I think you can make a good case that we should not be exporting software that's then used for that sort of behavior.
Back to the APT1 unit. Who receives the stolen information that has been hacked?
I'm looking forward to working together with you, Senator Fischer.
I still consider the main threat from al Qaeda from its two traditional strongholds, in the mountainous area between Afg...
Admiral McRaven, how is SOCOM responding to the requirements of the Defense Appropriations Bill?
It remains very much to be seen.
I think is very helpful for educating the American people about this threat in cyber space.
Last 2 years we certainly had a great working relationship with Senator Portman and I know we will, too.
How much money did you put out?
I would like to bring this Emerging Threats and Capabilities Subcommittee to order.
I want to thank all three witnesses for your service to our country.
Thank you very much, Mr. Chairman, and thank the three witnesses for their testimony today.
Can you give us an update on that memorandum, the state of the interim regulations, when they are going to be finalized?
Thank you, Mr. Chairman. Greetings, Administrator, glad to have you here.
The intent of sequestration was to make deep and indiscriminate cuts and to be unacceptable and to force everybody to th...
The last thing we would want to happen is for States to be forced to reduce service come October 1 because the new cost ...
I wish you could elaborate. I would appreciate your elaborating what the mix of funding, the mix of efforts has been her...
Thank you, Mr. Chairman. I commend you for holding this hearing on this very important topic.