|
|
|
|
|
|
|
|
|
|
Mr. FRANKS of Arizona. Mr. Speaker, I know that it comes as no surprise to this House that I have been one very critical of this administration's policies on a number of different fronts, and I suppose that will be no different tonight. But Mr. Speaker, I guess I wanted to start out tonight by addressing the WikiLeaks issue. I know that a lot of people across America have looked upon this with interest, and I guess it's significant in my mind that what we've seen on the WikiLeaks issue is really more confirmatory than it is anything that's informative. In many ways what the WikiLeaks information has demonstrated is that this administration has practiced for a long time a foreign policy of appeasement, and I think it has been a disaster for our country, Mr. Speaker.
I suppose it goes without saying that the most pressing question is how a 22-year-old private first class in a remote location in Iraq could have gained access to so many of these documents, especially since they are far outside his scope of responsibilities. It represents, really, a glaring failure on parts of the State Department and even some parts of the Defense Department. And some of these commonsense security measures could have been implemented prior to this. The Pentagon has since announced that it will be implementing new policies, including a technology that makes it impossible to copy classified documents to portable storage devices. Now the fact is that it has taken too long for such a commonsense policy to sink in, and this administration certainly had lead time to consider this long before now, but I guess it is, in a sense, indicative of why bureaucracies are so inefficient most of the time. It took the leak of hundreds of thousands of sensitive documents before this government decided to get up to speed with the unique risks posed by one of the most basic modern conveniences, that being the computer.
Private Bradley Manning, the U.S. Army soldier suspected of leaking the documents, and WikiLeaks founder Julian Assange hid behind the claim that the government's so-called 'lack of transparency' is unjustified. This is their main reason for justifying their own actions, Mr. Speaker. Unfortunately, in that process they have provided a wealth of aid and comfort to groups that are at war with the United States of America. Of course Mr. Assange claims to be fighting for truth and transparency. The reality is that his desire to promote himself has outweighed his concern for scores and perhaps hundreds of innocent lives that he has endangered with his reckless publicity in this kind of a stunt in the guise of some greater cause.
But Mr. Speaker, it's telling that the foreign media sometimes is almost more comforting to justice than the American media sometimes. The American media willingly complied in disseminating this information and they are complicity, in my judgment, in any harm that will come to American service members or American personnel across the country as well.
Just to give you an example, Mr. Speaker, the same New York Times that was reticent to cover the story that's often referred to as 'Climategate' willingly ran the WikiLeaks cover story on the front page of their newspaper. Now this is a hypocrisy, Mr. Speaker, that I think is absolutely astounding. In other words, just to put it in perspective, I will just read what one of the bloggers there of The New York Times said. Andrew Revkin of The New York Times, he is actually a reporter, was one of the first ones to cover Climategate. And in his first story only a matter of a few hours after Climategate's blog posted, in his story he states, 'The documents'--this is the Climategate documents, Mr. Speaker--'appear to have been acquired illegally and contain all manner of private information and statements that were never intended for the public eye, so they will not be posted here.' Well, how gallant, how noble of Mr. Revkin to want to protect some of his perhaps liberal friends from being exposed in some of the over-hyped notion of global warming, but yet when people's lives are at stake, when American national security is at stake, then all of a sudden The New York Times is all too willing to publish the WikiLeaks information in the interest of full disclosure and grand journalism, and I find that unbelievable, Mr. Speaker. If the Times reporters had felt such urges of chivalry when it comes to protecting the men and women who give up their lives so that we can all sleep peacefully at night, it's just a strange time for them to do that. And to cap it all off, Mr. Speaker, it is rumored that the leading candidate for Time magazine's 'Man of the Year' now is none other than WikiLeaks' Julian Assange.
Mr. Speaker, before I yield to one of my colleagues here, I would just like to say that, unlike authoritarian regimes across the world, democratic governments like ours hold secrets largely because citizens agree that they should in order to protect legitimate policy and national security. But this massive breach of our national security has endangered our ability to build trust and cooperation with our allies, it has certainly not served the public's interest, and most of all, it has strengthened and emboldened our enemies. Mr. Assange and WikiLeaks should be profoundly ashamed, and I think they should be pursued with whatever legal actions can be brought, and of course The New York Times, for their complicity in this effort, should be ashamed beyond measure.
With that, I would like to yield to my good friend, Congressman Lamborn from Colorado, to see if he has any thoughts.
[...]
Mr. FRANKS of Arizona. Well, thank you, Mr. Lamborn. It is my judgment that this would probably be a good time to transition to that. And we would also like to hear from Congressman STEVE KING from Iowa. STEVE, do you have any thoughts about this? Because some of these national security issues I know DOUG and I are kind of obsessed with them--for good reason, but we know that they care about national security in Iowa as well.
[...]
Mr. FRANKS of Arizona. I guess, Mr. Speaker, I would like to agree with the gentleman from Colorado because, you know, many of us, including the gentleman from Colorado, including the gentleman from Iowa, were very vociferous in saying that there would come a time where it would be obvious to the world that these civilian trials wouldn't work for enemy combatants that are terrorists that were taken off the battlefield in Afghanistan or Iraq or wherever it might be, because we knew that this would give al Qaeda and other terrorist groups a perfect opportunity, a staging ground, as it were, to be able to manipulate our system.
Not only does it give them the ability to have discovery where they are able to potentially undermine our security apparatus and gain information that is critical to protecting our agents in the field, but this also gives them the ability to claim all kinds of things before the world. And of course you know the security elements of it are astonishing. And of course they use our own court system and our own court rules to make it very possible for them to escape justice.
I thought, to paraphrase President Bush, he said something like this. He said, We should not allow our enemies to use, to destroy liberty by using the forums of liberty to destroy liberty itself. And the reality is is that sometimes we can become victims of our own ostensible decency.
And this administration, in its kowtowing to terrorists, has been more committed to protecting terrorist rights than it has been to protecting the lives of American citizens. And I think that is profound beyond anything I could suggest.
Because it just tells me that somehow the administration has a philosophical bent that is going in a way that I think endangers American freedom and future generations. And I am hoping that somehow they will wake up in time. But yes, the gentleman is correct that WikiLeaks, among other things, has exposed once again this administration's effort to try to put these combatants in different countries to try to avoid the trap that they have set for themselves in America by insisting that this be done in civilian trials.
|
|
Name(s:) |
Trent Franks (R-AZ) |
|
Title: |
United States Representative |
|
Agency(ies): |
United States House of Representatives |
|
Url: |
Url Link
|
|
|
Mr. LAMBORN. I thank the gentleman for yielding.
Let me point out that, to its credit, The Wall Street Journal did not accept he offer to disseminate these WikiLeaks latest round of documents from the diplomatic arena, and I think that that is to their credit. Unfortunately, The New York Times did not have the same scruples, which is extremely disappointing to me.
Representative Franks, as we look at some of the reports of what were contained in these diplomatic leaks, there are some really troubling national security implications that arise. One is that we find, for instance, that it is confirmed that Iran has received 19 advanced missiles from North Korea. Now we have long suspected that there have been ties on a covert basis between those two countries, we have some evidence of that; this just makes it more of a glaring issue. And our administration needs to be doing more, not just to stop WikiLeaks in the future from revealing our national secrets, but in stopping Iran and North Korea from the propagation of deadly nuclear and missile technology that they seem to be doing. The fact that Iran has received 19 advanced missiles from North Korea, each of which is capable of reaching Western Europe or even Moscow, is very troubling to me. These are our NATO allies that we are bound to defend if they are attacked, and I don't think our administration is doing enough to stop the propagation, the dissemination of deadly technology from North Korea to other countries.
When we are done talking about WikiLeaks, Representative, I would like to make sure we talk more about some of these national security implications as well.
I would like to yield back at this time.
[...]
Mr. LAMBORN. I think this recent civilian trial of the person formerly who was in Guantanamo Bay, who was tried in New York City, I believe, who was found not guilty of about 250 counts of murder--although that's about how many people were killed in the terrorist attack on the embassy in Africa--but was found only guilty of conspiracy to destroy government property when over 200 people were murdered in that terrorist attack shows the weakness of using civilian trials to try these terrorists who are committing acts of war against our country.
And the WikiLeaks documents, getting back to those, show that this administration has been trying to place these Guantanamo detainees in other countries around the world, like Saudi Arabia. They are offering them money. They are offering them concessions if they'll take some of these people off of our hands so that the President can move closer to his goal of closing Guantanamo Bay. But that is a misguided policy from day one.
These people should not be released. I think Saudi Arabia said in one of the cables that was disclosed, or they said later on, that they would just release the people eventually if they were sent to their country and they would ultimately, as we know from cases in the past, many of them would find their way back to the battlefield where they would kill Americans or American allies.
So I think that the whole misguided policy of Guantanamo Bay being closed is exposed by some of these WikiLeaks documents. But still, these should have never been disclosed in the first place. This administration needs to find a way to punish those involved and make sure it never happens again. |
|
Name(s:) |
Doug Lamborn (CO-R) |
|
Title: |
United States Representative |
|
Agency(ies): |
United States House of Representatives |
|
Url: |
Url Link
|
|
|
Mr. KING of Iowa. I thank the gentleman from Arizona for yielding and for managing this Special Order here tonight and for bringing this issue, Mr. Speaker, before the American people.
This is a critical national security issue. And I'm so grateful that we have individuals here in this Congress, as intended by our Founding Fathers, that focus on a variety of issues that could clearly see and be focused on the intelligence that can bring this before the American people in such a way that they can understand, Mr. Speaker, that you will turn your focus hopefully on this subject matter. There has been a lot of discussion across the country now and in the news media about the WikiLeaks issue. And I look at this, and I think Julian Assange, an Australian citizen, a person who made his living as a hacker, a person who is proud of being able to crack anybody's security code and get in there and pull that information out and then dump it into the public arena, into the public media sphere. For what purpose? What possible constructive purpose could be achieved by an individual who is a product of Western civilization pouring forth state secrets from Western civilization itself? It has to be for either self-aggrandizement, for that or the combination of undermining Western civilization. An enemy, an enemy of the things that we believe in.
And I don't stand here with the intent to indict the Aussies. I love the Australians. They are a free spirited, strong free market, free will group of people. They had to also take a continent and settle a continent about the size of the United States itself and make a living down there in an environment that's sometimes beautiful and sometimes harsh. They have a spirit of their own. They remind me that in every conflict that the United States has been in they got there first, and some of them they've been in all of them. It's a pretty good thing to say about the relationship between the United States and Australia.
There's not much to say about their citizen--whom I wish today were an American citizen, and at that point I think he might be subject to charges of treason against the United States.
So as I listened to the speakers here, I reached into my dog-eared Constitution and took up this definition, the constitutional definition of treason, and it says--and I know that some have called for charges of treason to be brought against Mr. Assange. I know they apply to an American citizen. But this says, Article III, section 3: Treason against the United States shall consist only in levying war against them or in adhering to their enemies--which certainly al Qaeda and the Taliban and the enemies of the terrorists who are lining up against us are our enemies--and giving them aid and comfort, giving aid and comfort to the enemies.
Well, Mr. Speaker, I think it's a subject that we wouldn't have much debate on here in this Congress that Mr. Assange has given aid and comfort to the enemy. He's empowered the enemy. He's put Americans at risk. He's put the allies of Americans at risk. And in this precarious situation around the globe, in this geopolitical-military-economic chess game that goes on constantly on the entire planet, he's taken away some of our advantage and he's given it to our enemies.
And I wish and I hope that there's a way that we can find a way to prosecute a man like that, that we can protect ourselves. And if we fail to do that, or even if we're successful in that and it exposes some other vulnerabilities, I suggest, Mr. Speaker, that this Congress take a look at some new legislation, a new structure of law, that's really not brought about because of the actions of Mr. Assange but brought about because of the actions of our enemies, our terrorist enemies.
And I have come to realize, and I think that there will be a significant number of Members of Congress that have come to realize, that we don't have the tools to fight these enemies; that the idea that we could catch terrorists like, for example, Osama bin Ladin's chauffeur, and we can't find a way to try that chauffeur and put him on trial with legitimate expectations of an effective prosecution and a conviction and a penalty.
We have Khalid Sheikh Mohammed sitting down in Guantanamo Bay yet. Two years into the Obama Presidency, when President Obama said he was going to close Guantanamo Bay and try these terrorists in civilian courts, and now we found out what happens when you try these terrorists in civilian courts--a whole bunch of evidence that's essential to the conviction has been left out of the prosecution, and they were not successful in an effective prosecution and conviction of the last terrorist that was tried in civilian court.
So I look at this and I make the charge that I think our military tribunals are a useful way to do this and Guantanamo Bay is the best place on the planet to keep them. But we don't quite have the legislative tools. We don't have the judicial tools.
I'm hopeful that this Congress will consider a proposal that's rooted in this thought; that we will set up a special court like a FISA court, or perhaps even the FISA court, and ask them to immediately adjudicate when we catch somebody that's working against the United States, that's perpetrating terrorism against the United States, and be able to process them immediately through a special court, and have that court be able to rule that this was an attack against Americans or whether it was an attack against America's civilization that was designed to spread terror and fear here rather than a crime that was committed against individual Americans, and be able to rule that that individual then fit within the category of an enemy of the United States, an enemy in this war on terror that we have, and then instantly move them off of the shores of the United States and down to Guantanamo Bay or another jurisdiction that's even further removed from these courts, and under Article III, section 2, strip these Federal courts from the jurisdiction of ruling upon these decisions of terrorists that are attacking America.
If we do that--and it's a pretty sticky constitutional question on how we would deal with American citizens in that category, but it's not when we deal with someone like Julian Assange. An Australian citizen could be put into that category, moved over to a place offshore of the United States outside of the jurisdiction of the Federal courts, the civilian Federal courts in the United States, and adjudicated under a military tribunal in a fashion that was designed by this Congress and directed by this Congress. That's what I'm hopeful that we'll be able to do.
[...]
Mr. KING of Iowa. I thank the gentleman from Arizona. And I reflect upon a trip that I made down to Guantanamo Bay I believe it was a year ago last Easter. And the trip was designed to fill me and a handful of other members on the Judiciary Committee in on the practices and the facilities that they had at Guantanamo Bay. And I think this is something that the American people have not had an opportunity to witness or actually hear about within the news, that there is a facility that's perfectly structured for the job that we have, which is to bring these terrorists to a location and legitimately try them and give some resolution to their circumstances.
And I don't remember the exact number of inmates that they had down there at the time, but it was down to the hard core of the hard core. They had already released those that could be released. And the rest of them were a danger to Americans, a danger to free people everywhere, and a danger if they were released to come back, and as Mr. Lamborn said, to attack Americans again, but also NATO troops and other people that represent the free world.
And as we are looking at that facility, oh, it's a pretty wonderful facility if you want to be in a jail and be a Muslim, for example. And you walk into these cells, first of all the temperature is set at 75 degrees. Seventy-five. My house is a lot warmer than that in Iowa in the summertime. Because 75 degrees, they argued, was their cultural temperature. And I don't know that that's true. I would think 140 degrees is more likely s |
|
Name(s:) |
Steven King (IA-R) |
|
Title: |
United States Representative |
|
Agency(ies): |
United States House of Representatives |
|
Url: |
Url Link
|
|
Title: |
Trent Franks, US Representative from Arizona |
|
Authoring or Creator Agency: |
LittleSis |
|
|
Title: |
Doug Lamborn, US Representative from Colorado |
|
Authoring or Creator Agency: |
LittleSis |
|
|
Title: |
Steve King, US Representative from Iowa |
|
Authoring or Creator Agency: |
LittleSis |
|
|
Title: |
House Session, Nov 30, 2010 |
|
Authoring or Creator Agency: |
C-SPAN |
|
|
|
|
|
|
|
|
|
|
|
|
Prosecution: How long did you chat with bradass87? Lamo: Over a period, May 20 through May 26. |
|
Name(s:) |
Candice Miller MI-R |
|
Title: |
United States Representative |
|
Agency(ies): |
United States House of Representatives |
|
Url: |
Url Link
|
|
Title: |
Candice S Miller, US Representative from Michigan |
|
Authoring or Creator Agency: |
LittleSis |
|
|
Title: |
Representative Candice Miller on WikiLeaks, Dec 1, 2010 |
|
Authoring or Creator Agency: |
C-SPAN |
|
|
|
|
|
|
|
|
|
|
|
Title: |
Frederick P. Hitz, Senior Fellow, Center For National Security Law, Lecturer, University of Virginia Law School |
|
Authoring or Creator Agency: |
Center For National Security Law, University of Virginia |
|
|
|
Archive Link |
|
Title: |
Legal Issues in the WikiLeaks Case, Dec 8, 2010 |
|
Authoring or Creator Agency: |
C-SPAN |
|
|
|
|
|
|
|
|
|
|
|
Title: |
WikiLeaks Release of Classified Documents, Dec 16, 2010, Heritage Foundation with Former Assistant Deputy Secretary of Defense on Detainee Affairs Cully Stimson and former Deputy Assistant for Homeland Security Paul Rosenzweig |
|
Authoring or Creator Agency: |
C-SPAN |
|
|
|
|
|
|
|
|
|
|
|
|
We consider this reporting from posts around the world to be one of our most valuable contributions to every facet of national security, and we share this diplomatic reporting through automatic dissemination to over 65 agencies based on profiled requirements these agencies provide to the Department. Recent events have not changed our commitment to sharing this vital information.
WikiLeaks Disclosures and State Department Mitigation Actions
July 2010
When DoD material was leaked in July 2010, we worked with DoD to identify any alleged State Department material that was in WikiLeaks' possession. We immediately asked Chiefs of Mission at affected posts to review any purported State material in the release and provide an assessment, as well as a summary of the overall effect the WikiLeaks release could have on relations with the host country.
Following the completion of the review in August, when it was believed that purported State cables might be released, the State Department instructed all Chiefs of Missions to familiarize themselves with the content in the Net Centric Diplomacy (NCD) database should a release actually occur.
[_]
November 2010
When the press and WikiLeaks announced that they were going to release purported State cables starting on November 28, 2010, the State Department took the following immediate actions: 1) Established a 24/7 WikiLeaks Working Group composed of senior officials from throughout the Department, notably our regional bureaus; 2) Created a group to review potential risks to individuals; and 3) Suspended SIPRNet access to NCD (SIPRNet is a DOD network).
The Department also created a Mitigation Team to address the policy, legal, security, counterintelligence, and information assurance issues presented by the release of these documents. During this period, the Department kept Congress apprised of both the international fallout caused by the WikiLeaks' disclosure and the steps undertaken to mitigate them. The Department convened two separate briefings for members of both the House of Representatives and the Senate within days (December 2, 2010) of the first disclosure by WikiLeaks and appeared twice before the House Permanent Select Committee on Intelligence (December 7 and 9, 2010).
[_]
Ongoing Mitigation Efforts
State continues its thorough review of policies and procedures related to information security to ensure that they fully meet the current challenges. Efforts are being coordinated throughout the Department, as well as with the interagency, to ensure that we share classified information in an effective and secure manner with those who need it in their work to advance our national security.
While the Department already had strong safeguards in place, we have further enhanced and updated our computer security policies that prohibit the downloading of classified information to removable media (e.g., thumb drives, CDs/DVDs) on the Department's classified network. The Department continues to deploy an automated tool that audits and monitors the Department's classified network to detect anomalies that would not otherwise be apparent. This capability is backed up by professional staff who promptly analyze detected anomalies to ensure that they do not represent threats to the system.
The NCD database of diplomatic reporting and the State Department's classified web sites, although now inaccessible through SIPRNet, remains available via the more limited distribution Joint Worldwide Intelligence Communications System (JWICS). Throughout, the State Department has continued to share its diplomatic reporting among federal agencies through its traditional system of cable dissemination.
To heighten awareness of what is and is not permitted when working on the Department's classified network and on classified systems, user awareness reminders are now available for Department employees on its classified network, in addition to the standard in-person briefings about handling classified material and a soon-to-be-released computer-based course on identifying and marking classified and sensitive information.
In addition, the Department is exploring solutions to improve how we share and protect information with those who are not direct recipients of our telegrams. One such solution would involve the creation of a website with a searchable database that would allow appropriately cleared personnel to use key word searches to discover relevant State cables; the search would reveal cable metadata, such as the subject line, but would not provide the full text of the cables in a potentially vulnerable database. This would ensure that cleared personnel are aware of cables they have an operational or strategic need to see. Cleared personnel from other agencies would then be able to seek cables necessary for their work functions through their own organization's internal distribution system. The responsibility will be on the receiving, not the originating, agency to disseminate information to its internal personnel.
The Department has continued to work with the interagency on information management issues by participating in meetings of the new Interagency Policy Committee (IPC) chaired by the Special Advisor for Information Access and Security policy as well as existing IPCs such as the Information Sharing and Access IPC. |
|
Name(s:) |
Patrick Kennedy |
|
Title: |
Under Secretary for Management |
|
Agency(ies): |
Department of State |
|
Url: |
Url Link
|
|
Archive: |
Archive Link
http://archive.is/OfVrA |
|
|
On August 12, 2010, immediately following the first release of documents, the Secretary of Defense commissioned two internal DoD studies. The first study, led by the Under Secretary of Defense for Intelligence (USD(I)), directed a review of DoD information security policy. The second study, led by the Joint Staff, focused on procedures for handling classified information in forward deployed areas. The Secretary also tasked the Director of the Defense Intelligence Agency to stand up an Information Review Task Force to assess, in concert with interagency participants, the substance of the data disclosed.
Results of the two studies revealed a number of findings, including the following:
Forward deployed units maintained an over-reliance on removable electronic storage media. Roles and responsibilities for detecting and dealing with an insider threat must be better defined. Processes for reporting security incidents need improvement. Limited capability currently exists to detect and monitor anomalous behavior on classified computer networks.
Once the studies were concluded and the results reported to the Secretary, the Department began working to address the findings and improve its overall security posture to mitigate the possibility of another similar type of disclosure. Some of this work was already planned or underway. For other findings, like the issue of removable media, new initiatives had to be immediately implemented. |
|
Name(s:) |
Teresa Takai, Thomas Ferguson |
|
Title: |
Chief Information Officer, Principal Deputy Undersecretary |
|
Agency(ies): |
Department of Defense |
|
Url: |
Url Link
|
|
Archive: |
Archive Link
http://archive.is/OfVrA |
|
|
As the IC Information Sharing Executive (IC ISE), my main focus today concerns classified information - and, in particular, information that is derived from intelligence sources and menthols, or information that is reflected in the analytic judgements and assessments that the IC produces. I want to be clear, though, that our concern for the protection of information is not restricted to the fragility of sources and methods, but extends as well to broader aspects of national security. We recognize, and will hear today, that the Departments of State and Defense, as well as other federal agencies, themselves originate classified national security information that is vital to the protection of our nation and conduct of our foreign relations,a and this information, widely distributed, and used throughout the government to achieve these objectives. As we have seen recently, the unauthorized disclosure of any form of classified national security information has serious implications for the policy and operational aspects of national security. |
|
Name(s:) |
Corin Stone |
|
Title: |
Intelligence Community Information Sharing Executive |
|
Agency(ies): |
Office of the Director of National Intelligence |
|
Url: |
Url Link
|
|
Archive: |
Archive Link
http://archive.is/OfVrA |
|
|
In the five years since Congress directed the creation of the Information Sharing environment, significant steps have been taken towards establishing a string foundations. Important mission initiatives, such as the Nationwide Suspicious Activity Reporting Initiative, and core capabilities and enablers, such as the National Network of Fusion Centers and the National Information Exchange Model, have produced results and show ongoing promise_
The WikiLeaks breach is not principally an information sharing problem; at its root a bad actor allegedly violated the trust placed in him. |
|
Name(s:) |
Paul Kshemendra |
|
Title: |
Program Manager for the Information Environment |
|
Agency(ies): |
Office of the Director of National Intelligence |
|
Url: |
Url Link
|
|
Archive: |
Archive Link
http://archive.is/OfVrA |
|
|
Takai told Senate members that Defense Secretary Robert M. Gates immediately called for two internal studies to review the department's information security policy and to unveil how classified information is handled in forward-deployed areas. The results showed that forward-deployed units had an 'over-reliance' on using removable electronic storage media, Takai said. |
|
Name(s:) |
Terri Moon Crunk |
|
Agency(ies): |
American Forces Press Service, Department of Defense |
|
Url: |
Url Link
|
|
Archive: |
Archive Link
http://archive.is/4DMyk |
|
Title: |
Information Sharing and WikiLeaks |
|
Authoring or Creator Agency: |
C-SPAN |
|
|
Title: |
Information Sharing in the Era of WikiLeaks: Balancing Security and Collaboration |
|
Authoring or Creator Agency: |
Senate Committee on Homeland Security and Governmental Affairs, United States Senate |
|
|
|
Archive Link |
|
Title: |
Congressional Record |
|
Authoring or Creator Agency: |
United States Government Printing Office |
|
|
Title: |
Congressional Record |
|
Authoring or Creator Agency: |
United States Government Printing Office |
|
|
Title: |
Congressional Record |
|
Authoring or Creator Agency: |
United States Government Printing Office |
|
|
|
|
|
|
|
|
|
|
|
|
Q Thanks, Mr. President. Experts say they can't recall a time when the U.S. ever had to rush assistance to a nuclear power plant in another country before. What can you tell us about how serious this is with the U.S. rushing coolant to Japan because of the nuclear plant there?
And then, a second question -- the State Department spokesman, PJ Crowley, said the treatment of Bradley Manning by the Pentagon is ridiculous and counterproductive and stupid. And I'm wondering if you agree with that. Thank you, sir.
THE PRESIDENT: On point number one, when I spoke to Prime Minister Kan, I specifically asked him about the nuclear plants and their potential vulnerability as a consequence of the earthquake. He indicated that they are monitoring the situation very closely. So far, they have not seen evidence of radiation leaks. But, obviously, you've got to take all potential precautions. And I've asked Steve Chu, our Energy Secretary, to be in close contact with their personnel to provide any assistance that's necessary, but also to make sure that if, in fact, there have been breaches in the safety system on these nuclear plants, that they're dealt with right away.
With respect to Private Manning, I have actually asked the Pentagon whether or not the procedures that have been taken in terms of his confinement are appropriate and are meeting our basic standards. They assure me that they are. I can't go into details about some of their concerns, but some of this has to do with Private Manning's safety as well.
Q Do you disagree with PJ Crowley?
THE PRESIDENT: I think I gave you an answer to the substantive issue. |
|
Name(s:) |
Barack Obama |
|
Title: |
President of the United States |
|
Agency(ies): |
White House |
|
Concerning: |
United States v. Pfc. Bradley Manning, Unlawful Pretrial Confinement, Article 13 |
|
Url: |
Url Link
|
|
Archive: |
Archive Link
http://archive.is/Ja6bK |
|
Title: |
Presidential News Conference |
|
Authoring or Creator Agency: |
C-SPAN |
|
|
|
|
|
|
|
|
|
|
|
|
Q A quick question. Is the President going to take any questions in the Rose Garden today?
MR. CARNEY: I believe it's -- he will be just issuing a statement today.
Q And given -- a quick follow-up -- since he won't be -- I won't have or anyone won't have an opportunity to ask him, he said that he'd asked the Pentagon last week whether the treatment of Bradley Manning was appropriate. I'm just wondering if he believes personally that the treatment of Bradley Manning is appropriate, and what we can read from the fact that just a day later they changed the conditions under which he was being held.
MR. CARNEY: I would refer you -- I would not expand beyond what the President said in terms of his personal reaction to the question. And I would point you to the statements the State Department and the Defense Department have made on that.
Yes. |
|
Name(s:) |
Jay Carney |
|
Title: |
Press Secretary |
|
Agency(ies): |
White House |
|
Url: |
Url Link
|
|
Archive: |
Archive Link
http://archive.is/zbGWN |
|
Title: |
Press Briefing by Press Secretary Jay Carney, Chairman of the Nuclear Regulatory Commission Greg Jaczko and Deputy Secretary of Energy Dan Poneman, 3/17/2011 |
|
Authoring or Creator Agency: |
Office of the Press Secretary, White House |
|
Concerning: |
"United States v. Pfc. Bradley Manning, Unlawful Pretrial Confinement, Article 13 |
|
|
|
Archive Link |
|
Title: |
White House Daily Briefing, Carney Portion |
|
Authoring or Creator Agency: |
C-SPAN |
|
|
|
|
|
|
|
|
|
|
|
Title: |
Attorney General Eric Holder Speaks About the Department of Justice's Priorities and Mission |
|
Authoring or Creator Agency: |
Department of Justice |
|
|
|
Archive Link |
|
Title: |
Attorney General holder Address to Employees |
|
Authoring or Creator Agency: |
C-SPAN |
|
|
|
|
|
|
|
|
|
|
|
Title: |
Fiscal Year 2012 efense Authorization Mark Up, Part 1 |
|
Authoring or Creator Agency: |
C-SPAN |
|
|
Title: |
James Langevin, US Representative from Rhode Island |
|
Authoring or Creator Agency: |
LittleSis |
|
|
|
Archive Link |
|
|
|
|
|
|
|
|
|
|
|
Mr. LANGEVIN. Let me just say how proud I am to support the FY 2012 Intelligence Authorization Act. I appreciate the leadership of both Chairman Rogers and Ranking Member Ruppersberger in crafting this bill. This has truly been a bipartisan effort of which I have been proud to be a part.
I am pleased that this bill includes funding to accelerate implementation of an insider threat detection program, and that's both on the cyber front but also in cases like the Hasan case that was tragically in the news and that occurred not long ago and cost many lives.
This bill basically requires best practices implemented within the Army to be reviewed for inclusion across the intelligence community. That's referring to their insider threat detection program.
In addition, the bill supports critical resources needed for cybersecurity, the broader cybersecurity threat, a threat which demands the attention of our national security specialists and the entire country.
As the successful operation against Osama bin Laden showed us earlier this year, the intelligence community has made significant strides toward working together to counter the most complex threats facing our Nation. This productive cooperation and integration embodies the intent of Congressional intelligence reforms made after the tragic events of 9/11, and I'm encouraged to see this progress in the area of information-sharing.
Yet while the sharing of classified information is imperative to keep our country safe, unrestrained and unregulated access can put our country at great risk. As we have seen from both the damage of WikiLeaks and historical espionage cases, the threat from a malicious insider with the keys to the kingdom is very real. We are far beyond the risk of paper documents being copied and carried out. Today the question is how much information can a potential leaker or spy fit on to a USB drive or a CD.
Although technological advances have strengthened the efforts of our intelligence community, they have also increased the risk.
Now, with this serious concern in mind, I'm proud that this bill requires the DNI to review improvements made by the Army's insider threat regulations and consider implementation of these practices across the entire intelligence community.
In addition, the bill accelerates other technical initiatives within the insider threat program. I believe it's imperative that we ensure that our security officers and network administrators have the capabilities in place to protect our most sensitive information. Now, in view of the enormous resources spent on security clearances, protecting classified information, and securing networks across the globe, it also makes fiscal sense to protect our investment by taking advantage of the auditing software already available today. The access to classified information bears with it significant responsibilities, one that I know that I and my colleagues on the committee take very seriously. The other serious threats which this bill addresses are the risks posed to our broader cyber networks. Now, I'm proud that it strengthens resources and it furthers the administration's efforts to address the threats of our critical infrastructure. I know that that is something that is also shared by my colleague, Congressman Ruppersberger.
The CHAIR. The time of the gentleman has expired.
Mr. RUPPERSBERGER. I yield the gentleman 1 additional minute.
Mr. LANGEVIN. While I applaud the administration's work, I think that we need to go further to raise awareness and work with both public and private sector partners to meet this threat. We cannot afford to continue operating with the massive digital vulnerabilities to not just our sensitive information but also our important intellectual property that makes up the foundation of our innovative economy. Addressing these threats must become a national priority, and we must work quickly to grow our current and future cyber workforce to fill the rising demand for cybersecurity information assurance.
This bill helps secure our sensitive information and vital networks to threats from malicious actors beyond our borders and on the inside because of these important provisions, along with the other merits cited by my colleagues today.
I thank again Chairman Rogers and Ranking Member Ruppersberger for the outstanding bipartisan cooperation we've seen in their leadership and also the other members of the committee. It's a committee that I'm proud to serve on. I thank them and the committee for their work.
I urge Members to support this bill. |
|
Name(s:) |
James Langevin RI-D |
|
Title: |
United States Representative |
|
Agency(ies): |
United States House of Representatives |
|
Url: |
Url Link
|
|
Archive: |
Archive Link
http://archive.is/n2yOL |
|
Title: |
H.R. 1892 (112th): Intelligence Authorization Act for Fiscal Year 2012 |
|
Authoring or Creator Agency: |
govtrack.us |
|
|
|
Archive Link |
|
Title: |
James Langevin, US Representative from Rhode Island |
|
Authoring or Creator Agency: |
LittleSis |
|
|
|
Archive Link |
|
Title: |
House Session Sep 9, 2011 |
|
Authoring or Creator Agency: |
C-SPAN |
|
|
|
|
|
|
|
|
|
|
|
Title: |
Intelligence, Information Sharing, and Security Jan 26, 2012 |
|
Authoring or Creator Agency: |
C-SPAN |
|
Notes: |
2 commnets at ~23:15 and 45:00 |
|
|
|
|
|
|
|
|
|
|
|
|
The fact that this administration would aggressively pursue leaks perpetrated by a 22-year-old Army private in the Wikileaks matter and former CIA employees in other leaks cases but apparently sanction leaks made by senior administration officials for political purposes is simply unacceptable. It also calls for the need for a special counsel to investigate what happened.
[...]
In my view, the administration should be taking these leaks, apparently perpetrated by senior administration officials, as seriously as it pursued those made by relatively low government personnel such as the Army private in the WikiLeaks matter or the former CIA employee who provided the New York Times with classified information about U.S. attempts to sabotage the Iranian nuclear program. The failure of the administration to do so would confirm what today is only an inference--that these leaks were, in fact, sanctioned by the administration to serve a pure political purpose.
[...]
I guess the most disturbing part--and I would ask my friend--it is one thing to have a private, in the WikiLeaks matter, who had access to it, low-level members of certain agencies, one in the CIA who I know was prosecuted, but this is, according to the articles that are written, the highest levels in the White House are confirming this classified information and maybe even volunteering it, for all we know. |
|
Name(s:) |
John McCain |
|
Title: |
United States Senator |
|
Agency(ies): |
United States Senate |
|
Concerning: |
Obama Leaks |
|
Url: |
Url Link
|
|
Archive: |
Archive Link
http://archive.is/lMiqW |
|
Title: |
Senate Session, Part 2, Jun 5, 2012 |
|
Authoring or Creator Agency: |
C-SPAN |
|
Concerning: |
"Obama Leaks |
|
|
|
|
|
|
|
|
|
|
|
|
But from previous comments, they appeared to have in mind recent reports by The New York Times, The Associated Press, Newsweek and other news organizations about an intelligence agent who infiltrated the branch of Al Qaeda in Yemen and posed as a suicide bomber; President Obama's oversight of drone strikes against terrorism suspects; and an attack using the Stuxnet computer worm designed by the United States and Israel against Iran's nuclear program. |
|
Name(s:) |
Scott Shane |
|
Title: |
Reporter |
|
Agency(ies): |
New York Times |
|
Concerning: |
Obama Leaks |
|
Url: |
Url Link
|
|
Archive: |
Archive Link
http://archive.is/mOXrD |
|
Title: |
Leaks of Classified Information Jun 7, 2012 |
|
Authoring or Creator Agency: |
C-SPAN |
|
|