Live Breaking News & Updates on Technology Capability|Page 10

Stay updated with breaking news from Technology capability. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.

Transcripts For CSPAN3 Politics Public Policy Today 20240622

Astounding number, there are over 200,000 isis tweets per day. How can we possibly get a handle over this . The chatter is so high and the volume is so loud that its difficult to get a handle. This isnt terror as usual. This is terror gone viral. I come mebd the fbi, Homeland Security and state and locals for their disrupting of these many plots. But as we saw in chattanooga, we cannot stop all of them. In this age of peer to peer terrorism, authorities are searching for suspects who use secure aps we call dark space, to communicate and crowd source their calls for attack, inspiring operatives who never have crossed into the borders of syria, but cross over borders through the internet to conduct acts of terror. Isis cyber commanders now regularly send out internet directives and missives to their followers, as we saw in garland, texas. Sometimes our first indication of a hatched plot is an internet hash tag. We need to have a ....

District Of Columbia , United States , West Virginia , New York , Maricopa County , City Of , United Kingdom , Arabian Peninsula , Saudi Arabia General , Saudi Arabia , Gila River , Capitol Hill , Bosnia Herzegovina , Chuck Schumer , Robert Gordon , Moffett Nathanson , Susan Crabtree , Charl Walden , Sarah Farris , Morgan Neville , Gary Herbert , Katy Perry , Atlantic Ocean , James Comey , Greg Walden , Craig Moffat ,

Transcripts For CSPAN3 Key Capitol Hill Hearings 20240622

You know, i think we can all agree that trying to monitor cyber space is futile, lawfully or unlaw fly. Given that this is a war of ideology, is there any plan on the table for policy to try to exploit that ideology in that seems to be what the crux of this is. Recruits will be replenished as long as they can be reached out to, so, do we have a way to counter this ideology, understand it, use it against them . Its a great question. Again, i think when i go to my what i was proposing in terms of a ground force, its got to be under American Leadership with our guys imbedded, but its time for the sunni arab nations to provide that ground force. They tell me they will, if there was a strategy. I met with world leaders. They will do that if theres a strategy and assad is part of the equation. When the infidel sets foot, you know, the last resort, either we try to do this or we do 100,000 u. S. Combat troops. You know, thats kind o ....

United States , New York , District Of Columbia , City Of , United Kingdom , Atlantic Ocean , Susan Ashcraft , Susan Crabtree , Jay Johnson , Gabriela Blum , Martin Luther King , Al Qaeda , Cyber Space , American Leadership , Sunni Arab , Technology Capability , Week Just , Iraq Syria , Panel Just , Homeland Security , Homeland Security Council , Security Council , Security Council Staff , Council Staff , Heritage Foundation , Years Years ,

Transcripts For CSPAN3 Key Capitol Hill Hearings 20240622

Whether we would based on a standard allow women to serve in infantry artillery tanks light armory reconnaissance, we formed a task force of volunteers. And we put them together as a unit. They trained up and went to 29 palms and the Warfare Center and did a series of tests. And the tests are complete and it will provide information to inform about whether or not he will request the waiver. And i have not seen all the data. I have seen some of it. And when we first sent volunteer female marines inligsed to determine their ability to complete that course. The number that went they had an about a 36 Completion Rate and again, we are still looking at this. We are we have not made any sort of predecision. So again whatever we do, it is about individual standards. It is about the capableeableility of the unit and that unit becoming better, or at least as good as it is now. So tha ....

Al Anbar , District Of Columbia , United States , West Virginia , Camp Pendleton , New York , Rhode Island , United Kingdom , Arabian Peninsula , Saudi Arabia General , Saudi Arabia , Capitol Hill , Bosnia Herzegovina , Chuck Schumer , Dick Thornburg , Lawrence Caplan , Jay Johnson , Harry S Truman , Gregory Chen , Jeh Johnson , Ralph Nader , Al Qaeda , Tamerlan Tsarnaev , David Cameron , Thomas Perez , Task Force ,

Transcripts For CSPAN Washington This Week 20240622

Now we know that china russia, venezuela voted to approve this. They will vote to lift the u. S. Sanctions. The only power we have left to override the president s veto, and groups like aipac who i have met with the past several days who have to appeal to democrats, this is a bad deal. That is the only way that this whole process can be stopped. Why does it need to be stopped . It allows them to continue their Nuclear Weapons program. That is not why we passed the sanctions over the last decade. We passed the sanctions to dismantle their nuclear capability. The idea that it is for peaceful, Energy Purposes is laughable. The icbm capability can continue to go forward. You develop that to deliver a nuclear warhead. It will start a middle east arms race. When i was in saudi, they said, why are you negotiating with iran . Our allies are confused and do not know if they are stil ....

United States , Fort Hood , District Of Columbia , West Virginia , South Carolina , New York , New Hampshire , City Of , United Kingdom , An Dark , Khorasan E Ra Avi , Saudi Arabia , Montgomery County , Chuck Schumer , Martin Simon , Jack Kent Cooke , Martin Luther King , James Komen , Dwight Eisenhower , Katy Perry , Atlantic Ocean , Neville Chamberlain , Steven Parker , Tamerlan Tsarnaev , Al Qaeda , Jeh Johnson ,

Transcripts For CSPAN2 Hearing Examines Border Security Technology 20170829

Testify about technologies theyre using to secure the nations borders, including efforts to combat drug smuggling. The committee on Homeland Security subcommittee on border and Maritime Security will come to order. The subcommittee is meeting today to examine the role of technology in the nations Border Security efforts. I now recognize myself for an opening statement. Border security is a complicated endeavor, because theres no one size fits all solution. Thinking through what it will take to secure the border is the primary responsibility of the three agencies represented by our witnesses today. Border patrol is our Operational Force between the ports of industry, cbps office of Field Operations j ....

United States , San Antonio Texas , San Diego , Los Angeles , John Moran , Todd Owens , El Paso , Committee Homeland Security , Homeland Security , Maritime Security , Role Technology , Border Security , Operational Force , Office Field , Office Field Operations , Field Operations , Technology Crucial , Crucial Force , Personnel Technology , Technology Used , Customs Border , Customs Border Protection , Border Protection , Illicit Activity , Technology Becomes , Security Posture ,