Transcripts For CSPAN3 Defense Officials Testify On Cyberthr

CSPAN3 Defense Officials Testify On Cyberthreats June 23, 2016

Committee will come to order. I would like to welcome our Witnesses Today as the Committee Examines military Cyber Operations. I note that just about exactly two months ago, president obama confirmed for the first time that the u. S. Is conducting Cyber Operations against isis. And as the leadership of the department of defense was discussing this, they said it was the first time that Cyber Command has been given the guidance to go after isis. Just like we have an air campaign, we want to have a cyber campaign. And some of the press went on to discuss that secretary carter was pushing for u. S. Cyber command to have greater freedom to launch attacks and to address tactical Cyber Threats against isi isis. The Department Defense capabilities to fight and win the countrys wars and be prepared and ready to execute those missions remain on solid footing regardless of which domain we are talking about, including the cyber domain. The department has been developing organizations capabilities and personnel needed to operate in cyber since at least 2010. Billions of dollars have been spent. And yet the perception and yall can disagree with this if you think im wrong. The perception is that the threat is still multiplying faster and growing faster than at least our laws and regulations, policies, rules of engagement are developing. Still a fundamental question. What is the role of the military to protect civilian infrastructure in the United States against cyber attack . I do not suggest were going to get the definitive answer to all of those questions today. But i think that it is important that we discuss not only those, but the tactical use of power. I yield to the distinguish Ranking Member for any comments he would like to make. Thank you, mr. Chairman i agree with your comments about the complexity and importance of cyber. And the most interesting thing i would like to get out of this hear something how is the organization coming together . I think thats the major challenge. Its been quite a few years since we recognized cyber. So we have a lot of people working on it. How coordinated are they . Thats the great challenge, making sure were getting the most out of the resources were putting into this it is a constantly evolving threat and it threatens everything, every aspect. The least little device can be an entry point to a cyber attack. So, how do you get a comprehensive look at making sure that you control control is a bit of an optimistic statement. Have some measure of understanding of where the threats are and how best to address them. So how the various branches of the military and our broader cyber vulnerabilities, as the chairman mentioned a lot of those vulnerabilities exist in the private sector and weve had defense contractors who have been hacked before that have created problems. So, how do you we comprehensively address this incredibly complex and everevolving problem . I think thats the great challenge. I will say that i very much approved of what secretary carter did, where he had the i forget what he called it, but basically invited hackers to try to find their way in. Youll learn from that. I think that was one of the best, most costeffective ways to do it. Instead of sending some contract out to somebody, take those people out there who are really good at this and say come at us. Show us our vulnerablvulnerabli. That was a very wise way to learn a lot in a Cost Effective manner. A cost effect approach to an ever evolving and changing problem. As the chairman mentioned, the legalities of it in terms of are our laws and regulations keeping up with it, to make sure that you and the executive branch have the authorities you need to best protect us and, in some cases shall use cyber as an offensive weapon where necessary. With that ill yield back and look forward to the testimony. Gentlemen, i also want to mention that, of course, on the front lines for oversight of this issue, i very much appreciate the emerging threats and capabilities, Sub Committee wilson who work in this area daytoday. I think it is also important, though, for all members to look at these larger cyber issues, which is why were doing this hearing with the full committee today. Let me welcome our witnesses, mr. Thomas atkin actth assistant Secretary Department of defense, thank you all again for being here. Mr. Atkin, the floor is yours. I am pleased to testify today, along with my colleagues, Lieutenant General Kevin Mclaughlin and Brigadier General moore. In how we are improving. The closed hearing will go into greater detail on some of the challenges we face in cyber space and the departments efforts to address those challenges. I wanted to highlight a few thengs here this morning. First, the threat. Today, we face a diverse and persistent threat in cyber space from state and nonstate actors that cannot be defeated through the efforts of any single organization. Our increasingly wired and interconnected world has brought prosperity and economic gain to the United States. However, our dependence on these systems also leaves us vulnerable and Cyber Threats are increasing and evolving. Posing greater risk to the networking systems of the department of defense and other departments and agencies. Our National Critical infrastructure and other u. S. Companies in interest. Dod maintains and uses robust and unique Cyber Capabilities to defend our networks and the nation, that alone is not sufficient. Securing our systems and networks is everyones responsibility. From the commander down to the individual. And this requires a culture of Cyber Security. More broadly, preventing Cyber Attacks of significant consequence against the u. S. Homeland requires a whole of government and whole of nation approach. To that end, dod works in close collaboration with other federal departments, our allies and the private sector to improve our nations Cyber Security posture and ebber ensure that dod has the ability to operate in any environment at any time. Since Cyber Strategy was signed by secretary carter, the department has devoted considerable resources to implementing the goals and objectives outlined within the document. When secretary signed the document, he directed the department to focus its efforts on three primary missions in cyber space. One, defend the department of information, department of Defense Information Networks to assure our dod missions. Two, defend the United States against Cyber Attacks of significant consequence and, three, provide full spectrum cyber options to support contingency plans and military operations. Another key part of our strategy is deterrence. Dod is supporting a comprehensive Cyber Strategy to deter attacks on the u. S. And our interests. This strategy depends on the totality of u. S. Actions, to include declaratory policy, overall defensive posture, Effective Response procedures, indications and warning capabilities and the resiliency of u. S. Networks and systems. I am proud to say that the department has made important strides in implementing dod strategy since it was signed in 2015. My colleagues and i look forward to going into greater detail on our strategy as the hearing proceeds, as well as to discuss how our thinking and incorporation of Cyber Operations is evolving. The department is committed to defending our u. S. Homeland and interests from attacks of significant consequence that may occur in cyber space. I look forward to working with this committee and congress to ensure that the department has the necessary capabilities to keep our country safe and our forces strong. I thank you for your support in these efforts and i look forward to your questions. Thank you. General mclaughlin . Chairman thornberry, Ranking Member smith, distinguished members of the committee, im honored to appear before you today representing the men and women of u. S. Cyber command. Its my pleasure to do so alongside assistant secretary Brigadier General moore and thomas atkin, two men who keenly recognize the challenges the Department Faces in the cyber domain. I would like to focus my opening remarks on the ongoing efforts to build capability and capacity in the Cyber Mission force. The Cyber Mission force, with unique teams designed to defend dod information networks, support combat missions give u. S. Cyber command and the department a means to apply military capability at scale in cyber space. We recognize that success in accomplishing our missions is dependent on three factors, quality of our people, the effectiveness of their capabilities and proficiency that our people bring to bear in employing these capabilities. Encompassing a robust, active component along with both National Guard and reserve force s being fully integrated. Out of a target total of 143 teams that will be part of the Cyber Mission force we have 46 teams at fully operational capable status and 59 that are initial operating capability status. We will eventually build to 6,187 when we finish. It is important to note that teams that are not fully operational are already contributing to cyber space efforts as the command operates on a fulltime and global basis. Nation and every Combatant Commander can call on Cyber Mission force teams to bring cyber space effects and support of their operations. In support of u. S. Central commands ongoing efforts to degrade, dismantle and ultimately defeat isil. Training them to be prepared is imperative. Cyber guard exercise, which concluded last friday provides realistic training in which federal, state industry and International Partners can use their skills against a determined opposition force. The response to cyber guard from our public and private partners has been tremendous. Dozens of Critical Infrastructure countries have expressed interest in it. Allowing policy makers to observe the types of issues we see in real Cyber Attacks and helps us generate a playbook that should save the federal government precious time and stress in responding. U. S. Cyber command to teams to ensure they have training skills to make an Immediate Impact in todays fight. Our command prides itself in being a learning organization, exercises like cyber guard and other premiere exercise, cyber flag, which is ongoing at this moment, are key Lessons Learned, opportunities for us. We also look at everything were learning and the growing set of realworld operations and collaboration from the private sector, academia to provide valuable insights to the command and allow our teams to develop and implement new tactics, techniques and procedures. Although our people are undoubtedly our most important aspect i would be remiss not to highlight the tools, infrastructure and capabilities that the force needs to execute its missions. Ongoing efforts to develop tools such as the persistent training department, Cyber Situational Awareness and the joint environment must continue to be resourced. These capabilities are critical in ensuring that theyre equipped to counter. Adversaries changing tactics in cyber space require well trained, well resourced and agile force. With that, thank you again mr. Chairman and members of the committee for inviting me to appear before you today. U. S. Cyber command is committed to the mission of ensuring the department of Defense Mission assurance, deterring or defeating threats to our infrastructure and achieving objectives. Cyber Mission Force is adding to our ability to perform this mission. U. S. Cyber command team appreciates the support of this committee that it has shown and looks forward to our continuing partnership with congress to address the challenges and opportunities in cyber space. Im happy to take your questions. Thank you. General moore . Thank you, chairman thornberry, members of the committee thank you for allowing me to speak on behalf of the joint staff. The inherent Global Nature of cyber space threats causes and creates numerous challenges for the department of defense. Additionally, our warfighting capabilities are increase iing hightech weapons, Communications Systems to our ability to rapidly deploy forces around the globe. Trying to keep up at the rate in which technology is advancing in this rapidly changing environment is extremely challenging. Potential adversaries continue to increase their capabilities they also sha irthese challenges. All of that said, we have made progress, challenging our adversaries ability to operate in sieber space and more effectively our networks information, Weapons Systems from malicious cyber space actors. In regards to building our Cyber Capabilities, u. S. Cyber come continue to make Great Strides in standing up for Cyber Mission forces, arranged in teams with the objectives to support and combat command requirements, to defend the nation against cyber attack and to protect our department of Defense Information Networks. Information and Weapons Systems. While significant process in all of these areas in the last year, significant challenges do remain to include equiping the force, recruiting and retaining a professional cyber source and Cyber Mission force command and structure. From an operational perspective, cyber com continues to make great progress. Cyber com has not only challenged isil as the president and seblingt of defense has publicly stated but built on our Lessons Learned to date, upon which to expand the scale and effectiveness of our operations. From a broader, strategic view or adversaries, who are always looking for something that can provide them an asymmetric advantage, find cyber space appealing due to low barriers of entry and perceived difficulty of tricks. Because of these threats from state and nonstate actors we work vigorously to harden our systems while educating the total force to create a climate of constant vigilance. To strengthen the whole of government, particularly u. S. Critical infrastructure, the department of defense routinely engages and works with our Department Partners and International Partners, and theres interest to expand those cyber relationships. Finally as our capabilities continue to grow, we continually engage all the combatant commands to make sure cyber effects are being considered in corporation to their planning process and benefit all current and future operations. While it is well known we are actively engaged in cyber space against isil, we also recognize that there are other threats in cyber space that must be planned for and addressed. Joint staff is working closely with u. S. Cyber com to continue to bring cyberrelated options to the table to support all our global operations. As i mentioned, cyber domain is constantly changing and we see malicious cyber actors rapidly developing new capabilities at a very high rate. Working closely with cyber com, osd, International Partners to secure our networks, our information, Weapons Systems and to support combat and command objectives while we protect the nation against malicious cyber space activities. Thank you for the opportunity to appear today. I look forward to answering any questions you might have. Thank you. Let me take a second and remind members that we will have our quarterly cyber update this afternoon the 2 00. Classifieded, of course, and we will be able to get into greater detail on classified items then. In october 2010, were nearly six years down the road. Isnt it time for cyber com to stand on its own as a combat and command . I think the short answer to that is yes. We are continuing to look at that within the department. The secretary is has been evaluating whether to stand up or recommend to the president to stand up cyber com as its own unified command. Were continuing to look at it. We are getting close to a decision. And we will be getting something to the president here in the near future. Well, were trying to help you along because section 911 of the Defense Authorization bill requires that be done. I note admiral rogers has testified become a combat and command would allow cyber com to become faster which would generate better mission outcomes. I have yet to hear a reason not to do it. And so it seems to me that we shouldnt stew around about this too long because the goal is better outcomes. And if thats what the result is, we ought to be able to agree and get that done without a lot of delay. General mclaughlin, let me ask you. We talked abo

© 2025 Vimarsana