Skip to main content

tv   Key Capitol Hill Hearings  CSPAN  August 30, 2016 11:30pm-12:01am EDT

11:30 pm
i said thank you. she said dad, i do not mean that in a good way. you are the man, who would want to work for the man? i think she is right, but i said, if people saw what this went -- what this man and woman at the fbi are like, and the challenges we face, i think they would want to come work for us. i do not want to share too much about our recruiting strategy, because her interests are not too aligned, but i want to make sure people understand what it might be like to work for this man and this woman into this for a living. and we're we might naturally demonstrate when you are 108, you can also five. when a smart kid comes in with a
11:31 pm
wonderful way to approach a problem and they knew what you might try to crush their spirit by saying, no we have never done it that way. at the fbi we're working to be cooler. we're marching hard in that direction so when this talent comes into our organization we're open to having that make us better in a way that connects us and them to our mission. we're also doing things we have never done before. we're going to hire a senior level scientist who knows how to think deeply about the technical challenges. who knows talent, technology, process. we are looking to bring that person in at the shoulder of our cyber security division. trying to hire more cyber talent in our special agents. here is our challenge.
11:32 pm
cyber's special agent it you need three buckets of attributes. integrity, nonnegotiable. physicality. we're going to give you a gun on behalf of the united states of america. you need to be able to run, fight, shoot. in you need to intelligence. cyber special agent need a highly specialized expertise. those three buckets are rare to find in the same human being. we will find people of great integrity, technical talent, cannot squeeze out more than two or three push-ups. we may find people of great technical talent to want to smoke we know on the way to the interview. we are staring at that. are there other ways to grow this talent? find people of integrity
11:33 pm
and physicality anti-intelligence, can we grow our own cyber expertise in the organization? or can we change the mix? the cyber squad today is usually ain't special agents. gun caring, physicality, expertise. also as something else, a smaller group of high-and angry people with high expertise who are called cyber investigators. we're leaving our mind open to the fact we have never faced a transformation like the digital transformation said the fbi ought to be different in the way we think about our people. a lot more to come there. we are trying to shrink the world in two different ways. shrink theng to world inside the government so that to we, all of this responsible, whether it is detection, response, mitigation,
11:34 pm
that we are working much closer together. you may have read the president recently issued a directive. it is fabulous mostly for people outside the government. confirms the way we have been acting. it makes clear to all of you what the rules of the road are so you understand the president has said, department of justice, you have the lead through the fbi and the task forces in responding to threats and investigating threats. live in your incredible capability with respect to threats, you are responsible for threat mitigation. you will work to reduce impact, mitigate liability, ss risk. director of national intelligence, because national intelligence is your job, you will need the lead. making sure we have the best thinking in the threat response effort.mitigation
11:35 pm
that is important. the most important message, it should not matter at to anyone outside the government who you call when you have a problem. out whois to figure does what. 41 clarifies exactly what the layings of the road are. our own.vil dawn the second way we are trying to shrink the world, we are trying cyberward deploy far more agents and analysts and have them sit with our foreign partners. although we face a digital threat, the human connection between investigators, shrinking the world so we can detect, it deter, and incapacitate bad guys better is at the core of our strategy. costs. trying to close
11:36 pm
the intrusion activity by nationstates, activists, thugs, it was deter about. we want to lock some people up so we send a message that it is in thereebie to kick door metaphorically of a year and a american company or private citizen and steal what matters to them. if we cannot look them up, we want to call them out. name and shame their indictments, pr campaigns. what they aret, doing. a year and half ago when the department of justice first indicted chinese act as for stealing the enterprise of american corporations, the innovation, people said, you are wind,pitting and the shouting in the win. a silly, empty gesture. i do not ink so. we have managed to send it an important and chilly wind.
11:37 pm
even if you are sitting halfway around the world, it makes a big difference to have your face on a wanted poster. you might dream of going to a broad, you might center kids abroad, you want to go see them. all that fbi is not smart, but they are dogged. 50gave them -- it took them years to give up on db cooper, a man a jumped out of a plane on bove washington, d.c. sending that chilly wind it is why we did the iranian investigation. these kinds of activities have an impact on the individual is a hand on the governments, which we have seen. ais helps us grapple step step toward a set of norms that leads to changed behavior. especially with the chinese where we have seen progress in the way in which we understand
11:38 pm
the framework. they are serious people with whom you can have a serious conversation to explain this. nationstates gather intelligence, they always have. we are trying to get information about other countries, they are trying to get information about us. we tried to detect it, throated, stop it. but what nationstates cannot do and be part of the community is steal stuff to make money. that is outside of the framework of acceptable activity and we are making progress in having people understand that framework does not make sense. so whether it is through sanction or lessee, we're working hard to make people feel our breath on their neck and change their he had. we have got to get a point to where we can reach them as easily as they can reach as a
11:39 pm
end change their behavior through the reach out. localt help our state and partners be more effective at responding to all manner of complaints from their citizens that we cannot get to. case.not handle every we have to help our state and local partners with training, equipment, and task forces. to respond to the overwhelming cry from citizens for help. people everyday are asked to wire money to nigeria. i am not the president of the federal bureau of investigation, i am not in nigeria. money.wire me citizens are scammed every day. we have to help our partners give them justice. the last thing, we have to work better with the private sector to address these threats. all of the information, all of the evidence we need, sits and
11:40 pm
private hands in the united states and that is a wonderful thing but it is an enormous challenge. the majority of our private partners do not turn to law enforcement when they face in the intrusion and that is a problem. it is fine to turn to one of the withies that will help attribution and mediation, that is good. but we have two to a place where it is routine for people who are victimized to turn to us for assistance. we know your primary concern is getting back to normal when you run any kind of enterprise, especially for-profit business but we need to figure out who is behind the attack and it is in your interest. sometimes people think, my interests are not aligned with the federal government, i want to get this over with and get on with business. sometimes people think even if itinvolves paying a ransom
11:41 pm
is that way. but our long-term it interests are the same. you're kidding yourself if you think it will go away and not return to re-victimize you. we must work together to stop these threats. what is our strategy to get you to dr. lismore? we're going to howard yet -- week to get you to talk to us more? we're going to hound you. we're going to convince you we will not we victimize you if you contact us and seek help. we will treat you as we have for one century vic sums of crime. in working with all victims, our paramount goal not to re-victimize this poor person. whether it is sexual assault, robbery, or a company that suffered intrusion. we also understand concerns about competitive advantage.
11:42 pm
we know you are trying to get out from under the burden that has distracted your operations, chain, yourr supply reputation. confused and concerned your employees and customers. i am particular understand your concerns about liability given i was general counsel of two different companies before coming back to this work which is better than any avid sector work. we have been at this a long time. humble, but a true statement as we have gotten good at it. and at minimizing your disruption. minimizing disruption and pain to your employees and we will data about to employees or operations. we will have a don't conversations constantly with you to tell you what we are going to do with the information you give us so that you can make
11:43 pm
risk-benefit decisions about which information to give us. we will not allow you to be blindsided because we understand if we do that you will not talk to us at anymore. so your main question is, what do we need to to do? we need you to talk to us. know us. to understand what we are like and how we do this work. make sure you understand how important it is to your competitive advantage to integrate the fbi into your plan.ssessment you spend a lot of time no matter where your facility is making sure the fire department has a basic understanding of the layout of your building so that in the event of a disaster they can save lives. the same withdo respect to your cyber threat and your risk assessment plan. we were able to respond within hours and help sony investigate,
11:44 pm
attribute, and mitigate because they had taken the time before know us.to get to not the details of their business plan. not any secrets of their proprietary information. but we knew the basics about their network, who the key people were and what their key facilities and locations were. i'm put that in a situation with smoke all over the place, we were able to walk to the right place and get the right work done very quickly. i believe it is in your competitive advantage to make sure we have that opportunity if company.r hits your my suggestion to you is, if you will are a cso in a private enterprise and you do not know someone in every single fbi office where we have a significant presence, you're not doing your job well it enough. our people are waiting for the xfone calls to build those relationships. i liken this experience, this
11:45 pm
building trust with each other, to a journey we went through between the fbi and cia over the last 25 years. on theas long to a law books that allowed criminal prosecutors and agents to protect the equities of the intelligence community in the --nt there was a criminal the intelligence community in the event there is criminal activity. act was passed in the 1980's. people thought, we saw that problem of friction. nonsense. it required trust building. case-by-case, person by person so that to take this example -- the cia understood the fbi would not hurt their equities. a great example occurred in the summer of 1998 with the attacks on the american embassies in kenya and tanzania. the investigation that followed involved agency people and
11:46 pm
federal bureau of investigation people. the way we did it, people went on searches together to do search warrants east africa. we sent people from both organizations have something was found that was later going to be useful in a criminal case, the fbi agents could testify. it would never be necessary to talk about the cia activities or presence. that was consistent with the law and it required trust-building to get there. three years later, fbi personnel testified about the surges in a federal courtroom in manhattan and bci did not have to be involved. those kind of things built a culture of trust. it is not enough to say, these are the rules of the road and statute of regulation. that froming to see us. bying to work with you place place. enterprise by enterprise. incident by incident to
11:47 pm
demonstrate we know how to do this well. i can't resist talking about and corruption and the problem we call "going dark." the issue of growing dark which is the term we use to describe our increasing inability was judicial authority to get access to information that sits on a device or is traveling in real-time. the challenge we face is that ,he advent of default ubiquitous strong friction, is making more of the room we are charged to investigate dark. there was always a darker corner. sophisticated actors could always get access to devices or live comps to encryption. pasthas happened in the three years that i've been director, that dark corner of the room, especially through default encryption, especially onough default encryption devices -- that shadow is
11:48 pm
spreading through more of the room. the conversation we're been trying to have is just below public consciousness now and that is fine. what we want to do is collect information this year so you we can have an adult conversation in this country and here is why a requires an adult conversation. our nation founders struck a bargain 240 years ago. country, we have a reasonable expectation of privacy and all about public spaces. houses, cars, safe deposit boxes, devices. that is an important part of being an american. the government cannot invade our private spaces without good reason. good reason that is reviewable in court. it also means that with good reason, the people of the united states, through judges and law enforcement, can invade our private spaces. that is the bargain at the heart
11:49 pm
of liberty in this country. since its founding. to take the most common example, if law enforcement has probable cause to believe there is evidence of a crime in some spatial control, whether it is your bedroom, your car, your safe deposit box or your laptop -- they can go to a judge, make a showing of probable cause and get a warrant consistent with the fourth amendment to the u.s. constitution and go through your stuff. they can search wherever the judge says they can search. your closet, dresser drawers, under your bed. they can take whatever the judge says they can take. even our memories are not absolutely private. even our communications with our spouses, lawyers, clergy, medical professionals. private because the judge, in certain circumstances, can order all of us to testify what we saw, what we remember, that we heard.
11:50 pm
constraints ong that but the general principle is one we have always excepted in united states and has been at the core of our country. there's no such thing as absolute privacy in america. there is no place outside of judicial authority. that allowed us to achieve two things we all love dearly. privacy and security. encryptiondefault changes that bargain. think it actually shatters the bargain at the center of our country. there is something seductive about the notion of absolute high missing. when i hear it, i love it. i have an instagram account with nine followers. they are all related to me except for one boyfriend i lead and at night audit request because he may one day be related to me. me.s private to it is seductive when i hear
11:51 pm
someone say, absolute privacy is paramount value. our devices are designed to ensure privacy is an american. i step back and realize, we have never lived that way. that is a different way to live and changes something at the center of our country that is really important. in our case, it affects our national security investigations and criminal investigations. we believe that the f yeah we have to talk about it. thefbi role as not to tell american people how to live or govern themselves. our role is to simply say, this does you were counting on us to use to find people and criminal cases, and national security cases, they are less effective every day because of this challenge. it is not the job of tech companies, as wonderful as they are, to tell the people to live or govern themselves. their job is to innovate and sellers great equipment. the american people should
11:52 pm
decide, how do we want to live? had we want to be governed? how do we want to govern ourselves? you have that conversation in a mature way we need space, time, and information. we need to have an -- we need to understand how it is directly affecting our work and share that. the challenge we face in having this conversation is there is an intensity of emotion around the issue that makes it hard for people to avoid demonizing each have a thoughtful exchange. some like to say we are trying to weaken encryption. trying to build backdoors into everybody's devices. to be clear, we believe the issue is not strong versus weak and corruption. we love strong and encryption. it enables us to better protect people from the eaves, fraudsters, hackers, spies, and terrorists of all kinds. we love strong encryption but we
11:53 pm
also believe absolute user control of data is not a requirement for strong and encryption. a whole lot of organizations including our own issues personal electronic devices to employees and still retain some control over those devices for security and business reasons. of those organizations, including my own, is served with a warrant, those organizations are able to access the information and comply with the warrant. the ability to do so by design does not require week encryption. that is the reason i described this as a really hard problem but not a technical problem so much as a business model doubled. that does not make it any easier to solve but it is a fair description of the challenge we face. fbi that wee in the need a conversation. if at the end of the day the american people's eye, we are ok with that portion of the room being dark, we're ok with -- to use one example -- the fbi in
11:54 pm
the first 10 months of the sure getting 5000 devices from state and local law enforcement and asking for assistance opening them and 650 of those devices -- >> where going to break away from the end of the speech and take you to arizona. senator john mccain easily defeating his primary opponent. kelly ward, the former state. let's show just to say. lecturel continue to others about civility. the republican party cannot win we keepional party if nominating career politicians whose only objective is perpetual reelection. [applause] >> now, i am confident -- look at this room -- i am confident there are people of every age, race, nationality here. national origin. we're all americans, right? we're confident that our
11:55 pm
movement to save america will continue. those of us who believe liberty out to be the direct end of government, as touching henry wrote. -- as patrick henry wrote. and as another said, nobody made a bigger mistake than those who did nothing because he can only do little. the faith. the battle might be done, but the war for america's soul will continue. this is only the beginning. stay here, have fun, get some pictures. dejected.sad and i've been telling these guys, i think my staffing and husband are like, who is said? i'm not sad. it has been amazing. we did something that everyone else was afraid to do. we took on the beast. .e took on the beast
11:56 pm
so do not give up. the day is not over. you know, if we lose this election it simply is and election. i have said it again and again. i built my faith on my family, my face, and mike -- i built my life on my faith, my family, and my profession. we have to be fearless and operate on faith if we want to make change. thank you so much. thank you. thank you. ] pplause
11:57 pm
announcer: in brief comments by kelly ward, the republican challenger. one of four candidates on the ballot in arizona where john mccain one another republican primary. facing in current patrick and the general election. general john mccain who -- senator john mccain who won for phoneesidency twice, our lines are open. we expect to hear from senator mccain momentarily. itsill be showing you in inirety what kelly ward said a few minutes. in scottsdale, arizona, john mccain is in phoenix arizona. here the results. republicans and democrats on screen. also a line for those of you who live in arizona. to those calls in a
11:58 pm
moment. senator john mccain easily surviving a challenge in arizona. let us go to where senator mccain is expected to speak momentarily. applause] senator mccain: well, thank you. thank you. i hope everybody can hear me. can you? let me try this. all right. thank you. thank you, thank you, thank you all for being here. i am humbled and grateful for our success tonight to and for the honor to be the arizona republican party nominee for election to the united states senate. thank you to the interns who
11:59 pm
their evenings and weekends. [cheers and applause] i just askain: could our interns to raise their hands? thank you and god bless you. thank you. they sacrificed their evenings and weekends to make our campaign stronger and they cap cindy and me very young. thank you to the many coalitions who are here. iranian friends, asian americans. ournow so much to coalitions and it is hard for me to sing aloud to anyone but obviously we have kind of a special relationship with our vietnamese-american community. as you guys raise your hand to her here tonight from our vietnamese community? thank you.
12:00 am
thank you. and our iranian friends. ] heers , we willsomeday celebrate next to the statue in the square in tehran. that was where she was murdered by iranian thugs. i thank you all. i thank my wife and my children. campaigns are hard on the families and the candidates. we have been through a few. this one has a ways to go and it will not get any easier. i could not have done