Thank you, Chairman Smith, for holding today's hearing on a topic that deserves this committee and Congress' full attent...
The return of these children is incredibly important to us, and we pledge to work to do the best we can to get these chi...
I have spoken to both of them about this problem and about the concern that I have that you guys are good scouts.
Now, if I heard you correctly in your testimony, you said that two-thirds of the time when you respond to a company that...
I think we can make some progress on your capabilities and authorities and safeguards in taking out these botnets.
I look forward to working with you on your legislation. I think it is a very valuable thought.
There are really two problems. One is that even the high performers remain vulnerable to breach by very highly qualified...
China is using its computer network exploitation capability to support intelligence collection against the U.S. diplomat...
If you detect a note of impatience from myself and from Senator Graham, it comes with the recognition that you are parts...
we need to have our Eliot Ness moment on this and get ready to put the resources into this problem set.
These innovations have been accompanied by new threats to our prosperity, to our privacy, to our intellectual property, ...
How does the FY14 budget request preserve the investments made in the directed energy programs, and what role does MDA s...
I would ask you for your commitment to work with us in drafting appropriate legislation that will allow you to have more...
I will accept Senator Graham's invitation or suggestion that we try to come up with something on visas, perhaps in the f...
Senator Graham and I came very close to having a bipartisan agreement on a cyber bill.
if you are looking at a company, it is in one of two categories: It either has been hacked and knows it, or it has been ...
Thank you, Senator Blumenthal.
This has been a very thoughtful and constructive hearing.