 Thank you all for coming. I'm delighted you're here. My name is John Hammery. I'm the president at CSIS I have no role here other than an ornamental one, which is always a joke But to say welcome to all of you. I'm delighted that you're here. I did warn General Clapper This is probably the most dangerous audience I've ever seen because they look like they know something You know, this is usually Think tanks don't always have people that come as audiences that really know something this is quite a knowledgeable group That's here. We're delighted you're here Thank you very much. This is a this is going to be a very interesting session I'm a turn to Dan Prieto to formally introduce things in a second. I did want to just say a word of Thanks to my friend General Clapper and Clapper It I had nothing to do with inviting him so So I then I so I feel completely Liberated to say what I really think about him, which is he's one of my real heroes This is this is a man who has dedicated his life to something much bigger than himself and that's serving this country He the only he's done a spectacular job in virtually every position that the that the government has In the area of intelligence and national security the only thing that he failed at honestly was trying to be a civilian for a brief period of time he He never liked that very much And when called to come back into service after a very distinguished military or called back to come into service Went to NGA transformed it gave it the most complicated name in history for an agency But then that led of course to him being pulled into into Defense Department as the undersecretary for intelligence and then that of course led to his current role as the director of national intelligence Where he's doing a spectacular job at a really tough time. I mean we've had ever since the DNI was Established it has been an era of of additional resources and now we've have this Pivot point that's become the new favorite Washington word pivot points. We're pivoting here to an era where there's going to be some austerity and fortunately General Clapper has such a broad base and a depth of skill in understanding this community that he knows how to guide it Through this perilous time, and I think he's doing a terrific job now this is a This is a very awkward time for General Clapper to be coming because the budget is not formally released Okay, so I'm just going to give him permission upfront to refuse to answer some of your questions if he decides to he can As he's always been the case He's willing to put at risk his own career, but I'm not willing to do it for him And so I will give him permission to say I can't answer that because the president's budget is not out It'll be up to him to decide what he wants to do, but I Very famous American once said he wanted to judge people by the content of their character not the color of the skin I know the content of this man's character, and we're lucky to have him in service Dan Let me ask you to come up and get this started I want to thank our friends at IBM that are giving us the Possibility to bring this public forum to this this audience today, and we're glad you're all here Dan. Why don't I turn to you? Thank you, Dr. Hammery. Thank you Ozzie for hosting us today. My name is Dan Prieto I'm vice president and practice lead for public sector strategy and innovation consulting at IBM We're pleased to be CSIS a strategic industry partner for this important conference in this series Which has gone on for longer than the year around information sharing Today's conference again is an important step To continue this dialogue at conferences focused on information sharing adapting and improving and expanded information sharing environment In the years since the information sharing environment was established by the intelligence reform and terrorism prevention Act of 2004 we have come a long way in terms of predicting and preventing incidents not simply responding after the fact and we've done it by better Sharing information analyzing it anticipating and preventing incidents in real time Today's program aligns with IBM's long-standing commitment to support our nation's efforts to strengthen information sharing and improve global security Many members of the IBM team are going to be participating in events throughout the course of the day And we appreciate the opportunity to engage in these discussions Now it's my honor to tell you a little more than what Dr. Hammery did about our keynote speaker today Director of the National Intelligence James Clapper. He was sworn in as the fourth DNI in August of 2010 He leads the United States intelligence community and serves as the principal intelligence advisor for the president He has a long and distinguished career in the US armed forces beginning as a rifleman in the US Marine Corps Reserve and culminating as a lieutenant general in the US Air Force and director of the Defense Intelligence Agency Over 32 years in uniform service He also held positions as assistant chief of staff for intelligence at the US Air Force headquarters during operations Desert Shield and Desert Storm And as director of intelligence for three warfighting commands US forces in Korea Pacific Command and strategic air command of note He also served two combat tours during Southeast Asia conflict and flew 73 combat support missions over Laos in Cambodia He first retired in 1995 He worked in industry for six years as an executive on three successive companies with business focus on the intelligence community He served as a consultant and advisor to Congress the departments of defense and energy and as a member of a wide variety of government panels boards commissions and advisory groups He was a member of the Downing Assessment Task Force that investigated the co-war towers bombings in 1996 and was vice chairman of a commission chaired by former governor Gilmore of Virginia on the subject of homeland security He returned to government in 2001 as the first civilian director of the national imagery and mapping agency He served as director for five years transforming that organization He then served for over three years in two administrations as the undersecretary of defense for intelligence where he served as principal Staff assistant and advisor to the secretary and deputy secretary of defense on intelligence counterintelligence and security matters for the department He was also dual-hatted as a director of defense intelligence for the DNI He earned his bachelor's degree in government and politics from the University of Maryland a master's degree in political science from St. Mary's University, San Antonio, Texas and an honorary doctorate in strategic intelligence From the then joint military intelligence college He has won numerous numerous awards national intelligence distinguished service medals to defense distinguished service medals the Air Force Distinguished service medal the Coast Guard distinguished public service award the Department of Defense Distinguished civilian service award and a host of other awards and decorations He was named as one of the top 100 IT executives by Federal Computer Week in 2001 And he has been singled out by the NAACP in the form of its national distinguished service award and has been awarded the Presidentally conferred national security medal. I had the honor of meeting General Clapper in 2007 when we served on a council on foreign relations task force on civil liberties and national security and I had the honor working with the intelligence and national security alliance supporting Director Clapper's thinking around civil liberties and keeping the country safe in both those experiences with General Clapper I know his commitment to keep the country safe I know his commitment to information sharing and I know his commitment to civil liberties So with that I'd like to introduce director Clapper, and we look forward to a good day so I Be nice if I just quit while I was ahead here after all that. I appreciate the very generous Very kind introduction certainly appreciate CSIS for This opportunity to kick off. I think a very important dialogue Obviously Don't need to tell this crowd information sharing has been a huge mandate for us all since 9-11 You know the interest the notion of sharing is an interesting concept. It can be phenomenal. It can be dangerous It depends on what is shared and with whom it's shared There's an old Eastern saying that thousands of candles can be lighted from a single candle and the life The candle will not be shortened Happiness never decreases by being shared now. That's a little too warm and fuzzy for you We've also found some words written by a noted Harvard professor Collecting data is only the first step towards wisdom, but sharing data is the first step towards community that That applies in spades just within the intelligence community At the same time of course we as you know have a dilemma of Protecting Information and so there is this dilemma that we've all wrestled with particularly those in this group And how you balance the two So we're we're here today of course to talk about the sharing of information And so we might define that As a national responsibility to ensure that any person with the appropriate mission need Can discover and access actionable information at the right time To successfully prevent harm to the American people and and and at the same time protect our national security So we believe I certainly do that that sharing must be done responsibly responsibly seamlessly and securely With regards to with safeguards in place to protect the privacy civil rights and civil liberties of the American people As well as to prevent unauthorized disclosure in short the right data any time any place usable by any authorized recipient Preventable only by law or policy and not technology and protected by a comprehensive regimen of accountability That's our vision or in a nutshell sharing and safeguarding all information Exquisitely and perfectly that is of course the nirvana of information sharing One we may not always achieve but that certainly is the is the goal and It's as we all know particularly in the last ten years. It's not an easy task The information sharing Goes far beyond the intelligence community where I work And it can get a little bit confusing So I wanted by way of explaining who some of the other speakers are kind of explain explain these Relationships at least as I see them So later this morning you'll be hearing from six other people from My office the Office of Director of National Intelligence So the panel first Will first panel will be On it will be the what's called the program manager for the information sharing environment Shemender Paul Now although Shemender is tethered to the DNI He really is the the national lead for for all US government information sharing and in that context reports directly to the White House So he cuts across the entire fabric of the US government straddling the other Domains besides intelligence, which means law enforcement Public safety home and security Defense and foreign affairs So he has a broader mission including synergizing and aligning these fields with with the White House so Intel Sort of my domain is just one area that that he touches and influence influences I'd also like to recognize David Shed Now the Deputy Director of the Defense Intelligence Agency on that first panel David is an OD and I plank holder He was there at the beginning in 2005 On the second panel which deals with the culture of information sharing is cornstone She is the lead on my staff for information Sharing within the IC with a position that I established when I came on in this job The corn is so devoted to this topic that she came off maternity leave just to be here So this is her idea of fun get a babysitter and come to a conference sponsored by CSIS So good on corn She'll be talking to you about how to change a culture to increase information sharing which is of course one of the challenges we have in the intelligence community and the way We're doing this Somewhat accelerated I suppose by WikiLeaks is Increasing the confidence that the information is is secure They're often times although it's probably mischaracterization that there's somehow zero some Relationship between the need to share and the need to protect Maybe it's better or more accurate to coordinate. You know, how do we increase both? So in the IC corn makes sure we have the policies procedures and technology all in place to share information protect the information and Safeguard civil liberties and privacy and it's sort of those three pillars of those three factors that we have to reconcile and synchronize The third panel today is on efficiency Scope and privacy has on it Mike howl who is Shemender's deputy and West Wilson Wilson from the National Counterterrorism Center or NCTC another new feature of the intelligence landscape by That was part of the Intelligence Reform and Terrorism Prevention Act NCTC also housed in an OD and I With again a special relationship with with the president The fourth and last panel has my civil liberties and privacy officer Alex Joel and I think there's a message just in the fact that again by law on the OD and I staff is a full-time civil liberties and privacy officer who Alex I think is a national asset has a very very trusted advisor on many of our most Sensitive important issues And he will be with others who focus on how we advance policy and legal operational framework so Just all to say we heavily Represented and have we committed to this to this conference because the importance of the subjects So let me just touch on a few points and then all was dangerous. I'll take questions One of the things that Is sort of a new thing for me in this job is of course engaging in the domestic arena particularly with the law enforcement Community Have had occasion to engage quite a bit with them as a matter of fact particularly through the auspices of the International Association of Chiefs of Police and many of their Sort of subordinate task forces and and and organizations And as was alluded to I'm retired military and But I've come to have great respect for what the law enforcement community does to protect our our security in this country as well and Found them to be a goldmine of wisdom and insight when it comes to what I'd call street intelligence And like the military and the intelligence community overseas they too put their lives online but here at home Many years ago. I remember I was President of the Community Association I lived in something I'll never do again and Had set up helped set up one of the first Neighborhood watch programs in Fairfax County. This is way back in the 70s and in accordance practice of doing that Had the opportunity to do some ride-alongs With Fairfax County Police and later on Virginia State Police and boy it's quite an education to sit inside a police cruiser looking out and see how what Our police and law enforcement officials deal with day in and day out And you pull somebody over you have no idea what you're getting into and of course the scariest call that Law enforcement officials Don't like to get and they always go in pairs is a domestic disturbance Anyway, it was a great appreciation a great sense of sensitivity training if you will for me on having that experience And knowing what our law enforcement people do day in and day out And I think Shemender will bring information sharing initiatives that He's working with with law enforcement So let me just Briefly address six key points About the sharing of intelligence and the first of course is integration which you may have heard is kind of my Emphasis my shtick my mantra in in this job is focusing on intelligence integration Absolutely mission-critical for the intelligence community Our element goal our vision if you will is and is simply a nation made more secure because of a fully integrated Intelligence community for all of the US government threats require us to accelerate responsible information sharing Secondly doing this requires some standardization and we're pursuing some efficiencies as all of us are and in our business Met yesterday with our five eyes colleagues and one of them Offered up the term that his pop has become popular in his country is Australia they call it the efficiency dividend Which is as he said a orwellian euphemism for cuts Anyway, we're doing that as well and one of the things in the big idea big idea department somewhat influenced by budget pressure cuts is for the first time ever an Integrated IT enterprise Across the major intelligence agencies in the community. This is something we have talked about for years Just never were impelled to do it and now we are always love the line of the New Zealand Physicist Robert Rutherford in 1927 and dealing with the New Zealand budget crisis And it's a paraphrase we're running out of money. So we must begin to think so we're kind of in that in that mode now Anyway, one of those is cloud computing Which I think has a huge potential for achieving savings and promoting integration and of course attended to that will be The requisite for security as well But like IT and generalists is an enabler not a panacea The third key point is in the IC protecting privacy civil rights and civil liberties is Paramount I Again in this job have become particularly sensitive to this issue and This is a is a big deal in this country as it must must be I think there is a maturity and sophistication in today's intelligence committee about this that I Regrettably the public doesn't appreciate or see But protecting the rights of Americans is is core to our information sharing efforts And this of course this this too requires enterprise wide approach Fourth sharing and safeguarding information must be done in tandem And I guess this would be you know the opportunity to bring up WikiLeaks, which of course has been a terrible event for us and that has caused us to make some changes in in our community in terms of auditing monitoring controlling mobile media and we have to do more to both tag data and ensure that we can Properly identify people so that if we're sharing information We are assured that you know they have the bonafides and that they are actually authorized to receive the information in it's sort of counterintuitive, but by having greater identity management and greater and improve labeling tagging and cataloging of data that actually ensure it in both insurer security and it also enhances sharing If you can be sure That the information that you're sharing is actually going to an authorized recipient that actually is an inducement to do more sharing Now we will of course as we always do instill all the appropriate IT mousetraps to prevent What recurrence of WikiLeaks, but in the end our system is based on personal trust We had an egregious violation of personal trust in this case. We've had them before and we'll probably have them again The president signed an executive order in October the executive order one three five eight seven Which was designed as a result of WikiLeaks to improve the class security of classified networks and to promote Responsible sharing and safeguarding of classified information and has set up some bodies Organizational bodies to make sure that happens so that we bring together both those polls of sharing and security so As part of this we need to build a more pervasive auditing and monitoring capabilities and and you know, we have varying degrees of capability right now in the intelligence community, so we're going to do some investing and to Bring that into balance We need to develop a national insider threat policy And as I said to establish the bona fides with shares The goal of course as I said is to find that Navvana that sweet spot between the responsibility share and the need to protect The fifth key point is and this is something Shamendra and the PM ISE is working hard at is is embracing common operating models and shared services So we need and that what that implies for me is a greater integration Horizontally across the so-called stove pipes in the intelligence community as well as vertically with from federal state local private tribal and and private sector and Our allies as well PM the program manager for the information-sharing environment is helping to transform justice and public safe safety Into the information getting them into the information sharing business model Working to promote common operating models and shared services The sixth and final point is the course that in all of this the challenges aren't technical as much as they are just ensuring right policies and governance We in the intelligence community have developed and coordinated a strategic intent plan for managing IC information-sharing activities and The PM ISE working together with us has also established a US government-wide mechanism for managing and overseeing compliance safeguarding standards and safeguarding standards among our mission partners So with that I think I will Stop and Will be happy to take some questions so Ozzie you're gonna moderate, okay Well, thank you very much general clapper for that We really appreciate the remarks and taking time out of your extraordinarily busy schedule to address this My name is Rick Ozzie Nelson. I'm director of the homeland security and counter-terrorism program here at CSIS I want to clarify one thing in my boss John Henry gave me the top cover Which I'm glad he did to to moderate the question and answer session and those of you that know me I run a tight ship the first thing I want to clarify is this is the information sharing conference This is not the Iran conference. This is not the pirate hostage rescue conference This is not the president's budget conference. So this is the information sharing conference So I would ask you not to put me on the spot and make a hold of tight ship about what we're going to focus on information sharing I'm also going to use my prerogative as a moderator to ask the first question And tap into some of director clappers, you know, extraordinary experience in this field On the issue of information sharing and particularly the culture How have you seen the community and not just the intelligence community, but the US government embrace information sharing? Over the particular last 10 years some of it has to been forced on them by legislation And what perhaps do you think was the big the biggest factor that's caused the the increase of information sharing? And do you think it's got enough traction now where it's self-sustaining? well First ask away Just one answer that's all the Obviously the biggest event which you know was a epiphany for all of us was it was 9-11 and Having been around the intelligence community, you know long time I think that that event and what ensued after it was a Signal thing for us Certainly in the intelligence community, and I think you know the larger government You know Classically historically it was you know, there was this firewall that having grown up in the intelligence business between foreign and domestic I was a young pup at NSA in the 70s and watched the church pike hearings and Which were you know addressed a lot of the abuses frankly that went on and under the Mantra of foreign intelligence, but it was done You know illegally really in the United States may be well intended but bad for Bad for the country that led to the first version of the executive order 12 triple 3 which laid out very specifically and kind of Reaffirmed that firewall between foreign and domestic well all that came of course to a halt dramatic halt with 9-11 And so that has what has caused us, you know, that's what gave rise to the intelligence reform terrorism Prevention Act, which of course mandated Set up the DNI Set up some other things and and the need recognize the need legislatively for information sharing So now that firewall is Gone That's not to say it's completely eradicated culturally I'll say But I think we've you know, we've made a lot of strides, and I think there are more and more is a recognition of The need to share responsibly and securely But protect civil liberties Yeah, and the answer to your answer to your question Will it stick is there enough momentum enough traction traction absolutely I I don't I don't think there's any question about that Now that said because of the the history where we've been doing the foreign intelligence a lot longer Then our engagement in the domestic arena, which is not as mature there are still a sort of disparities there, which I think accrue largely from the history and But from what I I have seen and several capacities three jobs. I've had in the last ten years I think we've made great strides. That's not to say there's not more to do Great. Thank you for that. Okay. We do have questions. We have the microphones We have microphones going around please state your name and your affiliation if you have one, please We'll start in the front right here Dave Folgem aviation week What's your best assessment of? unintended information sharing The effect on military programs in particular the F-35 program, which was successfully hacked and Is it your belief that that breach of information resulted in? New cost and program stretch outs to Compensate for those breaches Well, I'll just say in general that this is You know what the internet age and and all that that's given us It's also led to you know, grievous pilfering of intellectual capital intellectual property and You know that the F-35 was clearly a target and but I really can't draw any Empirical conclusions for it because I simply don't know what that what that the impact that may have had in terms of Program stretch out or program management challenges. I just don't know but clearly the The attacks on our intellectual property Across the board whether from individuals or nation states is is a serious challenge of the country and you know, we need to do something about it Okay, next we'll go ahead and I like over here front like Thanks, Ozzie. I'm Kim Dozier with the Associated Press You mentioned that you were working hard to do things like tag the information And also put in a system where you're monitoring your own people. How far along are you on that? Well, I get too specific. It's a work in progress And this will be part of our as we go to this new Architecture if you will with and I'm just speaking within the intelligence community part and parcel this Which will I certainly promote The thing I'm pushing is his integration Not to mention efficiency Will be the ability to share more more broadly within the intelligence community Data which is still a challenge for us And and in doing so when we can tag the data so we we can label it we can account for it We can catalog it and then when it comes time to let's say establish a community of interest You know what data is in question and if you have the bona fides of those who need to have access to it You can do that You know much more quickly and more efficiently than we're able to do it now So that's part of this trend what I hope will ensue with the transformation of our IT enterprise Just within the intelligence community. So that then serves As the stem size of point I tried to make in my remarks that that actually serves to both enhance security and promote sharing If you know what the data is in question, you know where it is and you know with whom it can be shared And then you can account for it When it is You're in a much better posture both from a security as well as a sharing standpoint Well, our plan is over Next say five years. I think we'll make it will made some Serious and noticeable changes Okay, great. Thanks, Kim. We'll go over the gentleman of blue shirt. Good morning, sir. Colin Clark a well defense There's been a lot of discussion about the continuing size of the commercial imagery buys by the Intelligence community the White House has the study group Where are you with the study group and is the role of commercial imagery going to change substantially? Well, I going back to For anybody heard of it and when I first took over at Nima in 2001 We were I became a big believer in in commercial imagery it has the benefit of course of being unclassified so that is great for sharing both with coalitions overseas and and certainly domestically and so I think there's always going to be a need a substantial need for Commercial imagery within the intelligence community and and for and for many other purposes I don't exactly know where we are on the study, but it should be the next couple of months I would guess we'd have we'll have that done and of course that's just a relook at the Utility and applicability of commercial imagery but that's not to say that in this Era of budget cutting that commercial imagery is to be considered in that In that situation as well Great. Thanks for hearing that John McAffin CSIS advisor, but formerly of the CIA and the DO associate deputy director station chief Despite what the reputation that My former organization has of being the troglodytes of sharing I'm not and I don't think most knowledgeable people are I mean you don't spend hours in a safe house and bagged at it with a source wanted to keep it all to yourself You want people to know and I think you've got we've got it right that the responsibility to share and the need to protect what I'm still not clear about and then a lot of people are concerned about when you get into the terms that you use the Bonafides of the recipient information and authorities. I Think there's a confusion of what does that mean? It's a distinct contrast it seems to me to the notion of need to know which became for a while You know a bad term I think we've come back to saying there's there's an essence of need to know and everything we do with COI six is a need to know Can you help us understand the difference between Sort of the notion of need to know which is fairly strict Constructionism and Bonafides and authorities relative to information sharing Even within within the context of the intelligence community There is of course as John well knows the the need to protect particularly sources and methods and At the same time You know there's the old saw about Intel cool Intel is cool and reported Intel is really cool. And so you have this, you know kind of dilemma there between protecting sources methods and And the information that is then gleaned and how that information is used So what I was trying to get at was that if if you're able to tag and label data So that you can break those segments if you will The sources and methods from as opposed to the substance of the information, which is really what you need and then You also can Determine routinely and systematically so it's not a big huge deal and Done it and don't do it with Automaticity that you can establish quickly communities of interest this sort of thing based on a given need that If you have the data labeled and you know the people who need to have access to the data And we can do that and do it on an automated basis, which we can't do now very well I think you promote the interest of both sharing and and security Okay next in the blue shirt in the middle here Microphones coming John Paris the information security oversight office. Does the current classification system aid or hinder information sharing? And if not, what recommendations would you have to help enhance information system in our digital age? Well, it's nothing wrong with it with a system It's how it's used And making a classification determination, so I guess one way you could Remove the hindrances is just not classify anything But you know the information sharing I did I'm you know Cartooning us a bit to take it to its extreme and of course this gets to the issue of clout overclass overclassifying Which is an allegation that's that's often made and and there's probably some substance to those accusations My experience in tells community that a lot of What derives or motivates classification decisions And given, you know the volume of data we deal with is actually affected by contemporaneous circumstances So something that we classify today would you might make a different Determination if you looked at it a year from now or five years from now I do think we you know, we're very very conservative frankly is personal opinion not company policy that about Declassifying material but Again, this is another one of these Nirvanas these holy grails were always looking for what you know, what is the ideal sweet spot for? Classifying we shouldn't either overclassify or underclassify so it's got to be in the middle somewhere, and that's That's just a difficult thing to do perfectly Day in and day out Great, thank you so much. Okay gentlemen in the red tie over here And sorry, I can't see some of you because of the David come in mind-aligned systems Sir To your mind which agency has the lead responsibility for Sharing information about a suspicious activity that indicates an imminent attack and making sure that the regional stakeholders are aware of that Is this a structure data problem, or is this an operational problem, and who's making sure there's no problematic seam between those two perspectives When I'm sorry is there when your question applies as one agency Well, it's hard to you know say there's one single agency that has a legal obligation to do that it is a Collective responsibility That that we all we all have I mean under the scenario of you site. It's You know state and local officials Whoever or starting with a citizenry for that matter as someone that witnesses an event like that and gets it to the appropriate authorities I think tremendous probably can speak more to the suspicious activity reporting Process and the training modules that have been set up for for doing that, but I Really can't I mean I think it'd be Well, it's not it's just not set up that way that one element is exclusively responsible for Legally accountable for ensuring that you know warnings are passed quickly. It's a collective responsibility it's my responsibility Particularly to ensure and that's what I've been placing so much emphasis on integration for as I said before both horizontally within the intelligence community and vertically of federal state local tribal private sector and that by the way is not intended to imply One-way hierarchy. It's it's it's two ways The nexus at the state level of course are the 72 or so fusion centers which is Again, there's 72 of them not just one that sort of are the I look upon as kind of the organizational nexus for either bringing information up from the local level or bringing it down from the federal level Right well go right over here to General copper veal again go from Bloomberg news instead of You you talked about the insider threat policy Can you talk a little bit about more about what that involves and Where that is in the process and it has been about a year and a half since so wiki leaks So what you know, where is that and what's taken? so long and Can you talk also a little bit about the the color the insider threat? I'm sorry I didn't hear the your first. I'm sorry the insider threat policy that you mentioned You said we need to develop a an insider threat policy if I understood you correctly Yeah, so what what does that involve and where is that in the process? Well, I don't know exactly where the Written document is that's what you refer to but I think Frankly inherently we've always had a responsibility for detecting insider threats. So we have in the intelligence community I just think what wiki leaks obviously is done is Heightened our sensitivity about that So and of course for in an IT context inside an insider Threat is quite profound and that's why I think everybody is more sensitized about Being alert to Detecting insider threats and there isn't a silver boat here. We have to have that you have to have auditing and monitoring We've done a lot to over the last three or four years to enhance and improve and streamline the Clarence process which is another another dimension of this which sort of gets at the issue of a personal trust Let's go ahead and in the last question Over here gentlemen with glasses next to Some Peter Bishop with WWN software in your point six. I was wondering if you could expand just a little bit on that Where you say that you're not looking primarily for tech tech new technology But you're doing more in the way of right to policies and governance Presumably that means that you are not waiting for new technology to move forward But that you are on the other hand you are still open if new technology is developed That can help with a more perfect and exquisite sharing of information. You are still open to it Could you just expand a little bit on that? Well, I think you said it Answer your own question. That's exactly right I mean that this has always been about governance and and oversight leadership if you will But as we're able to Acquire the technology and substantiated Pervasively Where there is a confidence assurance about The data it's content and with whom it's going to be shared that actually serves as I said earlier to enhance sharing so to the extent that we bring to bear technology would help facilitate that even in you know Our our big idea aside absolutely What a brilliant last question a question answered itself, so thank you for that Well first I get we have a great agenda today So I'd ask and encourage you to stay behind and please see the rest of the agenda Of course, I want to thank our sponsor IBM for this and then most importantly Thank director clapper for taking time out of his busy schedule to share his thoughts on this important topic. Thank you, sir