information may have been at risk while the system was in use infrequently, the exposure and exploitatioexploitation isn't ny based on the strength of the algorithms themselves but on how they are implemented in all the systems are interconnected. i might not have the key to get information off a particular device but because i can break into the system because i have access and i can read the chips and do all sorts of things i can still get information or it's just a very complex system that all has to work perfectly for the information to be protected. >> the next question is for the entire panel. we've known the past few years any significant threats to the homeland would likely include a cyber attack. would you agree? can you elaborate on the role that it plays in the process of continuing national security at the military has used forms of encryption for decades but can you give us a contemporary snapshot of how encryption used by government or nongovernment protects us against cyber attacks today? >> i will answer the question but i'm not the expert i think the others are more expert than i am