Was. Reporter suddenly, an allout manhunt this is like a movie, this chase and this kidnapping. Oh, yeah. Reporter could anyone reach her in time . I had to be strong for everybody. I had to be. Emotions are just everywhere. I know she pleaded. I know she pleaded. Did you find her . Is she alive . Im lester holt and this is dateline. Heres Andrea Canning with the client. Reporter in this Southern City forever linked to a president and first lady, there was another lady making a name for herself in little rock, arkansas. Her face was in the paper every week. She had a billboard on one of the busiest interstates, you know, with her face on it. Reporter as a top selling realtor, Beverly Carter had become somewhat of a local celebrity. With her infectious smile, she put house hunters at ease. Trusted to find the perfect home, she often did. Beverly was awesome at it. I mean, nobody could do it like beverly could. Reporter but there was a downside to her celebrity. This realtor had a target
Reporter suddenly, an allout manhunt this is like a movie, this chase and this kidnapping. Oh, yeah. Reporter could anyone reach her in time . I had to be strong for everybody. I had to be. Emotions are just everywhere. I know she pleaded. I know she pleaded. Did you find her . Is she alive . Im lester holt and this is dateline. Heres Andrea Canning with the client. Reporter in this Southern City forever linked to a president and first lady, there was another lady making a name for herself in little rock, arkansas. Her face was in the paper every week. She had a billboard on one of the busiest interstates, you know, with her face on it. Reporter as a top selling realtor, Beverly Carter had become somewhat of a local celebrity. With her infectious smile, she put house hunters at ease. Trusted to find the perfect home, she often did. Beverly was awesome at it. I mean, nobody could do it like beverly could. Reporter but there was a downside to her celebrity. This realtor had a target on h
Of the nation in broad terms, and strong encryption is important to strong internet defense and will defend it is in our best interests. Within the broad framework of though the challenge we cant figure out is realizing that communication that the use by very law abiding citizens, nationstates and companies engage in lawful activity is also being used by criminals, terrorists, nationstates who attempted generate advanced against the United States advocates are allies and partners. So were trying to figure out how do we balance these two important. Is a privacy and security, and realizing the world around us is changing in a foundational way. So were trying to come to grips broadly with how do we do with the reality of the technical world around us to yet the broader legal and social imperatives we have begun the first acknowledge we do not have a defined way to hit you in the end i think this is about how to get the best minds together to address this. When i look at our capabilities a
Issc considered just as bad and make sure that that culture is incolcated throughout the force. I agree, but now the admiralt is assaulted by the telecoms who want to tie his hands behind his back by doing all of the encryption. Thank you, mr. Chairman. Thank you, mr. Chairman. In our state, naval surfers warfare, senator crane has taket the lead on much of our effortso to protect against the threat oe counterfeit electronics. And so secretary work and director clapper, the Global Supply chain for ts a g microelectronics presents a growing challenge for cybersecurity. One of the things we saw s wh recently, ibm sold its chipmaking facilities with dod foundry status to a foreignowned competitor. So i was wondering your top toiorities in managing the risk posed by the globalization of microelectronics ilitie Manufacturing Capabilities and our abilities to protect our systems in that area. Its a big question, senator. In fact, its going to be one of the key things we look at in qt this fa
Well, it didnt affect a National Security entity but it did cause damage to a company. In that case and this is an important illustration of when we could attribute. Very clearly there was agreement across the Intelligence Community to attribute that attack to the north koreans, and we did sanction them. Okay. Thank you. Thank you, mr. Chairman. Thank you, mr. Chair. Gentlemen, thank you for your service and for joining us here today. And director clapper, before i start on ill begin to focus on cyberpolicy, i think were all very concerned about the allegations that leadership at Central Command deliberately distorted the assessments of Intelligence Officers related to the fight against isil. And i understand that theres an ongoing investigation, and im going to wait for the results of that investigation. But i want to say that as a member of both this committee and the intelligence committee, i want to in the strongest terms possible impress upon you the importance for all of us to re