[inaudible conversations taking place] good morning. The committee is meeting to consider the nomination of selva, usaf for reappointment to the grade of general and to be commander, United States, transportation command and the nomination of Michael Rogers to be command of the u. S. Cyber calm and director of the National Security agency and director of the Center Security service. We welcome you and thank you for your years of service. And we thank your families who give up so much to enable you to serve. Transcom, which is the military mobility, the navy sea lift and the army command is the leech of the mobility. Transcom played a crucial role in supplying the operations in afghanistan and iraq. It has brought equipment home and we would be interested in how long we can wait for a Bilateral Agreement to be signed and meet the december 31st deadline for removing the people and equipment in the event we end up without an agreement. Like the other elements of the department of defense, transcom is facing constant threats from cyber intrusions. It must be sensitive to be v vulnerble but we must be aware of everything. We will release a report on contractors and the extent about intrusion reaches transcom and other key entities. We welcome your thoughts on dealing with this ongoing program. We heard testimony from general alexander regarding a number of pressing issues facing the command. We look forward to hearing admiral rogers on many of those views. We look forward to the tools and data sources the forces will have to work with, the ability of the military services to manage the careers of cyber specialist and the steps that should be taken to ensure the reserve components are integrated into the the cyber mission. The committee will be interested in admiral rogers views on bulk conversation records, internet records and other nsa issues that are raising concern on privacy. We will like to know your reaction with respect to 215 telephone record call program. That they have not quote, this is the board saying this, identified a single instance involving a threat to the United States in which the program made a concrete difference in the outcome of a Counter Terrorism investigation close quote. We would be interested in knowing what stepped you would take if affirmed to assess the value and weigh the value. Do you support the president s directive to modify the program so that bulk records are no longer held by the government while ensuring they can be accessed. And what is your requirement the government the must meet to require the search. Thanks again to both of the nominees for being here, for your service to the nation. Senator inhofe. Di expressed by agreement to minimize the capabilities but despite the strides the lack of cyber deterance and policy left us open to cyber aggression. I am concerned about the events by iran that involved an Enduring Campaign on United States banks and another involving a Critical Navy intercept wonetwork. This is going on in places where the america grid and wall street are at great risk. The president is going to get serious. The transcom provides the lifeline for every command by enabling them to execute a wide array of missions from combat operations to relief to training exercises to supporting c partners. I am intereded in the viability of assessments. And general frazier testified last year that the number of Cyber Attacks against transcom had doubled from 45,000 in 2011 to nearly 100,000 in 2012. The committee has been investigating these incidents and it appears there are a number of factors that should be addressed to ensure they have the information necessary from its many contractors to defend networks and protect mission criteria data. I look forward to hearing from the nominees and how they will Work Together to correct this. This isnt something that many people dont know about. I dont draw a difference between cyber attack or military attack. We will talk about that during the questions. Thank you, mr. Chairman. Thank you, senator inhofe. We are delated to have senator kirk with us. I am here to introduce mike rogers to the committee. I have known mike rogers for almost 40 years. We were in the same home room in high school together. I worked for him when he was the head of intel as the joint chief of staff. I would say uke you cannot pick an officer with a stronger work ethic or detail orientation than mike. I want to say that his being a republican i could not reckon anyone better you could have picked for the job. That concludes by statement. Thank you for that. The first question is we will ask is what did we know about the homework in home room . He is going to tell us secrets. Thank you for being with us. We will call in order of them being listed. Chairman levin, inhofe and members of had Armed Service committee, it is a great honor to appear to you as the commander of the United States transportation command. I want to that knows thank the members of the committee for their support throughout the last decade and have moved mo t mountains to support the sold r soldiers and it is because your continued support. I look forward at a working with you to navigate the transportation command. I am proud to introduce you to my wife of 34 years. She served in uniform for nine years and gives her time generously to support the amazing airman and their families that are part of air Mobility Command. She is the love of my life and apart from my mother the one of few who gives me the feedback i need who i step away from the center line. It is privilege to be here with mike rogers. I can think of no better person to serve in the capacity he is up for. If con firmed i look forward to working with the variety of people and the networks that make our nation successful. I appreciate the trust and confidence the president , secretary of defense and general dempsey but in me in considering this position. I am grateful to be here and look forward to the questions glad you introduced your family. I should have mentioned you are welcome to introduce family chairman levin, senator inhofe, and members of the committee, thank you for opportunity to stand here. I am honored the president has made me the director of the National Agencies and i thank hagel and general dempsey for their confidence in my ability. I am joined by my wife dana. 30 years one evening, she took a chance on a then young lieutenant rogers that shows to show truly great things can h happen to a sailor on liberty. I want to thank her were her willingness to take on a greater set of challenges. The life we lead in uniform is more difficult for our spouses than it is on us. I am blessed to have a great partner. Our sons are not with us, but one is serving duty and one is a Hardworking College student. And paul silver is here and we had the pleasure of working together before and i can attest to his significant ability fi t firsthand. I look forward, if confirmed to addressing the cyber issues facing today and in the future. We face a growing array of threats from terrorist, criminal groups and hackers who are able to steal information and destroy networks in a matter that risks the security. They do it through a manmade environment and thraw through capabilities that are consta constantically changing. This is hard work. If confirmed as the commander of United StatesCyber Command, my priority is to generate the capacity needed to work in this environment and provide a full range of options within the arena. I will partner with others in doing so. Particularly are allieallies, partners in defense, and agencies across the government and the congress. I am mindful we are talking about two organizations but execute related to linked mission sets. Each has the potential to make the other stronger and i will work to ensure each is appropriately focused. When there is differing opinions between them, i will make the call as the commander. I will also be every mindful we must do all of this in a manner that protects the Civil Liberties of the citizens. I will have the oversight mechanisms in place and i will be an active partner in implementing the changes by the president and my intent is to be as transparent as possible in doing so and in the broader execution of my dud duties if confirmed. I thank you for the commitment to the security of your nation. I believe in your and the missions you execute to defend the nation and its citizen. I am honored to be considered as your leader. And i want to thank Keith Alexander for his 40 years of service to the commission. He has made a huge contribution in this mission set and i thank him and debby for all they have given the nation. Finally, let me conclude by thanking the men and women who have given me the love and support of living the treme i have had since i was a young boy. To those who have shaped me, to those who led, mentored or taught, sometime kicked me in the tail, i thank them. I realize i am here because of the efforts of so many others in my life. Thank you for the opportunity to a appear before you and i look forward to your questions. We have standard said questions we ask and here they are. Have you both adhered to laws gov rng conflicts of interest yes, sir. Do you agree to give personal views . Yest yes, sir. Would any thing mess with the outcome of the service . No, sir. Will you meet the deadlines for records and hearings . Yes, sir. Will you cooperate with briefers to congressional responses . Yes, sir. Would those witnesses be protected from their testimony or briefings . Yes, sir. Do you agree if confirmed to testify upon request for this committee . Yes, sir. Do you agree to provide documents into timely manner when requested or to consult with the committee for any good faith or denial of providing such documents. Yes, sir. Lets try seven minutes for the first round. I will start with you general. I asked consider this. How long can negotiations continue before transcom is at risk of getting cargo out of afghanistan if there is no bilateral Security Agreement and we have to leave afghanistan by the end of the year . Senator, my undering from consulting with the staff on that question is that through the early fall we still have capacity in the variety of networks we are using to redeploy cargo from afghanistan to make the decision. I dont have a specific date but if confirmed i would get you one. The next question has to do with the intrusion the cyber intrusions and whether or not they affect dod information. Is it not important that transcom know of cyber intrusions that can pose a risk to operations even if they dont immediately affect dod data . Yes, sir. The network consist of logistic providers. 90 is air mobility and traveling on unclassified networks. Maintaining the security through appropriate mechanisms is critical to success. We have to assure of what we pass on the networks. So we have a stipulation they provide us with intrusions on their networks. I am not aware of the details you speak about but i look forward to working with your staff on them if confirmed. The president ordered to a transition to end 215 meta Data Collection program as it exist to quote prosever the capabilities that we need close quote but without the government collecting and holding the data on call detail records. What in your view are there essential capabilities that need to be preserved in transitions the program . Sir, there is an ongoing process to work through that. I am not part of it. But one thought would be the idea of speed. The ability to query to data to work the new mechanisms we will put in place in a time playmall. Do you agree the government doesnt need to hold the meta data to determine this information . In other words, it is the possible a third party could be assigned to hold the data and then have the Service Providers keep the data on the other hand . I believe with the right on construct we can make that work. Would it be limited to the Service Providers or would you want a third party . I think they are all under consideration and either scenario could work; whether a Service Provider or a third party there is challenges but i am confidant we can do so the privacy and civil liberty board and the president s Technology Group characterized 215 as useful but not critical. And the Oversight Board said quote we have not identified a single instance involving a threat to the United States in which the program made a concrete difference in the investigation. You have an assessment of how first the utility of the program and how it compares to the level of concern the American People have about its perceived impact on privacy. Sir, first as a nominee, i am not in a position to comment on the value of 215. But if confirmed i will be able to do so. I believe one of the most important functions is to articilate just that the value of the effort. Do you have an opinion as to whether or not there has been an instance involving a threat to the United States in which 215 has made a difference . Nothing specific. I have not had a chance to sit down and review the events. But if my memory is correct, it was outlined a number of instances in which he alexander thought 215 generated value. All right. Security agency. Have a this is also for you, admiral, do you think the department of defense is doing enough to provide capabilities to the Defense Cyber units by exploited commercial technology . I will use my own experience as the Navy Component to United StatesCyber Command where we have a continual outreach to the industry sector. And there is an aggressive effort to do so. Thank you. Senator inhofe. Thank you, mr. Chairman. We have expressed our concern about iran and the threats they oppose to us and that our intelligence and classified intelligence as far back as 2007 np indicated they would have a capability by 2015 with a wep within delivery and it was more expressed in a report classified by intelligence in 2010 refirming their suspicious thoughts earlier. I have been concerned about that. We have a president that thinks there is an opportunity to get them to join the Global Economy and reform their way. It is said they were able to infiltrate the Computer Network and raising questions they were able to access the blood stream of the navy network. I am going to quote from the report. Quote irans navy hacking was extensive. It took four months to purge them from the biggest unclassified network. If true, such an attack would be profound but it is unclear, what, if anything, the ad munstration would do in response to such behavior. Would a similar penetration by war planes be treated with ambivalence . I would hope not. Admiral rogers, Cyber Command means you are responsible for defending navy network so this happened under your watch, correct . Yes, sir, it did what the consequences of the iranian nations in the space some we never categorized who penetrated the network. I would be glad to talk about this in a classified session. This has been discussed in an unclassified session for a long time. We are torque talking about iran. Go ahead. I am sorry, not to my knowledge. An opponent was able to gain access to the system. In response, i generated a requirement to push them out hof the network and do a review of the entire network and use this as an opportunity to drive change within my service. What is the administration doing now in response to this attack . I am not in a position to comment. My opening statement, i quoted general frazier to testified last year that the numberf of Cyber Attacks went from 45,000 in 2011 to nearly 100,000 in 2012. Does that concern you . And to what level . My current position is their Mobility Command commander. I am aware of those statistics and we have taken aggressive action to secure the networks. The nature of the network requires us to have access from their networks as well. We work with those contractor to security the networks. So the number of attacks is more the number of probes and attempts to get into the network. Is confirmed for the position we worked that issue hard with general rogers team at cyber com and with our 24th air force team which is the designated unit. When he had a hearing with general sanders, who we have become good friends, he was asked who a cyber attack is an act of war and to explain the sort of actions an advisary might take he answered be believes if it destroyed military, Government Operations or the ability to operate, you dross crossed the line. Do you agree with that characterization . I agree. Do you agree they crossed the line . Who is the they you are referring to . When general alexander was asked who a cyber attack crosses the line and becomes an act of war and affected the ability to operate, do you degree with that characterization and do you degree we crossed that line . No, i dont believe be crossed the line. Do you agree the number of attacks doubling doesnt properly express our deterant against these attacks . Does this concern you we have doubled in the number of Cyber Attacks on us . I apologize. Is your question t o is your question for the general or myself . I am saying general frazier testified the number of Cyber Attacks on transcom, or period, increased from 45,000 to a 100,000 into period of a year, isnt that concerning . Are we not doing the job we should be doing . It is concerned. I think it is reflected in the level of investment they are maki making. Cyb