An American Airline mechanic accused of sabotaging a plane at miami international, has allegedly ties to isis, he had propaganda video from the terror group on cell phone, and fed say they have evidence he made statement. He claims he wanted to delay the plane at miami terminal to get overtime for the repairs he would have to do. Joining me, member of house subcommittee on crime, terrorism and homeland security, florida congressman greg stuebe. Good to have you back. Why isnt American Airline doing a better job of figuring out who they are employing. How much of a risk does it put passengers at. We need to hear and a full investigation, how this occurred, what ties he had to terrorism if he did. And what ties to those of his family members in iraq. And how he became radicalized. This individual worked for American Airlines since 1988, how did it get to this point . The bigger question, what type of research and background checks are airlines doing on those who have access to our planes
An American Airline mechanic accused of sabotaging a plane at miami international, has allegedly ties to isis, he had propaganda video from the terror group on cell phone, and fed say they have evidence he made statement. He claims he wanted to delay the plane at miami terminal to get overtime for the repairs he would have to do. Joining me, member of house subcommittee on crime, terrorism and homeland security, florida congressman greg stuebe. Good to have you back. Why isnt American Airline doing a better job of figuring out who they are employing. How much of a risk does it put passengers at. We need to hear and a full investigation, how this occurred, what ties he had to terrorism if he did. And what ties to those of his family members in iraq. And how he became radicalized. This individual worked for American Airlines since 1988, how did it get to this point . The bigger question, what type of research and background checks are airlines doing on those who have access to our planes
Senate. And we will tell you why this dog has been drawn into the debate over same sex marriage in australia. Glad you could join us. It is seven in the morning in singapore, midnight in london, and 5 30am in myanmar, where, on thursday, you and agencies will enter Rakhine State for the First Time Since the mass exodus of Rohingya Muslims began. The burmese army has been accused of ethnic cleansing and nearly half a million rohingyas have fled to bangladesh to escape a brutal crackdown, which the army say began after attacks by rohingya militants. The bbcsjonathan head has tracked down a man who claims to be one of those rohingya fighters. This is his special report. This is where desperate ring of muslims started to fight back. This town in Rakhine State is now a smoking ruin, with its Muslim Population gone. For years, rohingyas have enjoyed discrimination, abuses, and confinement to squalid camps, but unlike other minorities in myanmar, they did not rebel against the government. Tha
I recognize myself for five minutes for an opening statement. Mr. Lahood i want to welcome the witnesses here today and welcome chairman smith, Oversight Subcommittee Research and Technology Ranking member lipinski, our expert witnesses and members of the audience. Cybersecurity, a concept we hear mentioned frequently, especially in this period of rapidly emerging threats, is an everevolving concept. Maintaining an effective cybersecurity posture requires constant vigilance as new threats emerge and old ones return. Too often, however, when we hear about the importance of cybersecurity, we are left without concrete steps to take to ensure or systems are best positioned to defend against emerging threats. One of the goals of todays hearing is to learn about real, tangible measures the government can take to ensure its i. T. Security systems are appropriately reenforced, to defend against new and emerging threats, including novel and sophisticated ransomware threats. The specific focus o
Well come to order. Without objection, the chair has authorized to declare recess of the committee at anytime. Good morning and welcome to todays hearing entitled bolstering cybersecurity. I recognize myself for five minutes for an opening statement. I want to welcomethe witnesses here today and elcome chairman smith, Oversight Subcommittee Research and Technology Ranking member lipinski, our expert witnesses and members of the audience. Oversight subcommittee research and Technology Ranking member cyd from wannacry. I recognize myself for five minutes for an opening statement. I want to welcome the witnesses here today and welcome chairman smith, oversight subcommittee Ranking Member lipinski, our expert witnesses and members of the audience. Cybersecurity, a concept we hear mentioned frequently, especially in this period of rapidly emerging threats, is an everevolving concept. Maintaining an effective cybersecurity posture requires constant vigilance as new threats emerge and old one