 Hello. So I didn't make my 10 o'clock speech. So I want to say a couple of words here before we introduce the man. You're all here to see. At least I think you're here to see General Alexander, aren't you? Yeah. So this is something in our 20th year anniversary. I mean it couldn't have come together any better. First of all I never thought I'd be doing this for 20 years. And second of all I never thought I would have a director of the NSA and cyber command at the same time. So for me it's something I've been trying to do for almost 15 years. More than half of the life of DEF CON I've spent trying to get someone from the NSA. And why the NSA? Well they're kind of the spookiest kind of least known about it. I grew up reading the puzzle palace and all my collection of spy novels. And you know much like with hackers people sort of fear what they don't know. You know and we've all been through that. You guys are hackers. You can probably like walk through walls right? You can sniff wifi with like you know your fillings in your teeth. And we sort of ascribe the same sort of technical capability to the NSA but you know they're human just like us. And something I try to do with DEF CON is I want to expose you guys from the very first DEF CON to people you don't normally see like I'm sure you guys just don't hang out and have coffee with the general. And neither do I. So to me it's really eye opening to understand you know the world from their view because I want to expose you to a larger sort of perspective. We're going to hear all this technical sophisticated attacks, latest trends but you probably won't really hear it from the horse's mouth how any of that fits into a larger world view. You know I mean I grew up thinking about the internet as a global space. You know it was my local community who I knew and it was the world. And I didn't spend a whole lot of time thinking about my nation. Because that's like a geographic thing and I'm all electronic. But you know the reality is today yeah we live in a geographic space and we have a country and other people have countries and now the internet has grown to such a space. We're starting to have country to country conversations about well what does it mean? What's internet governance about? Do we have cyber treaties? You know how is this all going to work going forward? And so like magic on our 20th anniversary and the NSA's 60th anniversary this is all come together. So with that said I'd like to give you a have you give a warm welcome to General Alexander. Honor to be here. It's an honor and a privilege to be here. You know one of the things I want to talk about is the freedom domain, the internet and what we can all do to work on this. And so I've got about six hours of presentation and slides that will cut down to to some meaningful time for you and I do want to give a chance for you to ask some questions. Hopefully they'll be easy ones and I have a crew here that can answer the hard ones if I need to. To Jeff Moss thanks thanks so much for the invitation out here and thanks for all you do to bring this community what I consider the world's best cybersecurity community together. Let's give them a big round of applause. That's absolutely superb and this is something that I want to hit on in a few minutes. Gail Thackeray was just up here. Let's give her a big round of applause for what she's done and dead at it. Where are you? Thank you. Let's give him a round of applause too. Okay so to show you that we have a sense of humor maybe first this was Ken Olthoff. Many of you know him. What happens to the feds that get spotted here? They get to clean up afterwards and so you know he was the first one that was spotted out here I think in Defgun 1 the first year and he's almost off that sentence. You can see he's on the last row in the parking lot so 20 years of clean up and that's what happens to guys that get caught. We'll talk about that a little bit more. I have had a great time here this morning absolutely superb. Oh it's stuck. Does anybody know how to operate this thing? You do? You know how can you come up here and help me out with this? You know it just seems to be stuck and you know I'm not sure how to get it to the next slide. Right. Oh well that was good. What's your name? Sci-Fi. Sci-Fi. Oh let's give Sci-Fi a big hand. Come on up here. So I don't know how many of you know Sci-Fi. Sci-Fi we had a chance to go out to see the Defcon kids this morning. I'll tell you absolutely superb you know to see these young people and what you've said up there and Sci-Fi and a couple of others who are the other two? Chloe, Olivia and then Kryptina we saw. Yeah so those are the three that we saw this morning absolutely superb and what Sci-Fi has done is she won the zero-day exploit. In fact she gave me a t-shirt and said I had to wear it right and I thought well what about the freedom domain and she goes there's nothing more important than Defcon kids and what they've done and I'll tell you from my perspective there's nothing more important than what you and your folks have done so don't get nervous. This is Sci-Fi's t-shirt. Sci-Fi zero-day absolutely superb and I'll tell you we have great people like Sci-Fi all over and in this audience all of you and what it takes we put up here on on this slide it takes great people to to really bring together what our nations need all our nations better cybersecurity so this is for you thank you let's give her a big round of applause okay all right she's gonna go down so I'm my own again so one of the things I wanted to talk about I did have a chance to to actually go out and see everything around here I didn't get to spend a lot of time I am absolutely impressed with some of the stuff that's going on here for barcode the blood code stuff that's set up and the fact that let's give them a big round of applause you know that that you would that you would come together for somebody who has a need and give blood I am really impressed that that's absolutely superb you should all be very proud of yourselves I am and I'm proud to be associated with you what I want to talk about cybersecurity education in this room this room right here is the talent our nation needs to secure cyberspace and there's some issues that we have with cyberspace when you look at it first you know we need great people like sci-fi that can help educate older people like me and some of the folks who don't really understand this you folks understand cybersecurity you know that we can protect the networks and have civil liberties and privacy and you can help us get there now some of the things that we're going to talk about is how do we take the next step you know there are some things that I'm working my way through to understand cybersecurity I want to walk through those with you and see what we can do together to help secure cyberspace build better tools train and educate the American people and our allies and other nations on better cybersecurity what does it take to get legislation I had a chance to meet up with some of the EFF folks and some of you know here and can help us show the world that you can actually do intrusion detection and prevention systems and ensure civil liberties and privacy showing that the world is absolutely important because we can do both and we need to do both back on my own just a minute sci-fi we might need you here in a second oh look at that so when you look at what's going on and you look at the stuff here you know I was just looking at the phone system that you all set up here you know this is absolutely superb you have your own little phone system and it's running and they handed out the phones to everybody what is it called the hacker hacker net ninja net so you set up your own phone look at the phones and where they're going the mobile devices just about everyone in here owns a mobile device actually most of you own two three or four you have your iPhones or your Android you have an iPad you have a wireless and wired devices and you have all this great technology and what's going to what's going to happen over the next several years it's going to continue to grow look at what's what's happened over the last few years where we've gone from last year there were over four hundred and sixty million cell phones sold this room bought half of them and great opportunities when you look at the the calculation and capabilities in this equipment for solving some of our our nations our allies in the world's problems especially in health care think of the things that we're going to be able to do in a few years we're going wireless the ability to connect to that networks absolutely superb I had a chance to go over to the wireless section and walk by that and see what you're doing tremendous vulnerabilities that we've got to address so there are tremendous opportunities that you can see on here and I think and I put on here deaf con kids from my perspective the greatest opportunity educating the next generation that's going to come on beyond us like sci-fi and her teammates there this is our future and what you're doing here to help train those folks absolutely superb and you should be very proud now there's some there's some tremendous vulnerabilities out there when you look at what's going on in the network there's a lot of companies with tremendous cyber security experience that are still getting hacked and I put some of them up here and just to give you some insights when you look at some of the ways those have hacked those zero-day exploits that sci-fi made and she's going to help me out because she did hers in a game to actually run it faster in time or to get out in front of it in time and that can help me beat my kids but it's also those type of exploits are used to get into some of these companies that are the best in the world at cyber security from my experience what we find out is they're the best they know they've been hacked there's more than ten times almost a hundred times more companies out there that don't know they've been hacked tremendous vulnerabilities and we've got to figure out how to work together to solve that okay I'm getting better at the sci-fi that training session help so we have some shared challenges and you can see those here a global community with great risk from exploitation disruption and destruction what do I mean by that and why am I putting this up here you can see that the last decade plus has been exploitation cyber hacking penetration testing and you see disruption distributed denial of service attacks and my concern is that's going to flow into destructive attacks they could have significant consequences on our nation's critical infrastructure government networks the internet itself and we've got to figure out how to secure that so we have a joint challenge because the reality is this is the community that helped build many of those tools that we're going to need you understand this you understand what's going on you know I had a chance to go over to capture the flag stuff that's going on going there this community better than anyone understands where this is going and what we need to do to help our nation and our allies fix this so let me go to the next slide so we also have some shared principles and responsibilities and I've listed those out here because I think from my perspective we all have the same approach to this and you can see what we've laid out I think from from my perspective we all share this responsibility this is not the government can fix it this is not private industry that's going to fix it this is we're going to fix it and that's what it's going to take a team approach we have to be collaborative how do we do that one of the things that we can't do today is very easily share between government and industry for protection of critical networks that's part of the cyber legislation we need to address that and you know from my perspective watching what's going on in Congress I think both parties see this as a significant problem they're debating this today it's ironic while we're out here they're debating cyber legislation that would allow us to share information and take it a next step what are the standards that we should jointly set industry you all government that critical infrastructure and network should have to ensure their security how do we do that and one of the things I point to is well look at the sands critical 20 network configuration and settings that we ought to do those are things that we should look at and we should address that and from my perspective this is all about our future and there's a lot of things that are going on here we can sit on the sidelines and let others who don't understand this space tell us what they're going to do or we can help by educating and informing them on the best strategy for that benefits all of us and our nation and that's the real reason I came here solicit your support because from my perspective if we had everybody in this room for a few weeks working together on this we could solve many of those issues you have that's right you have the talent you have the expertise yeah that's right thank you and you know and I look out here and seeing some of the stuff that you're doing absolutely superb I know you're waiting to see if I turn around with us on here and tear it up so let's talk a little bit about the technical side of this I know that's what you really want to hear you know we have great folks in the government just like you as Jeff said we have some tremendous folks and when I look out at some of those folks and some of the things that we've developed you can see it up here some of the tools that you've developed think about it snort that intrusion detection system and how that's used and that the backtrack system metasploit nesses these are great tools for penetration testing and hacking and from my perspective when I look at those this community we develop those we need to take it to the next step now I know what if he couldn't be here one of the key guys on the internet along with vent surf you start to bring some of these guys together they're the ones that help build it and we've we've had some folks that have done some great things too and I just want to talk about that for a second so you know where we're coming from from a government perspective because it doesn't need to be a separate set of objectives we have a joint mission here I think so I put I started out with World War two no I did not fight in World War two let me just I was only nine at the time no when you look at World War two the fate of our nation and our allies hung in the balance over some of these codes that you see up here the Japanese codes purple JN 25 and a series of those and when you think about it those are the codes that allowed us to win in the Pacific Midway Google that not all at once but when you look at it some cryptologists were able to to confirm that the Japanese were going to attack at Midway allowing our Navy to get a strategic advantage and they did it based on people like you who broke the crypto thing Kryptina and we're able to read that mail a nigma a nigma there's a great story here on a nigma the allies our allies Poland France Britain broken Igma the three rotor system and we've got a couple out there three times ten to the hundred and fourteen power I was told to memorize it I'm not sure why think about the possibilities so to speak and when you think about a nigma by our ability to break that code oh I thought you know I was the airborne training so normally that means get ready to jump out of the airplane ten minutes okay we could that we'll do some of those Jody calls in a minute that's right boom it's better if you're going to go to airborne training it's better to have a shoot on your back I'm just telling you so enigma let's think about enigma and what that did the three rotor system gave us a strategic advantage we sank many of the submarines that were sinking our ships that help our allies in Europe Admiral Donets the German Navy realized something was amiss and he tried to get the engineers in Germany their crypto people to change it and they said there's no way this can be broken it's impossible to break it haha you all know we do the impossible every day and so he added on a fourth rotor the fate of the world swung in their balance for nine months while the allies worked on breaking that and there are some great stories about people who gave their lives to break that code some Navy folks who went aboard a sinking submarine and died getting enigma she machines to help us win that war and think of this if the Germans knew at that time that we could break those codes they would have changed it and the war may have come out vastly different that is one of the key reasons the government has to keep secrets not to keep them from you it's to keep them from our adversaries but if we share them too widely everyone is going to know about those and when you look at the the Tiger teams and things that we've set up starting in the 1970s for for people to go out and work on the networks to actually get out there and see what could happen with these machines it started in the 70s people realize we've got problems coming up in cybersecurity and that started all in the 70s building out these teams going to DES to follow on an AES encryption I want to mention the Dib pilot because I think the Dib pilot and our partnership with DHS and FBI that's your government cyber team and you had Mark Weatherford here earlier I'll tell you Mark is great to work with be nice to him he's a good person he's got a tough job on the DHS side and FBI tremendous people director Bob Muller absolutely one of the finest people in this country absolutely superb his heart is in the right director what do we do as a team when you think about that team FBI has the law enforcement the criminal side DHS is the public face to work with industry in the private section NSA and cyber command our job is to protect the nation from a cyber attack and foreign intelligence now here's the issue if we can't see a cyber attack how do you stop it we could write essays on this right if you don't see a cyber attack how do you stop it well that's a good one because that's where we are right now ironically NSA does not sit around our come our country and look in we have no insights if Wall Street is going to be attacked so the Dib pilot is a pilot of how we can work with industry and get tips and cues think of this is the 911 we can give them information to help protect their networks and they can tell us from their intrusion detection systems when an event occurs at network speed the reality and those of you familiar with ideas IPS snort and all these systems know that you can use these data files event files and other things and all you need to pass is the fact of a signature and IP addresses in real time and we can take it from there so think of us as the firemen on the network or think of this is the easy pass as you're going up the highway all we need that beeping was me that's because I was backing up just kidding my wife does that to me all the time so when you when you think about that an easy pass is a great way when you go down the highway and you go through the easy pass lane right all of us got those easy pass no I know you guys can break it we'll talk about that later but as you're going down what you're doing is just sending that code that that system is not looking in your car seeing who's in your car getting facial identification or anything like that reading the mail on that or intercepting anything it's just getting that code and what we need for cybersecurity is something analogous to that that's one of the things that I dash you to work and help push between folks here I think that'll be very important you know about se linux and se android so I'm gonna skip over those it shows that we're willing to push stuff out to industry to help provide more secure stuff here we are no I'm not gonna say who's who but we're separated at birth with a common cause I know I got a long ways to go if I'm gonna work out so I'm perhaps halfway between Danny and the other guy there I put this up there I thought it was funny but I also think it kind of sets the tone for what we should think of you know we have a common set of shared values many of the people that we that work for us have also worked with you and go back and forth Becky base look at what she did on intrusion detection systems and how she helped start a lot of the things going on in the company that she is now formed Dave Ato Ron Gula great people working significant stuff that started out at NSA and now work closely with many of you think about Deb Frankie who worked at PNNL she got funding from Becky base and now she's the deputy of research at NSA and you know other folks like Mudge and other ones like that that are in the government we need great talent we don't pay as high as some of the others we're fun to be around so think of it like that but I do think that we have to have this interchange so some of things that I want to talk about here and I'm going to get the hook is shared principles the principles upon which we should secure cyberspace and I think these set those and I just hit the last one here because sometimes you guys get a bad rap from my perspective what you're doing to figure out vulnerabilities in our systems is absolutely needed we've got to discover and fix those that's hard work takes technically swabbing the boner folks like you and you do a great job at it and you got to know the line there are some great books out there and I know all of you know those lines and I know y'all adhere to that so that's great well mostly but on the internet I think the third bullet down is what we really want to do is innovate freedom how we're going to look at where we take this next this is a great opportunity for not only our nation but for the world and you know one of the things that I'm really proud of saying is when you look at vent surf and the others we're the ones who helped develop we're the ones who built this internet and we ought to be the first ones to secure it and I think you folks can help us do that so we have that shared responsibility we have a shared responsibility to fix that and I want to talk briefly about what we're doing from my perspective and you can all pile in on this and I know Jeff has got a great way for for getting your feedback and getting that to me but when you look at it there's five things that I'm trying to do is both the director of the national security agency and the commander of us cyber command first how do you see cyberspace how do you visualize it where is the graphical user interface for cyber defense we haven't yet made the transition that the gaming industry and others have done in network security but there are opportunities here that are superb defensible architectures when you look at some of the networks in government you know the defense department's network has 15,000 enclaves how would you like to have my job defend those 15,000 when you know others are configuring those based on what they feel is right even when we pass guidance it's hard to do that so we need to come up with a more defensible architecture from my perspective we need to reduce the attack surface by going to things like thin virtual cloud that's not perfect but it's it's a step in the right direction and it helps us in the mobility area we need to look at the command and control how are we going to work with other government agencies and within the defense department here we need to set the authorities and I think that's where cyber legislation that's going on right now is so important for our country both for the information sharing side and setting the standards and perhaps the most important and what you do tremendous here and what I would like some feedback from you is training and educating people on this you know and I look at some of the courses and some of the things that you're doing from the defcon kids all the way up to capture the flag and some of the things that Jeff and you all have going what are the lessons learned on how we should now train our military and civilian force for defending our nation what are the standards that we should set what are the types of courses and the abilities that they should have to do the job that you depend on them and our allies depend and how do we share that that's one of the great things that we need to do and that's one of the things that you all can help us do and that you all makes it sound like I'm from the south and I am on south side of Syracuse so so the future what future do you want how are we going to get there from my perspective you all can help us set that future what what I want you know I have four daughters two are computer programmers one's an aeronautical engineer suede a little bit from the trap the path there one's a social worker and we need her she's she's great at it I have 14 grandchildren I know that's a lot yeah and I'm only what like 30 and you look at it it is so impressive to see the two-year-olds with D the playing with the iPads and the other systems today those things that you're helping to build they're playing with they're going to be much better educated than I was they're going to advance this a lot further so what you're building is absolutely good for our future so thanks thanks I have a couple more slides we can take cybersecurity to the next level what we need from you how we educate and train people how we see cyberspace how we build the tools of the future those tools that can help you do much more than there than we're capable of today because today it's one-on-one and when you look at cyberspace and the number of problems that we face it's one on many how do we visualize that how do we set that up for the future these are the things that we're really going to need to push on and we absolutely need you to help us do this truth and lending so as you know I told Ken you know he's out there sweet in the parking lot and he put his broom down for me says you know you're going to go out there and they're going to know that you're a fed I actually now have that t-shirt too and I didn't even get out of the parking lot before they had me sweeping the South 20 there so everybody serves that you know the reality is I want you to know from my perspective I think getting government people out here to talk and have this this dialogue is absolutely vital for our country how do we take it to the next step and I think having EFF having the social engineering having everybody here together we ought to discuss this you have great insights and we ought to help our nation solve that problem I'll tell you from my perspective it was a privilege and honor to walk to this morning with Jeff Moss and his folks and see all the great things that are going on stand up one more time sci-fi let's give sci-fi a big round of applause you know I everybody said that I was important that's the most important person for our future and the kids that you're training so Nico absolutely superb what you're doing it was a privilege and honor to meet you so thanks okay with that questions no questions I'm out of here not so lucky are these multiple choice I'm going to start with the easy one so and it's probably one of the top requested one so does the NSA really keep a file on it everyone and if so how can I see mine I'm curious to see what's in it does this mean all six billion people no just the United States just the United States you know at first there's so many things you could say are funny but I think this requires a very serious answer first no we don't absolutely not and anybody who tell you that we're keeping files or dossiers on the American people know that's not true and let me tell you why first under our agency we have a responsibility our job is foreign intelligence we get oversight by Congress both Intel committees and their congressional members and their staffs so everything we do is auditable by them by the FISA court so the judiciary branch of our government and by the administration and everything we do is accountable to them and within the administration it's from the director of national intelligence it's from the Department of Justice it's from the Department of Defense I feel like when I was a kid growing up and some of you may feel like this to you know you might get in a little trouble you're supervised a lot maybe had to spend time in the hall well that's the way I feel today we are overseen by everybody and I will tell you that those who would want to weave the story that we have millions or hundreds of millions of dossiers on people is absolutely false let me take it to the next step under the FISA amendment act we are authorized to collect foreign targets think of terrorists outside the United States and that law allows us to use our some of our infrastructure to do that we have to we may incidentally in targeting a bad guy hit on somebody from a good guy because there's a discussion there we have requirements from the FISA court and the Attorney General to minimize that which means nobody else can see it unless there's a crime that's been committed and every one of those are auditable by all those branches of government and so from my perspective the the people who would say that we're doing that should know better with another thing think of that 260 million dossiers or how many you'd come out let's see if you're trying to maintain those dossiers I'm not a real good mathematician but let's say we have 20,000 people working that how many files do each of us have to work and I'm not that kind of a guy that's going to work all those files so I think from my perspective this is absolute nonsense next so where do I get my file again okay here's a question I want to mix it up here's a question from the Twitterverse from smart alec how has military thinking progressed to consider a million front war is such a war winnable a million front meaning online right well I think today and I had a chance yesterday to be out to ask when I was asked where do we see the defense of our country in cyberspace and we have some issues we can't see that so right now on a million front war smart Alex is probably what it was Alex with an X like Alexander Alex when you I was a joke I'm sorry I work it oh I can go slower when you think about it first we've got to be able to see it then we have to have the ability to share that information and then we have to have what we talked about is the tools to actually take on a million front and that's where you're gonna have to come in and help us and that's where we're gonna have to work together because that's not something today that we're ready to do and one of the other questions that goes along with it is the offense does it have the advantage and especially if you can't see it yes they do so those are the things that the government both parts of Congress and the administration are working to address right now so so you're in a very unique position on stage on stage right at my conference in that there's never been before a single person in ahead of both the NSA and a newly hey watch I've got to pay for that and a and the newly formed cyber command so do you have sort of a split personality you wake up sometimes at night you know cyber command NSA how do you decide or how is that line made and and is that a productive way to go forward with the defense of the country yes no which hat was which actually I think it absolutely is the right way to go just you know two hats I don't get to paychecks I found that out last week actually when I came into the job I've been in the job now almost seven years and you might wonder why is he been in the job so long first they said you have to do a few things that are important before you can leave so I'm gonna be there for a while when I came in I was actually the director of NSA and the commander of the joint functional component command that warfare so I was always dual-headed or triple headed because we count the chief's central security services a third hat and so from my perspective the team the Defense Department and the intelligence community team that works on the network that helps defend the network NSA has both the foreign intelligence in the information assurance side so that team that has those skills cyber command needs to work with and if we couldn't leverage that team we'd have to go build another team and it doesn't make sense because we could never build the capability that we have at NSA we couldn't rebuild it we couldn't afford it would take us years so we need to leverage it many of our allies are doing similar things and it makes a lot of sense in fact what that really gets us to is this cyber team concept so within the Defense Department we built that team together within our government we have the FBI DHS Cyber Command and NSA that's the government cyber team then we have industry and now you that's the team our nation needs and then we need to work with our allies to secure cyberspace and that's where I think we need to go yeah that's actually a perfect feed into my next question which is how does NSA cooperate with others not just you know our allies or our favorite friends but people who are maybe on the fence you know you still have to share information so do you see that as a critical component of future success is actually information sharing and reliance on other people is you can't do it all yourself you know what we as I said we have great people and you know some of these great people and what they take to their heart is we have a couple of missions that we have to perform we don't want a terrorist attack on our country and that's first and foremost in our mind we don't want a cyber attack on our country we don't want your critical information getting hacked into in bank accounts and other things going down when we look at vulnerabilities and we discover those we look at those and we share those with industry now it might not be with a big NSA moniker on it we would actually work that with DHS and FBI push that out to them for the good of the country what I am really proud of is the way our people look at that and do that for the good of this country so when you see a lot of these vulnerabilities that are getting fixed many of those our folks have found and many of our folks found those by working with you so thank you okay I've only got a couple questions left so it's organizational question from Dave I tell and how big should cyber command be ultimately bigger than the Navy bigger than the NSA well that's a good question big enough to do the job I clearly do not see it bigger than the Navy or any other service in fact I do see the mission growing and the real issue is for the good of our country we have an economic crisis many of you may not heard about that one of the things that I and many of the folks in government feel is that we should fix that on our wives so we don't want to grow the military and other things way up to solve a problem so one of the issues that I would throw back to you all this help us come up with the tools that would allow us to do this not one on a million everybody taking one of those million which would mean a million person cyber force but how do you do this and scale it and how do we get the talent and the people that we need from my perspective I believe that when we look at the cyber community that we have today what we're actually building together is our ops and defend people bringing together with the exploit and the attack people and what we're looking at is the ops and defend people under our legacy system is really big and so if we could go to the new architecture you would need less of these type of people say sis admin in this kind and more that we could then train to be full spectrum cyber security folks trained to your standard that would know how to find people penetrating the networks and that's what I think we've got to do so what I would like is to try to actually evolve our community and shift it to where we need to be not to grow it per se now will we need to grow in some areas absolutely but we'll shrink in others and I think at the end of it when I look at it what I've told the chairman of the secretary of defense I think we can actually do both missions with less people in the future with some of the technology that we have coming on and with your help so that that brings me up to a personal question which is an automation so we're a pretty big country 300 plus million or so but botnets can have millions of nodes and if it's a one-on-one type of game you know we're gonna lose if it's a one on one of our defenders against one of their attackers you'll never win that game so you have to automate and so so to me and I'm curious does NSA see the future as is sort of automation automate everything you can and then learn how to automate everything else so we keep humans doing the human jobs the challenging jobs that computers can't do is that's in my view is probably only the one way that we can tackle this problem is there sort of similar thinking well I think you've hit it on the head I would tell you that and you would work your way through it just as you did there that it makes sense to automate where we can and as many of you know who automate things to have people who can reverse engineer it and say is this a viable concept this automation or do I have a real problem you know I built an enigma machine and then find out that somebody broke through it when I trusted implicitly that this was good to go right and the reality you know so this is secure nobody can hack into it and then we find out as everybody's hacking into it and the only one who thinks it's secure is me right that would be a big problem so I think what we want is the combination automate where we can have real time capabilities to defend and have people great people trained to a standard that can help bring all that together and continue to grow this so as you look at what you do here every year you get a chance to look at evolving technology look at what's happened in the 20 years that you've had your folks here and we've brought this group together and look at what you discussed 20 years ago and the state of the art and look at where the state of the art is today it's superb this is phenomenal one of the greatest things going on right now and the trend for the future you know you guys are the greatest demand in demand for our nation and so when you think about that now the thing is so we would want to automate and we want to move it to the next step and we want to people that can help us get there and continue to climb that that road share it with our allies build the best network in the world secure the freedom domain that I started out with I think that's what we will all want to get to and I think we can get there along the way it doesn't mean that people aren't going to throw rocks at it and try to take it down and we've got to be able to stop that go ahead yeah so here's your final question so if you could have a perfectly secure internet or a nicely insecure internet which would you choose I would I would choose this the perfectly secure internet here's why I think it is in our nation's best interest look at all the intellectual property that we've lost over the past decade it's huge that's our nation's future that's the future for young folks like sci-fi and others that means others will take advantage of that intellectual property at our expense and same with our allies they're having the same thing happen and so if we could fix that that would help us on our economic growth this would be huge for our country and this this area that we're talking about is the fastest growing area in our nation for the past three decades look at what makes up our the Dow industrial the NASDAQ look at all the companies that deal in this sector that's what fuels our economy that's where we need to be so from my perspective for my grandchildren for you all for us that's what we need to do and I think it's doable it's not going to be easy and I think we should go at it with a thought of it'll never be perfect we can't get to perfect but we can come really close I didn't mention in one of the slides that our nation created two cryptologic systems SIG ABBA and SIG Sally these were both data and voice communications that were used during World War two we were able to crack our adversaries communications and protect our own we can do this in cyberspace and continue to build towards a perfect internet that would be good for the world and we ought to all push for that and I think when you bring in not only our great talent here but those of our allies I think that's absolutely superb all right that brings this session to a close so let's have a round of applause for general