vimarsana.com
Home
Live Updates
Transcripts For CSPAN NSA Director Michael Rogers On Cyberse
Transcripts For CSPAN NSA Director Michael Rogers On Cyberse
Transcripts For CSPAN NSA Director Michael Rogers On Cybersecurity 20151220
It was not just get more information because more information is better. There was a conscious thought about how to we try to make sure this does not happen again. The revised structure that a new legal frame puts in the place, the biggest differences under the old structure, the phone companies provided us data and we queried at. It. The new structure, the phone companies retain data, we get a court order, and the phone
Company Provides
specific data. Three weeks in in the process. We are working with the initial set of providers we will continue to finish the refining of the process with them. We will look to add additional providers over time. It is working well so far. It is not an insignificant challenge for our private company teammates. Were asking them to do something they have not done before. They have been cooperative. I have no problem with the private sector we are dealing with here. Each of them has a slightly different policy as to how long they retain a slightly different process for how they provide it. The biggest thing we need to assess, i promised we would do this. We need to get a sense for timing. What is the new structure to generate timely insight. We need to run this and get a sense for real
Empirical Data
and make an assessment. I dont know enough yet we are in the early stages. I will provide that information back. A question from the audience. Nations state cyberattacks for the purpose of espionage are on the rise. Nsa, usa we see government direct involvement of the commercial industry . Michael it is a broad question. I would make a couple point. Points. Why cyber isasons challenging is it because is because it calls into question things like military, the department of defense we organize geography around problems. That is why we have six different commanders. The challenge is cyber does not recognize geography. It is not recognize these lines in the math we have drawn in terms of boundaries between commanders. Likewise, traditionally in the u. S. We have been clear in drawing a line between what is inherently government function, what is not. Recognize not distinction between what is government and private. If i used the dod model, much of what we use for infrastructure is the exact same infrastructure all of you are using in your business and private lives. Wasdays when the fence going to create these standalone structures dedicated purely to the indications associated with the department, we have those in some areas, the nuclear area is a good example. The reality is we like the broader world around us but transitions to a commercialbased approach on how we do communication. How would you command and control and the basic infrastructure providing power to bases and installations. To how we communicate with each other is in the private after sector. I think we have to figure out what the role of government is and the private sector. I think it is unrealistic to expect the private sector to withstand the efforts of nationstates to access their intellectual property. Likewise i think it is unrealistic to say that is the role of the government. We in the private sector have no part. The things i said before dinner is because i am a
Firm Believer
in partnerships. We have to create a
Strong Partnership
between the private sector and government when it comes to
Cyber Defense
. Neither of us can do this alone. This is only getting it tougher. A bit of a followon, it comes from one of the audience. Do you feel you have enough authority to be able to carry this off . Do you think the dod
Cyber Strategies
serves enough of a purpose . What authority do you think you need or you have already. What might you need to be fully effective . Michael we are starting to morph into my u. S. Cyber command job. Nsa
Information Assurance
mechanism we are a foreign intelligence organization, and an
Information Assurance
. Traditionally, nsa assurance is to develop classified systems within the deity dod. Doing the same for the a u. S. Government. Partnering with other elements of the u. S. Government to help develop those same standards. More broadly across other elements of the government as well as the private sector. Providing our cyber expertise to help address issues of the department of defense. Support dod combat agency. As the director of the nsa and the director of
National Intelligence
is one of my bosses. The challenge at nsa for
Cyber Security
increasingly is jim has heard me use this expression , nsa is becoming a fema if you all of cyber response. Major hackot been a in the private sector that we have not ultimately partnered with the fbi seemingly in the last 18 months. If you told me i would be spending my time working with a
Motion Picture
company in the form of sony that was november 2014 that was an interesting thanksgiving dinner at my house when i got a phone call. Sony needs help. It will only get tougher. One of the challenges it nsa when it comes to
Cyber Security
to cyber and it comes security is, what is the expectation for nsa in terms of. Gov. The
Cyber Command
has a responsibility for the other domain. What role is the government of defense in the. Com arena. We will work our way through this. This is incredibly complicated. Ithin the. Gov and. Mil arena, am comfortable that we have the defense and authorities we need. I think we need to i think we need to work to the
Legal Framework
. The process is in place. To ensure the government provides capability under specific circumstances in the. Com arena and particular areas within private infrastructure. Forhat is the expectation reasonable levels of privacy in this new age . How do you see that playing into issue of government into the. Com, the protection michael one of the challenges for nsa i tend to be direct, much of our focus over the immediate environment has been on foreign intelligence. We also have an
Information Assurance
mission. I am not interested in collecting data. I dont want pi data for example. As we work through this cyber iece iation peas p am fast to say i dont want private and personal data. Our
Legal Framework
kicks into place. I have to have specific controls put in place. It starts to slow us down. When it comes to
Cyber Defense
it is all about precision and speed. I dont want that data. Under the
Legal Framework
i have to put specific restrictions in place for good reason. Those are optimized for our foreign intelligence. It is not to defend networks in the u. S. I want to shift gears. We have a lot of
Industry Partners
in the room. You talked about the need for agility, the need to prioritize. What would you like industry to provide for you . Michael when we rollout, we can get more specific. One of the premises i have given the team is, if you look at , nro,model, traditionally a
Smaller Government
different than most relies on contractors to design, launch, mike make, fly, and operate. With a small government footprint that does oversight requirements, qc, nsa opposite extreme. Much bigger government footprint. The nsa model was traditionally was to hire the best mathematicians, engineers,
Computer Scientist
we could. Traditionally nsa did almost all of the
Development Work
on
Mission Capabilities
internally. We developed our model traditionally was developed inhouse. We generally use the private sector in a term form of contractors. Can you augment our read workforce in key business areas. Can you provide assistance in support functions. One of the premises, this will come out in the nsa 21 idea. I am not sure that optimizes us for the future. The enginesat where of innovation are, the greatest rate of changes, i does he that in the government sector come i see it in the private sector. Had we create a framework to enable us to work with the private sector in a integrated way . How do we access the
Technology Going
on resident in the private sector and bring it into what we are doing, as opposed to defaulting to developing ourselves. How wees for not only relate to the private sector, but how we develop our own workforce. With that retention. Our model is, you work for us for decades. Once you are inside, the egos thos and sensee of team leads to retention levels. We have a workforce that doesnt necessarily have as broad experience with the outside world at times as i would like. My argument is, can we create a model where we can move a work for us for a while, go in the private sector and come back. That has not been model. Likewise, our model had never been can we bring people who have been in the private sector for significant amounts of time i run into this all the time in the valley. People approach me and say, hey, i have been working i. T. Out here for 10, 20 years. I have made a lot of money. My children are in high school or college. I am very comfortable from dust with what i had done. I would like to pay back a little bit. Is there way for me to be a part of your structure . Quite honestly, traditionally, we were not optimized to do that. I think we need to ask ourselves, what do we need to do to make that a possibility. Another reason i will shut up. One of the things that strikes me in a post media environment. I watched two cultures who think they understand each other. When i talk to my workforce, i will ask, what do you think of when you think of
Silicon Valley
. Many times i workforce will tell me, they are all about money. Is to, their self image harness the power of technology to fundamentally change the world. What is wrong with that . What is incompatible with that belief and her own self e thos, if we are focused on a greater good and using our capabilities to defend the nation. What is incompatible . A lot of times when i am in the valley, i ask counterparts, what do you think of the nsa . Nearly now any post me media leak environment. They say, you have the workforce we did not want to hire. I said, why are you recording them recruiting them like there is no smart . You are scooping them up constantly when the small number leave. We are each talking past each other. The reason im trying to argue for a crosspollination model is, i think both segments can learn something. I apologize i went long. It is great. We have a question from some of the big companies. They have representatives in the room. They have partnered with nsa. The challenge of your
Small Business
quotas, percentages that you are asked to try and achieve, there are big programs and big things you have to contend with. Do you see any way forward in getting over some of the hurdles that we see today. Things go to
Small Business
es ause there is small quota
Small Business
quota to achieve versus
Large Companies
that might have 30 50 of subcontractors actually being part of their partnering team. How do we get to a middle ground where we can do the best thing for you, while accommodating margins of
Small Business
es. When i am smiling talk to
Small Business
their comment i will be shocked when i walk out. Is talk tol you do many
Large Companies
say, how come the
Small Business
es get an advantage . Away, ithe key take know we are running out of time is, we have to create a structure where we can get the best of both of those things. From the large the small. The large segment offers a potentially great innovation. Many of them have a good understanding of us as an organization. When i look at the small sides i think to myself, they have agility. Working on very specific cutting
Edge Technologies
i am interested in. But you dont understand because youre not used to dealing with us, you find is overwhelming. It is one of the reasons why the department has created the
Innovation Organization
in the valley. It is one of the reasons we created intelligence communities. Is of the reasons why nsas trying to bridge that gap. What is the role of nsa in the context of doe . And
Cyber Defense
of the u. S. Power grid infrastructure. How do you see the consortium of
National Agencies
as it relates to the protection of people. Designated ase the defense and oversight of the domain. Theas been designated as primary for the applications of government capability and support of the private sector. Test over toll the. E
Law Enforcement
element from a
Law Enforcement
perspective on private sector. Nsa is not the lead on any of this. We are all about partnerships. I am always partnering with fbi dhs and others as how to we play capability the example of sony, how do we
Work Together
in this case with how will we partnered together to work with sony. The other thing interesting with sony is it was not only working with sony, but it was also working with a private security company. A
Cyber Defense
of company they had hired. We found ourselves for organizations trying to
Work Together
four organizations trying to
Work Together
. When i first got a call, i thought, i can just picture the general counsel in california. We will set ourselves up for liability. You need to be concerned. I thought they were great partners from the beginning. They would say, tell us what you need. I said, for us to truly understand and reconstruct this, i really need to get into the data and reconstruct a particular entry come i cannot do that at a high level. They didnt push back at all. The partnership worked out really well. That leaves me heart and for heartened for, if we can do with them, cant we do with others . It was frustrating because i am glad we have this partnering, but the cow is out of the barn. They have been penetrated, the data has been stolen. The viper malware has been launched. We are recovering. As a military guy, i like to get ahead of problems. I like to shape the environment, generate the outcomes i want, not what the adversary wants. That is frustrating for me. We have to work our way through it. I know youre not in a talk a lot about your reorganization. You still have work ahead. We do have a couple of questions we would like to any thoughts about combining
Information Assurance
directive and some cyber comp functions, or looking towards the future. Patty feel about the dual had responsibility for a
Single Person
for nsa and
Cyber Command
. Maybe your thoughts as to how youre looking at is from an outcome perspective . Michael the first point i would make is what we are going to do with nsa, i was adamant it had nothing to do with u. S. Cyber command. We must position nsa for success in the future across the breadth of our customers. We cannot allow one particular customer, even though we live together, we cannot allow them to be the primary or sole driver for how we structure. Ourselves in the future i was adamant about that. We have a huge set of customers. We have to optimize ourselves for the entire set of requirements. Not arguing that one is not important, but we cannot we can still optimize. In terms of merging
Cyber Command
, i know we will not do that. Nsa, different organizations, different but related missions that operate broadly under two very different set of authorities. Different budgets, different funding. We will not merge. Terms of the long run, u. S. Cyber command i think we are still not in a position yet where we are truly ready to operate the synergies between us. We efficiencies that achieved by bringing these two organizations together under one individual, and for amber whited why wethis remember do this, we did not want to replicate the billions of dollars of investments in the nsa infrastructure. We also thought, in bringing the centers of cyber excellence together in one related framework, tied together by one individual would produce better outcomes. That has been expressed to date. We will work our way through the longterm answer in the future. I will say, as u. S. Cyber command brings online more and more of the
Cyber Mission
for us , when i look at the workload. It is not insignificant. We have enough resources . Where are you on that . Michael if i can get more hours in the day. I have a clock or does that. That does that. Michael do i think that over time we will require a greater level of investment and cyber . Yes. When i argued that is true for the government . Yes. Is that true for us as a nation . Yes. Where we are and cyber is not where we will be in the future. Do not obsess over the idea of perfection and structure now the way we think it will be five10 years from now. This is a mission in which technology is best capability continues to evolve. We need to break this down into bite sized chunks and we need to evolve. We need to realize that change will be a constant. At times i have watched this be perhaps almost paralyzed by this quest for we have to be perfect answer. I say, lets get to 80 , lets learn. Lets evolve. That is about agility and innovation. We have to be the exact same way. That dod and
Cyber Command
is not unique to the government. We all find ourselves in that challenge. A bit of a multipart question coming from a number of the questions. Wase a challenge being able to perform a
National Strategic
mission as well as a
Company Provides<\/a> specific data. Three weeks in in the process. We are working with the initial set of providers we will continue to finish the refining of the process with them. We will look to add additional providers over time. It is working well so far. It is not an insignificant challenge for our private company teammates. Were asking them to do something they have not done before. They have been cooperative. I have no problem with the private sector we are dealing with here. Each of them has a slightly different policy as to how long they retain a slightly different process for how they provide it. The biggest thing we need to assess, i promised we would do this. We need to get a sense for timing. What is the new structure to generate timely insight. We need to run this and get a sense for real
Empirical Data<\/a> and make an assessment. I dont know enough yet we are in the early stages. I will provide that information back. A question from the audience. Nations state cyberattacks for the purpose of espionage are on the rise. Nsa, usa we see government direct involvement of the commercial industry . Michael it is a broad question. I would make a couple point. Points. Why cyber isasons challenging is it because is because it calls into question things like military, the department of defense we organize geography around problems. That is why we have six different commanders. The challenge is cyber does not recognize geography. It is not recognize these lines in the math we have drawn in terms of boundaries between commanders. Likewise, traditionally in the u. S. We have been clear in drawing a line between what is inherently government function, what is not. Recognize not distinction between what is government and private. If i used the dod model, much of what we use for infrastructure is the exact same infrastructure all of you are using in your business and private lives. Wasdays when the fence going to create these standalone structures dedicated purely to the indications associated with the department, we have those in some areas, the nuclear area is a good example. The reality is we like the broader world around us but transitions to a commercialbased approach on how we do communication. How would you command and control and the basic infrastructure providing power to bases and installations. To how we communicate with each other is in the private after sector. I think we have to figure out what the role of government is and the private sector. I think it is unrealistic to expect the private sector to withstand the efforts of nationstates to access their intellectual property. Likewise i think it is unrealistic to say that is the role of the government. We in the private sector have no part. The things i said before dinner is because i am a
Firm Believer<\/a> in partnerships. We have to create a
Strong Partnership<\/a> between the private sector and government when it comes to
Cyber Defense<\/a>. Neither of us can do this alone. This is only getting it tougher. A bit of a followon, it comes from one of the audience. Do you feel you have enough authority to be able to carry this off . Do you think the dod
Cyber Strategies<\/a> serves enough of a purpose . What authority do you think you need or you have already. What might you need to be fully effective . Michael we are starting to morph into my u. S. Cyber command job. Nsa
Information Assurance<\/a> mechanism we are a foreign intelligence organization, and an
Information Assurance<\/a>. Traditionally, nsa assurance is to develop classified systems within the deity dod. Doing the same for the a u. S. Government. Partnering with other elements of the u. S. Government to help develop those same standards. More broadly across other elements of the government as well as the private sector. Providing our cyber expertise to help address issues of the department of defense. Support dod combat agency. As the director of the nsa and the director of
National Intelligence<\/a> is one of my bosses. The challenge at nsa for
Cyber Security<\/a> increasingly is jim has heard me use this expression , nsa is becoming a fema if you all of cyber response. Major hackot been a in the private sector that we have not ultimately partnered with the fbi seemingly in the last 18 months. If you told me i would be spending my time working with a
Motion Picture<\/a> company in the form of sony that was november 2014 that was an interesting thanksgiving dinner at my house when i got a phone call. Sony needs help. It will only get tougher. One of the challenges it nsa when it comes to
Cyber Security<\/a> to cyber and it comes security is, what is the expectation for nsa in terms of. Gov. The
Cyber Command<\/a> has a responsibility for the other domain. What role is the government of defense in the. Com arena. We will work our way through this. This is incredibly complicated. Ithin the. Gov and. Mil arena, am comfortable that we have the defense and authorities we need. I think we need to i think we need to work to the
Legal Framework<\/a>. The process is in place. To ensure the government provides capability under specific circumstances in the. Com arena and particular areas within private infrastructure. Forhat is the expectation reasonable levels of privacy in this new age . How do you see that playing into issue of government into the. Com, the protection michael one of the challenges for nsa i tend to be direct, much of our focus over the immediate environment has been on foreign intelligence. We also have an
Information Assurance<\/a> mission. I am not interested in collecting data. I dont want pi data for example. As we work through this cyber iece iation peas p am fast to say i dont want private and personal data. Our
Legal Framework<\/a> kicks into place. I have to have specific controls put in place. It starts to slow us down. When it comes to
Cyber Defense<\/a> it is all about precision and speed. I dont want that data. Under the
Legal Framework<\/a> i have to put specific restrictions in place for good reason. Those are optimized for our foreign intelligence. It is not to defend networks in the u. S. I want to shift gears. We have a lot of
Industry Partners<\/a> in the room. You talked about the need for agility, the need to prioritize. What would you like industry to provide for you . Michael when we rollout, we can get more specific. One of the premises i have given the team is, if you look at , nro,model, traditionally a
Smaller Government<\/a> different than most relies on contractors to design, launch, mike make, fly, and operate. With a small government footprint that does oversight requirements, qc, nsa opposite extreme. Much bigger government footprint. The nsa model was traditionally was to hire the best mathematicians, engineers,
Computer Scientist<\/a> we could. Traditionally nsa did almost all of the
Development Work<\/a> on
Mission Capabilities<\/a> internally. We developed our model traditionally was developed inhouse. We generally use the private sector in a term form of contractors. Can you augment our read workforce in key business areas. Can you provide assistance in support functions. One of the premises, this will come out in the nsa 21 idea. I am not sure that optimizes us for the future. The enginesat where of innovation are, the greatest rate of changes, i does he that in the government sector come i see it in the private sector. Had we create a framework to enable us to work with the private sector in a integrated way . How do we access the
Technology Going<\/a> on resident in the private sector and bring it into what we are doing, as opposed to defaulting to developing ourselves. How wees for not only relate to the private sector, but how we develop our own workforce. With that retention. Our model is, you work for us for decades. Once you are inside, the egos thos and sensee of team leads to retention levels. We have a workforce that doesnt necessarily have as broad experience with the outside world at times as i would like. My argument is, can we create a model where we can move a work for us for a while, go in the private sector and come back. That has not been model. Likewise, our model had never been can we bring people who have been in the private sector for significant amounts of time i run into this all the time in the valley. People approach me and say, hey, i have been working i. T. Out here for 10, 20 years. I have made a lot of money. My children are in high school or college. I am very comfortable from dust with what i had done. I would like to pay back a little bit. Is there way for me to be a part of your structure . Quite honestly, traditionally, we were not optimized to do that. I think we need to ask ourselves, what do we need to do to make that a possibility. Another reason i will shut up. One of the things that strikes me in a post media environment. I watched two cultures who think they understand each other. When i talk to my workforce, i will ask, what do you think of when you think of
Silicon Valley<\/a> . Many times i workforce will tell me, they are all about money. Is to, their self image harness the power of technology to fundamentally change the world. What is wrong with that . What is incompatible with that belief and her own self e thos, if we are focused on a greater good and using our capabilities to defend the nation. What is incompatible . A lot of times when i am in the valley, i ask counterparts, what do you think of the nsa . Nearly now any post me media leak environment. They say, you have the workforce we did not want to hire. I said, why are you recording them recruiting them like there is no smart . You are scooping them up constantly when the small number leave. We are each talking past each other. The reason im trying to argue for a crosspollination model is, i think both segments can learn something. I apologize i went long. It is great. We have a question from some of the big companies. They have representatives in the room. They have partnered with nsa. The challenge of your
Small Business<\/a> quotas, percentages that you are asked to try and achieve, there are big programs and big things you have to contend with. Do you see any way forward in getting over some of the hurdles that we see today. Things go to
Small Business<\/a>es ause there is small quota
Small Business<\/a> quota to achieve versus
Large Companies<\/a> that might have 30 50 of subcontractors actually being part of their partnering team. How do we get to a middle ground where we can do the best thing for you, while accommodating margins of
Small Business<\/a>es. When i am smiling talk to
Small Business<\/a> their comment i will be shocked when i walk out. Is talk tol you do many
Large Companies<\/a> say, how come the
Small Business<\/a>es get an advantage . Away, ithe key take know we are running out of time is, we have to create a structure where we can get the best of both of those things. From the large the small. The large segment offers a potentially great innovation. Many of them have a good understanding of us as an organization. When i look at the small sides i think to myself, they have agility. Working on very specific cutting
Edge Technologies<\/a> i am interested in. But you dont understand because youre not used to dealing with us, you find is overwhelming. It is one of the reasons why the department has created the
Innovation Organization<\/a> in the valley. It is one of the reasons we created intelligence communities. Is of the reasons why nsas trying to bridge that gap. What is the role of nsa in the context of doe . And
Cyber Defense<\/a> of the u. S. Power grid infrastructure. How do you see the consortium of
National Agencies<\/a> as it relates to the protection of people. Designated ase the defense and oversight of the domain. Theas been designated as primary for the applications of government capability and support of the private sector. Test over toll the. E
Law Enforcement<\/a> element from a
Law Enforcement<\/a> perspective on private sector. Nsa is not the lead on any of this. We are all about partnerships. I am always partnering with fbi dhs and others as how to we play capability the example of sony, how do we
Work Together<\/a> in this case with how will we partnered together to work with sony. The other thing interesting with sony is it was not only working with sony, but it was also working with a private security company. A
Cyber Defense<\/a> of company they had hired. We found ourselves for organizations trying to
Work Together<\/a> four organizations trying to
Work Together<\/a>. When i first got a call, i thought, i can just picture the general counsel in california. We will set ourselves up for liability. You need to be concerned. I thought they were great partners from the beginning. They would say, tell us what you need. I said, for us to truly understand and reconstruct this, i really need to get into the data and reconstruct a particular entry come i cannot do that at a high level. They didnt push back at all. The partnership worked out really well. That leaves me heart and for heartened for, if we can do with them, cant we do with others . It was frustrating because i am glad we have this partnering, but the cow is out of the barn. They have been penetrated, the data has been stolen. The viper malware has been launched. We are recovering. As a military guy, i like to get ahead of problems. I like to shape the environment, generate the outcomes i want, not what the adversary wants. That is frustrating for me. We have to work our way through it. I know youre not in a talk a lot about your reorganization. You still have work ahead. We do have a couple of questions we would like to any thoughts about combining
Information Assurance<\/a> directive and some cyber comp functions, or looking towards the future. Patty feel about the dual had responsibility for a
Single Person<\/a> for nsa and
Cyber Command<\/a>. Maybe your thoughts as to how youre looking at is from an outcome perspective . Michael the first point i would make is what we are going to do with nsa, i was adamant it had nothing to do with u. S. Cyber command. We must position nsa for success in the future across the breadth of our customers. We cannot allow one particular customer, even though we live together, we cannot allow them to be the primary or sole driver for how we structure. Ourselves in the future i was adamant about that. We have a huge set of customers. We have to optimize ourselves for the entire set of requirements. Not arguing that one is not important, but we cannot we can still optimize. In terms of merging
Cyber Command<\/a>, i know we will not do that. Nsa, different organizations, different but related missions that operate broadly under two very different set of authorities. Different budgets, different funding. We will not merge. Terms of the long run, u. S. Cyber command i think we are still not in a position yet where we are truly ready to operate the synergies between us. We efficiencies that achieved by bringing these two organizations together under one individual, and for amber whited why wethis remember do this, we did not want to replicate the billions of dollars of investments in the nsa infrastructure. We also thought, in bringing the centers of cyber excellence together in one related framework, tied together by one individual would produce better outcomes. That has been expressed to date. We will work our way through the longterm answer in the future. I will say, as u. S. Cyber command brings online more and more of the
Cyber Mission<\/a> for us , when i look at the workload. It is not insignificant. We have enough resources . Where are you on that . Michael if i can get more hours in the day. I have a clock or does that. That does that. Michael do i think that over time we will require a greater level of investment and cyber . Yes. When i argued that is true for the government . Yes. Is that true for us as a nation . Yes. Where we are and cyber is not where we will be in the future. Do not obsess over the idea of perfection and structure now the way we think it will be five10 years from now. This is a mission in which technology is best capability continues to evolve. We need to break this down into bite sized chunks and we need to evolve. We need to realize that change will be a constant. At times i have watched this be perhaps almost paralyzed by this quest for we have to be perfect answer. I say, lets get to 80 , lets learn. Lets evolve. That is about agility and innovation. We have to be the exact same way. That dod and
Cyber Command<\/a> is not unique to the government. We all find ourselves in that challenge. A bit of a multipart question coming from a number of the questions. Wase a challenge being able to perform a
National Strategic<\/a> mission as well as a
Tactical Mission<\/a> with limited resources. One of the problems we have is being a target
Centric Organization<\/a> at the tactical level. Yet you still have a mission to be able to provide support to all sources of intelligence. Ablere you doing and being to provide that support and contribute to the context . What tensions you face do you face . Michael from my perspective i would argue it has always been nsas biggest challenge in some ways, but it is also the biggest that ourin the sense customers set and expectations go from helping to generate we are part of a broader team. To help generate the strategic insight that helps shape the nations decisions at a senior level. The broad choices we will make in the
National Security<\/a> structures. At the same time we go all the way down on the very edge of the tactical battle space everywhere on this planet for the deities. Dods. Nsa is out there. Successful, we have to work that spectrum. Frustrations at times is as an intelligence professional is be wary of swinging to the extremes too much. Whether that is the measure of success of how many articles like it in everyday. I get in everyday. That drives me crazy. It is all about how misinformation are you creating an afghanistan, still in the blanks. We have to position ourselves to be in that spectrum. We have to constantly ask ourselves, how do we maximize finite resources. How we make this tradeoffs . That is why the partnerships are critical. The idea that the nsa will be this powerhouse and do it by itself, i dont think that is workable. It is about how to we create partnerships, highly generate capability for from other parts of the world. Most people dont realize the real strength of nsa is this fact that we have been able to create an integrated structure that does not matter if the sensor is on an orbit above the surface of the earth, on a summary, it is on someones back , if it is a tactical remote capability, if it is done by a network, it doesnt matter for us. Thateated an enterprise to aligns to live that into a single process. And then we harness big data. That is what generated the level of insight over the last 15 years. From the seniormost policymakers to the
Tactical Commanders<\/a> and operation level come to rely on from nsa. We have got to maintain that legacy. Im very confident in our ability to do it, given the men and women that i have the honor of serving with everyday. I would be the first to admit, it is not without challenges. A lightning round. We are getting the hook. We got a lot of questions on isis. Some of these nonstate actors as you can imagine. Thatpen to have something you apparently said, it is what keeps me up at night. Michael i have no problem sleeping. This has nothing to do with your bedroom have it. Habits. What happens when a nonstate actor who has no interest in a status quo take isis for example, his vision is opposed to ours, start viewing the web is not just a vehicle to that theynue, instead view it as a weapons system. Michael what do we do . We look at you have social media and all of these challenges now. The good old days seem better. To use how do we look the capabilities we have . To forestall it is something we spend a lot of time thinking about. It is not unique to that particular group. It is a challenge we will be dealing with. Cyber is the great equalizer. It does not take billions of dollars of investment. It is not take decades of time. It is not take a huge dedicated uniformed workforce to form a big military. It is the great equalizer. It uses technology readily available in any nationstate, individual or group. They just harnessed the power of a simple search engine. Thank you for a great discussion. It was great, thank you. [applause] [captions
Copyright National<\/a> cable satellite corp. 2015] [captioning performed by the national captioning institute, which is responsible for its caption content and accuracy. Visit ncicap. Org] we had over 50 questions we could not get to. Thank you. Let me just say the inside tonight, your presentation on this very, very interesting dialogue and q a gives us great insight into the challenges that are facing the country and the unique role that nsa has in protecting the country. Thank you. Michael thank you. In, i had ad chime chance to spend three years at nsa, i learned so much from the people there. One of the things i learned as when you it is hard see the adversary, there is no more dedicated workforce than that which we havent nsa. I saw men and women pass out because they were so dedicated. They felt they had to contribute. They left vacations and jobs. Admiral rodgers, congratulations to your workforce. Michael to the workforce that nsa. At nsa. [applause] we have a token of appreciation. Admiral, thank you. Rogues gallery. Two of these three have convictions. Can you pick . We will all be looking forward to nsa 21. To all of you and all who made it possible, have a good evening. Drive safely, happy holidays. Announcer next,
Homeland Security<\/a> secretary jeh johnson outlines changes to the
National Terror<\/a> alert system. Reserve chair janet yellen announces a hike in the interest rate. After that a house hearing on u. S. Pakistan relations. Announcer on a next washington journal, a political roundtable on the 26 in campaign with democratic pollsters
Stefan Hankin<\/a> and the public and pollster kelly and conway. Later marc ginsberg, former ambassador to morocco talks about e","publisher":{"@type":"Organization","name":"archive.org","logo":{"@type":"ImageObject","width":"800","height":"600","url":"\/\/ia601302.us.archive.org\/1\/items\/CSPAN_20151220_073000_NSA_Director_Michael_Rogers_on_Cybersecurity\/CSPAN_20151220_073000_NSA_Director_Michael_Rogers_on_Cybersecurity.thumbs\/CSPAN_20151220_073000_NSA_Director_Michael_Rogers_on_Cybersecurity_000001.jpg"}},"autauthor":{"@type":"Organization"},"author":{"sameAs":"archive.org","name":"archive.org"}}],"coverageEndTime":"20240623T12:35:10+00:00"}