Committee on Homeland Security will come to order. Committees meeting today to examine the most serious threats confronting our homeland. Before i recognize myself for an opening statement, i would like to take a moment to welcome the newest member of our committee, don bacon. Don served nearly 30 years in the air force and is experienced in cybersecurity and Airborne Reconnaissance will prove greatly beneficial to this committee. Thank you, sir, for being here. Thank you, chairman. I now recognize myself for an opening statement. I would like to thank each of the witnesses, acting secretary elaine duke, fbi director christopher wray, and ctc director nick rasmussen, for joining us today. You represent thousands of patriotic men and women who go to work every day to insure the safety of their fellow americans. Everyone on this committee is extremely grateful for your service and director rasmussen, for over two decades, you have helped navigate an unprecedented landscape in combat terr
Committee on Homeland Security will come to order. Committee is meeting today to exam the most serious threats confronting our homeland. Before i recognize myself for an opening statement, i would like to take a moment to welcome the newest member of our committee, don bacon. Don served nearly 30 years in the air force and is experienced in cybersecurity and Airborne Reconnaissance will prove greatly beneficial to this committee. Thank you, sir, for being here. Thank you, chairman. I now recognize myself for an opening statement. I would like to thank each of the witnesses, acting secretary elaine duke, fbi director christopher wray, ctc director nick rasmussen, for joining us today. You represent thousands of patriotic men and women who go to work every day to insure the safety of their fellow americans. Everyone on this committee is extremely grateful for your service and director rasmussen, for over two decades, you have helped navigate an unprecedented landscape in combat terrorism
The cms initiative has contributed to an estimated 50,000 fewer patient deaths in hospitals and 1. 3 million hospital acquired conditions saving 12 billion over three years. Medical review strategies have resulted in over 5 billion of savings in just the last year. He are working to transform medicare into a highvalue paler with payment is based on quality and not just volume and we remain focused on preventing waste and abuse and fraud before it occurs. This is not just about cost the threatening than a Beneficiary Services and a host of other problems. Since 2011 we have been using the system to provide advanced analytics on all the feeforservice claims. The system also incorporates beneficiary complaints and works with numerous other inputs to generate and prioritize further reviews and investigations. Cms takes administrative action to stop problematic behaviors through the suspension of payments and medical review of claims and a removal from the program. As we recently reported t
That translates into fewer audits and collection cases and we estimate the government will lose at least 2 billion in revenue that otherwise would have been collected. Additionally, the reductions have forced us to make cuts in taxpayer service. This is troublesome because he we cant provide the Services Taxpayers need to fulfill their Tax Obligations voluntary compliance will fall. This concludes my statements that i would be happy to take your questions. Mr. Estevez . Thank you. Appreciate the opportunity to appear before you to discuss a couple of years of highrisk identified by gao specifically supply Chain Management, weapons acquisition. The department of defense has made measurable progress in addressing these areas as well as in the areas of Contractor Management and infrastructure. The department is dedicated to improving our supply chain and acquisition processes to ensure effective support for our warfighters. Supply Chain Management and Weapon System acquisition of complex
Basically it relates to the activities counter by the activities or overseeing this by activities of another group so one group does not have full control over this or a process where this is being processed because they could potentially make undetected changes to the Software Processing data and we dont want that to happen. So developers in this case should be confined to a development environment. My understanding, my children will till you but i have no technological knowledge, but kind of like a submarine when there is a leak in one area you can close off that section and in another area where the leak occurs doesnt infect the other areas. Is that occurring now in the federal agencies with the situation . Yes, and several there are about 14 agencies that have weaknesses in segregation control. And they have an example that you highlighted that exude a sense and that is another Security Defense principle that agencies support layer upon layer of security controls in the event that