Security, additional investments in technology, federal Cyber Security, cyber education, new cyber 10 went in the and improved cyber infinite response. Dhs has auroral role in zero most every aspect of this plan. As reflected in the 2017 budget request, we went to expand our Cyber Response team from 10 to 48 and double the number of Cyber Security advisers to make house calls to assist private sector organizations with in person customized Cyber Security assessment and best practices. Building on dhs is stop, think, connect campaign we will promote Public Awareness on multifactor authentication and collaborate with underwriter laboratories others to develop a Cyber Security Assurance Program to test and Certified Network devices within the internet, such as your home alarm system, refrigerator or even your pacemaker. Last year we greatly expanded the capability of dhs national Cyber Security Communications Integration center. It increased its distribution of information, the number of
Disagreed and there are a lot of compromises that we had to have because we knew we had to have the the bill. The we wouldnt have if we dont pass this bill the European Reassurance Initiative to stand up against russian aggression. I went over i shouldnt have done this because i was on the ballot this year for reelection, but for the week prior to our election here, i went over to see what was happening in ukraine because ukraine was having their elections a week before we had our elections. And not many people are aware that in ukraine, fo poroshenko,n ukraine, a Political Party cannot have a seat in parliament unless they get 5 of the of the vote and the vote was taking place a week before our vote. Well, this will be the first year, the first time in 96 years that the communist party will not have one seat in parliament. Now, thats amazing. And, you know, we have to understand what is happening with with putin. I also went over toe lithuania. Lithuania, estonia and latvia and those
Information about the program and its effectiveness to the white house, the department of justice, congress, the c. I. A. Inspector general, the media, and the american public. This conclusion is somewhat personal for me. I remember clearly when director hayden briefed the Intelligence Committee for the first time on the socalled e. I. T. s at that september, 2006 committee meeting. He referred specifically to a quote actually slap end quote among other techniques and presented the entire set of techniques as minimally harmful and implied in a highly clinical and professional manner. They were not. The committees report demonstrates that these techniques were physically very harmful and that the constraints that existed on paper in washington did not match the way techniques were used at c. I. A. Sites around the world. A particular of particular note was the treatment of abu zubaydah over the span of 17 days in august of 2002. This involved nonstop interrogation and abuse, 24 7, from
, in themy question energy sector, we dont differentiate between physical threats and Cyber Threats. We drill with the assumption that they will probably do both at the same time if it is a sophisticated attack. To be frank, the militarys response in its own protection seems to be focused on isolation as a tactic for dealing with the idea of the grid going down. I wonder if you could talk to that a little bit. As tempting as isolation is as a strategy for response, it also potentially makes security a lot more difficult if you have individual grids all over the place. If you could talk about isolation versus integration. Isolation works at a tactical level for immediate shortterm periods. It is not a comprehensive, sustainable strategy. It is this idea of, i will just shut the network down. It is not that it is a bad thing at the tactical level. If you are looking at a base, an installation as opposed to an entire grid or sector. In the long run, i think the right answer for us is goin