Today, in preparation for the subcommittee's upcoming work on the National Defense Authorization Act for Fiscal Year 201...
The fiscal year 2013 President's budget request includes a $3.4 billion investment in cyber activities.
Mr. Lemnios, what is DOD doing to exploit and further develop commercial tools that can automatically analyze both sourc...
I think it is an issue of national security that we do need to address.
I understand we spent about $140 million in preparing this range.
vulnerabilities for the United States by enabling sensors, computing, imaging, and communications capabilities that as r...
Mr. Lemnios and Dr. Gabriel, is DOD investing adequately in the test capabilities and range environments that will be ne...
today's weapons systems are more complex and more interdependent than any of their predecessors.
Mr. Lemnios and Dr. Gabriel, how are lessons learned from cyber events during major exercises and real-world operations ...
What is DOD doing to discipline and incentivize the defense industrial base to write secure software code in the first p...
What new test or experimentation methodologies or capabilities are needed to ensure that the cyber components of these s...
Thank you.
Those authorities served us well in providing the NCA these types of capabilities when they needed them.
90 plus percent of the world's heroin, the entire world's heroin, comes out of Afghanistan.
the longer ones are normally a political military dimension.
The amount of time it takes to train a member of the SOF I understand is a rate of 3 to 5 percent per year without sacri...
Okay. Secretary Wechsler, I know that we have spent time talking about the counter threat finance.
The political supremacy of counterinsurgency is always fundamental, that the military strategy follows behind that.