To welcome our next two speakers who will do a talk with different points of view. Our next speaker is mad lynn madeleine. Principal director for several policy for the office of the secretary of defense. Without further ado, lets get the party started. [applause] i will apologize, a heads up that our colleague will go first, but i am happy is that ok . If that is all right. Ok, so it is not the program, but [laughter] my distinct honor and pleasure to introduce david porter, assistant section chief with the Foreign Influence Task , counterintelligence division. He is joining us today from fbis headquarters. Thank you. [applause] sorry about that. Good morning, everybody. I am david porter, i served as the assistant section chief of the f. B. I. s Foreign Influence Task force. I appreciate the opportunity to be here this morning to represent the men and women of the f. B. I. , men and women who are working tirelessly on behalf of the American People to protect the integrity of our demo
I will apologize, a heads up that our colleague will go first, but i am happy is that ok . If that is all right. Ok, so it is not the program, but [laughter] my distinct honor and pleasure to introduce david porter, assistant section chief with the Foreign Influence Task , counterintelligence division. He is joining us today from fbis headquarters. Thank you. [applause] sorry about that. Good morning, everybody. I am david porter, i served as the assistant section chief of the f. B. I. s Foreign Influence Task force. I appreciate the opportunity to be here this morning to represent the men and women of the f. B. I. , men and women who are working tirelessly on behalf of the American People to protect the integrity of our democracy, to include the 2020 elections. 10 minutes is not a lot of time,. O im going to get right to it what i want to do this morning is streaked to three different things. First i want to define what we in this space refer to as the malign foreign influence threat.
Our first speaker that we have is madeleine, are you over there . Im going to let you stand up here at the mic if thats good four. Shes the principal director for cyber policy for the office of the secretary of defense. Without further ado lets get the party started. [ applause ] so ill apologize, we actually had thought our colleague from the fbi would go first, but im happy is that okay . If thats all right. Okay. Its not the program, but so it is my distinct honor and pleasure to introduce david kay porter who is the assistant section chief with the Foreign Influence Task force, counterintelligence division, joining us from fbis headquarters. Thank you. [ applause ] sorry about that. So good morning, everybody. My name is david porter. As anne said, i serve as the assistant section chief of the fbis Foreign Influence Task force. Or fitf as we are more broadly referred to within the Intelligence Community. I appreciate the opportunity to be here this morning to represent the men and
Speaker. We are very fortunate in the current climate, in which all of this is happening, that we have perspectives from the Intelligence Community and from the department of defense. So it is a privilege and an honor to welcome to our to welcome our next two speakers who will do a talk with different points of view. Our next speaker is mad lynn madeleine. Principal director for several policy for the office of the secretary of defense. Without further ado, lets get the party started. [applause] i will apologize, a heads up that our colleague will go first, but i am happy is that ok . If that is all right. Ok, so it is not the program, but [laughter] my distinct honor and pleasure to introduce david porter, assistant section chief with the Foreign Influence Task , counterintelligence division. He is joining us today from fbis headquarters. Thank you. [applause] sorry about that. Good morning, everybody. I am david porter, i served as the assistant section chief of the f. B. I. s Foreig
The truth and erode our ability to fight, creating a set of it that no narrative or use source can be trusted at all. Some of the ttts in this space wont necessarily come as as a surprise to you but we talked about intrusion and u. S. Government networks and medical organizations, hack and leak operations related to compromise or embarrassing situations, Cyber Attacks against our eroding infrastructure, the targeting of u. S. Persons or elected officials by social media and disinformation, suppression of voter turnout by spreading misinformation regarding polling and voting, manipulation of media through the injection of false stories, and news reporting. And then subsequent application of the disinformation to shape of the discourse. Shape Public Discourse. There are a few overarching similarities regarding the manner in which our two principal adversaries, china and russia, execute these objectives. Both countries use a whole of government approach. And use sophisticated and aggressi