Transcripts For CSPAN2 Key Capitol Hill Hearings 20131126 :

CSPAN2 Key Capitol Hill Hearings November 26, 2013

There is kiva and then foundations where individuals can invest into those funds would be invested. Those are the two kinds of examples. One is an individual organization that has had a strategy such as kiva and then the other is an investor type of strategy. One thing i would add there is a federally funded program and one of the things you can do match savings for and without federal funding you can raise an additional match to that. A lot of the programs out of the country deal with dollars from individuals to help match the savings. There are also institutionalized groups like Angel Investors who do look at a wide range of applicants and i have heard that they are rich folks that just hang out on kickstart her but think generous amounts of donations to start ups. One of the questions we had e is which entrepreneurs are going to get funded so there need to be mechanisms to allow the lower income entrepreneurs to take advantage of that. If you care about this issue you should really weigh in because it can go against what we have been trying to work for. My name is teresa and my question is what efforts are there that either exist or should be made to include in the Enterprise Development as well as the entrepreneurial skills and assets that may not be given directly to the the orders more accessible to them so i dont know which one would be more do you want to talk about that and then maybe some others . I think historically about 5 or people with disabilities at least i have seen that in the different data sets that we have had. There is an Organization Called the abilities found that has worked closely with micro enterprise foundations to try to help those programs understand what barriers they maybe unintentionally putting in the way of working with people with disabilities and helping them revisit the policy procedures and standards etc. So i know different programs are more sensitive to others but there are models and mechanisms to make that happen and it is a certain target population the field has been interested in. I know in the past dated education about how to open doors and reduce barriers to people with disabilities in different ways through a variety of Technical Assistance offerings so there have been some efforts but there could be many more initiatives of that type but i think they have understood that is an important constituency. I agree there is a huge opportunity for more. One issue we face is a lack of awareness. Aeo along with citigrou gave ant the last conference to hearingimpaired organizational training entrepreneurs so i think trying to get more recognition and opportunity to increase that working model is huge and one of the things we are trying to do is promote a particular model that raises these programs. We are at 1 30s im going to draw to a close. Im going to think my panelists for being here and for your contributions today and most importantly for the work that provides the basis. I want to thank dawn again for setting the stage so nicely and thanks to the Casey Foundation for their support and debate ideas for jobs here eas easing e couple things one is the paper not just the micro Enterprise Fund that there is a website for big ideas for jobs, it bigideasforjobs. Org. We are going to do a second event at aspen focusing on a couple other papers in the series and specifically on the opportunities and policies that can support the social enterprise and educational institutions and others to create jobs again focused on individuals and communities that have the largest challenges. We dont have a date for that yet but we are working on it and we will send invitations to all of you again so look for that in the next couple of weeks. Thank you again for joining us have a happy thanksgiving and shop for Small Business on saturday. [applause] i think the word entitlement often has a negative connotation but the goal is for girls and women to operate with a greater sense of entitlement, to say i am deserving of that opportunity. I am prepared and qualified. But its all of those other doubts and insecurities that get in the way. She was a leading to some of it earlier but it takes a minimum of seven people to convince a woman to run for office. Would you venture to guess how many it takes to convince a man . [laughter] and it actually is not a joke. [laughter] i can say i was recruited to run for office. That is the case for most women. I wasnt in a corner calculating my political ascension. I was an aide to senator john kerry for eight years and prior to that i enjoyed being the person behind the person and found a great influence and reward in that. Priothat. Prior to my being recruited to run there had never been a woman of color elected to the council. How many times did they ask you . More than seven. [background sounds] [background sounds] november 25, 1953 approximate the 1 Million People lined the route of president kennedys funeral procession from the u. S. Capitol to the Arlington National cemetery. Millions more watched the television coverage. Beginning on thanksgiving day on cspan watch nbc coverage of president kennedys state funeral. Increasingly womens identities are tied up to their work in a way that we may not like and we may find disturbing and unnatural that it is true. When i look at someone like marissa wa who was chosen to bee ceo of yahoo when she was visibly pregnant and then was asked how much Maternity Leave you want to take and she said basically none. Affect such women exist isnt the way that i would. I took plenty of Maternity Leave but i feel like that is a kind of woman very can be and there are some stayathome dad who do not all entirely live in Portland Oregon and that is okay, too. Senior counterterrorism experts monday discussed the threats from socalled lone wolves at an event hosted by the Potomac Institute. Former intelligence official said another attack on the scale of 9 11 in the u. S. Is not likely but he also said that more needs to be done to counter the threat from those that would act alone. Ladies and gentlemen, my name is mike swetman of the Potomac Institute for policy studies and not for profits think tank in washington dc that focuses on science and technology and how science and technology is changing our society for almost 17 years now. We have been the host and the home of her International Center for terrorism studies had up by professor Yonah Alexander and i think most people here would agree and understand that the center that yonah heads is one of the most foremost institutions in the world focusing on all aspects of terrorism. Professor Alexanders Group has looked at from a study being published documents on every conceivable realm and aspect of terrorism for many years. He personally is an offer mac of over 100 books on the subject and we are quite proud here at the Potomac Institute to be the home of his academic efforts. We are also privileged to have partnered with the International Wall institute and professor wallace is here representing them as he always has with the International Institute and for well over a decade we have partnered with v. Ili and professor wallace to bring you these seminars and discussions. Today we are focusing and going to have high hope a very spirited discussion presentation followed by question and answer discussion with the audience on one of the most insidious and hard to defend parts of Terrorism Associated with the lone wolf where we have built up a tremendous body of policy and procedure for dealing with the groups and state sponsored terror for some. The lone wolf the individual plots put together a plot often in sympathy with the group it is often hard to find before hand. Finding and dealing with lone wolves will continue to be one of the most challenging aspects of the society going forward. How we use technology to do that and how we figure out how to use technology while protecting Civil Liberties will be one of the questions of our time so it is with a great privilege that i get to introduce the session today on the lone wolf terrorism and was that i will once again try to introduce the person who is impossible to introduce and that is professor Yonah Alexander who is the foremost expert on turf for some. Professor . Thank you very much, mike for your always generous introduction. Lets talk about technology. I would appreciate if you would kindly please. Mike mentioned the collaboration which our academic partners the International Wall institute and effect of the latest publication with professor don roberts and colleagues is on counterterror for some selected perpetrators. The next one will be available next week and the next one is on air on which i guess many people are concerned about. Today we do have a very distinguished panel to discuss what mike indicated is one of the most insidious challenges and we are really delighted to have their perspectives. Let me introduce the members of the panel, spike bowman of the fbi currently distinguished fellow at the center on National Security university of Virginia School of law and this is the other partner that we cooperate with. Then professor kumar at the school of Foreign Service Georgetown University and the president of the olson group mr. Wallace. Im going to say a few things and then turned to introductions before they speak. Usually what we try to do is keep in mind that terrorism is only one of the many challenges in terms of manmade and National Disasters therefore we always try to remember, never forget those who were victimized by both Mother Nature and manmade disasters and with this opportunity i would like to express sympathy for the victims in latvia who were killed in the supermarket and those who were killed in the typhoon in the philippines and those who were victimized by terrorist attacks from algeria to kenya and the ongoing attacks now in a serious, iraq, afghanistan, pakistan and elsewhere so that is one way to express our solidarity and sympathy of the victims. And then of course on the other side we have to honor those who served and save lives and protect lives off away from the First Responders to the police, the military and those of government and Civic Society to combat terrorism. Now president obama made a statement several years ago and said the most likely scenario, and i quote, that he would have to guard against what he calls the lone wolf operation rather then a coordinated terrorist attack. Obviously the top security concern is the Iran Nuclear War and the geneva deal and we would have to obviously focus attention on this issue as well and the question arises whether there is a link of connection between the lone wolf and buck weapons of mass destruction and we are going to discuss that today. Again, academically as mike indicated we try to sanction many of the issues which relate also to the lone wolf. Now, today it happens that this is the 50th anniversary of jfk and exactly 50 years ago the state funeral took place. I mention this because even the assassination of jfk is a big question in terms of the environment where they are giveg what they wolf wolf or member of some sort of conspiracy. Let me also mention that today, the month of november we have to remember some other attacks which relate to the lone wolf, whether it be attack at fort texas. But prior to that, in 1950 we remember the attempted assassination of president reagan by terrorists and the question is what is the definition of the lone wolf. Again there are many examples in recent history that focus attention on the lone wolf, for example in 198518 years ago when an individual assassinated Prime Minister and this can be regarded also as a lone wolf operation. Now again, the history recorded many instances of lone wolf but before we go to the examination the context to our discussion in terms of trying to look at the source by that i mean what are the challenges that we are facing in other words the challenges all the way from organized crime and the link between organized crime terrorism and the trafficking that we are discussing and from the financial threats around the world the Maritime Security concerns that are raised, transportation security concerns concerns, the infrastructure security, Cyber Security and environmental security. I just returned from a nato meeting in turkey and we discussed specifically the threats to north africa to the mahgreb and various stability all the way from the atlantic to the red sea and beyond. So, what is the bottom line . I think that the bottom line might indicated clearly the issue of Civil Liberties and the technology i would submit that we have three questions again and again, after 9 11 is the worst to come and secondly with the civilizations challenge and third, coming back to the concern strategies and democracies tend to exist. Now, if we look at the definitions related to trigger for some big anniversary and whether this means the lone wolf ie would sub made that we are facing basically three topics of challenges. One, we call them the lone wolf but we could also call them the individuals who were involved. Second, i think that we have to look at the groups. Some more sophisticated, some less sophisticated and other sponsors of terrorism so. Fundamentally we do have individuals. Some of them are mentally deranged and some of them waved the flag has to say a single issue of politics with ideologically based groups and religious intolerance movements and then we mentioned the bursa berries in the United States again we see all of this variety from what we call the hate crime for example those who are loyal to different kinds of ideologies or the religiousbased ideologies so in terms of whats happening in the United States whether we call them a freelance or leaderless resistance bonus but not political terrorist for example we have been able your shooting in september and this month at the los angeles airport and the low levels in america going all the way back if you will to 1968 when a palestinian decided to assassinate Bobby Kennedy because he was motivated [inaudible] also all of us remember the unit bomber who conducted a campaign for many years radicalized over the Technological Society and then of course we all remember what happened in 1995 and the affect of the Federal Building when 168 people were killed and 800 people were wounded. And then of course the most recent, 4foot shooting that nidal facilitated at the time fort hood shooting that nidal facilitated. Incidentally, we do have a pressing number of women who are also involved. We can look at the nonpolitical motivations and then we can look at the political motivations. Aits a tough fundamentally, i think that what we are going to discuss today basically the two sides we have to consider mostly on the political side, and then we can spend a semester at least for the various trends are not going to do it, but i think that it would be useful in terms of some context to discuss the phenomenon isnt very well understood and we have to keep in mind the terrorists are not born but they are created by various political, social, economic environments. In other words, the lone wolf terrorists they do not appear from outer space. They are part of our society. And they are the subject to the political and social economic ideologies in the environment. The technology and so forth some operate on one basis. There are a number of studies that were developed over the years on a daily basis and i think that it requires a great deal of interest in terms of radicalization and International Society tries to understand what can be done to deal with it. Ultimately the discussion would provide i think the initial context for discussion, and the first speaker as i mentioned is spike bowman, who has a very rich background in the government, in the military diplomatic activity and academic community. We are looking forward to his remarks via and then we are going to follow up with our other and then hopefully develop a discussion with all of you. Spike, if you would, peter. [inaudible] okay. Well, thank you, yonah. I first started thinking about lone wolf terrorist on right after 9 11. At the time i was the deputy general counsel for National Security affairs at the fbi. And we really didnt know an awful lot about al qaeda at that point in time. But we begin to click into it very quickly. And among the things that we learned was that there were a number of Training Camps in al qaeda in afghanistan. The worry looked at it, the more we realize that while al qaeda was trained in camps in afghanistan, an awful lot of other people had gone through there, too, not necessarily affiliated with al qaeda, not necessarily intending to go out and immediately descend being, but perhaps going there for training to do something later on. So we began to think about what would happen if one of those people began to decide to do something unattached, unaffiliated. The reason i made a big difference is because the way we looked for a terrorist and spies and so forth in the United States was largely through the foreign Intelligence Surveillance act. Which is ope

© 2025 Vimarsana