The subcommittee will come to order. I want to welcome everyone to todays hearing of the emerging threats and capabilities subcommittee of the House Armed Services committee. With the president budget request released earlier today, this is our first opportunity to explore this request and the major implications for key defense missions. I think it is fitting that the first area we will dive into is cyber. This is an increasingly important area on overseeing the departments progress in building and maintaining cyber forces to protect, defend, maintain, and when necessary conduct offensive operations in cyberspace. As we move towards developing the fiscal year 2018 and daa, i have made cyber and cyber warfare one of my main priorities. In the coming weeks, Mac Thornberry and i, and the house Ranking Member adam smith stand to introduce legislation that strengthens congressional oversight of sensitive military cyberoperations, including mandating prompt notifications to congress in the event of unauthorized disclosures. We look forward to continuing to work with u. S. Cyber command and the department of defense as we finalize this draft legislation to ensure such notifications are responsive to our needs, but without adding undue reporting burdens on the department of defense. In addition to our focus on strengthening congressional oversight, other key focus areas will include provisions to strengthen our own cyber warfare capabilities and enhance our International Partnerships across the globe. In order to more thoroughly understand these issues, i would like to welcome our witness today, admiral mike rogers, who serves as the commander of u. S. Cyber command and director of National Security agency. Thank you, madam chair. And welcome, admiral rogers. Thank you for testifying before us today. Its always a pleasure to have you before the subcommittee. Thanks for bringing along a crowd. Makes it a little more of an interesting hearing. So the president s budget for fiscal year 2018 was delivered just this morning as the chair mentioned. Last Year Congress passed legislation establishing u. S. Cyber command as its own unified combatant command. The subcommittee worked diligently on the underlying legislation, because we recognize the importance of a trained and ready force able to conduct operations in concert with other military and u. S. Government efforts. Consistent with the appropriate legal authorities and policies. The fy17 ndaa also formalized the relationship with the principal cyber adviser to ensure advocacy and oversight of the command. We also provided u. S. Cyber command with limited cyber acquisition authorities two years ago, and id like to acknowledge the thoughtfulness by which the department has implemented this authority. Today i look forward to hearing about where these two initiatives stand. Both the processes by which necessary resources are being transferred from stratcon to cyber con and the new resources being provided as necessary for effective implementation. Clearly we made progress employing military Cyber Operations over the years. Weve been building the Cyber Mission force, but now we must make sure they are ready and stay ready for a threat that morphs on a daily basis. The persistent training environment, of course, is key to that end. Although the cyber domain is not new, theres still much that were learning, and we must leverage those lessons learned. We must assess the force we are building, how we employ it in order to ensure cybercom is postured correctly and if tools and capabilities are the best that we can provide them. So next week im going to be traveling to nato, the nato cyber cooperative, Cyber Defense center of excellence to attend its annual conference in estonia. I expect theyll provide extraordinary insight on how our nato allies view the cyber domain and how International Law are applicable and it will provide me with insight on how we can increase cyber collaboration against russian aggression. Admiral, id also appreciate your views on how we may strengthen collaboration with our nato allies. So in closing, i just want to echo what the chair said about the importance of formalizing notifications to congress of sensitive cyber military operations. The cyber quarterly brief provides us a forum to oversee Cyber Operations, and i was especially pleased with the participation of the joint staff and osd at the last engagement. However, in our oversight capacity, we must work with the department to get timely notifications as the chair mentioned, and i know that were going to work toward that end. So with that, i thank you, admiral rogers, for appearing today. Thank you for what youre doing at nsa and Cyber Command, and with that i will yield back. Thank you, jim. I also would like to remind members that immediately following this open hearing the committee will reconvene upstairs in 2337 for a closed, classified round table discussion with our witness. Admiral rogers, youre now recognized for your Opening Statement. Thank you. Thank you for your enduring support and the opportunity today to talk about the hard working men and women of the United StatesCyber Command. I look forward to discussing the commands posture and welcome the opportunity to describe how u. S. Cyber command conducts efforts in the cyberspace domain and supports the Nations Defense against sophisticated and powerful adversaries. The department of defense recognized seven years ago that the nation needed a military command focused on cyberspace. U. S. Cyber command and elements have been given the responsibility to direct, operate, secure, and defend the departments systems and networks, which are fundamental to the execution of all d. O. D. Missions. The department and the nation also rely on us to build ready cyber forces and to be prepared to employ them when significant Cyber Attacks against the nations Critical Infrastructure require dod support. The pace of International Conflict and cyberspace threats has intensified over the past few years. Hardly a day has gone by during my tenure at Cyber Command that we have not seen one Cyber Security event somewhere in the world. This is consequences for our military and our nation at large. We face a growing variety of advanced threats from actors who operate with ever more sophistication and precision. At u. S. Cyber command, we track state and nonstate adversaries as they continue to expand their capabilities, to advance their interest in and through cyberspace, and try to undermine the United StatesNational Interests and those of our allies. Conflict in the cyber domain is not simply a continuation of kinetic operations by digital means. It is unfolding according to its own logic, which we continue to better understand. And were using this understanding to enhance the departments and the nations Situational Awareness and to manage risk in the cyber arena. Id also look forward to updating you on our initiatives and plans to help do that. Our three lines of operation are to provide Mission Assurance for dod operations and defend the department of defense information environment, to support joint force commander objectives globally, and to deter or defeat strategic threats to u. S. Interests and Critical Infrastructure. We conduct full spectrum military Cyberspace Operations to enable actions in all domains, ensure u. S. And allied freedom of action in cyberspace, and deny the same to our adversaries. Defense of Dod Information Networks remains our top priority, of course, and that includes Weapons Systems and their platforms, as well as data. To execute our missions, i requested a budget of approximately 647 million for fiscal year 18, which is nearly a 16 increase from fiscal year 17 due to additional funding for Cyber Commands elevation for the fiscal year 17 ndaa, building out cyberspecific capabilities and tools, and jtf area support in the fight against isis. Were completing the buildout of the Cyber Mission force with all teams to be scheduled to be fully operational by the year fiscal 18 and help from the services continually increase readiness to hold targets at risk. Your strong and continued support is critical to the success of the department in defending our National Security interests in cyber. As you well know, i serve as both commander of Cyber Command and director of the National Security agency. This dualhat appointment underpins the significant benefit right now in Cyberspace Operations. The institutional arrangement between these two organizations, however, will evolve as Cyber Command grows to full proficiency in the near future of t. Also conditions for splitting the dualhat arrangement, which can only happen without impairing either organizations effectiveness to complete their missions. This is another area i publicly stated i support, pending the attainment of certain critical conditions. Cyber command will also engage with the subcommittee on several other maeftters related to authorities in the coming year. This would include increasing cyber manpower, enhancing the professionalization of the cyber work force, building offensive capability and capacity, and developing and streamlining our acquisition processes. These are critical enablers for Cyberspace Operations in a dynamically changing global environment. And most or all of these particulars have been in recent ndaa acts, along with the joint staff well talk with you and your staffs to iron out the Implementation Details of that legislation. The men and women of Cyber Command are proud of the roles we play in our nations Cyber Efforts and are motivated to accomplish our assigned missions overseen by the congress, particularly this subcommittee. We work to secure and defend dod systems and networks, counter adversaries, and support national and joint war fighting objectives in and through cyberspace. The commands Operational Success have validated concepts for creating cyber effects on the battlefield and beyond. Innovations are constantly emerging out of operational necessity and the real world experiences in meeting requirements of National Decision makers and joint force commanders continues to mature our operational approaches and effectiveness over time. At the same time, i realize cybersecurity is a National Security issue. It requires a whole of nation approach that brings together both public and private sections of our society. Our point of Partnership Program in Silicon Valley and boston has proven to be a Successful Initiative to link our command to some of the most Innovative Minds from industry, working together on cybersecurity as we face 21st century threats together in the private and Public Sectors. This combined with agile policies, Decision Making processes, capabilities and command and control structures will ensure Cyber Command obtains its potential to counter our adversaries. The men and women of u. S. Cyber command thank you and appreciate your continued support as we confront and overcome the challenges facing us. We understand that a frank and comprehensive engagement with congress not only facilitates the support that allows us to accomplish our mission, but also helps ensure our fellow citizens understand and endorse our efforts, which are executed on their behalf. Ive seen the growth in our commands size, budget, and mission, and that investment of resources, time, and effort is paying off. And more importantly, its helping to keep americans safer in the cyber arena. But not only in cyberspace, but other domains, as well. And i look forward to continuing the dialogue across the command and its progress with you in this hearing today and over the months to come. I look forward to answering your questions. Thank you, admiral rogers. We now turn to questions. First i want to thank you for your service and your leadership. My first question is very broad. Last years ndaa elevated Cyber Command to a full combatant command. What steps need to happen before the changes to the unified command plan take effect . So, first, the secretary of defense and the president need to make a decision. Secretary of defense making a recommendation, the president ultimately making the decision. As to the timing and the process well use, and that process is ongoing and i dont want to speak for the secretary or the president , but i know that process and that discussion is ongoing. Given the language in the ndaa and in anticipation of this possibility, we spent much of the last year working our way through the specifics of how we would do that, and if a decision is ultimately approved, were prepared to apply that and in a timely manner and in accordance of the direction and timeline provided to us. What are the specifics, as you said youre assessing the specifics you would do to take action. What are they, specifically . If i could, until we have an ultimate decision, id rather than not get ahead of my leadership and i think i owe them that and get into the how. Yes. Part of your responsibilities that we enshrined in section 923 of fy17 ndaa when we elevated cybercom involved development of doctrine and tactics related to cyber. What role do you have in advocating for or driving Doctrinal Development for the individual services when it comes to cyber . So, as the senior operational commander in cyber in the department, its the partnership between that cyber team, if you will, and our fellow operational commanders and policy makers that help shape, so what is the doctrine that should shape how we employ this capability that the departments developing . If you look at what weve done over the course of the last year, the efforts against isis, things were doing against other real world challenges, they are shaping the way were looking at how do we build a force of the future, what are the concepts for its employment. If you go back a couple years, for example, i can remember a year ago, two years ago, one of our fundamental concepts was we were always going to deploy forward in full teams. One of the things we found with practical experience is we can deploy in smaller sub elements, power of data analytics, we dont necessarily have to employ everyone. We can work in a much more tailored, focused way optimized for the particular Network Challenge were working. Were actually working through some things using this, for example, out in the pacific at the moment. A few weeks ago in your testimony in front of sasc, you were asked about whether we should be considering the establishment of a Cyber Service, and at that time you said that you were not a proponent. Could you explain a bit more as to why you feel that way . So, the reason im not i certainly understand others have a different different view. The reason im not a proponent of that is my concern is if were not careful we will view cyber as a very technical, very, very specialized, very narrow mission set and my view is cyber fits within a broader context and if you want to be successful in the ability to achieve outcomes within the cyberspace arena, you need to understand that broader context and im afraid that if we go the Service Route we will tend to generate incredibly technically proficient but very narrowly focused operators and one of my take aways from being in the department of defense is were optimized for outcomes when the workforce has a broader perspective and i also think back because im a big fan of history i think back to the dialogue of the 1980s when i was first commissioned in the military and the aftermath of the failure of desert one and the effort to rescue those u. S. Hostages being held in the embassy in teheran, we had a lot of dialogue about is soft so specialized, so poorly understood by the broad conventional part of the military, so needing of specific attention that we should create a separate soft service. We ultimately decided that the right answer was to create a joint war fighting construct. Thus in 1987 was born special operations command. And in addition, we said that the operational entity needed to be a little uniquely structured. Not only should be a war fighter but it should be given Budget Resources that enable it to not only employ capability wu determine the operational capabilities and drive the investments to generate the capability. I think that that is a very effective model for us to think about for cyber and Cyber Command, vice just automatically transitioning to the idea of a separate service. Thank you. My times about to expire. I now recognize mr. Langaman. Thank you. So, admiral, congress has provided cyber