Skip to main content

tv   Key Capitol Hill Hearings  CSPAN  August 30, 2016 5:00am-5:21am EDT

5:00 am
the cia. he asks will brexit negatively impact the improvements made in eu counterterrorism efforts? mr. schoof: u.k. was a strong supporter of everything we did. i am sure even with greg they will still be a strong supporter. but when they are not a member state anymore, we have to make other legal arrangements to make sure it's going to work. it will be more work, but the intention will still be the same. we work around it. mr. sanderson: does it, take things for dhs -- complicate things for dhs? general taylor: it does not. we have strong bilateral partnerships with the u.k. we think that will continue. we think it will be a strong partner in europe, if not in the eu, information sharing and best practices. brexit will come and go, we believe our security cooperation
5:01 am
will continue to be very strong. mr. sanderson: second row in the black outfit. thank you. >> hello. i am the newest addition to the saudi embassy. i have a two-part question as well a comment. the first question is firstly, how effective is the d radicalization programs happening -- how effective have they been in terms of in the eu as well as the united states. as well as how effective have the -- i don't know if you do have them, the fighting against the xenophobia. and against anti-semitism -- by
5:02 am
anti-semitism, i mean anti-arab, anti-muslim, as well as anti-jewish. and detangling the complications that all that is creating. mr. sanderson: let's go with the questions, because those require responses. let's start with the deeper acquisition programs across europe. we know there are a variety of programs. mr. schoof: we exchange a lot of information on how to work on them. i think the most important is to know who to do radicalized -- de-radicalized. local authorities play fairly important role in getting their signals in the right place. community policing is fairly important.
5:03 am
the local caseworkers are important. in the netherlands, we are progressing in those communities where radicalization is a real issue, whether it's jihadist or right wing, whatever. to cut their signals and offer de-radicalization programs. we look at with the germans did in this regard. there is a lot going on. the results were difficult to prove you were on the right half, but doing nothing is not an option. mr. sanderson: in the u.s.? general taylor: we have been very clear that the key for countering violent extremism is
5:04 am
outreach to the communities that are being targeted with this propaganda. he has been to many, many communities across this country. we revamped our countering violent extremism program to try to empower communities to understand the threat and the risk, and to become voices against this kind of radical ideology. not so much a de-radicalization, but helping communities understand what is radicalization and what the tools are. you mentioned -- any xenophobia about a group of people or race or religion is not helpful in the integration process. the wonderful thing about america is we are a country of immigrants.
5:05 am
we have learned how to integrate immigrants behind this whole notion of what it is to be american. the things that stand in the way of that kind of process doesn't help a community and a great. and when communities don't integrate and communities feel isolated, those ideas that our enemies would try to foment in those communities become easier to accept. it's very important from an american perspective that we integrate these communities, and that these communities be truly understand that we welcome them to america, they are part of the american fabric, they're are going to be an important part of who we are as a country going forward. mr. sanderson: dick, any comments on anti-semitism, hatred towards models -- muslims and jews and arabs? mr. schoof: it's high on the
5:06 am
agenda. governments do want to have integration. with europe and also in the netherlands, we've seen strong parties who are clearly anti-islam. and we have to deal with those political parties as well. mr. sanderson: let me offer an anecdote on the de-mobilization comment. we were in northeast nigeria in january and there is no offerings in nigeria for militants in boko haram. many of whom were kidnapped or brought in against their will otherwise in to the group. there is no way for them to get out of that program it into a de-mobilization unit. no one wants them in their backyard. there are good programs out there, saudi arabia is well regarded.
5:07 am
norway is well regarded. there are good models out there for de-mobilization. hopefully there will be information sharing and best practices on that. in the back. blue shirt. >> sean carberry, federal computer week. at the center of information sharing is the infrastructure. in the united states, you have a variety of defense and intelligence agencies that are coming to terms with cyber technology and cyber security. their own internal networks, how they are connecting and sharing with other federal agencies. you add in the same dimension in europe. we are things currently, in terms of the integration of systems to share data? how much is going to cloud with shared access? what are the barriers, and how is this affecting the sharing of information? in addition, what are the concerns about cyber threats to
5:08 am
this information sharing itself? mr. sanderson: excellent question. mr. schoof: let me start with the last one. the cyber threat in itself is real. as we all know. we do the cyber threat assessment every year. for the terrorist point of view, they are getting more interest in cyber. they certainly have interest, but they do not yet have the right capabilities. to really get to our infrastructure or our information systems. but maybe somehow, they connect to people who can or in reasonable time they can develop those capabilities to get to it. in the netherlands, we put a lot of pressure on private and
5:09 am
public organizations to have their cyber security in place. we talked about real issues of cyber security and real vulnerabilities. having said so, i think we tried to get information exchange within europe and to get it in a more operational way that we can very quickly exchange information. it can be also cured and that's a very interesting topic to discuss further. it takes a lot of time before we really can do so. but we have secure lines and secure infrastructure. and we can rely heavily on what's being developed in defense. general taylor: the technology is moving, as you know, very quickly. and the security threats continue to mount.
5:10 am
so effective cyber security in the exchange regimens is going to be critical. the last thing you want is a backdoor in one of these systems of information sharing that allows our enemies to know what we know. it's a balancing act. i believe personally that we are moving into an era where it used to be i will tell you what i think you need to know something, into an era between our partners with our partners need to know everything we know. and to do so in a secure way, so when they need information, it's not mother may i, it's there. we have the own challenge in our country, when we need the information -- when frank taylor present himself at the border, we need to know whether frank taylor's a threat or not. that can't be because we ask our partners an hour ago whether
5:11 am
frank taylor's a threat trade we need to know that when it happens. instantaneous information is what we're trying to build towards doing so with security, to protect that information, but the information in the system and the way in which that information is being exchanged. it's an incredibly important as we build these systems moving forward. mr. sanderson: please keep the questions brief. >> unaffiliated, but a former software developer doing a lot of work in data. my question is, to what extent are you focusing on unstructured and informal data, as opposed to all the formal stuff when there's an id number you can look up in a database. notes on local investigations or rumors or suspicions -- it hasn't raised to the level of you have a confidence in it. i think like the boston bomber, they had some information, but it wasn't enough. are you going to be sharing a lot of that?
5:12 am
general taylor: you are really getting into an area that is at the essence of what is information sharing. and what information gets shared and with the protocols are for sharing that information. i'm a techno-peasant, so get me started talking about technology. structured versus unstructured data, tagging data, i leave that to my data science friends to figure out how to do that. the important thing is the integration of information that we have to build new knowledge. the buzzword after 9/11 was connecting the dots. we are not only connecting dots anymore, we are connecting the needles and haystacks under needles and haystacks. and needles and haystacks to
5:13 am
try to get answers. the challenge is moving data, protecting civil rights and civil liberties, not making false allegations and trying to do all that in real time. if you got an idea, let us know when we will try to answer it. it is a daunting challenge, but i would tell you that the u.s. government and our partners across the globe have taken on that challenge in ways that we never thought we could do, in protecting the information, protecting civil rights and civil liberties, and also sharing that information in near real-time. much better than 15 years ago after 9/11. >> we talked a lot about the political security and social aspects of countering terrorism. no one on the panel has spoken about terrorist financing, which is also a huge fuel to the fire along with propaganda, the political and social -- and
5:14 am
security side of it. i'm wondering on both sides of the spectrum, whether it be in the eu or the united states, what are we doing in both governments to stop terrorist financing? how does intel plans it on, and what are the actions taken afterwards? mr. schoof: good question again. i think it is one of the most difficult topics we are trying to get a grip on. judicial, political, practical. i think we've seen a big increase in the efforts in this, but it's all very copied cases which we have to -- before the decision is being made, there has to be a lot of proof that it alluded to finance and finance
5:15 am
errors. the same is true in regards to institutions, for example. if an organization is not lifted, you cannot -- i think it is a very difficult process in itself. if an organization changed into another organization, we get in the process and it will already be too late again. then there is the issue, for example, foreign finance for a mosque in the netherlands, we do not want foreign finance. we have seen before other
5:16 am
terrorists are being financed as well. it is a very broad question. small amounts of money and big amounts of money can play an important role in the development of terrorists. i think the answer still has to be found. the united states listing plays in how we canole act quickly to get listingsrigh t? >> just because we do not speak to it does not mean it is not ongoing. there is an investment from the treasury department, looking at the issue of terrorist financing. has been working on this since i was at the state department 15 years ago.
5:17 am
that effort is ongoing and complicated. we are building better tools to better understand that phenomenon. coming out of paris and brussels, working with european partners, we were able to uncover some of the connections using financial tools. nott is part of the fight, one that we have forgotten about. tool in important dismantling organizations across the globe. >> i think we have come to the close of our event. i know we have many more questions. both of these gentlemen have
5:18 am
>> and general taylor, for everything you and your team have done for not only protecting the u.s. and our partners around the world. and a big round of applause for that. [applause] c-span's washington journal, live every day with news and policy issues that impact you. coming up this morning, the research and policy director for the economic policy institute will join us to discuss his recent trip or on what he
5:19 am
describes as one of the slowest economic recoveries in u.s. history. and the former assistant administrative or air and radiation. he will talk about the obama administrations plans to limit greenhouse emissions from factories. live washington journal beginning at 7:00 a.m.. james comey speaks on cyber security today. a.m.coverage at 8:35 eastern on c-span two. today, arizona and florida and john mccain seeks his sixth term. he is being challenged by kelly ward. in florida, patrick murphy and alan grayson are competing in the democratic primary to face senator marco rubio. follow the primary results of these and other races on c-span,
5:20 am
c-span.org, and c-span radio. with the house and senate returning from their summer break next week, on thursday at 8:00 p.m. eastern, we will preview key issues facing congress this fall. federal funding to combat the zika virus. >> women in america today want to have the ability to not get pregnant because the mosquitoes ravage pregnant women. have turned down the very money that they argued for last day. they decided to gamble with the lives of children like this. >> annual defense policy programs bill. >> all of these votes are vital to the future of this nation in a time of turmoil and in a time of the greatest number of refugees since the end of world war ii. >> gun violence legislation and criminal justice reform. >>