comparemela.com

Those teams have some great capabilities. It gives you a great starting point. And i think that our first thought in 2010 was lets set up with the initial structure, set it up in terms of offense and defense and teams that could do offensive actions to defend the country. Anyone have anything to add to that . Yes, sir . Dr. Singer . Just two things. The first is the idea of assuming that our response would have to be limited just to cyber means. If someone carries out an act of war against us using cyber means we are not and should not be limited in our response to use other means, and thats why were seeing that kind of deterrence hold. The second though is as general alexander said weve built up great capabilities. There are many things mr. Snowden did but one of the other things he did was reveal we have very potent cyber offense capability capability. I would add to those who believe building up more will deliver deterrence. The question, why has not not delivered deterrence yet . Theres no question we have great capabilities and yet the attacks have continued to come. We need to build up deterrence or denial making ourselves more resilient so we can shrug off those attacks which, therefore, makes the attacks less productive. Thank you, mr. Chairman. Thank you, mr. Chairman. Dr. Singer, i must complement you. To found a Technology Firm is an act of genius. I also enjoyed your churchill quotes. One of my favorite is how he thought history would treat his role in world war ii. His response was very well, because i intend to write it. On this issue of deterrence and i think senator rounds really hit the point and i think we should follow up on this is the question of what is an act of wore and when will we respond because if an act of war isnt defined, your opponent has to know you will consider it an act of war and there will be a response. Mr. Singer i think your point is well taken. It doesnt necessarily have to be a cyber response. I do think there needs to be some response. Deterrence by denial ultimately you have to have some offensive capability. You have to be able to punch back or youre simply always on the defense. If youre nodding your head, i assume you agree with that concept. I very much agree. Ill compliment you in return. Ill have an article next week on this question of deterrence and the three approaches are what the committees wrestled with, very clear norms, so both sides, all the sides understand what is and isnt an act of war so that theres no miscalculation. The second is to understand that you can respond but you can respond in other means other areas, and its not just through military, it may be through trade or espionage. Theres a far more complex war where you hit me with a nuke, i threaten to hit you back. And the third is deterrence by denial, something that wasnt possible in the cold war, the idea of civilian. It would be an incredible useful concept and importantly Resilience Works not just against state level attacks but it is also effective against all the other attacks out there whether it is nonstate actors like terrorists or just criminal groups. On that point, general good to see you again and i think a point you made i hadnt really thought about was the idea of a join private sector Cyber Security effort perhaps facilitated by the government but not Government Environment so we dont have the privacy issues. It seems inefficient to have bank of america spend millions and anthem and target and walmart when in reality theyre all chasing the same problem and it may be that a consortium similar there was a Semiconductor Consortium years ago to deal with this in a joint way might save the private sector a lot of money. The government could act as a facilitator. Dr. Clark an important point made today and it was made in one of the hearings, instead of building Weapons Systems that have absolutely everything that will last 40 years and be by definition obsolete, we ought to build modular systems, if you will, that can be modernized on the fly rather than starting all over again. Is that essentially what your testimony was . Definitely. It gives you the ability to take advantage of the refresh cycle that exists for those smaller systems. We talked about moores law and how that results in a doubling of Computer Programming power every 12 to 18 months. And computers are at the heart of every one of our payloads whether its a sensor or a missile or even a smart bomb. Today an unmanned vehicle. We should take advantage of the fact that refresh cycle will be so fast and develop those payloads on a much faster time line. In trying to develop a weapons system that has everything for everybody at one time that will be fixed in time is just the wrong way to go. Which gets back to the requirements problem. If i define my requirements in isolation from what the technology might be able to give me in a near term time frame i end up aspiring to something ill never be able and the requirements proliferate because its the problem of a camel is a horse designed by a committee. Instead of defining the requirements in conjunction with what the technology has delivered. Mr. Singer if your article hasnt gone to press, i would urge a quote from robert frost, good fences make good neighbors. When people know where the rules are, thats when you can avoid conflict. Final question just for the record, mr. Alexander general alexander, very chilling in your early testimony that we wont have time for human Decision Making in responding to some of these kinds of attacks. In other words, the 30 minutes or an hour for the missiles is now in a matter of seconds. The question is how do we war game and prepare a response that can be done instantaneously without the intervention of human discretion . I think thats an issue my time has expired but i think thats an issue that deserves some serious thought and discussion. Thank you, gentlemen very much. This has been very illuminating. Dr. Singer, i would suggest its always darkest before its totally black. Senator ernst . Thank you mr. Chairman. Gentlemen, thank you for your support to our nation in so many varying ways. The discussion today has been very beneficial i think for all of us and our constituencies. General alexander, id like to start with you, sir. Weve spent a lot of time talking about the Cyber Threats that exist out there and the devastating effects to our networks should they be attacked or when they are attacked. And really the ability to recruit and retain some talent to deal with the cutting edge threats that exist out there. What id like to know is a little bit more how can we utilize our resevrve and our National Guard forces to bring in some of the best and the brightest . We have a lot of folks that certainly serve in very similar capacities and there is civilian employment. Can we use them to leverage our forces . Actually, senator, thats a great question. We were doing that when i was on. I know that continues. Each of the National Guard units are setting up cyber teams that would also help. As you note some of these have some of the best technical experts in the civilian industry that partner with us. You go out to washington, microsoft employees, all around the world. All around the u. S. There are some great there and it also gives you an opportunity to bring those on to active duty when you need them and then take them off. Finally if we work it right it helps provide security for the state and local government. I think thats wonderful. I know in my Transportation Company we had some computer wizzes working in the civilian industrial. There were Truck Drivers when we were mobilized, but a lot of talent that exists out there. And mr. Scharre, paul, i know we have spent some time talking about future personnel generations in our department of defense. And i would like to visit a little bit with you about again, the National Guard and the reserves and where you see their role in the future. Whether its army, navy, air force, marines. And how they can support future conflicts. Thank you, senator. I think this issue of civilian expertise is a unique capability that the National Guard and reserves brings to the table and this example of computer experts driving trucks right, and i saw many things in iraq. We had people misaligned. Not as aligned as they could be with some of the skills that are resident in the force and a process to actually identify those skills and tracked inside the department so if the nation needs to be able to draw upon that we would know who are these experts would be extremely valuable and a way to increase even further the skills and capabilities that the National Guard and reserve brings to the table. I think thats a great idea. We do identify our civilian skill sets through the guard and the reserves. I dont know that the dod truly pays attention to that and i think we have a lot of, as i said, talent and abilities that could be better utilized with the force. Do you think the dod will continue to rely heavily as we move into future conflicts in outlying years as heavily as they have maybe in the past 14 years . I think theres no question theyll continue to play a valuable role. We have given a lot in the last 14 years. Theyll continue to be a valuable contributor in the few door. Future. Ill move on to mr. Clark. I did lead my colleagues in a letter with concern for russias activities near some of our under water cables. And it is very concerning because these are fiberoptic cables and they carry senseitive information, communications, many of these things vital to our economic stability and i know that it is a very sensitive topic. But i think its vital that we talk about our interests. So are you concerned at all about the security that we have that exists or does not exist out there . And if you could expound on that, please. Im very concerned about it. Those cables carry trillions of dollars in Financial Transactions every year, about 90 of the worlds economy runs undersea cables as a result of that. The russians for a long time have had an undersea Reconnaissance Program and theyve taken we can tell by the areas where theyre operating that they are looking for something down there. Out in the open ocean these cables are fairly hard to find. You have to search a large area. Where they have their landings on the shore over in europe or the middle east, theyre relatively easy to locate and trace back into the water. Those cables could be easily broken. Theyre broken fairly regularly today in terms of trawlers. Responding or replacing those cables lies with industry. Youre talking time frames of weeks to months to repair a cable thats been damaged as a result of hostile or accidental action. We need to improve being able to rapidly respond to these attacks to restore the activity on the cables and need better Monitoring Capabilities where its a target rich environment for an undersea vehicle or a ship that will deploy a remotely operated vehicle to attack them. There are technologies that could provide the ability to monitor these areas well. Being able to find something small like dr. Singer or mr. Scharre talked about will be really hard. We need to detect the vehicles that could be used. Its a huge potential vulnerability that could be exploited in peacetime or war. I agree. I appreciate it. I think thats something we need to turn our direction to, also. Thank you, mr. Chair. To all of you who are testifying, thank you. The department of defense has used technology basically quality over quantity to stay ahead of the other countries. We are falling behind in our ability to rely on our technical superiority. Do you share that view . What are some very fundamental steps we should be taking in order to increase our capacity . Any of you can answer. Okay, ill start. I think one of the main factors is time. Talked about payloads over platforms. I would encourage software over payloads, being able to upgrade very rapidly. There are more fundamental shifts. Thinking of taking a major platform and breaking it apart entirely into a larger number of just the payloads that are all interacting together and thats something worth experimenting with and exploring. Are you saying that we should spend mormone money on r d or is it the way were structuring how the money is spent . The way we spend money is critical. The r d is very decentralized and fragmented. A more centralized focus on the key areas and efforts under way with the long range defense acronym. I think are beneficial in that regard. Senator, i would add i think its both the way but we dont spend enough on r d. And weve seen the percentages on the government as was mentioned in the defense industry. The issue is not just in terms of weapons but if you run out fof missile in a fight you may have to exit. Youve deferred to the enemy in that time. One more thing. We have a pretty good inventment in r d. In addition to that industry used to do a lot of research and development with their own money to explore capabilities that might be beneficial in the future. Theyve reduced that with the reduction over the last several years and the amount of procurement. That is in the past has given us things like stealth, like new radar technology. How do we encourage industry to be looking at problems they address with their new technologies. To have the potential of Technology Transfer and whatever research that theyre doing and developing. For mr. Scharre and mr. Clark what impacts do you anticipate relying on fossil fuels will have on planning and effectiveness of our future warfighters . And what is your assessment of the departments progress in terms of reducing reliance on fossil fuel sources . One is Strategic Risk and vulnerability. Another one is cost. But an important one is alternatives can increase the endurance for many various long endurance capabilities, particularly robotics that we could put on the battlefield. Better batteries can allow us to have persistent surveillance to protect the enemy for virulent months or years at a time. Its about not so much fossil fuels as reducing our energy independence. We have to project forces over a Long Distance because our friends and allies are an ocean away from us. So were generally transferring them over a Long Distance and even when they get there theyre having to operate at the very edge of our logistics change. So the energy they need in general would be important. In taking advantage of technologies that dont require fuel at all would be important. The idea of going to new Battery Technologies that last for a very long period of time and then recharged by the sun or returning to a docking station would be a very good way to reduce the tether that we have to maintain. Right now we have to have refueling aircraft and ships out at the edge with the ships that theyre refueling and then refuel a ship, for example every few days while its operating and then aircraft have to operate for a much shorter period of time before they need to be refueled. Moving to Energy Technologies that dont require fuel to be delivered to the platform on a regular basis would be very important. Thank you. Thank you mr. Chair. Sorry, senator hirono and i had to step out. We were celebrating the 240th birthday of the United States marine corps. Welcome the chair and the Ranking Member as members of the navy and the army a dark day. Gentlemen, thanks very much for your testimony. General alexander, i was actually struck by your testimony in one area that well, in a couple areas i thought was very insightful. This idea of cyber, this notion were constantly being attacked and you mention it in some of the dollars and sta tististics is eye popping. Theres been this notion of us being on defense, defense, defense. One thing that i liked about your testimony is you talked about a little bit in terms of offense where we invented the technology and were the leader. There are opportunities for offense. Could you provide examples . The chairmans statement of turning technologies into offensive advantages was illuminating from a historical perspective. What are some opportunities in terms of offense that we have with regard to cyber . There are a number of offensive capabilities. First and foremost you have to see what the adversary is doing, hence the need for the commercial sector to be part of the solution. So whats hitting them can be seen by everyone. If you think about how two computers actually talk, i want to talk to you that takes time. And if you think about a computer trying to get in while thats happening, if the government can see it, the government can stop it or do things with it. You have opportunities to change whats happening in cyberspace with offensive tools that would de defend the country. The issue comes down to so what would you authorize Cyber Command to do in order to defend it . You might say im going to let you do everything to block everything from where its originating from but i dont want you destroying systems yet. Were going to go a step further. But technically speaking, and youve seen this you could destroy a computer in cyberspace by getting on it and doing certain things to it. Its public record. Now all you need is access. You take the capabilities of an nsa and the fbi at times and put those together. So you have tremendous opportunities. When we look back at our capability were the most integrated Network Society in the world and we look back, look at all these opportunities and you look at ours on the defense you say, man, were broke. If we throw rocks, we have all threes glass windows. The first step, fix those. Just a related question. I know theres been a lot of discussion in this testimony on occurrence and it seems to me i would welcome any of your opinions that if youre from an authoritarian regime like russia or iran or china that they in some ways have an advantage because they deny and lie oh, we had nothing to do with that even though they did or they do. You mentioned one example the iranians were attacking our Financial System. Would it make sense to say if you do that again we will crash your entire financial sector. If youre an authoritarian regime you can lie about who is doing it that the costs of all these attacks is almost minimal because we dont react. Should we maybe look at being more public and upping the ante saying, if you do this, north korea, iran china, well responsibility. And some of these countries, im sure we could crash their whole economy. What would be the problem with that deterrence that makes it more transparent but raises the cost . If we announce that wed have to act. Im curious what would you think of something more transparent from our perspective, and do we have a disadvantage when were dealing with regimes that routinely lie about the ishsue . Id say one thing we have to think about is the deterrent action might need to be proportionate with the action its intended to deter because it wont have credibility otherwise. If we say the iranians are attacking our Banking Sector that we would crash their Financial System that might be disproportionate and they dont find that a credible threat. If we did it, it may deter further action but may be seen by the International Community as being highly disproportionate. We might need something that they would say, they will actually do that. Thats where the response needs to be. Electronic warfare, jamming, small attacks on oil infrastructure, a small amount of collateral effects while also demonstrating the resolve of the United States that would be credible and we could repeat but does not cause a huge, damaging reaction. The challenge is theres not the mutual in terms of the old destruction so we are far more vulnerable to cyber attack than north korea, but thats actually a good thing because were integrated, we have freedom. We wouldnt want to be in that position that theyre in so recognizing the lack of maybe looking at other deterrence angles. I would add one more important thing talking about steering Cyber Command to taking on these roles in the civilian lead is moving it and us away from its role in clear warfare itself and the determinant of success or failure in future wars with cyber will not be thinking about it individually but how its integrated with other warfighters. Using it to take down an air defense so its cohesive with your warplanes going over. Israel was able to pull off an operation. Be careful of steering Cyber Command more and more to civilian roles. May lead us to success in nonwar but set us up for a fall in real war. I want to add some clarity. Thats the war game and the effort but Cyber Command in our Defense Department cant work without the Energy Sector. We need to defend in this area. We can defend themselves and push that out beyond the boundary. I think our Defense Department has to think more comprehensively of this whole thing. I agree going after all the targets is part of it but my concern is the easy thing, if i were a bad guy, id go after our infrastructure. Id take it out before you could respond. Make sure we have it correct. I want to thank you for being here, appreciate it. I want to follow up on something that you had in your prepared statement is just the start of a potential series of actions that reshape the international environment. Your experience of what comes next with moscow and what should we be doing to respond . I think everything thats going on is for putin to get more closure on Eastern Ukraine where the weapons platform that he really cares about are created. I think he wants control of that. I think he will continue to go for that. There is nothing that i would seen he will stop. He will lie, he will do everything he can and then help make that happen. Syria is a great way to push think of it as a feint. He can accomplish some real objectives. And is doing that by helping to shape what he thinks are the best proxies for russia, syria and iran in the region. People are still dying there. And focuses everybody on syria. I would not be surprised if over the next six months we see more action with syria im concerned about the tension that creates, we get to the point we have to fire back against russia or iran. If we do that well see their response in cyber. I really do. I think it will come because theres no way iran can come. Theyve been fairly good at stopping those but they can hit us with cyber. Disruptive attacks against the financial sector. So i guess i would anyone who wants to comment on this but as i hear you discuss this i think if we let him continue to do this without any response as far as i can see doesnt this become a fait accompli which we could see ourselves headed in this direction which will put us in a more dangerous situation. If you were advising the president , what would you tell him to do to respond to putin . I would say refocus on ukraine. It is a situation where we have a friend of the United States, not an ally but a partner thats under threat and better to defend themselves in the electromagnetic spectrum as well as in cyber. It would be really important to giving them the capability to defend themselves and the russian attempts to gain more territory and that would force putin to refocus his effort back onto that and make a determination whether hes going to resolve. Hes able to create influence without any counter. I think our vital interests in Eastern Europe and the middle east are at risk. I think weve already had some outcomes of the iranian deal. We lost some of our allies in doing this. And losing those allies is something we cannot afford to have happen. We have to step back and say what is our strategy . We have to deal with both at the same time. We need our allies to know were going to stand beside them. Its the same thing in Eastern Ukraine because everybodys looking at it, you made all these decorations about nato. Are you goinging to be there . And at times unintentionally our actions may look like were not. And what im concerned about when you talk to saudis, the israelis and others they think are you here with us or are you with iran . Whats your objective . I think we have to clarify that. Our nation needs to let our allies know were there for them. Thats the first and most important thing we should do and we should discuss with them how were going to stop issues in ukraine with nato and what were going to do in the middle east to shore up our allies there. Does anyone want to add to that . The last several decades of u. S. Defense strategy has been focused on the challenge of networks of individuals, criminals, insurgents terrorists and the problems of failed states. And moving forward were going to have to recognize its russia or china. We have to return to great state xe competition and what that means is that when we look at certain areas, we need to look at it of not through the failed state but proxy warfare as well. Were going to need to learn lessons of what does and doesnt work in proxy warfare and reframe our approaches along those lines. And on top of this is focusing on how do you keep a lid how do you win a competition but also keep a lid on it from escalating. Thank you, all. Appreciate it. General, just to follow up on your comment to senator ayotte, you say wed have to take some actions to reassure our allies, other nations in the region, in the middle east. What actions would those be . I think we need to reach out to saudi arabia the united arab emirates, kuwait jordan and egypt and walk to sit down with them and say were here. Some of the things we ought to talk about we say that all the time, by the way. And then put in place you know, when you look at it and you look at egypt, perhaps some of the best comments on a strategy for egypt, how do you get them stability . How do you get them security . You have to have energy to get jobs. 24 unemployment is really bad for us. Its bad for the world. How do we help get the middle east in place . They have enough money to do it. We have the expertise to help them get there. We have to look at the security, the stability, the Energy Sector and the jobs the Economic Development for the middle east to get them to a place where they can be looking forward to their future versus fighting all these issues were seeing with radical islam. So i think a comprehensive program like that led by our country and others in the middle east is a step forward and let them know that were going to be there not just for a couple hours but the next several decades. Right now the egyptian regime is becoming more and more repressive. 45,000 people in prison, no sem plans of any really progress on a number of areas which are in contradiction to our fundamental principle principles. This is a tough area. Ive been to egypt several times. How do we help them get out of this . In my dealings with our counterparts, they understand and want to do it. How do you get there . And there is so much tension in that region. Theyre going to have continued failed states and with those failed states now we have just another one. It seems to me at some point we have to come up with a new strategy that counters that. I personally believe that is some way of developing their economies. Dr. Singer, i have your book on my desk admittedly in a pile of books on my desk. I will move it to the top of the pile and the next time i encounter you, i will be able to given you a vigorous critique of your thesis that you espouse in that book. Congratulations on its success. Mr. Scharre, thank you for your articulate answers to the questions to mr. Clark and general alexander, a special thanks to you for your past service but also it will be the intention and they do work on a bipartisan basis, this committee, they start to look at the followon to the cyber legislation that we just passed through the senate and well be calling on all of you as we move forward with that effort. I think you would agree additional legislation is necessary, would you agree with that, general . I do, mr. Chairman. Thank you. Jack . Mr. Chairman, this was an extraordinarilyinsightful panel. You chose wisely, a west point commander who shaped his life, you have a submarine officer, an army ranger and a graduate of Harvard University good job, mr. Chairman. A signature feature of book tv is our allday coverage of book fairs and festivals from across the country with top nonfiction authors. Here is our schedule beginning this weekend. Well be in massachusetts for the boston book festival. Middle of the month its the louisiana book festival in baton rouge. And at the end of november, were live for the 18th year in a row from florida for the Miami Book Fair international. And the National Book awards from new york city. Some of the fairs and festivals on cspan 2s book tv. Up next military and local Law Enforcement talk about interagency cooperation information sharing, and training efforts to prepare for and counter threats of violent extremism against military personnel and facilities. The association of the u. S. Army is the host of this event. Good morning everybody. Im don loren and itch the have the honor of moderating. I would like to thank you for inviting me to do so this year. But, more importantly, for including these homeland sessions in this years program. Countering the violent extremist threat to the nation and to dod personnel and installations are increasingly important elements of todays military environment. Its fitting we have a meaningful discussion on this topic. I had the honor of moderating last years panel on Homeland Security issues here at ausa and im pleased to see this year ausa has expanded the discussion to several extremely relevant panels. I believe there are four pamnels this year. We saw secretary johnson kick off yesterday morning. I wanted to tell you that our Services Share many many customs and traditions while we in the navy do not do as good a job pronouncing hoola as you all do. The unit challenge point must entertain those who can at the bar. So to my good friend guy swann, dave perkins who is running around Perry Wiggins my new friends jeff snow and mike smith, here is my 31st anniversary army tenmiler finisher coin. My 15th. And i invite to you produce your coin or meet me at the bar later today to discuss it. I can remember in the mid1990s while a fellow at Harvard University having general sullivan visit us and engage the military fellows in stimulating discussion. The United States army exists to fight and win the nations wars. And while i will remain silent on the responsibility of my own service which celebrated its 240th birthday yesterday, i will say that there is no truer statement nor one more relevant than that which general sullivan professed then. Fight and win the nations wars. Ive heard general sullivan say that for 20 years now. We heard the chief of staff say that yesterday and add to that statement in defense of the nation. And make no mistake about it theres no other army, no other military, no other entity on the planet as capeable and competent as doing that as our United States army. But the nature of our nations wars has changed considerably over the 20 years that have passed since general sullivan first said that to me. Its not as simple as ten soviet divisions coming across anymore. No strategy document no longer addresses how we will fight and win two major theater wars simultaneously while conducting counter insurgency, peacekeeping or military operations other than war elsewhere. The nature of military operations has become more encompassing. In fact, the very substance of these Panel Discussions attempts to get our hands around what it means to defend the country. The threats we face as a nation have become more complex. These threats can come from rogue nation states, failed states terrorist organizations or lone wolves. Not only do we have to defend the nation defend our deployed forces, defend our interests abroad, but we now have to defend our installations and our personnel here at home. Connectivity and communications make actions once only the purview of nations possible by small groups of individuals. The separation between Homeland Defense and Homeland Security has become gray and less defined. As the u. S. Military organizes, trains and equips to play a role in this threat environment, it must do so in an environment defined by rule of law. An environment under the National Jurisdiction of the department of justice that spans the 50 United States, the territories, the tribal nations that make up america. And as the chief told us yesterday it must employ all of its components active guard and reserve. It must learn to interface with 72 Fusion Centers. It must operate with 8,000 Law Enforcement agencies and nearly 18,000 First Responder entities. When combatting the wmd threat and i personally would add cyber to this threat list as all our weapons of mass effect, we must train for those that are every bit as important. They must have resources to these Important Missions but cannot sacrifice the Core Competencies that make us the premiere fighting force in the world and must not seek a whole government approach to this task but participate in a whole of Nation Mission as president ial decision eight mandates. Whole of nation federal state municipal government, and private sector. And citizenry. We must defend infrastructure of which 85 resides in the private sector. We must defend military personnel in Shopping Center recruiting stations. We must defend military installations that are integral parts of their communities. We must defend these installations against classic connecticut attack and against cprne and against cyber intrusion and against inspired and directed terrorist attack. The 2014 qdr and the 2015 National Security strategy clearly direct the u. S. Military to defend the u. S. And support civil authorities at home. The National Security addresses the top Strategic Risk ss to our nation which include catastrophic attack on the u. S. Homeland or critical sfrat. The threat of attacks against citizens abroad and our allies. The proliferation and the use of weapons of mass destruction. And the effect of severe global infectious disease. The dod strategy for Mission Assurance tells us the critical criticality says we are capable and perform our Core Competencies as well. The recently released june 2015 National Military strategy of the United States requires an integrated approach to the tasks of providing for the military defense of the homeland, combatting terrorism, countering weapons of mass destruction and providing support to civil authorities. And my dear friend dave perkins the u. S. U. S. Army operating concept, win in a complex world the same title as this conference title poses that the u. S. Army is faced with multiple dilemmas. Its faced with multiple options. Must operate in multiple environments and mpartners. These are our marching orders. This is the strategic guidance that defines the world we must operate in. This is the complex environment in which we must defend america and keep the homeland safe. This is the battlefield in which we must fight and win the nations wars to defend america. As the strategic guidance directs, we must understand the threats to the force, including those posed by homegrown violent extremists. We must understand the issues surrounding force protection in the domestic environment and the cooperation required across agencies to better protect our standalone forces. We must undertake initiatives across state, local municipal and tribal domestic agencies and the army that enhance our force protection. And we must eliminate barriers that impede our abilities and take actions that increase our awareness, preparedness, and exchange of threat information in a Law Enforcement centric homeland environment. Todays panel will continue with Perry Wiggins discussion from yesterday, a discussion which included active guard reserve, osd and unified commander responsibility in defending america and keeping our homeland secure. Our panel today is eminently qualified to continue that discussion and from the multidimensional perspective suggested by the threat. Perspective that is whole of nation state, local, municipal and private sector. A perspective that is predicated on relationships, on planning, on training on exercising. A perspective that truly embodies the concept of one team, one fight. Leading off the discussion were fortunate to have Major General mike smith, the director hqda g34 protection. We then have major jeff snow commanding general of the u. S. Army recruiting command. We have mr. Chris klein Deputy Director federal protective Service Nation protection and programs directorate dhs. We have assistant chief lamar green assistant chief for Homeland Security bureau metropolitan Police Department of the district of columbia. And we have my good friend sheriff al cannon, Charleston County sheriff, and mr. Michael trapp deputy Provost Marshal of u. S. Army north. Weve got a lot to talk about but this all centers around your questions after everybody is done making their statements. So, thank you very much. And let me turn it over to mike. Thank you very much for that introduction and those opening remarks. Lieutenant general wiggins Major General hen chch, i am Michael Smith Major General and im the deputy chief of army reserve. I want to thank Lieutenant General tally for being gracious enough for me to continue on this important work and follow through. Its portimportant that we have knowledgeable people here and show the importance of working across the Interagency Community working with local Law Enforcement. The army g34 army force protection, was established in response to the investigation following the first ft. Hood shooting in 2009. The army decided to reduce gaps and seams across protection programs by operationalizing the family of protection programs under the auspices of the newly established g34. The g34 is tasked with integrating, coordinating and synchronizeing all components of Army Protection to ensure unity of effort among Headquarters Department of the army staff, Army Commands and other army organizations in order to develop, prioritize resource manage, execute and assess the full spectrum of Army Protectionrelated programs. The g34 also leads armys efforts to coordinate with the air force, the navy, the marines, the office of the secretary of defense and the joint staff and other Government Agencies including the department of Homeland Security and the fbi. After the ft. Hood 2009 shooting, the army recognized that the threat from homegrown violent extremists is real and we must take actions to protect the force. In the past few years we have hardened our installations those being large bases with their own assigned Provost Marshals, that is Law Enforcement, and now we are placing additional emphasis on the security of our offinstallation facilities, you would know them as recruiting stations Army Reserve Centers and National Guard armories where they dont have dedicated assigned force protection or specifically Law Enforcement officials. In the you may remember the september 2013 Washington Navy yard shooting where there were mass casualties, not long after that there was a second ft. Hood shooting in april of 2014. Our response to that incident showed that we had made significant progress and we were better prepared to respond. It also highlighted the complexities of trying to prevent these types of incidents. In the 2014 ft. Hood shooting the shooter was not motivated by radical antiamerican agenda, but rather a series of problems that spiraled out of control which eventually led him to lash out at those who he perceived wronged him. Most recently the chattanooga incident highlighted attacks targeting military personnel can occur away from our large military installations. They can occur in the communities large and small where members of the army reserve and National Guard live and work. Attacks involving military personnel and facilities are often used as propaganda regardless of the original motivation of the shooters our enemies will attempt to exploit the event, radical publications will proclaim the shooters to be jihadists and martyrs even though that was not the shooters original intention. Through numerous outlets our enemies encourage individuals in the United States to use their residence within the United States to enable attacks and further their radical objectives. In just the past year hundreds of names have been containing personally identifiable information has been released in a hope to inspire people to take action. Targeting can occur in many ways ranging from simple harassment to identifying people more specifically. We must ensure that the entire army team is aware of the threat and are properly trained to identify and report suspicious activities and respond when needed. One of the toughest challenges for the army is how do we address a threat that starts in the shadows like the shooter in chattanooga and only becomes visible at the onset of violence. To be successful we must address this at a few levels. At the federal, state and local level we need to continue to expand and our cooperation with local Law Enforcement partners by sharing information with agencies to our mutual benefit. We need to continue to respond in coordination with these local partners through execution of the National Incident Management System and ensure that our policies enhance interoperability and synchronize responses across judicial jurisdictional boundaries. Within the army we assure commanders that they have the authorities and the responsibility to respond whenever and wherever warranted. We rapidly inform Uniformed Service members and former Service Members when they are identified and potentially at risk. We coordinate Emergency Action exercises. Our personnel know how to react when presented with a dangerous situation particularly when Law Enforcement arrives. We continually assess and improve mass warning notification procedures and capabilities. At the individual level Service Members and family members are trained and understand that they could be targeted just because of the affiliation with the military and department of defense. We encourage them to be aware of their digital footprint ensuring that privacy settings are properly set for all social media accounts. With that i look forward to your questions and hearing from the rest panel. Thank you, mike. Jeff . Thanks. First of all, thanks don, for the introduction. And let me just tell you, general wiggins, i appreciate the opportunity to panelrticipate on the panel on a topic near and dear to my heart. Ive got the good fortune of commanding u. S. Army recruiting command, and i assumed command in late june, 23rd to be exact. And i can tell you the first trip i took was down to little rock, arkansas, to actually pin a purple heart on or to hand a purple heart to the parents of a young man who was killed in 2009 standing outside of a recruiting center. And pinned another one on another young man who had been severely wounded but fortunately had recovered. And then two weeks later we had chattanooga. So i share that to tell you the threat is real. And ive been in command long enough to circulate amongst those recruiting centers. In the army as in the army, all components of the army, weve got more Recruitment Centers than all the other Services Together all across the United States. And my assessment was that there were things that we could do to enhance our force protection obviously in the wake of chattanooga it caused all of us to take a step back and look at what are those things we can do to enhance our force protection. And the big part of it as general smith has just articulated, enhance those relationships. Ill tell you, i think weve got a good relationship, but for our recruiting centers and stations, we are very much reliant upon those relationships and sharing of intel and information and certainly are reliant on local Law Enforcement to respond when a particular threat is identified to our stations and center. So, theres a number of things i could share with you, but i got to tell you im one that is very much interested in your questions as opposed to me telling you the number of things that weve done. I will just tell you im happy to do so. There are a number of things that we can and should do to enhance the force protection, some of our soft facilities recruiting centers being one of those, and we have taken steps to do so. And theres a lot more that we plan to do to do so. But a big part of it will be to continue enhance those relationships. As was highlighted yesterday in the panel the importance of those relationships cannot be understated. It is it is one of those things you got to work at day in and day out. Its not something you do one week and then three four five, six weeks later you reach out. These are routine. I think we do a very good job of sharing information, but weve got to continue to do that. But its also one of those things you can never rest on your laurels. You got to continue to work at. Like general smith, i look forward to your questions. Thank you. Thank you. Chris . All right thanks. I promise, i had a blue jacket in the car that i was coming over here in and doris lynn who works with me said you probably need to take that and wear it because everyone is going to be dressed up. No its a Pretty Simple panel, no problem. So im the only one up here without a jacket on which makes me look bad. The federal protective service is a small component within the department of Homeland Security. Our responsibility is the protection and the Law Enforcement of all gsa, General Services administration owned and leased facilities about 9,500 across the United States. Dod offices and agencies occupy space in 995 of those buildings including 46 military processing stations and 127 armed forces recruiting centers. Last september as most of you are aware an online chat room associated with the Foreign Terrorist Organization directed their followers in the United States to act on their own and to target government officials, military and Law Enforcement. So, within those 9,500 gsa facilities a number of those three agencies are in there. Immediately following this announcement the federal protective service enhanced the protection of our highestrisk facilities by implementing 12 new protective measures at those facilities. And then not long after on october 22nd was an incident in ottawa canada, at the war memorial in parliament. Two of the three took place in ottawa on the 22nd of october. On the 27th of october secretary johnson who was with you all yesterday directed the federal protective service to enhance the protection of highrisk facilities in five cities. That lasted for 37 days. Other incidents occurred across the world, Charlie Hebdo and a number of incidents happened and we continued to respond to other cities. It started with 20 cities. 5 cities, 20 cities, 101 cities and this operation which we call blue surge continues today. We interact with dod primarily at the jttf, the national jttf out in mcclain where you have your military Operations Support team. Daily interaction with those guys, the dod agencies housed within gsa facilities. Thats where the interaction takes place and then thats where we get information to deploy our folks out to those recruiting centers and stations that are within our area of responsibility. May 7th this past year dod went to force Protection Condition bravo in conus. We sent our guys out to go to all those facilities that housed dod assets in our inventory to make sure that everything was in place to ensure it was properly protected and then once again after the incident in chattanooga we sent our folks back out to those facilities to talk to the tenants to make sure they were adequately protected. I dont want to take up too much time talking about things that weve done. Look forward to your questions. Thank you very much. Lamar . Thank you. Thank you for inviting the metropolitan Police Department to be a part of this board. I think one of the things that we continue to hear from the first panelists that spoke is partnership. Partnerships important and establishing partnership after an incident is just simply too late. We need to know each other work with each other, be familiar with each others tactics and procedures well before we have an incident. In terms of force protection, the lone wolf active shooter, the hve, represents a major threat to force protection efforts in a domestic environment. There have been recent attacks throughout the country and they have been so frequent in nature that its becoming something that just seems regular throughout the United States. And in my idea thats just not acceptable. Recent Mass Shootings to give you an example cupertino california, People Killed in a rock quarry carson city nevada, gunman comes in and fires opens fire on several National Guard members who are simply just having breakfast. Here in our own nations capital, the Washington Navy yard, subject enters that location and commits mass murder. There are various challenges as were mentioned earlier. Active shooters, lone wolves are very hard to detect. Theyre very hard to counter. So, our intelligence collection, our intelligence dissemination our partnership has to be operating at an opentimum level. The lone shooters have the advantage of knowing a location working at a location being familiar with their environment before they conduct these outrageous attacks. One of the most glaring qualities about these type of events its usually low tech and high yield in nature. The person usually doesnt have a lot of training. Theres not a lot of ways to track subjects that come in and commit these types of atrocities. Some of the Lessons Learned from the navy yard and ill touch on a few really quick. Communications. One of the things that we learned through our experiences at the navy yard in both incidents, we had the actual shooting that occurred in 2013 and this year we had a call that turned out to be thank god, a false alarm, but it was an excellent opportunity to see if some of the strategies procedures things that we put in place actually were effective. And in many cases they were. It may be prudent for military installations especially those located near largely Populated Areas to review their emergency call taking procedures and policies and ensure that their guidelines for actions and events of a large scale incident. Your emergency call takers inside of your bases should really have that partnership and communication with your citys 911 call center. One of the things we realized during the navy yard is that inside of the military facility existed actually like a small subdivision of washington, d. C. It was a separate city. The 911 calls and all of that intelligence that was related to those 911 calls werent related werent passed on to the citywide 911 call center so that was a gap that we had to expose. The First Responders that were responding were not getting the information that your call takers were receiving through the base communications. So, thats something that we worked on. And i think thats something that we should take from here and if you command a base, its something you should look at in your procedures. Emergency call takers should train together. Your Police Forces that are on your bases should train together. We currently train with ndw, with ft. Mcnair on an annual basis so that were familiar with each others tactics procedures and how we respond. Additionally when we responded to the navy yard, since that was a separate environment the navy yard went on lockdown. Thats one procedure that we sat down with the base commander. We sat down with joint forces and we talked about whether its prudent to go into a lockdown situation if you have an emergency on your base which in essence locks out your First Responders. Okay . So procedures were put in place to mitigate that type of issue. And were still kind of working on that right now. Again, training together is key. Doing tabletop exercises so that youre familiar with each other before an incident occurs doing fullscale conspiracyexercises so we get to actually act out our procedures in response to a major incident. Ill touch on intelligence. Here in washington, d. C. , we have excellent communication with our military partners. Our jttfs fbi, the Fusion Center plays a major role in sharing intelligence back and forth with our military partners. I am going to end right there and open up for questions. Thank you. Thank you. Al . As i was reflecting back my first assignment as a Police Officer specialized assignment was as a Police Community Relations Officer in charleston carolina. Actually north charleston. And it did not take me long to figure that a critical part of what i needed to do given that we had the Charleston Naval base and Charleston Air force base, was to convince everybody that military community was a part of the community and not a part from the community. That was 40 years ago. I dont know that it has been any truer than it is today. Now, weve come a long way since 9 11 in terms of sharing information. And i would submit to you that charleston for a number of reasons represents the best of that kind of communication based on the efforts that we made to stand up a Port Security program. But i will tell you that lamar in a sense in that they do interact on a daily basis out of necessity here in the washington district. The fact of the matter is that the further away you get out in the hinterlands not so much. And where that mantra a part of the community and not apart from the community, it becomes incumbent both on the base and local Law Enforcement to come together in ways that theyve not come together before. And my air force buddy here i dont want to i will give you an example post9 11. Interoperability was a major buzzword. Much was directed towards that and amc allocated a lot of money to put to build that capability of interoperability in their Security Force vehicle. Well, what that resulted in was that Security Forces vehicle in Charleston Air force base could communicate with Security Forces vehicle at scott eyre force base. Now, the likelihood of those vehicles being close enough to do that is very unlikely. Weve since, im happy to say, got the joint base to come on our local radio system and where in the past it had a walkietalkie at the Law Enforcement desk there, we now have complete communications as circumstances dictate. And unfortunately in the past there has been need for having that kind of communications. With charleston as small as it is, and its a real challenge that were confronted, has elements of the navy still there, Nuclear School and consolidated brigg. Im not saying that very loud, because i dont want too many people to know that. Theyve already unfortunately know that cats out of the bag and theyve been looking at that as a possible alternative to guantanamo. Consolidated brigg there. 40 of the materiel shipped to the middle east left out of the port of charleston. Up until dover got 17s c17s out of charleston were carrying the bulk of the airlift. We have remnants of like i say, the navy Nuclear School is still there, spaywars is there that put the electronic suites in the mraps. One of the originators of the mrap vhull design force protection was from charleston. So, weve got a lot going on for a relatively small place. And quite frankly because of that Port Initiative Port Security initiative we built a unified command approach and today anybody that has assets that can bring to the table has a seat at the table. And they participate. We do actually have some pretty important army folks there. The corps of engineers were hoping to deepen the channels and help out there. But when you look at the nature of the threat and as recently as yesterday secretary johnson talking about resurrecting the National Threat assessment system, with the focus being more on the domestic threats. We all see them. We share them. Law enforcement is as much a target perhaps for Different Reasons than the military, but were targets as well. So its incumbent on us to communicate better and to coordinate efforts when those lists are posted by isis in debeke, those personnel have offbase addresses that are provided as well. And you need to be you know you dont want a situation where you go off and you leave your family and then have nobody thats really focused on them in terms of Law Enforcement. So, thats an element in and of itself that should prompt greater communication and coordination. But the most recent issue of inspire magazine aqap which has the team of that issue was assassinations, had a picture of dylann roof who was thor. Tate the perpetrator of the Church Shooting in charleston. Weve been through a number of incidents in charleston and just as soon not have any more. To the extent that we can Work Together as a part of the community, its very challenging. Its very challenging to the military as they look out and try to figure out who the players are in terms of Law Enforcement, the jurisdiction. Whether its a concurrent jurisdiction whether its an exclusive military reservation, those issues are very challenging. And ill be honest with you, its not going to be the fbi that if youre on exclusive military reservation that you call first or who are most likely to respond first. Its going to be your local Police Officers and you need to get to know them better and coordinate. And i would recommend to you that one of your biggest handicaps is the fact that you turn over periodically. And one other responsibilities particularly of your Provost Marshal or your Law Enforcement cid is to write a collection requirement ought to be assigned to write up something about the local military Personnel Police personalities so that the incoming commander has some insight in to who does what whos responsible for what. And im not sure those messages get passed on to the extent that they should be. Those are crucial, crucial parts of that relationship. And as we found in defining Port Security, what we were doing was defining that port further away from the waterline. And i would submit to you that the military needs to be looking at that from that perspective as well. That air base that naval base is not defined by the chainlink fence. Youve got to have a broader perspective than that. And that includes your local Law Enforcement. You need to know what kind of capabilities youve got, that Provost Marshal, cid need to be doing that kind of assessment. Who do you turn to. What s. W. A. T. Team do you turn to. Do you have that capability on base. If not you need to find who you going to call when you have somebody that is holed up in a building or something. Maybe with a with a domestic situation. But there are a whole host of reasons to go to the effort to one, identify who your players are and locally Law Enforcementwise, identify ways of developing memoranda of understanding or those sorts of things to clarify and clear up the jurisdictional issues. I think being an attorney, im always mindful of the legal ramifications, but i will tell you something, good faith and good intentions have a significant role in determining legal outcomes. So if you set out to do the right thing and enter into memoranda and your lawyers obviously going to be involved, but you do it and dont just say can i do this, but make sure you say if i take this way, how can i do it to accomplish 90 of what i want to accomplish. Those are probably the two most important things. Learning your Police People and what theyre capable of, who the personalities are, and then overcoming whatever shortcomings you have that relate to the jurisdictional issues. Thank you. Thank you, al. Mike . Thank you. Well, the joy of being the cleanup batter is to look down and realize that pretty much everything you intended to say has been covered probably by people substantially more entell intelligent than yourself. I want to welcome you and thank you for taking part in this panel and thank you all of our panelists for being a Great Variety of points of view and things we need to talk about to the table. If you heard anything yesterday and today repeated more i doubt its than relationships. Every panel member here has talked about relationships. And the other side of the bang is not a time for relationships. We tried that in the past nationally, we know it doesnt work. So, what army north brings is that centerpiece. We are responsible for force protection and antiterrorism for the 300,000plus soldiers and their families and civilians that are in north america. We work closely with the United States Northern Command on a daily basis. We work closely with the Provost Marshal Generals Office on a daily basis and, of course the g34 protection. We are that commander with the responsibility for force protection in north america and its our job to make sure that were all talking to one another so that every individual soldier knows whats going on. Knows what the threat is knows where their safe place to be is knows who their Law Enforcement presence is and who to call and what to expect when that call is made. Our responsibility is to communicate daily with the 20 acoms and asccs and drus to let them know what the threat picture is to let them know whats going on out there. Im very proud of our 24hour, 7, 365 threat fusion cell. We sit right next to the army north g2. And every day we are talking with sheriffs offices the department of Homeland Security, the department of state the federal bureau of investigation so that we know whats going on out there. We know the threats that are developing. One of our bosss primary themes is this site picture. Whats going on. How can he reach out if theres an event in north carolina, an event in california, an event in north dakota against a standalone facility. Do they have something to do with each other. Is this a trend. Is this something that every soldier in north America Needs to be made aware of. One of the greatest things that our boss is driving and were working very hard on is a common operating picture. First we want to be able to see whats going on out there understand what it could mean, analyze it and very quickly get that information not only to those 20 commands but to be able to reach out to every individual soldier so we have a number of things were working with, tradeoff with g34 with northcom to make that a reality. As you figured out the armys a big place. And the more we dig the more were surprised. And all of our efforts to figure out postchattanooga exactly how many standalone facilities the United States army has in north america, we began with a rough number of about 5,600. At last count were up to 8,900. Because besides the ones youre aware of recruiting centers, reserve centers, National Guard offices, there are you know, we army north have folks embedded with every fema region in the country and our friends in the force the federal protective Service Provide protection for most of them, although not all of them. Some of them are in storefronts. But weve got to find a way not only to process and share information, but to make sure every single soldier knows what actions he or she needs to take to protect themselves and their families. One of my favorite sayings of the many famous things that people say when George Washington said when we assumed the soldier we did not set aside the citizen. Our soldiers live, operate, take care of their families and commit to their communities. They need to understand where their protection comes from. We could certainly as secretary johnson said yesterday, we can build a secure internet. We can actually build secure borders. We can make air travel completely safe. But thats not who we are and thats not what we do. We are not going to all run to the garrison and hide. Were part of the american community. Were a part of the fabric of this society. So, what general wiggins leads us to do is remain a part of the community. Be prepared to execute our mission. But know how to manage risk, take care of our soldiers and their families, and to close with the relationships. And we can only do that with relationships across the army relationships across the services, and relationships with the state, federal, tribal, county, every level of Law Enforcement. And we have to be talking every day. Again, we cannot learn who we need to be talking about on the wrong side of the bang. Ill turn it back over to admiral lauren and thank you all for joining us. Those are some pretty broadranging comments on a very broadranging subject. And i want to thank everybody for their comments. Id like to open it up to questions, and ill take the prerogative of the chair to ask the first question, of course, which is we talk about relationships. And yesterday the chief talked about readiness and an integral part of all of that is planning and very importantly training. And training can be at various levels as we all know and the reality is, it has to go from the actual lowest tactical level all the way up to the senior level. My experiences here in washington are that unless periodically the president , the cabinet secretaries are sitting at a tabletop exercise you only get 90 of the effectiveness of that training unless it goes all the way to the top. So, id ask our panelists here what are some of the initiatives that perhaps they have been involved in their respective relationships within their communities and the broader reaching relationship with the total army that they may have pursued and are engaged in. So, who would like to start . Mike . I can begin addressing that. From a department of the army standpoint, you know, we establish policy at the headquarters. But its executed down at the unit level. When we talk about offinstallation facilities such as army reserve and national Army Reserve Centers and National Guard armories they reach out to their local community to conduct these exercises that you mentioned. With local Law Enforcement establishing relationship many members of the army reserve and National Guard are also local Law Enforcement members, so its a natural fit and a natural tie to bring that together. So those exercises are conducted periodically. And we try to combine them if theres multiple units in a building rather than having local Law Enforcement reaching out three, four five times to the same location. Thats the important part of that. But in addition its the continual sharing of information. As was mentioned it was once a year where i take command of a local unit and meet the local police and two years later i roll out and somebody else comes in. Its important to have that dialogue and get to know each other. Share information about whats going on in the community and it works both ways both between military members and with Law Enforcement as well. A key point was made i think about al that when military were transient. Were there for a short period of time and then we move on. Its important that a part of that battle handover that those relationships are handed over as well. So that Law Enforcement knows that mike isnt there anymore that mark is, and they know how to get ahold of mark and continue that relationship thats there. Its about team work and its about the partnership and exercising it at the local level and reporting it up through higher headquarters. What resources are needed to improve the response if its interoperability or connectivity how can we help from higher ed quart headquarters . Anyone else . In the interest of time when you say training i say for us the priority has been rehearsing our battle drills within some of the recruiting centers. What actions do the individuals take. Who do they call. But really our efforts beyond that emphasis, so that which we can control, has really been the relationships. So, its interesting, i reached out to some battalion commanders in advance of the panel and said, hey, listen, im going to have this opportunity. Just give me some feedback in terms of the things you are doing, and i got to tell you, i got eight different battalions here and they all talked about direct relationship, local Police Department sharing of information. They listed all the organizations that came up in a briefing. Regular force protection interaction with the jttf directly. I got names of individuals. Some of the points weve talked about about the importance of this relationship and that you got to work at it, that really has been our emphasis. Yeah, just from a local Police Perspective weve done tabletops, fullscale exercises with several of our military partners. The tabletops were more an executive level, higher management going over incident command, making sure that all of our components from the military, the proper people from the military would command to incident command. That was one of the things we realized in our navy yard interactions was that we didnt have the proper people in the initial incident command. We actually there was confusion as to who was in charge of the base at that time. So weve had several briefings where weve sat down with their executive level and just really gotten more of a training on whos in charge who we need in that incident command, and from their perspective who they need to send out to the incident command. Weve done the tacticallevel training through fullscale exercises where weve actually done drills on the navy yard facilities. Weve done drills at ft. Mcnair as well. That communication, that learning each others procedures and who needs to be face to face has been excellent. Thank you. Ill add one other thing, if i may. Sure. Which is always pressing that push to test button. Monthly we do an exercise where we reach out from the headquarters to the 20 commands within north america. And we purposely change it where the response must be by email or next month it must be by telephone or next month it must be by message. Because as you know, it never fails that something isnt going to work. Each month we find a hole. Each month someone has moved and we didnt know about it. So you just, you know, sheriff cannon talked about, you know, making sure that the first thing you pass on is who you need to talk to, who you need to go to who you need to have a relationship with. Even if its internal, you got to push the press to test button on a very regular basis, because people change, things happen, Communication Systems go down. So, ill just add that. Whatever great plan you have, you really have to check it to make sure it will survive First Contact with the enemy. Thank you. Okay. Your questions please. Matts got a microphone here, so please speak into the microphone. Identify yourself and do your best to make it a question. Thanks. Patrick tucker with defense one. In 2009 after the ft. Hood shootings the president established an Insider Threat task force. One of the mandates was an Integration Center for analysis of big data as applied to Insider Threats. So to the question can you speak to samome of the nascent efforts to apply Big Data Analytics to the job of detecting Early Warning signs of an attack both within the broader population and in the service populations because theyre very different populations and data sets. Thank you. You want to try that . Yeah. Ill start with the response on that. You made a reference to the Insider Threat task force, the g34 leads the armys effort as part of the national Insider Threat task force. That has many aspects to it. Active shooters which is really what were talking about here is just one element of it. The larger element and where that was geared to in addition to 2009 it goes to the unauthorized disclosure of classified information which is really beyond the scope of this. But there is user activity monitoring to ensure that things are done properly. More to your point were working with Big Data Analytics now to identify exactly what it can provide to us to help support that. Other initiatives that we have are installation Access Controls which will verify the identity of people coming onto our bases to determine whether they have any active wants or warrants on them. Thats something that youd want to know before people come onto bases and things like that. Background checks. Again, occurring on a periodic basis in accordance with the federal rules and regulations. Does that answer your question . A quick followup. Can you point to any particular incident where some of these techniques were used to actually thwart or stop an attack before it happened . We hear about all the bad news in the headlines. Some of the Success Stories get missed. Was it effective in any way to prevent a particular attack . It is always hard to prove a negative as you say. But the Identity Verification measures at the Access Control points on bases have identified people with active wants and warrants. At the gate. Thats not to say that they were on their way to conduct something. But they had that in their background, and as a result of that i would offer that the procedures achieved their intent, to, you know, provide better security for the bases and better identity as to who is coming on the bases. And as the word gets out that we are checking, that, in fact, is a deterrent for people who would otherwise try to get onto a base with ill intentions. Interesting. Mike, did you have anything to add . I just will add a Success Story only because its already in the public domain. We had significant hve threat streams prior to the anniversary of 9 11. And what theyve made public, the fbi specifically rolled up ten threat actors that had expressed particular threat information against the department of defense. Obviously until the prosecution is over, they release very little information, so the most i can say is that we have seen active Law Enforcement active Data Analysis active communication across agencies that has resulted in preventing planned events. Thank you. Another question . Yes, maam. Up. Good morning my name is charlotte peete, as all of you are evaluating and looking back to the tragedy in chattanooga, tennessee, what specific mitigation strategies could have or should have been in place . And are you acting on any of those now . Interesting point. And ill take a stab at it. I mean, listen in the wake of that tragic incident it caused all of us to kind of reassess our force protection facility so, you know, part of this is you know, we reviewed our policies our programs, and procedures to address, you know the potential of this threat. Im in the camp of its not a question of if this is going to happen again, its going to be a question of when. So, there have been a number of things done. In part there was a department of Defense Task Force that actually did an awful lot of work across this across all services. Within the army there are things that we dont have to wait for the department of defense guidance to come out. There are things that i thought we should do to enhance the force protection. One of those things that we are doing, ill give you a specific example, is weve already ordered ballistic benches to go into our recruiting centers. For those who are underinformed it looks like a normal bench but it can withstand a 762 round. Thats something concrete weve taken steps to do that i think could have mitigated i dont know that it would have, you know prevented but could have mitigate mitigated. The other thing is in our recruiting centers, and some of those you can see into those recruiting centers. So, weve weve gone out. We call them clings. But you can put something on the front of that recruiting center so the recruiters inside the recruiting center can see out. But individuals looking in in the daytime cannot see in. That is yet another thing. Were also are pursuing controlled access so that, you know, right now its uneven. There are some places, some recruiting centers, that do have controlled access. Thats primarily been a result of crime in areas as opposed to threat. But i think we need to move to a consistent standard. I think the department of defense is going to help us with that. And i can tell you there are more, you know. My other comments were not going to rest on our laurels. One thing you picked up, this is an evolving threat so as such our response needs to be a evolving response based on that threat. Chris, did you want to comment . So, within the federal protective service, governmentwide is the Interagency Security Committee the ise, it sets standards and guidelines for security at federally owned facilities. Those standards are developed by security levels so as a security facility level five is the pentagon. Facility security level one is a storefront Martin Luther king avenue southeast, 13 employees not a high risk, not a high volume of work that goes on there. So, those Facility Security levels determine minimum security standards. So at a security level four like the reagan building if youve been into the reagan building before as a visitor you go through screening. You go through an xray machine with your packages and you walk through a metal detector as you go in. And theres guards there that do that screening and youve got metal on you, you know, whatever it may be, theyll turn you away. So, its been very beneficial for us. We dont have a lot of crime in our federal facilities primarily because we do this level of screening there. But the Insider Threat is whats unknown. Normally employees that work in those buildings dont go through screening because they work there. Theyve got an hsd pd12 compliant i. D. Card and they have a Background Investigation and theyre known but that doesnt mean that theyre not having some type of issue that may cause them to do harm to coworkers. So, we think our facilities are pretty secure based on the security level a a recruiting station may be a level one. I was a recruiter back in my time in the army and im glad you are doing the work you are doing in those stations. You have to balance it out. I wanted the guys and girls to come into the office and join the army. Theyre not going to want to do that if they have to go through a bunker to get into the office. Whats going on here . I dont want to join this place. Its a balance. How do you balance it out . I know its a big issue that dod is working with. For us if we can put this happened with Gabby Giffords several years ago at the safeway when she was shot. We met with the Capitol Police in the senate and the house senate arms, it would be nice if you could move the district offices into the gsa facilities that we protect. Anyone coming in there will go through screening and we know that anyone who is going to go into the auditorium for that speech does not have a weapon because theyve been cleared. But then the members of congress, i need to be with my people. I need to be able to meet them and see them where they are. I dont want them to have to come through this gauntlet to try to come and see me. Its a heck of a balance that has to be done out there and its something that all of us are working towards to make sure our people are safe. Lamar, do you have anything to add . Just from a local perspective, any types of intelligence that comes through that dictates theres a threat or anything directed toward a military recruiting facility or base, we would pick up either through our joint Terrorism Task force or it comes through our Fusion Center the rtac, who monitors various different systems, guardian, eguardian and your arctic mile system is built into that system as well so when suspicious activity threats come through, we have different contingency plans where well send officers to recruiting locations. Some for just visibilities. Sometimes theyll have to check in. It just depends on the level of the threat so were tied into that actively as well. Thank you. This last question id like to take this woman here who had a hand up earlier. Thank you. Im kathleen kirkoy from army times my question is for general smith regarding training reservists for contingencies and im wondering if you feel that reservists need more training opportunities and training exercises to prepare. And if so, do you have enough resources under current Budget Constraints to conduct those training opportunities . Thats a great question. And one of the challenges for this when we look to arm Service Members in the United States is we have to be mindful of the laws and the authorities that we have. The office of the Provost Marshal general in the third row, his team is putting together Training Programs for the reservist who we would choose to arm so that they understand what the procedures are, what their authorities are, and how best to manage. We would call it rules on the use of force. So, were from an army reserve standpoint, weve already reached out and have begun some of that training. Were in a position to be prepared to respond if the commander chooses to do that. You recall earlier i mentioned that commanders had the authority to do that. And everyone has been tasked to develop a plan for their particular offinstallation facility. So whether its a small detachment with a company on it or a larger installation that has 10 or 12 units. So, its really the commanders responsibility. They look at people with the proper background checks and so forth. Defer to people who have a Law Enforcement background. They could be military police soldiers, enlisted or officer serving in the unit, or members of Law Enforcement that already have an authority to carry a weapon and they know what the local jurisdiction responsibilities are and the local laws. As far as funding, funding is extremely tight. But safety is very important too, so this is a priority for our Service Members for our commanders. And it further stresses the importance of the linkage, the partnership and the team work with local Law Enforcement. Thats what i was going to add. That is yet another area that really dictates that you train with and have understandings with your local Law Enforcement so that the Everybody Knows the roles and responsibilities when something happens. Crucial. And ill just add with that i mean if you think about what weve talked about before until this point local Law Enforcement is the First Responders. As we arm soldiers or prepare to, they could be coming upon a scene where theres somebody else armed in addition to the bad guy. So, we dont want our good guy soldiers that are responding to be misconstrued as adversaries by local law ens are forcement so thats why its extremely important not only to have the training but to do exercises with local enforcement so they can understand interoperability of communication is essential there. But thats why our first default is always to partner with local Law Enforcement before we go to any decision like that. Well before we thank our panel for their participation i want to thank you for joining us. We had a good turnout here despite the competing presentation. And we went ten minutes over. My apologies there. I also want to thank i counted eight working level one and two stars, nine if you count the three star. In the audience today. And so i just want to thank you for your level of interest on what is an important topic. And we look forward to continuing the conversation during the remainder of the conference. So please join me in thanking our panelists for a very interesting panel. A signature feature of book tv is our allday coverage of book fairs and festivals from across the country with top nonfiction authors. Heres our schedule beginning this weekend. Well be in massachusetts for the boston book festival. In the middle of the month its the louisiana book festival in baton rouge. And at the end of november were live for the 18th year in a row from florida for the Miami Book Fair international. And the National Book awards from new york city. Just some of the fairs and festivals this fall on cspan 2s book tv. And we have more now from this association of the United States army conference. Its a panel on u. S. mexico Security Cooperation and the armys role in Homeland Security. All right, well good afternoon. Im not guy swann. He got tied up handing out some awards. My name is george cohen. I work on the national staff. Its an honor and privilege for me to be here with you. I want to thank you very much for your time. We have a great, great panel for you today. Thank you for joining us for our third and final iow dhs breakout session. This session is entitled the portion of mexico to Homeland Security. Of course, one of the goals of our association in the institute of land warfare is to foster an understanding of the emerging security environment. And as your professional organization association, aosa is proud to provide events like this one that broaden the Knowledge Base of Army Professionals and those who partner with our army in our nations defense. These presentations are our way of amplifying the army and help to further the associations mission to be the voice for the army and support for the soldier. Of course, we cant do this alone. Ausa relies on its members to help tell the story, tell the armys story and to support our soldiers and their families. A strong Membership Base is vitally important for advocacy efforts in congress with the pentagon and the Defense Industrial base. As well as the public and communities across the country through ausas 120 local chapters. So for those of you army and Homeland Security professionals and your comrades in arms who are not yet members of the association of the u. S. Army, we encourage you to join with a special introductory offer. Youll find the invitation on your chair. Card looks Something Like this. Just bring it to the ausa membership booth, booth 407 in exhibit hall a. If you are already a member, thank you for staying with us. Youre very important to us. So please give your invitation to a fellow professional so he, too, can enjoy what you enjoy with your membership. Youll be doing a service to the association, to the United States army and to the nation. So, ill finish banging on about that. And now turn the floor over to dr. Richard downie, executive Vice President for Global Strategies omnitru technologies. Thank you, richard. Ill get my stuff out of the way here. Well, thank you very much, george. Good afternoon. You know, its great to be an audience where theres actually interaction, but, you know, its this is an army this is the ausa. This is normally, you know, the kind of spirit we expect. We have our partners from mexico are here down below. So if you would help me one more time, good afternoon. Good afternoon. Oh, thank you so much. Thats much better. Much better. Well, as george mentioned, im richard downie. And its really a pleasure for me to be here today as your moderator for this panel on the importance of mexico for u. S. Homeland security. And it is an honor to be with this very distinguished panel, and also with this distinguished audience. So thank you very much for all joining us today. You know, when we talk about threats to the United States typically we tend to immediately think far away iran, north korea, al qaeda, although they certainly are here. But, you know, when you look at a map and we dont have maps to project today. There is no projection. But youve all seen those maps of the arrows coming up from the south of the roots of trafficking from south america through Central America through the caribbean through the eastern pacific and they all come up these arrows show how these the traffickers take drugs, pirated material, people, up, and usually the arrows stop at the u. S. Border. But we all know the arrows dont really stop at the u. S. Border. They continue on. Other maps will show you they continue on to los angeles and seattle, dallas, chicago, atlanta, washington, d. C. And they continue on up to canada, too. And the point is that if these if these traffickers can take Illegal Drugs and pirated merchandise and people successfully into these areas, what else can they bring . And the problem is we see as a result how closely intertwined our security is with that of mexico, because all those roots coming from the caribbean, eastern pacific, Central America, they all converge in mexico going through. And it is so important for us to work with our mexican partners in this. And we have a terrific panel today to address this issue. Of what are those things that can pass through our security, that we need to work so closely with our mexican counterparts with. What well do today, well have were going to have this panel will speak, each of them will speak seven or eight minutes or so. We want to leave a lot of time for questions because i think that will be the richest part of this dialogue. We want to make it a dialogue. I ask you, please, as you listen to each of the speakers, to be thinking about what you want to ask them. And dont be shy. Because theyre happy and we want to engage with you on this. So, first up, on the speakers today, will be general Brigadier General j. T. Taylor who is the Deputy Director for plans, policy and strategy at the u. S. Northern command and norad which is the unified command that focuses one of their many responsibilities is focusing on mexico. And hes going to give a strategic overview to start things off. Hell be followed by Michael Houston who is the principle director for the americas in the policy directorate of the department of Homeland Security. And he will address he actually has spent a lot of time focusing in Homeland Security on mexico, so hell be giving us the framework that department of Homeland Security uses to address this. Hell be followed by dr. Duncan wood the director of the Mexico Institute at the Woodrow Wilson center here in washington, d. C. , who has spent tremendous time in mexico as a professor here and has a great overview of all issues related to mexico and particularly our relationship with mexico, and our cleanup batter will be Lieutenant General Perry Wiggins who is the commander of u. S. Army north. And amongst his many responsibility, army north is the Army Component that focuses on the relationship with mexico. And during his time hes actually spent six years at army north in a variety of positions, so hes seen not only during this administration under enrique neat nieto but also on the Previous Administration of felipe calderon. He has a tremendous appreciation for how this relationship has gone. And hell be addressing some of the strategies one of his very Close Relationships is with general salvador fuegos who is the defense minister of mexico so we look forward to all of our panelists giving an overand then your questions. Again, be thinking about what youd like to ask our panelists and let me turn it over to general taylor, please, thank you. Thank you very much. Ladies and gentlemen, i appreciate the opportunity to share a few insights to you of the absolute necessity of mexico to the security of north america from the perspective of u. S. North command, and id like to start with a little strategic context from a north american continental perspective writ large. Because i think its essential to understand the role that mexico plays in our security by comparing it a little bit to the role that canada plays in our security. Now, history has shown that if you want to threaten the United States, theres a number of approaches that you can take to get to north america. You can take an equatorial approach where you come from the east or west coast from the sea. Thats a hard approach because theres great distances involved or you can take a polar approach where you go over the north pole. There is less distance involved with that in the aerial domain. Thats absolutely inhospitable in the land domain. But our aerial domain threat over the pole is an existential threat, so over five decades we have cultivated a very close relationship with canada to address the existential threat that exists coming over the poles that has served north america very well. In fact, our chairman recently articulated four nationstate threats to north america and of those four three of them can reach us in the aerial domain over that polar approach. And so we learned of the absolute necessity of a close relationship with canada. We learned that that was in our national interests. And that relationship that we have with canada has enabled us to truly be able to provide Aerospace Control and maritime warning. That relationship is critical to the security of the United States and canada. Both our countries benefit from that against existential threats. That relationship we have with canada is a model that is worthy of emulating. But an Aerial Threat over the poles is not the only threat that north america faces. The Security Landscape is evolving and north america faces a threat from the south. Now, our threat from the south is not presently an existential threat, but it is a Security Threat nonetheless. And this threat that is transnational in nature exploits seams between countries. Its an organized threat. It is a networked threat. It is agile. Its adaptive. And it can reach the point to where it actually destabilizes regions and it can also challenge sovereignty. And so we broadly describe that threat as transnational organized crime. Now, this threat enters the United States through the land domain transiting through mexico and through the maritime domain coming up through the caribbean. And like i said while that threat is not as of yet existential it is a National Security matter. And mexico is postured to play every bit an Important Role against that kind of threat that canada plays against the aerial domain threat that we face from the poles. And so these kinds of threats include such things as special interest aliens, the potential smuggling of weapons of mass destruction, the trafficking of drugs and persons moving north or weapons and money moving out of the United States and south

© 2025 Vimarsana

comparemela.com © 2020. All Rights Reserved.