tv Defense News ABC December 4, 2016 11:00am-11:30am EST
[captioning performed by the national captioning institute, which is responsible for its caption content and accuracy. visit ncicap.org] jill aitoro: this week -- phase two. exploring a pro harbor mystery. -- pearl harbor mystery. in may, phase two was kicked off to cap the most technological minds. as set down with aaron matta during the recent cyber con conference to tell them where the much touted program stance. >> it has been an opportunity. i have been the head of a great team for the last six months. from the work our predecessors had done, and ourselves, there are a couple of key things that
interfacing to bring technologies and give abilities to our war fighters, men and women in uniform. there are a couple that are important. the first is relationships and expense. we brought together 18 that has spent a lot of time in places where innovation and venture capital money is being spent. we have folks that have come, spent a lot of time in the labs, that have seen and understood how y so we are able to interface with them. that is key. the second big lesson is we are focused on capability gaps. what are transformational -- transformational ways we can use to apply to our program. the final key piece is having
agility is one of the most important things. we are able to bring that with the funding and the oversight we have for the pentagon, that's when we see something that could add value for war fighters, we are able to execute quickly. aaron matta: we hear a lot from people similar in a duty to yours, that it moves slower than the commercial side. how do you manage to get a dod process that is slow and commercial sector? >> there are a couple of aspects to the first thing i would highlight is for certain types of technology, speed is especially important. you look at software, cyber security -- things where the rate of change of capability is so rapid that at the time it takes to acquire something is
behind. the approaches we have taken our tailored for that, not necessarily for buying an aircraft carrier or a large product. there are a couple of things. first, we are leveraging authorities. we have pioneered something called a commercial solutions opening, which is, as you say, enabling the department to procure and acquire technology and products the way a commercial entity would. so, that means we first identify what is the capability we then do heavy market research to determine what are potential vendors. we go through our website to promote or announce the fact there is a specific need we need. companies then can submit the same materials they would use for a commercial sale. we do a quick evaluation and for the ones that are appropriate, we bring them in. for -- we do further diligent.
by side. the process can go from meeting the company to sign in the first contract in about 60 days. we have done 12 deals, 12 contracts since may, the first of the fiscal year, and the average time has been 59 days for those 12. it can be done rapidly, but it requires focus and utilization of authorities. one thing i would highlight is they are not unique to diu x. they are departmentwide, and we have been the first to use them, and we're hopeful that becomes a more broad-based approach. aaron: when the things that has gone on when you have taken on 2.0, is the expansion. there is speculation you could see future offices opening up. how are you looking at a
>> there are great conquered -- entrepreneurs building valuable things. there are a number of ways we are going to expand. we are a relatively small office and agency within the department. we cannot have an office in every city, but one of the key untapped forces the nation has is reserved services. we are rapidly sending out a reserve and guard unit that will be affiliated with diux where we will have members deployed across the country. when we need them a cap -- relationships to tap into a unique ecosystem that understands who are the most interesting entrepreneurs, we can use reservists. the austin presence is the first suspense nation of that. we have four reservists supporting us and giving us that outreach. supporting us and giving us that outreach.
but how rough? there was no way to know for sure. hey guys.... daddy, it's pink! but hey. a new house it's a blank canvas. and we got a great one thanks to a really low mortgage rate from navy federal credit union. pink so she's a princess. you got a problem with that? oorah oorah open to the armed forces, the dod and their families.
was a proof of concept and we want to make sure it was a valuable experience for security researchers and dod. for it to shift its culture on how it felt about private citizens coming against dod websites, we want to make sure it was something that was a big splash so we could have continued interest. because it was so successful, we felt we would evolve the lessons learned and lean forward in the kinds of people that would be able to participate, and the assets within the scope of these challenges. then, potentially, for the future, the kinds of activities you might be able to do while legally participating in one of these challenges. we stood up two vehicles so we
working in tandem for us. the first, you can think of it as hack the pentagon 2.0. it will be a lot of open websites. most of them will still probably be somewhat invite only. meaning people will very likely have to have some type of setting done -- whether they are u.s. persons, like we did in hack the pentagon, or if any might be required in terms of payment. those are still mostly open. that means so long as you meet basic criteria, you can participate. the second is this idea that we want to be able to use crowdsourcing vulnerability discovery and disclosure techniques for basically everything dod owns and touches. what we did to make sure we felt good about allowing unvented,
against certain dod assets that are so -- mission-critical, we contracted with a company who prides themselves in two areas. the security researchers are highly skilled. the barrier to entry is high. they are also very fatted. they really know everything there is to know about them. that is important for for an accountability perspective. the second thing is their technology and the platform also allows for us to know all of the keystrokes they are taking, the technical controls you could possibly imagine so if there are accidents, we are able to understand what they are in real time. anyone that goes left or right, we will be able to know that in
hacker one, that was announced on friday by the secretary of the army. that model -- it works for a certain set of assets. we think the model works for another distinct set of assets. so, coupled together, we are really excited about these two contract vehicles. aaron b.: you mentioned the phase one hack the you call that a big success. how do you define success for phase one, and what will you have to account much in phase two to call that a success. ms. wiswell: sure. well, it is twofold. the first, and probably the primary is that these security researchers, they follow the rules to a tee. we prided ourselves on spending a lot of time working with the lawyers, working with the
department of defense to make sure we got the rules right. the rules of engagement were crystal clear. you knew full well as a researcher if you were abiding in the legally permitted scope, or outside of it. there was no question to them. that needs to continue. anything dod does or the government does going forward in the space, they should spend a lot of time getting those challenge rules right. we are going to -- we are going to make sure involves a fair amount, so you are not just focused on real rigid rules in future phases. that will be something to watch -- a metric to watch, making sure folks abide by those rules. the second thing we cared about is we got a lot of bang for the buck. meaning, pittance from a dod budget perspective in terms of how much we spend on security
if you add in more critical assets, that grows, really, exponentially at that point -- the cost savings potential. then, thirdly, and this is one that i always like to tell folks that is a little bit harder to put a metric by -- they are really starting to change the culture. when dod spends a lot of time thinking about security in terms of compliance, thinking we are secure if we say we are secure, this concept of security through obscurity, that is a dangerous spot for any of us to be in. it shows traditional approaches are failing us -- we are falling behind because of it. what we found in this is not only were folks that were against this concept at the beginning, they have really adopted it.
jill: a top concern for any administration these days is cyber security -- whether it be a legend russian attempts to influence u.s. elections. a senior counsel -- a senior fellow at the council of foreign relations saw the obama policy firsthand. i said town with him and asked what the priorities have been and what we might expect from a trumpet ministration. rob: when you look at the role in several security, since 1998 we have talked about a
government and the private sector doing it together. what obama focused on, what my colleagues focused on, was defining what how that partnership would play out. it was stressing the point that private companies were going to be responsible for protecting themselves. it was going to be government's role to help them do it. that was the entire focus of everything the obama administration did on cyber security -- making the private sector successful in protecting itself. jill: what is fascinating that is they brought the statistic that something like 85% of critical infrastructure in terms of systems is in the private sector, and you talk about the obama administration wanting to help the private sector help themselves, so to speak, but they have to want that support from the government. what was your impression in terms of their collaboration in the private sector's willingness to work with the government on
private sector to realize there are different interests. we have great communications with the security community, a lot of government people in fortune 500 companies. on the other hand, you head general councils very worried about sharing information with government, collaborating with government. you also had executive very worried, as multinational companies, what it will be like moving with u.s. government and all these scary sounding agencies to foreign markets. there was tension in getting this partnerships off the ground. jill: and i have to bring up the fact that the snowden situation happen. did that hurt or help the ability to partner with the private sector in terms of share information and so forth?
same time as congress moves forward on legislation to make it easier to share information. now we are in a situation where those legal questions, they have largely been answered, but there is a continuing problem with you are a fortune 500 company for collaborating. it is a problem in safed -- south america. that is a challenge continue into the next administration. jill: it is even a pr challenge when you're talking about companies like google that are suddenly acted apprehensively, i would imagine. i imagine you have to convince them you would not do bad things or customize the integrity of the information. is that fair? rob: there are two tensions -- patriotic americans that realize they can get value out of working with the u.s.
on the other had, from a global marketing perspective, they have to think about protecting user data from china, russia, and now they will list the fbi and the nsa along with those adversaries. that was a hard thing for me to hear as a u.s. government official. that is fascinating to we have a new administration coming in. tromp was elected as our next president. do you have any ? rob: i think we will see a new strategy, a shakeup, and then the realization there are not better alternatives to the private, public partnership. the idea there would be a way for government to take this off the table so ceos would not have to worry about it is appealing.
his pay taxes for, and it is the government's job. the problem with that is the way the internet is built, the way modern companies are built, it does not allow for that government intervention. there is no way we would stand up something that looks like the tsa of the internet the way we took over aviation security after 9/11 for cyber security. that would not be possible with the win the internet is constructed or the way modern businesses work that i think the trump where the obama administration has been, where the bush administration was, which is where the clinton administration began in the 1990's. jill: we hear so much about cyber espionage from other countries, targeting information. russia is coming out full force in this area, so we are told. is this a growing problem, or has it always been there, and it is getting reported more often? rob: in the obama
-- china's economic espionage, stealing secrets, giving them to national conference. that was a big fix and a no no. we spent a lot of time trying to change behavior on that, and i think we did. with russia, what we have seen is a dramatic shift from conducting espionage for traditional reasons companies conduct espionage to inform foreign policy to now using the capability to interfere with things like our elections. on the part of the russians. they were almost playing by what you might call the old moscow rules where they understood the rule of intelligence among great powers, and they respected those rules. they are no longer doing that. the challenge is going to say how do we put russia back in a >> the way the obama administration put china back in a box?
jeanette mac share social media scams to avoid. ms. mac: it appears everyone uses social media -- 70% of those are my between 51 and 69 have a facebook account. if that is you, being proactive insecurity your social media accounts and energy is essential, especially if you are retired and are active military. one uses a popular photo claim they need money and they are to put. your credit and good name could be at risk. what could you do to be -- avoid being used? one way is to minimize your internet footprint. use privacy and security settings, and keep personal information personal. the more information you post, the easier it is to steal your identity or access your data. do an online search of your name and check for unofficial photos or social media profiles.
account, and call your financial institution he medially. social media is a great way to keep in touch with family and friends. be sure to keep it secure as well. jill: being detected was not an option. if i was recognized the whole operation was blown. the element of surprise was imperative. wow. he won't even recognize you. seriously. i don't even recognize myself. and thanks to my cashrewards credit card from navy federal with never-expiring rewards woo! maui!! boom open to the armed forces, the dod and their families.
jill: on december 7, 1941, even as japanese carrier -- air aircraft moved toward pearl attack from a sub. after the one cryptic message, the ship and crew vanished without a chase. in honor of the anniversary of pearl harbor, tony lombardo said down with stephen harding, author of a new book that explores the mystery. mr. harding: the book is a little-known story of world war ii. on december 7, 1941, a small, army charter cargo ship was carrying lumber from seattle
was sunk by a japanese -- it is a mr. because it might have been the first american vessel sunk by the japanese in the pacific war and on pearl harbor day. the book is a two-part mystery -- was it sunk by the japanese, and the second part is discovering what happened to the vessel and the crew, which vanished. mr. lombardo: can you talk about the fact this is the final mystic and what you mean by that? mr. harding: harbor has been told he well over the past 75 years. as a writer, i like to find the stories that have not been told over and over again. he does not mean we do not want to know more about the actual attack on pearl harbor, but this particular story, although little-known, is possibly of great importance because if the ship was, in fact, attacked before the actual attack began at pearl harbor, would hearing
harbor attack or the history of world war ii in the pacific? that is why i sought it out. i am sure there will be other mysteries about pearl harbor coming out, but i think this is one of the last big ones. mr. lombardo: could this have changed the outcome of history? mr. harding: it well could have. if the japanese captain had broken orders and attacked before the time the rest the japanese combined fleet was attacking pearl harbor, he advance. they might have responded difficult -- differently to the initial attack, and perhaps the course of the attack would have been different. of course, we do know the americans were warned in advance when a midget submarine was detected at the entrance of pearl harbor, and that does not seem to have changed the way we react to the japanese attack, but this could well happen. mr. lombardo: how hard is it to find details on a ship like this
research? mr. harding: it is that a researcher job. i am one of those people that have a serious psychological problem called research rapture. i get engaged in stuff. i have always enjoyed the researching as much as the writing. in doing world war ii stories, we are dealing with records that are out now. for the wars in iraq and afghanistan, there are things that will be kept classified for harbor has come out over the last seven decades, and if you know what you are looking for -- and i have been writing about world war ii on my own and as a journalist for longer than i can remove her. i pretty much know where the records are. i was fortunate to be able to talk to a couple of people that were directly and indirectly involved. sadly, they are gone now, which,
some of my other books -- the people that i run about -- they are vanishing. mr. lombardo: what will you do for the anniversary? mr. harding: i will be at pearl harbor for observances, doing some work for "military magazine," doing some interviews , for example, with the second oldest pearl harbor survivor, which i'm looking for two. if i'm any spare time, i will laying around and relaxing. mr. lombardo: this is not your only book. you have a couple of books out there option for movies. mr. harding: i did a book five years ago called last battle, which is a true story of the only time in world war ii when american soldiers and german soldiers joined forces and for together to defend a medieval castle in austria that was filled with french vips.
by the french company studio canal. the book that came out before this one is called the castaways war -- the true story on an american naval officer whose ship was sunk, and he ended up being shipwrecked on an island full of japanese. it is the story of how he managed to survive that expense. jill: that is all this week at "defense news." be sure to tune in money come to you next week from the reagan nation california.
[music] >> dr. charles stanley: and god uses adversity to do what? to point out sin in our life. if there's a sense of unforgiveness, bitterness, hostility, whatever it might be, then he wants to get rid of all that. and so he allows adversity in our heart to teach us how to live a godly life. >> male announcer: next on "in touch," "in the midst of adversity." >> announcer: join us during the program and follow along with the sermon notes. go online to