Are adversaries, nationstates or other entities, to steal our secret, but also to hide theirs, and to deceive us into thinking or doing the things that are going to be in their interest. There are influence operations as well as collection activities that fall within the realm of counterintelligence worries in dealing with foreign intelligence threats. Threats at home and abroad. So, counterintelligence therefore becomes the full range of things that are done information acquired and activities conducted in order to identify and assess these foreign intelligence activities byorder to neutralize them denying them access to be things that they are seeking by deceiving them or let me also add, by exploiting what we learn and understand about these foreign intelligence activities. So, frank, within the range of things that are done to protect ar secrets, we certainly have full range of security activities in order to protect secret information to protect against access to things that are i
It comes to Government Agencies . So, there are a couple of different aspects to your question. Certainly, from our perspective, weve gotten a lot of feedback of sources, bunch including the sector coordinating councils, our different agencies that have connections with different industries, treasury with the Financial Services industry, the Energy Department with the energy providers. And our own connections with the tech sector. In general, the feedback has been very positive for the framework. Sven companies that oftentime they will tell us, we are not going to completely come out publicly and embrace the framework, but we are using it internally. Were using it even if we are not officially using it, we ar to measure ourselves against. In general, we are seeing more and more different uses for the framework. You are seeing different sectors come up with their own overlays for the framework. View success is one measure would be that when people start using it for things we never anti
Really to two root problems. The first is that the Cyber Systems that we rely on are inherently vulnerable. So the commercial operating systems, the commercial software packages, the commercial hardware platforms, these are all designed rimarily to address profit motives. They are easily obtained by the attacker. They can exploit and find the vulnerabilities in those systems and that is largely what they take advantage of. Thats probably not going to change any time soon. And then the second problem is that you have machines against people in a high speed battle. And now what do i mean by that . Well, you have hundreds of thousands of malware samples being generated every month. Thats not people writing that malware. Those are machines. Those are machines automatically circumventing all of our defense systems. That malware typically operates inside of an infrastructure that is also automatically controlled by machines. So the command and control notes, the hot points, the channels that
Corruption and the babylonians and the greeks had arguments about the use of it in some forms. I think this will continue to be a policy tension that we have to navigate. You will have love to talk about getting some better hackers. I think we have questions from the audience. If anyone has anything. [inaudible] david from politico. Can you elaborate a little bit more on white house observation of what was going on at the jp morgan and the other Financial Institutions and in what context . Was at standalone briefings or briefings in the context of just randomly suggested something russia sanctions . So, the way to think about this, part of our job on the National Security council is to make sure the president and his advisers remain informed about the wide array of National Security threats that come from the country. So that is the context we were treating this particular issue. Sure it is part of an ongoing Law Enforcement investigation with the fbi and secret service so there is a l
You probably all know that the government was quite hesitant to send its Ground Troops to occupy gaza because the defense capacity was talking about the fact that we did get into gaza with quite quite an extensive military composition was because of the tunnel. So we had the decision of the government. Remember, something hamas is looking for, this is one of their goals to change or to impact or to influence the decisionmaking of the government. We also had to impact the israelis as a whole. At first at least it was to be a big strategic surprise, even though the idf knew about the tunnel, it was not in the public discourse. Apparently was not high on the agenda of ideas because our way of handling the tunnels once we got there was not very quick. And the casualties were quite high. So it was a major obstacle or major issue, major challenge for us and they didnt have any proposal on the psychology of it. Focus on the south of course. They had a major impact but also in israel in genera