
Mr. Lemnios, are these efforts fully resourced so that most range customers will have ready access to standard environments without significant delays and costs to develop and accredit their own tailored environments?
On the public record
Every politician on the site, every statement on file. Search, filter, and read the public record.
17,200+·quotes on file

Mr. Lemnios, are these efforts fully resourced so that most range customers will have ready access to standard environments without significant delays and costs to develop and accredit their own tailored environments?

the JIOR will be a critical capability for the increasing demand of research, development, test and evaluation, and training events.

Today, in preparation for the subcommittee's upcoming work on the National Defense Authorization Act for Fiscal Year 2013, we will hear testimony from our witnesses on the Department of Defense's (DOD) role in the implementation of the…

The fiscal year 2013 President's budget request includes a $3.4 billion investment in cyber activities.

Mr. Lemnios, what is DOD doing to exploit and further develop commercial tools that can automatically analyze both source code and so-called machine code to detect vulnerabilities and weaknesses?

I think it is an issue of national security that we do need to address.

I understand we spent about $140 million in preparing this range.

vulnerabilities for the United States by enabling sensors, computing, imaging, and communications capabilities that as recently as 15 years ago, were the exclusive domain of military systems.

Mr. Lemnios and Dr. Gabriel, is DOD investing adequately in the test capabilities and range environments that will be needed to remain current with these advancing technologies?

today's weapons systems are more complex and more interdependent than any of their predecessors.

Mr. Lemnios and Dr. Gabriel, how are lessons learned from cyber events during major exercises and real-world operations being addressed by DOD?

What is DOD doing to discipline and incentivize the defense industrial base to write secure software code in the first place?

What new test or experimentation methodologies or capabilities are needed to ensure that the cyber components of these systems meet warfighters' needs in the evolving operational and threat environments?

Those authorities served us well in providing the NCA these types of capabilities when they needed them.

90 plus percent of the world's heroin, the entire world's heroin, comes out of Afghanistan.

the longer ones are normally a political military dimension.

The amount of time it takes to train a member of the SOF I understand is a rate of 3 to 5 percent per year without sacrificing quality.