Skip to main content

tv   Key Capitol Hill Hearings  CSPAN  August 28, 2015 3:00pm-5:01pm EDT

3:00 pm
exactly as katrina happen whatted following exactly the track, many of the areas will be flooded again. it is that katrina wasn't e enormous and that would happen again. protected against those now, so the extended flooding won't be
3:01 pm
as a significant as it was during katrina? holy cross, it came and went. here it stayed and stayed for weeks and weeks. >> was this middle-class? >> high net worth. you can see there's a little mentioning even in a house leak that, actually a house like that was 250,000 which is a lot, and you know, considering. >> these nights maybe these newer ones and closer to the lake, the more expensive. but yeah, these are 350, 400,000 houses. and some of you know, the two
3:02 pm
story ones, the pool. >> not like a neighborhood -- >> no this neighborhood is very challenged because again, severely, severely damaged, however, they have a very strong neighborhood association, and they have done a lot. we've been working with them. we've been working with them quite a bit. and south lake view, in fact, is a historic district that is coming back. lakeview will be back. it is going to take a while because of the amount of damage. but most of the people over here, they had insurance, they have more means. and this land always going to be valuable because of where it is. again, that's, you know, when people say just give us category
3:03 pm
5 levees, we'll do the rest. >> it is, and had is where the wealthiest people lived. i haven't gone anywhere, and a almost afraid to go and visit other family members and other cities or go out of town. because i don't to know, feel normal again. until we're normal here. because i don't to ga to normal life and, you know, everything to be perfect. because i guess i don't to be influence that i might not want to come back. but i'm staying, and if i was to car -- compare this time six months ago, nine, leive months go we have come a long way. i couldn't believe what i was
3:04 pm
seeing even when i came back a month after. look at it, we got cars on the road. this was a road where people were sleeping and dying. we got rush hour. never thought i would be happy to say it. but we've got traffic. we've got stuff open. >> so when you're happy when you think about the future of the city? >> i'm very optimistic. i wouldn't live here if i wasn't. i do have family in other cities i could live in and perfectly good cities. like atlanta. but very optimistic that the city will come back and be strong and attract business. and prosper economically, the
3:05 pm
thing that i personally worry about is will we preserve that culture and, you know, our architecture, our culture, our food. can we preserve that? because the city is not insular little city anymore. we've got people coming in from everywhere. and this city will change. i just, you know, we just want it to change in the right direction. we want to preserve all of the great things about this city an fix things that should be picked and i think we can be a best practice for urban planning. this has never been attempted before. no one has ever had this, you know -- tragedy of opportunity like we have in new orleans. which is you never really haven't since the civil war in modern times wiped the slate clean and start off with how should the city be planned and
3:06 pm
how should the city function? so this is an opportunity very unique in the united states. i don't to see -- in which you wouldn't recognize ever was a historic city. or frankfurt i think that we can see -- you know, that that looks like new york, and in a small way. so i don't the fabric and character of the city to change. that's what i loved about it, why i came here. >> sue thank you very much. >> well coming up in about 15 minutes or so love coverage on the homeland security hosted by the american bar association it is about 25 minutes. that discussion will focus on national security and antiterrorism. >> more hurricane katrina anniversary coverage live tomorrow as former president bill clinton, new orleans mayor
3:07 pm
lisp landrieu members of congress and residents will all take part in a commemorative event. live coverage is on c-span starting at 6 p.m. eastern. >> and now until 3:30 or so a force of the today's washington journal of the 10th anniversary of hurricane katrina. >> nowl joining us is former mayor of new orleans, and national urban league president mark moriel good morning you're quoted this morning in "the washington post" as saying with regard to new orleans of the rebuilding we're at halftime. what do you mean by that? >> what i mean by that is thatt: the city hasn't been fully populated all neighborhoods have fully come back. pendinghb reimbursement claims that the city had with fema, rebuilding the renaissance, resurgence of the city has still quite a distance to go, and we
3:08 pm
at the urban league applaud progress that has been made. but we've also pointed out bye. way of report release by the urban league of greater new a orleans this week about the continuinggr challenging of poverty, jobs, income and education that still plague this city and confront this region. so in understanding where we are, ten years later, it isre important that people not spike the ball, not pop the cork on the champagne bottle but really applaud the work that's been done but commit to this continuation. it took san francisco 25 years to come back after a the devastating earthquake in the early a part of the 1900s in this rebuilding of new orleans i still believe is going to another 10 to 15 years to be full and to be complete. >> where is some of the
3:09 pm
successes in your view and where is some of the not so successful areas in >> so i think that successes have been that lots of public interest has been rebuilt. there's a new levee system. that levee system is considerably better than the levee system of ten years ago n with new engineering floodgate and storm gates. secondly there are 38 brand new public schools that have been built. because the old schools were destroyed. thirdly, many people through a combination of government conformro says, private insuranu their own savings, their own sweat equity, have built their home. they've rebuilt their businesses. and it's visible in many parts of the city. so i really think the real underscore should be that the perseverance, the commitment of
3:10 pm
people because of the culture an history of new orleans has been theec driver of all that we'veor seen up until this point. >> 22 is area code 8,000 if you livear in new orleans you want o talk to former mayor mark morial about the current condition of the city.en mr. mayor, did you face any large hurricanes when you were mayor and what was your reaction? >> i faced several hurricanes perhaps most serious of them was hurricane georgia's in 1998 which required us to call for a voluntary evacuation of the city, and required us to use the dome in the convention center as shelter of last resort. hurricane georgias which was bearing down on the city and could have been katrina diverted as many hurricane its do at thed
3:11 pm
an hit the gulf coast of mississippi. that hurricane i think was the most serious threat on the city in quite a bitur of time. and new orleans is also had flooding incidents, occasioned by heavy rainfall. and we had one or two memorable flooding incidents as a result of rainfall. nothing of the scale of katrina. because it is important to emphasize and reemple that the fail ad flood wall, the drainage canal, and the failed flood wall along the industrial canal were large contributes factors to flooding that really took place after hurricane katrina had passed by the city. so we face that. it was indeed a challenge. i made it my business during the years that i was mayor from '94 to 2002 to be briefed
3:12 pm
extensionively on hurricane preparedness each and every mayi because i wanted to make sure that the city was indeed fully prepared. there waspa nothing of the scale of katrina an i would emphasize that in a major disaster, federal state and local cooperation is essential, and it isn't that, quote, one branch of government or the other branch of government is fully responsible because the assets you need. the response required, with requires a tremendous evacuation if there's the response needed to people who may be stuck, i thine now the lesson learned there's got to be a transportation plan to help those who may not have automobiles, those who may not have private transportation to evacuate when there's a threat of a big hurricane.
3:13 pm
>> the black population in new orleans decreased 118,000 sense katrina. what's the significance of that? >> this significance is that it is important to recognize that the city still remains this cultural gumbo, this mix of people, and that still approximately 60% of the population remains african-american with remainedder being white, asian american, vietnamese and latino. i think what it reflects is for those that were renters those that did not own their own homes coming back was very difficult because many rental units were not quickly or even to this date not fully restored. secondly, many of the black middle-class was displaced. there was a layoff of some 7,500 teachers. and areas of the city like park --
3:14 pm
and new orleans east has been to some extent they got a very slow start primarily because there was i think, an effort by some a suggestion by some and a plan be some that those neighborhoods should tin deed not be rebuilt. so they are playing if you will, catchup in the rebuilding process. so it's been difficult now you have a large if you will new orleans in place like baton rouge. houston, atlanta. some of the river plants, many people who evacuated, remained if youn will in the region to such an extent that butten rouge is largest city in the state of louisiana. >> let's take some calls for you. i want to show you facts from "the new york times" before we do that. property taxes have doubled in new orleans since katrina. flood insurance rates have tripled.tr watersu bills will more than 2020. by
3:15 pm
and home prices in some historically black neighborhoods have doubled as well. marc morial is our guest. larry is with boeing green, kentucky. good morning. >>ky challenge the chief and ths is what i have to say. why is that accomplish arrogant donald trump take you bars to his -- wallet and do good down in new orleans. thank you c-span. >> mr. mayor do you have any comments of that? >> all i'll say it is interesting donald trump actually proposed a high-rise apartment building if i recall in new orleans right after the hurricane. but it didn't get built. he has a hotel down there, though, doesn't he? >> i think he's got one down in the cbd -- >> okay. i'm not sure of that. >> but interesting, but i'm going to stay away since he's the presidential candidate and stay away from commenting on
3:16 pm
presidential politics this morning. >> if you're in new orleans yowpghts to talk to former mayor, for you to call steven in st. louis, steven you're on with marc morial. >> good morning, gentlemen, federal employee up in st. louis here, i have watched all of the town hall meetings all through the week. 2 in the morning, 11:00 wherever they've been on, and i remember very vividly. i tried to actually go down there and do volunteer work, and i didn't get selected but i have two very quick comments. i've been seeing and i remember this back in 2005, there was a lot of comments about people,ab poor people couldn't get trade, fema was slow there were bodies all overrule the place that we lost all of these people.
3:17 pm
i needed some understanding this was a catastrophic just looking at some of the pictures this morning, i can't even imagine what those poor people went through. i don't to use the blame game thing. but what was some of the problems back then. i know that people were utterly frustrated and heart goeser outo them. that's the first o thing. second thing is the job issue. we need to get these young peopled to work, i mean, i'll e quite honest with you. i didn't have a job, no way to get i a job, i might be selling drugs myself or doing something illegal. i'm going to be quite honest about that. theseal young people, this is or livelihood. this is our future.th and i put down the politicianings. you get elected it to office, oe of your main goalses is to be a salesman. to get companies, to come into your area. that's a difficult thing i've
3:18 pm
never been in sales so maybe i'm dish shouldn't be saying that. but i look at our politicians, they've got to hit that road get therecompanies in somehow. so that we can get these young kids to give them some hope. that's my comment. >> steven in st. louis. >> i'll take his question. i agree fully with steven, with the idea that there is no more important issue in america today than trying to provide employment opportunities which lead to positive quality of life for young people. and what the country has to do is step away from the traditional, political conversation which says, well, is it a government responsibility? is it a private sector responsibility?va is it all about education? it's about all of the above. it is a private sector responsibility, and in my work at the urban league, we
3:19 pm
encourage the private sector to invest in understand the greatou hope and possibilities of america's urban communities which is seen tremendous disinvestment over the years but i think it is also a government responsibility. if we can spend a trillion -- in iraq and if in afghanistan, if welcome spend significantsp front money to public dollar and foreign aid to assist othero countries, if we can provide tax incentives, some of which encouragenc investment abroad, then we can, if you will spend and invest in providing job opportunities for the young people of america. you've got to do better with schools yeah weer have to do th. but some of them is also a by young adults. and young adults who do want to work, do have the capability of working. and there isn't enough opportunity for them.
3:20 pm
i give everyone a number. between 16 and 24. one out of >> every 5 young peoe is neither working nor in school. one of 5. that's approximately 7 million- pipe. so we at the urban league have an initiative, jobs rebuild america where we've increased the work we do to help provide job training for young people. we've got programs in new orleans, and in several communities, many, many communities around the nation. and we do this work, however, we have long lines of people whoon want to be part of our programs, and so we're fighting every day. for more if you will, investment to fund more job training slots in community across the country. >> next call from marc morial comes from stephany in wiltonn pa. >> me -- oh, my. >> stephanie we're listening to
3:21 pm
you turn down the volume on your tv.ph go ahead and start talking, okay? >> i'm just -- i'm just -- >> you know what stephanie i'm go ahead and move on tog all of the callers once you get on, turn down the volume on your tv you can hear everything through your trch and if you leave your tv up then we get the feedback, and it slows the g program down a little bit. jeanie is in new orleans, jeanie you're on the air. >> hit, my husband and i returnedch to new orleans in 206 i wrote a neighborhood column which i was asked to do because i started kind of a blog after the aftermath. but one was things that reallyof bothers me here is that the insurance that people are paying for their properties is justpr horrendous, and nothig has been done to help get that under control. this is caused so many people to
3:22 pm
lose their homes, and yes there are new people who have come in here and are building and we're grateful to have them. but a lot of the people who were here before katrina and came back and tried to rebuild, havee been not only unsuccessful. but have lost their homes. people who were in their 60s and were tired and, you know, their house was almost paid for and suddenly they have an enormous mortgage because of the failure of both the governmentrt and the banks. for not helping people to be able lnk to get back on their ft without causing them suchbo distress we're talking abouts middle-class people. >> can you give us an idea of what the insurance cost changes have been, and what neighborhood do you live in, in new orleans?
3:23 pm
>> i lived in lake view, and i can tell you our insurance just for basic and i mean basic and not great insurance but basic insurance cost over $6,000 a year now. and with property taxes, the way they have gone up, it's about $10,000 a year just on those two items. which are ridiculous. i mean, it's just -- has really hurt the people who came back early on in this. and we saw many of our friends who have lost their homes because of this. they couldn't afford to live here anymore. >> thank you ma'am let's hear from former mayor -- >> i'm glad jeanie raised this issue i think all of the numbers show that the cost of living whether you're paying a mortgage, or rent, plus insurance, housing costs have dramatically increased in thisdr community. but what i would say to jeanie
3:24 pm
is that insurance companies in the state of louisiana are regulated by the state'sat commissioner of insurance. and i would encourage him to ben invited to come on this show and talk specifically about increases in homeowners insurance that really is making it difficult for people who have returned to stay in the city and for many, many other it is to come back. this is why i have called this a continuation. because the city, the region, neighborhoods continue, continue to face challenges. lakeview is one of those great communities of homeowners, tightly nit, many of whom camef back, some who tore down old homes and rebuilt new homes, and these issues of the increase in cost of insurance certainly need
3:25 pm
indeed to be addressed and i've said to people look, southeastern louisiana is always going to be at risk of a severer weather event.er but so is coastal mississippi. coastal alabama, coastal florida, all of the way around south carolina, north carolina. over to texas -- the beauty of the coast is that it gives us beauty, it gives us abundance, fisheries, it gives us offshore oil and gas, but also the gulf of mexico in the summer time because of the warmth of the waters is really, really a feeder that strengthens hurricanes, it is a community that is going to be just this insurance issue needs to be idressed. certainly by those first line whoos are responsible and i thik that's the state, the commission of insurance, and i think members of the legislature have to raise this as a higher priority issue.gh >> clifton is calling in from
3:26 pm
rochelle, georgia, hi clifton. >> c good morning. >> the best i remember there was some $2 billion and credit card fraud that went on during the hurricane.it like to know how much money of that money have been rocovered and how many people have been prosecuted for that fraud and til take that there,ff and you have a good day. >> mr. mayor i don't know what the number is, and i'm not thew best person to answer that question. that should probably be directed to the law enforcement authorities and districtte attorney perhaps the united states attorney here. to determine what, in fact, may have occurred with that. but i couldn't address that. >> i want to read two tweets to you mr. mayor and get your view on this. this is the first one 52% of black males in new orleans aremp unemployed yet obama fights to give 5 million illegal aliens work permits followed by this one, what impact has the new
3:27 pm
influx of illegal aliens had one the availability of low cost housing for those who would like to return? >> well i think it's important the tweets sort of suggest obama is fighting to give, quote, undocumented immigrants work permit, undocumented immigrants receive work permits is something that has been happening for decades, and the people who request work permits for undocumented workers are businesses. restaurants, sometimes hotels, meat processing plants. if you will, large farming concerns. and the law gives these businesses under the current law the right to ask for work permits.
3:28 pm
secondarily many of the immigration reform bill would involve a tightening of the eligibility for work permits, and i know at the national urban league, we fought for a systemte where less work permits are available for businesses when unemployment is high in the united states.ta and i think it's important if you will to recognize that the main proponents of work permitsi are many business concerns in the p country. not president obama. >> virginia you're on withew former new orleans mayor marc morial. >> yes, sir. i understand as a marine that new orleans is a major port city for a lot of imports through the gulf. however, i grew up just northwest in state of oklahoma
3:29 pm
and moore, oklahoma, since 19 99 has hit -- has had three f5, f4 hurricanes and they've had very, very little federal support. but they have rebuilt on their own. so what is the issue with new orleans besides at the major port city, and one of their major sources of income, of course, is not only the port but tourism? so you want to see how a city rebuilds, they have rebuilt three times since 1999 up there in oklahoma. andey that's my comment except that you know, i understand new orleans has had this issue, and also i can go on about this for ten years. but also the crime rate in new orleans dropped almost 75% after
3:30 pm
a katrina, and in houston it went up over 50%.ve so i would like for you to address those issues. thank you. >> let me say this, you know, many american communities have faced natural disasters. new orleans faced a natural disaster and a manmade disaster, the flooding, the devastation that took place in new orleans took place because with of failed levees. levees which were improperly engineered. constructed and maintained. a but for the levee breaks, we would not be having this conversation about new orleans. now, we would about southern mississippi because southernbo mississippi also received a brunt and much of alabama received a brunt and coastal alabama, the brunt of hurricane
3:31 pm
katrina also so it is important to recognize that fact. and it is also important that under normal circumstances, when you have such a manmade, manmade or man caused negligence people would have gone to federal court and saw compensation through the civil justice system. in this instance army corps of engineers is immune from most lawsuits involving how they design, how they engineer, how they construct and how they maintain the levee systems in the flood control systems arouni the united states. that's a fact that's got to be clear. i think secondly, if i said ten years ago, i say now, i think that if people are suffering i would suggest that most people who suffer from natural disasters don't realize that the federal government has probably played a role if they've -- been victimized by flooding that
3:32 pm
they may not realize the flood -- the flood insurance system is a federal system. there's an automatic right under the stafford act in a natural disaster for public infrastructure, to receive compensation for people to be rebright light. i think a lot of times there maybe federal support that people may not if you will, realize. people in the gulf region, new orleans, mississippi, i think have rolled up their sleeves and really worked hard to rebuild, an mayor landrieu here in new orleans has also been very upfront about thanking the philanthropist, the volunteers, the faith based organizations, the community-based organizations, the foundations from all over the world that have helped the gulf coast in a time eve great need, in a time of an extraordinary. katrina was an extraordinary
3:33 pm
catastrophe for this nation, and for this region and for this city. >> according to fema 738,000 households in louisiana -- were approved for assistance after katrina. 274,000 in mississippi. 55, 56,000 in alabama. this is on the fema website if you want to see these facts and figures for yourself, here is a map of the city of new orleans. red dots is where bodies were found 1073 is death toll from katrina. this down here is the garden district over here is the french quarter. this is the central business district in this area here. and over here is the lower 9th ward, and lakeview is up here. in the -- new orleans. christopher is in palm bay florida hi christopher you're on
3:34 pm
with marc morial i wanted to thank you for your words. you know, i'm african-american male -- [inaudible] >> through the rest of this washington journal segment on our website go to c-span.org, and now to the american bar association's home lapd security conference, and a panel on cybercrime. just getting underway. [inaudible] >> c c-span so ask that those of you in the audience that have novel phone rings please suppress those rings for the benefit of everybody else, and also as you go in and out of the room keep the noise down but we know you have to exit for food and other things. so i want to thank the -- presenters on the last panel and i'm sure the other panel was
3:35 pm
great in the room was great sorry i couldn't be in the same place. but it was a continuation of this program. we end with a panel today that we put this imagine purposely at the end. because we felt like it was so critically important that we wanted to keep you rivetted in your seat and skdzed in keeping many of you with us. thank you for staying with us you get full cle credit for being here the entirety of the program so thanks for making it possible to have you with us. next panel is on cybersecurity, and you've seen your program welcome another person is listed that's with a conflict and luckily we have an all star thompson who is moderating this panel, and when i -- when lucy is in a room and i back into that room i believe lucy is the brightest person in
3:36 pm
that room because she's so capable and knowledgeable about cybersecurity people in the aba american bar association looked to lucy to generate wonderful product and so much of it lucy gets credit for, but other people also take credit for lucy's work so i want to take credit in advance for lucy's work today. and i know she's going to do a wonderful job as moderator. lucy is founder and principal of washington, d.c. law firm with legal issues at the intersection of law and technology. particularly those related to cybersecurity global data privacy and compliance and risk management. she's the science and a technology law technology section. she's a member of the aba house of delegates, an she's part of the cybersecurity legal task force she's currently co-chair of the security privacy and
3:37 pm
information law division, and is a founder again and past co-chair of the homeland security committee. it's a great pleasure lucy to introduce you so you can introduce our next panel. thanks. >> well, thanks joe, and congratulations on the final portion of the really oustanding two-day program, and thanks to all of the audience for staying with us to the last bell. i think you're going to find this program packed full of information. it's hard to capsulize cybersecurity into one hour. so we're going to try to give you some insights that you might not have thought of, and help you understand the questions that you need to ask so that when you go back to your offices you'll be the most knowledgeable person in the room when dealing with the i.t. people. so the focus of this program is on the u.s. intelligence
3:38 pm
committees community of 2015 worldwide assessment that contains sobering of global and regional threat. notably, cyber is first topic on list of eight threats. take a look at that strategic summary of the global threats this report provide an analysis of risk to companyings and government agency as cost to our economy, and describes the threat actors who are responsible for massive data breaches that have been in the headlines this year and in past years. today, our panel will delve into the details of the report and provide insight on three main topics. one is the current threat matrix. second one is readiness and risk mitigation. what do we do about the cyberprogram, problem, and the third one about is about insurance. what's the scope of available
3:39 pm
cyberinsurance, and what's the role of insurance in risk mitigation? so i'm very pleased to introduce you to my colleagues who will be on this program today. frank to my left, your right is an associate vice president as the george washington university where he directs the center for cyber and homeland security he's codirector of gw cybercenter for national and economic security. and along with the school of business, he launched the university's world executive nba and cybersecurity program, prior to joining gw frank served as a special assistant to the president for home homeland security and was strurmtal is developing administrations priority and initiatives. to his left is matt, who joined
3:40 pm
8th in 2014 as national product line manager for ace's network security privacy, and technology product. in this role he's responsible for the cybermanagement in the united states and he plays significant role in ace's global cyberpractice, and at the end of the table is tom mcdermott who was the dhs assistant general counsel for infrastructure programs. he oversees the provision of legal advice in connection with the department of protect u.s. critical infrastructure. in the areas of cybersecurity and voluntary efforts, to ten chance the security and resilience of critical infrastructure from terrorism and all hazards. you've heard a little bit it be what his team does within and he's going to delve into the details of what the national
3:41 pm
cybersecurity and communications integration center does as well as that national infrastructure coordinating center, and some more about dhs programs including einstein and enhanced cybersecurity services and continuous mitigation and diagnostics. so we'll begin by asking frank to please -- give us some information about the cyberthreat environment. and we'll refer to these -- strategic assessment and ask prank to tell us who are primary actors in this cyberwar, what are their intentions and capabilities? how would you prioritize adversaries and what are primary targets? if we go through this program we'll invite your questions as we go. so frank we'll turn it over to you. >> thank you lucy, and thanks to all of you who are real
3:42 pm
troopers, 78 degrees, no humidity. friday afternoon in the middle of august in washington -- washington washington, d.c. so that's impressive that you're all here. and congress congrats to aba for a two days. very is briefly i think it is important to recognize that not all hacks are the same nor are all hackers the same. you read the headlines daily and sometimes it is difficult to discern what really matters. and -- the one consistent take away i think, is that the initiative continues to remain with the attacker. and -- there's a lot more that needs to be done to shore up our cybersecurity with large, and in terms of the threat actors specifically, they come in various shapes, sizes, and forms. at ranging from nation states at the high end of the spectrum all the way down to activists and
3:43 pm
everything in between foreign terrorist organizations, criminal enterprises, and the like. but when we talk about nations, about there too just like the threat actors are diverse so to are tpp's the actual capabilities and intentions of the various earkts. so when you talk nation state a lot of intentions differ between country to country. for example, if you were to look at those that are at the very highest level of our threats spectrum you're talking about countries that are integrates computer network attack and exploiting into their war fighting strait ji and doctrine. think russia, think china. they're building out very sophisticated computer network attack capabilities but deeply involved in computer network exploit in the difference between attack and exploit think of it as a war fighting weapon and exploit is more espionage.
3:44 pm
clearly if you can exploit if the intent is there, you can also attack. because there's been a lot of exploitations that haven't led to attacks shouldn't mac you sleep a whole lot better. but when you've got russia and china perhaps on the very high end of the threat spectrum you have other countries that are investing significant resources into building out their cyberwar capabilities and i'm not crazy about the term because it means different things to different people but at the end of the day building out offensive capabilities, in this case think primary north korea. think iran, whriel they may not be at the level of capability as russia, china, or the united states, they more than make up for that capability in intent. and they are increasingly turning to cyber as a means to -- as a means and a weapon to try to level some of the playing fields.
3:45 pm
but when you look at the percentage of gdp and of this country they're investing heavily there. why? i think they've recognized they're not going to be able to defeat the united states an allies in a traditional warrant and congressional battle field tank for tank, plane for plane and cyber provides that equalizer in some ways, and unfortunately it is not costly to build out a cyberdrive by shooting case ability to have a disruptive effect. underneath nation state you have foreign terrorist organizations, clearly we know what their intentions are. fortunately their capabilities don't meet necessarily their intentions. but unfortunately we're starting to see a number of troubling and discerning and disconcerting trends, for example, if we just note how successful isis has been in their social media efforts and their social media campaign, we shouldn't think that they're not going to look forward toward building out
3:46 pm
their computer network attack capabilities. one trend we're seeing right now that they're very active in that i think is troubling is their backing military officer and law enforcement officers using social media to identify individuals and threatening their family members. this is -- this is making conflict personal, and whereas technology will change, unfortunately human nature remains consistent so anything that happens in the real world is a cyberanalogy in one way or another both for god and for bad. underneath foreign -- and, obviously, when you're looking at foreign terrorist organizations, about they're he havely dependent upon sign beer a mean to facility their craft, to recruit, to fund raise, to radicalize, et cetera, et cetera,est underneath fto's you would put criminal enterprises again, there's many capabilities as there are criminal enterprises.
3:47 pm
but at the end of the day, you're starting to see capabilities in the criminal underground that used to be in the hands of only country and governments. and many governments are turning to criminal enterprises as they don't want to bring it back to you name it. so at the a end of the day here you're starting to see some really sophisticated activity especially out of russia, and that out of the former soviet individuals and they've hired guns, in other words they can rent their services, you can buy their tools, and it is getting chopper and it is becoming more and more user friendly point and quick. activists i don't think that you can generallyize there. anyone with a special interest. good, bad, across the spectrum that they too are investing to
3:48 pm
their target companies and the like soy probably went on too long since i've never had an unspoken thought and it is a friday but i thought i would leave it at that point now and turn it over to my colleague. >> that is just great. w*e79ed to show you some resources that you might want to refer to later and bring to life some of the things that frank was saying. this -- graphic comes from a website called information is beautiful.net and this is an awesome website, this shows data breaches in 2015, 2014 range and if you go to this website you can sort by data breaches, by year, or by type of attack, or by sensitivity of data, or o by those they call have interesting stories, and when you click on each one eve these circles you'll see the details of these
3:49 pm
breaches that we've read about in the paper. so this is a phenomenon that was highlighted in the threat report which is that dni expects series of low variety sources over time of cyberattacks so have some fun with this when you go back to your office. and then the next one is one of dhs's best products they have an organization calmed the dhsics search, and they collect incident information. about industrial control systems, and this graphic shows for 2014 the 244 incident report that dhs received, and you can see that the critical manufacturing sector in the energy sector are potentially greatest risk of incidents.
3:50 pm
so there's an icf monitor on the dhs website that is published quite frequently and has really great information about icf breaches. so that brings us to dhs, and you've heard a a lot about the good work that the general counsel's office is doing and the client agency is and dhs comments will tell us is the more depth the kinds of work that his group is doing to help prevent data breaches, and coordinate among the federal state, local, private sector organizations. >> thank you. and thanks to joe in the aba for hosting this event again this year. so if you have anything in the last panel on a friday afternoon is being on the last talking about what we're doing in response to the cyberthreat after you've heard the sort of tremendous description of the scope and breath of the cyberthreat. and mentioned the cyberthreat is
3:51 pm
sort of everywhere and it means different things in different places. dhs or at least my client the national cybersecurity -- national cybersecurity integration center focuses on two specific areas that is the protection of the.gov so federal civilian networks also security of critical infrastructure. i understand that other people earlier today and yesterday sort of talked about some of the developments over the last year for dhs cyber but i want to hit things briefly before i talk about things that my client does to help entities secure themselves against the cyberthreat. 2015, or at least fiscal year 2015 has been a big year for dhs cyber. congress passed three pieces of legislation that are extraordinarily helpful to dhs and really cementing the role of dhs in the federal government's approach to cyberand cybersecurity. i think you guys heard if the
3:52 pm
national security thane was a hub of sharing of information and providing technical assistance and infinite response to federal and nonfederal entities. second, the federal information security modernization act of 2014 or fisma revamp the way that government is approaching security for federal agencies and a gave dhs a much more active and operational role in helping agency it is to secure is themselves. and lastly, the border patrol agent pay reform act. also gave dhs additional cyberhiring flexibilities so allowed to talk stopes kind of match some of the authorities that dod has to cyberprofessionals. addition, the president visited to announce administrations information sharing proposal, and really pointed to the example of what happens when you bring -- what can happen when you bring
3:53 pm
the government in a private sector together in a shared space to approach a problem that is really a shared responsibility across the civilian and government sectors. and finally, in february the president issued executive order 13691 signed at the summit in stanford, university and goal of that is to increase sharing of information within the private sector but between a private sector and the government. that executive order encourages private entities to ban together with orr like minded entities to share information about the shared risk and again one of the things that i think frank really hit is the risk is not the same for everyone. depending on sort of where with you sit, the risk looks very different if you're a control system. if you're, you know, a chemical facility. the risk that you worry about is not the same risk that a bank worries about, or that -- entity that has a large amount
3:54 pm
of personal information. so these information sharing announcement organizations or i apologize for the acronyms i try to avoid them but impossible for a government lawyer. these are intended to allow like minded entities with similar problems and similar risks to share informs that is of most interest to them. amongst them, amongst themselves, and these can serve a valuable function both from the government perspective they can act as small suppliers so when government has information this they want to get outside broadly these help us reach out to entities who can then reach out to their members to get that information out gladly. and conversely they can act stymings as a filter between particular entities and the government or any of these who want to be able l to share information but don't necessarily want the fact that it came from them to be broadly known so they can about as sort of of a -- buffer between private entity and the government.
3:55 pm
that directs into a nongovernmental entity to accept, and that goal herm is really to help define what a mature information sharing organization looks like. focuses on capability technical and privacy protections and take other steps that the governmenting and more importantly that private sector members would sort of expect such an organization to be able to fulfill. >> lucy if you can go back to the bubble slide, the information is beautiful, slide. just to speak to what we're doing. we talk about information sharing. but what does that really mean? if you look at breaches i would say 90% of those are private companies. 95% maybe even more. couple are not. so really what have we learned and take this into account, and act on it? as part of the dhs effort, what i'll refer to as acronym only in
3:56 pm
washington that i know c dog which is cyber analysis and working group basically on a regular basis different insures who were involved with cyberrisk, i'll give a general summary of where we are with cyberrisk and cyberrisk insurance, the industry is growing for obvious reasons. it is almost 2.2 billion of premium on annual basis. and the biggest towers towers as in a risk specific entity buying insurance is over o 500 million. the demand is higher, so that need to get information and actually aggregatings in or make good decisions is there. we do it our os with our own data and incidents and ask questions of entity so i think a lot of what we talked about i sat only the private partner partnership cybersecurity session. some of the questions who has control? who assesses risk, what really
3:57 pm
matters? you know, risk looks different for everyone. we're starting to think and by any ways we're not -- we don't have all of the answers but we're starting to get some indicators of what really risk means on a risk specific basis. so from the public private partnership standpoint, what we've done with the c dog is a working group is really talked through making sure that we have common language so in the insurance world, we have our own odd language. in the government world, we have acronyms, we have our different language and then especially where this is relevant to cyber we have the technology community with their own vernacular that no one truly understands outside of the technology world unless you live it on a daily basis if you're in kind of financial services or as a cyberrisk underwriter. we're working together and defining what we mean by each distinct and why this is important is that you have small businesses, you know, main street america, who hears about
3:58 pm
the big breaches that you see here. but they really don't know what to do about it. the insurance industry is in kind of a -- transition pongt of realizing we have to share is our order in order for companies to understand that this is risk. and what we realize even with a lot of these incidents which on personally level it goes back to awareness level in the united states and elsewhere is not at leafl that it should be, and the more that we work together i would say from -- from sharing incident information that's when people realize i can twailg actually fix this or at least attempt to fix this. at the same time some insurance may cause a problem if you're not underwriting to a specific risk you may be almost encouraging the problem. i always use historical analogies i know it is friday but historic kalg understanding
3:59 pm
of insurance you go back to fire insurance in the 1800s and first question that they thought was an indicator of risk was -- how many trees do you have in your front yard? as a risk for a fire. clearly they were way off. what we're hoping to accomplish with the partnership is basically making sure that our own internal data is an indicator that is not accurate. so if we're asking the wrong questions in cyberrisk world, then we would quickly identify it with more had information that we gather. it is not the sound -- defeat, but when you look at the fire model prevention was at its very core. i'm not sure we're ever going to be in a place either technically policy, or work force level to present prevent everything. welcome minimize consequences. minimize the impact. segregate our systems. segregate our family jewel and
4:00 pm
most important information so that it serves as sort of a deterrent in and of itself. ...
4:01 pm
>> the approach is not, let's just write insurance and bear the brunt of the incident. we focused on litigating losses and i use the fire analogy on purpose. you have sprinklers but you have arsonist too. you cannot prepare for an arsonist to come into the building but you can enable your organization to make sure they cause the least amount of harm. >> frank and matt have done the perfect segue into the second topic of readiness and risk mitigation. can you introduce yourself and
4:02 pm
tell us who you work with? >> i am a researcher, analyst, and bloger. i do a lot of research and i was researching individuals and corporations. for me to be prosecuted with the club that is high up and i went back and said if they are doing this in ohio why can't you investigate it in america. i did have a valid point and they were trying to look at on that. when you know where the hack likely started but it is the cost and efficiency.
4:03 pm
so america has a long way to go but we are making progress. if you could answer that that would be great. >> i will start. i think a lot of the concern and bad actors from an insurers standpoint the attribution we realize a private company has to deal with then law enforcement and government decisions we can thought control. private companies are bearing the consequences from a liability perspective. i will refer to you as consumer in that contact. consumers bringing suits against companies that have been hacked.
4:04 pm
the challenge to find new solution to bring to bear. it is exploring what we can do on the criminal side. you present an interesting case where we have, you know, a foreign actor, but some u.s. server action taking place, and you see companies like microsoft which is extraordinary active and you see them going to court for use of its software and equipment for various accomplishs activity.
4:05 pm
>> this slide is one of the findings from the dni report and one of the things they say is the motivation to conduct cyber attacks will remain strong because the relative yeas of these operations and the games they bring to the perpetrators are great. there are several reasons why companies are having trouble. one is the technology and in industrial control systems there is a convergeance because the physical aspects of the system and the software. this is a complicated area. it is called publication 800-82
4:06 pm
and lifts all of the vulnerability in the industrial control system. but companies are continuing to implement these vulnerabilities. this is a distressing and disturbing aspect of the situation. and the other one is these data breaches, many of the massive data breaches, involve known vulnerabilities and violations of well-accepted security practices. lots of people say this is too complex to understand, the attack tactics the attackers are using are almost the same. they use a fishing attack and direct people to websites where malware is downloaded. so a lot can be done to shore up the security if a systematic approach is taken.
4:07 pm
i would argue there has been no penalty which invites the advisary to continue to come and come and come again. i want to pull on a point my colleague brought up earlier. i am a big proponent of the executive order to start looking at economic sanctions, but what good is having these executive authorities and powers if you don't follow through on them.
4:08 pm
to me, there have been a number of red lines that have been crossed in many different domains. opm being the latest one. if that doesn't demand a response i am not sure what does. there is nothing worse than putting markers in the sand and then having them cross, cross, crossed again. >> and they have their work cut out because we heard dhs has responsibility to oversee to a certain extent some of the agencies. and we know from opm testimony that the hacker in opm stole passwords from a contractor and then they were allowed to have brute access to the system meaning they immediately got in and took over the entire network. well that is an unacceptable
4:09 pm
security practice that should never have been alloweded to happen. >> i would say is they asked specific technology questions and that should be an answer on the spot you answer. but the reality is an individual at the company is not specific and not raising the awareness bar you have to look back and see this isn't a technology problem. with you talk about fishing, not
4:10 pm
complicat complicated. but company's approach to fishing training is click the box do you have fishing training, yes. or they say we have behavior changing training. did you go through an actual fishing exercise with all of the employees? did they click on the link? learn from it? that is important. this isn't just a straight away specific granular with the secret sauce. it is that risk management approach. i think what is important is when based with questions like what would have prevented this. if you look at the bubble chart, we have answers on what happened prevent that and that is what we need do get out into the open to change the mindset of the general public. we have answers. we don't necessarily have the best way to provide them for them to make the best decision.
4:11 pm
[inaudible question] >> that is a good question and i think frank wants to say something. i want to note the energy sector that dhs works with has come up with an innovative approach which is a precurement model that is a series of requirements. it says if you are a company buying software or product from a vendor you should have these provisions in your contact. you may want to take a look at
4:12 pm
this. it is very new and very well done. it is basically almost a technology requirements document. that is one solution. it is called the cybersecurity procurement language. it is on the department's website. it is very new and a good approach. >> dod is always levied the department of defense a whole new set of requirements that elevate this. and i think our critical infrastructure might be used the same. we use the term lease. it is not all equal.
4:13 pm
chemical, finance, and banking are at the top and i think we ought to be doing more. matt hit it spot on and lucy mentioned this the vast majority of cases are identity management tlechlt >> there is no silver bullet to solve this problem. there is a lot of low hanging
4:14 pm
fruit and amenities in truly critical sectors with a lot of people. what is dhs' approach to manage the cyber risk? i would say one of the main prawns of that is helping entities to understand the scope of the myth is it has been a useful way and it talks about identity management and it is easy to walk through the missed framework. dhs has, on the website, you can
4:15 pm
find a number of tools available. many are available for download for entities to use as self assessments. you can arrange for dhs to do a facilitated assessment. a lot of schools walk through the framework to help entities think about where is the low hanging fruit and what is a prioritized risk base approach to what i should do. part of that is understanding my crown jewels. if you are a bang or website -- bank -- you need to focus on securing things different than the electric sector. you need to focus on the reliability of the grill. >> post incident when they
4:16 pm
happen typically with the regulatory enforcement is happening it simple. if you have a company for instance that hasn't had an incident and can't answer three simple questions that is the idea. it is thinking like a hacker and what data do they have. it is more advance than this. i am not trying to simplify what we do. what data, how is it protected, and what would you do if it is breached or discovered. we have a lot of companies talking about how important it is to enterprise risk management. if you have a company that truly understand the simplicity of it and can stat around the
4:17 pm
framework they will have something to work with. >> raise your hand if you wanted to be a computer scientist when you went to law school? a lot of us find ourselves in different places than where we started out. but the aba passed a resolution urging all private and public sector to implement and maintain a proper program that complies with ethical and legal obligations and it is tailored to the nature and scope of the data and systems to be protected. the various members of the panel talked about a security program, a risk assessment, these are very structured analyses that all companies need to do to get a handle on the risk. the risk assessment framework
4:18 pm
that nift did is excellent because it provides a common language for all companies to use. there are very important questions that everyone needs to answer. and lawyers can do risk assessment. this is an important area for you to get involved in helping your companies. and then in terms of low hanging fruit, there is an organization called stand and they published what they call 20 critical security controls. it is a priority list of things that companies need to do in terms of security solutions in order to lower the risk as low as possible. and these are very concrete steps that people can take to avoid a lot of these hacker attacks because hackers just troll the internet all of the time looking for places where they can break in. if companies have taken steps that are reasonable they are going to deter a lot of these
4:19 pm
bridges. we have a slide up here that is very interesting because it talks about, if i have the right one, this is about russia. and talking about low hanging fruit. this is about the other spectrum. this is about initiatives that russia is taking. and they talk about compromising the industrial control systems. it said these specified actors have successfully compromised the chains of three icf vendors so customers download exploitive malware from the vendor's website along with routine software updates according to
4:20 pm
private sector cybersecurity experts. in terms of changing technology this is frightening. there is a low hanging fruit and the zero day attacks and things these foreign actors are doing that companies need to ramp up the analysis in order to be able to detect and prevent against. maybe you might have insight into how to deal with these kind of very sophisticated attacks. >> thinking about it philosophically you would like to get to the point. we will never prevent everything. it is a risk based approach we need to look at nationally and then companies look at individually and sectors collectively. and it would be nice to get to the 80% solution where some of the very basic steps, if everyone did take, would then let the government focus its
4:21 pm
limit ed resourceed on the highest threat end actors. they cannot be in between the various actors because they are looking at it in different ways. but if we could get to the point to calibrate the government's collection in a smart way and share that without compromising others in a way with information sharing environments i think that will play a major role. one thing to think about, i am not sure if i brought it up. the difference between computer network attack and computer network exploit. according to the press, headlines in every newspaper, our electric grid has been penetrated from the battlefield. they identified the various data systems and mapped that. that has zero value from an
4:22 pm
economic espionange standpoint. it is only used from a war fighting perspective. why would would they be mapping some of these critical infrastructu infrastructures? it is a concern. it differs from what we are seeing in russia versus china. ris russia engaged in attacks in estonia, in georgia they blind and deafened the physical tanks before moving in and did it in the ukraine as well. what we are dealing with from the chinese is they are trying to make the moral equivalent argument of i am shocked gambling is going on casino. we are not sharing that information with companies they are saying which is what is playing out in china.
4:23 pm
i think there is a difference between what is being collected and how and for what purpose. >> one more example about what is going on and then we will turn it over to talking about the insurance. but this finding about the focus of the foreign espionage attacks. those incidents focused on stealing data of individuals and companies.
4:24 pm
decision making by senior government officials, corporate executives, investors and others will be impaired if they cannot trust the information they are receiving. so now we have people trying to destroy, degrade, compromise, and we can talk about what they can to to help us. >> the privacy of the information, the integrity, and
4:25 pm
where the insurance falls in is across that. c confiden confidentiality. one area where the insurance industry is not willing to play is the value of property. when you have nation states getting information, fairly high profile nation states, stole from a private entity. we struggle where we don't have the right amount of information. if we use from a private company
4:26 pm
perspective, there are reasons not to value that loss data in the context of a theft. you have assets on balance sheets and value. that is great. if it is stolen that value skyrockets. and that is where we struggle. business interruption. if you suffer an attack, and interruption results from that, we can address. outsource provider, business int int interruption. let's say the entire u.s. infrastructure is down for three days? that can be purchased and bought. it is a concern from an insurer standpoint also. and the integrity of information and the deletion of data is a significant problem for
4:27 pm
companies if that is what is happening. i can tell you from historically we are focused primarily on a claims perspective on confidentiality. business interruption hasn't happened but that is one of the concerns. what happens when the so-called mass outage event happens? that is why we are focused on sharing as much information as we can to get a handle on that as far at what that means for each company's balance sheet. >> you had interesting graphics. if anybody from the audience has a question we have a few minutes to take it and then ask the panel for the important takeaways about what to keep in mind as you go back to your
4:28 pm
office. >> it is 4:30, friday, pie chart, one thing i want to make sure is clear, this is over ten years of claims data. we are actively sharing this with clients to make good or bad decisions. two things i always want to make sure is known is that when you see hacked at 27%, we talked about high profile, bad actors, malware and fun stuff we deal with and suffer the consequences of. that is a quarter of ten year claim status. that is clearly going up. we are focused on making sure the items we can underwrite and improve are fixed. they are fixable. so we can get a company at least a better risk and what we find is the reason i use the arson example, is i think, over time, what we will be insuring is the
4:29 pm
incident that truly the insured did have every method they could in place, provided we are underwriting to it, and they can make decisions based on that information. the other thing and the applicability of using information, sharing information is great, but how the company uses is, we have slide data and this is claim information that is real. this isn't just pie in the sky stuff. that basically shows by industry the threats are very different. and you may laugh, health care at 7%, after two breaches in the first part of 2015, everybody thought health care acts were the big one but we are adapting to this information. we see retail hacks was a significant perage of claims in '14 and the underwriting standards were raised and the availability of insurance
4:30 pm
changed. the demand changed and retailers accepted the fact they are vulnerable to hacks. the supply went down. it is coming down to incentvising. if you have a risk that has better control in the retail sector without questions the insurance industry should adapt and make the right decisions. we can make decisions with the data we have which i would say is credible and actually over time we have that data. but the only way to get this message out and most of what we see simple, easy to fix problems. i go back to knowing where your data is. fishing training. pen test assessments, preparedness, table top exercises when you have an
4:31 pm
accident is important. >> let turn to tom because you have extensive experience. what is your take away to the audience about how to deal with cyber breaches? >> i will not answer that question but instead i will close by sort of observing what an interesting time it is sort of in the cyber arena and cyber legal arena. we heard about sort of how unsolvable the problem seems to be in some respects but we are going to have to find a way to solve it or at least solve pieces of it. you know, certainly dhs is working hard to help companies understand, mitigate and respond to the risk. we recognize the insurance market is an important piece of that and a market driver of
4:32 pm
better security. we are seeing a lot of activity by the scc and the fcc and we had the third circuit opinion earlier with the speaker in the windham case. other cyber related areas. we are seeing lots of activities and interesting discussions especially for the lawyers in the room. and then the topic of active defense and things like deterant strategy. lots of amazing opportunities and interesting things for the lawyers to sink their teeth in and get involved and be part of the solution. >> thanks, tom. let's see what greg can offer. >> i will be brief. i am optimistic here at the end of the day policy, technology
4:33 pm
and people and right now the biggest vulnerability tends to be the workforce but there are steps that can really be taken to turn that into a company's greatest strength. i think you are in a good space. for the lawyers in this space, you will have business for a long time. so i will leave it at that. >> great. i want to suggest that even though the technology is complicated this is something we can all learn. we can't solve a problem we don't understand. so we need to understand how these breaches actually unfold, how a hacker can deal with this, what is the vulnerability of the information and what are the vulnerabilities in the system and hopefully all of the lawyers will consider this is no more complicated than a big trial that you can definitely master. hopefully we can continue this partnership and prevent these
4:34 pm
breaches. >> my job is to now declare this conference adjourned. thank you for coming. have a safe trip home.
4:35 pm
[inaudible conversations] >> here is a look at the prime time schedules tonight. repark marks from the democratic candidates at the the summer meeting. and books written by candidates as well. and america history tv and look at immigration. tomorrow marks the 10th anniversary of hurricane katrina making land fall. and three hours of your phone
4:36 pm
calls and tweets and a special line set a side for people who were affected by the storm personally. washington journal begins live at 7 a.m. eastern on c-span. >> there is a lot to watch this weekend on c-span. polit politics, books and history. tomorrow's hurricane katrina's coverage all day coverage and the live coverage of the new orleans celebration goes on. at 10 p.m. eastern tomorrow evening on booktv, our after words program talking about the book "undocumented". from the homeless shelter to the ivy leak league. and on sunday, on c-span 3 we go to james town island, virginia
4:37 pm
for a tour of the trenches where digs are conducted and a visit to the lab where the actifartif are studied. >> senior fellow from the brooking institute talks about the building in afghanistan. >> the u.s. did achieve improvement in security but depending on how it ends, i hesitate, but question myself because we don't know how it will end. that is the moment of truth. it is possible that five years down the road we will be back in the new civil war in afghanistan. isis is fully emerged and it is much worse than the taliban.
4:38 pm
the taliban is deeply entrenched. if they end up in a new civil war in afghanistan and new save haven for the taliban and isis i would say it wasn't as successf successful. >> earlier today, former military officials discussed the implications of the iranian nuclear deal. this is about 90 minutes. >> can you hear okay? >> without a mike, you sound good. >> thank you. good afternoon, thank you very much for coming to hudson institute for what i know is going to be a very interesting and important panel. i want to welcome our c-span audience as well.
4:39 pm
this panel, i have been here at hudson several years doing these panels and this is probably one of the most important. we will continue to have panels and this is special and this will focus on the joint plan of action and i think one of things in this panel and discussion and these gentlemen will be able to do is fill-in a clear picture of what the islamic republic of iran has done throughout the middle east. especially to american servicemen and citizens over the last 36 years. i think it is important to have a clear understanding of exactly what this regime's past relationship with the united states has been like. and what i think we should probably look for and expect in
4:40 pm
the immediate future. i will move to the panel. general keen is a commentator on fox news. whenever i had to do an article he has been available and very helpful. mr. harvey is now at the university of south florida. he is a military intelligence senior executive.
4:41 pm
without further ado, general if you could start us off. >> it is nice to show up on a wonderful summer afternoon in washington. we are not aware of this always so enjoy the great week pud. i hope it turns out to be the same. i sit here with two colleagues. former army officers and career officers, i know the assessments from patreus in iraq in 2007-2008 and every few weeks at a time. they did the same in afghanistan. so we had a lot of unique
4:42 pm
experiences to say the least. that was provided by the senior counselor of the government, but because of an intelligence group thing going on, many are familiar and see it. so listen, that is a different subject. iran in my judgment is an idea
4:43 pm
driven state subscribing to radical beliefs. we will drive the military out of the region and destroy the state of israel. it took 35 years to include this ye year. they use language that is in flam tory and also determined and consistent. the strategy with the iran broad
4:44 pm
core or commonly referred to as the kurds force. and overseeing science and financial issues. not the chief of the military or the president. the only boss he has as you know is the supreme leader. they are fighting proxy wars and clients using terrorism. let's consider what they have done to influence and they will capitalize their activities.
4:45 pm
the u.s.-embassy in kuwait, five dead, 86 wounded. in 1984, they went back to the u.s.-embassy in lebanon which is annexed, and we had 23 more dead and killed in that explosion and countless wounded. they began in the early 1980's, a ten year campaign to kid nap and assassinate.
4:46 pm
it is used by their guidance against u.s. personal providing rockets, motors, and funding to the iraq shiite militia.
4:47 pm
estimated dead is over a thousand and it is believed it could be closer to the 2,000. the u.s. military did, as we know in 2011, this 35 year track record of using proxies to kill americans has succeeded but no u.s. president, republican or democrat, has never countered despite full knowledge of who the sponsor is of a proxy
4:48 pm
client. by that time, in 2006, i might say in iraq, iranian trained shiite militia were the number one killer of u.s. personal in iraq. after a week long struggle, the
4:49 pm
israeli defense force with drew from lebanon in the face of humilitation. all four-star generals were fired and iran continues to supply and arm the proxies. many military leaders and soldiers from his regime joined the opposition and indeed the opposition gained momentum again the regime. one of this two star leaders was killed and they moved into syria
4:50 pm
5,000 fighters from lebanon and thousands of iranian trained shiite militia out of iraq to prop up the regime and prevent it from toppling. they are all in in propping up the government while the united states commitment in the eyes of senior iraqi officials is inadequate. now it is yemen with the kurds supporting and this is a strategic issue for sure. iranian naval base in yemen with control the shipping lanes to and from the suez canal. that is their attempt. the 35 year score card is control over lebanon, syria,
4:51 pm
gazaa, iraq and yemen. it is the height of naiveness and arrogance to assume iran will not build on this success and use the elements of the nuke delta further their gop objectives. they have the ability as a result of the deal to buy arms on the open market in five years, and have the ability to develop and acquire ballistic missiles in eight years. and the terrorist sanctions relief with members of the kurds force is a major facilitator of
4:52 pm
what took place in the future. it is not so much about costing the leaders the ability to travel. let's face it. the nuke deal takes doesn't help here. the regime and the kurds force is imbolded by the deal. it is foolish to provide our values with the consumption that iran may join the community of nations and abandoned their strategy that is working so well in achieving their strategic objectives. what we need, and i will say it briefly, is a regional strategy
4:53 pm
with allies and others who have a vested in the in security. and to work toward that, to counter radical islamic extremist. thank you. >> thank you very kindly general. you hit on a number of things i will want to come back to after the introduction. one of the things i am happy about and you brought it up is the fact no administration, democratic or republican, has made the iranians pay a price for the malseason in the region. >> thank you for the hudson institute. i am glad to be here with friends on the panel. this is not a pleasant subject to talk about at all because the way the trends look as far as where this nuclear deal is going
4:54 pm
and what is in the deal. i have covered iran and interrogated code officers and understand their intent behind them. i worked hard to deal with the power and fluence in iran's leadership and the multiple levels and personality involved there and how they see their paths to victory and how they want to advance their interest. it is important we understand who they are dealing with, why they think they are way do, and how they perceive moving forward and achieving objectives. if we don't have a clear eye perfective on this we will
4:55 pm
misread it. we are misreading iran because of hope we can move to another place. this reminds me of what we saw in misreading iraq with the nature and character of the regime, the structure in place, the influence of tribal networks. it was misread then. i think in some ways, we are doing the same thing here. my discussion today i will not focus on the technical aspects of the iran nuclear deal but there are parts of the agreement that are concerning to me and have been the most concerning from the beginning. on these concerns, chairman of the joint chief of staff joined
4:56 pm
us in testimony last month to reiterate the same concerns on individual and business sanctions being moved along and not being effectively addressed in the deal. he was most concerned about the ballistic missiles. i am also very concerned about the misread of the nature and character of the regime and how the alignment of the hard line power blocks are actually operating and how this deal is in fact, i think, going to validate what they have been doing over the decades. this is success for them. they will get resources and trade and funds. and that will bolster the regime and allow them to spend money on addressing consumer issues and the like. but it will empower the regime and give them military capabilities that are going to be detrimental to our interest
4:57 pm
and our allies interest in the region. we don't have good evidence of the character and nature changing. there are reforms and people aligned that have been part of the green revolution, but they have been attacked, prison sentences, and abused by the government to reject opposition. just because people have been to western schools and speak fluent english and are comfortable and i think again we are deceiting ourselves in, you know, projecting on to them things that are not there. i have seen this time and time again in dealing with senior
4:58 pm
leaders be it central command, cent com commanders or senior officials or others who see in others something that is not there just because they have a friendly relationship and can talk to each other. it doesn't mean these people are not aligned and focused on advancing an interest of their own. we have seen it in pakistan and saudi arabia and elsewhere. i worry a renewed and validated and better resource iran will continue the aspirations in the region. they have been very affected at sewing this order and using their capabilities to advance their interest. as the general said they worked through their proxies. and before i move on, i am going to hit on a couple points that do concern me. we hear about snapback
4:59 pm
sanctions. we can just renew the sanctions if they violate the agreement. what is the threshold for renewing the sanctions and how long would it take to reimpose the sanction. when you look at the agreement closer, you see there are really very large holes they can drive a truck through. it may by the regime today up until the sanction are snapped back they continue. they are not affected by snap back of sanctions. if you strike a deal to sell oil to japan for 20 years and snap back the sanctions in four years that oil deal stays. it is that type of thing we need to look at. that will impact the judgment of the leadership as to how much risk they will take in skirting
5:00 pm
the edges or pushing for a major breakthrough in getting around this agreement. there is little evidence whatsoever this agreement is going to moderate. they upgrade capabilities already and have a history the general laid out. they are going to continue to support expansionism and sustain clients in the region. ...

6 Views

info Stream Only

Uploaded by TV Archive on