tv Key Capitol Hill Hearings CSPAN August 14, 2016 12:00am-2:01am EDT
12:00 am
maybe we maybe we'll revoke that document. you can't access that document until we figure out what's gone on with your account. because somebody's probably stolen your credentials. maybe steve tends to print 10 documents a week or maybe in a shorter time span and all of a sudden he printed 20, 30, 40, 50 documents. that might be interesting. send an alert to a security admin. let's check it out and see what's going on. did my friend from cloudflair already disappear? oh, you're back there. you're moving around. i liked your question. i've been talking about confidentiality. i've been talking about find those high value assets in your organizations and encrypt them at the data level so you can maintain control over them, so
12:01 am
if someone does go into the content management system and grab a document, which they have access to, which is fine, and they turn around and email it to a friend or in turn they get hacked at their computer and they lose that document, the gone. bye-bye. but if the encrypted and you can still have an encrypted document sitting in the content management system, that's fine, that can operate. the just an encrypted blog. looks like a p.d.f. take it out, send it to fridays -- friends. they go to open it, they have to try to decrypt that document at the application and so they're going to have to try to authenticate it. that's about keeping secrets. keeping your documents and your data secret. integrity, i love that one. no one ever talks about. it digital signatures are one of the greatest things ever. we use them every day, we don't eel even realize it.
12:02 am
we use them when we go to eab site that has -- website that has h.t. -- http. how do you know you're going to your bank's website? do you trust that little u.r.l. you typed in? no, you see the lock. the backed by a certificate. you check on the integrity and the authenticity of where that came from. it's a visual signature. how do you know to run some code on your computer? . ey digitally find it you get a little warning. this code is coming from an unknown source. ok, so what do you get from a digital signature? integrity and authenticity. who the from, who's the originator, has it been altered in transit. you can do this on documents as well. if i get a p.d.f., it's almost the same concept of going to an http website. i can see who the document came from, who signed it and if anything has been altered on the way. if someone changes one pixel on
12:03 am
that p.d.f., it will break that digital signature and have a big red x on it. who's using this today? hat's a good place for it? the transcript, that's a nice thing to be able to say, hm, my electronic transcript, i didn't like this, going change it, excellent, send it off to my employer or my potential employer. so schools like stanford are starting to digitally sign their transcripts before they release them. that's pretty good. i can see the transcript now as an employer came from stanford university. and if someone laid to tride to alter that little tech, it would give me a red x but i get a nice blue ribbon that says, this thing has not been altered since it's been signed. the government publishing office, they changed their name, they used to be the , vernment printing office because they printed everything
12:04 am
on paper, they've moved to electronic delivery, the government publishing office now. great, good marketing. but they sign their documents. the budget, for instance, that's the electronic signature log, stats are up there, because it's cool. imagine getting a budget which change -- with changed values on it. my friend from cloudflair, who is busy on his phone, but he set me up for this, thank you. oh, you're recording. oh, you're tweeting me. wow. [laughter] i've never been tweeted. cool. that's digital signatures. again, more about integrity. also get authenticity of documents. confidentiality, we're talking about data sentry security solutions. we've had the fallback with additional layers of security, -- layers of security, we can put security mitigations on the data itself, we can encrypt it with d.r.m., we can monitor it
12:05 am
and analyze it with our analytics engines. and then we can also protect things like integrity of our data. i've blaggettered on enough -- blaggettered on enough. i'm going to -- blathered on enough. i'm going to throw up security u.r.l.'s you might be interested in. am i allowed to take questions? really? >> absolutely, yeah. mr. gottwals: are there any questions? chickens. come on. nothing. all right. all right. thank you. [applause] >> a shy group. mr. gottwals: yes. >> now the my pleasure to introduce our esteemed panel.
12:06 am
frank, why don't you just have everyone tart so come up with you for the panel. i think we have two panels right there. while they're doing that, i am going to introduce them. on our panel we have marion, the principle director and c.i.o. for cybersecurity at the department of defense and cheryl, chief information security? officers a ath the central intelligence agency. moderating today's event is frank konkol. i also want at that to take this opportunity to thank you all for attending today. thanking our speakers and also akobee for their gracious support of today's -- adobe for their greashes support of today's events -- gracious pport of today's events like today's. frank: that sounds better. all right. so i will introduce our panelists quickly. although connie just did.
12:07 am
you guys can talk about yourselves just a little bit before we get started. tell us about your jobs. cheryl, we'll start with you. cheryl: i'm the chief information security officer at c.i.a. all of our systems get looked at centrally. before that i actually spent quite a bit of time in the iccio over at the d.n.i. mary andrew: and i worked together rather close i had -- maryanne and i worked together rather closely throughout that time. we've known each other for 15 years. t small community. it's a small community although i think we're trying to grow it. frank: i'm the third wheel. worst tindr date ever. third wheel. mary anne, tell us about yourself. mary anne: i'm in a joint duty assignment in the pentagon. i'm an n.s.a. employee, i've been there for 30-some-plus
12:08 am
years. interesting, i had a group of -- makes me realize how long i've been there, a group of young coops come in the other day, come into the pentagon from n.a.s., and they asked me if i'd come talk to them. one of the last questions they asked me was, how long have you been at n.a.s.? i'm like, longer than any of you have been alive. marianne: really looking across the whole department of defense, which is a huge landscape, at all the fiber security activities that we're undertaking and how do we make progress in this area. frank: i think trevor did a pretty good job earlier kind of discussing what happened last year. wasn't the best summer for federal government in cybersecurity. i think he covered the civilian side quite well. i think this panel we'll get into, have the d.o.d. and i.c. have been affected. when we were on a call, we always do little calls to make sure i don't ask anything too
12:09 am
outlandish, especially to our i.c. folks. we talked about what you guys got done wrapping up doing, which was the leg work of sending out the letters to people who had been affected. so, i guess with that in mind, kind of, what's been the impact broadly since then? cheryl: it was a monumental activity. marianne: not just the letters. the letters were a monumental activity. one of the things we learned from it, especially at the senior leadership level, and from everybody's level, is that there are systems and data that we didn't pay enough attention to that we probably wouldn't have considered mission-critical data, that impacted us so broadly. as an o.p.m. breach. huge impact. we finished mailing, we're going to have a party, 21.4 million letters of. of those, two million of those got a return to sender. so then we had to go find correct addresses. but -- that doesn't seem like -- until you go through something like this, you do not
12:10 am
understand the undertaking of all the facets of everything that was involved in that type of a breach. i met with more privacy lawyers than i knew existed. actually going through things for the first time. we had a lot of help from the white house because they certainly wanted the situation handled in a certain way. a lot of political help and just kind of a lesson learned for all of us. i don't know if you guys know, but as a result of that whole thing, congress decided that the department of defense would run the i.t. for the clearance process system in the future. we're in the process now working very closely with o.p.m. and making sure the current system is secure enough , at the same time we're working very closely with them to make sure we develop a new system. frank: i didn't realize the i.c. had been impact ad lib differently by the o.p.m. breach than your standard d.o.d. person with a clearance. how was it for you guys? cheryl: that's both true and not true.
12:11 am
for our agency, we were probably not impacted quite as heavily as most of the rest of the government with cleaners or whose information is regularly processed through o.p.m. sherrill: we do our own cleenches but we also hire from outside -- clearance but we also hire from outside. we do have people who have involved and got letters because their previous employment might have been in d.o.d. remember, a good chunk of the i.c. is actually d.o.d. and goes through that same clearance process. frank: you wouldn't have gotten letter. marianne: i did not get a letter. sherrill: i did. as well as my husband and children. we had a lot of people who did get letters and who were upset. we still worry about it. we have to worry about it.
12:12 am
but as marianne said, one of the best things that came out of this -- there's always a silver lining in every one of these bad things that happens. terrible to say. but none of us were as aware of what data was being processed in o.p.m. and what data was potentially accessible via internet connecttivity until this happened. and the much more extensive than any of us thought. so the good news is, a lot of attention and focus was paid on this. and we think we are on a path to improve the protections around that level of information in the future. marianne: also, what other missions do we have that retain privacy data, medical systems, all those kinds of things, and what are they doing with it and how are they protecting, it -- protecting it, right? where else do we have this kind
12:13 am
of data, who has it, how are they holding it, what are they doing with it. frank: that concludes the negative nancy portion of our panel where we talk about the bad stuff. [laughter] now let's get a little bit more forward thinking. i want to start with you, marianne, on the d.o.d. cybersecurity that came out last april. you have a lot of roles in that. there's a lot we can dive into with it. but just let's go broadly to begin with. on what d.o.d.'s doing. and then we'll get to some of your specific duties with that. because you have a lot of roles you have to do. marianne: the second d.o.d. cyberstrategy, it's very encompassing. i'm focused on the cybersecuritya aspects of it. after he released the cyberstrategy, the department released the cyberimplementation plan, which goes through all the fat fastets. it would -- facets. it would have fine ops and -- fiber ops and fiber defense. we have the cybersecurity
12:14 am
implementation plan. about a year ago, a year and a half ago, we made a very concerted effort that we were going to focus on the basics. there's a million things things you can do in cybersecurity, and we decided we were going to do basically a back to basics campaign because we looked at the intrusions, any successful intrusions we'd had in the last year or year and a half and probably 98% of them were due to something simple and trivial that somebody knew they should have done but that wasn't implemented. so we went back to coming up with kind of a top 10 list. and we pushed that out and so we have been marching down that path. i can talk, i mean, do you want to ask me questions or keep talking about it? frank: you can keep talking. sy have a few questions -- i have a few questions. the one aspect, when trevor was talking about accountability and following up on this stuff. i wanted the scorecard part in particular. that's new and important. marianne: all of these top 10 things, there have been formal military orders have gone out to do this stuff.
12:15 am
so the not like anybody should have been surprised by it. people weren't doing. it because they have so many thing to do. obviously it didn't get prioritized high, along with all the other mission things they had to do. so what we decided to do was do a scorecard. that has been a tremendous amount of activity and effort on our part, but has been pretty incredible because nobody, i don't care how many stars you have on your shoulder, nobody likes a bad grade. nobody. we started doing c.i.o. meetings. we have them every single friday. every single one of the service, all their data rolls out. they have 10 scorecards for each service and they have to sit in front of the d ombing dcio and tell him why they have -- dodcio and tell him why they have the numbers they have. every user logs in with a p.k.i. why don't do you that? what percentage is the air force? what percentage is the navy? everybody should be 100%. one of the other big pushes we have is windows is a huge operating environment that we use in the department. getting off of all that legacy
12:16 am
stuff, especially for end user machines and moving to windows 10. we have something that tracks that. external facing web servers have to be behind the d.m.z. all those thing. briefing that to the c.i.o. once a week gives people a-- gets people mr. ayotte: tension -- gets people's attention. the secretary of defense gets to see it. he gets a briefing on it once a month. then they have a chat about it. frank: are those chats usually positive or not so positive? marianne: for the secretary, i think he thinks they're very positive, right? frank: i bet he does. marianne: what i've seen is initially when we first started this, at the very senior level, they really thought it was kind of the commander at the owner of the network level. so to worry about this stuff. they really didn't have visibility or have any idea how good or how bad they were. very quickly we got into the thing where they need to care about this. when secretary of defense is
12:17 am
care being it, your congressman is caring about it, we need to care about it. we've seen tremendous improvements. the accountability and that culture, we've been waiting for this our whole career. accountability and people caring at the very senior level about cybersecurity. frank: you have seen the d.o.d. c.i.o. speep speak before? arianne: i see it every day. frank: i feel like he's a pretty intense dude. he's right up in your face. marianne: very, very smart person. frank: let's switch gears. how about from your c.i.a. perspective. what's changed since o.p.m. and then i want to get into how that's feakted how the agency deals in cyber. first of all, i guess there were two questions there. sherrill: o.p.m. didn't really cause major disruption, change, at our agency. i'll just start with that. we spent the last year trying to get the definitive list of
12:18 am
what might have been compromised from o.p.m. that belonged to us. but as far as did -- what happened at o.p.m., absolutely changed the focus or direction of how we protect our agency's information or systems, absolutely not. we've been on that path for a long time. frank: ahead of the game. sherrill: i don't know if i'd say ahead of the game. -- ware of the issues and i shouldn't say the bad word, the not in my talking points, but we had aim. we've been focused on insider threat and protecting the data for pretty much as long as i've been doing cybersecurity and that's been quite a while. frank: going through a strategy, five, six years ago now, you guys had a big move to cloud, which was, you know, got a lot of headlines and
12:19 am
attention over the years, what's changed within because of that? has been there been a huche learning between -- mutual learning between the cloud provider and you guys? has it changed the way you do business internally at all? sherrill: eye sight and cloud have been significant changes for the entire i.c. and our agency in particular. we are the ones with the contract with amazon, so we are responsible for the security of what is provided to the entire i.c. as far as hosting infrastructure. hen amazon came in, we started off with what we thought was still a very short timeline for approving its operation. when i say short, if you go back historically, big acquisitions like that and big services like that, you could see years being spent on
12:20 am
analysis of the system. in our case, when amazon really got everything in place and where they thought it was ready for us to make sure it was secure enough, we ended up with two months. in that two short months, we had the assessors across the i.c. working with us and working closely with amazon. we may be one of the first that they actually opened up the hood and let us see some of under ner workings specific disclosure agreements. i can't give you anydy at that -- detail what have we might have found. it was a really good learning experience. we got to understand all of what amazon does to protect your information commercially, and our information internally. we also found a few things and gave them feedback on changes
12:21 am
we would like them to make for us and the good news is they took a lot of that to heart, so they implemented a lot of the changes they made for the intelligence community commercially and you all are benefiting by that as well. when you're using a.w.s. hosting. it's a great learning experience. the other thing that's changed significantly as a result of eye sight and the cloud is the focus on, hey, you know what, i can spin up the cloud instance on the internet, i get this all the time. in two hours and i'm up and running and all my data's out there. i still can't meet that two-hour time frame to give you an approval to put a system out there. but we're under extreme pressure to enable mission to spin things up much more quickly, put things out there more quickly, and so you talked a little earlier about that need to share, need to protect, we are focused on both.
12:22 am
we're focused on trying to move at the speed of mission, and yet ensure that that mission information's at ad quatly protected. -- information's adequately protected. it's been a great experience. one more thing about amazon that we hadn't realized. people love that compute. you think about it more for analysis and for getting results quickly. from a cyberperspective, it's great. because think about it. in the past, when we would tell people to audit, you'd see systems shutting down because they would fill up with audit information and cyberpeople would get yelled at because that system doesn't work because we put too much security on it. or we tell you to encrypt the data. well, the time for encryption and decreppings -- decrippings often makes the users too upset to use it because it takes too long. now go into elastic compute. when the system starts to fill up, you just spin up another
12:23 am
v.p.c. there's no longer any of that impact from the systems filling up and being unable to do the work because we filled it up with security information or we're tellinging you to encrypt and you're telling us this is adding overhead, it doesn't anymore. cloud has been a god send. but for the folks trying to implement systems quickly, and for us to secure their work loads better, we're very happy with it. our agency and many of the other i.c. components are busily working to move their work loads into the cloud and off of legacy. so into the new. frank: is there a lot of collaboration between all you fellas? sherrill: there is. every time we provide a new i.c.-wide service, we have the 17 components that have the
12:24 am
opportunity to look at it. they often have the opportunity to participate in the testing. they certainly are given the body of evidence and the ability to adopt what the existing findings in infrastructure provide. then when they go to secure it, they're only needing to focus on the delta of what are they implementing on top of what's already approved. as an i.c., absolutely. we've been working together very closely on this. as well as the cloud. i shouldn't have left it out, but the cloud that n.a.s. stood up that provides that same type of service. frank: going back on the d.o.d. front, you guys are sort of under way with your own modernization effort, if will you. the joint information environment. i think you're in the jrss phase right now. but maybe you can talk about what ramifications that should have on cyber for d.o.d.-wide?
12:25 am
marianne: sure. on just operations also. but, so the people -- people that don't know the d.o.d., and i've had people actually say this to me, which makes me smile they think we're this wonderfully environment with -- we do have a very good command structure. we always know who is in charge above us. maybe who's below us. it is really a very loosely kind of federated infrastructure. of everything. when -- i think it was probably general alexander kind of came in and said, i can't seay cross my, you know, my networks that i'm supposed to cybercommand, right, we were looking at doing some type of a comment information environment. common infrastructure. that's what j.i.e. is. the jrss, which is joint regional security stacks, is a common set of security capabilities at midpoint locations around through the
12:26 am
infrastructure. so the army, the air force, navy, gives us the ability to have consistently implemented security and then also give us the ability to share among all of them. so it goes a very long way to helping us have a much more home genius environment, that we understand, we know what people have, we know what people are running. we can actually share the pertinent information we need to share across these security mechanisms. frank: it's also probably important for cyberdefense too which is part of the plan as well. maybe you can talk about what's changed from a threat vector perspective, this might apply for you as well, sherrill, what we've seen in the past couple of years with zero exploits, those types of things. how is the threat changed -- how has the threat changed? marianne: we are constantly looking at the threat. what the threat is, what are protections we have across the infrastructure, are they the right protections, where dough with need focus -- where do we need to focus?
12:27 am
i do see that changing. sigh it changing because initially we all do perimeter protection. that was the name of the game. if you're protected like in the department of defense, we have internet access points. those were our big deals. we put lots of heavy duty protection on internet access points because things were coming and going. today, as we're moving to a very mobile environment, things don't come through those necessarily. we're finding that our end points are the places where we really want to focus our environment. because that's where our biggest threat is. 7 million end user devices in the d.o. dfment much that's a lot. that's a lot of things. we don't have that many people. so you may say, how can you possibly have that many, right? but i have three computers on my desk, i have thata laptop i use when i'm hope. i have my blackberry that i carry around with me. all of those things are an entrance into the department. we need a way to protect all of those. i think the threat, we
12:28 am
constantly look at it and say, ok, we're spending all this money on this perimeter device, or this set of perimeter devices, how far does that get us, what are we seeing with all these threts coming in, what's the best way to attack them and where do we attack them. we're starting to go move toward end point security. all of our issue papers, which are things we do in the department, to get money for new initiatives, we're focusing on cybersecurity on the end point. frank: trevor made a comment about insider threats being perhaps the most difficult to guard against. is that the case for you guys as well? marianne: they're all -- none of them are necessarily easy. insider threats are kind of difficult because the person has a valid identity in your infrastructure. frank: we've seen how much damage one individual can do in some of these cases in the last few years. marianne: absolutely. there are some really cool things. there's a lot of cool stuff out there now. we're looking at, what are the things we can implement better? looking an anomaly detection.
12:29 am
this is what this person typically does every day, comes and does this. all of a sudden he does something out of that. either he's on late at night or he's accessing systeming that he hasn't accessed. then you have to question it. frank: right. talking about that, the end of the cat cards. he was talking about -- saying in two years he wants to have them done and something in place that will be able to look at behavioral patterns and things like that. marianne: yeah. we're looking into that. he did say end of cat card. i think he did it, the cat card is used for many, many things. what he meant to say was end of cat card. as an authentication mechanism onto the infrastructure. frank: he yelled it out. he pretty much said it. marianne: i know. the cat card, it's your i.d. to get into the pentagon. it's a physical i.d. military people have all their military, medical data on it. that stuff we're not looking at replacing. using it as an authentication mechanism, what are better things we can do? frank: true multifactors.
12:30 am
on to mobile. you can talk a little bit about how that's changing for you guys. you guys are still kind of in the stone age with using mobile technology, i think, right? sherrill: we're in the stone age. frank: not to be a jerk. sherrill: in fact, i commented when i came in here today, it was kind of cool. my cell phone was in my purse. i have to remember to take it out of my purse. frank: i would hate your job. sherrill: when i get to work. we don't allow any personal devices in or out. because they are attack factors. we very seldom allow without a waiver mobile devices that are provided by the government in and out. new fu get a blackberry, we don't use those anymore, by the way, you get a smartphone from the government, which we've blocked down, you're supposed to use it away from work. not inside. so you have your phones on your esk and i still carry a pager.
12:31 am
frank: how very 1990 of you. [laughter] good lord. sherrill: we do have a strategy to move ahead. and we partner closely with n.a.s. in particular on what are the best ways to secure mobile devices. and one of the things we want to focus on the most, which we talked about this, how spoiled you are, how you feel like, you know, how can you do your work if you can't carry your computer or your tablet around with you as you go to meetings or have the ability to take notes, well, i still know how to write with a pen and paper. because i have to. but we are focused closely and we've worked closely with n.a.s. on this. how do we provide secure mobile computing to our work force at least in our facilities. and how do we secure wire nls our facilities? we are focused on -- wireless in our securities --
12:32 am
facilities? we are focused on that. we know we have to do. it you can't go into best buy anymore and buy that big desk top compute that are you stick the -- computer that you stick the power under your desk and the big monitor at the top. i have to admit, i do like my big monitors that are on my desk. i have two. and i can do tons of work and spread it all across the two ig monitors. how do you dock those so you're not limited to the tablet. but i also don't want to carry around a 20-pound brick. maybe it will make me stronger, but that's kind of a pain. frank: i'm guessing there's not a lot of pokemon go players in the c.i.a. h.q., is there? sherrill: those who do make very, very obvious. that's all i can say. i'm going to say something. it's not in my script. there is another, not mine, another government agency i know of that spent a lot of time going around their
12:33 am
compound eliminating the pokemon go points. frank: that's awesome. i'm so glaud said that. now i feel like this tindr panel date opened up a little bit. got you out of your shell. [laughter] how much time do we have here for questions? i want to make sure the audience -- 20 minute. ok. i have a couple more. you talked about, you guys kind of talked about this, cross-agency, cross-government collaboration in cyber and industry as well. let's talk about that. where are those point it's where you're wanting the -- points where you're wanting the interaction? marianne: in the department of defense, anybody that's listened to the secretary of defense -- frank: he's begun going out west a lot. marianne: he's huge on industry relationships, partnerships, collaboration. he has brought industry people in. to very key positions in the government. to try to bring a morin owevative -- a more innovative flavor to the department of
12:34 am
defense. he set up something called digital services. defense digital services. which is actually looking at some of the key things that we do and how they can bring industry bureaucraticitieses or products in -- products -- practices or products in. there was a hack of the pentagon. i will tell you, i went through a whole cultural revolution myself when i first heard that, to the point that we got to implementing it. it was pretty interesting, ctually. frank: a bunch of kids, right? marianne: we hope. it was very focused. it's not just like wild and wonderful kind of a thing. anybody coming and hacking anything you want. we picked specifics. web front end. d.m.a. we picked a very specific web front end and then we had
12:35 am
people actually watching to make sure that the hackers didn't go beyond where they were allowed to go beyond. but it was, you know, they have very stringent rules. it's run very med to thisically. if they identify something, they have to give the government 30 days to fix it before they can release it and say they've done it. it's very specific. i think it was extremely sm successful and we're looking at other places to do the same thing. i just think you have to be careful and make sure that you actually contain it. you just can't -- we don't want people to say, ok, we're wide open, everybody hack. it's very specific. very prescriptive. you make sure you're protecting yourself. frank: the guy who heads that is an interesting character. we did a panel with him and he came in in a hoodie. totally chill dude. i liked him a lot. i think he said, get shit done. that's the kind of guy he is. it's interesting. i thought that was kind of cool. bringing that fresh perspectives.
12:36 am
marianne: spent a tremendous amount of time and has had all of us spend a tremendous amount of time with industry. we do silicon valley trips, we do trips up to new york, east coast. i don't mean a couple of us. he takes a whole entourage. he takes all his c.i.o.'s with him. it can be 40, 50 people. frank: party bus style? marianne: big buses. we just meander through silicon valley and meet with venture capitalist groups and really good thought leaders. we've met with -- it's amazing. who they go to, you know. to bring thought and innovation into their teams. just really kind of pushing the bubble and trying to grow us to think differently. and then really establish those relationships an bring kind of cool stuff in. you've heard the whole fail fast. process kind of they're trying to bring into us. to look at things, to try it out, to pilot it. and then to pick something.
12:37 am
fairly quickly. you talked a little bit about mr. howardson. he's very much trying to push us to be innovative and do new things and bring new ideas. he looks at what industry does and says, why can't do i in thank? then he comes and tells us to do it. things go up and you have 50 million reasons why it's hard to do but then you start figuring them out and knocking them out one at a time and you get them implemented. it is exciting to work in an environment that's so -- people think of the pentagon. i did coming down. i thought, policy organization, takes years to get policy out. it is nothing like that. the crazy wild. frank: sounds like a pretty cool party bus. maybe the smartest party bus i'd ever attend, i think, probably. i can say that 100% certainty actually. [laughter] i lost my train of thought there. i was going to go back to you. because the same thing on the i.c. side. are you guys having party buses? were you a little more low key about how we'd go for that
12:38 am
innovation on the tech side? sherrill: i don't know if i'd call us a party bus. we do partner very carlos closely with industry -- very closely with industry. we have labs where we actually bring industry in to help us resolve and determine what's out there that they have, that we need. test it out quickly. bring it in for quick review. and the cloud helps us a lot with that. it doesn't work on the cloud, don't bring it. if it does, we want to have the opportunity to spin up an instance, try it out quickly, see how well it works to solve a problem. share that and then we can use it even further. we've been working closely with the manufacture am -- with the amazon marketplace. i'll say first, you know, no, we don't have a complete clone of what's out there
12:39 am
commercially, up in the i.c. but we've been able to look at the commercial products that we think people want and various agencies will say, look, i really want to try using that. vet the company to make sure that, yes, we were going to have a contract with that company, we can do it. bring it up, let people try it out. at that point, which ever agency determines they want to use it and implement it, they will have to do that security assessment of the tool. but then the cool thing is, they can share that assessment out with the rest of us. so we don't have to re-invent the wheel every time we want to implement the new product. lots of partnership with industry. lots of requirements out with groups like -- groups to help us identify what's coming. d.o.d. and i.c. uses it pretty extensively. to help us solve those really difficult problems that we don't see a lot of market share
12:40 am
right now to help us with. frank: what struck me when i first heard about that is that innovation pipeline. where you'd have a lot of companies that maybe wouldn't normally do business had government that would have an opportunity to do that. once they go through the vet prague sess and stuff like that, it seem -- vetting process and stuff like that, it eems like it made sense. marianne: it's not a party bus. a lot of serious stuff. t.s.a. big bus. -- it is a big bus. the other thing i wanted to mention as far as our industry collaboration is that we're looking at how we can do a better job with, like, certification. bringing things in and bringing this technology in more quickly. we've been talking to a lot of our industry partners about how they do things and what they do and we're kind of at a point
12:41 am
where we're looking at almost a maturity kind of -- i don't want to say a ma turelt model, but -- maturity model. but some companies are very mature and they do very robust things internally before they release a product. if we look at cloud, those are one of the fist things we're looking at, cloud, we look at what that the do. there's an auditing. then comes into our environment and then we go through our standard testing and the taking about like 18 months before we actually implement something. the way too long. we're kind of doing the same thing three times. we're looking at how we can -- it's not necessarily like certified, the process, but understand their process and then say, ok. it's good. we don't have to test it three more times. the other thing we're looking at is, just talking to the industry, is every single sector has different requirements. and has different -- they call it something different.
12:42 am
a lot of the same stuff but they have to package it ditchly. we're looking at how we can -- differently. we're look at how we can -- energy sector has certified this and we understand what they've done and we don't have to redo them. we just accept their certification. frank: that makes pretty good sense too. i want to open it to some audience questions. is there a microphone? any questions? questioner: mike nelson at cloudflair. the c.i.a. question i asked trevor earlier. c.i.a. means confidentiality integrity availability. have any of you had problems with attacks closing down your websites? is there a growing problem or something you have under control? because we always hear about hacks that get the data.
12:43 am
we don't hear about the hacks that actually close down websites without actually ausing intrusions. sherrill: we experienced attempts to dddos the c.i.a. public website a few years ago. in fact, it went from maybe once a month and then we were seeing it like every other day. and then it was almost every day. not to name any particular vendser or product, but we with through the issue our service provider, our network service provider, so first off, we monitor for it a whole lot more closely. we have a mechanism to move our website into oura more protected enclave every time we
12:44 am
start to see this coming. then we've also taken some of the best practices of having the website forward housed throughout the internet so the actual home website, you don't even touch it. i'll tell you, since we've made those changes, i can't think of a time when we actually were experiencing a true d-dos. marianne: i would echo that. years ago when he these problems. since we moved all of our internet facing websites behind our d.m.z.'s and we're watching for that stuff all the time, bths it's been a long time since the something we worried about. frank: any other questions? we have a gal back there. questioner: hi. a little bit off topic. related. e.m. . electromagnetic pulse defense.
12:45 am
which can have a direct impact on our nation's i.t. infrastructure. do eith ofer -- either of you play in the e.m.p. defense world? frank: you didn't sign you were for this, did you? she's like, i'm never doing one of these again. ever. [laughter] sherrill: you don't realize, i have to go through a publication review process to get permission for what i'm allowed to say publicly. e.m.p. itself, not really. other than we look at contingency planning and we try to make sure that all the eggs aren't in one big data center. something like that happens, we try very hard to make sure that -- unless you're going to do it worldwide, we're not going to lose everything. we're likely going to lose something, just as everyone else is.
12:46 am
marianne: i'd say we look at what we think the risk of that is and what the likelihood is and take appropriate action. frank: that's come to light a lot more in the last few years. didn't the white house put out a basic strategy and the d.h.s. has been examining those issues too. not just e.m.p. attacks but also large scale solar flairs, right? like the one that happened in 1896 that could devastate power grids and stuff like that. i don't think there's any simple solution. sherrill: everybody has resiliency, redundancy. all those types of solutions. for the critical -- i think across the entire government, we've identified what we consider our critical infrastructure. those are the things that we're looking at and we make sure we can protect. frank: back there. questioner: first i'd like to say that i appreciate everything you do and i'm very impressed that the two of you have a position that have given
12:47 am
couldn't nuent to the don't -- continuity to the development of security to the agency you represent. the question i have is about the first topic you presented on that letter that was sent to the 20 something million people. i'm one of them that received the letter. i think more than one. i think it was mailed several times. which i thought it was a little bit confusing because i didn't know, oh, is there this another breach. a little confusing. the question is, why those federal employees have been given protection for just two years, i think, or maybe three years, and how can that information really be protected 20 years interest now, whoever has it, you know, how we can figure out that they have time, the use of this, later? maybe when --
12:48 am
marianne: i think those are great questions. i don't think it's three years anymore. i'm not positive but i think it's been extended to like 10 years. there's conversations that happen all the time about should that be for life or what's the appropriate time limit. this is really kind of all in a whole new area, this whole privacy protection. and how long you should be protected for. it is kind of interesting because, of course, my information was taken and i went in and set up all the stuff with the credit monitoring agency and i feel like i can't even walk without getting a text on my phone that i'm walking. they're tracking so much stuff. it's kind of nice. you go, i went to -- my daughter's going to college tomorrow. i was down there doing some prep stuff and we went into a walgreen's, i used my credit card. before i got to sign i goat goth a text that says, are you using your credit card in walgreen's in florida, one or two, yes. then the transaction went
12:49 am
through. it's that realtime. i don't think we know what the whole fallout of this is going to be in the future. frank: let's get the last couple out. which ever you want first. the fella in the blue and then -- questioner: thanks. we talked a about the move to cloud and industrys doing a lot in the security as a service. security as a cloud enabled service. i know there's some challenges with that, in the d.o.d. and the i.c. is that something that you are using or see being able to use in the near future? sherrill: we do now. we've invested quite a bit of time in identifying what are the best tools and solutions to secure data in the cloud. but the other nugget there is knowing your data. so not all data's equal.
12:50 am
would i apply the same security solutions to all data equally? absolutely not. i wasn't kidding, every time we have a new capability, a system move into the cloud, we're not really focused on the i.t. we're focused on the data. and who needs the data and how well we need to protect the data. so we spend a lot of time making sure that the right secure solutions are in place around that data so it doesn't o where it doesn't belong. so, yeah, i have a blue team of the testers, my blue team is -- think of them as white hat hackers. the good thing about the blue team is they work directly with the system administrators and the people who are developing the system. so they're learning better techniques and what bad things can be done against their system. at the same time we're testing
12:51 am
them. and then the cool thing, from an insider threat perspective, is we also work with people that are monitoring the network , so when the blue team's testing, it f-35 they do something, they -- if they do something, they immediately reach out to the folks doing the monitoring saying, did you see me? if they didn't see them, they tell them countyly what they did, including screen shots. so the next time somebody other than the blue team were to come in and try this, we will see it and we will track it. it's pretty cool stuff. frank: you guys are early adapter of cloud. in government. 2012 at least. sherrill: the now been in operation for about two years. with a new focus on how do we get even more sensitive data now properly protected that gets back to those questions about what are the techniques and tools and security
12:52 am
solutions that we're going to add as we try to put more sensitive data out there. frank: d.o.d.'s been more cautious about cloud use. marianne: we're definitely moving strong. we have our own cloud. i think we're looking at all different variants for different applications. we are that big and we have a about a zillion applications. we're looking at different variants. in some cases we'll use a commercial, in some cases we'll have our own. but i think other things that sherrill said for us apply as well. all data's not equal. those are all the things we're working through. rank: last question up here. questioner: thank you. my question's directed primarily to you, marianne. the government has issued out the defense federal ac whichization clause. by december, 2017, industry is
12:53 am
going to have to be compliant. number one from your vantage point, what are you seeing in terms of industry challenges or comments with meeting that, and then, number two, based off of where d.o.d. is -- sorry, where d.o.d. is going, with their cloud services and so forth, do we really think that we're going to be able to bridge the gap with these requirements based on the fact that a significant investment for industry for maybe marginal return on investment? sherrill: i probably disagree with you a little bit. which is ok. meteorologist: i'm a huge proponent of the clause because i spent 30 years at n.s.a. and i saw how our adversaries get into our network and i saw tons of data being ex fill traited. marianne: which was d.o.d. intellectual property. you can look at airplanes that were developed in other countries, you can go out on the web and search it and they look a lot like our airlines. -- airplanes. i think the game has changed a
12:54 am
little and the whole economic advantage activity, and i think we need to be really cautious. but knowing that that's kind of an achilles heel for us, our industry networks, you guys are probably very familiar with the defensive industrial base, we're working with all of those partners very closely and the rest of industry. but i started this conversation with the back to basics talk nd that's the thing, back to basics and cybersecurity practices implementation. yesterday or maybe the day before i talked to about the stats we got, six months out industry was required to report to us how they were doing against the defar. we had a lot of things that were great. the more traditional security, the physical security, and all that stuff, you know, really looking good. but the things that -- the two things they were struggling ith the most were in the
12:55 am
multifactor syndication realm. we don't necessarily look at hat as industry having a problem. the company's having a problem. we're kind of looking at it as, what are the products they're using and why aren't the vendors of those products providing better capabilities for them? and so gary challenged to us figure out how we can help solve the problem for them. we're looking at some avenues. i don't see us relaxing that because that's really an achilles heel for us. any major d.o.d. weapons system that's being developed, there's multiple vendors behind it. they have our data. they're connecting into our system. you have to kind of connect all of it. frank: i think that wraps it up. i want to thank the panel and adobe for putting this on. have a good rest of the day and if you ever need press on your bus on the west coast.
12:56 am
i know a guy. marianne: i'm going to take it for that one i'm sure. [laughter] [applause] [captioning performed by the national captioning institute, which is responsible for its caption content and accuracy. visit ncicap.org] [captions copyright national able satellite corp. 2016] >> libertarian presidential candidate gary johnson discusses his campaign. his views on donald trump and hillary clinton. the affect of third parties on u.s. politics and the impact he could have on this year's presidential campaign. >> now a discussion on religious liberty and public schools and protecting students
12:57 am
and educators' religious freedom. the family research center in washington, d.c., hosted this event. it's just over an hour. >> hi. we'd like to welcome you, those of who you are here and those of who you are watching, to the family research council's lecture series. the topic today is very timely since many children are preparing to go back to school. i know it's really early. but believe it or not, the kids in my community went to school last monday. so, ready or not, it's back to school time. if we love our neighbor as we love ourselves, as jesus commanded us, we're going to care about what happens to the students and the teachers and the administrators in that arena. mr. cureton: especially when it comes to their god-given first amendment freedom to believe and to live according to those
12:58 am
beliefs. as we all know, infringement on religious liberty in public schools is an escalating problem. students are told they can't pray, they can't read their bible, they can't share their faith and talk about their faith in class. but it turns out that most educators who repress religious expression do so because they're unaware of the united states department of education's clear guidelines which protect their students' religious freedom. thankfully there are thousands of dedicated educators in the public schools who are also committed christians. plus most church going families send their children to public schools. that means literally mling millions of christians are already there. imagine the impact that educators and students could have if churches across america equipped them with the federal guidelines on sunday so that they could take them to school with them on monday. here to help us become more
12:59 am
effective stewards of our influence in the public schools is my friend, eric buehrer. eric is the president of gateways to better education, whose mission is to create a better future for children by keeping god in their schools. as a former public school teacher, eric can represent to both sides of the religion in schools debate. for over 25 years, he has written and lectured extensively on the topic. eric's work has been featured by numerous ministries, including focus on the family, american family association, alliance defending freedom and of course family research council. sit gogateways.org/frc for more information. but eric is here today to present promoting religious liberty in your public schools. which will be followed by some q&a and we'll have a roaming microphone. but please stand so that our friends who are here with us
1:00 am
from c-span can get you on camera. would you please give a warm f.r.c. welcome to eric buehrer. [applause] eric: thank you for the invitation. thank you for the hospitality. promoting religious liberties in public schools. a of people in the christian community feel like public schools are a lost cause. we should promote homeschooling, private schools. what can we do to impact public schools and why should we care? i would like to address that with a few interesting facts. according to research, polling research found 84% of church attending families send their children to public schools.
1:01 am
even if84% -- i don't they have a christian school on campus half of the students in that church attend a local public school. that is where the future generation is being educated. 50 million children attend public schools. 6 million are in private. those schools that are classified as conservative christian, well under one million students. the vast majority are coming from the public schools. nearlyng to research, 50% of public school educators are church attending christians who say their faith is important in their lives. that is a million and a half educators in our public schools.
1:02 am
one of the operating principles is that are christians in every public school classroom. christian superintendents, school board members, administrators, educators, christian parents and teachers. schools look at public as an us versus them mentality but the moment for me was realizing it's not about us versus them. we are them. we are the superintendents. so often we don't know how to appropriately promote religious .iberty in our school so we say nothing. what our organization is equipped those christians with what they can do with an
1:03 am
existing law and with academic integrity. this generation of young people and cherisherstand religious liberty. into amoving today climate where we look at religious freedom being freedom to worship. you can believe what it is -- what you want as long as it is in the home. if we want this generation to grow up to cherish religious liberty let's not just treated as a civics lesson. let's let them live it out in their world, the public school campus. today whenonder that you go into a store during christmas season, people are
1:04 am
hesitant to say merry christmas? because thatder generation of employees grew up in a world where they were conditioned to believe saying merry christmas was inappropriate. they carry that into their adult life and that is what we have today. .hy don't we were burst that they can live it out in the world in which they occupy in their public schools. it is more than an intellectual exercise. they are living their religious freedom. we focus on two key things. academic freedom and religious freedom. to teach about history, coulter and values and promoting and protecting students freedom of
1:05 am
religious expression. thisow educators how to do within existing laws and existing standards. i'm not asking you to smuggle bibles into a closed country. this is not doing something sneaky. do, we teach educators to they can defend any colleague, any parent, any school board because it is in when -- it is within existing laws. a lot of christian teachers meet with christian hearts, not their christian heads. they have a passion for their students but often that passion gets in the way of good academics. we help them understand how to do this academically within guidelines. ,he way we deliver this message
1:06 am
through professional development seminars for educators. the church commuted the inviting us to go in. pastors want to make sure the public schools understand how to be responsive to that large segment of their public school population. they will host us and do workshops for parents and teachers. the university program where we help educate up-and-coming teachers and all the things they can do once they enter the profession. told by teacher will be a veteran teacher you can't do that and they assume they must be right. they begin to live as if they have to be an atheist and a public school. classroomk into that i have to teach like i am an assay -- an atheist.
1:07 am
we create educational materials. to equip the teacher and the parent with what can happen in public schools and how to do that appropriately. can being principle found from our founding fathers from 1787. ordinance was a document developed to govern territory northwest of the ohio river. the united states acquired it. schools.ey addressed here is what they said. religion, morality and knowledge being necessary to good government and the happiness of mankind. encouraged.l be
1:08 am
.here is a three legged stool we created this great government and to sustain it, you need to have three things, religion, morality and knowledge. schools are so important. today, we havene said religion, not too sure we can do that. morality, we are not sure who's morality. we are left with only knowledge is necessary for good government and the happiness of mankind. how is that working out for us? not too well. instead of this three legged said just balance
1:09 am
on this pogo stick of knowledge and we are shocked when they fall off. why should we be surprised? --the asian occasion world in the education world it is surrendere surrounded by knowle. then we will have a great society. forgotten thend other aspects of the equation the founders said was so important. in everydayflected experiences. this idea that religion cannot be in a public school. isaiah was a first grader in california. christmas season, he wanted to bring candy canes. their andote on talked about the story of the candy cane in his believe in jesus.
1:10 am
he brought them to class excited. the teacher took a look at it and said she went and checked with the school principal. the principles that you cannot distribute that. she said jesus is not allowed in our school. note,lly ripped off the gave them back to isaiah and said now you can pass out the candy to your classmates. , the school did allow him to distribute those but they had to do it after school on public property on the last day students were exiting going home for winter break. about moore is taught.
1:11 am
jesus or religion, christianity is somehow offensive. it's not allowed. it's not appropriate to be expressed. he learned a poor civics lesson there. his faith can only be dealt with at home and at sunday school. he can't express it to his friends. isaiah is not alone. columbia university and their surveys, 57% of teens attend religious services and 44% do so weekly. that is amazing. millions of young people and , oftenn attending church every week. classrooms are filled with students who come from a religious background.
1:12 am
the u.s. department of health 73% ofan services found indicate12 to 17 religious beliefs are important part of their life. do we acknowledge that? we talk about teaching the whole child but there is a whole there. it is not just their intellect. it's their emotional and social aspects. we don't talk about spiritual aspects. the fact of the matter is most students coming in 20 public school environment have some religious orientation. teachers can create an environment that allows them to be who they are. what we are going to talk about is how to create a welcoming
1:13 am
environment in a public school for religious expression in the classroom. for key things. these are very practical. i want you to come away from the presentation and do these things in your local schools. i don't want you to just say that was interesting. i didn't know they could do that. i want you to implement this in your local community. it will be a life-changing. you need to step up and help clarify religious freedoms. celebrate religious freedom day. the third thing is encourage prayer in school. teacher led prayer was thrown out of school. you can encourage prayer. fourth, help educators move from
1:14 am
fear to freedom. most of them operate in fear when it comes to this issue of fear. they don't wake up saying how can i repress the fate of a child but they are so afraid of doing something they will get criticized for they end of repressing the faith of children in their schools. let's clarify students freedom. years u.s. department of education is issued guidelines explaining students religious liberties. clintonder president richard riley issued guidelines on students religious liberties. they are beautiful guidelines. it's a matter of free speech and free association. you can speak to whomever you want to about whatever you want
1:15 am
to, including your faith. in 1995 they developed these wonderful guidelines. they sent them to every superintendent in the country saying give this wide distribution in your community. they updated it in 1998 and since it out again with another letter. please give this wide distribution. then under the bush administration they sent it out again in 2003 to every superintendent in the country. again saying give this wide distribution to every parent, student and staff member. giving over the country workshops for teachers. i already ask how many have seen this from their superintendent?
1:16 am
not a hang goes up. it's been there for 21 years. it would answer all of these questions about what students can and cannot do. for lack of information many educators suppress students and their religious freedom. we have a link to it if you go to a landing page we set up for this lecture. to thel see the link u.s. department of education guidelines. is a poor name for the document. it deals with a lot more than prayer. it is all forms of expression. you can download that. let's take a quick look at the seven key things in those guidelines. , they can readay
1:17 am
their bibles and talk about their faith at school. we have 20 says minutes of free reading time, i want you to read silently. if a child wants to open up his bible and read his bible or their devotional and read that devotional, that is their prerogative. they can bring and read their bibles. if the teacher says i want you to open up your english textbook, they can't say i know my religious liberties. that is not the assignment. if it is available you can read whatever you want for the next , orinutes, or during lunch recess, or whatever they want to do they are free to do that. they can talk about their faith with their classmates during
1:18 am
recess or lunch time, or free time in the classroom, the teacher is not the one to get in the way of that conversation. they're not to pull out the conversation as separate or different. students can organize prayer groups and religious clubs and announce their meetings. it is the equal access act. they need to be treated equal as in the other non-curricular club. if you have no one is club, a --hion club, chasse club allowclub, you have to ad for other clubs. equal access to school newspapers, bulletin boards come into common announcements. treatedd to be equally.
1:19 am
they can express themselves in their homework. if it is appropriate to the assignment. we had a case from los angeles. they have a lot of fresh fires. this is a high school english class. the assignment was right a personal essay about how you felt when you watch the fire is on tv. one passionate student wrote about how it reminded her of the first of god being a consuming fire. she wrote about her burning passion for christ. the teacher refused to grade the paper or except the paper because she dared to mention god. didn't say you should burn. just my personal reaction for what i saw on tv.
1:20 am
it took an intervention between the parent, the teacher, administrator and the student before the teacher said i have to change all of my assignments of this never happens again. a student doesn't take you up on what you said? this teacher was from this mindset that we need to keep schools sealed from anything religious. tochers have the freedom meet with other teachers for prayer and bible study. if you can talk about what you did over the weekend, you can talk about your faith. teachers can't be praying with students but adult to adult in their own time, they have the freedom to do that.
1:21 am
the fifth thing is that students may be able to go off campus and have religious studies during school hours. lawse -- 40 states have that allow to have religious release times set up. 40 states have the laws. the school has to decide whether they will do it or not. they actually leave campus , go back onl hours campus and not be counted absent. faithts can express their at a school event. if you have a talent show and a student wants to sing a christian song, it is not the school's expression, it is the student's expression. disclaimer that
1:22 am
it is not attributed to the school. a lot of educators do not understand they have that freedom. delawarerly a case in where students wanted to do a skit for a talent show that portrayed how jesus was protecting a young lady from .emptations of the world they were going to end with a bible verse shown on the projector. the administrator said can't allow that, that is religious. teacher who had been to our teachers workshop a year before said i learned that students have the right to express themselves at an event like this and he contacted the
1:23 am
family policy council. they reached out to the administration. not in a threatening way. the administrator turned around and said ok, they can do it. not only did they do this skit -- theywith deuteronomy not only were able to do this get, they got a standing ovation and one the talent show. we have that. you can watch the video. it is really inspiring. a teacher understood what student religious liberties were and they were able to express themselves in that talent show. faithts can express their in a graduation ceremony.
1:24 am
this is student expression. student to chooses a express -- to speak because they are the valedictorian, the class reason,t, some neutral if a student decides to say something about their faith, i'm so glad jesus christ is part of my life, that is attributable to the student and the department of education says if a school want to be careful about this all they need to do is put a disclaimer that says student speech is it be don't -- is attributable to the student, not the school. the federal government looks at it as free speech. clarifying these seven religious liberties in your schools can be a wonderful thing. a school district in north
1:25 am
carolina put together a wonderful video where students and teachers explained students religious liberties. can download that video yourself and show it in your , announcements. we encourage goals to show this video as part of your school announcements. it clarifies what the department of education says. let's take a look at that video now. >> everyone knows about the three r's. responsibility and respect as they relate to religious freedom in schools.
1:26 am
we should respect the rights of every individual in our school system. andhe rights of students other staff to have their own believes and assemble those believes. to be valued equally. >> students have a right to pray at the flagpole and have their own religious books at school. >> all of us have the responsibility to make sure feelnts and teachers included. >> out of respect -- >> don't try to tell us we have to be like you. >> we have our own faith. >> or no faith. >> school is a place to celebrate our community. coachesers and produc
1:27 am
should practice the three r's. ofwe can be knowledgeable the faiths of our students. >> teachers have the right to teach about the religions of the world but not to disparage one religion versus another. allowchers can create and religious art and music. >> you cannot lead students in prayer when acting in official capacity. >> when acting in an official capacity on behalf of the school or the school system, school employees and volunteers -- >> are agents of the state >> we cannot promote nor inhibit
1:28 am
student expression of faith. >> we cannot encourage or assuage toward a particular religion. >> it isn't hard. >> i have the right to follow my faith. >> believe what i want to believe. >> i can pray or not pray on my own time. >> keeping school for instruction. >> and not disruption. >> your rights, your responsibilities, and respect from for others. >> i would love to see that video shown in every public school in america as part of their morning announcements. that will be the first time a lot of teachers were aware of what should go on in their classrooms and what can go want
1:29 am
in their classrooms. clarifying religious freedoms is number one. it's not getting down to the local level. what we have done is put together a pamphlet like this. it's simply quotes the department of education. we decided if it is not going to happen from the superintendents, let's give it to the individual students and parents and teachers so they have it so they can take a look at what the department of education really says. it is not our opinion. it is from the department of education. we have collaborated with alliance defending freedom. , they havet a pack donated their time to our free to speak campaign offering to
1:30 am
send a letter to the school official of your choice. 25 students in your youth group and you want each one to take 10 and give them to their friends. all the congregation gets them as well. packets ofts, 10 pamphlets. give us the names. you can order these and if you names10 we will put the of the schools in there. they volunteered their time to write a personal letter to each school official explaining from is supreme court angle here what the supreme court says about religious liberties.
1:31 am
it doesn't say so and so asked you to send this level. it just comes out of the blue. you maytime of the year have questions about students and teachers religious liberties. here is what they are. it is a wonderful personalized letter hand signed from alliance defending freedom. you have to pamphlets going out to students and a letter going to the administration. it's a wonderful way to impact public schools. if the church orders 10 packs to five have -- to have 500 for students, they give us the names of 10 schools and that church can have a huge impact on all of the schools in that community. more with a church
1:32 am
group that wants to do this, we look to see if there is an overlap of schools. we will make sure every school gets one and find one that hasn't been included in a list so your reaches even farther. i encourage you to get involved in that. the next thing i want you to do is celebrate religious freedom day. what is religious freedom day? the president has declared january 16 religious freedom day. every president has called on the nation to recognize and celebrate the religious liberties we have in america. on legislation james madison and thomas jefferson put together. it was very influential. want to decided we
1:33 am
proclaim and recognize this day. what we are calling schools to do is recognize the day. if you have any kind of connection with your governors, guilty or governor's office to proclaim the day religious freedom day for your state. we would love to see greater awareness religious freedom day. day, we did one with a number of school principals. we are going to have to do a school assembly and have all of the faith leaders. it will be offensive and it's going to be a headache. i said wait. you don't need to include anybody. don't talk about anybody's faith.
1:34 am
he talk about the principle of religious freedom. just have the teachers say today is religious freedom day. coming up, religious freedom day. the president asked us to celebrate the religious freedoms in america. tos a great opportunity revisit the issue of religious expression helping students understand the freedoms they have. what can you do for religious freedom days? tell your students about religious freedom day. explain their liberties. it's a wonderful opportunity. my classroom is a safe place for you to express your religious values. respected. tell parents about religious liberties and religious freedom day?
1:35 am
pass a school board resolution. call for the distribution of the u.s. department of education guidelines on student religious freedom. kingin with martin luther day. it is often very similar to january 16, around the same time. ,artin luther king as a pastor his ability to express his faith in word and in deed had a tremendous impact on his civil rights actions. celebrating religious freedom day is very important. encourage prayer in your school. in 34 states there are moments of silence laws. half of those are mandatory. the other half are optional.
1:36 am
even in some of those they leave it up to the teacher. you can go to our website, find your state, download the long that deals with that. --help you then as a church a schoolteacher cannot distribute these but we encourage churches to distribute this prayer card. it looks like this. it has a beautiful prayer on it. you can download a sheet of these. this prayer comes from a rhode island high school. they had a banner hanging on the wall that had a beautiful prayer on it. an atheist student sued the school and said that is a prayer . the court agreed that it served
1:37 am
no academic purpose. i was fine with that. i think we christians often go for symbolism over substance. we had that prayer on the wall. was anybody reading it? it had been gathering dust. students should actually say the prayer, right? let's put it on something that they will pray and they will look cap. voluntarily to pray the prayer. we put this on a business card. heavenly father, grammy each day best, to beo do my kind and helpful to my classmates, to be honest with myself and others, help me to be a good sport and smile when i lose as well as when i win. help me conduct myself to bring
1:38 am
credit to my school. amen. when that be wonderful if millions of students in these 34 states were praying that prayer during the moment of silence? i encourage you might get these cards. encourage them to put them in their pockets. pray silently during that moment of silence. do isurth thing you can encourage educators in your community. we call it helping a move from fear to freedom. we do a seminar, a half-day seminar. teaching about the bible and christianity is legally supported. fact ther the
1:39 am
bible and christianity can be included in many states. what they are doing is academic, not devotional. it fits with the culture. it is part of their community. we help them understand that. it is morally imperative. we go through the research that shows it has a great impact on their behavior and academic success. this forms the foundation it is illegal, it is academic -- it is legal, it is academic, it is good. how do you make this work in the classroom? we go across the curriculum. a lot christian teachers lead with their christian hearts, not their christian heads. they bring in their church in talladega -- mentality.
1:40 am
we show them how to think academically where there is an appropriate intersection. we help them understand religious freedoms and we detailed those religious freedoms and address the holidays and how to acknowledge the holidays. we don't encourage them to celebrate holidays. everybody is equally celebrating this holiday. that might not be the case. you can acknowledge those holidays and teach what they mean. just teach the truth of what the holiday is. in the evening we do a parent seminar. how to help your children graduate with your faith and values intact. how to navigate the public schools. how to think with a global view.
1:41 am
this can be a real life changer. onre's a three minute video teachers talking about how it impacted them and their students. ♪ >> i have been a teacher for 18 years. i have been terrified of mentioning the name of god, mentioning anything having to do with the bible. >> i have come across a number of teachers who thought that the and state was a solid wall. it can't come up. >> i have taught for 38 years. several years ago i began fairing -- fearing. >> i got someone would say
1:42 am
something and i would get in big trouble. helped because now i know i don't have to throw away the bible. >> this is the first time it was presented specific here is what was legal, here is what you can't do. how toave me a guideline present these things, how to use them in the classroom, strategies i can use. clear thatade very there is a line at some point. we are not trying to use this as a way to evangelize. we want them to know what you can do. at thes so surprised things i can do. >> i had got what i wanted
1:43 am
philosophically. i got more than i expected practically. >> they are going to learn so much. they gave me a lot of freedom. >> we are required to say the pledge every day before lunch and many students, they like to sit down. they resist doing it. they say it is because it says under god. their wheels were turning. they were thinking. he started saying the pledge of allegiance and looking like they meant it. it has been a big change for them. >> i took the materials back to school and passed them out. >> i decided to add the bible to my classroom library. it is the most read book in my classroom. >> it brought tears to my eyes.
1:44 am
i am no longer afraid. >> 18 years not understanding. in that one morning it cleared up for me. i was able to be a better teacher. eric: in conclusion, let's look at the things you can do. i hope those of you watching through the internet will take away these four things and do these in your community this year. distribute the free to speak pamphlets. it's the simplest thing you can do. just give them the material they need. , a fifth grader in
1:45 am
washington state, he got the pamphlet from his mom. there was an assignment where he was allowed to express his faith. he was walking out the door that morning. his mom said are you sure you want to turn in that assignment? he said no problem. i have my pamphlet in my backpack. it can be equipping for students. celebrate religious freedom day. help the students understand what their religious freedoms are. if you are in those 33 states that have moments of silent laws, encourage students to pray that prayer. and host a seminar in your
1:46 am
community. we can give practical help. it is wonderful when teachers see one another and often times they feel alone. they get very encouraged and supported. i remember i was speaking at a church in southern california, talking about the things they could do. as is often the case, you couldn't have scripted this better. the gentleman says i just retired. in my 30 years of teaching i never knew i could have done all the things you said i could have done. and he walked away. another man had tears in his eyes. he said, first year teacher. not been so frustrated
1:47 am
knowing what i could do. this changes everything. you can be influential changing everything for the teachers in your community. a lot of times we look the public schools and say it is so huge and so entrenched. there are so many problems. how can we make a difference? there are christians throughout the system. they just need to be encouraged. founders when they looked at that huge task. i'm inspired by the words of famous henry when his give me liberty or give me death speech. i would encourage you to read it. it is inspirational. the revolution was about to get started. the colonies were getting active.
1:48 am
the year was 1775. they were going back-and-forth that what they should do. patrick henry rosen said these words. they said, they tell us we are weak. when will we be stronger? will we gather strength by an action and it resolution? armed in theple holy cause of liberty are .nvincible by any force we will not fight our battles alone. will is a just god and he raise up friends to fight our battles for us. the victory goes not just to the strong but to the vigilant, the active, the brave. our brethren are in the field.
1:49 am
why do we stand here idle? they changed the course of history. our brothers and sisters are already in the field in their schools. idle whenstand here we have the tools and equipment to help them move from fear to freedom and create faith friendly public schools? join with us. course ofnge the history. thank you very much. [applause] we have some time for questions. >> can i start with one quickly? i actually was curious, you have spoken on the offensive, being
1:50 am
prepared. we focus on religious liberty quite a bit. quick suggestions you have if a student finds themselves in this position? if they are older they may say ok and don't even tell their parents. if they are younger they may tell their parents. just suggestions? you may not be aware and give them that information. i encourage parents to approach a teacher with i thought you would find this helpful. not an attacking way. just i think you would find this helpful. there are wonderful organizations. i encourage them to contact.
1:51 am
you can find contact information for those organizations. they are willing to step in. most the time it's a simple clarification letter the administrator has never understood what religious liberties are. commentcould do a quick than a question. the most unbelievable step to me was not the 84% having kids in public school, it is the 50% of teachers who are churchgoing christians. that was surprising. and freedom public schools seminars, how many education schools have you reached out to and colleges? eric: last year we reach 3000 students. universities will include it in
1:52 am
their course of study by a textbook. the purchase access to the online program. it is an existing course the university has. 3000 a year. any other questions? ok. so nice to know i have answered everybody's questions. >> hello. happy to have heard everything you have to say. a lot of people will find a cathartic to know there are options they can implement that are legal. as you know the headlines are that there is more of a islamic influence in how america is being perceived as being open to religious freedom from the muslim standpoint.
1:53 am
do you anticipate conflict in terms of people expressing their feelings that may not necessarily be well core with christian viewpoints? eric: i would say welcome to america. every religion has freedom of religion and expression. if you have a muslim student in your classroom, a buddhist student, they all have equal freedom to express themselves when it comes to discussions, homework assignments, free reading time. that applies across the board. i don't think we should say this is only for christians, or we only want christianity to have that freedom in the classroom. >> i'm with the church of scientology. back in 1995 there was a coalition of people who got
1:54 am
together and published a booklet. in the publicng schools. after that meeting with president clinton, as i have mentioned it was a large coalition of the area's faiths. my question would be, your seminars are awesome, are they open to people of all faiths? eric: certainly. our focus is on how to address the bible and christianity. our experience is that a lot of teachers have no problem teaching about world religions . that is very multicultural. there is a lot of hesitancy about that. on the bible and christianity in helping students understand and cherish that as american judeo-christian heritage. when people say how come you
1:55 am
don't include the other faiths? if you taught students and teachers how to teach about algebra and somebody saying how about you don't teach about calculus? we are focused on teaching algebra. that is what we do. we are open to anybody who would like to come and learn what can be done in their schools. >> way for the microphone. personyou explain how a who wants to organize or invite you to host an event would do so in a community? multiple schools? eric: thank you. i appreciate that. if you are interested in having us come to your community contact our office. if you go to the website you will see the information on how
1:56 am
to contact our office. this is done through a coalition of churches. we want our schools to be more responsive to the issue of the bible and christianity and make sure our teachers are doing it right. a lot of schools do some good things. they actually go too far and do things that step over the line and then they get slapped down recoils.and everybody i want to encourage them to do it right and academically with integrity in a way that is even more robust. i will often tell them look, i am for substance over symbolism. there is a time and place for symbolism. i'm more interested in substance. how does a teacher make a in anve to their subject
1:57 am
appropriate way? limits and howe to have integrity regarding those limits. if they will contact our office we are happy to schedule that in their community. we call it a two for one day. we can reach out to more schools and invite teachers to come in. >> i have another one. sorry. i was overseas attending a seminar in israel and met students from all over the world who work in ministry capacities. denmark -- what they do is because denmark is so liberal they are actually permitted to come in and present the gospel.
1:58 am
there are people of all faiths that present their faith. i have another friend in australia. one of the things is the same thing. they go into schools and talk about christ. to me that was almost a helpful thing because i think that is territory that has been taboo but as our culture moves in a more liberal way it is possible we may get to that point and that may be a hopeful sign. i'm curious of your perspective? i'm not familiar with denmark's arrangement. europe often has the state church. i think that is done a lot to kill religion in those countries. it is part of the institution. it is better and america where we have competitive, making the case for your fate and attracting people to your faith.
1:59 am
for turning our public schools into christian schools. there is a time and place for that. a teacher asked me, one of my students wants to be a christian. he wants to become a christian. what should i do? we honor parental rights. you don't want to do this behind the parents back. you want to call the mom, and explained to her what her son would like to do. if she is fine with that, would she be willing to meet you for coffee with her son. they went to a coffee shop. sharedt of the mom, he here is what being a christian is. the mom's attitude was whatever makes my boy a better boy.
2:00 am
but in front of the mom was able to lead the boy to christ and he became a christian. that was done in personal time outside of school honoring parental school, doing it out f. that is the right way to do it. what i'm against is when teachers feel like they are trying to sneak something in. it is inappropriate in a public school setting. there are a lot of places where that can take place. it can take place in student clubs. it can happen in afterschool programs. it can happen in evening programs. but on a personal level, the teacher needs to be careful about that and work directly with the parent had . we are done. thank you so much. i would be happy to answer any other questions you may have. [applause]
129 Views
IN COLLECTIONS
CSPAN Television Archive The Chin Grimes TV News Archive Television Archive News Search ServiceUploaded by TV Archive on