world smaller by Forward Deployed our people. Moores favor antishake of the special agents embassies around the world and Intelligence Analyst who specialized in favor. Even though the Digital Thread is moving at the speed of light, it relies upon human relationships to shrink the world for the good people against the bad people. Third, we are trying to impose costs. I alluded to this earlier. We want to make sure the bad actors that tiny keyboard, they feel our breath of there not we believe that they breath on their neck coming that will change behavior. We lock people up to engage in cyberintrusions and impose costs that often times people think theyre halfway around the world. Are you going to find a cybercriminal . Cybercriminals vacation. They go on honeymoons. They go to visit friends and by knitting together the good people of Law Enforcement and National Security, we are able to lay hands on those people are much more often these days than ever before. That imposes a cost that makes the others think about us. Even if we cant actually luck people upcoming important to call it the combat, to name into shame it. We did that two years ago with actors in the Peoples Liberation in china. We did it by inviting that are spread by renegade in the service attacks in 2012 and 2013 and we believe thats real effect. A wanted poster with your face on it, even if he sent halfway around the world working for another government gets your attention. You to dream of your children going abroad to be educated. We have many flaws because they are human and from the fbi. We are talking people. We just gave up on db cooper recently i think. Took us over 50 years to get that one out. That man jumped out of an aircraft over the cascade. We dont give out. Your doctor people who do not forget everything that has impact on people. We think it changes behavior and puts our breath on the back of our mac. Part of this is grappling towards the words. Cyberspace is relatively new to all of last and we are bit by bit trying to establish norms of behavior. Among the key words weve had discussions with counterparts in china about the last two years our understanding of a framework that goes like this. Nationstates engage in intelligence gathering. They always have, they always will. The attachments that to steal information for their advantage as a nation here that goes on. Below is go on. We will try to get better. They will try to get better. But nationstates do not do with cannot do is steal stuff to make money. To steal innovation, formulas, plant needs in order to benefit commercial enterprise. That is criminal behavior. That is very different from the nationstate engaged in espionage. Believe it or not since the indictment of the three pl reactors we have agreement with the chinese that framework makes sense and weve seen positive steps towards an embracing of her work in understanding the difference between criminal committee and helping us investigate the criminal activity. We are working hard whether to indictment, rest prosecution and naming it calling out towards establishing through norms than people think about us before they put their fingers on the keyboard. The poor thing we try to do is help our state and local partners do with the fact that almost every criminal investigation today requires Digital Literacy. The good old hmos have been around a while, you could execute us each a drink search warrant and find one of those black composition notebooks for the morons wouldve written who got how many kilos and who got money and how it was split up and who is going to do what you do with the lookouts, the runners, enforcers. Today the same search warrant requires you to take and explain lawfully pdas, laptops, tablets, all manner of digital devices to do anything in the criminal investigative world requires Digital Literacy. One of the pieces we tried him at his value to american Law Enforcement is better trained in, better charter ship to uplift the tide of Digital Literacy across the United States. The fbi as big as we are simply cant get to all intrusions that are coming to people through the internet. People get emails from the state in nigeria to wire the money. Im not in nigeria. I dont never need you to wire me money. Those fries rip off people, especially old folks, Vulnerable People and someone needs to investigate that in a good way and that is almost always are great partners in state and local Law Enforcement and we think we can help them do that in a good way. The last partner strategy the most important for the conversation. We have to get better working with the private sector. He was the private sector are the primary targets of cyberintrusions because the data coming innovation, money, everything on your networks because that is where he says. But at the bad guys are in nationstate for fraudster by the functional equivalent of a bank robber. Heres a depressing fact. The majority of intrusion in this country are not reported to us. They are kept from us by companies who thing we just need to take care of this thing and get on with their business. We dont need to be entangled with the facts. It will be such a hassle. We need to remediate this threat and sometimes very wrongly in my view we need to pay this rant done and move on with operations. That is a terrible place to be. It is a great thing to hire the Excellent Companies available to you at your beach and remediation, but if the information is not shared with us, we will all be sorry because youre kidding yourself if you think ill just remediate this thing and it will go away because it will never go away. He will be back to hate you, hate your neighbors, your family. It is shortsighted to conclude that our interests are not aligned when it comes to this. People think the fbi interested longer among term. We have the same. They are the same interest because the nature of the threat. By yammering that you constantly to explain to you how we operate and why we are proud to an expert at treating me like the victims you are. We have gotten very good over the last 100 years at treating victims of Violent Crime like the victims that they are and making sure the disclosure of personal information, so they are not retraumatizing ir engagement. Weve also got good at doing that in the cybercontext in a way people will not realize. It is a bit down and will be treated that way by the fbi. We know that one of our obstacles as we did conservative general counsels. They were worried about whats going to happen to the commissiocmissio n we share with the government. Will hurt us in the competition related lawsuits against s. Or violate obligation in a different place . What will it mean with regulators . Theres too much risk with this. Lets remediate and move on. We think we have a compelling case to make based on a track record of hundreds of hundreds of investigations that we will protect your privacy. We will not share data about your employees and operations and we will have an adult conversation at the beginning to explain here is what well do with the information you share with us so that you as a general counsel, chief, ceo can make a judgment about the risks and benefits. Maybe after you have the adult conversation you decide i dont want to cooperate. Its highly likely went to understand how we operate that she will appear your main question is what do you need from us . I would suggest to you what we need from you is for you to get to know us before there is an intrusion. I guarantee all of you have significant facilities, relationship with the Fire Department. The Fire Department does your layout, generator plants, nospaceon up under operation. They dont know your property. They dont know any information that they know enough so in the midst of a crisis smoke all around they can save lives of the people who work with you. I think we need to get to a similar place. We were able to respond to the attack on sony very quickly and stop the bleeding because we knew it. We didnt know the proprietary information. We dont know secrets. For not reading emails. T we d the chief Information Security officer for the basic contours of their network. We do physical location. We know enough to be on the ground within minutes, hours publicly, and maybe even then its to try to begin to work that because sony had taken the time to get to know us. Armed with that, we found our way through a hole in his mouth will personae which is a tradition of attack. If youre the chief Information Officer a private enterprise and you dont know someone and every single fbi office or you have a significant facility, youre not doing your job. Know that you push on an open door. We are not looking for your proprietary information but we need to know you so we can help you in a difficult circumstance. Part of building a relationship of trust as conversations beyond the formal framework. Since the 1980s days 1980s theirs and statutes of the books called the classified information procedures act. One of the cias worries and working with the fbi for many years was if we give you people information and you end up using a criminal prosecution to disrupt terrorists or spies, will you jeopardize her sources and methods and we would say for years theres a statue that provides that we can protect your information. But that didnt get it done. It took case after case after case two est by fbi to show that actually will work, that we will protect your information. We will not earn your sources and methods. That though they trust on the culture of trust and understanding. We have to do something similar with cyberintrusion. I can stand here and talk about what were going to do come our protect information. We have to show it to you case by case by case to build a reservoir of trust and we are all about that right now and i hope youll engage in the conversations to help us get to that place where it is a majority of cyberintrusions and i would hope it would be close to all discussed with Law Enforcement so we can figure out whos coming after you and how can we stop it from had been again . Those are the five parts of the fbi strategy to address cyberintrusions of all kinds. One topic that is front of mind even though we havent talked about it publicly in the last six months. Weve been distracted by other things. Talk about the impact of ubiquitous strong encryption on her work. I want to urge you to continue to engage in a very complicated and difficult subject. The advantage of default me ubiquitous strong encryption is making more and more of the room in which the fbi investigate and dark. Ill a verb metaphor here. Theres always been a quarter of the room where the fbi operates, were sophisticated actors work who have access to encryption. Its always been around. [inaudible] thats all the time when i was. Thank you. Picture a room. Theres always the corner of the room is dark to us. In the quarter were sophisticated actors. Nationstates come in spies, the most sophisticated criminals who find ways to encrypt data on the device and find ways to encrypt mostly the nation state, communications and motion passing over a liar. Whats happened to last since the summer of 2013 is more and more of the room has gotten dark. As encryption has become the default, no longer just the province of the sophisticated actor, but because it is sold on devices and available to huge numbers of acts, it becomes the future of the work of the less sophisticated of drug dealers, Armed Robbers commentaries, that people of all sorts. What is happening to us now and well talk about whether its better good. That shadow is spreading from a corner across more and more of our work. In october, november and december, the fbi received to our experimenters 2800 devices for which we have lawful authority. These are devices seized by state and local Law Enforcement or by the fbi. 1200 of those devices, about 43 . We could not open with any technique. These are devices recovered in career criminal Investigations Committee investigations commit investigation, counterintelligence investigation with any tool we could not open 43 of those devices. That is a big deal. The question we have to ask ourselves is what do we want . We all value privacy. We all value security. We should never have to sacrifice one or the other. Our founders struck a bargain at the center of this amazing country of ours for over two centuries and a bargain goes like this. In every country, all of us have a reasonable expectation of privacy in our homes, cars, devices. It is a vital part of the american. The government cannot invade privacy without good reason, reviewable in court. Thats the heart of america. It also means with good reason for viewable in court, the government or Law Enforcement candidate or private spaces. That is the bargain of ordered liberty. The most common example upon person is probable cause to believe there is evidence of crime in some space to control whether thats your house or safe deposit box or car, Law Enforcement goes to a judge, makes a showing of probable cause and get the warrant. And then, Law Enforcement can search where the judge told them and seize whatever the judge told them they can use. They can take whatever the judge permitted them to take. Heres something i dont mean to freak you out with that is true. Even our memories are not private in america. Anubis can be compelled in appropriate circumstances to say what we remember, what we saw Peer Communications for spouses, clergy members, attorneys are not absolutely private in america appeared appropriate circumstances a job can compel anyone of us to testify in court about this very private communication and theyre really important constraints on my enforcement as they should be. One was always accepted in this country. There is no place in america outside of judicial reach. Thats the bargain. We made the bgain over o centuries ago to achieve two goals. To achieve the important goal of privacy and to achieve the very Important Role of security. Widespread default encryption changes have bargain. In my view it shatters the bargain. Theres something seductive about the notion of absolute privacy. I love privacy. I have an account. I have nine followers. One daughter has a serious boyfriend. I let them in because they think its going to work out. I dont want anybody looking at my pictures. Not an appropriate, but they are pictures of my life, where he traveled, what i see, pictures of my children. I love privacy. But i also loved and lived by the bargain i talked about at the heart of ordered liberty. If we move to a place for a wide swath of American Life are off limits, that is a different way to live. That is a change of something at the heart of our country that affects National Security case is that the fbi works on a criminal cases. It is something we have to talk about. Not something in my view that we should drift. I do want to get the place where people say to me how come you didnt tell us that the room was going dark in which you operate. Im not going to let that happen. And keen to force a conversation that people understand the impact. I know people could have had great conversations with people who see it differently as i do and thats fine. I hear people say you ought to get the data. Or you can do awful hacking. You can develop in secret technique that would allow you to bust into those 1200 phones you can open today. Heres what i dont think people realize. Metadata is very commit very limited, especially when you talk about an obligation to prove guilt in a criminal case which is a burden that i love and accept. Metadata alone is unlikely because she dared in a case involving a, gangster or terrorists. Ill have another technical tools can be useful, its incredibly expensive and it does not scale. You may be able to develop a tool to take a particular device to quantico and open it. They can abuse probably because its parish of all. It doesnt solve the challenge state and local Law Enforcement talked about all over the land. Some folks say are you suggesting we weaken encryption . I want either of those things. I actually believe it is not a question of whether we like strong encryption or weak encryption. I love strong encryption. Music to protect fbi information. Its essential to protecting the kind of cyberintrusions i talk about. Strong encryption is a great thing. But we also believe user control of data is not a requirement for strong encryption. I give you an example from the fbis life. We issue electronic vices to her workrc but we still retain control over those devices and in response we have the ability to produce, access devices and produce information. The ability to do so by design does not require weak encryption. It does require us to design the system in a different way that they guarantee every business is doing. Thats why describe not so much a technical issue, but a Business Model issue. It doesnt solve the problem, but it frames it in a way that makes more sense. Heres the deal, though. It is not the fbis job to tell the American People how they lived. Our job is to investigate. When our tools are less effect is, you want to know about it so you can figure out what to do. I also dont they get the job of Tech Companies to tell the American People to live. Their job is to innovate in so great stuff, stuff that i love. But its not our job or their job to defend a question at the heart of how we govern ourselves. Its the American Peoples job to figure out how we live and how we want to govern ourselves. We need to do a few things. We need to stop over secret each other. There are no evil people and all this to pick the fbi against apple even though they are the number for most desired employer. They are an awesome company. I love their stuff. They are not evil people. They weigh things differently than i do. Thats okay. The bac the world to darkly. Maybe they see it not enough because they live where its sunny all the time. I dont know but there are tivo people this conversation, people who share the same values. We need to stop over secret each other, tweedy met each other. When he defined the space to have a really hard conversation about how we want to be. We need time. We need space. We need information and we need an understanding that everyone is approaching this debate with an open mind and a genuine respect for the rule of law and for privacy and public safety. My hope is we dont drift, that we used the opportunity of the new year to have a fresh conversation about what can we do, what might we do to help stop the ninth both of those values. The cyberthreats we face are enormous. I dont know if we can stay ahead of them. Otherwise would be hubris. We stand in the middle of the greatest transformation in human history. All of our lives change in incredible ways. It requires a humility on the part of the fbi and all of us who care about the issue that we may not know enough come away not be smart enough or be fast enough, the starting from humility allows us to make better decisions. They have to be humble is to know we are pretty good but we can be a lot better. We need to ensure cybersecurity is a priority for every enterprise in the United States at all levels. We do get better and faster sharing information in appropriate ways. Picture we had to make people on board and build trust between the government and your 10 most of all we need to work this together because the world has shrunk from a canal of us the good people and our neighbors as well. Thank you for being part of that conversation. Thank you for being part of the solution. Thank you for your willingness to make us safer. I appreciate your listening to me. [applause] okay, at 10 minutes. Ask me tricky questions. Will breakaway here to the u. S. Senate momentarily when they come in today. The senate will be considering the nomination of former senator dan coats to be

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.