Processes that will enable us to match individuals as mr. Scott described. There are multiple tony scotts so we are working through the pilot and i think this will be an ongoing process and where the places we need human intervention where the places that technology can help with that resolution. Mr. Evanina can you speak to some of the challenges associated with verifying social media data . I think challenges cannot be understated in terms of number one Identity Resolution as my colleagues mentioned the ability to identify mr. Scott and all that goes with it and the resources it would take to make sure we are firmly in agreement and mr. Scott. Is it investigated lee and adjudicated fully relevant . Is a make sense to put forward and if it is a gets put in the same box to make sure it follows the policy procedures and investigative standards and guidelines. I want to reiterate social media the application of information is in the same box as all other tools and take makes. Even after we have verified individuals account additional manual processing is needed in order to analyze and interpret and contextualize information particularly photographs. Is there any way to fully automate the analysis of photographs . I want to refer back to my colleague in terms of the ability to maximize any type of automation to facilitate not only at the effectiveness that i want to inform the committee that at the end of the day no matter what we identify the adjudicator is a fundamental government world so they just adjudicator will make the decision. Thank you. I yield back the balance of my time. Spent the chair recognizes the gentleman from South Carolina mr. Mulvaney for five minutes. Thank you all for coming. I just have a couple of random questions. Mr. Evanina you said something in your Opening Statement. Use the same terminology and maybe i dont understand the issue and full disclosure. We are in the libertarian inning wing of the party so we take Civil Liberties very seriously and you mentioned there were Civil Liberties concerns i thank been doing this research in the first place. I dont get that. What is the sole what civil liberty of mine could be a risk by you doing research on me . I dont think of it in terms of the previous pilots in this particular policy. We had to negotiate strongly to ensure that each individual who applies for security clearance we are going to protect their privacy and Civil Liberties and at the same time collect information that. Im not trying to split hairs with you but if we had a similar discussion when it comes to folks who want to the come to the country on various deals but the lady who shot the people in San Bernardino came on a fiancee visa and we didnt do any social media and heard why Gary Kaminsky got from Customs Enforcement was it would violate her Civil Liberties to go and do that. If i come to you and im asking for job or in my current job to get his security clearance that you just get my permission to look at everything . As a matter of fact when he applied for asked fs 86 the first thing you have to do is transit to the government searching you. All your financial medical records to consent to do that. I have the right to waive that so theyre essentially no privacy issue on the front end when you are doing a Background Research on me, correct . As long as you consent to it or its. We are all the same page because the real Privacy Concern comes with what mr. Lynch mentioned which is what you do with the information and you have to have it as well i consent to let you go and get it i certainly dont consent with you giving it to other people. Thats the focus for many of us who are inches in our Civil Liberties. I want to go deeper and i think mr. Lynch properly pointed out what are you doing with mr. Massies medical records when you do research on him especially on massie, right . And get his Mental Health records. Actually ive got it right here. Page 17 is kind of interesting. Tell me about that because again we all know about the risks. Everyone in the country is hardwired to think my Social Security thing is important and i hope they are protecting that but what about the stuff that doesnt on its face look at like it could be damaging to us . Maybe mr. Scott went to a marriage counseling. Not illegal and i dont need to know thats true im not suggesting it is. It is certainly not the type of thing you want to have public. What you doing to protect that information, not just the Social Security numbers but the detail the meat of the stuff you might find on anybody you are looking at . I will start and i want to ensure the only collection and retention of data will be what is investigative way relevant to completing and operating a background investigation. If its not relevant to you obtain a clearance or wont be retained. Puts focus on that one word. Its an openended question. Nothing is not retained any more. But once you have that is someplace even if you get an eraser hard drive is someplace so what are you doing tonight sure the stuff that you dont retain really is retained . Congressman when we get the records of your back round investigation we have a set of rules and guidelines that govern those in that govern the sharing of those so it is used for the investigative decision but there are specific guidelines about how that information is used. We have specific guidelines about her true tension, consistent with there at and their policies and a core element in the cybersecurity design of our system particularly as we are thinking about is to go forward is how we make sure we have the appropriate protection and for all of that information not just Social Security numbers. There are explicit policies around records retention around rep sharing. Both externally within the government. This information was gathered for specific purpose and that is one of these for and there are guidelines in place. Just a quick question and id honestly dont know the inter. When the data was hacked was it just Social Securitys that were lost or other information as well . Information that was lost is data so it included a range of information not exclusively Social Security numbers. The chair recognizes the gentleman from california mr. Lieu for five minutes. My questions are for mr. Evanina. First of all thank you for your service. I have a broader concern which is whether race or ethnicity play a role in security clearance denial or granting let me give you some context for this. Recently for american citizens were arrested and indicted for espionage and then all charges were dropped. These were Different Cases and it turned out the government just got it wrong. One fact was the same in all these cases was the defendant looked like a pretty happen to be asianamericans. The case of their lives were turned upside down because of what our government did. The New York Times has asked the government to apologize but i wrote a letter to members of Congress Asking for the justice to investigate. Since i wrote that letter our office has been contacted by federal employees who happen to be asianamerican alleging that their security clearance was denied because of their race or ethnicity so my question to you is this race or ethnicity play a role in a row background investigations . Absolutely not and its a critically not. I dont think there has been a him situation where and number two the situation you reference i can say 19 years in the fbi can assure you that the app the eye does not conduct investigations relative to whether your race or race or ethnicity comes into play. Thank you. Let me ask you about how they lets say a japaneseamerican federal employee has a Facebook Page and friends of this federal employee living in japan or relatives post on their face but page. Is this federal employee become more suspicious because of that . Absolutely not and the only issue would need on a public face with page there are derogatory art information relevant to the investigation will result in a followup leave but otherwise it would not. U. S. Government under the up on the destruction ran something called the Insider Threat program where federal employees are asked to report another federal employees who may be suspicious. His race or ethnicity allowed to be taken into account under that program. Sir first of all the task forces house in my shop and again unequivocally race or ethnicity has no part in the entire thread process or the criticality we have across the government. Are federal employees when they are given training on the threat orgram and how to report are they given training about race and ethnicity play no part . Any fundamental training over a santa ethnicity crosses all boundaries. In terms of the past for his race and ethnicity or any type of genre are covered. Its never a part of the insider task force. Our Number One Mission is to identify potential insiders, spies. Those who seek to do harm to others. Could you provide my office with guidance on how you train federal employees . Absolutely sir create. I have gone to a number of National Security events and briefings and i think its not a secret that our National Security establishment looks very nondiverse and there are been added articles about them having to work routing people who are minorities and if im wondering if that has anything to do with security clearances and the inability of some folks are minorities who might not be able to get them. Did you give me data or statistics on to get security clearances based on race and ethnicity lacks. Im sure we can sir. Great, thank you that i yield back. Areas that the chair recognizes himself for a series of questions and i will be very brief. Let me follow up on a couple of clarifying things 3d of obviously put out this new policy and we applaud then we thank you for that. Is there any particular legal reason or practical reason why we would not be asking them for their on line identities . Well sir as part of the sf86 application when you run your name it asked do i have any other names are aliases that i go by . Im talking about on line identity, twitterer facebook. Im not going to give it in a public forum but i have twitter accounts that dont actually have my name associated with them and yet i would tweet out things based on that so is there any reason why we would nass for those types of things . I dont believe its a legal issue. The policy should we have to have cleared differentiation between what is investigative irrelevant and we can get to those areas. Havlir talking about social media that would be relevant. There is no expectation of privacy other than well you could perhaps make a case if im wanting to be private about it im not putting in my name but a few just asked for those on line identities would on line identities be synonymous with an alias . It could he sir. Snacks i guess that theres no legal or practical reason why we wouldnt do that why would it not be part of a new policy . Again i would say the policy is a start. So are you willing to look at that particular component about asking for other on line identities and maybe report back on your philosophy here within the next 60 days to this committee . Sir we are looking willing to look at all areas. Cms specifically a are you willing to look at them report back . Im not asking that you give me a definitive answer, but you get back to the committee on what your opinion as for why he should or should not do that. Yes sir prius hymn ms. Cobert im going to start with units something in the past id like to ask you with regards the cio and ig relationship how would you characterize that from where it has been and where it is today and if he could speak to that. Thank you congressman. We have been working across the agency to strengthen our effectiveness of our dialogue with the cio and i believe we have made Real Progress in a number of different areas. We have set up the cadence of regular communication at my level but the Inspector General and currently acting Inspector General on a biweekly races. The meeting get an overview of the issues. We have specific teams that were were made on a periodic basis as well around the ca ca1 procurement and we set up the same mechanism around the standup of the nbib even the oversight issues and making sure we get those rights i think we have made considerable progress in terms of the dialogue, the clarity of the communications. We welcome their input on what we could be doing better as we welcome input from our colleagues. You would characterize it as much improved and your leadership. I would characterize it as much improved. Cf. The chair recognizes mr. Mr. Lynch ford closing question or statement. Thank you mr. Chairman and again i want to thank you for being here. Im going to ask a question sort of off the grid here. I appreciate that your may can progress and thats a good thing and we will Work Together with dod to secure our systems. Theres another issue. You know these hackers have become so proficient. This morning we got news that the swift commercial bank system , think its 11,000 banks and companies that handle International Banking transactions, they were had again. They were just had through bangladesh and the new york fed which is troubling to the tune of 81 million. Now we find out theres another hack going on similar to that one so they are being breached. The fdic, chinese hackers news again this morning that the fdic has been hacked and these are entities that have fairly robust protections. And we are about to enter into this, well we are about to debate the transpacific harder ship and one of the provisions in that Transpacific Partnership requires u. S. Companies to establish databases in Foreign Countries, about 12 countries. One of them is vietnam so we would have to, the u. S. Companies would have to establish physically databases and most Companies Come in those countries malaysia vietnam and a lot of the banks and Companies Involved here are very concerned about the security aspect of this overseas. I just wonder especially mr. Evanina i know you worry about this stuff all the time and is well ms. Cobert you are dealing with mr. Scott as well. What about that dimension of this . I know you were prepared this morning to address this question and i appreciate it if you want to take a pass but im just worried about that, about stuff enough to protect the data when its in the United States and now we are being asked to force Power Companies dealing with International Trade to deposit their data into these Foreign Countries that dont have the security potentially that we have. Mr. Evanina to. Sir i concur with your concern for cybersecurity and the need for us to prepare to at least meet where we are in the whole economy. Im not particularly familiar with requirements within the policies i cant speak to that but in the purview of National Security a cyber threat is real and i think we have to take that into consideration for the thing we do moving forward whether domestically in the United States or any of our business is in Government Operations overseas. Ms. Cobert or mr. Scott you want to take a bite of that . I would say one of the Lessons Learned i think worldwide has been cybersecurity knows no National Boundaries and concerns about cybersecurity our global. Physical location is one element that probably in the case of cybersecurity not the most dispositive in terms of concerns i would have. Its more about this secure by design sort of notion, would it be put in place and how well is it implemented and so one . So those would be more my primary concerns. My concern is obviously the communist government of vietnam is going to require access. I have i will yield back. [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] on night on eight eastern on cspans q a. Now, army colonel for inherent result brief reporter on the pentagon on the fight against isis. He confirms that the u. S. Did not carry out the strike that killed the top has blood commander in damascus. This is about 40 minutes. Good morning everybody. Happy friday the 13th. Steve, youre looking great and were pleased to have you over you to use your. Thank you Pentagon Press corps, its always good to be with you on friday. Tonight im going to provide you with a short Operational Update across the battlefield we welcome the belgium announcement today that they will extend straight into syria and additional combat power to more rapidly defeat our enemy i sold the socalled caliphate relies on their ability to act like estates. The fact of the matter is, they cant do it. One of the reasons they cant do it is we have put a dent in their pocketbook. We have two operations targeting their finances. One is called operation pointblank, which aims to destroy the cash files that we find. The other is to focus on their oil revenue. These operational have had an impact. We know their total income has been reduced substantially and we know their income for oil specifically is been reduced by about 50