UNITED24 - Make a charitable donation in support of Ukraine!

Military

[Senate Hearing 112-590, Part 5]
[From the U.S. Government Printing Office]



                                                 S. Hrg. 112-590, Pt. 5

 
DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 
               2013 AND THE FUTURE YEARS DEFENSE PROGRAM

=======================================================================

                                HEARINGS

                               before the

                      COMMITTEE ON ARMED SERVICES
                          UNITED STATES SENATE

                      ONE HUNDRED TWELFTH CONGRESS

                             SECOND SESSION

                                   ON

                                S. 3254

     TO AUTHORIZE APPROPRIATIONS FOR FISCAL YEAR 2013 FOR MILITARY 
ACTIVITIES OF THE DEPARTMENT OF DEFENSE, FOR MILITARY CONSTRUCTION, AND 
   FOR DEFENSE ACTIVITIES OF THE DEPARTMENT OF ENERGY, TO PRESCRIBE 
   MILITARY PERSONNEL STRENGTHS FOR SUCH FISCAL YEAR, AND FOR OTHER 
                                PURPOSES

                               ----------                              

                                 PART 5

                   EMERGING THREATS AND CAPABILITIES

                               ----------                              

                 MARCH 20, 27; APRIL 17; JUNE 12, 2012


         Printed for the use of the Committee on Armed Services


DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 
2013 AND THE FUTURE YEARS DEFENSE PROGRAM--Part 5  EMERGING THREATS AND 
                              CAPABILITIES




                                                  S. Hrg. 112-590 Pt. 5

DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 
               2013 AND THE FUTURE YEARS DEFENSE PROGRAM

=======================================================================

                                HEARINGS

                               before the

                      COMMITTEE ON ARMED SERVICES
                          UNITED STATES SENATE

                      ONE HUNDRED TWELFTH CONGRESS

                             SECOND SESSION

                                   ON

                                S. 3254

     TO AUTHORIZE APPROPRIATIONS FOR FISCAL YEAR 2013 FOR MILITARY 
ACTIVITIES OF THE DEPARTMENT OF DEFENSE, FOR MILITARY CONSTRUCTION, AND 
   FOR DEFENSE ACTIVITIES OF THE DEPARTMENT OF ENERGY, TO PRESCRIBE 
   MILITARY PERSONNEL STRENGTHS FOR SUCH FISCAL YEAR, AND FOR OTHER 
                                PURPOSES

                               __________

                                 PART 5

                   EMERGING THREATS AND CAPABILITIES

                               __________

                 MARCH 20, 27; APRIL 17; JUNE 12, 2012

                               __________

         Printed for the use of the Committee on Armed Services


        Available via the World Wide Web: http://www.fdsys.gov/



                  U.S. GOVERNMENT PRINTING OFFICE
76-541                    WASHINGTON : 2012
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing 
Office, http://bookstore.gpo.gov. For more information, contact the 
GPO Customer Contact Center, U.S. Government Printing Office. 
Phone 202-512-1800, or 866-512-1800 (toll-free). E-mail, gpo@custhelp.com.  


  


                      COMMITTEE ON ARMED SERVICES

                     CARL LEVIN, Michigan, Chairman

JOSEPH I. LIEBERMAN, Connecticut     JOHN McCAIN, Arizona
JACK REED, Rhode Island              JAMES M. INHOFE, Oklahoma
DANIEL K. AKAKA, Hawaii              JEFF SESSIONS, Alabama
E. BENJAMIN NELSON, Nebraska         SAXBY CHAMBLISS, Georgia
JIM WEBB, Virginia                   ROGER F. WICKER, Mississippi
CLAIRE McCASKILL, Missouri           SCOTT P. BROWN, Massachusetts
MARK UDALL, Colorado                 ROB PORTMAN, Ohio
KAY R. HAGAN, North Carolina         KELLY AYOTTE, New Hampshire
MARK BEGICH, Alaska                  SUSAN M. COLLINS, Maine
JOE MANCHIN III, West Virginia       LINDSEY GRAHAM, South Carolina
JEANNE SHAHEEN, New Hampshire        JOHN CORNYN, Texas
KIRSTEN E. GILLIBRAND, New York      DAVID VITTER, Louisiana
RICHARD BLUMENTHAL, Connecticut

                   Richard D. DeBobes, Staff Director

                 Ann E. Sauer, Minority Staff Director

                                 ______

            Subcommittee on Readiness and Management Support

                 KAY R. HAGAN, North Carolina, Chairman

JACK REED, Rhode Island              ROB PORTMAN, Ohio
MARK UDALL, Colorado                 SAXBY CHAMBLISS, Georgia
JOE MANCHIN III, West Virginia       SCOTT P. BROWN, Massachusetts
JEANNE SHAHEEN, New Hampshire        LINDSEY GRAHAM, South Carolina
KIRSTEN E. GILLIBRAND, New York      JOHN CORNYN, Texas

                                  (ii)
?

                            C O N T E N T S

                              ----------                              

                    CHRONOLOGICAL LIST OF WITNESSES
                 Cybersecurity Research and Development
                             march 20, 2012

                                                                   Page

Lemnios, Hon. Zachary J., Assistant Secretary of Defense for 
  Research and Engineering, Department of Defense................     4
Gabriel, Kaigham J., PhD, Acting Director, Defense Advanced 
  Research Projects Agency, Department of Defense................    10
Wertheimer, Michael A. PhD, Director, Research and Development, 
  National Security Agency.......................................    13
Peery, James S. PhD, Director, Information Systems Analysis 
  Center, Sandia National Laboratories...........................    14

The Department of Defense's Role in the Implementation of the National 
   Strategy for Counterterrorism and the National Strategy to Combat 
                     Transnational Organized Crime
                             march 27, 2012

Sheehan, Hon. Michael H., Assistant Secretary of Defense for 
  Special Operations/Low-Intensity Conflict......................    50
Reid, Garry, Deputy Assistant Secretary of Defense for Special 
  Operations and Combating Terrorism.............................    55
Wechsler, William F., Deputy Assistant Secretary of Defense for 
  Counternarcotics and Global Threats............................    56

 Health and Status of the Department of Defense Science and Technology 
                      Laboratories and Enterprise
                             april 17, 2012

Lemnios, Hon. Zachary J., Assistant Secretary of Defense for 
  Research and Engineering.......................................    91
Freeman, Dr. Marilyn M., Deputy Assistant Secretary of the Army 
  for Research and Technology....................................    99
Lacey, Mary E., Deputy Assistant Secretary of the Navy for 
  Research, Development, Test, and Evaluation....................   112
Walker, Dr. Steven H., Deputy Assistant Secretary of the Air 
  Force for Science, Technology, and Engineering.................   120

                                 (iii)
 Proliferation Prevention Programs at the Department of Energy and at 
                       the Department of Defense
                             june 12, 2012

Creedon, Hon. Madelyn R., Assistant Secretary of Defense for 
  Global Strategic Affairs, Department of Defense................   164
Harrington, Anne, Deputy Administrator for Defense Nuclear 
  Nonproliferation, National Nuclear Security Administration, 
  Department of Energy...........................................   171
Myers, Kenneth A., III, Director, Defense Threat Reduction 
  Agency, Department of Defense; and Director, U.S. Strategic 
  Command Center for Combating Weapons of Mass Destruction.......   173


DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 
               2013 AND THE FUTURE YEARS DEFENSE PROGRAM

                              ----------                              


                        TUESDAY, MARCH 20, 2012

                           U.S. Senate,    
                   Subcommittee on Emerging
                          Threats and Capabilities,
                               Committee on Armed Services,
                                                    Washington, DC.

                 CYBERSECURITY RESEARCH AND DEVELOPMENT

    The subcommittee met, pursuant to notice, at 3:04 p.m. in 
room SR-232A, Russell Senate Office Building, Senator Kay R. 
Hagan (chairman of the subcommittee) presiding.
    Committee members present: Senators Hagan and Portman.
    Majority staff members present: Richard W. Fieldhouse, 
professional staff member; Thomas K. McConnell, professional 
staff member; and Robie I. Samanta Roy, professional staff 
member.
    Minority staff members present: John W. Heath, Jr., 
minority investigative counsel; Daniel A. Lerner, professional 
staff member; and Michael J. Sistak, research assistant.
    Staff assistants present: Kathleen A. Kulenkampff, Hannah 
I. Lloyd, and Bradley S. Watson.
    Committee members' assistant present: Brent Bombach, 
assistant to Senator Portman.

      OPENING STATEMENT OF SENATOR KAY R. HAGAN, CHAIRMAN

    Senator Hagan. We're going to go ahead and open this 
hearing up. I know that Senator Portman is definitely coming, 
but is tied up, so I think we'll go ahead and start because I 
think you also know that we have some votes occurring this 
afternoon, and what I'd like to do is go ahead and get started.
    This afternoon, the Emerging Threats and Capabilities 
Subcommittee meets to review testimony on cybersecurity 
research and development (R&D), in review of the Defense 
Authorization Request for Fiscal Year 2013 and the Future Years 
Defense Program (FYDP). The topic of cybersecurity has been the 
subject of growing concern and has figured prominently, not 
only in the newest strategic defense guidance released in 
January of this year, but also in previous national security 
and defense planning documents.
    The 2010 national security strategy states that: 
``Cybersecurity threats represent one of the most serious 
national security, public safety, and economic challenges we 
face as a Nation.'' The recent strategic defense guidance lists 
as one of the primary missions of the U.S. Armed Forces the 
need to operate effectively in cybersecurity and space, which 
will require investments by the Department of Defense (DOD) in 
advanced capabilities to defend its networks, operational 
capability, and resilience in cybersecurity.
    The challenge DOD faces is to find resources to address 
this growing threat in an era where there are increasing 
budgetary pressures on investments in the future. To its 
credit, cyber is one of the few areas in which DOD actually 
increased its investments in the fiscal year 2013 budget 
request.
    The objective of this hearing is to gain a better 
understanding of DOD's cybersecurity R&D activities and how 
these activities support DOD's cybersecurity objectives. We 
would like to better understand the research challenges facing 
the cybersecurity R&D community, the diversity of approaches to 
solving these challenges and gaps if they exist. We would like 
to understand the interactions between DOD with other Federal 
agencies, such as the Department of Energy's (DOE) national 
laboratories, industry, and academia.
    We welcome the subcommittee ranking member, Senator 
Portman.
    The focus today will be on gaining a better understanding 
of mechanisms to rapidly develop, test, and field innovative 
approaches to address the expanding threat spectrum and whether 
appropriate coordination is present across all the various 
cyber research communities. In addition, we would like to 
address the status of DOD's cyber testing infrastructure as 
well as the health and status of its cyber workforce and DOD's 
ability to attract and retain the best and the brightest in the 
field.
    This hearing is planned to have both open and closed 
sessions. We're pleased to have four expert witnesses to help 
us understand these complex issues. Mr. Zachary J. Lemnios is 
the Assistant Secretary of Defense for Research and 
Engineering, and in this position he is DOD's Chief Technology 
Officer and oversees and coordinates DOD's broad cyber research 
portfolio across the Services and DARPA. In addition, Mr. 
Lemnios oversees DOD's efforts in science, technology, 
engineering, and mathematics (STEM) education efforts, of which 
cyber is an important element. The subcommittee looks forward 
to hearing about DOD's overarching strategies, plans, and 
programs in cybersecurity R&D.
    Dr. Kaigham J. Gabriel is the Acting Director of the 
Defense Advanced Research Projects Agency (DARPA). Created in 
the wake of the surprise launch of the world's first satellite 
by the Soviets in 1957, DARPA was created to prevent 
technological surprise to our Nation. DARPA is investing 
heavily in cyber-related research, with roughly $500 million 
requested over the FYDP, and has developed some innovative 
approaches to addressing emerging cybersecurity threats.
    I should point out that our original hearing notice listed 
Dr. Regina E. Dugan as the witness for DARPA. However, she is 
leaving DARPA for the private sector, and I would like to 
acknowledge Dr. Dugan's contributions to DARPA and sincerely 
thank her for her service to our country.
    Dr. Michael A. Wertheimer is the Director of Research and 
Development at the National Security Agency (NSA). The Director 
of NSA is also the Commander of the U.S. Cyber Command 
(CYBERCOM), so NSA is an indispensable partner in cybersecurity 
efforts. The subcommittee looks forward to hearing about the 
research activities at NSA and how they support DOD's 
cybersecurity objectives.
    Dr. James S. Peery is the Director of the Information 
Systems Analysis Center at Sandia National Laboratories, a DOE 
national laboratory at Albuquerque, NM, and a source of 
expertise on cybersecurity. We look forward to hearing how 
Sandia's activities are benefiting DOD.
    I really want to thank all of our witnesses for your 
service in the cause of our national security, and we look 
forward to your testimony. In order for us to have adequate 
time to discuss a broad range of topics, I do ask that our 
witnesses keep their opening remarks to no more than 5 minutes 
each. But we will include your full written statements in the 
hearing record.
    For the information of the members and our witnesses, I do 
want to indicate how we plan to proceed in light of the series 
of roll call votes scheduled at 4 o'clock today. We'll conduct 
the open portion of the hearing until we have to vote, and then 
we'll reconvene in room SVC-217 of the Capitol Visitor Center 
for the closed portion of the hearing after we finish voting. I 
think there's a series of three votes.
    Before we hear from our first panel, I'd like to turn to my 
colleague and ranking member, Senator Portman, for his opening 
remarks. Senator Portman.

                STATEMENT OF SENATOR ROB PORTMAN

    Senator Portman. Thank you, Madam Chairman. I appreciate 
your holding the hearing and look forward to the testimony from 
these well-informed and sophisticated witnesses, who can help 
us in a very important task.
    But before I do that, I must mention that this Friday the 
Bobcats of Ohio University are playing the Tar Heels, and I 
would like in public hearing----[Laughter.]
    Senator Hagan. Then we play NC State. [Laughter.]
    Senator Portman. We'll see, injuries aside. But anyway, 
since we beat number four seed Michigan, UNC shouldn't be a 
problem for the Bobcats. So we'll make a bet later, maybe 
chocolate Buckeyes and North Carolina barbecue sauce.
    This is a great opportunity for us to hear from you. Again, 
I look forward to doing it. This is the topic of the day. When 
you look at our budgets, you can see it. In a very tough budget 
environment, we see significant increases at DOD for cyber 
defenses, a $200 million increase from last year; Department of 
Homeland Security (DHS), $310 million increase from 2012. So, 
coupling these figures with the billions of dollars likely to 
be invested by the public or by the private side, private 
sector, universities and others, it's evident that we have a 
serious concern here and it's now being acknowledged, and that 
we view ourselves as being vulnerable to cyber attacks.
    These increases in spending do come at a time when we are 
looking at decreases in I guess what you would call our 
physical defenses. One of the purposes of this hearing I 
believe is to be sure that we are balancing those two. We can't 
ignore the threats posed to the technological infrastructure by 
terrorist groups and other adversaries, like rogue hackers, but 
we also can't win the battle in cyber alone. We have to have 
both, and as we're downsizing our military are we becoming too 
reliant on cyber defense, is one question I would like to have 
us discuss today.
    I think the answer, of course, is that our cyber 
capabilities should be complementing our kinetic forces and 
resources and making sure that we're working together.
    With the kind of increase in funding we're talking about 
here, of course, there's also the potential for some wasteful 
spending and duplication. So knowing better what the private 
sector is doing, universities are doing, is important too, and 
you have some great information there, I'm sure.
    I've heard from some of you about your concern about the 
workforce and particularly with more and more young people not 
getting into subjects like computer science, which are critical 
to cyber capabilities. We have to talk about how we can be sure 
that we have a workforce that's capable of defending America in 
these new ways. The STEM disciplines are something we all talk 
about. How do we actually make that a reality and what are your 
recommendations there?
    Then, as Chairman Hagan has pointed out, we have to be sure 
we're properly coordinating across the Federal Government, 
because again we have these new resources. Like all science and 
technology (S&T) programs we invest in, we have to be sure 
we're eliminating duplication and having a synergistic 
relationship between various agencies and departments. Again, 
you'll be very helpful to us understanding how we do that.
    This is just one more challenge we have as a country, isn't 
it? We have to be sure that we're spending our limited tax 
dollars in a difficult budget environment in the most prudent 
way possible.
    So this is a great witness panel--defense, intelligence, 
energy agencies--and we look forward to a frank assessment in 
both sessions today and a good sense of where you think our 
defenses are today and where we're going tomorrow.
    So thank you, Madam Chair. I look forward to the testimony.
    Senator Hagan. Thank you, Senator Portman.
    Secretary Lemnios, if you would like to begin.

 STATEMENT OF HON. ZACHARY J. LEMNIOS, ASSISTANT SECRETARY OF 
  DEFENSE FOR RESEARCH AND ENGINEERING, DEPARTMENT OF DEFENSE

    Mr. Lemnios. Yes. Good afternoon, Chairwoman Hagan, Ranking 
Member Portman. I have a short statement that I'd like to read 
and just leave my written testimony for the record.
    Last year, DOD issued its strategic guidance and strategy 
for operating in cyberspace that defined cyberspace as an 
operational domain. It was a landmark point, and it defined the 
critical element of cyber operations as a concept to enable 
business operations, military operations, and the command and 
control backbone for DOD--critically important.
    In fiscal year 2013, the President's budget request for DOD 
includes a $3.4 billion investment in cyber activities, of 
which $486 million is dedicated to S&T investments. This 
investment is significant and critically necessary to give DOD 
a complex set of cybersecurity responsibilities and challenges. 
The responsibilities extend beyond our enterprise systems to 
15,000 networks, the 7 million computing devices across 
hundreds of installations in dozens of countries around the 
globe which are used for business operations.
    That capability has to extend to include the mission-
critical command and control networks, our cyber physical 
systems, and our cyber radio frequency systems, and our 
communications systems that make up DOD's tactical systems. The 
emergence of networked tactical systems and cyber physical 
systems have created new opportunities for increased 
cybersecurity attack and disruption.
    When I think of cyber operations, I think of computer 
network defense of our enterprise IT systems and I think of 
computer network defense, attack, and exploitation of our 
tactical systems. In regard to mobile radio, a desktop terminal 
and an unmanned surveillance aircraft are all clients on our 
networks that need to be protected.
    This is an operational domain built upon measures and 
countermeasures, where tactical depth, operational innovation, 
and technology transition are the key ingredients for 
leadership.
    In mid-2009, we assembled the technology leaders from 
across government, industry, and academia to provide their 
insight into the fundamental challenges faced by DOD and the 
tactical approaches that are emerging in academia, precisely to 
the point, Senator, that you made regarding academia. We 
followed through on that insight and focused our cyber 
investments in four key areas. We focused on mission assurance, 
resilient architectures, agile operations, and foundations of 
trust.
    Over this past year I've added an additional area, a cyber 
measurement campaign. All of these are described in my written 
testimony.
    We realize the importance of ensuring that taxpayers' 
dollars are invested wisely and efficiently. We have the 
appropriate forms in place to ensure cybersecurity research is 
well-coordinated among DOD's organizations, among other Federal 
activities, and across all of government. Investments are also 
scrutinized by DOD's senior leadership through the recently 
established Cyber Investment Management Board.
    The key to success of all of our cybersecurity efforts is 
the talent, the workforce that we have in our laboratories, in 
academia, in industry, in our small business community, and the 
workforce of tomorrow. There are a number of programs underway 
to advance the cyber R&D workforce, and they are described 
again in our written testimonies.
    Madam Chairman, thank you for the opportunity to present 
these brief remarks and I look forward to questions from the 
subcommittee.
    [The prepared statement of Mr. Lemnios follows:]

             Prepared Statement by Hon. Zachary J. Lemnios

    Chairwoman Hagan, Ranking Member Portman, members of the 
subcommittee, thank you for the opportunity to submit this written 
testimony on the U.S. Department of Defense's (DOD) cybersecurity 
research and development activities.
    I am honored to be joined today by Dr. Michael Wertheimer, the 
Director of Research at the National Security Agency (NSA), Dr. Ken 
Gabriel, Deputy Director of the Defense Advanced Research Projects 
Agency (DARPA), and Dr. James Peery, Director of the Information 
Systems and Analysis Center at the Sandia National Laboratories.
    The Department has a comprehensive strategy for cyber operations, 
as conveyed in the recently published DOD Strategy for Operating in 
Cyberspace.\1\ This Strategy recognizes that cyberspace is an 
operational domain and a critical element to enable its military, 
intelligence, and business operations, including the movement of 
personnel and material and the command and control of the full spectrum 
of military operations. The fiscal year 2013 President's budget request 
includes a $3.4 billion investment in cyber activities of which $486 
million is for Science and Technology (S&T) activities across 
Department organizations, to include the Department's organizations 
testifying here today. This level of investment is significant. The 
President and the Secretary of Defense recognize the critical 
importance of ensuring the Department has the required capabilities 
across the full spectrum of operations--capabilities that protect the 
Department's enterprise and tactical systems against cyber attack; 
capabilities that ensure these systems will continue to operate 
effectively despite cyber attacks; and capabilities that ensure our 
Joint Forces dominate in any cyber warfare campaign waged against us.
---------------------------------------------------------------------------
    \1\ Department of Defense web site: Department of Defense Strategy 
for Operating in Cyberspace, July 2011.
---------------------------------------------------------------------------
                    DEPARTMENT'S ENTERPRISE SYSTEMS

    While the cybersecurity challenges to the Department's enterprise 
information technology reflect those of the private sector in scale and 
scope, its operational challenges are significantly more complex. The 
Department operates over 15,000 networks and 7 million computing 
devices across hundreds of installations in dozens of countries around 
the globe. The Department's enterprise information technology systems 
rely upon commercial network service providers and include secure 
enclaves that protect business data and secure operational data. 
Breaches of these networks have an impact on national security. The 
cybersecurity threat to the enterprise is evolving on shorter timelines 
and with much more aggressive threats.\2\ By September 2011, over 70 
million cumulative malware threats were identified; augmented by a new 
class of tailored social engineering threats that target mobile 
platforms.
---------------------------------------------------------------------------
    \2\ McAfee web site: McAfee Threats Report: Third Quarter 2011.
---------------------------------------------------------------------------
    As a first step, the Department began implementation of the Host 
Based Security System (HBSS) in 2007.\3\ The HBSS solution is attached 
to each host (server, desktop, and laptop) in the Department and is 
managed by local administrators and configured to address known exploit 
traffic using an Intrusion Prevention System and host firewall.
---------------------------------------------------------------------------
    \3\ DISA Host Based Security System web site.
---------------------------------------------------------------------------
    In early 2011, the Department began an engagement with the 
industrial base, through the Enduring Security Framework to build a 
common threat understanding and best practices for the enterprise.\4\ 
Among the first efforts, this work has developed approaches for 
improving the security and integrity of computer system Basic Input 
Output System (BIOS) controls. These concepts have been certified by 
the National Institute of Science and Technology (NIST) and will be 
available to the Department through the private sector.\5\
---------------------------------------------------------------------------
    \4\ Parrish, Karen, American Foreign Press Services: Lynn Urges 
Partnership Against Cyber Threat, Feb. 15, 2011.
    \5\ NIST Tech Beat: Protecting Computers at Start-Up: New NIST 
Guidelines, Dec. 20, 2011.
---------------------------------------------------------------------------
                 TACTICAL SYSTEM VULNERABILITY SYSTEMS

    The Department's cybersecurity concerns extend beyond enterprise 
Information Technology, command and control, and network operations. 
Tactical system complexity and network dependency create new 
opportunities for cybersecurity attack and disruption of our 
warfighting platforms. Tactical systems include manned and unmanned 
platforms, munitions, control systems, where cyber network attack or 
exploitation could compromise mission effectiveness. ``Perimeter'' 
security techniques engendered by information systems security 
engineering and other cyber defenses lack sufficient defense for 
tactical systems should a perimeter defense be compromised. This is 
increasingly problematic as tactical systems grow in complexity and 
adversaries have more opportunities for exploit through supply chain or 
inherent tactical system software, hardware and firmware 
vulnerabilities. A ``system'' security approach is required for total 
mission assurance.
    The Department has revitalized its Program Protection policy and 
practice to apply system security principles to the design, development 
and fielding of tactical systems. Today's systems are built using a 
combination of COTS and DOD-unique hardware and software. In the past, 
the DOD was primarily focused on protecting the release of advanced 
technology contained in systems, but these systems must also be 
protected from insertion of malicious content through supply chain 
attack, and the defense of the system against unauthorized access, 
control, or alteration during operations. The Department is now 
applying a comprehensive program protection planning approach as 
systems mature through the acquisition lifecycle; performing 
vulnerability assessments, embedding system security engineering and 
supply chain risk management practices and reducing cyber 
vulnerabilities.6,7
---------------------------------------------------------------------------
    \6\ Department of Defense Instruction 5200.39: Critical Program 
Information (CPI) Protection Within the Department of Defense, Dec. 28, 
2010.
    \7\ Defense Acquisition Guidebook: Acquisition Protection Strategy 
for Program Managers: Program Protection Plan.
---------------------------------------------------------------------------
         ENTERPRISE AND TACTICAL SYSTEMS CYBERSECURITY RESEARCH

    The challenge for the Department's research and engineering 
enterprise is to develop cybersecurity concepts that will enable the 
Department's enterprise and tactical systems to operate effectively in 
today's environment, and to lay the foundation for future capabilities 
against an increasing complex, capable, and ubiquitous cyber 
operational threat. Given the many cybersecurity attacks against the 
Department's networks we have seen over the past few years, we must be 
prepared to respond rapidly. However, we must also take the long view 
and seek fundamentally new concepts and capabilities for cybersecurity. 
There are no silver bullets that will completely eliminate the cyber 
threat. The Department's cybersecurity research investments are 
designed to build a strong technical foundation across the public-
private enterprise, supported by robust engineering, modeling, 
simulation and measurement campaigns.
    Four areas are under development to support the ``DOD Strategy for 
Operating in Cyberspace'' \1\ and have been shaped by a joint DOD and 
IARPA study. This study reported the independent views of technology 
leaders from across government, industry and academia who were asked to 
consider the fundamental challenges faced by Department and the 
technical approaches that are emerging in academia. The Department's 
research investments are designed to build technical foundations in the 
following areas:

         Mission Assurance: This focus will enable commanders 
        to successfully execute their missions whether in joint or 
        coalition environments, in the cyber domain and while under 
        cyber attack. This capability requires that our DOD commanders 
        be able to assess and control the cyber situation in the 
        context of the overall mission. Research in this area is in the 
        development of tools and techniques that enable efficient 
        modeling of blue, grey, and red behavior (cyber and kinetic) to 
        determine the correct course of action in the cyber domain.
         Resilient Infrastructure: Resiliency is the ability to 
        absorb and fight through cyber-attacks to complete the mission. 
        In the event of an attack, while network performance may 
        degrade, it will not fall below a given critical mission 
        derived level. Achieving this performance characteristic 
        involves developing capabilities that lead to recovery and 
        reconstitution of critical functions in milliseconds. The 
        research in this area is focused in two areas: integrated 
        architectures optimized to speed recovery to a known secure 
        state, and novel protocols and algorithms at the component 
        nodes within the architecture to distribute resiliency 
        mechanisms.
         Agile Operations: Agility refers to the ability of 
        systems to dynamically reshape their cyber posture as 
        conditions and goals change, both to escape harm and to thwart 
        the adversary. It requires that networks are able to rapidly 
        change attributes and operating conditions including attack 
        surfaces in near real time. The research in this area is 
        focused on enabling high speed responses with respect to 
        healing, network optimization, and protective cyber mechanisms.
         Foundations of Trust: Trust is confidence that our 
        systems--the devices, networks, and cyber-dependent functions - 
        perform as expected, and have not been comprised. DOD systems 
        use components that provide mixed trust levels; some components 
        are provided by domestic and foreign commercial sources, and 
        some components are special highly assured secure components. 
        The research objective for this area is to develop capabilities 
        that result in trustworthy systems even though the components 
        individually have varying degrees of trustworthiness. The 
        technical approach is to create models that characterize the 
        trust of the systems by observation and analysis of system 
        characteristics and behavior.

    The research in these thrust areas supports a range of applications 
including wired networks, mobile networks, cloud computing, tactical 
information technology, system security engineering, and trusted 
components for military systems.

                      CYBER TESTING INFRASTRUCTURE

    The Department's cyber testing infrastructure is comprised of 
approximately 60 facilities and ranges that support a wide array of 
activities including research, experimentation, developmental test, 
operational test, and training. Eleven of these ranges support cyber 
research and development, the balance are used for training and 
operational test and evaluation.
    The Department has embarked on a strategy to extend 
interoperability, threat models, traffic generation, and user behavior 
models for these ranges to support rapid development and test of new 
cybersecurity capabilities. The Department has testing infrastructure 
improvement programs in four key areas:

         cyber range automation technology that will enable 
        larger scale, faster turnaround, lower costs, and better 
        utilization of scarce test resources and expertise;
         high fidelity, validated emulations of cyberspace as 
        well as realistic mission scenarios, environment, adversary 
        models, and attack vectors;
         standardized data collection tool suites; and
         cyber measurement framework.

    We are exploring two options for how best to integrate cyber range 
capabilities with the Department's existing test and evaluation 
infrastructure, which currently supports traditional kinetic missions. 
The first is to aggregate many of the Department's cyber test resources 
in a single large cyber-kinetic range, with elements of traditional 
test ranges onsite. The second option is establish a number of smaller 
test ranges that can both work independently or be networked together 
and/or to kinetic test ranges, to support national-level tests and 
exercises. We plan to evaluate this trade space through a series of 
tests and pilot exercises during this fiscal year.

       COORDINATION AND TRANSITION OF CYBER RESEARCH INVESTMENTS

    Research and development efforts are well-coordinated among the 
Department's organization and other Federal and international 
organizations. Since taking office, I have personally met with 
operational and research leaders at NSA, Combatant Commands, Services, 
and Agencies to coordinate strategic research thrusts and investments, 
to assess results, and to identify gaps. Recently, the Department 
established the Cyber Investment Management Board (CIMB), comprised of 
the Department's policy, acquisition, and technology leaders, to 
provide strategic oversight of the Department's cyber investments 
supporting the enterprise information technology systems and system 
platforms.
    DOD cyber program research is coordinated among Department 
organizations through the DOD Cyber S&T Working Group. The membership 
of the Cyber Working Group includes representatives from across DOD's 
operational organizations, STRATCOM, CYBERCOM, NSA, DISA, the Joint 
Staff, and S&T organizations--the Service Labs and DOD Federally Funded 
Research and Development Centers. The Working Group's primary task is 
to develop a roadmap of research programs to include programmatic 
technical goals, milestones, and investment levels for the four 
cybersecurity research thrust areas.
    Interagency coordination takes place through multiple Federal 
working groups, including the Computer Security and Information 
Assurance Interagency Working Group--sponsored by the Network and 
Information Technology Research and Development subcommittee. Further 
coordination with our allies and partners occurs through the North 
Atlantic Treaty Organization Research and Technology Organization and 
the Technical Cooperation Program.
    Across the Department, our researchers are engaged with industry, 
academia, and other government laboratories to drive innovation in 
cybersecurity research and to rapidly transition concepts to 
operational use. Transition occurs through several channels. Some 
projects will be adopted for use in commercial technology and involve 
vendor modifications or the launch of new products. We have seen 
results in incubating new cybersecurity technologies for commercially 
available products through our Small Business Innovation Research 
program. Other projects involve technologies that require the 
development of custom components and are transitioned through the 
defense industrial base.
    While early research is performed under the management of the 
Service scientific organizations, much of the applied S&T research and 
development is carried out through Service laboratories. These 
organizations maintain connections with acquisition program executive 
offices, and engineering centers. Through these connections, the 
Service laboratories share results from emerging concepts and outline 
joint pilot efforts. These technologies will be available to mitigate 
vulnerabilities identified in program protection analysis and planning 
activities performed by program staffs.

      CYBER RESEARCH AND DEVELOPMENT (R&D) WORKFORCE AND SKILL SET

    I remain concerned that in emerging and very dynamic technical 
fields, such as cybersecurity, and system security engineering, the 
Department needs to build a strong workforce and needs access to the 
highest caliber technical talent in academia and industry. Formal 
educational programs address basic cyber threats and fundamental 
mechanisms of security, but not high end cyber threats, foundations of 
trust, adversarial reasoning, or game changing approaches. The 
Department's prospects for satisfying its cyber human capital needs 
remain challenging due to the following:

         Projected shortages of cyber R&D talent driven by the 
        dearth of clearable candidates electing studies in these areas; 
        this is one area we cannot outsource.
         Limited specialization in cyber academic programs; and
         Significant competition by the private sector.

    We are taking an active role in transitioning lessons learned from 
Cyber R&D to academia to improve cyber education. DOD involvement in 
the development of formal cyber education will provide interested and 
formally trained cyber graduates with visibility into research 
opportunities and career opportunities for public service.
    We have several programs underway to advance our cyber R&D 
workforce through Service labs, agencies, OSD, and national 
initiatives. I would like to highlight several of these:

         The Comprehensive National Cybersecurity Initiative 
        \8\ has used competitions to attract high school and college 
        students in cybersecurity. These include CyberPatriot National 
        High School Cyber Defense Competition \9\, U.S. Cyber Challenge 
        \10\, Department of Defense Cyber Crime Center (DC3) Digital 
        Forensics Challenge \11\, and National Collegiate Cyber Defense 
        Competition.\12\
---------------------------------------------------------------------------
    \8\ The White House--National Security Council web site: The 
Comprehensive National Cybersecurity Initiative.
    \9\ CyberPatriot--National High School Cyber Defense Competition 
web site.
    \10\ National Board of Information Security Examiners web site: 
U.S. Cyber Challenge.
    \11\ Department of Defense web site: DC3 Cyber Crime Challenges.
    \12\ National Collegiate Cyber Defense Competition web site.
---------------------------------------------------------------------------
         The Centers of Academic Excellence in Information 
        Assurance Education \13\ recognizes schools with programs that 
        integrate research activities into the curriculum. The schools 
        serve as a source for DOD-academic researcher exchanges; of the 
        146 centers, 42 are focused on cybersecurity research.
---------------------------------------------------------------------------
    \13\ National Security Agency, Central Security Service web site: 
National Centers of Academic Excellence in Information Assurance 
Education.
---------------------------------------------------------------------------
         The DOD Information Assurance Scholarship Program is a 
        recruitment, retention and academic capacity-building 
        program.\14\ Since the inception of the program in 2001, DOD 
        has sponsored over 470 scholars to complete a degree in a 
        cyber- or information assurance-related field of study.
---------------------------------------------------------------------------
    \14\ Department of Defense web site: DOD Information Assurance 
Scholarship Program.
---------------------------------------------------------------------------
         Air Force Office of Scientific Research (AFOSR) 
        Multidisciplinary University Research Initiatives (MURI): MURIs 
        fund consortiums of universities for complex research problems. 
        AFOSR has six MURI research teams addressing four cybersecurity 
        topics. In total over 140 graduate students, 19 post docs and 
        10 undergraduate students are being trained in the field at 29 
        universities.
         Service Lab R&D Involvement with Academia: Over the 
        past 10 years, the Information Directorate (AFRL/RI) educated 
        top ROTC cadets and civilian college students on the science of 
        information assurance and trained them in cyber warfare. These 
        programs have graduated over 300 cyber warriors.
         The Naval Postgraduate School (NPS) Cyber Academic 
        Group \15\ includes course work on cyber operations and 
        planning. Semi-annual Cyber Wargame courses are open to all NPS 
        students. A Cyber Battle Lab with classified and unclassified 
        segments supports interdisciplinary education and research 
        spanning student theses and large projects involving government 
        agencies, DOD, industry, and academia.
---------------------------------------------------------------------------
    \15\ Naval Postgraduate School web site: Cyber Academic Group
---------------------------------------------------------------------------
         National Security Agency's Cyber Defense Exercise 
        (CDE) was conceived to evaluate the effectiveness of the IA 
        education instilled at the service academies. DOD provides Red 
        Team participants to this exercise annually to evaluate the 
        performance of the cadets in securing a network. The overall 
        CDE goal is to generate interest among students nation-wide to 
        engage in challenging cybersecurity problems. A team of 38 
        cadets won the 2011 CDE for the Army.

                                SUMMARY

    Soon after coming into office, President Obama identified 
cybersecurity as one of the most serious economic and national security 
challenges facing our Nation. DOD faces particular challenges to its 
enterprise information technology systems and to its tactical systems. 
The emergence of networked tactical systems and cyber-physical systems 
has created new opportunities for increased cybersecurity attack and 
disruption.
    In response to these threats, we are building a strong technical 
foundation across the research and engineering enterprise. DOD will 
develop concepts to enable enterprise and tactical systems to operate 
effectively in today's environment, and to lay the foundation for 
future capabilities against an increasing complex, capable, and 
ubiquitous cyber operational threat.

    Senator Hagan. Thank you, Secretary Lemnios.
    Dr. Gabriel, if you'll go next. Thank you.

STATEMENT OF KAIGHAM J. GABRIEL, PhD, ACTING DIRECTOR, DEFENSE 
    ADVANCED RESEARCH PROJECTS AGENCY, DEPARTMENT OF DEFENSE

    Dr. Gabriel. DARPA's role in the creation of the Internet 
means we were party to the immense opportunities the Internet 
created and we share in the intense responsibility of 
protecting it. While national policymakers will ultimately 
determine how cyber capabilities will be employed, DARPA's 
responsibility is to explore the outer boundaries of such 
capabilities so that the United States is best prepared for 
future challenges.
    Chairwoman Hagan, Ranking Member Portman, members of the 
subcommittee: My name is Ken Gabriel. I am the Acting Director 
of DARPA. DARPA's bottom-line message today is that DOD is 
capability-limited in cyber, both defensively and offensively. 
We need to change that.
    It goes without question that a complete picture of the 
cyber threat should inform policies and laws related to DOD's 
cybersecurity efforts. Such decisions depend on a complete 
understanding of the threats and opportunities, an 
understanding that can be supported by our discussions today, 
but one that will remain incomplete. The complete picture 
requires a discussion at the special access level.
    In this unclassified discussion, much of what we can share 
you already know. Attackers can penetrate our networks. Users 
are the weakest link in cybersecurity. The defense supply chain 
is at risk. Physical systems are at risk, and the United States 
continues to spend billions on cybersecurity with limited 
increase in protection.
    Our approach to cybersecurity is dominated by a strategy 
that layers security onto a uniform architecture. This approach 
is taken for good reason, to protect against known threats and 
to create tactical breathing room. But it is not convergent 
with a growing and evolving threat. That's the defensive 
picture.
    With respect to cyber offense, modern warfare will demand, 
as you said Senator Portman, the effective use of both cyber 
and kinetic means. The tasks required for military purposes are 
sufficiently different that we cannot simply scale 
intelligence-based cyber capabilities and adequately serve the 
needs of DOD.
    Features that are vital for intelligence-based 
capabilities, such as nonattribution and persistence, are 
typically not as critical for DOD operational cyber 
capabilities. For example, a cyber exploit that always causes 
the target system to crash is not much of an intelligence 
exploit. But it may be exactly the effect that a DOD mission 
calls for.
    DARPA activities are part of the larger effort within the 
whole-of-government at NSA, the newly formed CYBERCOM, the 
Services, and as appropriate, DHS. DARPA's engagement in 
defensive and offensive cyber is not new. DARPA's expanded 
efforts build on an existing foundation and continuing 
contributions to cyber. DARPA-developed technologies are widely 
prevalent in military, intelligence, and commercial use today, 
but there is still much to do.
    From our vantage point, the greatest vulnerability in cyber 
offense for DOD is the lack of capabilities with 
proportionality, speed, and diversity of effects.
    Thank you.
    [The prepared statement of Dr. Gabriel follows:]

                   Prepared by Dr. Kaigham J. Gabriel

    The Defense Advanced Research Projects Agency's (DARPA) role in the 
creation of the Internet means we were party to the immense 
opportunities the Internet created and share in the intense 
responsibility of protecting it. While national policymakers, not 
DARPA, will determine how cyber capabilities will be employed to 
protect and defend national security interests, the agency has a 
responsibility to explore the outer boundaries of such capabilities so 
the United States is best prepared for future challenges.
    The following comments are unclassified. To understand the complete 
picture of the DOD cyber challenges and DARPA's contributions, 
classified discussions at the special access level are essential. 
DARPA's bottom line: DOD is capability limited, both defensively and 
offensively. We need to fix that.
    Chairwoman Hagan, Ranking Member Portman, and members of the 
subcommittee, my name is Regina E. Dugan. I am the Director of the 
Defense Advanced Research Projects Agency. I appreciate the opportunity 
to discuss DOD's cybersecurity research and development activities at 
DARPA.
    DARPA has a multidecade history in cyber. Agency activities across 
the full spectrum of conflict have significantly changed the Nation's 
toolbox of capabilities.
    In today's unclassified discussion, we can focus on the challenges 
of cyber defense, informed by our analytic framework. These challenges 
include:

         Attackers can penetrate our networks: In just 3 days 
        and at a cost of only $18,000, the Host-Based Security System 
        was penetrated.
         User authentication is a weak link: 53,000 passwords 
        were provided to teams at Defcon; within 48 hours, 38,000 were 
        cracked.
         The Defense supply chain is at risk: More than two-
        thirds of electronics in U.S. advanced fighter aircraft are 
        fabricated in off-shore foundries.
         Physical systems are at risk: A smartphone hundreds of 
        miles away took control of a car's drive system through an 
        exploit in a wireless interface.
         The United States continues to spend on cybersecurity 
        with limited increase in security: The Federal Government 
        expended billions of dollars in 2010, but the number of 
        malicious cyber intrusions has increased.

    After months of original data collection and analysis, DARPA's 
conclusion is that the U.S. approach to cybersecurity is dominated by a 
strategy that layers security onto a uniform architecture. This 
approach is taken to create tactical breathing space, but it is not 
convergent with an evolving threat.
    DARPA's recent testimony before Congress highlighted how cyber 
threats jeopardize National Security to the point of keeping the Agency 
leadership awake at night. Malicious cyberattacks are not merely an 
existential threat to DOD bits and bytes; they are a real threat to 
physical systems--including military systems--and to U.S. warfighters. 
The Unites States will not prevail against these threats simply by 
scaling our current approaches.
    That's the defensive picture. With respect to cyber offense; 
DARPA's belief is that the Department must have the capability to 
conduct offensive operations in cyberspace to defend our Nation, 
allies, and interests. To be relevant, DOD needs cyber tools to provide 
the President with a full range of options to use in securing our 
national interests. These tools must address different timescales and 
new targets, and will require the integrated work of cyber and 
electronic warfare at unprecedented levels.
    Modern operations will demand the effective use of cyber, kinetic, 
and combined cyber and kinetic means. The shelf-life of cyber tools and 
capabilities is short--sometimes measured in days. To a greater degree 
than in other areas of Defense, cybersecurity solutions require that 
DOD develops the ability to build quickly, at scale, and over a broad 
range of capabilities. This is true for both offensive and defensive 
capabilities. To be sure, the list of needed capabilities is long.
    Specifically, the tasks required for military purposes are 
sufficiently different so that we cannot simply scale intelligence 
cyber capabilities and adequately serve the needs of DOD. Rather, cyber 
options are needed that can be executed at the speed, scale, and pace 
of our military kinetic options with comparable predicted outcomes.
    A great deal of time is spent on determining the cyber governance 
structure, rather than resolving the inevitable question that follows: 
``What now?'' The lack of capability is the overwhelming issue. Further 
oversight strategies must be updated and be at pace with the threat.
    DARPA activities are part of a larger whole within national 
security at the National Security Agency, the newly formed U.S. 
CYBERCOM, the Services, the private sector, universities, nonprofits 
and, as appropriate, the Department of Homeland Security.
    Clearly, the challenges of cyberspace require the concerted efforts 
of many. We all must be protectors of and operate within cyberspace.
    The Agency is ready to meet a continuing responsibility in advisory 
roles during the formation of policy and legal frameworks, because new 
policies and laws--domestic and international--must be executable, 
enforceable, and sustainable.
    To be of use, such policies and laws will demand evaluation and 
adjustment on timescales that correspond to the dynamic nature and 
compressed evolutionary timescales of advances in cyberspace. That 
means moving faster than accustomed.
    The complete picture of the cyber threat should inform such 
policies and laws. Truly understanding the threat, however, cannot come 
from unclassified discussions.
    DARPA's engagement in cyber is not new. The Agency's expanded 
effort builds on an existing foundation and continuing contributions to 
cyber. DARPA-developed technologies are widely prevalent in military, 
intelligence, and commercial use today. But there is still much to do.
    Thank you.

    Senator Hagan. Thank you.
    Dr. Wertheimer.

STATEMENT OF MICHAEL A. WERTHEIMER, PhD, DIRECTOR, RESEARCH AND 
             DEVELOPMENT, NATIONAL SECURITY AGENCY

    Dr. Wertheimer. Madam Chairman, Ranking Member Portman: 
Thank you very much for inviting NSA Research today. NSA 
Research is unique in the Intelligence Community. Of all 16 
components in the Office of the Director of National 
Intelligence, we are the only component with in-house research, 
a national government workforce that's dedicated to providing 
research. We do very little program management. We're 
supporting both the information assurance and the signals 
intelligence (SIGINT) mission of NSA.
    We do that with a very, very highly skilled technical 
workforce, better than a third of which have PhDs, another 
third masters, and just under a quarter have bachelor's 
degrees.
    Our legacy is mostly in cryptography and in the design and 
breaking of encryption. Over the past 10 years, in the living 
laboratory that really is the SIGINT system, we have seen our 
mission grow in defensive cyber and offensive cyber. NSA 
Research is responsible for virtually all the major tool sets 
that we deploy both offensively and defensively. We're very 
proud of that legacy.
    But I would be remiss in not sharing with you things that 
concern me most at night when I go to sleep. First, the 
production of computer scientists in our Nation is on the 
decline. I can share facts and figures with you. We are not 
recruiting and retaining them. There are things we can and must 
do to retain them that we are not.
    I am concerned also that the investments from Congress and 
from the people in research is almost all period of performance 
of 1 year or less that I see. It's to build tools, it's to be a 
rapid deployment of capability. I rarely get the opportunity to 
think 3 years down the line even in research. The money that 
comes to us has very directed purpose. I will tell you in 
closed session many of the wonderful things we're doing with 
that money, but I feel that the Nation is a little frightened 
to think much beyond 1 or 2 years on this problem, and that 
keeps me up at night as well.
    Most of the examples I'd like to share with you in closed 
session, so I'll conclude my remarks at that point.
    [The prepared statement of Dr. Wertheimer follows:]

              Prepared Statement by Dr. Michael Wertheimer

                              INTRODUCTION

    Madam Chairman Hagan, Ranking Member Portman, distinguished members 
of the committee, thank you for the opportunity to discuss my Agency's 
collaborative efforts on cyber research and development. First, I want 
to take this opportunity to thank you for the support this committee--
and Congress--has given us.

               OVERVIEW OF CYBER RESEARCH AND DEVELOPMENT

    Throughout the past 6 decades, NSA Research has delivered deep and 
important science that has enabled many Intelligence Community 
breakthroughs. Our legacy extends from cryptology to high performance 
computing. We were early pioneers in fields ranging from computer 
science to digital communications. Today we find ourselves developing 
new science in such diverse fields as data storage, microelectronics, 
and cloud computing. We have extremely deep expertise in Science, 
Technology, Engineering, and Mathematics--the so-called STEM--
disciplines especially as they relate to our core missions: Signals 
Intelligence and Information Assurance. With this diversity of skills 
and depth of experience, we find ourselves at the center of a number of 
government-wide cyber activities. We are a core member of the 
Department of Defense Cyber Network Operations Science and Technology 
Steering Council and its Priority Steering Committee. NSA Research is a 
co-chair of the Office of Science and Technology Policy Special Cyber 
Operations Research and Engineering (SCORE) Interagency Working Group 
and we are an active member on the Intelligence Community's Cyber 
Security and Information Assurance interagency working group. We 
participated in the assistant Secretary of Defense (R&E) Cyber workshop 
series crafting the DOD-wide cyber vision, thrusts and roadmaps. The 
SCORE committee coordinates cyber research across all Federal 
departments and ensures that the Comprehensive National Cybersecurity 
Initiative unclassified research efforts are integrated into an overall 
cyber research and development plan.
    NSA Research also has a leadership role in the nongovernment cyber 
R&D community. For example, we are members on the Joint Advisory 
Committees of MIT Lincoln Labs and CMU Systems Engineering Institute 
and sit on the cyber advisory board for the University of Maryland. We 
also participate on evaluation boards for Department of Energy National 
Laboratory cyber-related internal research proposals.
    NSA commitment to growing the quality and quantity of U.S. science, 
technology, engineering, and mathematics students is a model for 
government. We work with universities in many ways, ranging from our 
Center of Academic Excellence program, which identifies and supports 
excellence in information assurance and cyber network operations, to 
direct program support and curriculum discussions. We sponsor and 
support events such as the ``Capture the Cyber Flag'' inter-university 
competitions, involve student interns in our research, and maintain a 
strong grants program. Nevertheless, the United States is neither 
graduating nor recruiting to government sufficient numbers of computer 
scientists to meet the demand. Indeed, in 2010 there were only 726 
Computer Science PhDs awarded to U.S. citizens. Of them, only 64 
elected to join government.\1\ This is an area where we need to 
redouble our efforts to attract the Nation's best and brightest to 
government service.
---------------------------------------------------------------------------
    \1\ Computing Research Association, Taulbee Survey Report 2009-
2010.
---------------------------------------------------------------------------
    As my colleagues here today can and will attest, cybersecurity 
demands tremendous diversity of thinking and broad collaboration. We 
understand, together, the need to not only deliver immediate 
capabilities, but to invest in long-term disruptive innovation. NSA is 
a leader in this regard and will continue to outpace much of industry 
and academia for years to come. Our talented and dedicated workforce is 
our strength, your support crucial, and the common purpose shared by 
colleagues here,today the path to success.
    We have tremendous offensive and defensive capabilities in 
cyberspace. Maintaining that advantage, growing it, and ultimately 
providing mastery over cybersecurity is our contract with the Nation. I 
look forward to sharing with you specifics of our strategy in closed 
session.
    I welcome your questions. Thank you.

    Senator Hagan. Thank you.
    Dr. Peery.

STATEMENT OF JAMES S. PEERY, PhD, DIRECTOR, INFORMATION SYSTEMS 
         ANALYSIS CENTER, SANDIA NATIONAL LABORATORIES

    Dr. Peery. Chairman Hagan and Ranking Member Portman: Thank 
you for giving me the opportunity to testify today. I'm James 
Peery, Director of Information Systems Analysis Center at 
Sandia National Laboratories. As you may know, Sandia is a 
multi-program national security laboratory owned by the U.S. 
Government and operated by Sandia Corporation for the National 
Nuclear Security Administration (NNSA).
    Sandia is one of three NNSA laboratories with 
responsibility for stockpile stewardship and annual assessment 
of the Nation's nuclear weapons. But within the U.S. nuclear 
weapons complex, Sandia is uniquely responsible for assuring 
that U.S. nuclear weapons cannot be used without the 
President's intent. It's because of this responsibility that 
Sandia has had an extensive cyber R&D program for over 50 
years, with a rich history of providing vulnerability and 
adversarial threat assessments for U.S. nuclear command and 
control systems.
    Although nuclear weapons remain Sandia's core mission, 
because of these capabilities, it has been able to support 
other agency missions in national security, including 
nonproliferation, counterproliferation, counterterrorism, 
Defense, Energy, and Homeland Security. In all of these areas, 
I think you recognize that cyber is a key element.
    My written statement focuses on the questions you raised, 
including the challenges and technical developments in 
cybersecurity, along with how the DOE laboratories contribute 
to the DOD mission in cybersecurity.
    There are three points I'd like to emphasize. First, today 
the DOE laboratories are a resource to DOD in raising the bar 
to our adversaries in cybersecurity. I am very confident that a 
large part of DOD is aware of where the cyber talent lies or 
resides within the DOE laboratories and has effectively used 
DOE procedures to acquire that talent.
    The second point is--and I think you're aware of this--
there is no silver bullet to solve the existing cyber problem. 
That's true for DOD, DOE, and the private sector. It's 
virtually impossible to make an absolutely secure information 
technology system. However, with sustained and coordinated 
investments and deployment of government-owned S&T, we can 
dramatically change the cost equation to our adversaries.
    Third, compliance-based security is not effective. We need 
a set of metrics to objectively measure system security. New 
technologies and policies should be evaluated and adopted based 
on how they objectively improve system security and how much 
they cost. This is not a static process. The adversary will 
adapt.
    Specific to the committee's requested questions, on the 
area of encryption versus network security, I would just like 
to point out that they shouldn't be viewed as competing 
alternatives. Better network security and careful use of high-
quality encryption significantly raises the adversary's costs, 
but unfortunately today the driver in IT systems is cost 
reduction. Diversity is another way to increase the cost, but 
today again cost reduction is the predominant driver in IT.
    The question of transition from signature-based detection 
of attacks to behavioral-based detection. I just point out--we 
can talk more in closed session about this, but new classes of 
anomaly detection methods have been developed and are based on 
aggregating events across time and multiple sources to identify 
network and host-based behavior that might be malicious. These 
approaches and behavioral-based methods have been successful in 
finding previously undiscovered malware. One drawback of this 
technology, though, is that it has a very high false positive 
rate.
    I think I'll conclude my comments now on the issue of 
workforce within Sandia, which I can speak on and is near and 
dear to my heart. I believe, as was said earlier, confronting 
today's cyber challenges requires a highly skilled and 
motivated research community. It's well-documented that the 
demand for cyber expertise greatly exceeds the supply.
    At Sandia, through several enticement programs we've been 
able to attract and hire some of the top U.S. students, both at 
the undergraduate and graduate level. But I would like to draw 
your attention that retention is a growing concern. Although 
the importance of the national security mission and job 
stability remain highly attractive features to our employees, 
new hires today receive benefits similar to those found in U.S. 
industry, so we should start expecting that in this area that 
we might see retention rates approaching that of U.S. industry, 
which is approximately 5 years.
    The reason this is a concern is that historically the 
laboratories have been asked to solve some of the impossible 
problems, and that requires a cadre of senior experienced staff 
members. Just like in nuclear weapons, the government level of 
resources in cyber--to get the skills to the level the 
government needs usually takes between 3 to 5 years. If the 
retention rate is around 5 years, then we have a growing 
problem of trying to keep those people around to solve the 
impossible problems.
    Presently, many of Sandia's cyber staff are being solicited 
by private companies offering greater than 50 percent increases 
in salary and better benefits. We've been very fortunate that 
historically we've only been losing on the order of about less 
than 1 percent annually in the area of cyber, but this year we 
expect to reach approximately 10 percent loss in our staff to 
outside employment.
    Just in summary, I'd say that the DOE labs complex has a 
deep reservoir of technical talent and S&T capabilities that 
have helped address some of the government's most challenging 
national security problems, including the cyber area, and I 
look forward to the closed session to be able to tell you about 
some of those accomplishments.
    Thank you.
    [The prepared statement of Dr. Peery follows:]

                 Prepared Statement by Dr. James Peery

                              INTRODUCTION

    Chairman Hagan, Ranking Member Portman, and distinguished members 
of the Senate Armed Services Committee, thank you for the opportunity 
to testify. I am James Peery, Director of the Information Systems and 
Analysis Center at Sandia National Laboratories. Sandia is a multi-
program national security laboratory owned by the United States 
Government and operated by Sandia Corporation for the National Nuclear 
Security Administration (NNSA).
    Sandia is one of the three NNSA laboratories with responsibility 
for stockpile stewardship and annual assessment of the Nation`s nuclear 
weapons. Within the U.S. nuclear weapons complex, Sandia is uniquely 
responsible for the systems engineering and integration of nuclear 
weapons in the stockpile and for the design, development, and 
qualification of all non-nuclear components of nuclear weapons. While 
nuclear weapons remain Sandia`s core mission, the science, technology, 
and engineering capabilities required to support this mission position 
us to support other aspects of national security as well. Indeed, there 
is natural, increasingly significant synergy between our core mission 
and our broader national security work. This broader role involves 
research and development (R&D) in nonproliferation, counter 
proliferation, counterterrorism, energy security, defense, and homeland 
security. With the United States growing dependence on information 
technology, cyber security has become a key foundation in all of these 
areas.
    Sandia's extensive cyber R&D program is rooted in its rich history 
of providing adversarial threat assessments for the U.S. nuclear 
command and control systems. This program draws heavily upon our core 
science and technology (S&T) capabilities. These S&T investments afford 
the Nation the ability to leverage world-leading capabilities in 
advanced analytics, trusted microelectronics, and modeling and 
simulation. Sandia's differentiating value comes from its unique 
systems approach integrating scientific understanding, technology 
development, and complex requirements-driven engineering to develop 
solutions.
    Sandia has developed a comprehensive understanding of mission needs 
and constraints through its longstanding relationship with key 
government agencies. Working in partnership with government, other 
national laboratories, academia, and industry, Sandia has been a key 
to:

         Providing technical leadership in threat-informed 
        information assurance technology development and assessment
         Serving as an operational model for information 
        security--with a goal of defining effective operational 
        security guidelines and practice for Sandia, other government 
        agencies, and high-value private-sector networks
         Expanding the cadre of highly-skilled cyber 
        professionals through its hands-on research internship program
         Functioning as a hub that works at the intersection of 
        academia, national laboratories, industry, and government to 
        drive cyber innovation and advance the overall national and 
        global cyber health

    My statement today will focus on a number of the challenges and 
technical developments in cyber security along with how the Department 
of Energy (DOE) laboratories contribute to the Department of Defense 
(DOD) mission in cyber security. I have been employed within the DOE 
labs for 22 years collectively, 17 of those years at Sandia National 
Laboratories, where I have done research in high performance computing 
and high energy density physics. Within management, I have led teams in 
cyber security, computational physics, high performance computing, 
nuclear weapons R&D and hydrodynamic testing. For the past 2 years, it 
has been my privilege to lead the organization at Sandia that 
represents the largest collection of cyber experts within the DOE 
laboratories. My testimony represents the vast knowledge that they have 
imparted to me.

                     MAJOR POINTS OF THIS TESTIMONY

    It is the belief of a Sandia team of cyber security experts that:

    1.  The DOE laboratories are a resource to DOD in ``raising the 
bar'' to the adversaries in cyber security. We believe that a large 
part of the DOD is aware of where the cyber talent resides within the 
DOE laboratories and has effectively used DOE procedures to acquire 
that talent.
    2.  A silver bullet for solving the ``cyber problem'' for DOD, DOE, 
dot-gov or the private sector does not exist. It is impossible to make 
an absolutely secure information technology (IT) system. Sustained and 
coordinated investment in and deployment of government-owned science 
and technology could dramatically change the cost equation for our 
adversaries.
    3.  Compliance-based security and attempting to secure the 
perimeter are not effective. We need a set of metrics to objectively 
measure system security. New technologies and policies should be 
evaluated and adopted based on how they objectively improve system 
security and how much they cost. This is not a static process as 
adversaries also adapt.

    Based on the committee's request, the following topics are 
addressed:

    1.  Mechanisms to rapidly develop, test, and field innovative 
approaches to address the expanding threat spectrum
    2.  Research on network security versus data encryption
    3.  Research on the transition from signature-based detection of 
attacks to behavioral detection
    4.  Test and evaluation infrastructures at various classification 
levels (e.g. digital sandboxes)
    5.  Other research priorities
    6.  Workforce issues
    7.  Coordination across the community

    More can be said about these topics in a closed session.
    1. Mechanisms to rapidly develop, test, and field innovative 
approaches to address the expanding threat spectrum: This issue is 
particularly relevant in the cyber domain, given the rate of change of 
both technology and threats. Historically, national security technology 
has evolved on the time scales of years. In the cyber realm, new 
exploits can render defenses that seemed effective obsolete in a matter 
of seconds. Given the speed with which cyber capabilities can be 
created and the relatively low cost for entry, the potential for 
possibly far-reaching technological surprise is very high.
    Technology innovation has two key components: creation and 
adoption. One can support technology creation by providing consistent 
funding to create and maintain effective facilities and to attract 
properly trained researchers who are immersed in the problems of the 
day. Positive and open competition can be a powerful incentive to 
operate efficiently. I spent more than a decade of my career in the 
NNSA Advanced Simulation and Computing (ASC) program. Its goals were 
clear and technically compelling, we had challenging milestones, and 
funding was relatively stable. Because of those government investments, 
today we certify the U.S. nuclear weapon stockpile without the need for 
underground testing. Overall, the ASC program should be considered both 
an enormous technical success and a government success for a critical 
national security problem.
    Creating a new technology and getting it adopted are two different 
tasks. There are significant barriers that prevent technology adoption 
including expediency, cultural inertia, and investments in legacy 
technologies. The business case for investing in new security 
technologies is often not clear, reinforcing the need for better 
metrics, risk assessment, and cost analysis.
    Technology adoption can be accelerated by ensuring that researchers 
are partnered with users who understand operational needs and with 
vendors who can rapidly commercialize promising technology. Integrating 
and funding operational pilots as part of R&D programs can also improve 
the likelihood and pace of adoption. Results obtained from lab 
experiments are typically not enough to convince operators to deploy 
new technology. They need to see results in real world environments.
    2. Research on network security versus data encryption: Encryption 
and network securities are complementary topics and should not be 
viewed as competing alternatives. Data encryption raises the bar for an 
adversary, but it is wrong to believe that encrypting all network 
traffic and all data at rest is sufficient to provide adequate security 
if you cannot also keep an enemy out of your networks. Again, there is 
no silver bullet. Our goal should be to raise the cost of successful 
attacks. Better network security and careful use of high quality 
encryption both raise adversary costs.
    Cryptography is a based on well-understood mathematics. Time-tested 
algorithms and protocols exist. We can estimate how much work is 
required to break a given encryption scheme. Techniques exist for 
analyzing the security of cryptographic protocols. However, 
cryptography is quite subtle and it is easy to make mistakes especially 
in implementation. The early implementers of wireless communication 
protocols, who were all skilled engineers made numerous cryptographic 
errors. As technology evolves, effort is required to adapt the large 
body of cryptographic knowledge to the new technology. The adaptation 
is often straightforward and more of an engineering exercise than a 
basic research task.
    Other aspects of network security are much less mature. For 
example, network filtering is often driven more by existing network 
protocols and recent exploitations than a coherent protection 
philosophy. Most networks use Transmission Control Protocol/Internet 
Protocol (TCP/IP) and thus base protection on filtering of TCP/IP 
packets, so filtering is limited to attributes visible in TCP/IP. Since 
TCP/IP has no notion of user identity, even a simple policy like ``only 
administrators can configure the domain controller'' requires multiple 
security mechanisms. A network filtering policy may ensure that only 
certain ports are open and that only certain types of packets can be 
sent to those ports. A host-based policy then ensures that only 
administrators have access to powerful configuration features. 
Verifying that this collection of policies properly enforces the 
desired abstract policy is difficult.
    3. Research on the transition from signature-based detection of 
attacks to behavioral detection: Computer attacks have historically 
been detected using either signature-or anomaly-based methods. Anomaly-
based techniques look for statistically significant deviations from 
normal activity. Because of the challenges in characterizing an 
accurate baseline of normal activity, anomaly-based detection systems 
to date have had limited utility. Signature-based methods, in contrast, 
compare network and file data against a database of known attack 
signatures to detect attempted intrusions and malware. Signature-based 
methods are incapable of detecting new attacks. Polymorphic malware 
that can change its structure while retaining the same functionality is 
mostly immune to signature-based techniques.
    More recently, a new class of anomaly detection methods have been 
developed that are based on aggregating events across time and multiple 
sources to identify network--or host-based behaviors that might be 
malicious. These behavior-based methods are not as brittle as 
signature-based techniques because they can detect new, as well as 
known, variations within a general class of attacks. Behavioral methods 
have been successful in finding previously undiscovered malware. 
However, most behavior-based detection tools are not real-time 
detectors. They require the development of robust classifiers that 
describe patterns of anomalous events representing potential misuse, 
ranging from low-level events such as the opening of a network 
connection to excessive Facebook use or watching World Cup soccer. 
Using these classifiers, behavior-based techniques typically find 
anomalies after the fact in batch-processed data. Anomalies are then 
ranked so that a human analyst can focus on the most significant 
problems. However, when an anomaly is determined to be part of a larger 
infection, these behavioral techniques produce important and unique 
signatures, which can then be used to stop infections in real time. 
More can be said about the current state of the art techniques in a 
closed session.
    Current behavioral-based detection systems, however, are prone to 
high false positive rates. They require the supervision of skilled 
analysts to monitor and investigate alerts and to develop and adjust 
classifiers. The demand for skilled analysts far exceeds supply. 
Furthermore, difficult tasks can sometimes overwhelm even the best 
analysts. Depending on the time scale and complexity of the pattern of 
behavior associated with a particular type of malicious activity, 
behavioral techniques can also fail to detect an attack before an 
adversary has caused damage. Behavioral detection offers promise and 
will improve, but does not represent a panacea today.
    An often overlooked component of cyber security is that anyone can 
obtain virtually any security product on the market. The fact that our 
adversaries can use their knowledge of common security tools to predict 
the barriers they might face during an attack suggests two requirements 
for network--and host-based intrusion detection systems: (1) signature-
based products should provide an open interface by which we can develop 
and deploy proprietary signatures and scripts; (2) behavior-based tools 
that allow us to detect new attacks must be introduced to complement 
our signature-based methods. As behavioral-based detection systems 
improve, we anticipate a crossover where behavioral-based tools will 
become predominant and will be supplemented by signature-based methods.
    4. Test and evaluation infrastructures at various classification 
levels (e.g. digital sandboxes): Experimentation plays a central role 
in science and engineering as a rigorous means of testing hypotheses 
and potential solutions. The cyber research and operational communities 
recognize the necessity of more realistic test and evaluation 
infrastructures, or test beds, to advance computer security research 
and conduct cyber planning, training, and exercises. Significant 
foundational work has been done through private-sector and government 
funded efforts, including the development of hardware and operating 
system emulation and virtualization tools, network traffic generators 
and test bed management systems, and actual cyber test beds of varying 
size, realism, and classification levels. Examples include DOD 
Information Operations (IO) Range, and the National Cyber Range.
    However, cyberspace is a highly complex, manmade environment of 
vast scale and heterogeneity and presents unique and daunting 
experimental challenges that we have not yet been able to adequately 
represent in test facilities. Our current capabilities fall short in 
fidelity and in scaling up to regional and Internet-sized networks. 
Additionally, while our adversaries use the Internet as their cyber 
test bed, it is not responsible for the United States to do the same 
because of possible, unintended side effects.
    Sandia, in partnership with a number of government agencies and 
national laboratories, conducts significant research in cyber and 
cyber/physical test and evaluation technologies, including contributing 
roles in the IO Range, National Cyber Range, and DOE National 
Supervisory Control and Data Acquisition (SCADA) Test Bed. These 
activities build upon our longstanding investments and capabilities in 
high-performance computing and in modeling and simulation of physical 
and cyber systems. We and others have developed techniques and tools to 
conduct so-called live-virtual-constructive experiments that integrate 
real people and computer systems with simulated computer systems and 
modeled human behavior to evaluate consequences and mitigation 
strategies for realistic cyber scenarios like a cyber-attack on 
critical infrastructure.
    Significant challenges remain, however, to realize the high-
fidelity experiments required to support scientifically rigorous 
testing and evaluation of cyber solutions and scenarios. Cyber testing 
and evaluation can be broken down into four distinct experimental 
phases: design, configuration, execution, and result analysis. Research 
and development gaps remain in all four phases.
    Cyber experiment design presents specific challenges stemming, in 
part, from the limited scientific foundation in cyber. In other 
disciplines, well-developed approaches like wind tunnel testing and 
scientific laws like those governing fluid dynamics can be brought to 
bear to design an effective experiment. By contrast, we struggle today 
to design good cyber experiments that are controlled and repeatable. 
The complexity from integrated circuits to Internet scale networks and 
the adversarial nature of cyberspace, make it difficult to design a 
complete, valid and meaningful experiment to study cyber phenomena of 
interest, such as the propagation of a botnet, or evaluate a prototype 
security technology. Additional work is needed to develop and 
promulgate a scientifically rigorous approach to designing cyber 
experiments and exercises.
    There has been considerable progress in the last few years with 
tools and technologies for configuring and executing cyber experiments, 
but major gaps remain in these areas too. Although several test bed 
configuration tools now exist to specify and automatically configure 
elements like computer systems, and network topology, required for 
small experiments, large and complex experiments require time-consuming 
hand configuration and tuning of test bed elements. Configuration and 
execution of high fidelity, regional and Internet-scale experiments 
still pose many research challenges. In some cases it is unclear what 
scale and fidelity are even needed to answer important questions.
    Running realistically scaled experiments poses challenges of its 
own. Sandia recently demonstrated what we believe to be state-of-the-
art scale by booting 4.5 million virtual computer nodes. These nodes 
were light-weight virtual machines, meaning they exhibit some, but not 
all, of the complex behavior of a typical desktop computer. However, at 
this scale one is getting close to representing the Internet resources 
of a small country. Current test beds also have overly simplistic human 
behavior modeling elements, and thus fail to adequately represent user 
frailties, like susceptibility to spear phishing--an e-mail spoofing 
fraud attempt that targets a specific organization, seeking 
unauthorized access to confidential data or the perverse creativity of 
adversaries.
    The challenge of gathering and analyzing test results is also only 
partially solved. Fine-grained instrumentation is lacking from most 
existing test beds, as are tools for efficiently distilling and 
extracting pertinent results from the vast volumes of data that can be 
generated by large tests and exercises. Lastly, future test beds will 
need to be integrated in a much larger percentage of wireless 
components.
    Advancing the state of the art in cyber test and evaluation will 
require major research and infrastructure investments. The government 
has already made large investments in this area through several 
standalone programs such as National Cyber Range. However, we see a 
need for a new strategy that coordinates future investments across the 
government in a way that maximizes technological advancements and 
ensures test bed access for academia, government, private-sector, and 
military users, while respecting agency--and program-specific test bed 
capability and classification requirements.
    5. Other research priorities: We must devote additional attention 
to developing and implementing strategies for assuring the safety of 
the Nation's most critical national security systems. These systems are 
particularly challenging to defend because of the full-spectrum attacks 
that a nation state or other highly capable threat actor is likely to 
employ.
    The information technology supply chain is a particularly insidious 
risk to high-consequence national security systems, because of our 
widespread reliance on commercial-off-the-shelf (COTS) hardware and 
software technology that is increasingly produced in whole or in part 
by untrusted, non-U.S. organizations. Unfortunately, the growing 
complexity of these systems also makes it economically infeasible to 
verify them thoroughly.
    Insufficient attention has been given to technical approaches for 
mitigating supply chain risks. Counterfeiting and subversion of 
critical components in high-consequence DOD systems could have a 
devastating effect on our ability to project military power with 
confidence around the world. Better methodologies and technologies are 
needed for assessing and managing supply chain risks.
    IT system trust must ultimately be rooted in hardware. Additional 
research is needed to enable scalable, cost-effective hardware 
integrity evaluation to verify that no malicious features have been 
added and that security features have not been weakened. We must be 
able to positively identify and track components throughout their 
complete lifecycle. We need to discover how to compose higher assurance 
systems from largely untrusted COTS components and a small set of 
simple trusted components.
    To tip the balance in favor of defenders, we must create and deploy 
technologies and policies that decrease benefits and impose costs on 
attackers. Attackers are able to leverage the complexity of modern 
hardware and software systems to find and exploit a seemingly endless 
stream of vulnerabilities. These attacks scale globally to provide 
disproportionate benefit to attackers as a result of the relatively 
homogenous computing base that exists in most enterprise environments 
throughout the world. Although various secure design approaches, such 
as formal verification, offer promise, they do not currently scale to 
the size and complexity of COTS systems. In the near-term it is 
unlikely that COTS systems will be drastically simplified to facilitate 
formal methods-based, high-assurance development. Alternatively, 
approaches that introduce manageable and cost-effective diversity 
within hosts and across an enterprise could dramatically reduce the 
utility of many attacks and sharply raise development costs for 
attackers, forcing adversaries to have to discover and exploit multiple 
vulnerabilities simultaneously to mount a successful attack.
    6. Workforce issues: Confronting the challenges I have outlined 
today requires a highly skilled and motivated research community. It is 
well documented that the demand for cyber expertise greatly exceeds the 
supply.1,2 Over the past 3 years, Sandia has been able to 
attract and hire top United States citizen undergraduate talent by 
paying for their master's degree at the school of their choice and 
supporting them with 75 percent of their salary while they attend 
school full time. Upon returning to Sandia, they owe us 2 years without 
penalty. This has been a very successful recruiting program but 
retention results won't be available for a few more years. Doctoral and 
experienced cyber hires are more difficult, even with market-based 
salary offers, because of intense competition for their knowledge and 
skills. However, we have been successful in attracting a few high-
quality PhD researchers through a new competitive early-career research 
program that provides selected PhD hires with 2 years of internal 
funding for independent research.
---------------------------------------------------------------------------
    \1\ http://www.cioinsight.com/c/a/Trends/Damn-the-Economy-IT-
Employment-Rises-to-New-Heights/
    \2\ Langevin Assesses State of Cyber Workforce, http://
langevin.house.gov/news/press-releases/2011/10/langevin-assesses-state-
of-cyber-workforce.shtml
---------------------------------------------------------------------------
    Retention is a growing concern. Although the importance of the 
national security mission and job stability remain highly attractive 
features to our employees, new hires today receive benefits similar to 
those found in U.S. industry. Over time, therefore, we may see the 
retention rate for computer science professional's approach that of 
industry, which retains such staff for approximately 5 years. This 
could become a significant issue because it takes 3 to 5 years of 
mentoring for a recent graduate to become highly skilled in supporting 
cyber research for the U.S. Government.
    Historically, the laboratories are asked to solve the 
``impossible'' problems. Congress should consider the implications of 
not having the best and brightest U.S. cleared and experienced staff 
available to tackle the Nation's most challenging security needs. 
Presently, many of Sandia's cyber staff are being solicited by private 
companies offering more than 50 percent increases in salary and better 
benefits. Historically, we have lost less than a percent of our cyber 
workforce to outside employment; however, we are currently on a path to 
lose 10 percent this fiscal year.
    Outside of the labs' recruitment and retention challenges, there 
are additional areas that deserve attention. Academic programs for 
computer security specializations need improvement. Curricula vary from 
one university to another and few programs produce graduates who have 
both the required deep knowledge of computer hardware and systems 
combined with practical security understanding and skills. The 
Scholarship For Service (SFS) program has helped produce more qualified 
graduates, but in my opinion could be enhanced to attract the Nation's 
best students who are in turn intentionally cultivated for government 
service through improved curricula and hands-on training programs. 
Government labs and agencies participate today by providing SFS 
students with internships and hiring SFS graduates, but we could also 
partner with SFS-funded universities to help develop appropriate 
curricula, training toolkits, and exercises.
    Beyond SFS, the labs can serve a broader role as a training ground 
for the Nation's next generation of security researchers and 
operational defenders. For the past 10 years Sandia has run an 
innovative hands-on computer security internship program for 
undergraduate and graduate students called the Center for Cyber 
Defenders (CCD). Drawing summer projects from our customer-funded 
security R&D programs provides students with an opportunity to work on 
real security problems and experience the satisfaction of contributing 
directly to national security. For the first time this year, thanks to 
Department of Homeland Security (DHS) S&T support, we will be piloting 
a secure systems research challenge for CCD students that we hope can 
be extended to include other labs. In general, we believe student 
competitions are an important and still underutilized mechanism to 
attract, engage, and accelerate the development of cyber professionals.
    Professional education and training is another challenge. Knowledge 
in cyber disciplines constantly evolves, often in obscure corners of 
the Internet. Continuous learning and skills refreshing are required to 
maintain a world-class R&D and operational cyber workforce. We and 
others have done some preliminary work on competency-based training and 
other professional development activities such as rotational 
assignments between research and mission-focused roles, but this area 
requires additional attention, especially in light of the magnitude of 
the government's cyber workforce needs and the retention issues 
mentioned previously.
    7. Current coordination across the community: From a laboratory R&D 
perspective, coordination is good. For example, DOD T&E reaches out to 
the labs that have specific skills and the labs coordinate well with 
each other in assessing and improving DOD IT systems. Coordination is 
similarly close with other government agencies including people working 
together at each other's sites and through quarterly reviews.
    From an operational perspective, coordination within the Federal 
Government is improving. U.S.-CERT has created capable collaboration 
facilities within their secure web site. In our opinion there is still 
too much focus on security compliance. Compliance-based security is not 
effective. When coupled with excessive oversight, a compliance focus 
results in brittle and unresponsive security systems. Today, victims 
are often punished for the actions of adversaries.

                        SUMMARY AND CONCLUSIONS

    To tip the balance in favor of defenders, approaches and 
technologies must be developed and deployed that decrease benefits and 
impose costs (or risk) to attackers. Attackers are able to leverage the 
complexity of modern hardware and software systems at the component 
level to find and exploit a seemingly endless stream of 
vulnerabilities. These attacks scale globally to provide 
disproportionate benefit to attackers as a result of the relatively 
homogenous computing base that exists in most enterprise environments 
throughout the world. However, the cost equation to the adversary can 
be changed. Cyber defensive technology has been shown to accelerate 
when long-term stable funding is in place, technical collaboration 
among research organizations involves ``prisoner exchanges,'' test 
facilities are prepositioned and analysis/operators are an integral 
part of the team. As one example, behavioral-based detection systems 
are having significant success and as they improve, eventually we 
anticipate a crossover where behavioral-based tools will become 
predominant and supplemented by signature-based methods.
    Two areas within the scope of this committee's questions need to be 
addressed: (1) the test environments available to the research 
community; and (2) the retention of the government's cyber research 
community, which includes the national laboratories. To continue the 
acceleration of government-developed and-owned cyber defense 
technologies, testing and emulation environments of various 
combinations of scale, fidelity, and heterogeneous representations of 
regional and Internet-sized networks are needed to address multiple 
national security missions. With their deep reservoir of technical 
talent and science and technology capabilities, the DOE national 
laboratory complex has helped address some of the government's most 
challenging national security problems, including cyber. However, 
unlike the Cold War where the government used work environment, 
benefits and mission to attract and retain top scientists to government 
agencies and national labs, only a small fraction of those retention 
tools exist for the cyber war and the implications should be of great 
concern.

    Senator Hagan. Thank you. Thank you all for your opening 
testimony. Now we will go to the questions. I will ask that we 
will have 6 minutes each, and then if nobody else comes in you 
can certainly go longer.
    DOD is facing challenges seeking new graduates with 
advanced degrees, and I think each one of you mentioned that in 
your opening testimony, specifically in scientific and 
technical fields to help develop complex military systems. The 
field of cybersecurity is a key example where there is a rising 
demand, as you just mentioned specifically in the private 
sector. Yet, I think we all know it appears that the supply 
side is not keeping pace.
    Secretary Lemnios, as the key person in DOD responsible for 
our STEM education and outreach activities, how are you 
ensuring that DOD is able to recruit and retain the best and 
brightest in cybersecurity research? How are you monitoring the 
quality of DOD's cybersecurity research workforce? Then the 
final part of this question is, how much is a highly 
experienced, trained cybersecurity researcher paid within DOD?
    Mr. Lemnios. Senator Hagan, I think through testimony and 
through our written material, I think we've all recognized that 
the workforce, the talent, is central to this entire 
discussion. As such, we have been shaping our STEM programs to 
include cyber as one of the disciplines that we're focused on. 
Our Science, Mathematics, and Research for Transformation 
(SMART) program, our scholarship program which provides a year 
of scholarship for each year of service in one of our 
laboratories, is one example of many. In my written testimony, 
I gave several of these.
    This summer we will have roughly 600 students from that 
program entering DOD's laboratory infrastructure, and of those 
a significant number of them are in the cyber or related 
technology areas. I view that as one of a number of ways to 
attract young talent to pursue their work and to understand 
where their work will actually make a difference for DOD.
    The challenge beyond that, though, is to track those 
students long-term in competition with industry, in competition 
with other pay grades and other environments. I think you do 
that by, first of all, engaging those students in first-rate 
work--and you've heard from Dr. Wertheimer about the NSA piece 
of it. The same could be said with regard to the environment at 
Sandia.
    I think you also engage those students in an environment 
where they can actually learn, where they are contributing and 
they have a mentor side-by-side that helps them increase their 
skillcraft and increase their game, and certainly putting 
students and those groups on a project that has national 
significance, and we're doing that through the SMART program 
and other programs.
    Senator Hagan. How about salaries?
    Mr. Lemnios. I'm sorry?
    Senator Hagan. How about actual salaries?
    Mr. Lemnios. I don't have the salary numbers. I'd defer to 
others that might have that, and we can certainly take that 
question for the record.
    [The information referred to follows:]

    As I stated during the hearing, I would defer to the other 
witnesses to discuss salary numbers.

    Senator Hagan. DARPA has taken some interesting approaches 
to hiring personnel from nontraditional areas, such as the 
hacking community, where these individuals might not have a 
doctorate in a traditional academic field. I don't know if they 
have a master's or a college degree. But what lessons has DARPA 
learned by tapping into this talent pool that may have 
applicability across the broader DOD spectrum? Then, what does 
DARPA have as far as the necessary mechanisms to rapidly hire 
talented cybersecurity researchers? Then how much are they 
paid?
    Dr. Gabriel. Three questions.
    Senator Hagan. The hacking community.
    Dr. Gabriel. The white hat hacker community, I think, has 
been instrumental in us beginning to understand the nature, the 
challenges and opportunities in cybersecurity, both defensively 
and offensively. In particular, I point to the Cyber Fast Track 
program, which, I think, we described to you briefly.
    It was with the insight that we gained from recruiting from 
that community program managers that we understood that the 
connectivity to that community was very poor, not only for 
DARPA but the Federal Government overall. The timeframe of 
contracts, the other things that typically go into reaching out 
to the research community from our perspective, was not well-
matched to the pace of business that they did.
    Through the Cyber Fast Track program, which we launched 
last August, we have had 135 proposals, submissions, over that 
8-month period, 87 percent of them from innovative, 
nontraditional performers who have never done work for the 
government before. That was through a contracting mechanism 
that matched the speed and the period of performance.
    Just to give you an example, 36 contractors were awarded. 
The average period of performance is 5 months. So if we don't 
have contracting procedures that are much shorter than that 
period of time, it makes no sense to take 9 months contracting 
if they're only going to do 5 months of work. So the average 
time from submission to award has been 8 days, and we view that 
as a very vital part of getting the freshness, the innovation, 
and the perspective coming from that community.
    Our program managers, you asked what are the mechanisms we 
have to hire them. Ma'am, we have a culture where we 
essentially refresh essentially every 3 to 5 years. Program 
managers come to DARPA 3 to 5 years. They come to do their work 
and they leave, and that's true from program managers to office 
directors to the deputy director to the director, as you 
pointed out earlier.
    That is the pace at which we believe you need to bring in 
the talent, to bring in the perspective and the sense of 
urgency.
    We are paid just like any other civil service scales and 
other hiring authorities in DOD.
    Senator Hagan. Since I said we would limit it to 6 minutes, 
I'll hold the next two questions for the other two until it 
comes back to me. Senator Portman.
    Senator Portman. Thank you.
    Thanks for that response. I'd like to back up a little bit 
and talk about the budget. As I indicated in my opening and you 
have identified, there are areas where we're increasing 
spending. DOD's budget is one. Homeland Security is another. 
Despite this, Secretary Carter has said recently, Mr. 
Secretary, that we're not spending as much as we need to. He's 
also said we'd spend a lot more if we could figure out where to 
spend it.
    So I have two questions for you, and others feel free to 
chime in. One is, in terms of the budget levels, and as a 
former Office of Management and Budget Director, I know your 
answer is always going to be we could spend more. But honestly, 
are we spending enough? Then the second question, you can think 
about it, would really be to Dr. Gabriel's intriguing 
testimony, which is, we're spending more and yet there are more 
attacks; is that because there are just such an increase in 
attacks that the more spending and the more we throw against 
it, although we're having some impact, it's still resulting in 
a net increase in attacks? Or is it because we're not spending 
the money wisely?
    So if you could start with the first question, Secretary 
Lemnios, and then if others could chime in with regard to both 
of those questions.
    Mr. Lemnios. Senator, the question of DOD's funding level 
is something that we took head-on early last year. I was 
interested in actually two questions. First is what should 
DOD's funding level be for S&T, 6-1 through 6-3, but also what 
should the content of that spend be?
    It goes to your point: Are we funding-limited or idea-
limited in some of these issues? We tried to parse that. We did 
it the following way. I spent between August 15 and essentially 
the end of October last year going through every project in 
DOD. I went through 270 program elements. I visited each of our 
laboratories. I visited DARPA, the Services. I got a look at 
the project spend in dollars and content, what were the ideas 
that were being funded.
    We rolled that up to compare it against the strategic 
guidance that was being developed at the time to try to 
understand where were the gaps in ideas, where were those areas 
that if we had a little bit more money they were ideas that 
were ready to be harvested vice if we have more money we'll 
just kind of peanut butter it to the right. I wasn't interested 
in the peanut butter cut. I was looking at strategic 
investments.
    As a result, the President's budget request that's on the 
Hill now includes in it increases in targeted areas where we 
identified ideas and we identified concepts that would be ready 
for funding, that would be responsive to the strategic guidance 
of DOD.
    Within that, one example, we looked at a new concept at the 
convergence of cyber and electronic warfare. We can talk about 
it in detail in closed session, but it was an area that it was 
clear to us was going to come about and we had good ideas that 
we could harvest in that particular area and get well ahead of 
a threat.
    We also plussed up work in manufacturing and some other 
areas, and we identified those concepts. We took funding out of 
some topics that we identified were either mature enough or 
weren't leading to a program of record that would be of 
critical importance for DOD. So we actually made those trades, 
and the trades were not in budget ceiling; the trades were 
informed by what are the ideas that we thought we could 
address. As you can imagine, that was a spirited discussion. 
But at the end of the day we put in the budget request those 
ideas that we thought would make that trade for us.
    As far as network attacks, the question is at what point do 
we make investments in cyber network defense to the point we 
can curb network attacks? The way we're looking at that--and I 
think Dr. Gabriel has done some groundbreaking work in that 
area--is to identify where do we start changing the calculus 
for the work factor that an attacker presents as a function of 
how much work we have to put in to defending that attack. So 
we're trying to measure that, that calculus, and put concepts 
in place that in fact are non-convergent. They don't track with 
the work level of an attacker, but they actually fundamentally 
change the game. We have some concepts again we can talk about 
in closed session that address that.
    But the fundamental issue is identifying those areas that 
were funding-limited and those areas that were idea-limited, 
and I think we balanced that in the budget submittal that's on 
the Hill.
    Senator Portman. You covered most of those ideas? You feel 
these requests are adequate to cover most of them?
    Mr. Lemnios. I think there were some others that we'd like 
to go back and take a look at, and we'll be reviewing those 
over time. But I think we put in place a balanced portfolio 
that covers some real long shots and some things that we can, 
in fact, make clarity on over the next year or so.
    Senator Portman. Dr. Gabriel, could you follow up on that, 
again in reference to your comment that we are, as I wrote 
here, capability limited on defense and offense, and that you 
see more funding and yet more attacks?
    Dr. Gabriel. Thank you, sir. I would specifically like to 
address the comment you made. I don't believe it's that we're 
doing wrong things. It's just the nature of playing defense in 
cyber that it's hard, and the analogy that we've used in the 
buying tactical breathing room, it's much like treading water. 
If you find yourself in the middle of the ocean, treading water 
is a good thing. You need to tread water to stay above, keep 
your head above water. But if that's the only strategy you have 
for getting out of the predicament, you will eventually get 
tired and become overwhelmed.
    That's what we mean by taking advantage of the tactical 
breathing room, some of the work that we're doing today to 
protect us, the patching and the consistency of defensive 
measures. But if that's all we do, it is not convergent with 
the evolving and growing threat.
    So we have articulated and begun to make and shifted 
investments over the last 2 years to make sure we're looking, 
not only at things that buy us tactical breathing room, but to 
actually look at aggressive programs that seek to become 
convergent with the threat, to change the game, so it's not the 
way it is difficult to play defense, and make it difficult, to 
change those asymmetries, to change the cost calculus for what 
it means to have an attack on a cyber system.
    Likewise, I would say we'd be happy to get into some of the 
specifics of how we believe we can do that, given some of the 
investments we're making.
    Senator Portman. My time has expired, but I would just say 
that----
    Senator Hagan. You can take some more time.
    Senator Portman. Okay, I'll just take a couple minutes if 
that's okay and turn it to you.
    Dr. Wertheimer mentioned earlier the fact that he's 
concerned that some of the spending is too short term. I don't 
mean to paraphrase you, but are you referring in part to the 
tactical breathing room approach? In other words, are you 
concerned that we're not looking long enough term? Or is it 
more that we are focused more on just retaining our current 
position rather than, as Dr. Gabriel indicated, looking at how 
to deal with some of these asymmetrical threats and being more 
creative?
    What's your take on it?
    Dr. Wertheimer. Senator, at the risk of pushing March 
Madness too far, we have to deploy a division 1 team because 
the adversaries are division 1 in most cases that DOD sees. 
Google any of the headlines you've read, their first 
inclination was to attribute this to a nation-state adversary, 
one which in some sense they felt or implied that they couldn't 
be held accountable for defending against that.
    It is my belief that we are rushing to this threat numbers, 
lots of attacks, and we're trying to deploy tools and 
techniques to slow that, and in my view, we're not keeping 
enough of a strategic eye on that nation-state threat, that 
division 1 that's going to come at us and adapt to most of the 
kinds of tools and techniques that you're going to need to stop 
your routine--and routine doesn't mean it isn't important and 
it isn't scary--botnets and other large efforts.
    Senator Portman. Is it your sense that the numbers that are 
being requested would be adequate for us to think more 
strategically, so in other words, it's not so much a question 
of budgets as it is a function of approach?
    Dr. Wertheimer. I agree exactly with that statement.
    Senator Portman. With regard to NSA, you also talked about 
what I mentioned in my opening about the production of computer 
scientists being on the decline. You said you had some 
information about that. We don't need it all today, but if you 
could provide that to the committee that would be very helpful, 
because, as we have discussed in previous hearings, there are 
various approaches and some involve more direct government 
action. Secretary Lemnios talked about some interesting ways in 
which you're encouraging more young people to get into the STEM 
disciplines and providing them an opportunity along the way.
    There was discussion about whether it's advanced degrees 
that are needed or whether it may be something more 
fundamental, just to attract people into the field and then 
maybe help them to subsidize their advanced degrees.
    Just what are your thoughts as to how to deal with what you 
identified as a major problem, which is a talent shortage?
    Dr. Wertheimer. I agree that the seeding of more talent 
must occur. We have charts and I will share them with the 
committee gladly. Today, if you look at the number of PhDs in 
2010, that was 1,500 PhDs. 720 were U.S. citizens or U.S. 
persons. 64 in total came to work for any form of government.
    We are not competitive salary-wise. We tend to hire PhD 
computer scientists at grade 12, step 7, which is about 
$90,000. The middle 50 percent of offers run $75,000 to 
$124,000 in the private sector. They come in at a 12, step 7, 
and they hit a pay freeze. The average increase in salary for a 
computer scientist in industry is 4 percent a year. We hit them 
with a pay freeze.
    They come in as a 12, step 7, and they hit the pay caps 
that we have imposed upon us by DOD and particularly the Under 
Secretary of Defense for Intelligence issued a memo on the 
conversion to Defense Civilian Intelligence Personnel System 
(DCIPS), the pay banding that never happened, and it limits us 
to how many 13s, 14s, and 15s we may have as an agency.
    The average time in grade if it was just fair-shared is 12 
years to your first promotion, 12 years to your second 
promotion. You can't walk in and tell them you're going to wait 
6 years if you're good, 12 years if you're average.
    Just to give you another number--as a mathematician, I 
can't control myself--if you look at attrition across NSA, 44 
percent of the people who attrite are resigning as opposed to 
retiring. In computer science it's 70 percent.
    Senator Portman. So you've identified--and I'll turn it 
back to the chair after I ask this last question. You've 
identified an obvious problem. Looking at Dr. Peery's testimony 
here, to bring him into it, he's talked about the DOE labs and 
all the cyber talent that's there. You talked about the 
retention issue. You said 5 years on average is not enough time 
to be able to plan and to be able to develop the kind of, I 
assume, both offensive and defensive capabilities that are 
needed.
    What are some of your solutions? What would you do to try 
to both attract and retain? One would obviously be salary from 
what you said. If there are only 64 going into government, that 
may, in part, be because that range of $75,000 to $100,000 
versus $60,000 is a disincentive coming out of school with a 
bunch of loans.
    So I assume you would agree with that. You talked about pay 
bands and you talked about--and we've done this in other 
agencies and departments and do it to a certain extent in your 
agencies, I know we do at DOD. But what are some other ideas 
that you would have for this subcommittee as to how to attract 
and retain?
    Dr. Wertheimer. The first thing I would like to recommend 
is across the government in particular a STEM waiver for pay 
limitation. That is, I'd like to be able to promote to 13, 14, 
15 based on merit if they're in a STEM field, especially if 
they're in an advanced STEM field. I think that would be a 
simple and exciting solution, to know that the government makes 
an exception for STEM and that there isn't a career ceiling.
    We are expanding--we put out a 3-year postdoc program at 
NSA precisely to attract new folks. Three years. We had 140 
applications before we even advertised. This is something, they 
only are allowing me to get three. I'm only allowed to have 
three because it's a prototype, something we haven't done 
before.
    I would like a great deal more of a sense of Congress and 
others that we can experiment in the STEM fields in 
nontraditional ways. Give us some more latitude to bring them 
in for 3 years at a time, again promotions, pay. They love the 
work. The data we showed them, the challenges they have, they 
absolutely adored it. Every one of them says to me on an exit 
interview: It's less about the money; it's the sense that I 
cannot advance in my organization; I simply cannot advance.
    Senator Portman. I'll turn it back to the chair, but maybe 
we could continue this conversation at least in a submission to 
the committee that would be helpful. It does sound like it's a 
matter of pay, but also because it is exciting work and some 
people are willing to take lower pay to do it and for their 
sense of service and certainly the national security area, but 
they also want the ability to be recognized and promoted 
through merit.
    Thank you, Madam Chair.
    Senator Hagan. Thank you.
    I think when we're talking about this, too, and we're 
talking about national security, we're talking about the new 
threat of cybersecurity as the next terrorist activity, that it 
really concerns me that we're limited in pay scales, promotion 
scales, because when I look at what the alternative is, the 
private sector that is also desperately trying to attract the 
same talent, I think it is an issue of national security that 
we do need to address.
    Dr. Wertheimer, you answered some of the questions that I 
was going to raise for you. But when you specifically mentioned 
the point about personnel policies that are not conducive to 
hiring and retaining the best and brightest cybersecurity 
researchers, I was wondering if you could elaborate, or 
Secretary Lemnios, on what we need to do to change that? Mr. 
Secretary?
    Mr. Lemnios. Sure. Let me try to recenter some things and 
add a little bit of sunshine to something that is a very 
difficult problem, and that is how do we attract talent for new 
areas. While NSA has a remarkably talented research laboratory 
second to none--and Mike and I have spent a lot of time there 
and I love spending a day there or longer--the bet that we're 
making in DOD is that it has to be a balance between what we 
have in terms of internal resources, those concepts that we see 
from industry, from academia, and from our government 
laboratories. So when I look to drive early stage innovation, 
some of that will come through our laboratories, some of that 
will come through captive laboratories, but we're really trying 
to make a bet with how we can increase the pace of innovation 
and drive technical concepts through the small business 
community, through the rapid innovation fund, through other 
channels, through contract R&D agreements that couple our 
laboratories with early stage developers. The DARPA experiment 
of nontraditionals is absolutely superb.
    Much of that we can do with our existing authorities. As 
one example, we spoke last week about the Rapid Innovation 
Fund. We received 3,500 proposals from the small business 
community in that area in a fairly short-notice set of broad 
agency announcements. Some of those, in fact, were targeted to 
address cybersecurity concerns, wireless security concerns.
    We're going through that source selection now. But it seems 
to me that that's an environment that taps a community that 
wasn't engaged in this discussion earlier, and it's one that, I 
think, we'll see lots of good ideas from with enormous 
leverage.
    So when I think about our investments in STEM, absolutely 
we need to strengthen DOD's position in our laboratories and in 
the core workforce of the government. But I'm also looking at 
how do we strengthen the skillcraft and the game of industry 
and of academia as we move into these new fields. I think we've 
started along that path.
    Senator Hagan. But, Mr. Secretary, how can we change the 
policies as far as the freeze on pay and the freeze on 
advancement? I think if you've been told--is it 12 years, 6 
years, 12 years? I think we'll be losing those people to be 
contract employees.
    Mr. Lemnios. I don't have a comment on that. I just don't 
have a suggestion at this point.
    Senator Hagan. Dr. Peery, if you could just comment on 
hiring and retaining? You mentioned it in your opening 
statement, but how much is a highly experienced, trained person 
at Sandia paid?
    Dr. Peery. I probably don't have exactly the numbers that 
you need, but we could get that to you. What I will say is that 
we're able from an initial offering to compete with U.S. 
industry for starting salaries, and I can give you those 
numbers.
    [The information referred to follows:]

    As of 4/6, the average research and development family Principal 
Member of the Technical Staff (PMTS) titled Research and Development 
Scientist & Engineer, Computer Systems. PMTS is $125,892.
    The job description of individuals that fit under the PMTS umbrella 
is as follows: applies integrated technical judgment--which requires 
using the scientific method to recognize and formulate problems, to 
collect data through observation and experimentation, and to formulate 
and test hypotheses--to anticipate, innovate, and deliver solutions to 
Sandia National Laboratories missions. Roots the work in the 
fundamentals of science and engineering while applying a deep 
understanding of engineering and scientific principles. Creates and 
applies scientific theories and laws and engineering methods used 
within scientific and engineering disciplines to develop or demonstrate 
new designs, concepts, materials, machines, products, processes, or 
systems. Uses physical and computational simulation, analysis, and 
evaluation as inherent activities of development. Plans, conducts, and 
manages Sandia's scientific programs from fundamental research through 
development and demonstration.

    Dr. Peery. Where we run into problems is, because we are 
under a government-owned, contractor-operated model, the 
government has a say in what kind of raises we can provide to 
the workforce, and because of that we've seen significant 
salary compression in this area over the last 5, maybe 10 
years. Because of that, that's what's starting to drive people 
out.
    We're not quite in the same restrictions with regard to 
promotions that Mike spoke about, but we do have somewhat of a 
promotion policy. I'd hate to see us accelerate that just for 
the sake of retaining people. It's really supposed to be 
performance-based. But we don't have any artificial limits on 
that.
    Like I said, we are able to attract people to the 
laboratory because of the very challenging work that we can 
offer them in cyber, the fact that we have certain resources 
that we can train them up and get them some really special 
skills. Then if we can work on that work environment, I think 
we could have a better retention policy. We're not within DOD. 
We're within DOE. I think you probably heard of the latest 
National Academies study on the work environment within the 
NNSA laboratories, led by Dr. Shenk. That's pretty much a good 
description of exactly what our workforce is seeing today.
    Senator Hagan. It appears to me that DOE is paying 
considerably more than DOD in hiring.
    Dr. Peery. I think our initial salaries are considerably 
more. Our initial salary for a computer scientist PhD is 
$115,000. For a master's it's $95,000. Some of the enticements 
we have been able to offer is we can give very top 
undergraduate U.S. citizens, out of an undergraduate program 
and after a year of service, send them to a school of their 
choice to get their master's degree. In that program we provide 
them 75 percent of their salary while they work on their 
master's degree and then they owe us 2 years of service back.
    Senator Hagan. So not only is DOD competing with the 
private sector; they're also competing with our own DOE 
laboratories. So I see a conflict here, obviously.
    Dr. Gabriel?
    Dr. Gabriel. I'd like to just make an observation, perhaps 
from a different perspective. The shelf life of cyber 
capabilities is short. I think we've all heard that, and we 
understand that. We might even posit that the shelf life of 
cyber skills is relatively short. So this might create 
opportunities for us where there would be a core subset of 
folks that we would want to retain, but in fact, perhaps that 
we should just plan on building a model where there will be a 
significant refresh of folks coming from the cyber community.
    This is a community where the traditional metrics of a 
master's degree or a PhD may not be as important. Half of our 
so-called cyber punks, the group of about a half a dozen or 
eight program managers at DARPA, don't have Ph.Ds. Their 
skills, their capabilities, their insights, are coming from 
their practice in the community. Frankly, it will have a shelf 
life. They'll go through the 3 to 5 years and then they'll move 
on and others will come in with a newer, different perspective.
    I think that's an interesting thing about cyber. That's the 
perspective, that it has such a fast refresh and a short shelf 
life that we may have opportunities for a different model of 
how we retain that capability.
    Senator Hagan. That's a valid point, but I also think the 
mentoring aspect in some of these other areas certainly plays a 
role. You do need some time for that.
    Let me move to another area, and that is the cyber ranges. 
These are physical and virtual networks that can be used across 
the spectrum for R&D to the test and evaluation of new 
technologies, to providing the real-world environment for 
training. I understand that DOD does not perhaps have a 
complete inventory of all of the cyber ranges dispersed through 
military commands and Services.
    I'd like to ask all of you, what cyber ranges does your 
agency use? Are they adequate and could they be improved? 
Secretary Lemnios?
    Mr. Lemnios. Senator, the concepts that are being developed 
in cyber are emerging, as are the testing and the way we 
evaluate those concepts. DOD currently operates 60 ranges 
total. We know where they are. We know what they're connected 
to.
    But some of these ranges, in fact, are operational. Some of 
them are training. Some of them are actually system testbeds 
for particular systems, they're targeted for a particular 
system. We have, for example, a test environment for the Joint 
Strike Fighter that's targeted exactly to support that one 
system in all of its complexity. We have similar testbeds for 
those as well. Sometimes those are called ranges as well.
    Senator Hagan. Is that included in the 60?
    Mr. Lemnios. It is.
    There are roughly 11 or so ranges that are configurable in 
some fashion to do network assessments. There are some ranges 
that integrate classic network and radio frequency 
capabilities. So it's a broad scope.
    Last week, I had the opportunity to visit the DARPA cyber 
range with two of the DARPA program managers--one of the DARPA 
program managers and an office director. I had an opportunity 
to spend a day down in Orlando looking at what's called the 
National Cyber Range. What was interesting for me there was 
really two points. The first is that that was the first 
demonstration of how we could build a range that is separate 
from the network, that could be isolated and cleansed once a 
malicious attack is embedded in that environment.
    It also had a very unique approach that allowed us to 
compose testing in a very natural way. We could build a test 
environment in software and actually run tests in parallel.
    As I looked at that, the question was, well, how do we 
translate the results of that. I think what that's telling us 
is a way that we might think about operating some of our other 
ranges, and we're certainly taking that lesson now.
    So we're operating these as a way to validate new concepts, 
and I think that work will certainly continue to be critically 
important.
    Senator Hagan. Dr. Gabriel?
    Dr. Gabriel. So let me start by answering your question 
about our performers in general use a variety of different test 
ranges. But since Zack mentioned the National Cyber Range, I 
think it's important to point out that the focus of the cyber 
range was to develop the architecture and the tools that could 
be demonstrated and used elsewhere, and we've just begun to do 
that.
    This last year of DARPA's involvement in the cyber range is 
to take it through its operational test phase and sort of 
shakeout. But already we have had the two key elements 
demonstrated, which are multiple classification levels, so 
everything from unclassified to Top Secret, as well as rapid 
and cost-effective reconfiguration and cleanup.
    We have had two operational tests, I think, since December. 
We had one in December and one in January. Both of them have 
shown the ability to take a system, configure it, do the test, 
and then tear it down for the next one and completely clean it 
from the previous one. We've taken that cleanup time from what 
would normally take months to days, so increasing the pace at 
which testing can be done as well as the range of 
classifications that that testing can be handled at.
    Senator Hagan. While we're on that subject, I understand we 
spent about $140 million in preparing this range.
    Dr. Gabriel. Over about 3 years, that's correct.
    Senator Hagan. I wasn't quite sure how many years.
    Dr. Gabriel. Yes.
    Senator Hagan. That it is intended to transition in some 
manner to CYBERCOM. Can you give me the status of that 
transition plan, and have you received confirmation from 
General Alexander about taking over that for CYBERCOM?
    Dr. Gabriel. We've been working with CYBERCOM, and in 
particular, Robert E. Schmidle, Jr., Deputy Commander for U.S. 
Cyber Command. In fact, one of the two tests, operational tests 
that we're talking about, was done by CYBERCOM. They were using 
the test range. So we are continuing the discussions and we 
believe that that will be our transition path.
    Senator Hagan. Once again while we're on this, Dr. 
Wertheimer, what are your thoughts on whether CYBERCOM will 
become the day-to-day owner and operator of this range? Are the 
resources adequate to continue maturing the range capabilities?
    Dr. Wertheimer. I'm afraid, Senator, I have no knowledge.
    Senator Hagan. Okay.
    Mr. Lemnios. Senator, if I could just add one thing. I 
think when we talk about continuing that range as an entity, I 
view the real value of that range as the architecture that was 
demonstrated and the software that's now been developed, for 
which the government has intellectual property and can be--so 
it's really the control and the design and simulation layer 
that's been demonstrated on that range, that we can now apply 
to other ranges.
    Whether or not we use that cluster of processors and 
memory, that's interesting, but the real nugget there is the 
control architecture that's been demonstrated, how we can apply 
that to DOD's ranges for reconfigurability, for multi-level 
testing. We're going through that assessment now.
    One path would be to, in fact, use the range that exists in 
Orlando as one of DOD's ranges. Another path would be to say, 
well, let's declare success on that, it was a DARPA project, it 
demonstrated the intellectual property (IP); let's take that IP 
and then apply it to other ranges that DOD operates globally. 
We're looking at the trades between those two and I can see 
value in each of those paths.
    Senator Hagan. Evidently our first vote has started. Do you 
want to take 5 more minutes?
    Senator Portman. Yes. Let me just, if I could, follow up on 
a couple of things that have been said. Great questions and I 
appreciate the answers, and go back and ask a fundamental 
question here in the open session about what are we able to do.
    I thought it was interesting, Dr. Peery, in your comments 
you twice said that you believe that we can dramatically change 
the equation for our adversaries. What you meant by that was 
the cost equation. In other words, we can do things to make it 
more costly for them to hack into our systems or to attack 
through cyber, maybe cyber and electronic warfare.
    But you didn't say that we can stop them. In open session 
here--maybe we can get into this more in closed session--what 
do you think of that as a general matter? Is this a question of 
making it more costly, and if that's the case do some of our 
adversaries have resources to be able to circumvent whatever 
defenses that we are putting in place if they have adequate 
resources?
    Dr. Peery. Let me just make a global statement that we are 
in an environment of measures and countermeasures. It's no 
different than electronic warfare. It's no different in some 
cases than kinetic warfare. We will build capabilities, we are 
building capabilities, that put the adversary at risk. In some 
cases they're designed to put the adversary in a position where 
they are more vulnerable, and protect our equities in large 
areas.
    But you also have an adversary, certainly nation-state 
adversaries, that are doing the same thing. Then you have 
another community that's doing the same thing for other 
reasons. This is not an environment for which we can say there 
are zero defenses and zero consequences. There's always going 
to be a probability to detect, false alarm rate curve that we 
have to think through. We always have to think through what's 
the consequence of our action, what's the likely response, and 
how do we define what that redline actually looks like. We can 
talk more about that in closed session.
    But it will be--it certainly is an environment where for 
every concept that's deployed, a countermeasure is deployed by 
an adversary. You see this in your private lives. We see this 
in our private lives with nothing more than the firewalls, now 
the embedded network systems that we all have on our private 
systems. Those have matured over time.
    For each of those maturations that have occurred, 
additional levels of attack and sophistication have come into 
play. Now it's no longer just your desktop system; it's now 
your mobile system. Now the attacks aren't just spam attacks. 
They are tailored to your actions. Dr. Wertheiemer and I have 
talked a lot about this. It's very much an environment where we 
have to continually up the game and get ahead of the threat.
    The last thing I'd point to is we started in computer 
network defense years ago with a perimeter defense strategy, a 
firewall strategy. We then moved to an environment where we 
have on the commercial side embedded agents that look at 
network traffic. Eventually, we're moving to a point where no 
longer will we be looking for particular attacks, but we will 
be designing systems on the commercial side that actually morph 
autonomically, actually change their features and change their 
operating roles, to respond to threats before those threats 
present themselves.
    The private sector is working in that domain. Every one of 
these is a plateau, but that doesn't actually end because you 
have an adversary that's working to counter each of those.
    Senator Portman. Speaking for Dr. Peery, who I'm going to 
ask to speak for himself in a moment here, when he says we can 
dramatically change the cost equation for our adversaries, I 
perhaps misunderstood that to have it mean a cost in terms of a 
budget and a commitment of resources to it. What you're 
referring to, at least from what I infer from what Secretary 
Lemnios is saying, is that the cost is sometimes the 
countermeasure. In other words, that if someone or some nation-
state chooses to engage in this, there is a resource cost, but 
there's also a potential cost to their security. Is that what 
you were referring to?
    Senator Hagan. Let me interrupt. I think we have about 4 
minutes and then we'll need to adjourn and go to the closed 
session after the vote.
    Senator Portman. If you'd rather talk to this in closed 
session or you feel you need to, I understand.
    Dr. Peery. I think I can answer this fairly quickly. First, 
it's not an ``or.'' It's both. It's both the countermeasures 
and it's actually their cost of doing business. I think we have 
the wrong mental model here. I don't think we would think that 
we could keep spies out of our country. I think we have this 
model for cyber that says we're going to develop a system where 
we're not attacked.
    I think we have to go to a model where we assume the 
adversary is in our networks, it's on our machines, and we have 
to operate anyway. We have to protect the data anyway. That's 
where I think the research needs to be headed, is assuming 
they're in our systems, because if they're not doing it by 
coming through an Internet gateway then they're going to do it 
through supply chain. There's where the costs increase 
significantly.
    Senator Portman. Thank you. A sobering end.
    Thank you, Madam Chair.
    Senator Hagan. For sure.
    After the vote, we will resume in closed session in Room 
SVC-217 in the Capitol Visitor Center. Thank you, and this 
hearing is adjourned.
    [Questions for the record with answers supplied follow:]

              Questions Submitted by Senator Kay R. Hagan

            CYBERSECURITY SCIENCE AND TECHNOLOGY INVESTMENTS

    1. Senator Hagan. Mr. Lemnios, the fiscal year 2013 President's 
budget request includes a $3.4 billion investment in cyber activities. 
It is not clear how much is devoted to science and technology (S&T). In 
your written statement, you stated that $486 million is for S&T. 
However, according to the Department of Defense (DOD) Chief Information 
Officer (CIO), S&T investments are only $246 million. What is the 
actual S&T investment in fiscal year 2013?
    Mr. Lemnios. The difference in the fiscal year 2013 cyber S&T 
investment reported by the DOD CIO, who cited $246 million investment, 
and my written testimony is a result of definition. The total cyber S&T 
investment in fiscal year 2013 is $486 million. This figure includes 
National Security Agency (NSA) applied research, which is binned in 
Budget Activity (BA) 7. The $486 million figure, cited in my testimony, 
included additional NSA efforts that are actually S&T.
    The cybersecurity S&T investments reported by the DOD CIO only 
included two Defense Advanced Research Project Agency (DARPA) S&T 
programs.
    The Office of the Under Secretary of Defense (Comptroller) (OUSD 
(Comptroller)) is currently working with the DOD CIO to better define 
what investments should be included in DOD's figures for cybersecurity.

    2. Senator Hagan. Mr. Lemnios, does this investment account for all 
the Services' S&T, DARPA investments, and activities directly under the 
Assistant Secretary of Defense for Research and Engineering (ASD(R&E))?
    Mr. Lemnios. Yes, this investment accounts for all the Services' 
S&T, DARPA investments, and activities directly under the ASD(R&E), as 
well as NSA's cyber research.

    3. Senator Hagan. Mr. Lemnios, could you please provide a list of 
all the cyber S&T-related programs that comprise the $486 million 
investment figure for fiscal year 2013.
    Mr. Lemnios. The actual fiscal year 2013 cybersecurity S&T 
investment is $486 million; however, as detailed in question 1, this is 
open to definition. This $469 million includes numerous individual 
efforts. At the broad level, the investment includes the following 
organizations and programs. Note that the Program Elements (PEs) may 
also fund other research areas.

         OASD(R&E) ($38.9 million): cyber applied research, 
        cyber advanced technology development (PEs 0602668D8Z and 
        0603668D8Z).
         DARPA ($274.9 million): cyber sciences, cyber 
        technology, information assurance and survivability, 
        information integration systems, and secure information and 
        network systems (PEs 0601101E, 0602303E, and 0603760E).
         U.S. Army ($32.0 million): cyber research in MURIs, 
        network technology security, and wireless information insurance 
        (PEs 0601102A, 0601103A, 0601104A, 0602270A, 0602783A, and 
        0603008A).
         U.S. Navy ($23.2 million): cyber research in MURIs, 
        information assurance, and computer network defense (PEs 
        0601103N, 0601152N, 0601153N, 0602235N, and 0603235N).
         U.S. Air Force ($59.1 million): Cyber research in 
        MURIs, assurance and trust worthiness in complex systems, and 
        global battlespace awareness (PEs 0601102F, 0601103F, 0602202F, 
        0602204F, 0602788F, 0603456F, and 0603788F).
         NSA ($40.9 million): cyber research in areas such as 
        ubiquitous secure collaboration, high assurance software and 
        hardware, and trusted computing (PE 0303140G).
         The remaining $17 million is embedded in assorted NSA 
        PEs.

                   JOINT INFORMATION OPERATIONS RANGE

    4. Senator Hagan. Mr. Lemnios, the Joint Information Operations 
Range (JIOR) has been successful in creating a worldwide, distributed 
network that can link multiple nodes and environments in highly 
classified events. It would seem that the JIOR will be a critical 
capability for the increasing demand of research, development, test and 
evaluation, and training events. Yet, with the disestablishment of the 
U.S. Joint Forces Command, the JIOR has been transferred to the Joint 
Staff and has experienced budget cuts, as opposed to the increases one 
would expect for such a critical capability. What is DOD's plan to 
ensure the JIOR is adequately resourced to fully meet the needs of 
capability developers, testers, and the training community?
    Mr. Lemnios. I have been assured that the Joint Staff fully 
recognizes the current and future criticality of the JIOR. In 
accordance with guidance from the Secretary of Defense, the Joint Staff 
established a governance structure for the JIOR involving all DOD 
entities to facilitate a closer alignment of requirements to resources 
and normalize the event planning process. This governance structure 
will ensure greater synchronization among all DOD capabilities and 
ongoing development efforts, such as the National Cyber Range and U.S. 
Strategic Command's Cyber Training Initiative. In addition, the Test 
Resource Management Center (TRMC) is currently conducting a 
comprehensive review of DOD test and evaluation infrastructure needs. 
Part of this study will examine cyber test infrastructure, to include 
the JIOR, and make recommendations for their future funding and 
management. In late summer, these recommendations will go to the Under 
Secretary of Defense for Acquisition, Technology, and Logistics 
(USD(AT&L)), one of the co-chairs of a four-star level Cyber Investment 
Management Board (CIMB). The CIMB's purpose is to improve alignment of 
investments for the fiscal year 2014 President's budget request to meet 
needs across the cyber enterprise, including developers, testers, and 
the training community.

    5. Senator Hagan. Mr. Lemnios, in addition to basic range 
connectivity, what is DOD doing to improve the operational and threat 
environments that may be accessed via the JIOR?
    Mr. Lemnios. In coordination with JIOR stakeholders, the Joint 
Staff is developing an information operations/cyber capabilities 
repository and seeking out new technologies to provide persistent 
environments when needed, streamline planning efforts, emulate network 
traffic, and rapidly reset or sanitize environments. DOD is actively 
seeking to harvest new capabilities that will enhance JIOR technology, 
capacity, and compatibility. Additionally, in partnership with the 
Joint Mission Environment Test Capability (JMETC) program, DOD is 
planning to enhance capacity and efficiency through new technology, and 
to invest in improved instrumentation, visualization, traffic 
generation, and threat capabilities.

    6. Senator Hagan. Mr. Lemnios, are these efforts fully resourced so 
that most range customers will have ready access to standard 
environments without significant delays and costs to develop and 
accredit their own tailored environments?
    Mr. Lemnios. Yes, the JIOR is resourced sufficiently, balanced with 
other DOD priorities, to allow the highest priority range customers to 
have ready access. However, the current budget climate does force 
prioritization, and DOD is addressing resource challenges now for the 
anticipated technology and future capacity requirements of this 
critical capability. The Joint Staff is currently postured to ensure 
proper establishment, prioritization, and alignment of requirements and 
development efforts to support range customers. In addition, the CIMB, 
which was created in response to section 933 of Ike Skelton National 
Defense Authorization Act for Fiscal Year 2011, and co-chaired by 
USD(AT&L), is addressing cyber investment across DOD.

        DARPA COLLABORATION WITH OTHER FEDERAL ``ARPA'' AGENCIES

    7. Senator Hagan. Dr. Gabriel, the DARPA mission is to ``prevent 
strategic surprise from negatively impacting U.S. national security and 
create strategic surprise for U.S. adversaries by maintaining the 
technological superiority of the U.S. military.'' The Homeland Security 
Advanced Research Projects Agency's (HSARPA) mission is to focus on 
``Homeland security research and development (R&D) that could lead to 
significant technology breakthroughs and greatly enhance departmental 
operations.'' The Intelligence Advanced Research Projects Activity 
(IARPA) ``invests in high-risk/high-payoff research programs that have 
the potential to provide the Nation with an overwhelming intelligence 
advantage over future adversaries.'' It appears that these R&D agencies 
share similar objectives of focusing on technologies to address 
persistent and future threats. What collaborative and coordinated 
efforts are underway or planned between DARPA and its counterparts, 
HSARPA and IARPA, to address threats emanating from cyber space?
    Dr. Gabriel. DARPA has had a robust collaborative and coordinated 
effort with both HSARPA and IARPA. There are numerous interactions of a 
more informal nature with both agencies. In addition, the following 
program-level interactions have occurred:

         DARPA and HSARPA are collaborating to integrate and 
        transition technologies developed under DARPA's Scalable 
        Network Monitoring (SNM) program. DARPA has also provided SNM 
        data to HSARPA's PREDICT database where it is available to 
        HSARPA and IARPA researchers.
         DARPA and HSARPA are developing a Memorandum of 
        Agreement to transition technology created under DARPA's 
        Military Networking Protocol Program (MNP) to the Department of 
        Homeland Security (DHS).
         IARPA has provided a reviewer for the source selection 
        panel for DARPA's new High-Assurance Cyber Military Systems 
        (HACMS) program.
         DARPA closely coordinates with IARPA on all natural 
        language understanding R&D efforts. In addition, DARPA and 
        IARPA are sharing language data: IARPA is providing Babel 
        speech data to DARPA and DARPA is providing BOLT data to IARPA.
         DARPA and IARPA are exploring possible collaborative 
        activities in the area of ``big data'' involving DARPA's new 
        XDATA program.

                         EMERGING TECHNOLOGIES

    8. Senator Hagan. Mr. Lemnios and Dr. Gabriel, at a recent hearing 
before the Subcommittee on Emerging Threats and Capabilities of the 
House Armed Services Committee, Dr. Gabriel stated that commercial 
electronics, such as smart phones and tablets, have created 
``vulnerabilities for the United States by enabling sensors, computing, 
imaging, and communications capabilities that as recently as 15 years 
ago, were the exclusive domain of military systems.'' With the U.S. 
military becoming increasingly dependent on these same or similar 
technologies, how does the U.S. military regain/maintain cyber 
superiority in the future?
    Mr. Lemnios and Dr. Gabriel. DOD is striving to reduce the time 
needed to build military and enterprise systems by taking advantage of 
fast-moving commercial hardware, software, and services, thereby 
harnessing global investments in information technology to its benefit. 
This reliance, however, does create dependencies and potential 
vulnerabilities owing both to the quality of the technologies and to 
adversaries' ability to access the same products and services. First 
and foremost, DOD has instituted the requirement for all major 
acquisition programs to have a program protection plan, specifically to 
address potential vulnerabilities and mitigation. In addition, the DOD 
cyber S&T strategy addresses these potential vulnerabilities in several 
ways: by creating foundational models for attaining trust in system 
design and operation with elements of mixed trust (i.e., trusted 
systems built from untrusted components); by creating techniques for 
making systems resilient to cyber incursions or failures by 
incorporating features such as architectural diversity and 
unpredictability; and by creating the ability to maneuver or adapt 
cyber systems dynamically as conditions arise. Finally, DOD recognizes 
that certain elements of critical systems technology should never be 
open to adversary view. To help maintain cyber superiority, commercial 
off-the-shelf technologies must be supplemented with certain key 
government-only and carefully-protected technological components.

    9. Senator Hagan. Mr. Lemnios and Dr. Gabriel, is DOD investing 
adequately in the test capabilities and range environments that will be 
needed to remain current with these advancing technologies?
    Mr. Lemnios and Dr. Gabriel. The adequacy of investment needed for 
cyber test ranges is hard to answer. This is a new and uncertain 
technology area that we are still working to understand completely. 
However, DOD, through the JMETC program, is planning to enhance 
capacity and to invest in improved instrumentation, visualization, 
traffic generation, and threat capabilities as required. The TRMC is 
currently conducting a comprehensive review of DOD test and evaluation 
infrastructure. Part of this study will examine cyber test 
infrastructure and make recommendations for their future capabilities 
and funding in response to the growing total DOD investment. We believe 
understanding the needs in this area will continue to be a priority.

    10. Senator Hagan. Mr. Lemnios and Dr. Gabriel, how are lessons 
learned from cyber events during major exercises and real-world 
operations being addressed by DOD?
    Mr. Lemnios and Dr. Gabriel. My (Mr. Lemnios) staff (primarily in 
my Rapid Fielding Directorate) has a S&T liaison at each combatant 
command (COCOM). Additionally, we have S&T ties with the military 
departments, the NNSA, and all other defense agencies.
    COCOMs identify capability gaps based on lessons learned during 
exercises and real-world operations. They prioritize these gaps and 
submit them as an Integrated Priority List (IPL). The S&T liaisons at 
the COCOMs have the responsibility for identifying limitations, 
identified in the IPLs that result from lessons learned (capability 
gaps), to our staff so we can rapidly address their needs. In addition, 
these COCOM S&T advisors forward key lessons learned from exercises to 
us. This works well. For instance, after U.S. Pacific Command's (PACOM) 
Exercise Terminal Fury 2010, we identified, with the help of our PACOM 
S&T liaison, several serious potential limitations in the PACOM 
network. Details are classified, but as a result, we initiated the 
Computer Active Network Defense in Depth (CANDID) Joint Capability 
Technology Demonstration (JCTD). CANDID creates a sub-net that enables 
current C2 systems using dedicated hardware to create a Virtual Secure 
Enclaves (VSEs) that will allow them to operate in a cyber-challenged 
environment. CANDID also provides a cyber monitoring and alerting 
system. This will be demonstrated during PACOM's Exercise Valiant 
Shield 12.
    In September 2011, we began an initiative titled Cloudbreak to 
address COCOM C2 gaps by providing composable, net-centric capabilities 
based on common architectures across networks. CLOUDBREAK provides the 
venue to demonstrate mature capabilities that address IPL gaps and have 
sustainable transition paths. Our first campaign is underway at PACOM 
and will demonstrate cyber capabilities needed by their CYBER PAC, C2 
capabilities needed by their Joint Operations Center (JOC), and 
intelligence, surveillance, and reconnaissance (ISR) capabilities 
needed by their Joint Intelligence Operations Center (JIOC). We began 
fielding these capabilities in February 2012. They are operational now 
and will be used in the upcoming PACOM Exercises Terminal Fury and 
Valiant Shield.
    We are only providing these two examples to show how we are 
identifying, then addressing, limitations from exercises and real world 
operations. We do similar things with the other COCOMs.

                             CYBER TESTING

    11. Senator Hagan. Mr. Lemnios, today's weapons systems are more 
complex and more interdependent than any of their predecessors. Cyber 
capabilities are inherent in virtually every system deployed by the 
U.S. military. Interoperability both enhances a weapon system's 
effectiveness while creating new potential vulnerabilities. As these 
weapons systems are tested and fielded, how does DOD ensure that its 
weapons systems remain both interoperable and secure?
    Mr. Lemnios. Through the Deputy Assistant Secretary of Defense for 
Developmental Test and Evaluation (DASD(DT&E)) and Director, TRMC, DOD 
is developing new cyberspace test and evaluation capabilities to 
support interoperability and cyber testing for weapon systems in 
development. As this effort matures, so will DOD improve its ability to 
ensure that weapons systems remain both interoperable and secure. The 
DASD(DT&E) conducted an initial pilot program in December 2011 to 
examine methodologies and infrastructure for testing mission threads 
within a realistic cyber environment. To facilitate these efforts, DOD, 
in partnership with the JMETC program, is planning to enhance capacity 
and to invest in improved instrumentation, visualization, traffic 
generation, and threat capabilities.

    12. Senator Hagan. Mr. Lemnios, what new test or experimentation 
methodologies or capabilities are needed to ensure that the cyber 
components of these systems meet warfighters' needs in the evolving 
operational and threat environments?
    Mr. Lemnios. Ensuring that cyber components meet warfighters' needs 
requires that the experimentation environments resemble the real 
operating environments in which cyber technologies are meant to work. 
The challenge includes the integration of cyber and military platforms 
and weapons systems. Reusable scenario packages must be developed to 
create realistic environments, including cyber and simulated 
operational aspects, and new measurement and recording capabilities 
need to be developed to allow collection of data during experiments to 
refine them for future use.
    In fiscal year 2011, we initiated a pilot project called the Cyber 
Measurement Campaign to develop experimentation methodologies to 
measure effectiveness of new cyber security S&T. For instance, 
experiments in operational agility will focus on quantitatively 
measuring the ability to respond to attacks in a timely manner, and to 
rapidly adapt to thwart the attack. Experiments such as these will 
provide the empirical data for objectively evaluating new research 
ideas early in the technology development lifecycle and will allow us 
to validate and refine our research roadmaps. Improved testing 
methodologies developed in these experiments can also be subsequently 
used by the testing community.
    In addition, permanent distributed cyber ranges are needed, with 
sufficient flexibility to enable running many different variations of 
each test and rapid replanning and reconfiguration of experiments. 
Prototype cyber range technology, in conjunction with existing range 
facilities, must be matured to meet these needs. The investments needed 
to develop these capabilities are being examined by the newly created 
DOD CIMB. The goal is to establish a persistent, distributed community 
for ongoing experimentation in applying scientific methods to 
cybersecurity.

              BEHAVIOR-BASED VS. SIGNATURE-BASED DEFENSES

    13. Senator Hagan. Mr. Lemnios, in his testimony, Dr. Peery 
stressed that defensive systems that rely on knowing in advance what 
the signature of an attack looks like, so that a monitoring device or 
software on the defended network can recognize that attack as it is 
happening and block it, are just not robust. Such systems cannot 
prevent new forms of attack that are becoming easy and inexpensive to 
construct. He points out that a different generic approach based on 
analyzing the behavior of new software entering a defended computer, 
and the subsequent behavior of that computer, is much more promising 
and will eclipse signature-based defenses over time. The major, 
enterprise-wide defensive system deployed in DOD is a signatures-based 
system--the Host-Based Security System (HBSS). In addition, the system 
provided by NSA, known as Einstein, to defend DOD, the rest of the 
Federal Government, and potentially critical infrastructure, is also 
signature-based. Last year this committee passed a provision requiring 
DOD to develop a comprehensive strategy to adopt behavior-based 
approaches for cybersecurity at every level of its network--endpoints, 
enclaves, and gateways--to enable rapid discovery of previously unknown 
threats. In addition, the committee has funded pilot programs to 
demonstrate advanced commercial technologies for defense that use 
techniques other than signatures of known threats. Your statement makes 
no mention of the importance of behavior-based detection technology for 
cyber defense, or of the pilot programs that Congress has funded. Non-
signature-based defenses do not appear in any list of technology 
thrusts. Why not?
    Mr. Lemnios. While my statement did not specifically cite the 
importance of behavior-based technology, that does not indicate the 
development of this capability is not important. DOD's approach to 
network defense is consistent with Dr. Peery's observations regarding 
signature-based capabilities. We believe that the signature-based 
defenses provided by HBSS and network sensors are a necessary baseline 
that should be augmented, and in the future potentially replaced by, 
non-signature-based tools, capabilities, and techniques. The overall 
approach is best understood in the context of a layered cyber defense 
approach, which incorporates signature-based capabilities, non-
signature-based capabilities, proper configuration and management of 
endpoints, and robust attack detection and diagnosis. The signature-
based capabilities are well known and ubiquitously deployed, forming 
the foundation of the defenses and harnessing the well-funded 
commercial investments in threat identification and signature 
development.
    Non-signature-based capabilities are currently deployed on a more 
limited basis, partially because of the relative immaturity of the 
products involved and issues with respect to enterprise DOD fielding. A 
key example is the Host Intrusion Prevention System (HIPS) module 
within HBSS which incorporates heuristic and behavior-based techniques 
and flexible policy definitions to detect and remediate malicious 
activity. In addition, HBSS includes protections against generic buffer 
overflows based on generalized packet anomalies rather than specific 
signatures to detect adversary attempts to execute malicious code. At 
the network level, a variety of policy-based traffic blocks are 
implemented at various levels across DOD based on anomalous behaviors 
and non-signature-based information developed through the attack 
detection and diagnosis process.
    Proper configuration and management of endpoints is implemented 
with the goal of removing technical vulnerability as much as possible. 
Examples are DOD's efforts to configure every computer as securely as 
possible and DOD's efforts to deploy and use strong cyber identity 
credentials from the DOD Public Key Infrastructure. Since a given 
vulnerability may play a role in a variety of different types of cyber 
attack, these vulnerability removal efforts are more robust against 
classes of attack than are signature-based protections. The attack may 
be blocked without knowing much about the attack characteristic other 
than that the attack depended on the now non-existent vulnerability.
    An additional goal relative to protection of endpoints is to shield 
remaining vulnerabilities against attack. Examples are: the several 
layers of perimeter defense (often firewalls) between the internet and 
a given DOD computer; and some of the functions of DOD's HBSS. Some of 
the current perimeter defenses use both signature and non-signature-
based protections, examples of which are protocol and application 
filtering firewalls. These at least partially depend on recognizing the 
behaviors of particular protocols or applications contained in the 
protocols, and on recognizing the signatures of particular attacks 
embedded in the protocols the defenses allow to pass.
    Robust attack detection and diagnosis acknowledges that defenses 
will be defeated, and calls for the collection, processing, and 
continuous analysis of network sensor data and traffic. This approach 
is strengthened by the analytical integration of data from multiple 
sources and multiple collection approaches, including signature-based, 
non-signature-based, and end-point baseline configuration and 
activities.
    DOD is engaged in pilot efforts to investigate the advantages and 
applicability of behavior-based technologies at distinct layers in the 
network defense. The Defense Information Systems Agency is conducting 
pilots of network-based and end-user-based non-signature technologies. 
At the host level, lab testing has determined several potentially 
useful solutions that apply to key security concerns, including safe 
browsing, anomaly-based detection and mitigation, and various 
whitelisting strategies. At the network level, a pilot is being pursued 
that seeks to sandbox questionable traffic to identify malicious 
attacks at the DOD boundary.
    The pilots were chosen to complement DOD's existing protection and 
detection systems so that if a particular pilot is successful, 
transition to production can be done in a way that is compatible with 
existing technology, or that takes advantage of some of the features of 
the existing technologies. A key goal is to be able to deploy non-
signature-based technologies without reengineering the other components 
of DOD's layered defenses.

                  SECURE SOFTWARE AND SOFTWARE TESTING

    14. Senator Hagan. Mr. Lemnios, your statement stressed the 
challenges we face in achieving security for our information systems 
and our tactical weapons systems due to inadvertent or potentially 
purposefully inserted vulnerabilities in the so-called ``supply chain'' 
of hardware components and software that come from diverse industry 
sources, many of which are overseas. You rightly emphasize the need for 
technology solutions to this problem. What is DOD doing to discipline 
and incentivize the defense industrial base to write secure software 
code in the first place, so that there are far fewer vulnerabilities 
for adversaries to exploit?
    Mr. Lemnios. In an effort to discipline and incentivize the defense 
industrial base to ensure that custom developed DOD software solutions 
are secure, DOD has established comprehensive program protection 
planning policy and guidance for all acquisition programs. Program 
Protection Plans (PPP) are now required at all major milestones; these 
plans communicate data and requirements for all security aspects of the 
program, including software security. These processes require DOD's 
acquisition programs to use software assurance best practices, 
including tools, methodologies, and standards, to test for, detect, and 
mitigate vulnerabilities and weaknesses during software development.
    Additionally, DOD is engaged with key commercial software vendors 
to actively contribute to community-wide standards and practices to 
identify common vulnerabilities and weaknesses and improve the secure 
development of commercial off-the-shelf (COTS) software products. DOD 
actively encourages the sharing of common vulnerabilities, weaknesses, 
and attack patterns information within the software industry to develop 
more secure code in DOD custom software development and the secure 
adaptation of COTS software for DOD use.

    15. Senator Hagan. Mr. Lemnios, what is DOD doing to exploit and 
further develop commercial tools that can automatically analyze both 
source code and so-called machine code to detect vulnerabilities and 
weaknesses? These tools can help developers to correct mistakes as code 
is being written, and they can help the testing community determine the 
quality and security of software being developed for DOD.
    Mr. Lemnios. DOD has taken steps to address the need to identify 
vulnerabilities and weaknesses during software development, and 
encourage use of, and further development of commercial software 
assurance (SwA) tools. First, DOD has established comprehensive program 
protection planning policy and guidance for all acquisition programs. 
PPP are now required at all major milestones; these plans communicate 
data and requirements for all security aspects of the program, 
including software security. These processes require DOD's acquisition 
programs to use SwA tools, methodologies, and standards, to test for, 
detect, and mitigate vulnerabilities and weaknesses during software 
development. Second, DOD is working with academia, industry, the 
Services, and defense agencies on the development of improved SwA tools 
and techniques such as formal verification, secure-coding, run-time 
analysis, and code visualization.
    DOD actively engages with the broader SwA community through the DOD 
SwA Community of Practice (CoP), which consists of organizations across 
DOD, industry, FFRDCs, and other government agencies. This CoP serves 
as a forum to share knowledge and feedback regarding SwA tools and 
their use.

                ENTERPRISE-SCALE CYBERSECURITY SOLUTIONS

    16. Senator Hagan. Mr. Lemnios, starting about 5 years ago, DOD 
undertook a large-scale, DOD-wide fielding of HBSS. DOD has 
approximately 7 million desktop computers spread across all the 
Services, defense agencies, and COCOMs--on each of which HBSS had to be 
installed, managed, and supported. This was an expensive and difficult 
process--and it still is not complete. Our sense is that this 
experience instilled reluctance in DOD to attempt any further 
enterprise-wide security solutions that require touching these millions 
of endpoints. The problem is that HBSS is a first-generation security 
solution that relies chiefly on programming signatures of known cyber 
attack tools and methods--an approach that is insufficient for the 
future. Commercial industry is rapidly developing new tools that use 
different approaches to either discovering threats that have not been 
seen before or preventing such threats from being able to take control 
of a targeted computer. This committee has funded pilot programs to 
demonstrate this technology. In your view, what can be done to overcome 
the challenges to fielding endpoint or host-based enterprise 
cybersecurity solutions when the enterprise is so vast, diverse, and 
complex as DOD?
    Mr. Lemnios. The premise of your question is that DOD's 
infrastructure is too vast, diverse, and complex to rely on host-based 
enterprise cybersecurity solutions. You asked ``what can be done to 
overcome . . . these challenges.'' Implicit in your question is that we 
should investigate new methodologies. We agree that the current DOD 
enterprise is very complex and that malware signature-based security is 
not enough. However, HBSS is just one layer of a security architecture 
that starts at the DOD gateways and extends to the cryptographic tokens 
for user identity. We believe maturing technologies to improve both 
host-based architectures and new network methodologies offers the most 
prudent course for the protection of DOD.
    HBSS is an integrated system that is more than a signature-based 
detection solution. It is also a sensor that can collect many kinds of 
information about the state of the host--information that can be used 
in future non-signature methods of detection--and an extensible 
infrastructure for fielding new plug-in capabilities. In addition to 
host level intrusion detection and prevention, HBSS also provides 
detailed asset tracking, security policy management and control, host 
level baseline and program identification, security compliance 
reporting, and control of devices connected to the host.
    There is no question that fielding an endpoint security 
architecture on 7 million desktops throughout DOD was an arduous 
process. However, the work done to put HBSS in place has provided an 
installation infrastructure for future deployments. The initial work on 
the infrastructure, as well as continuing initiatives, will make future 
deployments a much less arduous and expensive process. New HBSS plug-in 
modules are deployed much more rapidly and efficiently now that the 
server structure is in place.
    New types of information can be tapped by configuring the HBSS 
sensing capabilities and reporting to security services at the host or 
off-host. New tools and detection methods coming from industry, such as 
the recent cyber pilots, can be acquired and distributed to DOD's 
desktops as plug-ins to the platform that HBSS provides, so that 
advanced S&T can be incorporated as it emerges. In addition to host 
level protection, new capabilities for defending DOD's systems and 
networks are also being implemented at the enclave network, backbone 
network, and boundary controller access points, intercepting attack 
actions before they reach the hosts themselves.

                   HIRING THE MOST QUALIFIED EXPERTS

    17. Senator Hagan. Dr. Gabriel, understanding that DARPA relies on 
a mix of hiring authorities to bring the best talent to DOD, what help 
do you need from this committee to ensure you can continue recruiting 
the best talent for our Nation?
    Dr. Gabriel. DARPA uses a dynamic mix of hiring authorities: Highly 
Qualified Experts, 1101s, and Intergovernmental Personnel Act. In order 
for DARPA to continue to rapidly and efficiently hire the Nation's most 
qualified technical experts from industry, academia, and the private 
sector; DARPA is asking for an increase in our 1101 authorization by 
20, from the current number of 40 to 60.
                                 ______
                                 
               Questions Submitted by Senator Rob Portman

                           BUDGET CONTROL ACT

    18. Senator Portman. Mr. Lemnios, as you know, the Budget Control 
Act requires DOD in January 2013 to reduce all major accounts over 10 
years by a total of $492 billion through sequestration. This will 
result in an immediate $55 billion reduction to the fiscal year 2013 
defense program. The Secretary of Defense has been quoted on numerous 
occasions that the impact of these cuts would be ``devastating'' and 
``catastrophic,'' leading to a hollow force and inflicting serious 
damage to our national defense. Yet, the Military Services must begin 
this month with some type of guidance on developing a Service budget 
for fiscal year 2014. Can you specifically describe what impact you 
anticipate in regard to cyber defense programs if sequestration occurs?
    Mr. Lemnios. The fiscal year 2013 budget includes significant 
funding for cybersecurity efforts across the government and includes 
both defense and non-defense, and classified and unclassified 
activities. At this stage, it would be premature to speculate on the 
specific impacts sequestration would likely have on cybersecurity 
activities. However, cuts under sequestration could hurt efforts to 
fight cyber threats, including four key efforts:

         Improving the security of our classified Federal 
        networks and addressing WikiLeaks;
         Continuing the Comprehensive National Cybersecurity 
        Initiative (CNCI);
         Sustaining the National Strategy for Trusted 
        Identities in Cyberspace; and
         Initiating continuous monitoring of unclassified 
        networks at all Federal agencies.

    19. Senator Portman. Mr. Lemnios, what programmatic cuts would have 
the most significant impact on DOD's ability to defend against cyber 
intrusions?
    Mr. Lemnios. The fiscal year 2013 budget includes significant 
funding for cybersecurity efforts across the government and includes 
both defense and non-defense, and classified and unclassified 
activities. At this stage, it would be premature to speculate on the 
specific impacts sequestration would likely have on cybersecurity 
activities. However, cuts under sequestration could hurt efforts to 
fight cyber threats, including four key efforts:

         Improving the security of our classified Federal 
        networks and addressing WikiLeaks;
         Continuing the CNCI;
         Sustaining the National Strategy for Trusted 
        Identities in Cyberspace; and
         Initiating continuous monitoring of unclassified 
        networks at all Federal agencies.

    20. Senator Portman. Mr. Lemnios, how will you assess the risk of 
each cut?
    Mr. Lemnios. DOD is not currently preparing for sequestration, and 
the Office of Management and Budget (OMB) has not directed agencies, 
including DOD, to initiate plans for sequestration. It is premature to 
assess the risk of each cut.

    21. Senator Portman. Mr. Lemnios, was any planning commenced to 
date to ameliorate the impact of sequestration reductions to 
cybersecurity programs?
    Mr. Lemnios. DOD is not currently preparing for sequestration, and 
OMB has not directed agencies, including DOD, to initiate plans for 
sequestration.
                                 ______
                                 
             Questions Submitted by Senator Saxby Chambliss

                          INFORMATION-SHARING

    22. Senator Chambliss. Mr. Lemnios, both government and commercial 
networks worldwide have experienced repeated assault by hackers over 
the past several years. In your testimony, you touched on the need for 
increased information-sharing between agencies and sectors in order to 
effectively protect our national security. Several pieces of 
legislation have been introduced in the House and Senate to address 
this fundamental point; however, while we all agree on the need for 
information-sharing, there is disagreement on the most effective 
approach. Keeping in mind private sector concerns and the potentially 
negative impact of increased regulation, what do you recommend as the 
best approach to facilitate greater information-sharing?
    Mr. Lemnios. I am not sure I want to assess any approach as best, 
but one approach to facilitate greater information-sharing of cyber 
threat intelligence is to reduce the barriers to sharing, and promote a 
federated communities approach to sharing. In support of this approach, 
the Secretary of Defense recently endorsed the Cybersecurity Act of 
2012 introduced into the Senate by Senators Lieberman, Collins, 
Feinstein, and Rockefeller. Reducing barriers will be accomplished in 
part by making sharing voluntary, not mandatory; by incentivizing 
sharing and considering safe harbor provisions; and by sharing more 
broadly the threat information provided in government brokered 
exchanges (e.g., Defense Industrial Base Collaborative Information 
Sharing Environment) by relaxing restrictions on secondary sharing in 
ways consistent with the voluntary nature of the sharing. The nature of 
information shared should also be considered. Threat indicators can be 
shared more broadly and readily if sensitive information about 
compromises and vulnerabilities is not required, while still providing 
value to a larger sharing community.
    One size will not fit all. Instead, the approach should support a 
federation of sharing communities each with possibly different sharing 
models (e.g., hub and spoke, post to all, hybrid) and each with its own 
``circle of trust'' among its members. To encourage wider, voluntary 
sharing of actual incident data, the approach should also support 
models that allow the use of sensitive information in cyber defenses 
without exposing the information too broadly. This could be done for 
instance by supporting models in which security service providers use 
such sensitive information to protect customers, but without sharing 
the sensitive information with those customers. To manage costs, scale, 
and enable automated cross-sharing among federated communities, we 
should develop and adopt common standards (e.g., National Institute of 
Standards and Technology's (NIST) Security Content Automation Protocol) 
and trust models; structured cyber threat information sharing 
repositories, and frameworks for creating, managing, and evolving 
federated information sharing communities.

    23. Senator Chambliss. Mr. Lemnios, in your testimony you highlight 
``foundations of trust'' as one of the areas of development to support 
the ``DOD Strategy for Operating in Cyberspace.'' This trust is 
confidence that our systems will perform as expected and have not been 
compromised. The military supply chain is extremely vulnerable to cyber 
attacks as we have seen from media reports. Given supply-chain 
challenges and the fact that many components are provided by foreign 
commercial sources, is it possible that some components of our cyber 
defenses may contain components from less than fully trusted sources? 
If so, how do you recommend we address this issue and maximize the 
trust we place in our cyber defenses?
    Mr. Lemnios. Yes, it is possible that left unaddressed, some 
components of our cyber defenses could contain components from less 
than fully trusted sources. The globalization of the Information and 
Communications Technology (ICT) market has provided DOD with 
significant cost and performance benefits but also presents challenges 
to our national security systems. DOD is, however, taking a proactive 
risk management approach to address this issue through its Trusted 
Defense Systems Strategy, first reported to Congress in the Report on 
Trusted Defense Systems in January 2010.
    The strategy is based around four core elements that:

    (1)  prioritize scarce resources based on mission criticality of 
the system in question,
    (2)  make comprehensive program protection planning a requirement 
for all acquisition programs,
    (3)  improve DOD's capability to detect and respond to 
vulnerabilities, and
    (4)  collaborate with industry to develop commercial standards for 
supply chain risk management and secure commercial products.

    DOD is deploying this strategy in partnership with the Military 
Services and acquisition program offices, strengthening and leveraging 
systems security engineering, supply chain risk management, hardware 
and software assurance, counterintelligence, test and evaluation, and 
information assurance capabilities in a risk-based approach to 
mitigating cyber and supply chain vulnerabilities.
                                 ______
                                 
             Questions Submitted by Senator Scott P. Brown

                            CYBER WORKFORCE

    24. Senator Brown. Mr. Lemnios, in light of DOD's need to address 
the Nation's evolving cyber threat, how does DOD plan to build a strong 
cyber workforce and access the highest caliber technical talent in 
academia and industry?
    Mr. Lemnios. DOD efforts to build a strong cybersecurity workforce 
are led by the DOD CIO. Among many ongoing efforts, most noteworthy is 
DOD's key role in the National Initiative for Cybersecurity Education 
(NICE). Working closely with appropriate DOD activities and with other 
NICE agencies such as NIST, the CIO has identified the knowledge, 
skills, and abilities required to perform key cybersecurity skill sets. 
This framework of skill sets forms the foundation for developing in-
house cybersecurity expertise.
    DOD is sharing the NICE skill set framework with industry and 
academia. Leading educators and certification institutes have begun to 
incorporate the NICE framework into their training and education 
programs, and into standards and requirements documents.
    The NICE component on Cybersecurity Workforce Training and 
Professional Development is in the process of assessing the size and 
quality of the cyber workforce, identifying workforce gaps, and will 
develop requirements, a training catalog, and professional development 
roadmaps for cybersecurity professionals. DOD is a leader in these 
efforts and is actively incorporating the NICE guidance into cyberspace 
workforce efforts.

    25. Senator Brown. Mr. Lemnios, are you aware of the high 
technology throughout New England and its potential to quickly identify 
solutions that meet DOD's cyber requirements?
    Mr. Lemnios. Yes, as a long-time resident of Massachusetts, and 
former Chief Technology Officer of MIT/Lincoln Lab in Lexington, MA, I 
am very familiar with high technology throughout New England, and 
especially in the Boston high technology corridor. For example, the 
nationally-recognized Massachusetts' Advanced Cyber Security Center 
(ACSC) is a cross-sector research facility established in September 
2011 and hosted by MITRE Corporation. Members of ACSC's Strategic 
Advisory Board have leadership experience with DHS and DOD, and bring 
an insider's understanding of DOD cyber requirements. Additionally, the 
University of Rhode Island hosts the Digital Forensics and Cyber 
Security Center, which is a multi-disciplinary university center that 
provides courses and degree programs, research, services, and 
consulting in Digital Forensics, Information Assurance, and Cyber 
Security. These are only a small sample of the types of organizations 
located in New England that are capable of contributing to the solution 
of DOD's cyber requirements.

    [Whereupon, at 4:12 p.m., the subcommittee adjourned.]


DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 
               2013 AND THE FUTURE YEARS DEFENSE PROGRAM

                              ----------                              


                        TUESDAY, MARCH 27, 2012

                           U.S. Senate,    
                   Subcommittee on Emerging
                          Threats and Capabilities,
                               Committee on Armed Services,
                                                    Washington, DC.

THE DEPARTMENT OF DEFENSE'S ROLE IN THE IMPLEMENTATION OF THE NATIONAL 
   STRATEGY FOR COUNTERTERRORISM AND THE NATIONAL STRATEGY TO COMBAT 
                     TRANSNATIONAL ORGANIZED CRIME

    The subcommittee met, pursuant to notice, at 2:40 p.m. in 
room SR-232A, Russell Senate Office Building, Senator Kay Hagan 
(chairman of the subcommittee) presiding.
    Committee members present: Senators Hagan, Portman, and 
Inhofe.
    Majority staff members present: Richard W. Fieldhouse, 
professional staff member; Creighton Greene, professional staff 
member; Jessica L. Kingston, research assistant; Michael J. 
Kuiken, professional staff member; William G.P. Monahan, 
counsel; and Michael J. Noblet, professional staff member.
    Minority staff member present: Adam J. Barker, professional 
staff member.
    Staff assistant present: Kathleen A. Kulenkampff.
    Committee members' assistants present: Anthony Lazarski, 
assistant to Senator Inhofe; and Brent Bombach, assistant to 
Senator Portman.

        OPENING STATEMENT OF SENATOR KAY HAGAN, CHAIRMAN

    Senator Hagan. We will bring to order the Emerging Threats 
and Capabilities Subcommittee hearing today. I want to welcome 
all of our witnesses and Senator Portman.
    Today in preparation for the subcommittee's upcoming work 
on the National Defense Authorization Act (NDAA) for Fiscal 
Year 2013, we will hear testimony from our witnesses on the 
Department of Defense's (DOD) role in the implementation of the 
National Strategy for Counterterrorism (CT) and the National 
Strategy to Combat Transnational Organized Crime (TOC), as well 
as the new Defense Strategic Guidance and Priorities.
    I want to welcome the Assistant Secretary of Defense for 
Special Operations/Low-Intensity Conflict (SO/LIC), Michael A. 
Sheehan, to the subcommittee for his first hearing since being 
confirmed by the full Senate in December. Welcome back to the 
subcommittee, Deputy Assistant Secretary of Defense for Special 
Operations and Combating Terrorism, Garry Reid; and Deputy 
Assistant Secretary of Defense for Counternarcotics and Global 
Threats, William F. Wechsler. Thank you for being here.
    Last June, President Obama released the new National 
Strategy for Counterterrorism. This strategy was released 
shortly after an inflection point for our Nation's CT operators 
with the successful mission against Osama bin Laden, preceding 
it by a month. While our Nation's CT efforts appropriately 
remain an interagency endeavor under the new strategy, DOD has 
and will continue to play a key role in building security 
partnerships that enable our foreign partners, as well as 
directly applying various CT tools and capabilities wherever 
appropriate.
    In addition to the National Strategy for Counterterrorism, 
in July of last year, the President released our Nation's first 
National Strategy to Combat TOCs. Rightly, in my view, the 
strategy recognizes that TOC is a significant threat to 
national and international security. While combatting TOC is 
certainly not a core function of DOD, the Department does play 
a key role in supporting operations of both U.S. and foreign 
law enforcement agencies, and it does so by providing funding 
and unique enabling capabilities, conducting operations to 
detect and monitor illicit trafficking that may be destined for 
the United States, and, again, the building of relationships 
and the capacity of foreign militaries and law enforcement 
forces to carry out similar operations themselves.
    More recently, the new Defense Strategic Guidance and 
Priorities further emphasized the importance of capacity 
building and other theater security cooperation activities in 
support of the geographic combatant commanders, as well as the 
important role our Special Operation Forces (SOF) will play in 
the implementation of our Nation's engagement overseas. We hope 
our witnesses will address their ongoing efforts to support the 
implementation of these new strategies and any legislative 
authorities or funding they may need to carry out adequately 
their assigned responsibilities under these strategies.
    A number of authorities expire this year, including DOD's 
ability to support CT partners in Yemen and national 
contributing to international CT operations in Somalia. Another 
authority to provide a broad range of support to the Colombian 
security services is also set to expire at year's end. The 
subcommittee looks forward to discussing DOD's requirements in 
these regions and elsewhere.
    In the interest of ensuring that there's adequate time for 
questions, I'll insert the remainder of my opening statement 
into the record.
    [The prepared statement of Senator Hagan follows:]

               Prepared Statement by Senator Kay R. Hagan

    Today, in preparation for the subcommittee's upcoming work on the 
National Defense Authorization Act for Fiscal Year 2013, we will hear 
testimony from our witnesses on the Department of Defense's (DOD) role 
in the implementation of the National Strategy for Counterterrorism and 
the National Strategy to Combat Transnational Organized Crime, as well 
as the new Defense Strategic Guidance and Priorities. I want to welcome 
Assistant Secretary of Defense for Special Operations/Low-Intensity 
Conflict, Michael A. Sheehan, to the subcommittee for his first hearing 
since being confirmed by the full Senate in December, and welcome back 
to the subcommittee Deputy Assistant Secretary of Defense for Special 
Operations and Combating Terrorism, Garry Reid; and Deputy Assistant 
Secretary of Defense for Counternarcotics and Global Threats, William 
F. Wechsler.
    Last June, President Obama released the new National Strategy on 
Counterterrorism. This strategy was released shortly after an 
inflection point for our Nation's counterterrorism (CT) operators with 
the successful mission against Osama bin Laden preceding it by a month. 
While our Nation's counterterrorism efforts appropriately remain an 
interagency endeavor under the new strategy, DOD has and will continue 
to play a key role in building security partnerships that enable our 
foreign partners, as well as directly applying various CT tools and 
capabilities wherever appropriate. At all times, these efforts must be 
conducted in a manner that adheres to our core American values.
    In addition to the National Counterterrorism Strategy, in July of 
last year, the President released our Nation's first National Strategy 
to Combat Transnational Organized Crime. Rightly, in my view, the 
strategy recognizes that transnational organized crime (TOC) is a 
significant threat to national and international security. While 
combatting transnational organized crime is certainly not a core 
function of DOD, the Department plays a key role in supporting 
operations by both U.S. and foreign law enforcement agencies. It does 
so by providing funding and unique enabling capabilities, conducting 
operations to detect and monitor illicit trafficking that may be 
destined for the United States, and--again--the building of 
relationships and the capacity of foreign militaries and law 
enforcement forces to carry out similar operations themselves.
    More recently, the new Defense Strategic Guidance and Priorities 
further emphasized the importance of capacity-building and other 
theater security cooperation activities in support of the Geographic 
Combatant Commanders, as well as the important role our Special 
Operations Forces (SOF) will play in the implementation of our Nation's 
engagement overseas.
    We hope our witnesses will address their ongoing efforts to support 
the implementation of these new strategies and any legislative 
authorities or funding they may need to carry out adequately their 
assigned responsibilities under these strategies. A number of 
authorities expire this year, including the Department's ability to 
support certain CT partners in Yemen and national contributing to 
international CT operations in Somalia. Another authority to provide a 
broad range of support to the Colombian security services is also set 
to expire at year's end. The subcommittee looks forward to discussing 
the Department's requirements in these regions and elsewhere.

                      COUNTERTERRORISM AUTHORITIES

    Appropriately, the President's National Strategy for 
Counterterrorism maintains our focus on pressuring al Qaeda's core, 
while emphasizing the need to build foreign partnerships and capacity 
in priority countries around the world. Assistant Secretary of Defense 
Sheehan and Deputy Assistant Secretary of Defense (DASD) Reid, in 
addition to continued direct action operations against al Qaeda, all 
three strategies emphasize the importance of DOD expanding its 
military-to-military and security cooperation activities, particularly 
as they relate to counterterrorism.
    Over the past decade, Congress has provided DOD with a number of 
counterterrorism ``train and equip'' authorities that enable U.S. 
forces to train with and enhance the capabilities of foreign nations to 
conduct counterterrorism operations on their own. These activities have 
paid dividends--most notably in Somalia where the Ugandan military, 
acting as part of an African Union peacekeeping force, has made 
substantial gains in recent months against al Shabab--an al Qaeda 
affiliate. Our engagements with the Ugandans, as well as the Kenyans 
and Ethiopians, have contributed to the ability of these forces to 
achieve such success. As the Department continues to invest in these 
activities, and as additional SOF become available from U.S. Central 
Command, I look forward to seeing similar efforts in other regions of 
particular concern.
    I hope our witnesses will discuss the Department's views on the 
various CT authorities at their disposal, as well as discuss any 
legislative gaps that may currently exist. As Assistant Secretary 
Sheehan and I discussed last week, it is important to continue our CT 
activities--both direct and indirect, but we must also invest in 
building broader relationships with those foreign security forces with 
whom we are engaging. We look forward to hearing of these broader 
efforts as well.

                      COUNTERNARCOTICS AUTHORITIES

    DASD Wechsler, most--if not all--of DOD's authorities to support 
the President's National Strategy to Combat Transnational Organized 
Crime are in your portfolio. The Department's unique counternarcotics 
authorities permit DOD to engage with, and build the capacity of, 
foreign law enforcement services and militaries, as well as enable the 
force projection capabilities of our Nation's Federal law enforcement 
agencies to outposts in Afghanistan, Central America, and West Africa. 
These authorities will likely serve as key enablers for DOD to assist 
in our government's efforts against transnational criminal 
organizations. Further, your office is well-resourced with 
approximately $1.5 billion in the President's current budget request.
    As the National Strategy to Combat TOC states, ``[t]here is no 
single structure under which transnational organized criminals operate; 
they vary from hierarchies to clans, networks, and cells, and may 
evolve to other structures. The crimes they commit also vary.'' One 
highly common crime, however, is the trafficking of illegal narcotics 
and the associated money and weapons that enhance the capabilities of 
these criminal enterprises. Despite some targeted success in the aerial 
and maritime domain, illegal narcotics continue to flow into the United 
States and the swathes of instability in countries around the world.
    The Commanders of U.S. Northern and Southern Command recently told 
the full committee that TOC poses a threat to national and 
international security, and that militaries are more often being called 
upon for internal security responsibilities. Law enforcement agencies 
that are under-resourced, poorly trained and equipped, and prone to 
corruption, complicate DOD's efforts to engage with its counterparts in 
many countries and further--risk exposing militaries to the same 
corrupting influences that have undermined their law enforcement 
counterparts and the potential for human rights abuses as a result of 
the unfamiliar operating environment. DASD Wechsler, the subcommittee 
looks forward to learning of your efforts to support the combatant 
commanders in their security cooperation activities, particularly as it 
relates to your engagement and capacity building activities with 
foreign law enforcement agencies.
    With these circumstances in mind, there are two priority areas 
within the strategy I hope our witnesses will discuss: (1) DOD's 
efforts to build international capacity, cooperation, and partnerships; 
(2) DOD's ability to enhance intelligence transnational threats. These 
two areas within the strategy fit the Department's roles and missions 
most clearly, and understanding your plans, policies, and programs in 
these areas is important to us.
    Both Assistant Secretary Sheehan and Deputy Assistant Secretary 
Wechsler bring strong backgrounds in the area of law enforcement and 
transnational threats. The subcommittee looks forward to our witnesses' 
testimony in this area, as well as their analysis of the trajectory of 
our efforts.

                   ROLE OF SPECIAL OPERATIONS FORCES

    When the new Defense Strategic Guidance was released, Secretary 
Panetta stated that ``whenever possible, we will develop innovative, 
low cost and small-footprint approaches to achieve our security 
objectives.'' I believe this statement defines our SOF. The unique 
language and cultural skills they have acquired put them at the 
forefront of implementing the strategies we are discussing today.
    This year, SOF will be engaged in more than 100 countries around 
the world and it is clear that the global security environment will 
drive a significant demand for their unique capabilities for the 
foreseeable future. Many of these personnel will deploy from North 
Carolina, home of the U.S. Army and Marine Corps Special Operations 
Commands.
    As effective as counterterrorism operations have been in degrading 
the leadership ranks and capability of al Qaeda and its affiliate 
organizations to strike our interests, DOD must continue to improve its 
ability to work with other agencies and partner nations to address the 
factors that allow violent extremism to take hold. As Admiral McRaven, 
Commander of U.S. Special Operations Command (SOCOM), told the 
committee earlier this month, ``the direct approach alone is not the 
solution to the challenges our Nation faces today as it ultimately only 
buys time and space for the indirect approach and broader governmental 
elements to take effect.''
    Our SOF rely heavily on the aforementioned authorities to carry out 
engagement and capacity building activities with partner nation 
security forces. However, some have criticized these authorities for 
not being flexible enough to proactively respond to the security 
challenges. As a result, it has been argued that our ability to carry 
out the ``indirect approach'' outlined by Admiral McRaven lags 
significantly behind our ``direct'' capabilities. News reports indicate 
that SOCOM is seeking new authorities that would better support 
deployed SOF as they work with our partner nations to address the 
common threats we face.
    The committee looks forward to hearing from our panel what 
authorities they believe will be necessary to more effectively carry 
out the ``indirect approach'' as described by Admiral McRaven now and 
in the future.

    Senator Hagan. I will now turn to Senator Portman for any 
opening remarks.
    Senator Portman.

                STATEMENT OF SENATOR ROB PORTMAN

    Senator Portman. Thank you, Madam Chairman, I welcome our 
distinguished witnesses here today, whose testimony today will 
help us to come up with a better NDAA for Fiscal Year 2013 
because we're going to be relying on your testimony for dealing 
with CT and Transnational Criminal Organizations (TCO).
    Over the past several months, we've received testimony from 
a lot of folks, including regional combatant commanders, senior 
DOD officials, and others with regard to the President's budget 
request and its implications for the programs and activities 
within their respective areas of responsibility (AOR). I think 
with this testimony we've already heard has made clear is that 
threats facing our Nation remain significant. They're changing, 
but both in scale and complexity are still very real. This is 
particularly true with regard to the threats that you are going 
to be tasked with addressing every day in your jobs and that 
you will talk about today. So, we appreciate your being here.
    I think it is fair to say al Qaeda remains the top 
terrorist threat in the United States, and while its senior 
leadership has certainly suffered some losses because of the 
sustained CT operations over the years, I am sure you will tell 
us today that its regional affiliates, such as those in Yemen, 
Somalia, and Northwest Africa are growing in capability, and we 
are seeing a resurgence of its franchise in Iraq unfortunately. 
But we look forward to hearing from that.
    Closer to home, as Chairman Hagan has just pointed out, the 
TOC issues continue to be a major problem for us. Those 
organized crime entities continue to erode our security and 
really our governance, and it is throughout our hemisphere, 
including our neighbor to the south, Mexico. So, these criminal 
groups now command multibillion dollar global networks, and in 
many cases, I understand they are trained and certainly better 
equipped than the security forces that are trying to stop them. 
So, we look forward to hearing from you about that as well.
    In addition to the myriad of security threats facing our 
Nation that I have just mentioned, we find ourselves in the 
middle of a very difficult budget situation. You are being 
asked to find savings under the Budget Control Act (BCA) of 
about $487 billion over the next 10 years. That was step one, 
but looming on the horizon, of course, is the potential for 
huge additional reductions of nearly $490 billion, so roughly 
the same amount under sequestration. That is current law. We 
have to assume it is going to occur, despite the fact that many 
of us believe that it would be devastating to the military. The 
Secretary of Defense has said that. He has also said it would 
be catastrophic to our military. He has also said it would 
hollow out our military. Those are pretty strong words. So, I 
look forward to the assessment of our witnesses today and what 
impact that second stage sequestration would have on your work 
and on the important missions that you are being asked to 
execute.
    Additionally, these fiscal realities are important to talk 
about in the context of which programs you think are the 
highest priorities and which processes can be made more 
effective, more cost-effective, in particular, to meet our 
national security objectives. So, it is what would the impact 
be, but also should we have additional reductions as is current 
law? What would you do to prioritize?
    So, these are all important topics, and, again, we look 
forward to having you provide us this information to help us 
fill in some of the blanks and be able to talk about what I 
think is fair to say is one, if not the most important, 
national security concern that we face as a country.
    Thank you, Madam Chair.
    Senator Hagan. Thank you, Senator Portman.
    Secretary Sheehan, if you want to give your opening 
remarks, please.

 STATEMENT OF HON. MICHAEL H. SHEEHAN, ASSISTANT SECRETARY OF 
     DEFENSE FOR SPECIAL OPERATIONS/LOW-INTENSITY CONFLICT

    Mr. Sheehan. Thank you. Good afternoon, Chairman Hagan, 
Senator Portman, and members of the subcommittee. Thank you for 
the invitation to testify this afternoon. As you mentioned, it 
is my first opportunity as Assistant Secretary of Defense for 
SO/LIC to appear before this committee.
    Let me thank you for your support, your meaningful and 
consistent support, to SO/LIC and to U.S. Special Operations 
Command (SOCOM) over the years past.
    Recently, as you mentioned, the President has provided 
clear direction to DOD, including SO/LIC and SOCOM in the form 
of the National Strategy for Counterterrorism and the Strategy 
to Combat TOC, both of which frame the DOD role in defending 
our citizens and interests from these threats. As ASD SO/LIC, I 
am committed to leading and integrating DOD efforts to fully 
implement these two complementary and mutually reinforcing 
strategies.
    Because terrorism, drug trafficking, and other forms of TOC 
are increasingly intertwined, SO/LIC is uniquely positioned to 
provide policy guidance and program oversight to DOD's CT and 
counter TOC activities.
    I am pleased to have sitting beside me two of my deputies. 
On my right is Garry Reid; on my left is William Wechsler. Both 
of them bring unique perspective and considerable experience to 
these issues. They look forward to contributing to the 
discussion during the question and answer period.
    Our perspective within SO/LIC is that by integrating CT, 
counternarcotics, and combatting TOC capabilities, resources, 
and authorities, the impact of our actions are more strategic, 
more effective, and make better use of available resources.
    Let me first provide you some of my perspectives on the 
National Strategy to Combat TOC. As we look ahead to the next 
decade, the landscape is changing to some extent. We have ended 
our combat role in Iraq. In Afghanistan, we are transitioning 
increasingly the responsibility for security to the Afghanistan 
Government and their security forces. What will not change, 
however, is our focus on aggressively deterring, disrupting, 
dismantling, and defeating al Qaeda and its associated forces 
and adherents around the world, while maintaining vigilance 
against other terrorist organizations that have threatened--
that threaten or have potential to threaten the United States 
and our allies. But our focus will remain on al Qaeda, as you 
mentioned, Senator Portman.
    Our national and theater Special Operations Forces (SOF) 
employ a combination of direct and indirect action to implement 
the strategy. While SOF's direct action capabilities are likely 
to garner the most attention--these are strikes against 
terrorist attacks--just as important, and perhaps more so in 
the future, are the SOF's effort to build the capability and 
capacity of our partners to shape the global information and 
ideas environment, as well as to train and equip the capacity 
of other countries. In this regard, section 1208 and other 
priorities--other authorities are very important to our 
success. Those include CT, counternarcotics authorities of 
sections 1004, 1033, 1021, and 1022 of the NDAA. These efforts 
often remain largely unnoticed, but have long-term strategic 
effects in CT as well.
    In implementing the CT strategy, we will continue to focus 
on al Qaeda's activity originating from western Pakistan and 
the Federally Administered Tribal Areas (FATA). We have made 
great progress on this front, but al Qaeda is a highly adaptive 
organization. We must continue to work with Pakistan and 
address the threats emanating from this region.
    Another important front against al Qaeda is on the Arabian 
Peninsula (AQAP) which poses a direct threat to our interests 
and interests of our partners. We have made numerous important 
gains over the last year against AQAP, but the group's 
capabilities and intent to conduct a terrorist attack in the 
United States continue to represent a serious threat. DOD 
continues to collaborate extensively with the Yemeni forces on 
operational matters, and together we are closely monitoring 
AQAP and regularly improving our understanding of its external 
plots.
    The last area of the CT that I would like to highlight for 
you today pertains to the global information environment. As I 
alluded to previously, we know that al Qaeda cannot be defeated 
by kinetic action alone. In order to counter the residents of 
al Qaeda's ideology, our approach must include a balance of 
capabilities implemented in close coordination with 
interagency, our allies, and local communities.
    Recognizing the growing relationship among terrorists, 
insurgents, drug traffickers, and other criminals, last year 
the President issued his Strategy to Combat TOC. This forward-
looking strategy seeks to address emerging, rapidly-evolving 
types of threats to our national security: networks of 
adversaries that operate at the nexus of organized crime in the 
politically-inspired violence, the convergence of crime, 
terrorism, and insurgency, in my view, a burgeoning 
geopolitical trend with great implications to our national 
security. The Strategy to Combat TOC recognizes that our 
traditional focus on countering drug trafficking organizations 
must be expanded to a wider perspective that acknowledges that 
narcotics trafficking is just one component of the broader 
challenge of TOC.
    Important initial steps in implementing this strategy have 
been recognized in a growing array of security challenges, 
global criminal networks pose, increasing the understanding of 
the implications of the nexus among criminals, terrorists, and 
insurgents developing policies and tools to degrade these 
threats.
    DOD plays a largely supporting role to U.S. interagency 
efforts to combat TOC. In addition to DOD's support to State, 
local, and Federal law enforcement agencies, DOD is helping 
partner-countries build capacity to address narcotics 
trafficking and related TOC within their borders. Critical to 
these efforts are DOD's counternarcotics authorities and 
budget, which have proven to be effective and flexible tools 
for confronting drug trafficking, including where drug 
trafficking is linked to other forms of organized crime.
    Nowhere is the link between TOC, insurgency, and terrorism 
more apparent than in Afghanistan, where the Taliban continues 
to receive a large percent of its revenue through the heroin 
trade. Because of the convergence of these threats, our law 
enforcement partners, such as the Drug Enforcement 
Administration (DEA), are employing their expertise and 
authorities in support of DOD objectives on the battlefield.
    In addition to depriving the enemy of vital narcotics-
related revenue, insurgents found to be involved in drug 
trafficking may be prosecuted under Afghan law and 
incarcerated, taking them off the battlefield and enhancing 
government institutions at the same time.
    We know that in order to confront increasing network 
threats, we need to be increasingly networked as a government. 
Active threat networks will exploit the limitations the U.S. 
Government often faces because of separate agency authorities, 
budgets, and institutional cultures. The strategy to combat TOC 
is a call to action to leverage all the elements of national 
power to protect citizens and U.S. national security interests, 
and to enable our foreign partners to do the same.
    In conclusion, both of these strategies seek to proactively 
deter and confront emerging threats for national security 
whether they are terrorists or criminals or increasingly 
individuals at the nexus of what our too often conceptual 
stovepipes. To be effective on both fronts, we must continue to 
build cooperation across DOD and the U.S. Government, while at 
the same time developing the capacities of like-minded foreign 
partners. As the Assistant Secretary of Defense for SO/LIC, I 
am committed to working with this committee to continue to 
build our CT and combatting TOC capabilities so that we are 
more effective in the decade ahead.
    Thank you again. I look forward to the opportunity for a 
frank dialogue and Q&A period.
    [The prepared statement of Mr. Sheehan follows:]

             Prepared Statement by Hon. Michael A. Sheehan

    Good afternoon, Chairman Hagan, Senator Portman, and members of the 
committee. Thank you for the invitation to testify before you this 
afternoon. As this is my first opportunity as Assistant Secretary of 
Defense for Special Operations/Low-Intensity Conflict (SO/LIC) to 
appear before the subcommittee, let me express my gratitude for the 
consistent and meaningful support you provide to SO/LIC and U.S. 
Special Operations Command (SOCOM). I have worked in and around the 
Special Operations Forces (SOF) community for the last 32 years, and I 
have a deep appreciation of the progress that has been made in the past 
decades--in no small part due to the support of Congress and this 
committee. I believe a critical turning point came when Congress 
created SO/LIC and SOCOM through the Goldwater-Nichols legislation and 
the Nunn-Cohen Amendment over a quarter century ago.
    These pivotal pieces of legislation are the foundation of the 
important work that SOF has done since September 11, from toppling the 
Taliban regime to capturing Saddam Hussein to killing Osama bin Laden. 
With these recent successes, some have made the argument that SOF has 
now arrived into the ``mainstream'' within the Department. While I 
agree that progress has been made in institutionalizing Goldwater-
Nichols, this effort remains a work in progress, especially as we look 
to the coming decade of sustained global demand for SOF and constrained 
defense budgets.
    In recent months, the President has provided clear direction to the 
Department of Defense (DOD)--including SO/LIC and SOCOM--in the form of 
the National Strategy for Counterterrorism (CT) and the Strategy to 
Combat Transnational Organized Crime (TOC), both of which frame DOD's 
role in defending our citizens and interests from these threats. As 
Assistant Secretary of Defense for SO/LIC, I am committed to leading 
and integrating DOD's efforts to fully implement these two 
complimentary and mutually reinforcing strategies.
    To this end, the partnership between SO/LIC and SOCOM will be 
essential. SO/LIC will continue to support the evolution of SOCOM as we 
take on both the challenges of these strategies and the recently 
released defense strategy ``Sustaining U.S. Global Leadership: 
Priorities for the 21st Century''. Together, we will work to make 
efficient use of our resources and authorities to address these cross-
cutting security threats. We will also be looking at developing and 
testing new approaches to meeting these evolving threats.
    Because terrorism, drug trafficking, and other forms of 
transnational organized crime are increasingly intertwined, SO/LIC is 
uniquely positioned to provide policy guidance and program oversight to 
DOD's CT and counter-TOC activities. I am pleased to have sitting 
beside me two of my deputies--Deputy Assistant Secretaries of Defense 
Garry Reid and William Wechsler--who each bring a unique perspective to 
these issues. They look forward to contributing to the discussion 
during the question and answer portion of the testimony. Both of their 
offices bring extraordinary expertise to the Department's efforts to 
implement the CT and Combating TOC strategies. By integrating our CT, 
counternarcotics, and combating transnational organized crime 
capabilities, resources, and authorities, the impact of our actions are 
more strategic, more effective, and make better use of available 
resources.
    Let me first provide you with my perspective on the National 
Strategy for Counterterrorism. As this committee is well aware, we have 
made progress in the past decade since the tragedy of September 11 in 
confronting al Qaeda, its associated forces, and its adherents. I see 
three primary reasons for our success in preventing another terrorist 
attack on U.S. soil. First, we have taken down the al Qaeda sanctuary 
in Afghanistan. Second, we have maintained constant pressure on the al 
Qaeda network around the globe, including in Pakistan's Federally 
Administered Tribal Areas, crushing the ability of al Qaeda to conduct 
strategic attacks. Lastly, we have built broad international 
cooperation by developing strong counterterrorism partnerships with 
countries around the globe.
    Now, as we look to the decade ahead, the landscape is changing to 
some extent. We have ended our combat role in Iraq, and in Afghanistan 
we are transitioning increasing responsibility to the Afghan Government 
and security forces. What will not change is our focus on aggressively 
deterring, disrupting, dismantling, and defeating al Qaeda and its 
associated forces and adherents around the world, while maintaining 
vigilance against other terrorist organizations that threaten or have 
the potential to threaten the United States and our allies. These 
efforts will be guided by the principles set forth in the National 
Strategy for Counterterrorism adhering to U.S. core values, building 
security partnerships, applying CT tools and capabilities 
appropriately, and building a culture of resilience.
    Our national and theater SOF employ a combination of direct and 
indirect action to implement the strategy. While SOF's direct action 
capabilities are likely to garner the most attention, just as 
important--perhaps more so--are the SOF efforts to build the capacity 
and capabilities of our partners and to shape the global information 
and ideas environment. In addition to ``Global Train and Equip'' 
capacity building efforts often referred to as ``section 1206,'' other 
SO/LIC-managed authorities are also critical to our efforts. These 
include the counternarcotics authorities of sections 1004, 1033, 1021, 
and 1022 of the National Defense Authorization Act, which in addition 
to traditional counter-drug support, also allow the Department to 
enhance the capabilities of the security forces of our foreign partners 
where there is a link between drug trafficking and terrorism. These 
efforts often remain largely unnoticed, but have long-term, strategic 
effects in CT.
    In implementing the Counterterrorism Strategy, we will continue to 
focus on al Qaeda's activities originating from Western Pakistan and 
the FATA. As I noted earlier, we have made progress on this front, but 
al Qaeda is a highly adaptive organization, and we must continue to 
work with Pakistan to address threats emanating from this region.
    Another important front against al Qaeda is in the Arabian 
Peninsula (AQAP). Our challenge in this region is twofold. First, AQAP 
poses a direct threat to our interests and the interests of our 
partners. We've made a number of important gains over the past last 
year against AQAP, but the group's capabilities and intent to conduct a 
terrorist attack in the United States continue to represent a serious 
threat. DOD continues to collaborate extensively with Yemeni forces on 
operational matters, and together we are closely monitoring AQAP and 
regularly improving our understanding of its external attack plots. 
Efforts to counter AQAP's narrative have also helped delegitimize the 
group and discourage its efforts to recruit new operatives. Second, a 
large quantity of financial support from individuals and charities flow 
from the region to al Qaeda and its associated forces and adherents 
around the world. Addressing both of these threats requires partnership 
with Saudi Arabia, the United Arab Emirates, Bahrain, Yemen, Kuwait, 
and others, to ensure that they have both the capabilities and the will 
to effectively confront these challenges.
    The last area of the Counterterrorism Strategy that I would like to 
highlight for you today pertains to the global information environment. 
As I alluded to previously, we know that al Qaeda cannot be defeated 
with kinetic action alone. In order to counter the resonance of al 
Qaeda's ideology, our approach must include a balance of capabilities, 
implemented in close coordination with the interagency, our allies, and 
local communities.
    Recognizing the growing relationship among terrorists, insurgents, 
drug traffickers, and other criminals, last year the President issued 
his Strategy to Combat TOC. This forward-looking strategy seeks to 
address an emerging, rapidly evolving type of threat to our national 
security: networks of adversaries that operate at the nexus of 
organized crime and politically-inspired violence. The convergence of 
crime, terrorism, and insurgency is, in my view, a burgeoning geo-
political trend with grave implications. As the Director of National 
Intelligence, James Clapper, recently observed, ``Terrorists and 
insurgents will increasingly turn to crime and criminal networks for 
funding and logistics, in part because of U.S. and western success in 
attacking other sources of their funding. Criminal connections and 
activities of both Hizballah and AQIM illustrate this trend.''
    The Strategy to Combat TOC recognizes that our traditional focus on 
countering ``drug trafficking organizations'' must be expanded to a 
wider perspective that acknowledges that narcotics trafficking is just 
one component of the broader challenge of TOC. Important initial steps 
in implementing this strategy have been recognizing the growing array 
of security challenges global criminal networks pose, increasing the 
understanding of the implications of the nexus among criminals, 
terrorists, and insurgents, and developing effective policy tools to 
degrade these threats, to include the ability to track and target the 
funds that allow these threats to carry out their activities.
    The Department plays a largely supporting role to U.S. interagency 
efforts to combat TOC. In addition to DOD support to U.S. State, local, 
and Federal law enforcement agencies, DOD is helping partner countries 
build capacity to address narcotics trafficking and related TOC within 
their borders. Critical to these efforts are the Department's 
counternarcotics authorities and budget, which have proven to be 
effective and flexible tools for confronting drug trafficking, 
including where drug trafficking is linked to other forms of organized 
crime.
    Nowhere is the link between TOC, insurgency, and terrorism more 
apparent than in Afghanistan, where the Taliban continues to receive a 
large percentage of its revenue through the heroin trade. Because of 
the convergence of these threats, our law enforcement partners such as 
the Drug Enforcement Administration are employing their expertise and 
authorities in support of DOD objectives on the battlefield. Today we 
are seeing unprecedented integration of military and law enforcement 
operations. In addition to depriving the enemy of vital narcotics-
related revenue, insurgents found to be involved in drug trafficking 
may be prosecuted under Afghan law and incarcerated for over 10 years, 
taking them off the battlefield and enhancing Afghan Government 
institutions at the same time.
    Because the threat networks we face are not limited to a single 
illicit activity, we must continue to draw upon all elements of our 
national power to confront them. The best example of what can be 
achieved through a comprehensive approach of law enforcement, military, 
and diplomatic support has been in Colombia, where I served as an 
active duty Special Forces officer. Once on the verge of becoming a 
narco-state in the 1990s, Colombia today has made substantial progress 
in improving its security and continues to make progress against the 
Revolutionary Armed Forces of Colombia (FARC) and other criminal 
groups. Colombia is now an exporter of security in the region, 
supporting other nations' efforts to confront transnational organized 
crime. This success is due in great part to ``Plan Colombia,'' 
Colombia's comprehensive plan for combating drug trafficking and its 
detrimental effects on Colombian society. The principal credit of the 
success of Plan Colombia belongs to the Colombian people themselves who 
stood up to the criminality of terrorist organizations corrupted by the 
illicit drug trade.
    Another important factor in Colombia's success was a fundamental 
shift in our understanding that the FARC was not simply a political 
insurgency, but rather a criminal enterprise. Over time, that 
fundamental change in perspective became the bedrock for facilitating a 
cohesive, integrated, multi-agency approach to supporting Bogota's 
efforts to degrade and defeat the FARC. By conceptualizing the threat 
differently, we were able to create new lines of engagement and attack, 
which led to strategic success against a group that posed an 
existential threat to the Colombian state. Underpinning that success 
was the support of Congress for a sustained strategy that could evolve 
and integrate authorities from many agencies into one strategic effort. 
There may be opportunities to take a similar approach against other 
adversaries of significant national security concern that are both 
terrorist and criminal in nature. As we identify these opportunities, 
we will be working with you and our colleagues across the interagency.
    From the Colombia experience, we know that in order to confront 
increasingly networked threats, we need to be increasingly networked as 
a government. Active threat networks will exploit the limitations the 
U.S. Government often faces because of separate agency authorities, 
budgets, and institutional cultures. The National Strategy to Combat 
TOC is a call to action to leverage all the elements of national power 
to protect citizens and U.S. national security interests and to enable 
our foreign partners to do the same.
    In conclusion, both of these strategies seek to proactively deter 
and confront emerging threats to our national security, whether they 
are terrorists or criminals or, increasingly, individuals operating at 
the nexus of what are too often conceptual stovepipes. To be effective 
on both fronts, we must continue to build cooperation across DOD and 
the U.S. Government, while at the same time developing the capacities 
of like-minded foreign partners. As Assistant Secretary of Defense SO/
LIC, I am committed to working with this committee to continue to build 
our CT and combating TOC capabilities so that we are even more 
effective in the decade ahead. Thank you again for this opportunity, 
and I look forward to a frank dialogue during the question and answer 
session.

    Senator Hagan. Thank you, Secretary Sheehan. I understand 
that, Mr. Reid and Mr. Wechsler, you all have some short 
opening statements.
    Mr. Reid. Actually I do not. I can.
    Senator Hagan. Feel free to take a few minutes for an 
opening statement.

STATEMENT OF GARRY REID, DEPUTY ASSISTANT SECRETARY OF DEFENSE 
         FOR SPECIAL OPERATIONS AND COMBATING TERRORISM

    Mr. Reid. Thank you very much, Madam Chair, and Senator 
Portman, for the opportunity to come back and talk to you again 
today. It has been just about a year since I came over with the 
other colleagues in the gap between Assistant Secretaries. So, 
it is good to be back here again. We work closely with your 
staff regularly and appreciate the support and interaction.
    We feel, as has been highlighted, that as much has been 
done in many years of war at great cost, that significant 
progress is being made in the CT and special operations area. 
As you highlighted, Madam Chair, with the release of a new 
strategy and the process going forward, we are currently 
looking at how we bridge from past, present, into future, how 
that affects our SOFs and our CT authorities, resources, and 
everything you highlighted.
    So, I look forward to the opportunity to focus in on your 
specific questions in these areas and those portions of the 
portfolio that I support for the Assistant Secretary.
    Thank you.
    Senator Hagan. Mr. Wechsler.

STATEMENT OF WILLIAM F. WECHSLER, DEPUTY ASSISTANT SECRETARY OF 
        DEFENSE FOR COUNTERNARCOTICS AND GLOBAL THREATS

    Mr. Wechsler. Thank you also for having me back, and I want 
to compliment you on the topic of this hearing that combines 
these issues, as Assistant Secretary Sheehan said, which too 
often are viewed separately.
    If I might just in a very brief opening statement point out 
four different trends that we see that are included in both 
strategies. First, terrorist groups are adopting criminal 
techniques to fundraise, for logistics, for movements. This we 
see accelerating. This is something that Director of National 
Intelligence Clapper talked about in his threat briefing to the 
committee.
    Second, criminal organizations are adopting terrorist 
techniques. The criminal organizations in Mexico did not invent 
the idea of beheading people and putting the videos up on You 
Tube. They saw others do that, but then they adapted it for 
their own needs, and that is a different dynamic that we are 
seeing.
    The third dynamic is terrorist organizations and criminal 
organization that heretofore have been separate are working 
together in ways that we had not seen previously. Nothing 
illustrates this more than the attempted assassination of the 
Kingdom of Saudi Arabia's Ambassador here in the United States 
by the Qods Force trying to use the Mexican Zetas cartel.
    Then the fourth trend that I might suggest is a little 
different than the first three, which is states, as we used to 
think of states, as we still think of states as being sponsors 
of terror, there are also states that are sponsors of crime, 
that use criminal activity as a tool of the state, as a revenue 
producer of the state. That is a dynamic that we are watching 
very closely and trying to work against.
    So, with that, I am very happy to take your questions.
    Senator Hagan. Thank you. Thanks to all of you for being 
here. Right now, what I think we ought to do, Senator Portman, 
is take turns and not limit ourselves to a specific number of 
minutes. Then obviously if other Senators come in, we can 
adjust that.
    We also have a vote at 3:30 p.m. that has been announced, 
so I think we are clear to continue here until 3:40 p.m.
    We obviously are talking about the President's new 
strategies that are articulating the threat and then the tools 
to combat the threats from terrorism and TCOs. But there is 
little in the strategies that lays out the roles and missions 
of DOD.
    So, Secretary Sheehan, can you discuss the roles and the 
missions of DOD in implementing these two strategies and speak 
to the situations where you think DOD will be a supported 
organization versus where it will be supporting another 
organization?
    Mr. Sheehan. Thank you, Madam Chair. Actually, as you are 
well aware, in all our national security challenges moving 
forward, they are becoming increasingly interagency. DOD works 
very closely with the Department of State (DOS), the Central 
Intelligence Agency, and other organizations in an integrated 
manner. But obviously in a CT aspect, DOD has a major lead role 
in that.
    I like to think about it, and I know that SOCOM does, in 
two general areas: direct action and indirect action, or the 
strike operations and the advise and assist. We play--and 
obviously in the special operations community, what I am 
primarily responsible for has a major role in both of those 
areas of operation.
    The kinetic action has primarily focused in Afghanistan and 
Pakistan, and increasingly in the Horn of Africa, as well as 
once in a while in Yemen, in those three areas. So, the primary 
interest for me for al Qaeda has always been Pakistan, has been 
for 15 years actually. Even when al Qaeda was in Afghanistan 
prior to September 11, they moved through Pakistan. So, that 
remains the number one area, the launch point for strategy 
attack from al Qaeda.
    But increasingly, I have been concerned about Yemen. By the 
way, that is not new either as I was the Ambassador for 
Counterterrorism when the USS Cole was hit in 2000, and that 
came from Yemen as well. So, Yemen has always been a breeding 
ground for al Qaeda going back to the 1990s. But increasingly, 
it is shifting west into Africa, into Somalia, and across 
Africa. So, we need a combination strategy--in DOD, both the 
kinetic action to take out leaders when we see them, and then 
we need another strategy to advise and assist countries so that 
they can do the work. So, those are two of the major 
components.
    At the center of both of those is the fusion of 
intelligence operations and combat operations, and which since 
I have come back into government, I have seen this 
extraordinary improvement in those capabilities within the 
special operations community to get intelligence from all 
sources, fuse those together with analysis, and then translate 
that into action on the battlefield, which is really the 
capacity of our special operation community to do that has been 
so greatly developed.
    I think that is really the heart of the strategy, Madam 
Chair, is those components of direct action of hitting the 
terrorists with kinetic strikes, training/advising others to do 
work in their country, and then the combination of the 
intelligence and the operation. That is really the heart of the 
operational aspects of attacking al Qaeda. Now, obviously there 
are other parts of it in terms of information operations, 
fighting the growth of terrorist organization, and the 
recruitment of terrorist organizations. All those are 
important. But at the heart of it are those other parts of it.
    In terms of organized crime, DOD plays a supporting role 
there to our law enforcement partners primarily, but we can 
bring tremendous capacity to the table, integrating with those 
organizations to bring pressure against organized crime, 
narcotics traffickers, both at the tactical level in 
Afghanistan, and at the strategic level where these 
organizations are operating.
    I am going to leave it at that and allow my deputies to 
fill in.
    Senator Hagan. When you were talking just then, how does 
DOD's role in combating the TOC actually work in concert with 
the DOS and for roles and missions? Mr. Reid or Mr. Wechsler 
feel free to join in.
    Mr. Sheehan. Madam Chair, I was the Ambassador to 
Counterterrorism at DOS, and for me it was all about leveraging 
the national will of our partners and the diplomatic action to 
do that. So, what we would do in the defense and the 
Intelligence Community is try to find out--to outline the 
trends, to find where these funds were flowing from to be as 
specific as we can. Then the job of DOS was to help to bring 
the political pressure to bear on countries that take 
appropriate action. A lot of these funds are flowing through 
banks and other areas, and the action taken by host countries, 
quite frankly, has not either been effective or willing enough 
to put the pressure on those.
    So, it is a combination of law enforcement, which helps 
identify, bring the law enforcement tools, DOD brings its 
different capacities to bear, and the DOS is about the 
diplomatic pressure. All together hopefully you will have a 
strategy that dries up some of these flows of funding.
    Senator Hagan. This will be my last question, and then we 
will go to Senator Portman. But let me ask about specifically 
Yemen and East Africa. In last year's defense authorization 
bill, it included the two authorities permitting DOD to expand 
its capacity building activities in East Africa and Yemen. It 
permitted DOD to spend up to $150 million to provide equipment, 
training, supplies, minor military construction, and we are 
talking about the countries Ethiopia, Djibouti, Kenya, and any 
nation that would contribute to the African Union mission in 
Somalia, as well as Yemen's Ministry of Interior (MOI) 
counterterrorism unit (CTU).
    If you could explain to me whether DOD intends to use these 
authorities, and particularly the minor military construction 
authority and the authority to support militaries deploying to 
Somalia. If you could expand on that issue.
    Mr. Sheehan. Yes, Madam Chair. We do intend to use those 
authorities in those areas. Obviously, in Yemen we had a little 
difficulty in delays in that because of the political strife 
that was there. But we do want to move forward in both of those 
areas with those authorities. Let me turn to Garry Reid who may 
give you some of the details on that.
    Mr. Reid. We appreciate very much the authority granted 
here. I would offer just an example on the construction. As you 
may recall, before the political crisis in Yemen, we had 
reached a point where they were looking to expand the 
capability of their CTU. Again, this is a MOI CTU for which 
Congress provided us the authority to work with in this current 
year legislation. We were not able to do that last year.
    But the CTU expansion is a good example because here is an 
organization that is probably the most capable in terms of CT, 
but it is really designed to operate in Sana'a. They had put 
forth a proposal prior to the political crisis to expand CTU 
out into some of these provincial areas, which we thought was a 
good idea. Part of getting that done requires us to create a 
little space for them to get out there and set up in a way that 
we want to be there advising them. Again, this would all be 
subject to a process, but they need to have a place to go that 
we can work with also.
    So, whether it would be something as simple as setting up a 
pistol range where you go to get a bulldozer and some plywood. 
Under most authorities, those would not be permitted for 
training. You may build something a little more elaborate than 
that, an operations center made out of plywood, something like 
that is where that minor construction becomes very important. 
It gives us a place to operate from. It gives us a place to go 
with them, and it sets the seeds for them to build further 
under their own system, kind of paints the picture for them, so 
to speak.
    I think that is the best example of that.
    Senator Hagan. The actual extension of the fact that this 
expires soon.
    Mr. Reid. Working on it right now in terms of both of the 
Yemen MOI and the East Africa, working with U.S. Central 
Command (CENTCOM) and U.S. Africa Command on their side to pull 
these proposals together and get them coordinated in both 
departments. Again, this is Secretary of Defense, Secretary of 
State, sort of dual key. Work that up and then go through the 
notification process to Congress, and we are optimistic and 
confident we are going to make full use of these authorities.
    Senator Hagan. Thank you.
    Senator Portman.
    Senator Portman. Thank you, Madam Chair.
    I want to talk about Iran. Secretary Sheehan, thank you for 
joining us. It is good to have you here. These guys did a great 
job without you last year, but they were all waiting for you.
    Last year, the Treasury Department designated a number of 
high-ranking members of al Qaeda who operated a facilitation 
network from inside Iran, and this is the press release 
announcing the designation. This is from David Cohen, who was 
the Under Secretary of Treasury. ``Iran is the leading state 
sponsor of terrorism in the world today. By exposing Iran's 
secret deal with al Qaeda, allowing it to funnel funds and 
operatives throughout its territory, we are illuminating yet 
another aspect of Iran's unmatched support for terrorism.''
    So, it is frightening that combination of al Qaeda and 
Iran. A Shia country to have a Sunni terrorist group might not 
seem logical, but it is obviously in existence.
    So, my question, with Iran's long history of terrorist 
organizations, like Hezbollah and Hamas, to be able to project 
their influence around the region, what do you think about this 
al Qaeda relationship, especially when you combine it with the 
allegations of Iranian ties to planned or actual terrorist 
attacks against our allies? Earlier, the apparent planned 
attack here in DC was mentioned, but we certainly have seen 
this in India, Thailand, and elsewhere.
    What is your understanding of this relationship? Do you see 
it as expanding in scope? Is it important to al Qaeda's 
leadership? Do you see this as part of a growing trend of Iran 
using non-traditional alliances with terrorist organizations to 
further their anti-Western goals?
    Mr. Sheehan. Thank you, Senator. It is a very important 
question, and one that is very interesting.
    As you mentioned, it would seem illogical for a Shia state, 
like the Iranians, to harbor a Sunni terrorist organization, 
organizations that have fought each other in the past. It is 
one that perhaps I would not have predicted prior to September 
11, but it, as a fact, has happened. The depth of the Iranian 
cynicism and use of terrorism as an instrument is expanding, 
and this is a classic example.
    When they originally took the al Qaeda folks after 
September 11, I was watching it closely to see how they would 
manage them. It seems to have evolved over time. Increasingly 
there seems to be more of an alliance than just the holding of 
them. People--and also the movement of al Qaeda operatives 
through Iran is also very, very troubling.
    They seem to be using them as instruments. I am not sure I 
would call it an alliance--but certainly using them by 
harboring and then being to release them and move them around 
is something very troubling to our interests.
    The Iranians are looking at a range of instruments as they 
feel the pressure from the international community on their 
nuclear program. They are looking at a range of options that 
they might be able to use. You have seen some of their 
activities over the last few months using terrorism to try and 
intimidate the Israelis and others. I think they are probably 
looking at other options to include these operatives to find 
ways that they can continue to intimidate the international 
community so they can have space to achieve their objectives.
    It is something that we need to be very, very watchful of 
and try to build international coalitions to bring pressures 
against Iran so that they limit their options to use terrorism 
to advance their interests.
    Senator Portman. What should we be doing that we are not 
doing with regard to al Qaeda and Iran?
    Mr. Sheehan. One of the more challenging things is trying 
to get better intelligence on it. It is a difficult operating 
environment, and we will continue to work with the Intelligence 
Community on that to get a clear picture on what they are 
doing, and then try to intercept these people as they move. 
That is something we have been very good at over the last years 
is trying to track terrorists as they move around the globe and 
then intercept them. So, I think intelligence is going to be 
the key thing to bring to bear against these individuals.
    The second, as I mentioned, I think Iran is susceptible to 
international pressure. When we can bring all our European 
allies and others together and we can ratchet up pressure on 
them, whether it be sanctions or otherwise, I think that can 
also be very effective. The extent that we can paint a clear 
picture to our friends and allies about that enables us to 
bring more pressure against them. That can work. They are 
susceptible to that.
    I think it is a matter of intelligence and then political 
pressure. It is just increasing it and ratcheting it up.
    Senator Portman. Actually, this would be troubling to the 
Europeans. Is it troubling to the Russians, and is it troubling 
to the Chinese, to have al Qaeda being harbored in Iran?
    Mr. Sheehan. Senator Portman, that is a good question. The 
Russians and Chinese, I have been talking to both of those 
countries about al Qaeda since the late 1990s. They certainly 
have concerns about al Qaeda, but not at the same level we do. 
The Russians obviously had their own issues with Chechnyan 
terrorists and other Islamic terrorists, but not as directly 
with al Qaeda. So, they are not as focused on it. The same 
thing with the Chinese. They have certain concerns about 
Islamic extremism within their borders, but again, not the 
level of focus that we have on al Qaeda. It is not to say that 
they are going to support it all, but they often--you have to 
drag them a little bit along further in order to get the 
pressure to bear.
    Obviously, both of those countries have their own economic 
relationship with Iran and with the Chinese with oil and with 
the Russians with defense articles. You know that equation as 
well as I do. It is one that we just have to continue to work 
through and try to bring them on board as well, because 
ultimately at the end of the day on an issue like al Qaeda, 
they are going to support us, but not just as aggressively as 
perhaps our European allies.
    Senator Portman. Mr. Reid, the last time you were here, you 
talked some about your experience. I have a question for you 
with regard to the impact on our special forces, in particular, 
after 10 years of sustained combat operations in Iraq and 
Afghanistan. Some people have talked about the fact that there 
has been a degradation in the force, and that some of the core 
competencies, particularly in language and cultural expertise, 
have been lost by having such a focus on Iraq and Afghanistan.
    What specialties, skill sets, do you believe have been 
impacted the most? Are you concerned about it? What is being 
done to rebuild these skill sets?
    Mr. Reid. Thank you for that question, Senator. It is 
something that we are paying close attention to, as well as 
SOCOM, which has taken some steps in these areas, and we have 
worked together on that.
    With regards to language and culture, we established within 
DOD a steering committee for language and culture expertise. We 
used the proficiency standards coming out of Afghanistan for 
basic counterinsurgency, language, level of understanding, 
level of proficiencies from basic solider up through squad 
leader, platoon leader, company commander, as well as the 
cultural training piece. We took that and worked through the 
Office of the Secretary of Defense and the Joint Staff to have 
the Secretary establish Service-wide, DOD-wide standards.
    SOCOM took that piece and has created language programs 
within each of the component commands. Marine Corps Special 
Forces Operations Command, U.S. Army Special Operations 
Command, Naval Special Warfare Command all have their own 
language programs. All of this is an effort to get ahead of 
this problem that we talked about a year ago. As you probably 
are aware, Senator, because of the tempo of activity in the 
CENTCOM AOR, we still have around 80 percent of all deployed 
SOF in CENTCOM. That has led us to over the years using our 7th 
Special Forces Group, which oriented on South America, 3rd 
Group oriented on Africa, 10th Group in Europe, and 1st Group 
in the Pacific. All of them have been supporting operations in 
Iraq and Afghanistan.
    About 2 years ago we tried to reset that as much as 
possible. You still are going to have some of that because of 
the demand in the theater, but we are into a better rhythm now 
of getting those regional forces exposure and interaction 
through things like the Joint Special Operations Command (JSOC) 
program and others. So, in between deployments, they are 
getting some of that exposure back in their region.
    We have done some realignment using the National Guard, 
19th and 20th groups, to get them to cover some of these things 
as well. So, we feel like we are at a point where we are 
building it back up.
    At the same time, although the demands are still quite 
heavy in Afghanistan, we are also realizing the growth of the 
2006 Quadrennial Defense Review (QDR) of adding the additional 
battalions worth of teams to each of the groups. That has 
created an additional depth within the groups, again, to help 
start alleviating the back-to-back deployments to Afghanistan 
phenomenon that was creating this gap in expertise in the other 
regions.
    With respect to the skills, again, largely through things 
like the JSOC program, we get all the operators exposed to 
different skill sets that they may not be using in Afghanistan. 
But I would also say that the situation in Afghanistan is such 
that we are working, for instance, with the Afghanistan local 
police. That for us, is really an unconventional warfare 
technique set that we are using to work with local forces and 
create these local security organizations. It is something you 
would see more in a unconventional warfare setting. Obviously 
in Afghanistan, it is in a foreign internal defense setting. 
But we are using those skills. We are using the CT skills. We 
are using the direct action skills. We are using the foreign 
internal defense skills.
    So, by and large, the majority of those are being hit in 
some measure by most of the operators.
    Senator Portman. That is good. I have a question for Mr. 
Wechsler on Mexico after we have a chance for another round. 
But just one quick question. It is really the most important 
question I think that I have today having just heard what Mr. 
Reid said about the reset and about special operations, in 
particular, and the need for broadening some of these skill 
sets after this focus. This all requires funding, and it all 
requires resources that are being constrained by the first step 
of the BCA.
    Then, as I mentioned in my opening statement, we now have 
the second $490 billion sequestration. If you could just 
briefly describe to the committee, and I know that the chair is 
interested in this as well, what impact do you anticipate the 
$490 billion, the sequestration, to have on your programs, the 
ones under your purview we have just been talking about, and 
the ones you indicate the more resources are in certain areas, 
and what impact does the uncertainty of waiting until sometime 
later this year--maybe it is late fall, maybe it is the end of 
the year--with regard to the programs and activities that you 
oversee?
    I am going to come back to Mr. Wechsler later if I have 
time on Mexico. I would like to talk to you about this.
    Mr. Sheehan. Senator, it is difficult to answer because the 
Secretary of Defense has already been very clear about how 
devastating it would be. Within DOD, we have not yet decided 
how we would respond to that sequestration. But regardless to 
say, with that large of amount of money, it would certainly 
spill into the special operations community, and I think it 
would have a major impact on our ability to conduct the type of 
operations around the world that we are doing now.
    In both areas that I mentioned before, both in the direct 
action, the kinetic strikes against al Qaeda could be 
effective, although I think those would be protected pretty 
much. But our ability then to build the coalitions and the 
types of partnerships that we need around the world, that had 
to be an impact for sure.
    Senator Portman. As they are developing the fiscal year 
2014 budget, are they already coming to you and talking about 
what sequestration would mean for you, and are you giving them 
some analysis?
    Mr. Sheehan. Not yet, Senator. We have not been asked to do 
that yet within DOD. But we are aware it is out there. We are 
aware it is the law. So, that planning will come if we are not 
able to get it resolved.
    Senator Hagan. Thank you.
    Senator Inhofe, as a member of the Senate Armed Services 
Committee, we welcome you to this subcommittee hearing, and you 
are up.
    Senator Inhofe. Thank you. I wanted to come by this 
subcommittee because I know we have a lot of interest here. Of 
course, Mr. Reid is as familiar as anyone with the Lords 
Resistance Army (LRA) and what is going on.
    Unfortunately, there is a misunderstanding when we first 
put the language in, and a lot of people thought it was 
something where we were taking on another Libya or that kind of 
situation. I think it is very important for all of us on the 
committee, as well as you folks, to make sure people 
understand. It was specifically structured so that there would 
not be combat activity, and it is the type of thing we have 
talked about. I have been involved with this for 15 years.
    I guess the first question I would ask is, is it reasonable 
for people to classify this in that it only started in Northern 
Uganda. That is where it was when I first ran into it. Then, of 
course, more recently meeting with the new country of South 
Sudan, and then all the way down to the Central African 
Republic, and even touching on Rwanda and Eastern Congo. It has 
spread to the point where it could be considered to be a 
terrorist organization by the United States. I would say if you 
would agree that it would fall into that category.
    Mr. Reid. With the LRA, Senator?
    Senator Inhofe. Yes, the LRA.
    Mr. Reid. As I am sure you know, Senator, for those that do 
not, Joseph Kony himself has been present on terrorist 
exclusion list for some time in our Government, and we use that 
in part as a basis for some of our resourcing for the counter 
LRA mission.
    The organization itself certainly operates with the tactic 
of terrorism from, I guess, a bit of an academic perspective, 
whether what they seek to accomplish with that could be 
debated. But we certainly in the context of approaching them as 
an adversary and our advice and assistance to the Ugandan 
People's Defense Forces (UPDF) and others is exactly the 
approach that we have applied to terrorist organizations, and 
that is they have to make a comprehensive effort not only to go 
after senior leaders, they have to understand the supporting 
networks that allow them to operate, and they have to focus on 
the local populations to prevent, when they do clearing 
operations that group from coming back in there.
    So, from all those points of view and my business in the CT 
world, they certainly be treated in that fashion as a defeat 
and countering strategy.
    Senator Inhofe. Yes. I have often looked at what we are 
trying to do with the LRA as kind of a 1206/1208 train-and-
equip type of thing, that we are assisting them, which I would 
say, from your view, how do you see the train-and-equip 
program?
    Mr. Reid. We are absolutely doing an advise/assist program, 
and we are providing training and equipment. DOD is not the 
only one providing training. There are international 
organizations as well that are providing equipment to the UPDF 
and others. But our role clearly in this construct is limited 
to advise and assist. Our troops are not authorized or 
empowered to make decisions that would put them in conflict 
with the LRA. In fact, the sort of rules of the road are 
advise/assist. If you have where you are asked to or you have 
an opportunity to participate in that activity, that there is 
an expectation of contact with a force at all, then you have to 
stop, and at that point there would have to be a policy 
discussion back in Washington about whether that was an 
appropriate step or not.
    We are not up against that right now. The advise and assist 
operation, since October, has progressed in a manner that was 
envisioned. We have some folks up forward, Senator, and we are 
increasing the effectiveness of these forces in their mobile 
search operations and integrating their command and control, 
improving their communications between the different nations 
that are involved. Those are all the objectives we set out to 
do, and we think we are relatively on track.
    Senator Inhofe. Yes, and I appreciate that. Really what I 
was getting at, though, is just from your perspective, the 
three of you, the train-and-equip program, the merits of that 
program. Would you have any comments to make on that?
    Mr. Sheehan. Senator, I thank you for the question. I think 
they are fundamental for our ability to do our job around the 
world. Increasingly as our missions shift away from Iraq and 
Afghanistan, these authorities are absolutely essential for us 
to conduct this classic special operations foreign internal 
defense mission, as Garry was laying out to you. So, we look 
forward to working with the committee to extend those 
authorities and continue to use them effectively.
    Senator Inhofe. The Global Security Contingency Fund, which 
is kind of our thing, would you have any comments to make on 
that?
    Mr. Sheehan. Yes, Senator. Again, we are very supportive of 
this fund. We are working very closely with DOS now to move 
forward our proposals. We see these, again, as fundamental to 
our being able to do these jobs in this new environment.
    Senator Inhofe. Okay. Mr. Reid, it has been probably about 
5 or 6 weeks. Is there anything that we need to meet on since 
that time? Any updates? Not here, obviously.
    Mr. Reid. Not here.
    Senator Inhofe. Okay.
    Mr. Reid. But, again, I would just summarize that from all 
the expectations that were built in the front end of this, I 
would characterize this as being as on track as we could have 
imagined based on the milestones and objectives we laid out.
    Senator Inhofe. Good.
    Thank you, Madam Chair.
    Senator Hagan. Thank you. What I propose that we do is 
continue going until 3:40 p.m., and then we will reconvene 
after the vote. There is a vote, Senator Inhofe, at 3:30 p.m.
    Senator Inhofe. At 3:30 p.m., yes.
    Senator Hagan. Yes.
    Secretary Wechsler, at our meeting last week, you discussed 
the success of the training efforts of the Afghan 
counternarcotics police. Can you spend a moment updating the 
committee on this program with the thought in mind of what role 
DEA has played in this program, and how has DOD supported the 
DEA's efforts? What are the lessons that we are learning or 
have learned from the Afghanistan training program that can be 
applied to other efforts around the globe?
    Mr. Wechsler. Sure. The efforts that we have done to 
integrate military and law enforcement operations in 
Afghanistan have really taken us beyond anything that we have 
previously experienced in DOD. There are a lot of lessons that 
can be taken out of the success.
    The most critical one is when we are dealing with an 
adversary that has revenue sources from criminal activity, from 
drug trafficking, in this case, in order to fund itself to meet 
us on the battlefield, the authorities and skill basis that we 
need to defeat that adversary extend beyond those that are 
contained inside DOD.
    We need to rely on our law enforcement partners on the 
authorities and the skills that they can bring to the table. In 
this case, the DEA's efforts have truly been critical to our 
integrated efforts to take down the nexus of narcotics, 
insurgency, and terrorism, especially in the south of 
Afghanistan.
    We have helped in terms of funding, in terms of logistics, 
in terms of planning, and in terms of enabling the DEA to do 
its work. What they have done, and what has been very 
effective, is building Afghan capability, as you mentioned. 
They have a variety of specialized vetted units that are very 
highly trained, that have been built over time that now number 
in the hundreds in order to do investigations, in order to do 
interdiction operations, in order to do air lift, in order to 
do legal judicial wiretaps, that are really critical.
    In fact, in many cases, these vetted units are now so 
effective that they are operating independently on their own 
without DEA support, much less DOD support. I see the reports 
of what they are doing on a weekly basis, and it is definitely 
helpful to us in our war effort and our continued efforts that 
are going to go forward in the foreseeable future to continue 
focusing on the nexus between crime and terrorism in that part 
of the world.
    Senator Hagan. Do you have any idea how much money actually 
comes into Afghanistan having to do with the narcotics trade? 
Do we keep a focus on that year in and year out?
    Mr. Wechsler. The answer is that there are many estimates 
of total amounts of money. I am not exactly sure that any of 
those estimates have a very narrow error range around them. But 
it is to say that one thing we do know for sure is that 90 plus 
percent of the world's heroin, the entire world's heroin, comes 
out of Afghanistan. The parts of Afghanistan that it comes out 
of are exactly those parts where the Taliban has influence, and 
in some cases, serious local control.
    That is not an accident. The Taliban and the narcotics 
trade are intricately related, and the efforts that we are 
making to go after--you cannot go after one without going after 
the other. That is why we built these efforts. Our estimate is 
that a majority of the funds, especially local funds that are 
what the Taliban uses, are derived from different parts of the 
drug trade.
    Senator Hagan. So, do you think over the years that we are 
having success in reducing that 90 percent that is coming out 
of Afghanistan?
    Mr. Wechsler. What our experience in Colombia has shown is 
that that is the most lagging of indicators. It is only after 
you have success taking down the networks, after you have 
success building security, that then you start to see total 
amounts of drug production go down. It is not a leading 
indicator; it is a lagging indicator.
    Senator Hagan. Thank you. After the unintentional and 
regrettable burning of the Korans in Afghanistan recently, 
there have been a number of incidents in which our U.S. 
servicemembers have been killed by individuals wearing the 
Afghan uniforms. As a matter of fact, I believe it was just 
yesterday I was heading to the Capitol, and there was a 
servicemember who was wounded. When I was chatting with him, he 
actually said that he had been shot by an Afghan military 
counterpart.
    Our SOF have to work closely with our Afghan counterparts 
obviously on a variety of operations, often far from the 
protection afforded at a larger military installation. The 
troubling reports I think even as of this morning indicate that 
an alleged member of the Afghan Local Police (ALP) opened fire 
on coalition troops yesterday, killing one.
    Can you tell me if those reports are accurate? Then do you 
have any force protection concerns for our special operation 
units as they continue to carry out these very important 
operations? Then how would these instances be addressed?
    Mr. Sheehan. Madam Chair, these reports are generally 
correct, the ones you refer to, and I think there was recent 
killing of some of our coalition partners also from Afghan 
security forces (ASF). This is an extremely troubling trend 
that seems to be growing.
    It is an issue for our SOF as well, although normally those 
forces operating with smaller units out in outposts, they get 
to know them very, very well, and perhaps it would have been 
less of a chance. But nevertheless, it is a major concern.
    The size of the ASF is so large, in many ways it represents 
Afghan society in a way. There is this frustration among some 
elements of that society that is reflected within their 
military. They have been agitated by different types of clerics 
and other extremist leaders, and they are hearing that 
language, and it is motivating them to take steps and take up 
arms against our soldiers and our coalition soldiers. So, this 
is a major concern across the force to include SOFs.
    There are numerous programs right now being administered to 
try to determine where these types of people may pop up. But 
this is very difficult because of the emotions involved, and 
because of the susceptibility of some of these members of the 
ASF to fall susceptible to the radical narrative that is being 
spread around that country.
    So, this is a major concern. Even at the strategic level it 
has an impact, these types of killings. But hopefully we will 
be able to minimize that, work our way through that, and 
continue to build partnerships with our ASF that generally is 
moving in the right direction, and is really the focus of our 
strategy moving forward. This will be a major part of it.
    During a vetting process where we feel that there is 
somebody that could possibly have an adverse reaction to the 
U.S. troops, how is that handled as far as conversations and 
communications with the Afghan National Security Forces (ANSF) 
or the police? Then what action is then taken?
    Mr. Sheehan. Obviously, Madam Chair, in the vetting of 
people coming into a unit, it is easier to throw them out, and 
that is being done increasingly, programs to try to vet new 
units. But for people that were in the force, it is much more 
difficult to do. So, I am not sure right now whether we have 
identified--been able to do that yet. I will turn to Garry. I 
am not sure that we have really been able to kick people out 
for identifying extremism.
    But when there are people identified as extremists, we work 
with the Afghans to move them out. But it is difficult.
    Senator Hagan. Mr. Reid.
    Mr. Reid. Are you specifically asking about the ALP? I 
thought you were. As you may know, that process, the nomination 
and vetting process, is driven by the tribal elders, the 
village leadership down at the lowest level possible. We think 
that is the strength of the program. All of that ends up being 
vetted and approved by the district governor as well.
    So, the very closeness that on one hand creates maybe the 
greatest vulnerability for us, it also gives us the best 
awareness of who we are dealing with.
    Senator Hagan. How about the ASF?
    Mr. Reid. Within the ASF more broadly, again, that process 
is done through the the North Atlantic Treaty Organization 
training mission in Afghanistan. I am not personally familiar 
with how that vetting and validation works.
    Senator Hagan. Are you familiar whether we have lost any 
SOF in the smaller units further away from the major 
installations?
    Mr. Reid. Yes, ma'am. With regards to the post-Koran green-
on-blue, knock on wood, we have been fortunate that no Afghan 
that we are working directly with has turned his weapon on a 
special operator. Again, we are lucky in that sense. But I 
think it is a function of the familiarity the Secretary spoke 
of.
    With respect to the incident last night in Paktika, from 
what I have seen on that, it was not that case. It was a case 
of a checkpoint. What I know about it, it seems more what I 
would call a fog of war issue. It was not a I am turning my 
weapon on you because I know you are an American SOF person and 
I am mad at you. That was not the case. Some confusion, some 
checkpoint, not quite clear. But from what I have seen so far, 
I would not put it in that green-on-blue category just yet.
    Senator Hagan. It is a tragedy whether it is a SOF or 
anybody within our military when this occurs obviously. The 
vetting process, I think, needs to be delved into a little bit 
more, especially for people who are still currently--or have 
been in the Afghan force.
    Let me ask one more question. Al Qaeda in the Lands of the 
Islamic Maghreb (AQIM) has expanded its role and influence in 
the region as a result of large ransom payments, and then an 
influx of weapons from the conflict in Libya. What ongoing 
efforts does DOD have to counter AQIM? What authorities is DOD 
leveraging to conduct these operations?
    Mr. Sheehan. Senator Hagan, this is, as I said, after 
Afghanistan and Pakistan, and in the Horn of Africa, and Yemen, 
this is right--coming up as the number three priority and 
rising for DOD and, particularly, for our office for the spread 
of AQIM in North Africa. It is very, very troubling. Again, not 
really new. It goes back into the late 1990s, but now it is 
increasing the acceleration of al Qaeda's influence there is 
very, very troubling.
    This is a very troubled part of the world, and in each 
country there are different challenges for us to operate there. 
We are working country by country to look for opportunities to 
establish the relationships there and start to build our 
coalitions to fight AQIM in North Africa.
    Again, this is an important question because we will need 
different authorities. We will need different types of programs 
in order for us to engage with the range of countries from 
Libya down through Mali, which is obviously in the middle of a 
chaos right now, to Mauritania, all the way--and, quite 
frankly, all the way over to Nigeria. So, we are talking about 
spanning across the whole continent.
    We are looking in my office particularly looking at Africa 
very closely, as is General Ham is, to look across these 
countries to figure out how we are going to address this in a 
coherent way as AQIM grows and strengthens in a very troubling 
way.
    Senator Hagan. When you say ``different authorities,'' can 
you give me an example of what you are describing, or what you 
are thinking?
    Mr. Sheehan. Yes, Senator. Most of the authorities that we 
have right now are narrowly construed to CT, and those work. I 
think, for some countries, we may need a little bit more 
flexibility to go in there. I know Admiral McRaven, the SOCOM 
Commander is thinking of some broader authorities and multi-
year funding so we can establish the relationships in some of 
these countries, and start to develop the defense relationships 
to then build upon their capacity to take on these threats.
    As you mentioned, some of these threats are pure 
terrorism--extortion groups, criminal groups, different types 
of threats. So, if we have a broader range of authorities, we 
can respond with more agility to each country with a different 
set of programs. So, I think that is the direction we are 
thinking.
    Senator Hagan. Thank you. It is now 3:40 p.m., and the vote 
has not started yet, so, Senator Portman.
    Senator Portman. Thanks, Madam Chair. I cannot come back 
after the vote.
    Senator Hagan. Okay.
    Senator Portman. So, I am going to ask my questions now.
    Senator Hagan. Okay.
    Senator Portman. First of all, when you say ``additional 
authorities,'' I assume you are not seeking statutory 
authorities? Are you talking about understandings with these 
countries that would be agreements on a bilateral basis, or are 
you looking for legislative authority?
    Mr. Sheehan. Senator, we are looking for some legislative 
authority that we will be bringing up later and discussing with 
you, I believe, in the weeks or months ahead that might be able 
to give us some broader authorities, legislative authorities, 
and multiyear funding for some of the types of activities we 
would like to do in terms of building coalitions to take on 
these complex threats.
    Senator Portman. Okay. We look forward to that, and I hope 
you will be able even now to give us some sense of what you are 
looking for, because there may not be many vehicles moving this 
year unfortunately. So, to the extent you can get us that even 
in anticipation of those specifics and before the NDAA gets put 
together, that would be helpful.
    With regard to Mexico, I mentioned, Mr. Wechsler, I wanted 
to ask you some questions about that. Obviously what President 
Calderon has done going after the cartels has come at enormous 
costs. I think over 50,000 Mexicans have now lost their lives 
since 2006, 13,000 last year alone. Of course, this impacts not 
only Mexico, but us, including American citizens.
    What is your assessment of what is going on right now in 
Mexico, the current security situation, and what threat do you 
believe these violent criminal organizations pose to the United 
States, particularly along the southern border? Are we making 
progress?
    Mr. Wechsler. Sure. President Calderon deserves a great 
deal of credit and respect for his hard first order decision to 
take the battle to these criminals. This is a change of 
longstanding Mexican history. It is a right decision that he 
made. One of the challenges is that when you make that 
decision, things tend to look bad before they get worse. In 
fact, in some cases they have to look worse because they get 
better.
    There has been a lot of progress that has been made inside 
Mexico, a lot of progress of dismantling certain organizations 
and splintering them. But with that progress has come increased 
violence in a number of places. This is a continuing challenge 
for the Mexicans, and one that they will continue to face in 
the years ahead.
    This is of critical importance, of course, to the United 
States because this is our neighbor. This is our friend. This 
is our partner. This is our third largest trading partner, as 
you are well aware. It is also important for the United States 
because unlike, say, the Colombians back in the 1980s when they 
were dominating the drug trade into Florida, the Mexican TCOs 
have a much greater presence at the wholesale and retail level 
inside the United States.
    One of the challenges that I think we face is sometimes we 
look so much at the border that we do not pay enough attention 
to some of the things that are happening inside the United 
States. This is where DOD works, but I cannot help but notice 
that just at the end of last year, the DEA did one operation in 
Chicago against a sell of the Mexican Zetas, and they captured 
$13 million in bulk cash. That is an incredible amount of bulk 
cash sitting there. These are the kinds of operations that our 
colleagues in law enforcement are doing every day and are a big 
part of how we solve this issue.
    Senator Portman. I appreciate the answer. I do think when 
you have these kinds of seizures, you are talking about the 
cashier and a 15-ton seizure of methamphetamines outside 
Guadalajara earlier this year, which it certainly sounds like a 
lot, and it is. It is equivalent to nearly half of meth 
seizures worldwide as recently as 2009.
    So, the question is, are we making progress with those kind 
of numbers? That was worth $4 billion, one seizure. I just 
wonder what it tells us about the progress we are making. 
Again, I think President Calderon has been courageous, and I 
think he is doing the rights things. How can we assist him in 
different ways to be able to make more progress? That would be 
my question, not that I am looking for an answer today. But if 
you would like to submit one for the record, that would be 
appreciated, unless you have something you would like to 
mention.
    Mr. Wechsler. Yes, sure. I cannot talk about any individual 
investigation or operation. I do want to point out that one of 
the things that we try to do is make sure that DOD is 
supporting law enforcement in the appropriate ways as we can.
    Joint Interagency Task Force West in Honolulu has built up 
significant expertise over the years in tracking containers and 
identifying suspect containers. Over the last year, we have 
focused a lot of that work on specifically methamphetamine 
related container shipments across the Pacific towards the 
Western Hemisphere. Some of the statistics that you are seeing 
are evidence of good interagency work that is being done.
    Senator Portman. Central America also tragic when you see 
what is happening there. The U.S. Southern Command commander 
recently said Central America has become the key transshipment 
zone. Ninety percent of cocaine destined for the United States, 
transits the sub region. I am told that San Pedro Sula, where I 
have been, in Honduras, is now known as the most dangerous city 
in the world, alarming increase in violence.
    So, I would ask you, Mr. Wechsler, but also Secretary 
Sheehan, what do you think the current situation is in Central 
America? What should we be doing we are not doing to help our 
allies in the region increase their capacity to confront this 
incredible spike in violence? What are the major gaps, and what 
should we be doing? You were a special operator in Colombia. 
You have seen a successful play in Colombia. Why are we not 
seeing the same success in Mexico and in Central America?
    Mr. Sheehan. Senator, I think it is a classic case where in 
Mexico where there has been progress, it has pushed things 
south, or the Mexicans have put pressure on the cartels. They 
look for other opportunities to move their products, their 
precursors, and other activity. Central America has been 
traditionally weak states. I served there as special forces 
captain in El Salvador in the 1980s, very violent place as 
well. I was also in Honduras for many tours as a member of the 
7th Special Forces Group.
    The Central American Governments have never been very 
strong. Their economies are very fragile, so there are 
opportunities. The narcotics traffickers have found great 
opportunities to operate there, and they moved in there very 
quickly, and we have to respond. Basically we need to respond 
with all the instruments that we have, both in Mexico and in 
Colombia, and in other parts we must try to push back against 
the expansion of the narcotics industry through Central 
America, because these weakened states are very, very 
vulnerable. So, it is something that DOD is turning to, and we 
look forward to moving all those fronts in Central America to 
help strengthen those states.
    Senator Portman [presiding]. The chair is wisely going to 
vote, and I am going to be joining her in a second. I guess 
just one final question getting back to, again, the opening 
statement and the original conversation about resources. This 
is a general question, but it goes to the physical constraints 
we are going to be feeling here for quite some time regardless 
of what happens with sequestration.
    Do you suspect that in the 2014 budget, in the 2013 budget, 
that your work, particularly SOCOM, will continue to have a 
priority? Are you concerned about, again, what these budget 
pressures are going to do your capability? Can you just put 
that in some context for us?
    Mr. Sheehan. Yes, Senator Portman. It is good news and bad 
news for us in the special operations community.
    The good news for the SOF community is that the President 
has made it very clear in his strategy that special operations, 
as well as cyber and other issues, such as the Pacific, are 
going to have priority of resources as we have done a strategic 
review and a shift in our national security policy and our 
defense strategy. So, I think special operations will, in many 
ways, fare better than some other parts of DOD, but there is no 
question in my mind that we will also, if there is 
sequestration or dramatic cuts, share part of the burden. I 
think we will share some major impacts in our programs.
    Senator Portman. In terms of the strategy going forward, 
though, again, assuming we will continue to be under these 
budget pressures, which unfortunately I think looks true when 
you look at the President's budget, it is another $11 trillion 
to our debt over the next 10 years, which your former Joint 
Chiefs Chair said was the biggest national security challenge 
we face is our deficit and debt. Are there ways to take our 
existing budget and, again, given the fact that we are looking 
at a projection of spending less than we had planned to 
already, and if sequestration goes into effect we will be 
spending even less than we had planned to, is there a way to 
use SOF more to be able to do some of the same critical 
missions, but at a lower cost?
    Mr. Sheehan. Yes, Senator, and I think that is part of the 
President's strategy, recognizing SOF provides the National 
Command Authority (NCA) at a relatively inexpensive way to 
project our national interests. So, I think that that is going 
to be central to our strategy to try to protect our interests 
in a cost-effective way with SOF, and also building coalitions 
with our partners to achieve mutual goals. So, I think that is 
part of a way to reduce our costs and still protect our 
interests.
    Senator Portman. With regard to the conversation earlier 
about al Qaeda, we did not talk much about Iraq. General 
Mattis, Commander of CENTCOM, has stated before this committee 
that he sees strong indications that al Qaeda is making a 
comeback in Iraq. I would ask you if you agree with General 
Mattis' observation that al Qaeda is making a comeback in Iraq. 
If so, to what do you attribute this resurgence? Do you believe 
that the Iraqi security forces are capable of conducting 
effective CT operations?
    Mr. Sheehan. Senator, there is no question General Mattis 
is right. The numbers bear out his observation that al Qaeda 
has increased its attacks in Iraq.
    I think that it remains to be seen how this evolves. Al 
Qaeda has its own problems in Iraq as well, operating there in 
areas that--in different areas and different relationships with 
the Sunni groups there, although you see some spillover of some 
of the Sunni insurgent groups backing al Qaeda, which is also a 
troubling trend. So, I think it remains to be seen whether the 
Iraqis are going to have the full capacity to deal with it.
    Obviously since we left there, there is no question that 
the capacity of their SOFs is not the same as when we are 
standing side-by-side with them. There is just no doubt about 
that. But that is a decision they made. They are going to take 
this on by themselves. We will try to help in every way we can 
as a country that is trying to assist them gain some stability 
there.
    But clearly al Qaeda has grown there. It is a troubling 
trend. Quite frankly, for me and for our office, we are looking 
for the ability of al Qaeda to project from there and export 
which will also be troubling to our national interests. So, we 
are looking at it not only in terms of it destabilizing Iraq, 
but also providing a platform for the projection of a strategic 
al Qaeda from that area. So, it's a major concern as well.
    Senator Portman. To the extent that al Qaeda uses Iraq as a 
platform as they have in other countries, including Yemen, as 
you indicated, certainly Afghanistan, which is why we went in 
the first place, would it be your view that SOF should be in 
Iraq to help deal with that threat?
    Mr. Sheehan. Senator, that is a very difficult political 
question. But obviously for me personally, wherever al Qaeda 
exists and where there is sanctuary for al Qaeda and they're 
operating, and we can develop a partnership with that host 
country in order to take on al Qaeda, that is something I would 
like to pursue.
    Obviously, we have a political equation with the Iraqis 
regarding our defense relationship. Right now, hopefully we 
will see it evolve over the years ahead, and we will have 
opportunities to work with them where we have a mutual interest 
like this.
    Senator Portman. Gentleman, again, thank you for your 
testimony today. Again, it is being used in a very direct way 
to help us put together the right authorization bill, but also 
just great information as we try to figure out how to work 
through these budget challenges and be sure that our unique 
capabilities in the areas that are under your purview have the 
resources they need, and that they are used effectively.
    This hearing will now be in recess until the chair comes 
back, and I am going to sprint to a vote. Thank you. 
[Recessed.]
    Senator Hagan. If we could reconvene, that would be great. 
Thank you.
    I had just a few more questions, and I thought as long as 
we are still here, we will go ahead and seek out your answers 
to these questions.
    Secretary Sheehan and Secretary Reid, given the emphasis on 
the SOF capabilities in DOD strategic guidance and budget, and 
the reduction in the size of the general purpose forces, do you 
believe that there is a risk in commanders becoming too reliant 
on our excellent SOF? Then, also, how do you believe the focus 
of the strategic guidance on the Middle East and Asia Pacific 
will impact deployments of our SOFs? So, the first one being 
the reliance on SOF.
    Mr. Sheehan. Thank you, Senator. In some ways, because our 
SOFs have been so effective, there will be demands for them, 
and that is a good thing. But I think that we are going to be 
able in the future to manage that expectation. I think Admiral 
McRaven is working on that now to make sure that we do not 
exhaust the force, and I think we have those plans in place to 
manage that.
    But certainly there will be lots of demands for the 
excellence that these men and women provide to our national 
defense, but I think we can manage it.
    Senator Hagan. The amount of time it takes to train a 
member of the SOF I understand is a rate of 3 to 5 percent per 
year without sacrificing quality. So, do you feel comfortable 
that we can keep those numbers according to what the demand is 
for these troops?
    Mr. Sheehan. Yes, Senator. I think we are going to project 
a growth up to about 70,000 to 71,000 over the next few years 
at that rate.
    Senator Hagan. Where are we now?
    Mr. Sheehan. 66,000, I believe, somewhere around there, 
67,000. So, a couple more thousand over the next few years, we 
should be able to do that without a great strain. From there I 
think we are going to hold it and then try to sustain that 
force, and protect the deployment schedule of that force.
    Senator Hagan. Mr. Reid?
    Mr. Reid. I would just add to that last point that the 
operator growth, which is really the 3 to 5 percent pace within 
this current growth plan--the operator growth is in place. The 
last layer the Secretary just referred to is in combat support 
enablers that were put in place in the last QDR, and then most 
recently in the 2013 program review.
    With respect to the over-reliance on SOF that you asked 
about, the Secretary also sits atop DOD's Irregular Warfare 
Policy Group and the Security Force Assistance Group. Both of 
those were designed, and the reason they were put in our office 
is to apply the experience and expertise that SOF brings into 
both those areas, and help the Services with their 
capabilities, and oversee it for the Secretary.
    Regarding whether SOF becomes overused, in security force 
assistance, for example, the policy that is overseen sets out a 
framework. So, small missions, sensitive environment where most 
people think that is typically a SOF mission, that is a 
threshold. Small mission, maybe not overly politically 
sensitive, where a general purpose force could apply, that 
would go to them. Then a larger context mission that maybe you 
would need to have both. Again, that all works through that 
process.
    Services are involved in this, and particularly the ground 
forces in regionally aligning elements in both Army and Marine 
Corps special purpose Marine Corps Air-Ground Task Force and 
advise and assist brigade construct that is being used in 
Afghanistan. Again, overseeing how they adapt that going 
forward for these future requirements is our hedge against what 
you asked about how you just give it to SOF, give it to SOF. We 
are promoting the development of those capabilities for the 
right mission sets all in one package.
    Senator Hagan. Then, how about the focus on the strategic 
guidance on the Middle East and the Asia Pacific? How will that 
impact other deployments?
    Mr. Sheehan. Senator, I think the President has made it 
clear that he does want to shift to the Pacific, and to align 
our national defense strategy with our interests there. That, I 
think, will require us to look at the resources that are going 
to be deployed there, and it will--we are going to have to 
shift, as we mentioned that 80 percent of our forces have been 
in CENTCOM over the last 10 years. That is going to change in 
the future. But I do think we do have the force structure in 
SOF to do that and do it properly when we grow to 71,000.
    But I do want to mention, though, there will always be a 
strain on certain low-density military occupational specialties 
and certain types of officers that will get the call, those 
with special skills and languages, or intelligence fusion, 
logistics people, certain types of skill sets that have to be 
managed because they get the call often.
    Also what happens, we have to watch our readiness as those 
people will be plucked out of units to be tailored to conduct 
certain missions in country in order to meet that exact need. 
That also disrupts the force.
    So, this is a management problem for Admiral McRaven, and 
he is very attuned to it and trying to develop the processes to 
protect that while we have the flexibility to put together 
different packages for countries. But there will be that 
challenge of a certain percentage of the force it seems that 
will be getting the call often. That has always been the case 
in SOF and will continue to be, but it is something that we 
will work our way through.
    Senator Hagan. What is the typical length of deployment for 
our SOF in these situations?
    Mr. Sheehan. It varies, but generally 6 months, but 
sometimes less, 4 months. Sometimes it goes to a year depending 
on what they are doing, but generally around 6 months.
    Senator Hagan. Then what is the dwell time?
    Mr. Sheehan. Excuse me, ma'am?
    Senator Hagan. What is their dwell time?
    Mr. Sheehan. Normally, you want about a 20, 30 percent is 
what we are looking for. I think that is the number, 20 to 30 
percent.
    Senator Hagan. So, if they are on for 1 year, you are 
saying they will not be deployed for a period of time?
    Mr. Sheehan. Right. Say they are on for 6 months. They 
should get 18 months off.
    Senator Hagan. Let me ask about the rewards program. DOS 
offers rewards for the arrest and conviction of certain 
individuals that are wanted for terrorism, narcotic 
trafficking, certain past war crimes. I understand that 
legislation is being developed to expand the DOS rewards 
program to include TOC, and to broaden the scope of rewards for 
persons wanted for war crimes, crimes against humanity, and 
genocide. I understand such an expansion might assist DOD's 
efforts against the LRA.
    What is DOD's position on the proposed expansion of the 
law, and how could it help your efforts?
    Mr. Sheehan. Senator Hagan, I am not exactly familiar with 
all the details of it, but I will say this, that we--from my 
experience, these rewards programs have been very successful in 
the past, and we look forward to seeing more of those programs 
brought to the table.
    Senator Hagan. But this would specifically be just in the 
DOS?
    Mr. Sheehan. Right. But still, we are looking at the same 
target sets.
    Senator Hagan. Right.
    Mr. Sheehan. So I think it is very, very complementary.
    Senator Hagan. Okay. We talked a little bit in some of our 
earlier questions, and you referenced Admiral McRaven's request 
to perhaps seek more authorities. We have seen a lot of news 
reports that have suggested that he is seeking broad, new 
global authorities for the SOF.
    He actually said in a hearing on March 6, that he will 
never deploy forces to a geographic combatant command without 
that geographic combatant commander's approval. We never go 
into another country without getting clearance from the chief 
of mission, and the chief of mission always has a vote on 
whether or not U.S. forces arrive in the nation that he or she 
is sitting in.
    So, what is your understanding of the assessment 
authorities being sought by Admiral McRaven? Would such 
authorities require a change to the Unified Command Plan (UCP) 
or new legislation?
    Mr. Sheehan. Yes, Senator. These proposals are being worked 
in DOD. Right now as we are speaking, our staffs are still 
working on these proposals.
    I think what Admiral McRaven is doing is really part of the 
long evolution of the special operations community since it was 
really created by Congress in its legislation in the mid-1980s 
of Goldwater-Nichols and Nunn-Cohen. It was landmark 
legislation that created the special operations community, 
created our office, the geographic command as well. And those 
authorities served us well in providing the NCA these types of 
capabilities when they needed them, which might not have 
happened had not Congress acted in the 1980s.
    I think right now we are at an inflection point of our 
strategy in thinking about where the special operations 
community is going to be over the next 10 years. The National 
Defense Strategy, as articulated by the President and the 
Secretary of Defense, calls upon the SOFs in playing a major 
role across the globe in achieving our defense objectives.
    In order to do that, in order to meet those new demands by 
the strategy, Admiral McRaven is trying to come up with 
different proposals to give him the ability to react to those 
demands that are going to come down. They come across a range 
of things that may include a UCP language change. It may 
include a different relationship with the subunified theater 
special operations commands that are in each of the geographic 
commands. It may include different legislative authorities. The 
different types of authorities to move forces around are all 
being discussed to give Admiral McRaven the ability to provide 
options to the NCA to meet our national security objectives in 
a more coherent and efficient way. It is something that I 
broadly support, and the details are being worked out.
    I think it is an opportunity for us to reshape how the 
special operation community functions within DOD and within the 
interagency community to respond to these emerging threats and 
the strategy that we are trying to design to meet those 
threats.
    So, over the weeks ahead, we will be working through those 
proposals. I think at the end we are going to see a new 
strength and ability of SOCOM and our office to provide these 
options for the NCA both within a geographic command and across 
geographic commands when transnational threats require 
synchronizing across commands.
    So, I think this is really the heart of what we are talking 
about and working through DOD, and assuring people, as 
mentioned by Admiral McRaven in his remarks, assuring 
geographic commands and DOD that their equities will also be 
integrated into this in a whole-of-government approach, a 
whole-of-DOD approach to resolve these issues.
    Senator Hagan. If a geographic combatant commander 
requested SOF, can you describe for me what might be the length 
of time before he would find out whether he receives those SOF, 
how long it could be?
    Mr. Sheehan. Yes, Senator, and sometimes it can be 
instantaneous, the relationships that we have among the 
geographic commands in SOCOM, particularly in JSOC and some of 
those operations are instantaneous. We can move forces. For 
some of the other ones that perhaps require a little bit more 
development, it might take weeks or even months to put together 
the right team to prepare them for deployment and send them. 
So, I would say anywhere between almost instantaneously moving 
forces to several months.
    Senator Hagan. But I understood that in some instances, 
because of the chain of command, this could take up to many, 
many, many months.
    Mr. Sheehan. Yes, Senator, in some cases. I think those 
cases, they are the ones where there is either--I think those 
are normally ones where there is more of a political diplomatic 
issue at stake, or moving into a country where the issues are 
complicated, and whether--how we want to employ force in a 
certain situation, or what is the relationship--our defense 
relationship with that country. Those are normally the things 
that hang it up.
    Normally in terms of our forces, if we really need them, we 
can shift them pretty quickly. So, the longer ones are normally 
a political military dimension.
    Senator Hagan. Okay. I wanted to shift a little bit to the 
Village Stability Operations (VSO). Witnesses before the 
committee have consistently highlighted the importance of the 
village stability and the ALP programs to our strategy in 
Afghanistan. How do you view the future of these programs given 
President Karzai's recent comments that all international 
forces should leave the villages and return to the large bases? 
He made this statement after the soldier who carried out the 
tragic shooting of the Afghan civilians on March 11.
    Mr. Sheehan. Senator, Madam Chair, it is interesting. I 
listened very carefully to President Karzai's remarks about 
this. Quite frankly, he is right in the long-term. In the long-
term, we want the Afghans to be out front. We want to move back 
in the barracks. We want to come back home. So, there is no 
question about that.
    Unfortunately, right now we are not ready for that, and so 
we are going to have a dialogue with the Afghan Government 
about the pace in which we turn over the security to the local 
forces. But right now, I think it is very, very important that 
ALP program and the VSO program are, I think, crucial to our 
strategy in stabilizing some of the rural areas in Afghanistan. 
It is crucial that our forces be out there operating in the 
field to try to get the momentum further advanced before we do 
turn it over to the Afghans. So, I think it is a matter of 
timing, and right now I think that we need more time in order 
to get those programs established.
    There has been great progress. Again, it varies from place 
to place. Some areas, these programs really take off. It 
depends on a lot of factors: the local leadership, how 
committed they are to it, the levels of corruption, et cetera. 
But there has been great progress in many areas, and we plan to 
keep growing this program out to 30,000 ALP, and that is going 
to take some time. So, I hope the Afghan--we will be able to 
work--continue to work with President Karzai and the Afghan 
Government to continue these programs as, I think, it is a 
cornerstone of our strategy of exiting and actually achieving 
what President Karzai wants for us to step back. But we need 
some more time.
    Senator Hagan. You quoted the number 30,000 for the ALP. 
Where are we now?
    Mr. Sheehan. We were at 10,000 last time I checked, but I 
think we have moved a little bit further than that, somewhere 
of 10,000 and moving maybe to 12,000 or something, around 
there, 12,000. We have a ways to go, but it is a very, very 
important program, Senator.
    Senator Hagan. Some human rights groups and others have 
accused the ALP units of serious abuses against the populations 
that they are obviously being tasked to protect, including 
killings, rapes, beatings, and extortions. The program has also 
been criticized by some for encouraging the proliferation of 
armed groups within Afghanistan. What is your response to these 
criticisms of the ALP?
    Mr. Sheehan. Senator, I think some of those have been 
exaggerated. I think that--and obviously when there are abuses, 
these are some things that we take very, very seriously to 
investigate and respond to any abuses of human rights by any 
ANSF, whether it be the regular army, the police, or the ALP. 
So, I think some of these have been exaggerated for political 
purposes. Where there are problems, we need to address them 
very rapidly and effectively.
    I'm sorry, I forgot the second part of your question.
    Senator Hagan. What is your response to the criticisms? 
There has been criticism too, or accusations that it has 
increased the proliferation of armed groups within Afghanistan.
    Mr. Sheehan. Right. I'm sorry, that is right. Again, I 
think that is an unfair characterization because the ALP is 
within the MOI. Yes, there is a degree of independence at the 
local level, which we think is part of why it has been 
effective, because as Garry has mentioned, how it links to the 
local leadership. It is a local response to a local problem. 
You get the commitment at the village level to the security. In 
a way, it is a grass roots approach to counterinsurgency, which 
historically has been effective.
    But there have been those critics that worry about it 
becoming its own separate army. That has been a criticism of 
these types of units historically and to include in 
Afghanistan. It is an issue that we have to be mindful of, and 
we have to be mindful to make sure that as we--all of the 
organizations within both the Ministry of Defense and the MOI 
within Afghanistan are working together and staying together as 
unified, and not to split up into different types of political 
or other interests, which could unravel things in the future.
    So, it is an issue that we have to be wary of, but right 
now I think that it is part of the same team, and that those 
criticisms are a bit exaggerated. But I am very mindful that 
that has to be watched.
    Senator Hagan. While we are talking about the VSO program, 
can you give me an update on how the women within our military 
are being utilized as part of this VSO program? I read a lot 
about it a while back, but I have not been updated on it 
recently.
    Mr. Sheehan. Yes, Senator. Actually, I do not have anything 
new either, but just to say that these are critical functions. 
They are very interesting and a new area for me to see as 
coming back into government to see the role of women involved 
out in the field, and they are doing a great job, and extremely 
important for our ability to interact across the entire--the 
society there with the women in the villages and very 
important. I don't know if, Garry, you can articulate it a 
little bit deeper.
    Mr. Reid. The most obvious value is their ability to 
interact with Afghan women and overcome the cultural barriers 
that exist to where an Afghan woman, it would be inappropriate 
for her to approach a Western male, military person anywhere 
outside the village.
    So, what we have learned over time, and the Services have 
done the same thing. SOF does not own this idea. Matter of 
fact, we may have gotten into it after the Marine Corps and 
Army had done it as well, is these cultural support teams to 
engage with the women in the objective areas. It pays great 
dividends. There has been information that they were able to 
pass that they wanted to pass to somebody and did not have 
anyone to pass it to. But it also softens the hard edges of 
engaging with the military at all by having a woman to talk to, 
so to speak.
    Senator Hagan. But are all the VSO programs, are they 
utilizing women?
    Mr. Reid. They have access to them, but we do not have them 
in every location.
    Senator Hagan. Okay. Secretary Wechsler, I know that we 
have spent time talking about the counter threat finance. Can 
you take a moment to update the committee on the effort with 
regards to counter threat finance?
    Mr. Wechsler. Sure.
    Senator Hagan. Then, do you also have the legislative 
authorities to conduct the operations? Then if you could cite 
some examples.
    Mr. Wechsler. Sure. There are basically two categories. One 
is--and both of them are becoming increasingly important to 
DOD. One is inside war zones and one is outside war zones. 
Inside war zones, our experience in Iraq where we set up the 
Iraq threat finance cell, and our experience in Afghanistan 
where we set up the Afghan threat finance cell, has proved to--
we have gotten great dividends from that, to bring together the 
right kinds of organizations, the right kinds of people from 
across the interagency to understand the financial 
infrastructure, the financial order of battle of our adversary, 
and to use that information to disrupt them both on a tactical 
level, integrated into our operations, and then on a more 
strategic level, to even influence where we put forces at what 
time during the year, to go after our adversaries' financial 
revenue streams.
    Outside the war zone, we find that it is equally important 
for DOD to support other agencies in bringing the unique 
tools--analytical tools and also defense intelligence tools to 
the table to break down the walls between law enforcement on 
one hand and intelligence on the other hand, to make sure that 
all the information that the U.S. Government possesses can be 
used to enhance an analysis of our adversaries' financial 
networks that support them.
    There are a great deal of examples that I could use to use 
good progress in this regard. Quite many of them, especially 
outside of the war zone, as I said, involve the use of other 
agencies' authorities. One that I will point out to you right 
now was very good work done by the DEA and also the Treasury 
Department to go after Lebanese Canadian Bank last year to 
build on a DEA case or set of cases, which identified drug 
trafficking from Latin America through West Africa into Europe, 
the money for which was mixed in with used car sales from the 
United States that were brought to West Africa. The money then 
was used to buy goods, knock-off goods in China, to give money 
back to the people in South America who are producing the 
cocaine. A global network of money laundering, all managed and 
controlled by someone associated with the Hezbollah, and a lot 
of the money that was there went for Hezbollah.
    DOD does not have the tool set, and should not have the 
tool set, to go after it. We are not going to be bombing 
anybody in this part of the world. But the Treasury Department 
did, and used their authorities to do what is called a 311 
designation against this bank. It was an immediate run on that 
bank. It was a short sale to Societe Generale. It ended up 
being an indictment in U.S. courts and a separate civil action 
for hundreds of millions of dollars in U.S. courts.
    This is an example of how the entire interagency can get 
together to, first and foremost, use the techniques that we 
developed under counter threat finance to understand how the 
money is actually being moved by these kinds of adversaries, 
and, second, use the right authorities that are being applied 
from different agencies to go after these in the right place at 
the right time. It is that kind of effort that we are building 
now and we see as a big part of our future.
    DOD's role in these kinds of efforts are driven directly by 
the authorities that you have provided for the counternarcotics 
account, absolutely essential in doing so, the 1004 
authorities, the 1022, 1021. We could not survive without them.
    I do have to say, going to what Secretary Sheehan was 
saying, that many of these authorities over time were built up 
on singular lines of action, on narcotics, or on insurgency, or 
on terrorism, and that is not how the world works. That is not 
how our adversaries work. As you see in this example, it was 
narcotics. It was used car sales. It was knock-off goods. It 
was money laundering. It was all of these things together all 
to support a terrorism organization. That is the way the world 
is. That is the way our adversaries are. So, we work through 
the authorities that we have with the level of flexibility that 
they have, and the limitations that they have, in order to work 
across lines through the interagency.
    Senator Hagan. That is an excellent example, and I know 
that the funding of terrorism and the TOC is certainly in many, 
many different areas. But there is also a specific fundraising 
season for terrorism. What are our specific goals to combat--
how are we combatting their fundraising, and really trying to 
get to the point where the people who are funding that are no 
longer able to do so, or no longer have the willingness to do 
so?
    Mr. Wechsler. Sure. I like to think of three different 
types of funding, and I think it is important. First, is the 
old style of state funding. The second is what you are talking 
about, are people who are willingly giving funds that they 
think--that they know or they think might support a terrorist 
organization because they are ideologically or religiously 
driven. The third type of funding is when their people do not 
even know that they are involved in it, but the terrorist 
organization has developed both illicit and sometimes licit 
business and criminal organizations to fund themselves so they 
do not even need people to be willingly funding them. So, we 
need to have operations that go after all three types of 
funding.
    On the second part that you talked about, the DOS is really 
in the lead of trying to combat violent extremism and work with 
our friends and partners around the world to ensure that they 
have the programs domestically to both publicly discourage, to 
bring religious edicts against, and have the law enforcement 
intelligence operations to disrupt the fundraisings that do 
have an annual cycle in some part of the world.
    Senator Hagan. How do you think that is working?
    Mr. Wechsler. I think in some places it is working quite 
well. I think that, for instance, against al Qaeda proper, we 
have had quite significant success on the financial networks at 
large over the years. There are other places where, as my 
example shows, they have adapted to some of the efforts that we 
have done to come up with new, very complicated, and, in many 
cases, very sinister techniques to diversify their financial 
streams. We have to go after those.
    Senator Hagan. Never ending. Over the past decade, given 
the increasing threat to security and the numerous challenges 
facing law enforcement institutions, many militaries in Latin 
America have been called upon to play a larger role in their 
domestic security matters. What impact, if any, does this shift 
in the responsibilities of partner militaries have on the 
policies associated with our security engagement strategy, and 
any risk or opportunities this might present?
    Mr. Sheehan. Yes, Senator. I think most of the time, 
militaries are reluctant to get involved in the domestic 
issues, whether it is counternarcotics or even insurgency in 
some ways. They are somewhat reluctant. They would much prefer 
to be defending the homeland, which is what they are often 
trained to do. But nevertheless, their national command 
authorities ask them to do things that sometimes they do not 
want to do. So, they are increasingly and have been 
increasingly involved in internal issues and law enforcement 
issues.
    We in DOD need to look across, when we look at a country, 
we look at the different institutions that are working the 
problem, and we will need to work with both of them, both the 
military and the Ministries of Interior.
    One of the concerns for the Ministries of Defense is 
obvious, and they see what happens, is that the interior 
forces, the police forces, become corrupted when they deal with 
narcotics trafficking organizations or criminal organizations. 
So, when we work with their Ministries of Defense, we also have 
to be very mindful, and it is something that we do not always 
do, and it is not something that we always think of in the 
first order, about how corruption can impact Ministries of 
Defense when they start to deal with these types of 
organizations, the amount of money involved.
    So, I think when we look for our solution set with the 
Ministries of Interior and Defense, this is one of the most 
fundamental issues.
    Senator Hagan. Mr. Reid and Mr. Wechsler, do you have 
anything to add to that?
    Mr. Reid. I would just add that where it would appropriate 
in engaging with these countries on these issues, that some of 
it can go back to these authorities questions that we keep 
bringing up about having the flexibility, under the appropriate 
circumstances, to where we can demonstrate agility and take 
advantage of opportunity. It may be an opportunity that would 
help steer that country back in the direction that in our 
interest we needed them to go, or for an opportunity to have 
some engagement. So, that would just be my only addition to 
that.
    Mr. Wechsler. The only thing I would add is that we in the 
United States need to avoid the impulse to project our systems 
on other countries. Sometimes there are other countries that 
might use the military in a different way than we would use the 
military, and that is not inherently improper in their system.
    The other thing that I would suggest is that sometimes we 
make the mistake of not recognizing how challenging a situation 
is to a foreign military, therefore, internal defense needs. 
That is why they are using the military. In some of these 
instances, if the same things were happening in the United 
States, we would be using the National Guard; they would be far 
beyond what local and State law enforcement could deal with. 
That is--those are the situations that foreign countries find 
themselves in when they employ the military in these 
circumstances, and I think we need to understand the reasons 
they do so.
    Senator Hagan. Secretary Sheehan, in some of our questions, 
you highlighted the need for further intelligence coming in 
from Iran. Do you see other countries around the globe where 
you also feel that we need further intelligence than we are 
getting right now?
    Mr. Sheehan. Senator, I think you can never have enough 
intelligence. I have never dealt with a problem or issue where 
you had complete visibility of all the problems that you face.
    So, I think that in terms of CT, that we follow the threat, 
and wherever the threat is, we want deeper levels of 
intelligence. So, right now, our priorities are right where the 
enemy is on the Pakistan-Afghanistan border area, in Yemen, and 
increasingly in Africa. I think we are going to have an 
intelligence challenge there to make sure that we try to stay 
ahead of the terrorists and identify these cells as they 
develop, these networks as they develop, so that we can crush 
them before they have the ability to strike us.
    So, I would follow the threat line, Senator, and just keep 
working it. We never have enough intelligence.
    Senator Hagan. Once again, in his posture statement, 
Admiral McRaven highlighted the potential of high definition 
video equipment for intelligence, surveillance, and 
reconnaissance (ISR) missions. Can any of you describe to me 
your assessment of this high definition ISR capability?
    Mr. Sheehan. Yes, Senator. In my view, from what I have 
seen in a couple of different operations over the last few 
months, that the high definition capability is a game changer 
for decisionmakers because the degree of clarity that it 
provides to the decisionmaker about certain situations provides 
a higher degree of confidence in making a decision regarding 
the use of force, and trying to minimize collateral damage. It 
is something we always strive to do, not only for humanitarian 
purposes--we do not want innocents killed or hurt--but also for 
political purposes. It can strain our flexibility when there is 
excessive collateral damage, so that the high definition 
provides that capability. It is something that we are working 
in DOD right now, and I think we are going to get the right 
answers there because everyone understands that it truly is a 
game changer.
    We are going to keep moving forward on to--and, again, 
thank you to the technology and the developments of the private 
sector, extraordinary in providing a greatly enhanced 
capability for our forces.
    Senator Hagan. What are you doing as DOD to field these 
additional capabilities in this area?
    Mr. Sheehan. Senator, we are working with the private 
sector to get these built and brought online, and getting the 
funding online, and bring them into the force. I think we have 
a good plan to do so, and I think we are going to get there. It 
is just a matter of getting the funding lined up, getting 
industry to keep cranking these things out, and deploying them 
into the field. It is really extraordinary technology and we 
are going to get there.
    Senator Hagan. Are you concerned about a lot of this 
technology being made not in the United States?
    Mr. Sheehan. Senator, I think that obviously we would love 
to have it home grown, but we will take the best that we can in 
order to achieve our objectives, in order to get the bad guys. 
We will buy foreign, but obviously we would prefer United 
States. But I think most of it is American, I understand, so I 
think I am almost sure almost all of it is. I am not aware of 
that much of it being done overseas, but I think most of it is 
American made.
    Senator Hagan. Mr. Reid, any comments on the capability?
    Mr. Reid. No, nothing in addition.
    Senator Hagan. Okay. Just a few more questions, and I know 
we are running out of time. What do you believe are the most 
important lessons learned from this collaborative interagency 
effort for CT operations in Afghanistan and Iraq and elsewhere? 
Then, how do we best institutionalize these lessons learned for 
future CT operations? Sort of a wrap-up.
    Mr. Sheehan. From Iraq or Afghanistan?
    Senator Hagan. Both.
    Mr. Sheehan. From both.
    Senator Hagan. Yes.
    Mr. Sheehan. I think when we went into Iraq and 
Afghanistan, in some ways unfortunately we were learning on the 
run, and we were picking up, dusting up, old counterinsurgency 
strategies and trying to employ them in both Iraq and 
Afghanistan. I think we have learned a lot over the years about 
the complexity of counterinsurgency operations, how it needs to 
be coordinated, an interagency effort, how the political 
supremacy of counterinsurgency is always fundamental, that the 
military strategy follows behind that, that those types of 
issues are fundamental to our lessons learned.
    But I also believe from the SOF that we--I am not so sure 
there are as many lessons learned have honed sets of skills 
that are extraordinarily well-developed over the past 10 years, 
both in the direct and the indirect areas, both in terms of our 
kinetic operations against terrorists, which is really an 
incredible fusion of intelligence and then precision strike, 
that we have developed a tremendous capability there. It 
continues to evolve.
    On the other side of the coin is the advise and assist 
mission, and there, again, a traditional SOF mission, perhaps 
one that was focused in certain geographic commands prior to 
September 11. Now it is one that is embraced by all of our 
special forces groups, including the SEALs as well, to 
understand the importance of not only having highly skilled 
warriors, but the ability to then work with the host country, 
transfer those skills to them so that they provide security for 
their country.
    So, I think for the special operations community, it is a 
matter of retaining those skill sets that have been developed 
so tremendously over the last few years. Then applying those 
appropriately and differently to each theater as we look around 
the world for opportunities to protect our interests with those 
types of skill sets.
    Senator Hagan. Let me ask the final question having to do 
with Pakistan. You have mentioned Pakistan quite a bit today. 
In the June 2011 National Strategy for CT, it stated that our 
goal of defeating al Qaeda in Pakistan can only be achieved 
through a sustained partnership with Pakistan. What is the 
current status of DOD's efforts to partner with Pakistan to 
defeat the threat from al Qaeda on Pakistan's territory?
    Mr. Sheehan. Senator Hagan, it is perhaps the most 
complicated relationship we have in the world right now, the 
U.S.-Pakistan relationship. Obviously, you have probably seen 
in the press reports of the new parliamentary decisions that 
are made that are going to further complicate our ability to 
work with the Pakistani Government.
    But I would say this, that we have no choice but to work 
together, and I think we will. It is very troubling and can be 
so frustrating in dealing with the Pakistan Government on so 
many levels. But at the end of the day, we are going to find 
confluence of interest, and we are going to work together the 
best we can and get these issues resolved. Quite frankly, also 
at the end of the day, the President is going to do what he has 
to do, and unilaterally. He will always protect that 
prerogative to protect the security of the American people and 
our interests.
    Hopefully we will be able to work together and find some 
common interests. I think sometimes it is actually a mixed 
story. Sometimes it looks worse than it is, and actually we are 
making progress, and then sometimes I read other things that 
show it is even worse than I thought it was. So, it is so 
troubling and complex, but nevertheless, they are there. They 
are sitting on top of our adversary, and we are just going to 
have to work through this issue indefinitely. We are going to 
have ups and downs, and a lot of downs unfortunately in the 
months ahead.
    I have been working with the Pakistan Government. I 
remember sitting with them prior to September 11, after 
September 11. They have a different view of what is happening 
in Afghanistan. They have a different view of their interests. 
They have an addiction to playing around with militia groups to 
achieve certain interests, particularly vis-a-vis India, that 
gets them in all kinds of trouble. We have had these 
conversations with them forever about that. I do not see that 
changing. I do not see any set of talking points that is going 
to be delivered by some new diplomat that is going to change 
their mind. It is the way they view the world. We have to 
understand the way they view the world and try to work through 
it.
    It is not going to be easy, but I think at the end of the 
day, we have been successful in the FATA in degrading al Qaeda 
over the last 10 years, despite all these problems. I think 
that we are going to continue to work through it and hopefully, 
again, have another 10 years of success in degrading al Qaeda's 
strategic capability in the FATA and elsewhere.
    So, I remain somewhat optimistic, even with all the extent 
of these problems, that we are going to continue to pound al 
Qaeda so that they cannot attack us. If we stay focused on that 
and not get discouraged with all the other political drama, we 
can keep a level of optimism moving forward. Sometimes I think 
that is important because we can beat ourselves to death about 
all the different problems we have, but at the end of the day, 
we have been successful, and hopefully we will be able to 
continue that.
    Senator Hagan. Thank you. Due to the lateness of the hour, 
we will adjourn this hearing. I do appreciate the testimony and 
the time that all of you spent preparing for this and obviously 
being here today. So, thank you very much. We are adjourned.
    [Questions for the record with answers supplied follow:]

               Questions Submitted by Senator Mark Udall

                 NATIONAL STRATEGY FOR COUNTERTERRORISM

    1. Senator Udall. Secretary Sheehan, the 2006 National Strategy for 
Combatting Terrorism had a section devoted to growing counterterrorism-
related Intellectual and Human Capital as a key to institutionalizing 
long-term success, including focusing on continuing education in 
appropriate area studies, religious philosophies, and languages. The 
2011 National Strategy for Counterterrorism makes no such mention of 
growing and developing experts in terrorism. Why does the latest 
National Strategy for Counterterrorism not mention the need for 
growing, or at least maintaining, high-caliber talent in the 
counterterrorism field?
    Mr. Sheehan. The 2011 National Strategy for Counterterrorism 
reflects an evolution in our understanding of the terrorist threat, in 
the capabilities of our government, in the capacity of our partners, 
and in the tools and technologies at our disposal. Over the past 
decade, the Department of Defense (DOD) has strengthened its 
intellectual and human capital--which has included expanding human 
intelligence and linguistic skills--and these investments will 
continue. DOD also partners with institutions and countries around the 
world to bring about al Qaeda's demise. We have made enormous progress 
in building and strengthening an international architecture to confront 
the al Qaeda threat, and have also increased our efforts to build the 
capacity of partners so they can take the fight to al Qaeda and its 
affiliates in their own countries.
    As a former Special Forces officer, I know firsthand how critical 
training and education in foreign and area studies, religious 
philosophies, and languages are in building these partnerships. As 
such, I share with the Commander of U.S. Special Operations Command 
(SOCOM) an appreciation of the critical role that education and 
training play in ensuring an effective global Special Operations Forces 
effort. To build this trust with our foreign partners, however, we must 
commit to preparing forces for and assigning them to specific regions, 
and to managing those servicemembers' careers appropriately. Some 
efforts underway to move toward this goal include reorganizing SOCOM 
headquarters to create a Force Management Directorate, selecting high-
aptitude foreign language students for extended training, and making it 
easier for noncommissioned officers to earn associates and bachelor 
degrees. Additionally, SOCOM's Regional Centers Program sends 
approximately 80 personnel annually to attend counterterrorism, 
combating terrorism, and executive-level seminars at DOD Regional 
Centers. Finally, the Combating Terrorism Fellowship Program, which I 
oversee, builds partners in the struggle against violent extremism by 
providing counterterrorism education and training for mid- to senior-
level international military officers, ministry of defense civilians, 
and security officials. Collectively, these kinds of training and 
education efforts enable DOD to engage foreign partners more 
effectively and build the relationships that we need to combat 
terrorism around the world.

    2. Senator Udall. Secretary Sheehan, do you feel further 
investments in research, education, and training in this field do not 
warrant national-level attention?
    Mr. Sheehan. Investing in research, education, and training to 
combat terrorism is critical to sustaining effective and relentless 
pressure on al Qaeda and its affiliates while adhering to our core 
principles. As the Secretary of Defense has emphasized, language 
skills, regional expertise, and cultural capabilities are enduring 
warfighting competencies and are critical to mission readiness. Within 
DOD, it is the mission of the Defense Language and National Security 
Education Office to coordinate efforts across the Services and defense 
agencies in order to build the language and cultural skills of our 
deploying total force. Over the last several years, DOD has made 
significant investments in foreign language, regional, and cultural 
awareness training, including through incentive pay, language training 
detachments, and cultural and area studies research programs. These 
investments within DOD and across the U.S. Government continue to 
receive my support.

    [Whereupon, at 4:41 p.m., the subcommittee adjourned.]


DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 
               2013 AND THE FUTURE YEARS DEFENSE PROGRAM

                              ----------                              


                        TUESDAY, APRIL 17, 2012

                           U.S. Senate,    
                   Subcommittee on Emerging
                          Threats and Capabilities,
                               Committee on Armed Services,
                                                    Washington, DC.

 HEALTH AND STATUS OF THE DEPARTMENT OF DEFENSE SCIENCE AND TECHNOLOGY 
                      LABORATORIES AND ENTERPRISE

    The subcommittee met, pursuant to notice, at 2:35 p.m. in 
room SR-222, Russell Senate Office Building, Senator Kay R. 
Hagan (chairman of the subcommittee) presiding.
    Committee members present: Senators Hagan, Shaheen, 
Gillibrand, and Portman.
    Committee staff member present: Leah C. Brewer, nominations 
and hearings clerk.
    Majority staff members present: Richard W. Fieldhouse, 
professional staff member; Peter K. Levine, general counsel; 
and Robie I. Samanta Roy, professional staff member.
    Minority staff members present: John W. Heath, minority 
investigative counsel; and Michael J. Sistak, research 
assistant.
    Staff assistants present: Kathleen A. Kulenkampff and 
Bradley S. Watson.
    Committee members' assistants present: Patrick Day, 
assistant to Senator Shaheen; Elana Broitman, assistant to 
Senator Gillibrand; and Brent Bombach, assistant to Senator 
Portman.

      OPENING STATEMENT OF SENATOR KAY R. HAGAN, CHAIRMAN

    Senator Hagan. We will go ahead and call this hearing to 
order.
    I know that Senator Portman is on his way, but I thought we 
would go ahead and get started.
    I appreciate all of our witnesses being here, and Secretary 
Lemnios, I believe this is your third time in a very short 
period of time. So thank you very much for coming back.
    This afternoon, as part of our review of the Defense 
Authorization Request for Fiscal Year 2013, the Emerging 
Threats and Capabilities Subcommittee meets to receive 
testimony on the health and status of Department of Defense 
(DOD) laboratories and the science and technology (S&T) 
enterprise. This hearing will delve deeper into some of the 
important topics that we touched upon last year in our hearing 
on the health and status of the national defense industrial 
base and related S&T elements. As a key element of DOD's 
roughly $12 billion per year S&T portfolio, its laboratories 
contribute to a broad range of S&T activities ranging from 
conducting Nobel Prize winning basic research to rapidly 
developing and fielding capabilities for the warfighter. The 
lab enterprise includes 62 organizations.
    Welcome, Senator Portman, we just got started.
    This lab enterprise includes 62 organizations spread across 
22 States, with a total workforce of about 60,000 employees, 
more than half of whom are degreed scientists and engineers. In 
certain critical national security-related areas, these 
organizations and, more importantly, the highly-skilled 
scientists, engineers, and technicians in them I believe are 
truly our national assets.
    The challenge facing DOD is to budget the resources needed 
to attract and retain a highly-skilled technical workforce, 
conduct relevant and effective research and development (R&D) 
to give our military the technology edge it needs while relying 
on tools and an infrastructure that are aging. DOD must do all 
of this in an era of increasing budgetary pressures on 
investments in our future.
    In order to gain a better understanding of the health and 
status of the DOD laboratory and S&T enterprise, there are 
several areas to explore. We would like to better understand 
the personnel and infrastructure challenges facing the lab 
enterprise, the relevance and effectiveness of its R&D 
portfolio, and its ability to transition technologies to the 
warfighter and transfer knowledge to industry. We are also 
aware that many technologies developed in the DOD labs have 
application to Homeland security and the protection of our 
cyber infrastructure, as well as dual use for the commercial 
sector.
    Furthermore, we are interested in how the DOD lab 
enterprise interacts with other Federal agencies such as the 
Department of Energy's (DOE) national labs, with industry and 
academia, including federally funded R&D centers and 
university-affiliated research centers.
    In order to explore these areas, we have to focus today on 
the mechanisms the labs have at their disposal to accomplish 
the following key tasks: recruit and retain the best and 
brightest scientists, engineers, and technicians; modernize 
aging infrastructure; rapidly develop, test, and help field 
innovative approaches to address threats in a complex, dynamic 
world; and coordinate and collaborate not only across the DOD 
lab enterprise, but also with other Federal agencies, industry, 
and academia to ensure that ultimately the DOD has the greatest 
possible access to sources of innovation.
    We also would like to know whether improvements to these 
mechanisms I just related are necessary.
    We are pleased to have four expert witnesses to help 
understand these complex areas.
    Mr. Zach Lemnios, as I said earlier, the Assistant 
Secretary of Defense for Research and Engineering. In this 
position he oversees and coordinates DOD's broad S&T portfolio 
across the Services and the Defense Advanced Research Projects 
Agency (DARPA). In addition, Mr. Lemnios oversees DOD's 
laboratory enterprise and serves as an advocate on behalf of 
the laboratories to his department's counterparts on personnel 
and infrastructure issues. The subcommittee looks forward to 
hearing about the DOD's overarching management strategy for the 
labs.
    Mr. Lemnios, as I said earlier, it is great to see you 
again, and thank you for being here and doing what you do.
    Dr. Marilyn Freeman is the Deputy Assistant Secretary of 
the Army for Research and Technology. In this position, she 
sets the goals and objectives of the Army's S&T activities 
across the 22 Army laboratories and centers. These laboratories 
conduct research on topics ranging from better food for 
soldiers to the next generation of ground vehicles. Dr. Freeman 
is credited for focusing the Army's S&T activities to be more 
soldier-centric through a set of well-defined technology-
enabled capabilities.
    Ms. Mary Lacey is the Deputy Assistant Secretary of the 
Navy for Research, Development, Test, and Evaluation (RDT&E). 
In this capacity, she is the lead for the Navy's science and 
engineering capability, capacity, and infrastructure at its 15 
laboratories and warfare system centers. The Navy labs conduct 
research from the latest autonomous undersea vehicles to 
futuristic electromagnetically driven rail guns for ships.
    Dr. Steve Walker is the Deputy Assistant Secretary of the 
Air Force for Science, Technology, and Engineering where he is 
responsible for preparing policy, guidance, and advocacy for 
the Air Force's S&T program that in part is executed by various 
directorates of the Air Force research laboratory (AFRL). The 
AFRL performs cutting-edge research from the next generation of 
directed energy weapons to the next generation of highly 
autonomous drones.
    I want to thank all of our witnesses for your service in 
the cause of our national security, and we look forward to your 
testimony. In order for us to have adequate time to discuss a 
broad range of topics, please keep your opening remarks to no 
more than 5 minutes, and we will certainly include your full 
written statements in the record.
    Before we hear from our panel, I want to turn to my 
colleague and ranking member, Senator Portman, for any opening 
remarks you might have.

                STATEMENT OF SENATOR ROB PORTMAN

    Senator Portman. Thank you, Madam Chair.
    Thanks to the witnesses for being here. I look forward to 
hearing from each of you. We have a distinguished panel with a 
lot of background and experience, and we are looking for a 
candid conversation about the health and the status of the 
laboratory enterprise at DOD. I think it is particularly 
important we talk about this today as we are looking at 
downsizing our military, particularly the strategic realignment 
that the administration is pursuing, and as priorities are 
adjusted, we want to be sure that we understand as a 
subcommittee exactly what the impact will be on the labs.
    The chair has talked a little about the breadth of our labs 
and she has talked about the importance of the labs. The 
threats we face as a nation, unfortunately, are not diminishing 
based on our fiscal problems. So the global environment remains 
very challenging, and yet obviously, as we have seen with the 
sequester and before that, the changes to the budget proposals 
that were being made by the administration, notwithstanding the 
additional sequester, we are under a lot of fiscal constraints 
at a time when we have plenty of challenges globally.
    We think the labs are a critical element to our ability to 
prepare for those threats, respond to those threats, and we 
certainly cannot afford any disruptions that could cause the 
lack of capabilities in these institutions that give our men 
and women in uniform a qualitative edge.
    During the Cold War, we knew without a doubt that America 
was at the top of the heap. We were the most technologically 
advanced nation in the world and we had the best research. 
Today that picture is a little less clear. The National Defense 
University released a report in February of this year on the 
topic of S&T on a global scale, and the report stated that--and 
I quote them--``the share of U.S. S&T productivity will decline 
from about 26 percent in 2005 to about 18 percent by 2050.''
    So while we continuously invest precious resources to 
develop leap-ahead technologies, it is not as simple as it used 
to be. We are not facing, of course, the single threat of the 
Soviet empire. We are facing a more complicated, competitive 
environment. We cannot out-spend and out-innovate all of these 
countries. The global scales are tipped. We are now competing 
with countries like China and other emerging economies.
    In the President's budget request, I noticed, for fiscal 
year 2013, DOD asked for $11.9 billion to dedicate to basic, 
applied, and advance research, much of which, of course, is 
done inside your labs. This is a slight reduction from fiscal 
year 2012, but only a very slight one. It still shows a 
commitment and shows our seriousness of purpose I believe. 
Because these S&T funding lines have been left largely 
untouched, you will have a responsibility, even more so than 
your colleagues who have had their budgets slashed, I think, to 
ensure that every one of your dollars is spent wisely. I know 
you take that seriously.
    I look forward to hearing about your plans to ensure that 
efforts across the entire Federal Government are coordinated--
the chair just talked about that particularly with the DOE labs 
and others within the Federal Government--that we eliminate 
unnecessary duplications, that technologies are developed that 
we can use by industry as appropriate, and that we use best 
practices across the broad range of R&D that is being done.
    I would also like to hear a little bit from each of you 
regarding this Defense Rapid Innovation Program (RIP). Each of 
you have previously talked about this. I think you have, it is 
fair to say, talked about its necessity, and yet I notice that 
it is not in your budgets. To date, I think $700 million has 
been dedicated to the program but it has never been in a budget 
request. So why? What do you think about it? Is it working? Is 
it a benefit to the warfighter or not?
    I have more questions that I will be raising later, and 
again, I really appreciate your all being here to provide your 
expertise to us as a subcommittee. I look forward to again to 
your frank assessment of our Nation's laboratory enterprise and 
S&T efforts and how we can improve them.
    Thank you, Madam Chair.
    Senator Hagan. Thank you, Senator Portman.
    I am pleased that Senator Shaheen and Senator Gillibrand 
have joined us.
    Secretary Lemnios, if you will start with your opening 
comments and, once again, if we can leave them to 5 minutes and 
the rest will be on the record.

 STATEMENT OF HON. ZACHARY J. LEMNIOS, ASSISTANT SECRETARY OF 
              DEFENSE FOR RESEARCH AND ENGINEERING

    Mr. Lemnios. Absolutely.
    Good afternoon, Chairwoman Hagan, Ranking Member Portman, 
and committee members.
    I will ask that my testimony be entered into the record. I 
have a very short statement and welcome the opportunity to 
testify before you on DOD's laboratories.
    The President's budget request for S&T funding of $11.9 
billion for fiscal year 2013 is structured around a solid 
foundation supported by the laboratories of DOD. These 
laboratories are comprised of dozens of facilities employing 
tens of thousands of public employees, military personnel, and 
contractors.
    Throughout the years, DOD's laboratories have repeatedly 
proven themselves to be a vital component to the overall 
success of DOD's S&T enterprise. The labs are uniquely suited 
to couple basic research concepts to early-use military 
applications and, most importantly, they connect to our 
warfighters and understand the challenges they face today and 
may face in tomorrow's conflicts.
    Our laboratories serve three primary roles for DOD.
    First is the development, rapid fielding, and deployment of 
systems to support our warfighters, our warfighters urgent 
operational needs, such as the many innovative systems that 
have been developed to counter improvised explosive devices 
(IED).
    Second is the development of advanced concepts such as the 
high-speed strike weapon that will lead to future capabilities 
for our Nation.
    Third is the transition of advanced technologies to the 
industrial base such as the adaptive versatile engine 
technology that will later be used in our acquisition programs.
    As we testified just a few weeks ago, key to the success of 
this enterprise is the talent base that it supports, and we 
have structured our Science, Technology, Engineering, and Math 
(STEM) investments and we have leveraged section 219 and other 
authorities that you provided us to train, attract, retain the 
needed scientists and researchers in these technical fields.
    While our laboratories are positioned for success today, I 
believe it is important to challenge our existing practices and 
consider new business models to position our laboratories for 
success in the future in this environment of enormous global 
competition.
    In coordination with my colleagues here today, DOD has 
launched an assessment of our laboratory enterprise to move in 
that direction. Our study will examine and compare existing 
models of R&D and transition against emerging models that other 
organizations are using to rapidly develop and transition 
technologies into new products and operational capabilities 
across the private sector. A key element of this assessment 
will be to examine the balance between the service-specific 
responsibilities and the joint effectiveness of this 
enterprise. The insights that we gain from this study will 
support the development of new models to ensure that DOD's 
laboratories remain competitive and relevant today and into the 
future. These results will be reflected in the annual strategic 
workforce plan directed by Congress.
    Madam Chairwoman, thank you for the opportunity to present 
these brief remarks, and I look forward to questions from the 
subcommittee.
    [The prepared statement of Mr. Lemnios follows:]

             Prepared Statement by Hon. Zachary J. Lemnios

    Madam Chairwoman, Ranking Member Portman, members of the 
subcommittee, I am pleased to be here today on behalf of the dedicated 
men and women of the Department of Defense (DOD) who discover, develop, 
engineer, and field the critical technologies that form the foundation 
for a secure future. I would like to thank the Members of Congress for 
your continued support of the Department's science and technology (S&T) 
program and our broader research and engineering (R&E) enterprise.\1\ 
Your steadfast support has allowed the Department to field 
technologically-based military capabilities that provide the edge upon 
which our soldiers, sailors, airmen, marines, and civilians rely.
---------------------------------------------------------------------------
    \1\ S&T is defined as the sum of basic research (6.1), applied 
research (6.2), and advanced technology development (6.3). Research and 
Engineering is S&T plus Advanced Component Development and Prototyping 
(6.4). Both S&T and R&E are activities that occur before initiation of 
formal acquisition programs.
---------------------------------------------------------------------------
    I am honored to be joined today by Dr. Marilyn Freeman from the 
Army, Ms. Mary Lacey from the Navy, and Dr. Steven Walker from the Air 
Force. Their leadership has proven instrumental in ensuring our S&T 
investments provide compelling technology options and unmatched 
operational capabilities for the Department.
    We testify today regarding the important role of the Department 
Laboratories and in support of the fiscal year 2013 President's budget 
request for DOD S&T; a request that has been thoughtfully prepared 
within the context of a challenging national fiscal environment. I can 
assure this committee that we are all mindful of the budget pressures 
facing our Nation. We have made a collective commitment to ensure that 
the taxpayers' dollars provided to the Department's S&T enterprise are 
invested wisely with a laser-like focus on needed capabilities for our 
National security.
    As I discuss the status of the Department's Laboratories and paths 
to an integrated laboratory enterprise, I'd like to do so in the 
context of the Department's new strategic guidance, the fiscal year 
2013 President's Budget Request (PBR) and the Department's S&T 
priorities.

                         NEW STRATEGIC GUIDANCE

    On January 5, 2012, the President released new strategic guidance 
for the Department.\2\ The strategy builds upon developing partnerships 
and global alliances and rebalances our global posture and presence to 
emphasize Asia-Pacific and the Middle East. It sets a new path for the 
Joint Force of the future \3\--a force that will be smaller, leaner, 
agile, and flexible, and rely upon advanced technical capabilities for 
mission success. The guidance outlines 10 primary missions for a 21st 
century defense, which the Joint Force must be prepared to execute. The 
Department's S&T budget request was structured in scope and content to 
support these missions.
---------------------------------------------------------------------------
    \2\ Sustaining U.S. Global Leadership: Priorities for 21st Century 
Defense, January 2012 http://www.defense.gov/news/Defense--Strategic--
Guidance.pdf
    \3\ Sustaining U.S. Global Leadership: Priorities for 21st Century 
Defense, January 2012 - cover letter from Secretary of Defense Leon 
Panetta, http://www.defense.gov/news/Defense--Strategic--Guidance.pdf
---------------------------------------------------------------------------
           FISCAL YEAR 2013 PRESIDENT'S BUDGET REQUEST (PBR)

    The fiscal year 2013 Department-wide S&T budget request of $11.9 
billion ($62 billion from fiscal year 2013-fiscal year 2017) maintains 
a strong S&T posture. The fiscal year 2013 PBR is above the fiscal year 
2011 enacted budget of $11.7 billion, and down modestly from the fiscal 
year 2012 enacted budget of $12.2 billion. The fiscal year 2013 S&T 
budget request:

         Maintains Basic Research at $2.1 billion--an 
        investment that largely supports university based research;
         Funds the Defense Advanced Research Projects Agency at 
        $2.8 billion to develop strategic concepts for the Department;
         Funds Counter Weapons of Mass Destruction S&T at $1.0 
        billion; and
         Maintains S&T funding in each of the military 
        departments at approximately $2.0 billion.

    In preparing the fiscal year 2013 S&T budget for the PBR request, I 
led a comprehensive review of the Department's R&E program elements and 
projects. This review, coupled with the Department's Strategic 
Guidance, has shaped the scope and content of the S&T budget request.
    The fiscal year 2013 PBR S&T investment rebalances and aligns 
content to support the Department's strategic guidance. For example, 
$700 million was added across the Future Years Defense Program (FYDP) 
to enhance the Joint Force's ability to operate across all domains. 
This funding is targeted to initiate an Air Force hypersonic cruise 
missile capability demonstration, accelerate the development of 
advanced electronic warfare (EW) concepts, accelerate technology 
development for the Long Range Anti-Ship Missile program, and launch 
technology development efforts in anti-jam precision guided munitions. 
Additional adjustments were made to increase funding in the 
Department's S&T priority areas of Cyber S&T, EW, Autonomy (Robotics), 
and Advanced Manufacturing by realigning funding in lower priority 
areas. The Department also increased investments in a next generation, 
high-efficiency turbine engine, the Adaptive Versatile Engine 
Technology (ADVENT), for an engineering and manufacturing decision in 
fiscal year 2014.
    The table below summarizes the fiscal year 2013 budget request.
      
    [GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
    
      
    Today's testimony by the Department's S&T leadership provides 
additional detail on key strategic initiatives in the fiscal year 2013 
budget request. The testimony will also describe initiatives underway 
to accelerate the transition of concepts into technologies that will be 
part of future acquisition programs.

           THE DEPARTMENT'S SCIENCE AND TECHNOLOGY PRIORITIES

    In fiscal year 2010, we gathered over 200 scientists, engineers, 
operators, and subject matter experts from across the Department and 
launched a comprehensive analysis of operational architectures, 
critical capabilities, and enabling technologies to support the 
Department's current and future missions. We took a broad look at 
cross-cutting areas that would have the greatest impact to the 
Department, even as the Department's New Strategic Guidance was being 
outlined.
    That review resulted in the April 2011 announcement by Secretary 
Gates that the Department will consider seven S&T areas as key priority 
areas. These priority areas are supported in the fiscal year 2013 
budget request and provide the technical foundation for important 
future capabilities:

         Cyber S&T--The focus of cyber S&T is on the 
        development of technologies that enable system resiliency, 
        agility, and mission effectiveness across the spectrum of joint 
        operations. The research also addresses foundations of trust 
        and development of new frameworks to more thoroughly assess 
        cyber-security techniques.
         Electronic Warfare/Electronic Protection (EW/EP)--
        Pervasive advances in commercial and consumer electronics, 
        challenge conventional U.S. electronic warfare capabilities. 
        Investments in this area focus on new concepts and technology 
        to protect systems and extend capabilities across the 
        electromagnetic spectrum.
         Data-to-Decisions--The Department relies upon the 
        ability to analyze enormous data sets very quickly. Data-to-
        Decisions investments focus on investments in automated 
        analysis techniques, text analytics, and user interface 
        techniques to reduce the cycle-time and manpower requirements 
        required for analysis of large data sets.
         Engineered Resilient Systems--The technically advanced 
        systems our Joint Forces will need in the future must be 
        adaptable to operate in dynamic, and sometimes unpredictable, 
        environments. Research in Engineered Resilient Systems focuses 
        on agile and cost-effective design, development, testing, 
        manufacturing, and fielding of trusted, assured, easily-
        modified systems.
         Counter Weapons of Mass Destruction (WMD)--The 
        Department is focused on crosscutting research in countering 
        weapons of mass destruction, specifically directed at finding 
        and tracking unsecured fissile material. Research focuses on 
        the development of novel detectors and processing algorithms 
        for increased detection capabilities.
         Autonomy--The Department's investments in this area 
        are focused on developing systems that can operate in complex 
        real-world environments. Such systems will augment or 
        substitute for human operators, particularly in hazardous 
        environments, and to conduct missions that are impractical or 
        impossible for humans.
         Human Systems--This goal of Human Systems is to 
        advance the Department's technology capabilities for 
        development of system interfaces and for training of personnel 
        to increase productivity and effectiveness. Training research 
        focuses on realistic, adaptive, and interactive scenarios, and 
        persistent, affordable integrated training. Personnel training 
        research concentrates on human-machine teaming; intelligent, 
        adaptive human aiding; and intuitive interaction.

    The seven DOD S&T priorities represent an integrated effort by the 
Department to focus technical staff and budgetary resources on a set of 
primary topics important to the Joint Forces. Roadmaps are being 
developed for each S&T priority to focus near-term project investment 
portfolios and experimentation campaigns.

                   DEPARTMENT OF DEFENSE LABORATORIES

    The Department's Laboratories engage in activities ranging from 
basic research through defense system acquisition support to direct 
operational support of deployed warfighters. These Laboratories are 
comprised of dozens of facilities across 22 States, and employs tens of 
thousands of scientists and engineers, both civilian and military, 
public employees and contractors.\4\ Included are facilities known as 
research centers, systems centers, laboratories, engineering centers, 
institutes, and development centers. Each of the Military Services 
configures and characterizes its laboratories in unique ways to most 
effectively accommodate service-specific missions and organizational 
structures. The common thread through all of these facilities is 
responsibility for conducting first rate research and development 
(R&D), both in-house and through external contracts that directly 
benefit the warfighter.
---------------------------------------------------------------------------
    \4\ For the purposes of this testimony, the definition of a 
Laboratory is derived from Department of Defense Instruction 3201.4 In-
House Laboratory Independent Research (ILIR) and Independent 
Exploratory Development Programs, (8 Oct 1993): Paragraph 3.2 
Definition--R&D Laboratory--a facility or group of facilities owned, 
leased, or otherwise used by DOD, a substantial purpose of which is the 
performance of research, development, or engineering by employees of 
DOD. The term ``laboratory'' is used here and throughout to apply as 
well to Warfare Centers, Research, Development and Engineering Centers, 
and other such entities.
---------------------------------------------------------------------------
    The Department Laboratories execute a substantial fraction of the 
Department's S&T accounts, particularly in budget activities 6.2 and 
6.3. In addition, they conduct substantial amounts of reimbursable R&D 
for DOD and Intelligence Community customer organizations. Altogether, 
the Department Laboratories execute approximately $30 billion annually.
      
    [GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
    
      
    Most critical to the success of the Laboratories and their ability 
to support the Department's mission is the workforce. This workforce is 
highly educated; nine percent of the Department's scientists and 
engineers possess Ph.Ds and 26 percent hold Master's Degrees.\5\ This 
workforce maintains competence in areas of technology specific to 
military needs and includes electronics engineers, mechanical 
engineers, computer scientists and engineers, aerospace engineers, 
electrical engineers as well as chemists, physicists and 
mathematicians. These degreed scientists and engineers conduct DOD-
relevant research leading to key technology demonstrations and publish 
thousands of reports and peer-reviewed technical papers. In many cases, 
this community defines a technical field with seminal work and leads 
the industrial base in their respective areas. This enterprise is a 
unique environment for advanced technology development and concept 
incubation.
---------------------------------------------------------------------------
    \5\ Department of Defense Laboratory Civilian Science and 
Engineering Workforce--2011, ASD(R&E)/RD Laboratory Office, May 2011
---------------------------------------------------------------------------
    The Department's Laboratory infrastructure has an estimated total 
property replacement value of $38 billion and a total building 
footprint in excess of 140 million ft.\2\ The facilities include unique 
resources for design, development and testing used by both the 
Department and industry.

         The Navy's principal laboratory, the Naval Research 
        Laboratory (NRL), was founded in 1923 on the recommendation of 
        Thomas Edison and is the primary performer of the Navy's basic 
        research program. NRL possesses the only organic government 
        capability to design and build space satellites. Areas of 
        emphasis include ocean and atmospheric science, autonomous 
        systems, and materials science.
         The Army's primary provider of basic research is the 
        Army Research Laboratory (ARL) with primary sites at Adelphi 
        and Aberdeen, MD. ARL areas of expertise include life sciences, 
        network science, robotics, physical science, weapons technology 
        and warfighter protection.
         The Air Force Research Laboratory (AFRL) consists of 
        ten individual directorates located across the United States 
        with headquarters located at Wright-Patterson Air Force Base, 
        OH. The AFRL is the Air Force's primary provider for basic 
        research through advanced development for Space Vehicles, 
        Information Systems, Air Vehicles, Propulsion, Directed Energy, 
        Materials and Manufacturing, Sensors, Human Performance and 
        Munitions. The Air Force Office of Scientific Research is a 
        directorate that serves as the basic science program manager 
        for all Air Force basic science programs.

    The Department Laboratories comprise a balance of these corporate 
research laboratories, which maintain basic science as an area of 
emphasis, and engineering centers, such as the Navy Warfare Centers and 
the Army's Research and Engineering Development Centers that maintain 
the Department's in-house development and engineering expertise. The 
Services align approximately one-third of their basic science budgets 
to in-house programs. A recent review of the Department Laboratories' 
basic research programs, conducted by the Defense Science Board 
(DSB),\6\ concluded that the in-house basic research programs were 
technically strong and healthy.
---------------------------------------------------------------------------
    \6\ Report of the Defense Science Board Task Force on Basic 
Research (January 2012)
---------------------------------------------------------------------------
                         TECHNOLOGY TRANSITION

    The role of the Laboratories in supporting the mission of the 
Department is critical. The Department's Laboratories rapidly develop 
and transition defense technology to the field through knowledge of 
warfighter operational needs and knowledge of developments in industry 
and academia. They provide unbiased technology expertise to the 
Department in support of policy development and systems acquisition. 
The ``products'' the Laboratories deliver can be separated into three 
categories:

         Rapid prototyping, systems development and deployment 
        to support urgent operational needs. The Department's 
        Laboratories have provided critical engineering support to 
        transition early concepts to operational use in theatre. The 
        following are a few examples of many recent transitions that 
        have had a significant impact.
          The Army Corps of Engineers Engineering Research & 
        Development Center has fielded multiple capabilities including 
        Radiant Falcon, Groundhog and Hard Impact, which provide 
        deterrence, defense and defeat of Improvised Explosive Devices.
          The Naval Research Laboratory, in response to a request from 
        deployed EA-6B squadrons supporting Operation Enduring Freedom 
        (OEF), developed and delivered improvements to Jumpstart III 
        and Stoplight III systems that provide a counter to an emerging 
        threat in OEF.
          The Air Force Research Laboratory has developed and is 
        performing operational evaluations in Afghanistan of the Sand 
        Dragon system. This 200 pound runway-independent, long-
        endurance Remotely Piloted Vehicle provides an economy of force 
        capability for route surveillance and Improvised Explosive 
        device detection.
          The Air Force Research Laboratory also developed the Anubis 
        Unmanned Aircraft Vehicle. This is a lethal weapon delivery 
        system controlled at the company or platoon level. It provides 
        an immediate, precise response to enemy fire and is 
        successfully employed in support of OEF
          The ARL's Unmanned Ground Systems were integrated into the 
        PGSS surveillance systems in support of OEF. In addition, 
        weapon surveillance systems, developed by ARL, have been 
        fielded together with Persistent Ground Surveillance System 
        (PGSS) to determine location of enemy weapon fires. There are 
        currently 59 PGSS fielded in Afghanistan.
         Advanced concepts that support the Department's 
        current or future acquisition programs. For example, the Air 
        Force Research Laboratory is continuing to mature critical 
        components that will make High Speed Strike Weapon technology 
        capabilities a reality. The program has had key demonstration 
        successes and is progressing prudently to support future 
        programs of record. Key technologies to be developed include 
        air-breathing hypersonic engines; advanced materials and 
        structures; guidance, navigation and control for GPS degraded 
        and denied environments; advanced sensors and seekers; and 
        selectable effects warheads.
         In another example, the Office of Naval Research supported, 
        the Electromagnetic Aircraft Launch System was developed and 
        demonstrated jointly by the Naval Air Warfare Center Aircraft 
        Division, Lakehurst, NJ, and General Atomics. This technology 
        was in turn transitioned to General Atomics as the lead 
        contractor for installation of this new aircraft launch system 
        in the Gerald R. Ford Aircraft carrier (CVN-78).
         Transition of advanced technologies to the industrial 
        base for use on current or future acquisition programs. For 
        example, the Air Force's ADVENT program is developing multi-
        design-point engine technologies that will provide optimized 
        fuel efficiency of up to 25 percent and performance 
        capabilities over a wide range of flight regimes. This 
        investment will help maintain a competitive industrial base in 
        turbine engine technology, an area critical to our future 
        military capability.

    In response to specific requirements and operating models, each of 
the Services has established a unique approach to technology 
transition. The headquarters of AFRL is co-located with Air Force 
Material Command, the organization responsible for their acquisition 
programs. This proximity ensures that personnel are able to work 
closely together. Laboratory personnel serve as subject matter experts 
to program managers and program executive officers (PEO) and provide 
support for technology development, requirements generation, and system 
deployment.
    The Army has taken a similar approach by colocating PEOs and 
acquisition program managers at each of the Research and Development 
Centers to tightly couple advanced technology development programs with 
the acquisition process. The Navy's Future Naval Capability program 
integrates senior leadership, PEOs, industry and their laboratories in 
the rigorous identification of technology requirements, program 
development and technology transition into programs of record.
    Integration of the Defense Laboratory Enterprise is performed by 
Defense Laboratory Office within the Office of the Assistant Secretary 
of Defense for R&E. This office works closely with each of the Services 
in the development and deployment of policies governing the enterprise. 
It is an entry point for the Department of Energy (DOE) National 
Laboratories, Federally Funded Research & Development Centers (FFRDC) 
and University Affiliate Research Centers (UARC).
    The Department has a broad and growing engagement with industry and 
academia to promote stronger transition paths. The basic research 
activities of the corporate laboratories facilitate relationships with 
academia and the much broader global research community. Relationships 
formed through basic science programs ensure our technology base is 
well-versed in the latest technology developments and provide a conduit 
for new ideas and innovations to flow into our Laboratories and 
advanced development programs. This coupling results in a robust path 
to mature basic research concepts to deployed weapon systems.
    The Department's mechanisms for industry engagement include 
Cooperative Research and Development Agreements (CRADAs), which allow 
industry and universities to leverage the resources of the Laboratories 
to develop jointly owned intellectual property. In fiscal year 2009, 
the Department engaged in approximately 2,900 CRADAs. In this same 
year, the Department's Laboratory staff filed 831 invention 
disclosures, 690 patent applications, were issued 404 patents and 57 
new inventions licensed. CRADAs, and licensing of intellectual property 
open transition path to bring ideas into the Department, and an 
opportunity to transition concepts developed in Department Laboratories 
to commercial use.
    In addition to engagement with industry and academia, the 
Department is assessing the capabilities and resources of other Federal 
organizations to identify areas for increased collaboration. DOE's 16 
National Laboratories represent a $29 billion investment in energy and 
weapons S&T and development. The Department is identifying DOE 
capabilities, which can be leveraged for future DOD mission support. 
This relationship is formalized in the DOD, DOE, Department of Homeland 
Security (DHS) and Director of National Intelligence Governance 
Charter, which is expected to promote an increase in the level of 
partnership and joint activities between our respective organizations. 
The DOD/DOE Joint Munitions Program, which has resulted in the 
development of next generation weapons concepts, is a framework for 
future interagency engagement.

                 STRENGTHENING THE LABORATORY WORKFORCE

    The laboratory talent base represents a unique repository of core 
capabilities upon which the Department relies. The market for 
recruiting technical talent in the United States is challenging. DOD 
competes not only with industry and academia, but also with other 
government departments and agencies. Still, the DOD remains competitive 
in its ability to hire talented students and technical professionals 
into the Defense Laboratory workforce largely because the DOD 
environment provides opportunities that are not available anywhere else 
in the world, e.g., working side-by-side with world renown 
professionals; working in world-class facilities; or being part of a 
team that invents solutions to the challenges facing our national 
security. For areas where other agencies have a deeper technical base, 
we look to leverage that expertise, as illustrated by the Department's 
forging of a stronger relationship with the DOE. We have also partnered 
with the Intelligence Community and the DHS to extend our talent base 
and support Department objectives.
    The Department continues to use the three key initiatives, 
supported by Congress, to attract and retain a highly-skilled 
workforce.

         S&T Reinvention Laboratory statutory authorities 
        (STRL, also known as ``Demonstration Lab'') provide Laboratory 
        Directors with flexibility and tools for direct hiring of 
        highly qualified graduates, training of technical personnel and 
        pay for performance to retain the best and brightest 
        performers. Under STRL, Laboratory Directors can send 
        scientists and engineers to graduate schools for advanced 
        degrees and specialized training courses and thereby retain a 
        leading edge skill set.
         Section 219 authorities: The National Defense 
        Authorization Act for Fiscal Year 2009 authorized laboratory 
        directors to use up to 3 percent of available funds for the 
        purpose of technology development, supporting the transition of 
        technology developed by the lab, workforce development and 
        minor construction for enhancement of laboratory capabilities. 
        This discretionary investment program is expected to reach $150 
        million this fiscal year, with each of the Services executing a 
        vigorous investment program in workforce training, developing 
        high risk high pay-off technologies, transitioning technology 
        to programs of record and addressing minor construction needs.
         The Office of the Assistant Secretary of the Navy (Research, 
        Development and Acquisition) established the Naval Innovative 
        Science and Engineering (NISE) program to implement Section 
        219. The fiscal year 2011 NISE program had a $48.9 million 
        funding level from Research, Development, Test, and Evaluation 
        (RDT&E) Navy programs (BA1 through BA7) and was executed by 15 
        Department of Navy Laboratories as a mechanism to revitalize 
        their Laboratories and rebuild their world class capabilities.

    The NRL's continuation of the Jerome and Isabella Karle 
Distinguished Scholar Fellowship (the ``Karles Fellowship'') is another 
example of a Navy Section 219 effort. This program provides hiring of 
highly accomplished scientists and engineers at any degree level within 
1 year of receiving their degree and will provide funds to pay their 
salaries for 2 years.
    The AFRL fiscal year 2011 section 219 program had a total of 
$58.077 million for its budget. Of this budget, $36.658 million 
supported 36 basic and applied research programs. This research 
included examinations of ionospheric impacts on the Global Positioning 
System (GPS), cyber vulnerability identification and mitigation, and 
expendable thermal energy storage materials for high power directed 
energy weapon systems.
    The AFRL used the $7 million of the authority to transition 10 
technologies into operational use. These programs included improvements 
to air drop operations, autonomous vehicle prototyping, and development 
of expeditionary airfield technology. Workforce development activities 
accounted for 26 programs that cost $5.375 million. Activities include 
scholarships and grants for graduate, undergraduate, and high school 
students, teachers, and professors in the science, technology, 
engineering, and mathematics research realms. Six recapitalization and 
revitalization projects were supported by $9.044 million. Facilities 
that received funding included an advanced high power microwave 
research facility, the Maui Space Surveillance Complex, and Fuze 
Industrial Research Facility, and the Combustion Instability 
Laboratory.
    The ARL directors executed the implementation plan for section 219 
with seven Laboratories participating in fiscal year 2011 and have 
additional laboratories anticipated to participate in fiscal year 2012. 
The Army Laboratories invested $53.5 million funds from a total of $2.4 
billion in fiscal year 2011 funding as described by section 219. These 
activities included $20.8 million for infrastructure improvements, 
$17.5 million for innovative in-house Basic and Applied Research, $13.2 
million for Workforce Retention and Development, and $1.7 million for 
Transition of Technology Development.
    The Science, Mathematics, and Research for Transformation (SMART) 
Scholarship for Service Program has shown great potential in attracting 
tomorrow's talent to the Department Laboratories. SMART is an 
opportunity to increase the number of civilian scientists and engineers 
in Department Laboratories by supporting undergraduate and graduate 
students who are pursuing degrees in STEM disciplines and then offering 
laboratory positions upon degree completion.
    Since its inception in 2005, the SMART program has engaged over 270 
institutions of higher learning and research organizations and has 
transitioned more than 430 young scientists and engineers into the 
Department. Overall, the SMART program benefits the Department and 
SMART scholars alike. SMART scholars receive a scholarship and a long- 
and full-term training, internships, and access to mentors from their 
respective fields. Our benefit is that the DOD's S&T mission is 
positively impacted by some of the best and brightest scholars, 
initially during their schooling and afterwards, when they begin a 
career in the Department.

           MOVING TOWARDS AN INTEGRATED LABORATORY ENTERPRISE

    In the 1950s, the Department led the R&D agenda for the Nation in 
areas ranging from aerodynamics and computation to advanced materials 
and microelectronics. Each of the Department's Laboratories was formed 
to support Service-specific needs and, through multiple realignments, 
each has evolved into a footprint of its own. Still today, these 
Laboratories have proven successful in providing technology solutions 
rapidly to the field, as well as in transitioning technology to 
industry.
    To ensure that the Department's laboratories remain relevant in the 
future environment where technology is increasingly globalized and new 
opportunities as well as threats emerge at an accelerated pace, the 
Department is launching an assessment of the current Department 
laboratory enterprise. The purpose of this assessment is to provide 
recommendations from acknowledged business management experts regarding 
the best options for operation of this enterprise. The assessment will 
consider the current models for in-house RDT&E against emerging models 
for innovation in academia, the industrial base, to include the small 
business community used to rapidly develop transition emerging 
technologies into new products or operational capabilities. The 
Department intends to specifically consider the long-term vision for 
the Enterprise, its role within the larger defense community, including 
FFRDCs and UARCs, the technical quality of the Laboratories and their 
workforce and operational models that promote technology transition. A 
key element of the assessment is to examine the balance between the 
laboratory responsibilities under U.S.C. Title 10 and the overarching 
integrated needs of the Department.

                               CONCLUSION

    The Defense laboratory enterprise is critical to our continued 
ability to support the mission of the DOD and our national security. 
The Department Laboratories are uniquely suited to couple basic 
research concepts to early-use military applications and represent 
critical technical capability to address operational challenges. The 
Department is committed to shaping an Integrated Laboratory Enterprise 
to continue to provide this resource and meet the challenges of an 
increasingly globalized environment. Key to this integration is a 
talent base of scientists and engineers with the credentials, 
experience and resources to provide the Department with capabilities 
and new models to quickly transition those solutions to industry and 
the warfighter. I appreciate your continued support of our S&T efforts 
and I look forward to answering your questions.

    Senator Hagan. Thank you, Secretary Lemnios.
    Dr. Freeman?

STATEMENT OF DR. MARILYN M. FREEMAN, DEPUTY ASSISTANT SECRETARY 
            OF THE ARMY FOR RESEARCH AND TECHNOLOGY

    Dr. Freeman. Thank you, Chairwoman Hagan and Ranking Member 
Portman and distinguished members of the subcommittee. I really 
do appreciate this opportunity to discuss the status and health 
of the Army's S&T enterprise and the significant role of S&T in 
supporting the warfighter.
    I have submitted a written statement and ask that it be put 
into the record.
    I want to thank the members of the subcommittee for your 
important role in supporting our soldiers who are at war and 
for your advocacy of the Army's S&T investments that will 
sustain technological preeminence to our future soldiers. Your 
continued support is vital to our success.
    My vision for Army S&T is to invent, innovate, and 
demonstrate technology-enabled capabilities that empower, 
unburden, and protect our soldiers. I hear often from the 
soldiers themselves that technology saved their lives and was 
critical to their remarkable accomplishments. For this reason I 
believe it is necessary for the Army to maintain a strong Army 
laboratory system.
    Our current S&T enterprises comprise over 22 labs and 
centers spanning 5 commands and located throughout the United 
States. These labs and centers are home to 19,000 dedicated 
Federal civilians who are the core of the enterprise. By 
employing a world-class cadre of scientists and engineers, 
technicians, analysts, and administrative support and providing 
them with the facilities and infrastructures necessary to 
accomplish their mission, we can ensure that the Army has the 
ability to address the specific challenges faced by our 
soldiers.
    Now, it is my job as Deputy Assistant Secretary of the Army 
for Research and Technology to plan for the long-term health of 
Army S&T, and I believe that there are three critical areas to 
our long-term success. The first is people. The second is 
infrastructure and facilities, and the third is programs.
    While I believe that we are generally well-positioned to 
weather the current budget climate, I do have major concerns 
with the long-term health of our S&T enterprise. I will briefly 
highlight some of these concerns.
    People are the Army's most valuable resource. Without the 
skills and the dedication of the scientists, engineers, 
technicians, and support staff comprising our workforce, the 
Army R&D enterprise would be in serious trouble. We are 
grateful to Congress for making permanent the direct hire 
authority for people with advanced degrees. This, along with 
the Laboratory Personnel Demonstration Project, allows us to 
attract great new talent. Science, Mathematics, and Research 
for Transformation (SMART) scholarship for service program also 
provides opportunities for us to improve the flow of new 
highly-skilled technical labor into our DOD facilities and 
agencies to enhance the technical skills of the workforce 
already in place.
    But as mentioned before, in the difficult budgetary times 
ahead, we will have to find ways to ensure that we can retain 
these new recruits, avoiding the tendency to employ last-in/
first-out mentalities should we need to reduce manpower. We 
also need to find ways to bring in more veterans and others who 
may not have advanced degrees but have essential experience and 
skills needed for our workforce.
    While I fully understand the reality of our budget 
situation, we must guard against using S&T as a billpayer. I am 
concerned that S&T will take a disproportionate share of 
personnel cuts should we have to reduce manpower. Such a loss 
of talent could have devastating consequences for the Army.
    Now, world-class scientists and engineers require better 
than adequate infrastructure and facilities to accomplish their 
mission. Within our S&T enterprise, we have roughly 2,000 
facilities. Of these, 1,143 are within the continental United 
States. We do have a lot outside the continental United States. 
To give an indication of the extremes, we currently have one 
building that was constructed in 1828 to several buildings 
currently under construction. Approximately 72 percent of the 
facilities are over 25 years old and 48 percent are greater 
than 50 years old. It is also important to note that not only 
do our facilities support our Army researchers, but many of our 
facilities also are highly leveraged by industry.
    While we have made some improvements to our infrastructure 
and lots of improvements in facilities through the Base 
Realignment and Closure (BRAC) process, congressional adds, and 
the minor military construction (MILCON) authorities provided 
by Congress, we do not have a good long-term solution to the 
problem of aging facilities. We have recently completed an 
inventory in the Army of our S&T facilities and are currently 
developing a plan to have facility experts inspect nearly 1,000 
of our buildings. This will allow us to develop a comprehensive 
priority list and hopefully help get construction resources to 
where they are most needed. It is my intent--and I have talked 
with her about it--to work with the Assistant Secretary of the 
Army, Installations, Energy, and Environment, to find ways to 
address this and other infrastructure and facilities issues.
    With respect to programs, I believe that the 2013 budget 
request submitted to Congress provides correct levels of 
investment for our enterprise.
    So in conclusion, these are exciting and challenging times 
for Army's S&T program. We are changing the S&T business model 
to be an enduring, sustainable, successful enterprise and 
aligning our strategic planning to the budget process to 
achieve efficient, top-down S&T leadership investment focus. I 
look forward to working with Congress to ensure that we can 
maintain a world-class S&T workforce supported by world-class 
infrastructure.
    I would like to thank you for the opportunity to testify 
before the subcommittee and for your support to our Army's S&T 
investments. I am proud to represent the efforts of over 19,000 
dedicated Army civilians and employees to providing soldiers 
with world-class technology-enabled capabilities. I am pleased 
to take your questions.
    [The prepared statement of Dr. Freeman follows:]

               Prepared Statement by Dr. Marilyn Freeman

    Madam Chairwoman and members of the subcommittee, thank you for the 
opportunity to discuss the Army's laboratory system, and some of the 
concerns I have with sustaining the health of our enterprise.
    The Army's Science and Technology (S&T) community has had, and will 
continue to have, a significant role in supporting the warfighter. We 
have consistently delivered technology-enabled solutions needed for 
recent conflicts and we are committed to developing technologies that 
will enhance the Army's capabilities, which will be needed to prevent, 
shape and win future conflicts in an uncertain, complex world. We are 
grateful to the members of this committee for your sustained support of 
our soldiers, your support of our laboratories and centers (and the 
technically excellent work force resident within them), and your 
continued commitment to ensure that funding is always available to 
provide our current and future soldiers with the technology that 
enables them to defend America's interests and those of our allies 
around the world.
    The overarching vision for Army S&T is to invent, innovate and 
demonstrate technology enabled capabilities that empower, unburden and 
protect our soldiers. Based on the past decade of war we know that 
technology makes possible dramatic success both in direct combat and in 
all other missions that our soldiers must conduct in the various 
theaters of operation.
    I hear often from the soldiers themselves that technology saved 
their lives and was critical to their remarkable accomplishments. This 
feedback motivates our scientists and engineers, who use the funding 
provided by Congress, to research, mature, and develop advanced 
technologies--from armor to combat casualty care, from air vehicles to 
ground vehicles, from food to uniforms, from small arms to missiles, 
and from communications to training. They apply their accumulated 
knowledge and expertise, experimental data, and innovative products to 
solve problems, enhance performance, provide new desired capabilities, 
and forecast what capabilities are within the realm of the possible for 
our Army. Army S&T is committed to providing technologies to keep our 
decisive edge against adaptive enemies.
    It is necessary for the Army to maintain a strong Army laboratory 
system. Our current S&T enterprise comprises 22 labs and centers 
spanning 5 commands, and located throughout the United States.\1\ These 
labs and centers are home to roughly 19,000 \2\ dedicated Federal 
civilians who are the core of the enterprise. By employing a world 
class cadre of scientists, engineers, technicians, analysts, and 
administrative support and providing them with the facilities and 
infrastructure necessary to accomplish their mission, we can ensure 
that the Army has the ability to address the specific challenges faced 
by soldiers.
---------------------------------------------------------------------------
    \1\ The Army S&T Enterprise consists of the following laboratories 
and Research, Development, and Engineering Centers (RDEC) within five 
major commands: Army G-1 (Army Research Institute for the Behavioral 
and Social Sciences); Engineer Research and Development Center (Coastal 
and Hydraulics Lab, Cold Regions Research and Engineering Lab, 
Construction Engineering Research Lab, Environmental Lab, Geotechnical 
and Structures Lab, Information Technology Lab, and Topographic 
Engineering Center); Medical Research and Material Command (Aeromedical 
Research Laboratory, Institute for Surgical Research, Medical Research 
Institute of Chemical Defense, Medical Research Institute for 
Infectious Diseases, Research Institute of Environmental Medicine, 
Walter Reed Army Institute of Research); Research, Development, and 
Engineering Command (Army Research Laboratory, Armaments RDEC, Aviation 
and Missile RDEC, Communications and Electronics RDEC, Edgewood 
Chemical and Biological Center, Tank and Automotive RDEC, and Natick 
Soldier RDEC); and Space and Missile Defense Command (Space and Missile 
Defense Technology Center)
    \2\ The personnel data represented here and the remainder of the 
document are a tabulation of input received from the laboratories 
representing fiscal year 2010.
---------------------------------------------------------------------------
    It is my job as Deputy Assistant Secretary of the Army for Research 
and Technology (DASA(R&T)) to plan for the long-term health of Army 
S&T. I believe that there are three areas critical to our long term 
success: (1) People; (2) Infrastructure and Facilities; and (3) 
Programs. While I believe we are generally well-positioned to weather 
the current budget climate, I do have major concerns with the long term 
health of our S&T enterprise.

                                 PEOPLE

    People are the Army's most valuable resource. I am proud to 
represent our S&T workforce comprising government civilian scientists, 
technicians, engineers, wage grade workers, and support personnel, as 
well as soldiers and contract personnel who offer a wide array of 
specialties and abilities that allow Army S&T labs and centers to cover 
the full spectrum of research, engineering and operational support for 
the Nation, especially the soldier.
    Developing and maintaining the world-class cadre of scientists, 
engineers, and technologists requires a four-phased approach:

    (1)  using the hiring, evaluation and retention authorities 
associated with the laboratory personnel demonstration program to 
recruit and retain a highly qualified, success oriented, and dedicated 
workforce,
    (2)  growing existing workforce capabilities through exchange 
programs and other authorities that provide for workforce development 
to help us maintain a vibrant, agile, well-educated cadre of Scientist 
and Engineers,
    (3)  investing in research initiatives at the college and graduate 
school level to provide focus and generate expertise for the next 
generation of Army researchers, and
    (4)  investing in educational outreach initiatives to build a 
diverse, Science, Technology, Engineering and Math (STEM) capable 
talent source for the future workforce.

    Today in the Army's S&T workforce there are approximately 12,000 
scientists and engineers (S&Es). Approximately 45 percent hold Masters 
Degrees or Ph.Ds, 15 percent are women, 17 percent are African 
American, and 14 percent Asian. Figure 1 shows the Army's demographics 
for years of S&E service:
      
    [GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
    
      
    We have been able to stem the bow wave associated with the 
potential loss of senior S&Es by hiring initiatives over the last 
decade; however, given the current climate, we anticipate having to 
reduce or refrain from hiring.
    As noted in a 2008 National Defense University Study:

          ``The growing tendency to view the in-house S&E workforce as 
        just another set of performers suggests the absence of an 
        understanding of why DOD (or the government) maintains in-house 
        competence in science and engineering. In the absence of such 
        an understanding, the competitive model provides a means to 
        determine what the in-house workforce will do and at what level 
        it will be funded. While the competitive model is very 
        effective at making such determinations, it is not well suited 
        as a tool for running the government. It hopelessly blurs the 
        distinction between what is public and what is private, it puts 
        the government in the awkward position of being in direct 
        competition with its citizens, and it compromises the 
        objectivity that the public should expect and demand of its 
        government.'' \3\
---------------------------------------------------------------------------
    \3\ Timothy Coffey, ``Building the S&E Workforce for 2040: 
Challenges Facing the Department of Defense.'' Center for Technology 
and National Security Policy, National Defense University, July 2008, 
page 18.

    I am concerned that in this period of severely constrained budgets 
that will carry with it potential for manpower reductions, our S&T 
workforce may be expected to carry a disproportionate share of the 
reductions. A disproportionate loss of science and engineering talent 
could have devastating consequences for the Army. Our laboratory 
workforce is funded from many accounts--S&T (6.1-6.3 direct funding), 
acquisition (6.4 and 6.5 reimbursable funding), and funding from other 
government agencies (customers such as the Defense Advanced Research 
Projects Agency (DARPA), the Defense Threat Reduction Agency, and the 
Defense Health Program). In order to ensure that the science and 
engineering workers are able to meet the needs of the soldiers, we must 
ensure that any reductions in manpower are assessed against the 
workload and funding available.
    We are grateful to Congress for making permanent to the 
laboratories the Direct Hire Authority for people with advanced 
degrees. This, along with the Laboratory Personnel Demonstration 
Project, allows us to attract great new talent.
    The Science, Mathematics and Research for Transformation (SMART) 
Scholarship for Service Program also provides opportunities to improve 
the flow of new, highly-skilled technical labor into DOD facilities and 
agencies to enhance the technical skills of the workforce already in 
place. SMART offers scholarships to undergraduate, masters, and 
doctoral students who have demonstrated ability and special aptitude 
for excelling in STEM disciplines. Students are provided opportunities 
to continue their research in civil service roles following graduation. 
The Army has been participating in SMART since 2008. In 2011 the Army 
brought on 287 SMART awardees (259 in the category of new hires and 28 
workforce retention candidates).
    Some other personnel issues include losing top talent to industry, 
and either regional market shortages of certain types of employees or 
salary competition with regional industry.
    But, in the difficult times ahead, we will have to find ways to 
ensure that we can retain these new recruits, avoiding the tendency to 
employ ``last in/first out' mentalities should we need to reduce 
manpower
    Despite the many challenges, we have an amazing group of young 
scientists and engineers to serve as role models for the next 
generation. In 2011, Dr. Tad Brunye, from the Natick Soldier Research, 
Development and Engineering Center Cognitive Science researcher and Dr. 
Reuben Kraft, from the Army Research Laboratory were named by President 
Obama as Outstanding Early Career Scientists. The Presidential Early 
Career Awards for Scientists and Engineers are the highest honor 
bestowed by the U.S. Government on science and engineering 
professionals in the early stages of their independent research 
careers, and we are lucky to have researchers like Dr. Brunye and Dr. 
Kraft to mentor the next generation.
    Army S&T contributes to the future success in STEM education with a 
cohesive, coordinated, set of K-12 programs under the Army Educational 
Outreach Program (AEOP). In the 2010-2011 AEOP received over 15,592 
student online applications, engaged nearly 27,000 students as well as 
984 teachers, involved 141 universities, and utilized the talent and 
time of many of our Army scientists and engineers.

                     INFRASTRUCTURE AND FACILITIES

    World class scientists and engineers require better than adequate 
infrastructure and facilities to accomplish their mission. Within our 
S&T enterprise we have 2,196 facilities. Of these, 1,143 are within the 
continental United States. To give an indication of the extremes, we 
currently have one building constructed in 1828 to several buildings 
currently under construction. Approximately 72 percent of the 
facilities are over 25 years old and 48 percent are greater than 50 
years old. Figure 2 shows a histogram of the number of buildings and 
the decade in which construction was completed.
    It is also important to note that not only do our facilities 
support Army researchers, but many of our facilities are highly 
leveraged by industry. All industrial or government developed 
technologies submitted for Network Integration Rehearsal/Network 
Integration Evaluation are required to come into our Command, Control, 
Communications, Computers, Intelligence, Surveillance and 
Reconnaissance System Integration Laboratory at Aberdeen Proving 
Grounds, (APG) for instance.
      
    [GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
    
      
    Our infrastructure (the buildings and associated mechanical systems 
such as heating, air ventilation, and cooling (HVAC), et cetera) and 
facilities (the specialized laboratories and equipment housed within) 
are in critical need of modernization. Infrastructure and facility 
costs fall essentially into three categories: Sustainment, Restoration 
and Modernization (SRM); Operations; and Mission Specific Requirements. 
SRM and Operations are planned, programmed and executed by the 
Installation Management Command (IMCOM). Costs for SRM and Operations 
are assessed at the installation level, but, not broken out by tenant 
or, in our case, lab or center. Therefore, the actual costs associated 
with operating, maintaining and improving our laboratory infrastructure 
and facilities is not identified explicitly nor reflected in the 
funding distribution models.. The Common Level of Support (CLS) 
provided under IMCOM regulations falls short of providing the services 
and upkeep needed in a high-tech laboratory enterprise. At every 
laboratory or center we use a significant amount of our RDT&E dollars 
to supplement CLS.
    We have calculated that our largest command, RDECOM should be 
receiving significantly more benefit from SRM than it is, based on the 
Office of the Secretary of Defense Facility Budget Model. For example, 
at APG the model indicates that we should have received approximately 
$24.5 million per year but in fiscal years 2010-2012, we received only 
$5.2 million.
    As the IMCOM budget is subject to constraints and the cost of 
installation management is subject to outdated models apportioning 
funds to SRM needs, we anticipate that the laboratories and centers 
will have to continue investing a significant amount of RDT&E dollars 
to maintain and operate our infrastructure and facilities at the levels 
required to conduct our mission.
    This problem is often magnified by Defense Base Realignment and 
Closure (BRAC) Commission process. For example when Fort Monmouth was 
closed and the majority of the workforce transferred to APG, funding 
for CLS at APG remained the same.
    In the past 10 years, five construction projects in the S&T 
enterprise have been funded through the MILCON process. If we discount 
the MRMC Defense-wide MILCON projects, the amount of Army MILCON 
invested in the S&T is $61 million.
    Building VB1 at the Space and Missile Defense Command Technical 
Center was constructed using a mix of programmed MILCON funding and 
Congressional Add funding. The Medical Research and Materiel Command 
(MRMC) received funding for three major projects through the Defense-
wide MILCON account, and one in Defense-wide Unspecified Minor Military 
Construction. All other infrastructure and facilities improvements 
across our complex have been achieved through the use Congressional 
Adds or mission RDT&E funds through the minor military construction and 
``Section 219'' authorities. In the last decade, there was $1,211 
million in MILCON, $1,011 million in the BRAC process, and $235.5 
million in Congressional Adds.
    In addition, infrastructure improvements such as revitalization and 
recapitalization projects utilizing Section 219 funds accounted for 
$20.88 million in the past fiscal year. Eleven projects were completed 
including laboratory renovations and instrumentation upgrades that 
directly supported core competency areas within the respective 
laboratories. Critical infrastructure needs included the upgrade and 
modernization of administrative spaces, upgrade and acquisition of 
internal technical infrastructure, ventilation of weapons system spaces 
to reduce down time, HEPA filters and sand filtration systems, HVAC 
upgrades in energetic laboratory, and unexploded ordnance clearance of 
a 1950s vintage range.
    Protecting the facilities and equipment we currently have is now 
our highest priority. If you visit some of our labs and centers, you 
can see examples of specialized, expensive equipment being protected 
from leaking roofs and HVAC systems by sheets of plastic. We are 
working with air handlers past their useful life, switch gear past 
their useful life and made by companies no longer in business, and 
aging piping systems for plumbing, roofs and HVAC systems. Many 
buildings are simply deteriorating as 48 percent of the inventory is 
greater than 50 years old. Some 11 percent are 75 years and older. I am 
including with my testimony some pictures of deteriorating conditions, 
which I would ask be submitted for the record.
    Making improvements to our infrastructure and facilities like this 
at the margins is not a long-term solution. In order to develop a 
comprehensive plan to modernize both our infrastructure and facilities, 
I am currently undertaking an in-depth assessment of what we have now. 
My office has recently completed an inventory of all Army laboratory 
facilities and in consultation with facilities experts and the U.S. 
Army Corps of Engineers we are developing a Statement of Work for a 
team to inspect the roughly 1,000 Army S&T facilities. While I 
appreciate the specific authorities provided by Congress in recent 
years, the fact of the matter is they will not come close to addressing 
a problem of this magnitude.
    I intend to work with the Assistant Secretary of the Army 
(Installations, Energy, and Environment) to find ways to address all 
the issues cited in this section.

                                PROGRAMS

    One of my first priorities, when I became DASA(R&T) a year and a 
half ago, was to change the perception that Army S&T was irrelevant--
and this remains one of my top goals. I embarked on a path to: (1) 
provide a discipline and structure to the way we plan and execute our 
S&T programs; (2) develop effective partnerships with key stakeholders, 
leaders and Users across traditional organizational stovepipes; and (3) 
better synchronize our programs with the priorities of the Secretary of 
the Army, the Army Force Generation plan, and the fiscal processes of 
the Department of Defense (DOD). This path is leading to a significant 
change of the S&T culture and it is still a work in progress.
    Over the past year we have developed several management initiatives 
to emplace a structure and set of tools, which will enable us to be 
successful in delivering capabilities to the warfighter, and to develop 
a balanced portfolio based on prioritized needs and desired advanced 
capabilities. The first initiative was to restructure the way we think 
of and articulate the S&T program. We established a set of S&T 
Portfolios. The portfolio construct allows us to focus more on the 
desired capabilities for the domains in which the Army operates than on 
the color of money in various commodity stovepipes. The main S&T 
portfolios are: Soldier; Ground; Air; and Command, Control, 
Communications and Intelligence (C3I). We also have a Basic Research 
portfolio. These align closely to the Army's capability portfolios. Our 
intent is to be able to show how our S&T programs and products support 
the Army's Capability Portfolio Review process. We are also integrating 
our efforts with DOD's seven S&T priorities.
    The second initiative was to increase active engagement of the Army 
Leadership (Headquarters Department of the Army, the Training and 
Doctrine Command (TRADOC), the Acquisition community and the major 
commands) in activities that establish real priorities for Army S&T.
    The third initiative was to focus on better, more comprehensive 
program planning. By doing more concepting, detailed schedule planning, 
and realistic program cost estimates before embarking on a path of 
research and development, we can better articulate the objectives of 
our programs, show the value of them, and track transitions to help us 
measure success.
    Today I am proud to report to you that there has been a great deal 
of forward progress. We have built a much stronger partnership with 
Army Leadership, the Acquisition Executives and TRADOC. In the past 
year, we established a strategic program planning process with 
participation of both our key partners and S&T leaders across all the 
laboratories and centers. Collaboratively we developed and validated 
the first (ever) set of S&T priorities to focus our near term research 
and development efforts. We started by generating a list of seven 
problems that soldiers and Small Combat Units are grappling with today 
and for which they will continue to need better solutions over the next 
several years. Then we collaboratively developed a set of challenges 
associated with those problems--24 in all--to be used by the S&T 
community to plan programs that will address them or solve them by the 
end of fiscal year 2017.
    The problems and associated challenges constitute a fundamentally 
new approach to planning and managing our S&T investment. In this first 
year we concentrated on the top 10 challenges, selected by Senior Army 
Leadership. The laboratories and centers teamed up to develop the first 
Technology Enabled Capability Demonstration (TECD) programs. Typically 
a TECD will mature and bring together several new technologies, couple 
them with existing systems/technologies, and demonstrate integrated 
technology-based solutions that either measurably enhance performance 
and effectiveness of an existing capability or enable a new and 
necessary capability. Nine TECD programs were formulated and approved 
in this first round. Most of the nine new TECD programs will begin in 
fiscal year 2013 and funding for them is reflected in our fiscal year 
2013 budget request. The community has already begun collaboratively 
planning the set of 15 remaining programs that will be brought forward 
to Army leadership for validation within this fiscal year. We will be 
addressing any shifts in the budget required to accomplish this second 
set of TECDs in the fiscal year 2014 budget cycle.
    My goal is to have approximately 50 percent of the Army's Budget 
Activity (BA) 3 funding dedicated to TECDs. We will be scrutinizing 
these programs constantly; requiring their Technology Program Managers 
(TPMs) to focus on cost, schedule, and transition of deliverables; and 
we will be generating new problems/challenges as necessary to respond 
to the changing needs of our soldiers.
    TECDs are focused on near term Army priorities. They are a good 
first step. But, in order to maintain a balanced portfolio, we must 
also have clearer priorities for the mid and far term investments. 
Therefore, this year we are also working to define and develop a set of 
programs to meet the mid-term needs of the Acquisition community. 
Having these needs identified and then prioritized by leadership will 
enable us to better focus the remainder of our BA 3 dollars and a 
portion of our BA 2 dollars on near- to mid-term solutions to critical 
emerging needs. Simultaneously, we are identifying technologies that 
have high potential to ``Bridge Gaps'' or achieve ``Leap Ahead'' 
capabilities. If we lead the way in developing a set of critical 
technologies in our BA 2 and BA 3 programs at the same time when 
acquisition programs may be slowing down due to budget constraints, we 
believe that we will be better positioned for the future. We are 
thinking of calling these programs Science and Technology Enabling 
Programs (STEPs). Finally, we are going to establish a set of 
priorities for Basic Research. It is my goal to use the collaborative 
processes (similar to those used to create the TECDs) to get clear 
priorities, problems and challenges against which better programs can 
be formulated and executed to achieve the most advanced capabilities 
possible, as soon as possible, with the resources you make available to 
us.
    As we shift to a priority based, programmatically managed, more 
collaborative S&T culture within the Army, our scientists and engineers 
have not stopped working the existing efforts across the entire 
spectrum of the funding lines and the technology areas. Even as they 
are taking on the new challenges I have given them, they continue to 
deliver on projects that research, mature and demonstrate needed 
technology devices, components and subsystems--many of which will feed 
future STEPs or TECDs. Many of our major efforts will be described 
later in this testimony.

                  THE FISCAL YEAR 2013 BUDGET REQUEST

    I believe the fiscal year 2013 budget request submitted to Congress 
provides the correct levels of investment for our enterprise. Our S&T 
program request for BA 1-3 for fiscal year 2013 is $2.2 billion--a 3.2 
percent decrease from our fiscal year 2012 request. BA 3 programs 
decrease by $86 million, while BA1 and BA2 programs increase by $7 
million and $6 million, respectively.
    In fiscal year 2013, the Army is placing increased emphasis (and 
investment) on ground and aviation vehicle survivability, research in 
focal plane arrays, and alternative fuels for ground vehicles. We will 
accept some greater risk (reducing funding) in lethality, unmanned/
autonomous ground vehicles, and military engineering. As we adjust to 
an era of decreasing or flat budgets, Army S&T must be capable of doing 
more with less and correctly managing the risk associated with 
shrinking budgets by identifying and focusing on the highest priorities 
for the future. I believe that the S&T management strategy, described 
previously, allows us to do just that.
    In fiscal year 2013, we requested $386.1 million for our soldier 
portfolio, $626.9 million for our Ground Portfolio, $141.3 million for 
our Air Portfolio and $323.0 million for our C3I Portfolio. We also 
requested $444.1 million for Basic Research.
    In the request, there is $14.0 million for the BA4 Technology 
Maturation Initiatives line, which was established in fiscal year 2012 
to better enable the Army to meet the goal of ensuring competition 
while maturing S&T efforts to Technology Readiness Level (TRL) 6 or 
higher prior to Milestone B in support of the Weapons System 
Acquisition Reform Act of 2009. Funding in this line is expected to 
help us cross the ``valley of death'' for some high potential 
technologies or subsystems.
    To make the decisions concerning which efforts should be funded 
with this precious resource, we established an S&T BA4 Executive 
Steering Group (ESG) and a rigorous, but streamlined, process for 
evaluating, prioritizing and selecting proposed projects. The project 
selection criteria include: potential to reduce programmatic costs/
risks, potential for quick transitions, and synchronization with 
acquisition plans and programs. Last fall, the ESG selected the first 
five projects for funding in fiscal year 2012. These projects will be 
continually monitored to ensure that they stay on track to provide the 
deliverables to the proper PMs/PEOs within the next couple of years. Of 
course, it is too early to make any conclusions regarding the success 
of this new approach, but the ultimate test of success will be whether 
or not we achieve planned transitions and reduce costs through early 
competitive prototyping. I am confident that we have a strong process 
in place now, which provides the Army with an improved mechanism for 
establishing a closer alignment between S&T and acquisition programs; 
however, in the fiscal year 2013 budget request, we did decide to 
maintain a modest investment in this line until we have some data on 
the effectiveness of the projects against the objectives.
    Another new source of funding for S&T is the Rapid Innovation Fund 
(RIF), established by Congress in fiscal year 2011. We are using, and 
intend to continue using, this additional funding to attract small and 
nontraditional businesses, so that we can identify and incorporate what 
they produce to help our TECD TPMs solve the 24 challenges. We recently 
released a Broad Agency Announcement (BAA) asking for white papers in 
support of the top 10 Army priority challenges. The response was 
enormous--nearly 1,000 white papers were received. My staff, along with 
subject matter experts from the Army labs and the acquisition 
community, reviewed each of these proposals and selected over 90. We 
are asking these selectees to submit full proposals; against which we 
will use the fiscal year 2011 and fiscal year 2012 RIF funding to award 
contracts. These contractual efforts will be managed as part of the 
appropriate TECD by the TPMs. The plan is to issue another BAA in 
fiscal year 2012 seeking technologies that can contribute to solving 
the remaining 15 priority challenges. I believe that this new 
initiative (the RIF) is providing value to the Army and opening up more 
collaborative opportunities for small and nontraditional businesses. In 
addition to providing a link to the TECDs for small businesses, the 
huge number of white papers received has given us further insight into 
innovative technologies of which we may have not been otherwise aware--
and it is our intent to fund more of the highest quality proposals with 
core funds. While we are still in the initial phase of this program, I 
have confidence it will be ultimately successful in reaching companies 
with innovative ideas and getting them on a path for Army's acceptance 
of their products into subsystems and systems.
    The Army Small Business Innovation Research (SBIR) program is 
another way for us to tap the ideas of nontraditional defense 
businesses. The SBIR program is designed to provide small, high-tech 
businesses the opportunity to propose innovative research and 
development solutions in response to critical Army needs. In fiscal 
year 2011, the Army SBIR office generated 139 topics based on input 
from laboratories, TRADOC and the PEOs. In response to these topics, 
small businesses submitted over 3000 proposals, which were evaluated by 
the Army SBIR office and which resulted in more than 600 Phase I and 
Phase II awards valued at approximately $200 million.
    Although the SIBR program is strong, there is a real need to 
streamline the topics generation process and reduce the overhead and 
labor associated with generating, selecting and contracting SIBR 
efforts. I believe we can lean the process, increase the program 
success rates and, most importantly, improve the transition of products 
that are developed under Army SIBR contracts. Therefore, I have 
directed that, beginning this year, SBIR topics/projects align with 
TECDs, S&T Challenges and highest priority Program Executive Office 
(PEO) needs. By tying more of these efforts directly to S&T priorities 
and managing each project as part of a TECD program, the fiscal year 
2013 SIBR projects may have greater transition rate and increased 
relevance.
    Beginning in fiscal year 2012, the High Performance Computing 
Modernization Program (HPCMP) and office transitioned from the Office 
of the Secretary of Defense (OSD) to my office for management. HPCMP 
is, and will remain, focused on supporting the needs of the triservices 
and other agencies. HPCMP comprises three elements--it: (1) operates 
six DOD Shared Resource Centers; (2) operates and maintains the Defense 
Research and Engineering Network; and (3) develops Software 
Applications. DOD scientists and engineers use HPCMP resources in 
support of many disciplines, including physics, chemistry, materials, 
acoustics, and aerodynamics. While there have been some bumps in the 
road in the transition process, the Army remains fully committed to 
managing and executing this critical capability. In fiscal year 2013 we 
have requested $180.6 million in RDT&E and $57.7 million in procurement 
to conduct this program, managed by the U.S. Army Corps of Engineers.
    Across all of our portfolios, we maintain our focus on power and 
energy. As we develop technology enabled capabilities, we must work to 
reduce the burden in both weight and logistics that comes from 
increased energy consumption by the plethora of electronic equipment we 
need in our operations. Since fiscal year 2002, S&T power and energy 
research has concentrated on maturation and demonstration of 
components, materials, and devices to reduce size, weight, and power, 
as well as, extend the useful life of components. We are now shifting 
our focus to concentrate on subsystems and systems. Our objectives are 
to improve efficiency and reduce consumption while increasing 
functionality and developing smart energy-saving designs. Power and 
energy issues must be resolved to achieve the objectives of most of the 
24 challenges. Our existing programs are integrated with, and 
complementary to, the operational energy strategy of the Assistant 
Secretary of the Army for Installations, Energy, and the Environment. 
In the fiscal year 2013 budget request we have, interspersed among our 
portfolios, $160.9 million for power and energy projects.

                        S&T PORTFOLIO HIGHLIGHTS

Soldier Portfolio
    In keeping with the vision of soldier as the Decisive Weapon, the 
soldier S&T portfolio researches underpinning human science and matures 
and demonstrates technologies for Soldier and Squad Lethality, 
Survivability, Mobility, Leader Development, Training, Combat Casualty 
Care and Clinical and Rehabilitation Medicine capabilities. The efforts 
in this portfolio are designed to maximize the effectiveness of Squad 
performance as a collective formation. These efforts result in state of 
the art equipment, shelters, clothing, food, training tools, logistic 
support, combat trauma therapies, and other medical technologies. Major 
initiatives include Protection, Dismounted Soldier Power and an 
overarching focus on the human and material science advancements 
necessary to Lighten the Soldier's Load. In the coming years, improving 
mission performance in a complex and dynamic environment will rely on 
improving the integration of cognitive and physical performance with 
technology solutions.
    In keeping with our holistic approach to Army challenges, this 
effort looks to address the entire chain of service from pre-deployment 
to return to civilian life including training, health promotion, 
rehabilitative medicine and treatment for Post-Traumatic Stress 
Disorder (PTSD)/Traumatic Brain Injury (TBI). Efforts seek to reduce 
load-related injuries and chronic conditions, address the cognitive and 
physical burden through better decision and mission planning tools, and 
optimize individual protective equipment to fully consider 
survivability in relation to mobility, lethality, and the human 
dimension. This effort is truly collaborative, involving researchers 
from the Natick Soldier Research, Development and Engineering Center, 
the Army Research Lab, the MRMC, the Army Research Institute, the 
Armaments Research, Development and Engineering Center, the other 
Services and DARPA, as well as our academic, industry, and 
international partners.
    PTSD and TBI continue to be a source of serious concern. The U.S. 
Army MRMC has ongoing efforts to address these devastating conditions. 
Basic research efforts include: furthering our understanding of cell 
death signals and neuroprotection mechanisms, as well as, identifying 
critical thresholds for secondary injury comprising TBI. We are also 
focused on investigating selective brain cooling and non-embryonic stem 
cells derived from human amniotic fluid as non-traditional therapies 
for TBI, and identifying ``combination'' therapeutics that 
substantially mitigate or reduce TBI-induced brain damage and seizures 
for advanced development and clinical trials. We have had some recent 
successes in this area, including completion of an FDA effectiveness 
study on a candidate neuroprotective drug for treatment of TBI and 
completion of a pivotal trial for a bench-top assay for use in 
hospitals using candidate biomarkers for the detection of TBI.

Ground Portfolio
    The Ground portfolio includes technologies for medium and large 
caliber weapons, munitions, missiles, directed energy weapons, vehicle 
ballistic and blast protection, vehicle power and mobility, unmanned 
ground systems and countermine and counter-Improvised Explosive Devices 
(IED) detection and neutralization and deployable small base 
protection.
    In the past, we have designed vehicles with little consideration 
for accommodating soldiers who have to operate in them. Now we are 
beginning to explore ways to design vehicles around soldiers. 
Increasing protection levels of the platforms means impacting interior 
volumes reducing mobility, maneuverability, and freedom of movement for 
occupants, and leads to heavier platforms. The Occupant Centric 
Survivability (OCS) Program provides the mechanism to develop, design, 
demonstrate, and document an occupant centered Army ground vehicle 
design philosophy that improves vehicle survivability, as well as force 
protection, by mitigating warfighter injury due to underbody IED and 
mine blast, vehicle rollover, and vehicle crash events. This design 
philosophy considers the warfighter first, integrates occupant 
protection technologies, and builds the vehicle to surround and support 
the warfighter and the Warfighter's mission. To this end, we are 
developing an OCS concept design demonstrator, as well as, platform-
specific demonstrators with unique occupant protection technologies 
tailored to the platform design constraints. We are also publishing 
standards for occupant centric design guidelines, test procedures, and 
safety specifications.
    In fiscal year 2013, we are also continuing the effort started last 
year in Underbody Blast (UBB) Protection. Some recent successes include 
performing vulnerability identification and resolution on most Program 
Manager (PM) programs such as JLTV, mine-resistant ambush protected 
vehicle, Stryker, HET, and FMTV, and advising PM customers on the 
feasibility and performance of potential blast protection technologies 
while balancing cost, payload, mobility and mission requirements. We 
have developed tools and methods which have led to system level 
evaluations through modeling and simulation resulting in improved Live 
Fire Test and Evaluation, faster delivery of technologies to theater/
customers and necessary characterizations of threats, systems and 
environment. Our efforts continue to look at a full range of 
technologies to address this issue, from modeling and simulation and 
physiological studies to seats, restraints and energy-absorbing 
materials.
    We are also continuing our investments and efforts in Deployable 
Force Protection (DFP). Our military units operating remotely at small 
bases are more vulnerable to enemy attacks because they have less 
organic equipment, fewer personnel, shorter kinetic reach, less 
hardened areas, significant bandwidth limitations and are difficult to 
reinforce, resupply and support with repairs. We are developing force 
protection technologies that have a low logistics footprint, are easily 
operated with limited manpower and training, and are quick to set up 
and take down. This will allow for enhanced protection capabilities, 
while leaving soldiers with more time to perform their mission.
    In conjunction with the U.S. Special Operations Command Central and 
the Combating Terrorism Technical Support Office, we recently assessed 
several systems and recommended an integrated force protection kit to 
support Village Stability Operations. The kit is being provided to the 
7th Special Forces Group for operational assessment in theater and was 
created in a collaborative effort to accelerate delivery. The kit 
provides protection and allows operators to focus less on establishing 
personal security and more on the mission. We have also developed a 
low-logistics armoring system to expediently establish protection for 
critical assets, such as the Tactical Operations Center (TOC), mortar 
pit, and weapon/sensor systems. Unlike any other, this system also 
provides expedient overhead cover that protects against direct-hit 
rocket, artillery, and mortar threats. Members of the DFP team worked 
with troops and Centers of Excellence on design and employment options. 
The 2nd Battalion, 1st Brigade, 82nd Airborne Division will deploy with 
a number of modular protective mortar pit and overhead cover systems to 
be used in an operational assessment in theater. Use of these systems 
will result in savings of countless hours that are typically associated 
with establishing mortar pits and protection and will increase the 
associated level of protection for soldiers.

Air Portfolio
    The Army is the lead service for rotorcraft, owning and operating 
over 80 percent of DOD's vertical lift aircraft. As such, the 
preponderance of rotorcraft technology research and development takes 
place within the Army. The Air portfolio is focused on seven broad 
areas of research: platform technology; operations and support; 
survivability; rotors and flight controls; engines & drives; weapons 
and sensors; and unmanned systems. Our vision for Army aviation S&T is 
to provide the best possible aviation technology enabled capabilities 
to deliver soldiers, weapons, supplies and equipment where they are 
needed, when they are needed.
    In order to provide Soldier support over future Areas of Operation 
(AO) that may be 16 times larger than current AOs, the Army needs a 
faster, more efficient rotorcraft, with significantly improved 
survivability against current and future threats. Operating in 
conditions of 6,000 feet and 95 degrees (high/hot), this aircraft will 
need to transport and supply troops while providing close air support 
and intelligence, surveillance and reconnaissance capabilities.
    A major effort currently underway within S&T is technology 
development for DOD's next potential ``clean sheet'' design 
rotorcraft--the Joint Multi-Role (JMR) aircraft. In fiscal year 2011, 
the Army, Navy and NASA agreed to use a common toolset and database and 
are collaboratively sharing design responsibility for the JMR-Medium, 
an aircraft intended to replace our Blackhawk/Seahawk and Apache fleet. 
Three different configurations of JMR aircraft have been designed by 
the Government--a conventional helicopter, a large-wing slowed rotor 
compound, and a tilt rotor. There are seven design excursions being 
investigated that fully explore the size and environmental 
characteristics of interest, including shipboard operations. Additional 
near-term plans include conducting a small scale wind tunnel test of an 
unpowered tilt rotor to validate forces and moments, confirm 
Computational Fluid Dynamics (CFD) estimates, and update design 
parameters. Additional CFD/Computational Structural Dynamics assessment 
and results integration will be done as part of expanding the design 
methodology and toolset. We plan to use the BA4 line to allow a second 
demonstrator to be developed for JMR.
    Additionally, the DOD HPCMP CREATE Air Vehicle Project is 
coordinated with this activity and endeavors to increase the fidelity 
of the design process with the future goal of being able to conduct a 
complete detailed design environment.
    While many of our rotorcraft research efforts are focused on the 
development of technology for transition to new platforms in 2025 and 
beyond, we are also maintaining an investment to keep the current fleet 
effective. One recent transition success has been the Advanced 
Affordable Turbine Engine (AATE), a 3,000 shaft horsepower engine with 
25 percent improved fuel efficiency, and 35 percent reduced lifecycle 
costs. In fiscal year 2012, AATE transitioned to PM--Utility for 
Engineering and Manufacturing Development under the Improved Turbine 
Engine Program, which will re-engine our Blackhawk and Apache fleet.

C3I Portfolio
    The key to successful operations in an increasingly complex battle 
space is the capability for seamless and timely communications across 
all echelons of the system, from headquarters to the soldier. A major 
effort in the C3 portfolio is combining enhanced mission command 
capabilities for the soldier and small unit with improved mobile 
networks.
    We are providing solutions to improve command and control, 
situational awareness, and dynamic communications, while maintaining 
appropriate military security not found in commercial devices. In order 
to exploit the full range of capabilities that smart devices offer the 
soldier, we need an improved network in an on-the-move (OTM) 
environment; handheld devices with tools and functionality to provide 
soldiers with the necessary decision and communications capabilities in 
an intuitive interface; and appropriate security protocols for the 
battlefield.
    Our mobile network research efforts are increasing network 
efficiency and reliability, increasing OTM connectivity and bandwidth 
utilization, and allowing for reliable message delivery in difficult 
communications environments. These efforts are leveraging investments 
by commercial industry and DARPA.
    Our mission command efforts are aimed at providing soldiers and 
small units with the kinds of data-driven decision tools once available 
only to higher echelons. As our defense strategy moves to a smaller, 
more agile force, it is critical that small units and individual 
soldiers have access to accurate and relevant situation awareness 
information including geospatial and meteorological data, combat ID and 
battlespace awareness, as well as full spectrum decision support tools. 
Just as critically, we have to design these tools taking into account 
human cognitive abilities and limitations.
    Finally, the most useful tools for the soldier are worthless if 
they are not properly secured. These security issues include approved 
encryption for secret and below, identity management, security policy 
management, exploitable applications and securing the infrastructure. 
Our efforts in this area include authentication of approved 
applications and prevention of installation of rogue applications, 
providing secret voice and data connections across disparate 
technologies including handheld devices, and developing a mutual 
authentication mechanism between users, handheld devices, and the 
network core.
    Beyond the specific security efforts for mobile battlefield 
communications, the C3 portfolio also directs our broader cyber 
security S&T efforts, which I know the subcommittee has a particular 
interest in. Our work in a resilient cyber security framework will 
provide a more secure foundation in which participants, including cyber 
devices and software, are able to work together in near-real time to 
anticipate and prevent cyber attacks, limit the spread of attacks 
across participating devices, minimize the consequences of attacks, and 
recover systems and networks to trusted states. Within this framework, 
security capabilities are built into cyber devices and software in a 
way that allows preventive and defensive courses of action to be 
coordinated within and among communities of defense in depth 
architectures. The power to detect and mitigate threats is distributed 
among participants and near-real time coordination is enabled by 
combining the innate and interoperable capabilities of individual 
devices with trusted information exchanges and shared, configurable 
policies.
    In the area of software assurance, analyzing software code for 
security vulnerabilities and malware is a manually intensive effort 
requiring a high degree of skill and experience. Our development 
efforts focus on automating the software code analysis for C++ programs 
and JAVA source code; developing a compliance checker to ensure that 
the software has been developed in accordance with required standards; 
reducing false positives; and testing binary objects and images for 
logic bombs and unexecuted regions. We also have research efforts in 
hardware assurance, including trustworthy computing foundations, 
physical tamper and chip level protection schemes.

Basic Research
    Underpinning all of our efforts is a strong basic research program. 
Beginning this year, we are developing a process similar to the TECDs 
to define a set of priorities for Basic Research and identify challenge 
statements against which programs can be proposed and approved. The key 
emphasis for the Army is to provide the necessary basic research 
(through the skills of our workforce and our investments) to achieve 
and provide for technically enabled capabilities that meet the specific 
needs of the soldier and the Army mission. In Army Basic Research, we 
are looking to lead the S&T enterprise. We look for guidance from many 
sources--requirements and desired capabilities from TRADOC and our 
soldiers; commissioned studies from the National Academies and RAND; 
workshops and collaborations with our sister services; and we are in 
the midst of rethinking how we approach, describe, and provide strategy 
for the overall program.
    We know that for most of the 20th century, physics was the 
fundamental driver for nearly all leaps in technology. And while 
physics will always play a large role in that, over the last 20 years 
we have seen big changes in and big advances from biology and bio-
inspired technology. As we move forward we need to watch very closely 
and invest selectively to determine what technology is going to come 
from that and how are we going to develop that to assist the soldier. 
With that in mind, we are beginning to think of and align our basic 
research efforts in three areas: Long-Term Exploration; Long-Term 
Disruptive Technology investments; and Long-Term Enabling Research.
    Long-Term Exploration efforts look to discover or invent new 
technologies and capabilities relevant to the Army mission--we explore 
with a purpose. Our Long-Term Disruptive Technology investments are 
researching technologies which will change the rules of the playing 
field for our warfighter. Long-Term Enabling research looks for 
innovative ways to move the inventions and discoveries into components 
and subcomponents and technologies that our labs and research partners 
can exploit. By this we enable future S&T applied research, advanced 
tech development, and capabilities. Taken together, this basic research 
provides the solid foundation for Army S&T.
    These are exciting and challenging times for the Army's S&T 
program. We are changing the Army S&T business model to be an enduring, 
sustainable, successful enterprise, and aligning our strategic planning 
to the budget process to achieve efficient, top-down S&T leadership 
investment focus. We are identifying critical Army problems that we can 
solve in the near and mid-term, using the best talent and skills 
wherever they exist. Finally, we are enhancing the visibility of Army 
S&T priorities to provide partnering opportunities to jointly solve 
problems and enhance our warfighter capabilities. As you can imagine, 
this is a tremendous undertaking, and would not be possible with the 
support we have received from Congress. I hope that we can continue to 
count on support as we move forward, and I would like to again thank 
the members of the subcommittee again for all you do for our soldiers. 
I would be happy to take any questions you have.

    Senator Hagan. Thank you, Dr. Freeman.
    Ms. Lacey?

 STATEMENT OF MARY E. LACEY, DEPUTY ASSISTANT SECRETARY OF THE 
      NAVY FOR RESEARCH, DEVELOPMENT, TEST, AND EVALUATION

    Ms. Lacey. Madam Chair, Senator Portman, members of the 
subcommittee, it is an honor to appear here before you today to 
report on the overall health of the Department of the Navy 
laboratories and warfare centers.
    The Navy relies heavily on the people, facilities, and 
capabilities in our labs and centers to sustain the current 
Navy, to acquire the next Navy, and to develop the Navy after 
next.
    I want to thank the subcommittee not only for your 
interest, but for your strong support of the many initiatives, 
investments, and flexibilities enabling those scientists and 
engineers to provide new warfighting capabilities and to 
sustain the technology leadership our sailors and marines 
enjoy.
    The Navy's principal laboratory, the Naval Research 
Laboratory (NRL), was created by Congress in 1923. Over half 
the work NRL performs is fundamental S&T, nearly all in 
partnership or collaboration with academia and researchers in 
other government laboratories and activities.
    The warfare centers, while being involved in basic science, 
play most strongly in technology and engineering often in 
partnership with industry and program offices. They too have 
long histories, some dating back to the 1800s, and were 
generally created to respond to a specific threat or 
technological challenge of the day.
    The Navy labs and warfare centers maintain a diverse 
workforce of over 44,000 employees, over half of whom are 
scientists and engineers. Among the scientists and engineers, 
1,700 hold doctorates in science, engineering, or mathematics.
    The Assistant Secretary of the Navy for Research, 
Development, and Acquisition has identified five strategic 
priorities for the Navy. Each of these works in harmony with 
the other to meet the current acquisition needs and future 
technology requirements of our sailors and marines. The five 
priorities are: get the requirement right, make every dollar 
count, raise the bar on performance, support the industrial 
base, and rebuild the acquisition workforce. It is here where 
the laboratories and warfare centers play most strongly as they 
make up over half of the Navy's technical acquisition 
workforce.
    I would like to address the various flexibilities and 
hiring compensation and personnel movement you have given us 
from the China Lake demo back in the 1980s to the expansion of 
these authorities and eligible activities over the last few 
decades.
    Section 852, the Defense Acquisition Workforce Fund, has 
contributed greatly to our expansion of our workforce. Our plan 
is to hire an additional 1,600 scientists and engineers under 
this authority, nearly half of which will be either permanently 
placed or rotated through our labs and warfare centers to 
accelerate their professional development.
    The direct hiring authority, section 1108, provides for the 
appointment of qualified candidates possessing an advanced 
degree in science or engineering. Since 2009, we have hired 
more than 6,800 scientists and engineers in our laboratories 
and warfare centers and over 700 were brought in with this 
direct hiring authority. So thank you.
    Although the Navy has historically made deliberate and 
measured investments to ensure stability within our organic 
workforce, section 219 has been a big help. During this period 
of refreshing our workforce, it has proven beneficial to the 
health of the enterprise. Projections indicate the Navy labs 
and warfare centers will invest almost $90 million in fiscal 
year 2012, and furthermore, this program has sparked great 
enthusiasm on behalf of our scientists and engineers.
    The authority for unspecified minor construction, up to $4 
million, continues to hold significant potential for the 
revitalization of our laboratory and warfare facilities. As the 
program gains strength, we anticipate it will become a very 
valuable resource. In the likelihood MILCON funds decrease 
within our labs and warfare centers, this authority becomes 
even more important to revitalizing the technical 
infrastructure.
    The scientific and technical workforce is the engine that 
drives our ability to maintain the technological superiority. 
Technical capabilities once lost may take decades to 
reestablish. Scientists and engineers require the hands-on 
experience. In fact, if you do not do it, you do not know it. 
Hands-on experience is essential to provide informed 
decisionmaking when setting requirements or overseeing 
contractor performance. Consequently, the Assistant Secretary 
of the Navy for Research, Development, and Acquisition has 
directed program executive officers and program managers to 
look first at the in-house laboratories and warfare centers for 
pre-milestone B technical work.
    So in summary, the Navy labs and warfare centers are 
critical components of today's Navy, the next Navy, and the 
Navy after next. The authorities that you have given us enable 
us to strengthen their intellectual and infrastructure capacity 
and capabilities. By increasing the hands-on work performed by 
scientists and engineers, the Navy has energized the workforce.
    Having grown up professionally and technically in this 
community, it has been a delight to return in a leadership 
position where I can influence their continued success. I 
greatly appreciate your continued support to our laboratories 
and warfare centers and assure you I will do my best to ensure 
they are postured to meet today's and tomorrow's challenges.
    I would be happy to take any questions you might have.
    [The prepared statement of Ms. Lacey follows:]

                Prepared Statement by Ms. Mary E. Lacey

                              INTRODUCTION

    Madam Chairwoman, Senator Portman, members of the subcommittee, it 
is an honor to appear before you today to report on the overall health 
of the Department of Navy (DoN) laboratories and centers. The 
Department relies heavily on the people, facilities and capabilities in 
our Labs and Centers to sustain the Current Navy, to acquire the Next-
Navy, and to develop the Navy-After-Next. I would like to thank the 
Committee not only for your interest but for your strong support of 
many of the initiatives, investments, and flexibilities that enable 
those scientists and engineers to provide new warfighting capabilities 
and to sustain the technology leadership our sailors and marines enjoy.
    As was mentioned earlier, the Navy's principal Laboratory, the 
Naval Research Laboratory (NRL) was created by Congress in 1923. Over 
half of the work NRL performs is fundamental science and technology, 
nearly all in partnership or in collaboration with academia and 
researchers in other government laboratories and activities. The 
warfare and systems Centers, while being involved in basic science, 
play most strongly in technology and engineering, often in partnership 
with industry, and government program offices. They too have long 
histories, some dating back to the 1800s, and were generally created to 
respond to a specific threat or technological challenge of the day.
    Today, DoN has 15 activities that compose the In-house research and 
development (R&D) capacity. It is comprised of the NRL and 14 Warfare 
and Systems Centers aligned to 3 Systems Commands: Naval Sea Systems 
Command, Naval Air Systems Command, and Space and Naval Warfare Systems 
Command.
    The NRL, under the leadership of the Office of Naval Research 
(ONR), operates as the Navy's full-spectrum corporate laboratory, 
conducting a broadly based multidisciplinary program of scientific 
research and advanced technological development directed toward 
maritime applications of new and improved materials, techniques, 
equipment, systems and ocean, atmospheric, and space sciences and 
related technologies.
    The Naval Air Warfare Center Divisions (Air and Weapons) are the 
Department of Navy's principal research, development, test, evaluation, 
engineering, and fleet support centers for air platforms, autonomous 
air vehicles, aircraft engines, free-fall and glide weapons, 
survivability systems, mission and planning support systems, electronic 
combat systems, and the acquisition and support of fleet training 
systems.
    The Naval Surface Warfare Center operates Navy's research, 
development, test and evaluation, engineering, and fleet support 
activities for ship systems, surface ship combat and weapons systems, 
littoral warfare systems, force warfare systems and other offensive and 
defensive systems associated with surface warfare and related areas of 
joint, homeland and national defense systems.
    The Naval Undersea Warfare Center operates the Navy's research, 
development, test and evaluation, engineering, and fleet support 
activities for submarines, autonomous underwater systems, and offensive 
and defensive weapons systems associated with undersea warfare and 
related areas of homeland security and national defense.
    The Space and Naval Warfare Systems Centers are the Navy's 
research, development, test, and evaluation, engineering, and fleet 
support activities for Command, Control, Communications, Computers, 
Intelligence, Surveillance and Reconnaissance (C4ISR), Information 
Operations (IO), Enterprise Information Services (EIS) and Space 
capabilities.
    The Naval Laboratories and Warfare Centers maintain a diverse 
workforce of 44,000 employees with 23,000 scientists and engineers. 
Among the scientists and engineers, 1,716 hold doctorates in science, 
engineering, or mathematics. These are encouraging numbers but there 
remain challenges.
    Since the end of World War II, the United States has enjoyed a 
global leadership role in economic power and technology development/
exploitation. These conditions are now changing as other countries 
emerge on the world stage. We recognize that without strong Naval Labs 
and Warfare Center leadership in technology, future forces may not 
enjoy maritime dominance in all warfare areas as we have in the past. 
Over the last few years we have embarked on a number of efforts 
specifically aimed at ensuring we maintain that edge for the 
warfighter.
    The Assistant Secretary of the Navy for Research, Development, and 
Acquisition (ASN(RD&A)) has identified five strategic priorities for 
the Department of Navy. Each of these works in harmony with the others 
to meet current acquisition needs and future technology requirements of 
our sailors and marines. Within each of these priorities our 
Laboratories and Warfare Centers remain pivotal players in 
understanding the technological and programmatic ramifications. The 
five priorities are:

         Get the requirements right;
         Make every dollar count;
         Raise the Bar on Performance;
         Support the Industrial Base; and
         Rebuild the Acquisition Workforce.

    While each of these priorities is relevant to the labs and centers, 
it is in the last that the labs and centers play quite prominently as 
they make up over half the department's acquisition workforce. Over the 
last few years we have reversed over a decade of downsizing this part 
of our workforce: our professional corps had been stretched too thin 
and we had outsourced core competencies.

                              SECTION 852

    Section 852 of the National Defense Authorization Act (NDAA) for 
Fiscal Year 2008 provides a mechanism to achieve the Secretary of 
Defense's goal of strategically sizing and rebalancing the Acquisition 
Workforce and ensure the Departments workforce has the capacity, in 
both personnel and skills, to perform its mission, provide appropriate 
oversight of contractor performance, and ensure the Department receives 
the best value for the expenditure of public resources. The Naval Labs 
and Warfare Centers make up more than half of the Department of the 
Navy's Acquisition Workforce. The Department of the Navy plan is to 
systematically and strategically hire 1,590 new professionals through 
fiscal year 2015 in areas deemed essential to meet long-term needs.
    Today, the Navy is executing to the plan. Many of these 
professionals are either permanently placed or rotated through our 
laboratory enterprise to increase their understanding of our programs 
and accelerate their professional development.
    Section 852 has been invaluable to the Warfare and Systems Centers 
to fill key technical positions. It has enabled Warfare and Systems 
Centers to avoid losing highly coveted scientists and engineers.
    The demand for scientists and engineers is as strong as it has ever 
been; if not stronger. While our colleges and universities see the 
numbers of American students pursuing technical degrees holding steady, 
or increasing, the number of graduates that are US citizens and 
eligible for employment in our workforce is not growing and our need 
for them remains great.

                        DIRECT HIRING AUTHORITY

    Section 1108 of the NDAA for Fiscal Year 2009 provides that the 
Secretary of Defense may appoint qualified candidates possessing an 
advanced degree to scientific and engineering positions within any 
Laboratory.
    Since fiscal year 2009, the Naval Laboratories and Warfare Centers 
have hired more than 6,800 scientists and engineers in their effort to 
reinvigorate the technical workforce. Of these hires, 729 were brought 
on using the Direct Hiring authority. This authority allows us to 
compete for the best minds graduating from our colleges and 
universities today, and while we've enjoyed relatively good recruiting 
results in the last few years largely due to the economy, the situation 
is again becoming more competitive.
    I would be remiss if I didn't thank you for your strong support of 
the various other personnel flexibilities you have given us over the 
years, from the ``China Lake'' demo back in the 80's, to expansion of 
those authorities and eligible activities over the last few decades. 
The flexibilities in hiring, compensation, and personnel movement have 
greatly benefitted our workforce and activities. Every organization in 
the Naval Laboratory Enterprise has a version of a personnel system 
other than the General Schedule that is tailored to their needs. We are 
continuously evaluating the effectiveness of these systems and porting 
best practices from one system to another.

                              SECTION 219

    The DoN has historically made deliberate and measured investments 
to ensure stability within the organic workforce. During this period of 
refreshing our workforce, section 219 of the NDAA for Fiscal Year 2009 
has proven very beneficial to the health of the Navy Labs, Warfare and 
Systems Centers. ASN(RD&A) continues to promote and execute section 219 
to:

         Maintain the scientific and technical vitality of in-
        house laboratories and centers;
         Increase the rate of recruitment and retention of 
        laboratory and center personnel in critical skill areas of 
        science and engineering;
         Foster creativity and stimulate exploration of cutting 
        edge science and technology;
         Serve as a proving ground for new concepts in R&D;
         Support high-value, potentially high-risk R&D;
         Provide for maturation and transition of technologies 
        beneficial to the Navy, Marine Corps, and the military forces 
        of the other Services; and
         Enhance the laboratories' ability to address future 
        military and DoN and Department of Defense (DOD) missions.

    Current projections indicate the Naval Laboratories and Warfare 
Centers will invest approximately $90 million in section 219 projects. 
Furthermore, this program has sparked a great deal of enthusiasm within 
the laboratory community. Each of the Labs and Centers has seen an 
increase in `new ideas' from their scientists and engineers. A 
secondary benefit has been increased communication between the 
Laboratories and Warfare Centers and their customers regarding future 
technical challenges. For example, the Marine Corps Systems Command 
provided Labs and Warfare Centers with a written list of their 
priorities for technology focus areas.

                         10 U.S.C. SECTION 2805

    The authority for unspecified minor construction up to $4 million, 
under 10 U.S.C. Sec. 2805, continues to hold significant potential for 
the revitalization of Naval laboratories and warfare centers. We have 
not utilized the $4 million under this authority to date. As our 
program begins to gain strength, we anticipate it becoming a valuable 
resource.
    Over the last decade, the Military Construction (MILCON) 
investments at NRL and the Warfare Centers have averaged approximately 
three percent of the total DoN MILCON budget (based on 2010 Naval 
Laboratory/Center Coordinating Group (NLCCG) Report). Approximately 
one-third of these were funded through congressional-adds and another 
third via BRAC. BRAC MILCONs are complete and congressional-adds will 
no longer be considered. In the likelihood that MILCON funds will 
decrease within the Laboratories and Warfare Centers, the minor 
construction authority granted under section 2805 becomes even more 
important to the revitalization of our technical infrastructure. We 
recommend considering the elimination of a sunset clause and making 
this a permanent authorization.
    As was noted in the 2010 Naval Research Advisory Committee report 
on the Status and Future of the Naval R&D Establishment, the scientific 
and technical workforce is the engine that drives our ability to 
maintain technological superiority. Technical capabilities once lost, 
may take decades to re-establish. We will maintain a constant state of 
``re-invention.'' Our Labs and Warfare Centers are maintaining pace 
with the rapid rate of change within science and technology to fully 
understand the technical/cost trade-space for next generation systems 
and platforms. Scientists and engineers require hands-on experience; 
``If you don't do it, you don't know it.'' Hands-on experience is 
essential to provide informed decisionmaking when setting requirements 
and overseeing contractor performance. The Department needs to always 
have the ability to: understand military problems in technical terms, 
know who has the potential to solve those problems, and verify a 
correct solution technically when it is offered.
    Today's most pressing challenge in Acquisition is delivering the 
capability needed by our sailors and marines--more affordably. To do so 
requires a significant technical understanding of the complex systems 
the Department is acquiring. DoN Scientists and Engineers are 
instrumental to providing that understanding. ONR, Laboratories, 
Systems Commands, Warfare and Systems Centers are the principal sources 
of in-house technical knowledge.
    During this time of strategic and budget refocus, the Department is 
focused to maximize its return on the investment of in-house technical 
capability and facilities. Consequently, ASN(RD&A) has directed Program 
Executive Officers (PEOs) and their Program Managers to look, first, to 
in-house Naval Laboratories, Warfare and Systems Centers for Pre-
Milestone B technical work that would improve the Department's 
technical product, and cost knowledge. It is especially important that 
DoN Scientists and Engineers perform or participate significantly in 
these functions in the early stages of R&D. Examples include: 
engineering work in support of Analyses of Alternatives, in-house 
prototyping, experimentation, scale-model testing, and reducing program 
risk via subsystem development and testing. These tasks serve to 
emphasize hands-on work rather than administrative or oversight 
functions.
    As the Deputy Assistant Secretary of the Navy for Research, 
Development, Test, and Evaluation I have oversight responsibility to 
the ASN(RD&A) for all RDT&E accounts, systems engineering and overall 
stewardship responsibilities for the Naval Laboratories and Warfare 
Centers. Since assuming my responsibilities in June of 2011, I have re-
chartered the Navy Laboratory and Centers Coordinating Group (NLCCG). 
The NLCCG was first stood up with the establishment of the Warfare 
Centers in 1992 and is comprised of the civilian and military 
leadership of NRL and Warfare and Systems Centers. They are responsible 
to:

         Provide stewardship of the mission, technical 
        capabilities, workforce and facilities of the Naval Laboratory 
        and Warfare/Systems Centers;
         Advocate for the sustainment and enhancement of 
        technical capabilities and competencies of NLCCG activities;
         Develop and implement a Naval Science and Engineering 
        Strategic Plan;
         Increase operational effectiveness and efficiency of 
        the Naval Laboratory and Warfare/Systems Centers and promote 
        long-term fiscal health of NLCCG activities; and
         Promote communication, cooperation and collaboration 
        among all organizations.

    I have tasked this group to create an overarching strategy, to 
define needed core technical capabilities, and to determine how to 
optimally integrate all these capabilities to meet the affordability 
challenges of today's platform and systems acquisition while planning 
integrating and delivering transformational technologies for the Navy-
After-Next.
    Our near term focus is to:

         Align processes for the work we accept from customers;
         Establish common processes for measuring the technical 
        health of our workforce;
         Establish Department of Navy wide definitions for core 
        capabilities and competencies; and
         Ensure consistency and transparency in program costing 
        practices to ensure we make every dollar count within the Navy 
        Working Capital Fund model.

    All these actions make the Navy Laboratories and Centers better 
partners and suppliers of technical expertise and products in the DOD 
Lab Enterprise. We will continue efforts to collaborate across the 
Services and the Laboratory community to champion the needed workforce, 
facilities, and long-term strategic investments.
    The military dominance of the United States and U.S Naval Forces in 
particular, is closely coupled to technical superiority of our military 
equipment and systems. This superiority is evident in such diverse 
areas as naval nuclear propulsion, radar, electronic warfare, missile 
systems, and has a force multiplier effect throughout our systems and 
platforms.
    Although the U.S. Government and U.S. companies continue to invest 
in R&D, the increasing strength of developing countries and their R&D 
investments means that R&D is increasingly a global enterprise. The 
Department of Navy technology position will be shaped by the 
increasingly global nature of Science and Technology (S&T). Even if the 
Department of Navy R&D budgets were to remain a constant fraction of 
U.S. GDP, they would be a declining fraction of global Science and 
Technology investment. Therefore, those R&D investments must achieve a 
greater effectiveness per dollar to maintain U.S. Naval technological 
superiority. Important attributes include:

         Operationally motivated S&T investments: S&T 
        investments should be connected to the long term strategies and 
        operational requirements shaping future naval capabilities. A 
        core competency of the Naval Labs and Warfare Centers must be 
        maintaining a clear understanding of how new or emerging 
        technical impacts might impact naval capabilities. The goal 
        should be to ensure technical innovation is coupled to equally 
        innovative concept development.
         Self-refreshing: As previously stated, the scientific 
        and technical workforce is the engine driving our Naval 
        Laboratories and Warfare Centers. The dynamic nature of science 
        and technology means the Naval Laboratories and Warfare Centers 
        must be in a constant state of re-invention.
         Robust against disruptive innovation: The extremely 
        dynamic nature of the global technology landscape--new markets 
        can emerge and flourish in mere years--means the Naval Labs and 
        Warfare Centers must have sufficient understanding of 
        technology changes to protect the value of major acquisition 
        programs.
         Agile adoption and differentiation of global 
        innovation: When promising innovations in the global market are 
        identified, the task of the Naval Labs and Warfare Centers is 
        to influence the external community development directions to 
        satisfy Naval needs and develop key elements that ensure an 
        advantage to Naval capabilities. We rely heavily on the ONR 
        international presence in places like London and Singapore to 
        be our portals to the international technical community. ONR 
        Global and their foreign-based science officers, provide 
        outstanding value. But more is necessary. Globalization is a 
        contact sport. The Naval Laboratories and Warfare Centers will 
        not be effective without our continued commitment to accessing 
        the global span of S&T. With the rate of growth of technology, 
        and especially outside of DOD and the United States, the Naval 
        Labs and Warfare Centers must increase the aperture of the 
        technical community.

    Recent performance trends indicate the Laboratories and Warfare 
Centers are executing more S&T work in-house, more than sixty percent 
over the last two years. The S&T funding that goes out-of-house is used 
to reach out to universities, industry parties, and other Laboratories. 
Data over the last decade showed slightly less than 50 percent had been 
executed in-house. This slight adjustment is consistent with the 
Department of Navy's objective to strengthen in-house technical 
capabilities.
    The RDT&E investment portfolio is balanced within a variety of 
programs and initiatives, using in-house resources and out-of-house to 
bring the best ideas and opportunities forward. These include ONR's 
Future Naval Capabilities, Advanced Technology Demonstrations (ATDS), 
Joint Capability Technology Demonstrations (JCTDs), Small Business 
Innovative Research, Cooperative Research and Development Agreements, 
and now the Rapid Innovation Program.
    To date, only a handful of contracts have been negotiated under the 
Rapid Innovation Program. We are complying with guidance to use the 
funds to primarily stimulate and accelerate the transition solutions 
from small business providers into the hands of our warfighters. The 
Labs stand ready to advise and help Service and small business program 
managers and technical staff alike on the most effective insertion 
methods and test products if needed. We are optimistic this program 
will result in effective capability for the warfighter and introduce 
players to the DOD acquisition family, but it is too early to declare 
success.
    The Naval Laboratories and Warfare Centers have the unique position 
and capabilities enabling them to: (a) fully understand the technical 
complexity of an emerging challenge, (b) quickly reach out all 
stakeholders and centers of excellence (other labs/centers, industry, 
academia, and other services) with no conflict of interest, (c) develop 
ideas against the backdrop of the acquisition process, and (d) deliver 
cost effective solutions. The hands-on work these scientists and 
engineers perform helps them fully comprehend the technical intricacies 
of evolving challenges.
    The future technological challenges facing the Department of Navy 
are dynamic and constantly in flux. However, there are four areas, 
unique to the maritime environment, where the Navy must develop or 
maintain the technical competencies for leadership in the future.

         Integrated C4ISR. Whether systems are airborne, on the 
        ocean surface, undersea or in expeditionary air/ground 
        operations the use of wireless dynamic networks of manned and 
        unmanned platforms offers significant operational advantage. 
        Combined with timely intelligence, it can assist the 
        operational commanders in achieving 'information dominance'. A 
        major technical challenge exists for these heterogeneous 
        systems in maritime command and control in that communications 
        connectivity cannot be guaranteed and as a result, unmanned 
        nodes must be able to operate with intermittent connectivity. 
        Our Naval Labs and Centers are participants in defining the 
        technical issues and in developing the necessary capabilities 
        to solve the problems, build the systems, and maintain them 
        into the future.
         Massive Data Transport. We are seeing the emergence of 
        new sensors systems, such as Multi-mission Maritime Aircraft 
        (P-8) and Broad Area Maritime Surveillance (BAMS) platform 
        capable of generating petabytes (that's 10 to the 15th power) 
        of data that will well exceed new military satellite 
        communications throughput capabilities. This is further 
        exacerbated by the challenges of the maritime environment where 
        the available bandwidth can often be degraded. The Naval Labs 
        and Warfare Centers will play a major role in defining the 
        issues and finding solutions. The Naval Labs and Warfare 
        Centers are planning to grow their technical competency to 
        support and lead this transformation using both commercial and 
        Navy-specific technologies.
         Electronic Warfare. The Navy has a compelling 
        expertise, dating back to our early radar experiments right on 
        the Potomac, in Electronic Warfare. The challenge is to ensure 
        the integration and interoperability of legacy and new systems 
        across multiple platforms, integrating new capabilities into 
        planned C4ISR systems and future platforms. The Naval 
        Laboratory Enterprise already collaborates informally at the 
        working level in this area, we are planning to review this 
        approach to ensure it is sufficient to provide the projected 
        capacity and interaction in this important area.
         Counter Anti-Access and Area Denial (A2/AD) and High 
        End Asymmetric Threat (HE/AT). Given the global proliferation 
        of A2/AD systems and capabilities and growing HE/AT that 
        attempt to challenge the ability of U.S. maritime forces to 
        operate freely, the Warfare Centers have and will continue to 
        grow the technical competencies and provide technical 
        leadership to in: Cyber warfare, Air- and surface-launched 
        weapons vs. next generation ships and aircraft, Sea-based 
        unmanned vehicles with munitions and ISR sensors, Concealment 
        and Deception, Ballistic Missile Defense, Communications in 
        non-satellite environment, Anti-Submarine Warfare, Sea Base 
        systems and technologies, Indications & Warning, Precision 
        Targeting, and Mine warfare and mine countermeasures.

    Within the Naval Warfare Centers and Systems Centers, scientists 
and engineers are addressing the total life-cycle of technical issues 
for the Current Navy, the Next Navy, and the Navy-After-Next. Our 
scientists and engineers who have supported the immediate needs of our 
marines and sailors in Iraq and Afghanistan have accumulated invaluable 
knowledge of the real-life challenges and anticipated threats we may 
face in the future. It is critical that the DoN not miss the 
opportunity to re-invest this knowledge back into our future technical 
capabilities.

                                SUMMARY

    The Naval Laboratories and Warfare Centers are critical components 
of Today's Navy, the Next-Navy, and the Navy-After-Next. Authorities 
such as Section 852, Direct Hiring Authority, Section 219, and Section 
2805 enable the Laboratories to strengthen their intellectual and 
infrastructure capacity and capabilities. There is no shortage of 
technical challenges. By increasing the hands-on work performed by 
scientists and engineers, the Navy has energized and excited the 
workforce. Having grown up professionally and technically in the Navy 
Laboratory and Center community, it has been a delight to return to the 
community in a leadership position where I can influence their 
continued success. I greatly appreciate your continued support to our 
Naval Laboratories and Warfare Centers, and I assure you I will do my 
best to ensure they are postured to meet today's and tomorrow's 
challenges.

    Senator Hagan. Thank you, Ms. Lacey.
    Dr. Walker? Thank you.

 STATEMENT OF DR. STEVEN H. WALKER, DEPUTY ASSISTANT SECRETARY 
   OF THE AIR FORCE FOR SCIENCE, TECHNOLOGY, AND ENGINEERING

    Dr. Walker. Thank you. Madam Chairwoman, Senator Portman, 
members of the subcommittee, and staff, I am pleased to have 
the opportunity to provide testimony on the S&T program and on 
the status and the health of the AFRL, our Service's premiere 
research organization.
    To protect our Nation amidst a myriad of current and future 
security challenges, the Air Force must be an agile, flexible, 
ready, and technologically advanced part of the joint team. 
Supported by the fiscal year 2013 President's budget request of 
approximately $2.2 billion for S&T, our program plays a vital 
role by creating the compelling air, space, and cyberspace 
capabilities for precise and reliable global vigilance, reach, 
and power.
    As our single full-spectrum research organization, AFRL 
executes the Air Force's investment portfolio in basic 
research, applied research, and advanced technology 
development. AFRL is unique among the Services, as all the Air 
Force efforts to discover, develop, and integrate affordable 
aerospace warfighting capabilities are housed in this one 
laboratory. Our single unified lab structure has brought Air 
Force S&T to a new level of efficiency collaboration and 
innovation.
    Basic research is the foundation of the Air Force S&T 
program and the cornerstone of our future force. Through the 
scientists and engineers at the Air Force Office of Scientific 
Research (AFOSR), we actively engage the worldwide technical 
community, and the Air Force has been able to leverage 
significant investments made by other defense and Federal 
agencies as well as non-defense and international laboratories 
by doing this.
    These long-term efforts have led to promising opportunities 
such as cold atoms which may enable development of an inertial 
navigation system on a chip that is jam-proof and highly 
accurate.
    Through its Rapid Reaction and Innovation Process, the 
laboratory also supports the current fight. Since December 
2010, Blue Devil Block 1, persistent intelligence, 
surveillance, and reconnaissance capability, has been 
instrumental in identifying a number of high-value individuals 
and IED emplacements in the U.S. Central Command area of 
responsibility.
    AFRL actively collaborates at all levels with other Service 
labs and DARPA. This engagement ranges from scientists and 
engineers sharing the very latest scientific and technological 
breakthroughs at conferences and symposiums to more formal 
efforts including disciplined joint planning, which accelerates 
technology maturation and ensures that taxpayer resources are 
best utilized.
    The Air Force's relationship with DARPA has been critical 
over the years. Approximately one-third of the DARPA program is 
actually executed through AFRL due to our laboratory leadership 
and key technical areas, our unique facilities and strong 
ability to form world-class teams spanning industry, academia, 
and other Government laboratories.
    To meet the S&T demands of the current and future 
warfighter, we must develop and maintain mission-ready 
facilities and infrastructure. AFRL is a world-class lab with 
more than 40 sites worldwide which includes AFOSR offices in 
Europe, Asia, South America; 539 primary facilities on 10 
installations; and 11 million square feet of technical space. 
While the recently completed efforts from the BRAC 2005 
provided the lab with several new state-of-the-art facilities, 
such as the Sensors Range Complex, we recognize that we must 
continue to be vigilant and upgrade our S&T infrastructure in a 
timely manner so that major research programs are not put at 
risk due to aging facilities.
    Ensuring the Air Force continues to have world-winning 
technology requires the proactive management of our current 
STEM workforce and a deliberate effort to grow the lab 
scientists and engineers of the future. The Air Force 
Laboratory Personnel Demonstration Project adopted in 1997 has 
done much to ensure AFRL's ability to attract and retain 
personnel. This flexible system has helped to achieve the best 
workforce for the mission, adjust the workforce for change, and 
improve overall quality. We have also set outreach goals to 
aggressively pursue strategic partnerships and activities with 
our schools, universities, sister Services, professional 
associations, and other Federal agencies in an effort to grow 
and develop future STEM talent.
    Today's Air Force stands as the most powerful air, space, 
and cyberspace force in the world because of technological 
advances being transformed into revolutionary new capabilities. 
AFRL has and continues to provide innovation and critical 
support for the Air Force by balancing near-, mid-, and far-
term research, leveraging efforts across academia, industry, 
and the other services; and maintaining an efficient and 
effective lab infrastructure; and finally, retaining and 
developing a world-class cadre of scientists and engineers.
    Madam Chairwoman, Senator Portman, and the subcommittee, 
thank you again for the opportunity to testify today and thank 
you for your continued support of the Air Force S&T program and 
the AFRL.
    [The prepared statement of Dr. Walker follows:]

               Prepared Statement by Dr. Steven H. Walker

                              INTRODUCTION

    Ms. Chairwoman, members of the subcommittee and staff, I am pleased 
to have the opportunity to provide testimony on the Air Force Science 
and Technology (S&T) Program and on the status and health of the Air 
Force Research Laboratory (AFRL), our Service's premiere research 
organization.
    To protect our Nation amidst a myriad of current and future 
security challenges, the Air Force must be an agile, flexible, ready, 
and technologically-advanced part of the Joint team. The Air Force S&T 
Program plays a vital role by creating compelling air, space and 
cyberspace capabilities for precise and reliable global vigilance, 
reach and power.
    Directed by Air Force senior leadership, our S&T Program is based 
on several enduring tenets. First, we must prepare for an uncertain 
future and investigate game-changing technologies to affordably 
transition the art-of-the-possible into military capabilities. To 
support the Air Force Service Core Functions, we must create technology 
options across a wide spectrum ranging from institutionalizing 
irregular warfare capabilities to providing new capabilities to operate 
effectively in cyberspace and across all domains. We must demonstrate 
advanced technologies that address affordability by promoting 
efficiencies; enhancing the effectiveness, readiness, and availability 
of today's systems; and addressing life cycle costs of future systems. 
In keeping with our Service heritage, we must continue to foster an 
appreciation for the value of technology as a force-multiplier 
throughout the Air Force. We must maintain the requisite expertise to 
support the acquisition and operational communities and modernize and 
improve the sustainability of unique research facilities and 
infrastructure. Finally, we must leverage and remain vigilant over 
global S&T developments and emerging capabilities to avoid 
technological surprise and exploit art-of-the-possible technologies for 
our military advantage.
    To accomplish this in a constrained fiscal environment, it is 
critical that we make the wisest investment decisions possible with the 
precious taxpayer resources afforded us. We've used this opportunity as 
a catalyst to holistically examine our S&T portfolio by considering 
several fundamental questions guided by our tenets. Where should the 
Air Force lead the Department of Defense (DOD) from a technology 
development perspective? Where should we be an integrator of 
technologies developed by others, and where should we follow the pace 
of technology being led by our sister Services, other agencies, 
academia, or Industry?
    Recognizing that wise investments are rooted in sound strategies, 
we embarked more than a year ago on the deliberate and collaborative 
development of an S&T Strategy. This strategy, which codified our 
enduring tenets and current overarching priorities, led to the creation 
of an S&T Plan, published in June 2011. This capstone document 
describes how AFRL implements the Air Force S&T Strategy.
    In light of the defense strategic guidance released in February, we 
ensured our current strategies and plans were appropriately aligned 
with new and enduring emphasis areas. Our S&T Program supports the Air 
Force capabilities fundamental to the major priorities of the guidance, 
such as deterring and defeating aggression, projecting power in anti-
access and area denial (A2/AD) environments, operating in the space and 
cyberspace domains, and maintaining a safe, secure and effective 
strategic deterrent. Our Air Force S&T Strategy, along with the defense 
strategic guidance, provided valuable vectors and helped the Air Force 
make some very challenging investment decisions.

       AIR FORCE S&T FISCAL YEAR 2013 PRESIDENT'S BUDGET REQUEST

    The Air Force fiscal year 2013 President's budget request for S&T 
is approximately $2.2 billion, which includes nearly $200 million in 
support of devolved programs consisting of High Energy Laser efforts 
and the University Research Initiative. These investments support a 
robust and balanced foundation of basic research, applied research, and 
advanced technology development that will provide demonstrated 
transition options to support future warfighting capabilities. This 
year's budget request represents a decrease of $64 million or a 2.8 
percent reduction from the fiscal year 2012 President's budget request. 
This reflects a more modest reduction than that taken across the total 
Air Force budget and indicates the strong support for S&T from our 
leadership in this challenging fiscal environment.
    Our Nation depends on the Air Force to counter a broad spectrum of 
threats that could limit our ability to project global reach, global 
power, and global vigilance. In turn, the Air Force relies on its S&T 
program to provide the technical edge to affordably meet these threats 
across the spectrum of many years. Within the S&T portfolio, 
significant adjustments were made to focus investments in the most 
promising technologies to develop future warfighting capability. The 
most dramatic adjustment is an increase of $55 million in our 
propulsion portfolio in support of new DOD emphasis on A2/AD and energy 
savings. We were able to maintain stable investments in basic research, 
directed energy, munitions, and human effectiveness technology areas. 
Based on our strategy, we reduced our investments in airborne active 
denial, strategic relay mirrors, and high speed laser communications 
development in the directed energy portfolio and laser threat warning 
and small remotely piloted aircraft sensing technologies in the sensors 
technology portfolio. Finally, we are divesting our investment in 
deployed airbase technology development and thermal sciences 
technologies. In these and other technology investment areas, we 
shifted investment priorities in order to best deliver on our strategic 
priorities.

            AIR FORCE RESEARCH LABORATORY BALANCED PORTFOLIO

    As our single full-spectrum research organization, AFRL executes 
the Air Force's investment portfolio in basic research, applied 
research and advanced technology development. AFRL is unique among the 
Services as this one laboratory houses all Air Force efforts to 
discover, develop and integrate affordable aerospace warfighting 
technologies. Two decades ago, the Air Force laboratory system spread 
research across 14 different locations nationwide. In 1990, these 
locations were merged into four ``superlabs.'' Finally, in 1997, the 
current single, unified AFRL structure was completed, bringing Air 
Force S&T to a new level of efficiency, collaboration and innovation.
    AFRL works collaboratively with key S&T stakeholders to maintain a 
balanced portfolio responsive to current warfighter needs while 
simultaneously creating the technical foundation for the future force. 
The Laboratory is able to provide this critical support to the Air 
Force by balancing near-, mid- and far-term research, coordinating with 
and leveraging efforts across academia, industry and the other 
Services; maintaining an efficient and effective laboratory 
infrastructure; and retaining and developing a world-class cadre of 
scientists and engineers.
    Basic research (science and knowledge) is the foundation of the Air 
Force S&T Program and the cornerstone of the future force. Based on 
visions of the future established by Air Force leadership, Air Force 
scientists and engineers identify, nurture and harvest the best basic 
research to transform leading-edge scientific discoveries into new 
technologies with substantial military potential. These technologies 
transform the art-of-the-possible into near-state-of-the-art and offer 
new and better ways for the acquisition community to address far-term 
warfighter needs. While it can be more of a challenge to quantify long-
term basic research, with the scientists and engineers at the Air Force 
Office of Scientific Research within AFRL actively engaged in worldwide 
technical communities, the Air Force has leveraged significant 
investments made by other defense and Federal agencies, as well as non-
defense and international laboratories, in its on-going efforts to 
advance basic science. These long-term efforts have led to promising 
opportunities such as cold atoms, which may enable development of an 
inertial navigation system on a chip that is jam-proof and highly 
accurate; self-healing structures, which may lead to more durable and 
longer-lasting aircraft structures; and bio-energy, which may lead to 
renewable bio-hydrogen techniques to propel vehicles. Two projects were 
even identified by Time Magazine last year as ``best inventions'' for 
2011. First, in conjunction with the University of Texas at Dallas, 
researchers developed a multi-walled carbon nanotube sheet that when 
rapidly heated effectively ``cloaks'' objects beneath it. And, second, 
in conjunction with the Massachusetts Institute of Technology, 
scientists developed a new method to split and store hydrogen and 
oxygen using solar energy without any external connections.
    Our core technical competencies also allow us to transition applied 
research activity directly to the user. One example is in the space 
technical area. The Space Weather Models developed by AFRL are used 
throughout industry today for spacecraft design and the GEOSPACE Model 
of the Space Environment is now commercially sold as part of the 
Satellite Tool Kit. Another example is in our Low Observables (LO) 
Maintainability area. From this area, the Air Force transitioned 
multiple improvements in LO maintainability that allow us to restore 
the LO characteristics of the platform and do so more rapidly. For 
example, the transitioned Hot Melt Gap Filler project provides the 
capability to do on-the-spot repairs in the field while maintaining the 
electromagnetic performance of the F-35.
    AFRL helps the Air Force maintain a winning edge by continuously 
transitioning critical products that strengthen Air Force Core 
Functions by managing high-risk with high-return science and knowledge, 
maturing affordable technologies that address specific warfighter 
needs, and demonstrating high-value S&T capabilities at reduced 
acquisition risk. Flagship Capability Concepts (FCCs), Air Force-level 
integrated technology demonstration efforts, are matured by AFRL with 
the intent to transition to the acquisition community for eventual 
deployment to an end user. Key factors in commissioning an FCC include 
having a well-defined scope and specific objectives desired by a Major 
Command (MAJCOM). These FCCs are sponsored by the using command and are 
vetted through the S&T Governance Structure and Air Force Requirements 
Oversight Council to ensure they align with Air Force strategic 
priorities.
    The High Velocity Penetrating Weapon FCC was established to 
demonstrate critical technologies to reduce the technical risk for a 
new generation of penetrating weapons to defeat difficult, hard 
targets. The ultimate goal is to demonstrate 5,000-pound-class weapon 
penetration capability in a 2,000-pound-class weapon.
    We commissioned a new FCC for Precision Airdrop in response to a 
request from the Commander of Air Mobility Command for technologies to 
improve airdrop accuracy and effectiveness while minimizing risk to our 
aircrews. AFRL, the Aeronautical Systems Center, and Air Mobility 
Command members established a working group to explore all aspects of 
the airdrop missions--from re-supplying our warfighters in the field to 
providing humanitarian aid to people in need across the globe.
    The Selective Cyber Operations Technology Integration FCC is 
executing smoothly toward providing cyber technologies capable of 
affecting multiple nodes for the purposes of achieving a military 
objective. The standardized delivery platform being developed is 
scheduled to be complete in fiscal year 2013 and will serve as a 
baseline for current and future integrated cyber tools.
    Developing technologies to equip our forces of tomorrow is the 
primary objective of any S&T portfolio. Yet, our dedicated scientists 
and engineers are equally motivated to contribute to the current fight 
by getting their technologies into the hands of our warfighters today. 
AFRL supports the current fight through its Rapid Reaction and 
Innovation Process. By capitalizing on AFRL's expertise and tightly 
integrating it with operator knowledge, this process harnesses leading-
edge knowledge, commercial off-the-shelf parts and mature technology 
efforts to rapidly deliver innovative solutions to the warfighter's 
most urgent needs. Its successful rapid-response development efforts 
have included a small, lightweight infrared emitter for friendly 
aircraft to identify joint terminal attack controllers on the ground, a 
wind-measuring dropsonde that unmanned air vehicles can pre-deploy to 
enable single-pass airdrop for Air Mobility Command aircraft and a 
maritime unmanned aerial system with wide-area search radar for low-
cost, long-range coalition maritime surveillance for U.S. Pacific 
Command.
    Air Force S&T has played a significant role in developing and 
delivering combat capability to our warfighters engaged in the U.S. 
Central Command (CENTCOM) area of responsibility through the deployment 
of Blue Devil. Blue Devil Block 1 is a persistent intelligence, 
surveillance, and reconnaissance (ISR) capability demonstrating the 
first-ever integration of wide area field-of-view and narrow field-of-
view high definition day and night sensors cued by advanced signals 
intelligence sensors. Imagery is transmitted in near-real-time to a 
Blue Devil ground station or to individual soldiers on the ground. Blue 
Devil Block 1 satisfies a number of CENTCOM Joint Urgent Operational 
Needs. Warfighter feedback on the situational awareness provided by 
Blue Devil Block 1 has been overwhelmingly positive. Since December 
2010, Blue Devil ISR has been instrumental in identifying a number of 
high value individuals and improvised explosive device emplacements. In 
fiscal year 2013, Blue Devil Block 1 will continue to support CENTCOM 
with four sorties per day.
    In the realm of technology transition and transfer, we are managing 
a number of initiatives that are yielding positive results. For 
example, the Air Force is engaging with small business to execute the 
Rapid Innovation Fund (RIF). The Air Force received 730 white papers in 
response to the RIF broad agency announcement, 88 percent of which were 
submitted by small businesses.
    The Air Force asked submitters to focus on key technology areas in 
their white papers. These included support to current contingency 
operations, particularly in the areas of precision air delivery, low-
metal or non-metallic detection devices, persistent wide-area airborne 
surveillance and exploitation capability, combat search and rescue, and 
man-portable fire suppressant. We also asked for ideas in cyber 
operations and mission assurance, improved system sustainment, and 
power generation and energy for platforms.
    In addition to the technical approach and cost, a primary 
consideration in our evaluation of white papers was transition 
potential. We also considered the degree to which the technical 
approach was relevant to our need, whether it enhances or accelerates 
the development of an Air Force capability, and if it reduces 
development costs of acquisition programs or sustainment costs of 
fielded systems. We anticipate making approximately 55 contract awards 
this fiscal year meeting the RIF intent to rapidly insert innovative 
technology into programs of record to meet critical national security 
needs.

                FOCUS ON COORDINATION AND COLLABORATION

    The AFRL actively collaborates at all levels with other Service 
laboratories and the Defense Advanced Research Projects Agency (DARPA). 
This collaboration starts at the most basic level. We engage each other 
to stay current with the evolving ``state-of-the-art'' and to work to 
eliminate duplication of effort. AFRL researchers coordinate at the 
scientist and engineer level to share their scientific discoveries and 
the very latest scientific and technological breakthroughs through 
informal opportunities such as technical conferences and symposiums 
which take place throughout the world.
    More formally, we are also increasing disciplined joint planning, 
which accelerates technology maturation and ensures taxpayer resources 
are best utilized. For example, the DOD service laboratories coordinate 
their S&T efforts through technology forums, such as the fixed wing 
vehicle program effort. Led by AFRL, the forum provides sharing of 
capability-focused technology investment roadmaps, as well as 
independent research and development industry plans among its members 
(including Boeing, Lockheed-Martin, Northrop Grumman and NASA). Similar 
forums also led by AFRL have addressed engines, hypersonics and the 
more electric aircraft initiative.
    Tactical technical coordination also occurs at the laboratory level 
which typically includes memorandums of agreement or understanding 
between specific Service laboratories or larger Communities of Interest 
(COIs). For example, in December 2011, AFRL established new initial 
collaboration areas with the Army's Research, Development and 
Engineering Command to coordinate command, control, communication, 
computers, intelligence, surveillance and reconnaissance (C4ISR), 
autonomy/robotics, and power/energy at the laboratory level. Other AFRL 
agreements with Army Materiel Command have included sensor-seeker 
exploitation technology and common cooperative leveraging of technology 
efforts.
    In addition to sharing technologies, the Service laboratories also 
share unique facilities. For instance, the Navy recently conducted 
validation testing on its new intercontinental ballistic missile (ICBM) 
motor on AFRL test stands at Edwards Air Force Base, CA. The Army also 
used AFRL's vertical wind tunnel to test the V-22 Osprey and several 
other helicopter configurations.
    The Air Force's relationship with DARPA is critical as about one-
third of the DARPA program is executed with AFRL contracts because of 
our laboratory leadership in key technology areas, unique facilities 
and strong ability to form world-class teams spanning industry, 
academia and other government laboratories. This close relationship 
between AFRL and DARPA promotes significant data sharing between 
organizations and has naturally led to integrated planning of key 
efforts.
    The Air Force's coordination with DARPA is formalized through 
sponsored direct work, partnerships and memorandums of understanding. 
There are several examples of AFRL and DARPA collaborations including 
the testing of new hypersonic glide vehicles, the Vulcan constant 
volume combustion (CVC) power generation turbine engine, the Autonomous 
Real-time Ground Ubiquitous Surveillance (ARGUS) imaging system--chosen 
for the Air Force's Gorgon Stare's electro-optical imager--and the 
Cognitive assistant that Learns and Organizes (CALO), a DARPA program 
technically managed by AFRL and incorporated into popular applications 
for iPhones.

                       LABORATORY INFRASTRUCTURE

    To meet the S&T demands of the current and future warfighter, we 
must translate Air Force S&T priorities into mission-ready facilities 
and infrastructure. The laboratory infrastructure is a cornerstone for 
enabling the required research and development necessary to maintain 
our technological superiority. AFRL is a world-class laboratory with 
more than 40 sites worldwide which includes AFOSR offices in Europe, 
Asia and South America, 539 primary facilities on 10 installations and 
11.2 million square feet of technical space.
    The 2005 Base Realignment and Closure (BRAC) effort successfully 
completed in September 2011 and provided several new, state-of-the-art 
facilities within AFRL. The Air Force strategy for BRAC 2005 was to 
consolidate and right-size operational and support units and, in the 
process, reduce excess infrastructure and capacity. The Laboratory's 
BRAC realignments successfully realized the Secretary of the Air 
Force's priorities for BRAC 2005, including the goals of realigning Air 
Force infrastructure with the future defense strategy, maximizing 
operational capability by eliminating excess physical capacity, and 
capitalizing on opportunities for joint activity.
    Encompassing nearly 80 percent of Air Force Materiel Command's BRAC 
program, the $665 million AFRL program required a movement of 1,380 
manpower authorizations, construction of more than 1.2 million square 
feet of new laboratory space, and delivery of over 340 truckloads of 
equipment to the gaining installations. The BRAC-directed 
consolidations created new S&T centers of excellence in human 
performance, sensors and space. For example, the 711 Human Performance 
Wing's Armstrong Complex was completed at Wright-Patterson AFB, OH, and 
included the addition of classrooms for the U.S. Air Force School of 
Aerospace Medicine, new laboratories, a centrifuge and altitude chamber 
and a Warfighter Readiness Center. This move consolidated 
geographically separated assets from the Brooks City Base, TX, and Mesa 
Research Site, AZ, enabling AFRL to build up technical synergy for 
human performance and exploit a center-of-mass of scientific, technical 
and acquisition expertise. In addition, the colocation of AFRL's combat 
casualty care research with similar activities at Brooke Army Medical 
Center on Fort Sam Houston, TX, promotes the rapid application of 
research findings to health care delivery, with synergistic 
opportunities to bring clinical insight into bench research.
    At Wright-Patterson AFB, ISR assets were consolidated from Rome, 
NY, and Hanscom AFB, MA, to create the new Sensors Range Complex. This 
new outdoor range mission includes research and development of space 
and airborne radar sensor concepts, as well as cost-effective detection 
and tracking of small, maneuvering airborne and ground-based targets. 
It will push the envelope for next-generation radio-frequency sensors. 
Through this consolidation, the Air Force will increase the efficiency 
in its operations with a multi-functional center of excellence in the 
rapidly changing technology area of C4ISR.
    While the last round of BRAC provided us an opportunity to 
consolidate and improve many laboratory facilities, the Air Force still 
has prioritized needs for military construction projects in other areas 
of AFRL. We recognize that we must continue to be vigilant and upgrade 
our S&T infrastructure in a timely manner so that major research and 
programs are not put at risk due to aging facilities. Maintaining high-
quality laboratory facilities is critical to remaining on the cutting 
edge of S&T and supporting the innovation necessary for the future.

                         WORLD-CLASS WORKFORCE

    Ensuring the Air Force continues to have war-winning technology 
requires the proactive management of our current Science, Technology, 
Engineering, and Mathematics (STEM) workforce and a deliberate effort 
to grow the laboratory scientists and engineers of the future. Having 
the most state-of-the-art laboratory facilities is futile without the 
right people to conduct the research inside the walls. We must attract, 
access and retain our Nation's best and brightest, and equip them 
through education, training and experience. The success of the Air 
Force S&T Program depends on an agile, capable workforce that leads 
cutting-edge research, explores emerging technology areas, and promotes 
innovation across government, industry, and academia.
    Published in 2010, the Air Force Technology Horizons report 
presented our vision of the key areas of S&T the Air Force must focus 
on over the next 2 decades to maintain a winning edge against a variety 
of threats. As a follow-on effort, we published the Bright Horizons 
STEM workforce strategic roadmap last year. This roadmap addresses the 
``people'' dimension of delivering and operating required technology by 
having the right STEM qualified people in the right place, at the right 
time, and with the right skills.
    Retaining our current world-class, highly-skilled workforce is an 
important part of the roadmap. The Air Force Laboratory Personnel 
Demonstration Project (Lab Demo), adopted in 1997, has done much to 
ensure AFRL's ability to attract and retain personnel. This flexible 
system has helped to achieve the best workforce for the mission, adjust 
the workforce for change and improve overall quality. Initially, the 
project covered approximately 2,500 scientists and engineers. By 
expanding the coverage to non-bargaining unit employees in Business 
Management and Professional, Technician, and Mission Support 
occupations, the project now encompasses approximately 3,300 AFRL 
employees.
    Several key flexibilities within the Lab Demo system have played a 
role in our ability to successfully retain personnel. For example, 
simplified, delegated position classification, broadbanding and a 
Contribution-based Compensation System (CCS) provide Laboratory 
leadership greater management capability of their workforce by 
transferring decisionmaking authority from a generally inflexible 
personnel hierarchy to front line supervisors who have firsthand 
knowledge of what is needed to accomplish the mission. Positions can be 
classified into one of four broadband levels, instead of one of 15 
grades, and the classification process takes only hours at the local 
level instead of weeks or months at the personnel center level. The 
broadband levels enhance pay progression and allow for a dual-track 
system where employees can advance through the levels based on 
contribution and technical merit. Finally, the CCS provides AFRL 
leadership the ability to manage employee expectations, focus employee 
efforts toward mission accomplishment and compensate employees 
appropriately based on contribution to the Laboratory. According to a 
recent survey conducted at the Laboratory, 94 percent of AFRL 
supervisors are positive toward the demonstration project initiatives 
and 70 percent of employees are satisfied with their pay and believe 
that top contributors are appropriately rewarded.
    Recruiting our STEM workforce in today's world presents both 
challenges and opportunities. Domestic competition for this valuable 
resource is intensifying, while competition from the international S&T 
community is simultaneously increasing. The rapid pace of global 
innovation has caused Air Force missions to evolve more quickly than 
before. For example, the rapid increase in cyber capabilities and 
vulnerabilities is driving the Air Force-wide mission evolution which 
necessitates changes in personnel requirements, including STEM.
    The flexibility inherent in the Lab Demo system has allowed us to 
better address some of the recruitment challenges as well. The 
legislated authority to direct hire candidates with advanced degrees 
has been extremely helpful. This authority has enabled the Laboratory 
to hire qualified scientists and engineers who possess a master's 
degree or a doctorate in our most needed fields in less than half the 
time of traditional hiring methods. Applicants can apply directly to 
AFRL and be brought on board in approximately 25 days as compared to 
the standard 80 to 160 days outside of the direct hire authority. In 
addition, the delegated paysetting authority within the broadbanded Lab 
Demo system allows leadership to offer competitive salaries to 
perspective candidates based on experience, academic qualifications and 
local labor market conditions rather than abide by the typically more 
rigid personnel rules. While the direct hire authority for those with 
advanced degrees has worked well to attract highly-qualified 
candidates, the Laboratory could make excellent use of a similar 
expedited authority to hire entry and journeyman-level experienced 
candidates who do not yet possess an advanced degree or recent bachelor 
degree graduates with skills in new or emerging fields and to more 
successfully recruit high quality minority candidates who are 
aggressively pursued by private industry.
    In addition to retaining and recruiting a workforce for today, the 
Air Force has also placed special emphasis on efforts to grow the 
laboratory workforce of the future. We recognize that pre-college 
(kindergarten through 12th grade) science and mathematics education has 
an important relationship to the future supply of U.S. scientific and 
technical personnel. We also recognize that global competition for STEM 
talent will undoubtedly intensify in the coming years. As such, we've 
set an outreach goal to aggressively pursue strategic partnerships and 
activities with our schools, universities, sister Services, 
professional associations, and other Federal agencies in an effort to 
grow and develop future STEM talent. For example, the Air Force 
sponsors the Junior Science and Humanities Symposium, a tri-Service 
collaboration where students (grades 9-12) compete for scholarships and 
recognition by presenting the results of their original research 
efforts to a panel of judges and an audience of their peers.
    The Air Force has also worked to appropriately target our outreach 
efforts in order to cultivate the skills we need to meet future 
requirements. For example, informed by the vision from Technology 
Horizons, the Air Force has identified over 100 key technology areas 
essential for current and future support to the warfighter. Air Force 
scholarships given through DOD Science, Mathematics and Research for 
Transformation (SMART) program are aligned to support these technology 
areas. The Air Force supports 4 MAJCOMs and over 40 individual 
facilities within those commands and selects approximately 100 students 
a year to meet requirements. SMART scholarship students maximize their 
time during 12-week internships during the summer and are doing truly 
amazing things for the sponsoring facilities. The SMART scholars 
continue to work with their respective facilities once they return to 
their colleges and universities.
    To coordinate our efforts, we've also established an Air Force-
level STEM office to act as a single focal point and better organize 
and synchronize outreach activities. The Air Force conducts over 150 
STEM engagements each year, ranging from scientists and engineers 
volunteering to judge science fairs to the National Defense Science and 
Engineering Graduate Program providing scholarships to STEM students. 
These engagements encourage and leverage local, state, and Federal STEM 
activities, affecting hundreds of thousands of students and teachers 
across the Nation. Our new outreach office allows us to improve 
coordination with other Service and agency STEM programs and gives us a 
better understanding of the effectiveness and impact of our STEM 
investments.

                         IMPACT OF SECTION 219

    The Air Force is critically dependent on technological advances to 
respond to emerging threats and to maintain a competitive advantage. 
However, since neither science nor threats are static, there is often a 
mismatch between defense planning, budget cycles and rapidly evolving 
threats and opportunities. The authority provided by section 219 of the 
Duncan Hunter National Defense Authorization Act gives AFRL a degree of 
flexibility to rapidly exploit scientific breakthroughs or respond to 
emerging threats. This flexibility increases the rate of innovation and 
accelerates the development and fielding of needed military 
capabilities to address current and future problems.
    In recent years, Section 219 funding has supported S&T in the areas 
of autonomous systems in contested environments, human performance 
augmentation, resilient cyber command and control networks, space 
situational awareness, assured operations in space, nanotechnology, 
directed energy protection, robust communications, cyber threats, laser 
technologies, and energy. For example, it has allowed AFRL to respond 
to rapidly evolving S&T projects such as investigating an insect vision 
system for sense-and-avoid applications and all-solid-state lithium 
batteries. It has also funded transition of technologies that have been 
delivered in theater for operational evaluation, such as the Sand 
Dragon and Speckles projects.
    Section 219 authority has funded 52 workforce development 
activities that cover a very wide range of opportunities related to the 
identification, hiring and recruiting of a quality science, 
engineering, and technology workforce. For example, AFRL supports 
several outreach and development initiatives such as the Wright Scholar 
Research Assistant Program, which enables the Laboratory to hire 
approximately 40 top-quality high school STEM students to assist with 
in-house summer research. We've also used Section 219 funding for our 
Air Force STEM Outreach Coordination Office referenced earlier.
    This authority is also being used by AFRL to fund upgrades to 
internal facilities, such as a hard-target fuse system research 
laboratory; an infrared/optical detector characterization and terahertz 
electronics laboratory for ISR and space situational awareness; and a 
combustion instability laboratory for liquid rocket engines. Overall, 
the section 219 authority has generated a positive impact at AFRL for 
exploiting S&T for the warfighter.

                               CONCLUSION

    The Air Force depends on its S&T Program to discover, develop, and 
demonstrate high-payoff technologies needed to address the ever-
changing strategic and operational environment and to sustain air, 
space and cyberspace capabilities now and into the future. Today's Air 
Force stands as the most powerful air, space and cyber force in the 
world because of past technological advances that have been transformed 
into revolutionary new capabilities. AFRL has and continues to 
innovatively provide this critical support to the Air Force by 
balancing near-, mid- and far-term research, coordinating with and 
leveraging efforts across academia, industry and the other Services; 
maintaining an efficient and effective laboratory infrastructure; and 
retaining and developing a world-class cadre of scientists and 
engineers.
    Ms. Chairwoman, thank you again for the opportunity to testify 
today and thank you for your continuing support of the Air Force S&T 
Program and the AFRL.

    Senator Hagan. Thank you all very much for your opening 
comments, your remarks, and certainly the depth and breadth of 
the research that is taking place in the DOD labs.
    What I would like to do is inform the Senators we will do a 
7-minute round of questions.
    Secretary Lemnios, prior to your confirmation hearing in 
2009 in your advance policy questions, you were asked if you 
support significantly increased delegation of operating 
authority to the lab directors. In your response you said, ``I 
believe in aligning responsibility at the lowest possible level 
needed to execute. Consequently, I support in principle 
delegating increased operating authority to the lab directors. 
If confirmed, I will direct the Deputy Under Secretary for 
Laboratories and Basic Services to review personnel management, 
infrastructure recapitalization, and other lab issues and 
provide recommendations to address identified problems. I will 
then work towards developing the necessary authorities for lab 
directors based upon these recommendations.''
    Can you describe briefly what you have done over the last 3 
years in developing these authorities and recommendations for 
the lab directors?
    Mr. Lemnios. Senator, we are absolutely doing that. Much of 
that work is centered around the implementation of the 219 
authorities to make sure that we understand each of the 
Services that implemented those authorities differently for 
different purposes, still aligned with the legislation.
    There are two things that we took on immediately after I 
came into the office. The first was standing up our executive 
committee which aligns the Services both in the laboratory 
sense but also the broader S&T areas. The second, more recently 
we have stood up a DOD STEM executive board to help us 
understand across the Department where the skill set is 
lacking, and that certainly ties to the workforce model that is 
being developed by DOD.
    So we have really centered on--we have looked at where the 
workforce is limiting and where we need to add to that, and 
then I work with the laboratory directors to implement those 
directly. I think it has to be pushed to the lowest level, but 
it has to be coordinated, and that is the key.
    Senator Hagan. How about recommendations to address 
identified problems?
    Mr. Lemnios. I hear problems every day. The issue is not 
identifying the problems. The issue is resourcing solutions to 
the problems and finding solutions that we can, in fact, adopt 
broadly.
    I think as you read our testimony, as you read the 
testimony of the Services, the challenge that we have across 
the Department in our laboratories is supporting the Service-
specific needs of each laboratory but then leveraging the 
broader context of how we can leverage this enterprise for 
joint use. We are in the middle of that transition now. If you 
look at the S&T priorities that we outlined last year we spoke 
about in the cyber hearing just a few weeks ago, all of those 
are cross-cuts. They are all cross-cutting technologies that 
are not owned by one laboratory or another, but we really have 
to integrate those efforts. So I guess I would say on my desk 
the inbox is full and the outbox is being sourced by what we 
can afford to do and what makes sense to do across DOD.
    Senator Hagan. Secretary Lemnios, let me give you a 
statement. In 2009, the National Academies were asked to review 
the basic research laboratory facilities of National 
Aeronautics and Space Administration (NASA). In one of their 
findings, they stated--and this is a quote--``based on the 
experience and expertise of its members, the committee believes 
that the equipment and facilities at NASA's basic research 
laboratories are inferior to those at comparable DOE 
laboratories, top-tier U.S. universities, and corporate 
research laboratories and are about the same as those at basic 
research laboratories of DOD.''
    Are you disturbed by the inference from this National 
Academies' report that the equipment and facilities of DOD's 
basic research labs are inferior to those of comparable DOE 
labs and then the top-tier universities and corporate research 
labs?
    Mr. Lemnios. I am concerned about that. I have spoken with 
the lab directors about that issue. But the devil is in the 
details. So as we look at each of these technology areas, 
whether it is electronic warfare or cyber or autonomy--the Navy 
just recently opened up a world-class robotics laboratory not 
too far from here. I can point to places where DOD, in fact, 
has a leadership role, but that leadership role has to include 
not only the facilities but the personnel and the projects. Dr. 
Freeman mentioned that in her opening comments, and I 
absolutely agree that that is the way we have to structure it.
    Senator Hagan. Talking about the differences and the MILCON 
request, when Services prioritize their MILCON request, in many 
cases it seems that laboratory infrastructure sometimes does 
not get the top attention. It is obviously competing against 
runways, piers, hospitals, gyms, barracks, and roads and other 
elements of the base infrastructure. Historically it appears to 
some of us that laboratories are at or near the bottom of these 
MILCON requests, and consequently, aside from the benefits from 
some of the last BRAC moves, the aging DOD laboratory 
infrastructure needs attention. I was astounded when Dr. 
Freeman stated that one of the buildings was from 1828.
    But for Dr. Freeman, Ms. Lacey, and Dr. Walker, what is 
your Service doing to address the infrastructure and MILCON 
needs of your laboratories? Dr. Freeman, if you want to start.
    Dr. Freeman. So, ma'am, what we are doing is as I 
mentioned, we are trying to, first of all, do a survey and 
trying to look at what the real state of our facilities are. So 
the first thing was to identify how many facilities we really 
have. The second is to go out and actually look at the 
infrastructure and categorize and understand what the condition 
is of those different buildings. Then what we are going to do 
is we are going to look at those and identify, first of all, 
what the major worst things that we have to take care of are 
that are keeping us from doing our mission-essential tasks, and 
then we are going to go down that next level of what we need to 
improve and what do we need to improve.
    Up to this point, those kinds of improvements are made at 
the individual laboratory level, and they never actually bubble 
up to the corporate level, even to my level, of what needs to 
be done. So the first thing we are doing is shedding light on 
it. After we shed light on it and understand those things, then 
we can go work with the commands and help figure out what we 
can do to improve our competition for capabilities in the 
MILCON field.
    That is why it really is important that Assistant Secretary 
Hammack and I work together on this, that we can actually 
figure out what we can do to get commands to put the 
laboratories on a different scale than where we are.
    Senator Hagan. I guess I am surprised you do not have that 
list already.
    Dr. Freeman. Right. We do not.
    Senator Hagan. When will you get it? When will the survey 
be done?
    Dr. Freeman. The survey of just identifying all the 
facilities and the infrastructure that we own, because it is in 
so many different places, so many different installations.
    The second thing is by the end of October, I should be able 
to have the result of the rest of that, which is have these 
engineers go out and look at these facilities and categorize 
what needs to be done for them. So by October is when I am 
looking.
    Senator Hagan. Ms. Lacey, if you can go ahead and then Dr. 
Walker. Thank you.
    Ms. Lacey. Ma'am, I am not too proud to say the Army is 
ahead of the Navy in this domain. We have not gone out and 
tried to analyze the capacity and capability that we have in 
our facilities and infrastructure. While every technical 
director at every location of every center knows that inside 
and out, at the institutional level, we have not looked across 
the warfare centers and the NRL. They, however, are looked at 
inside their system command to which they are assigned. So the 
aviation community looks very closely at the capability and 
capacity that they have in their facilities for aviation. The 
surface warriors look at that for what they have in the surface 
warrior community, submarine, et cetera. But I have not done 
the integration across the enterprise to take a look at that.
    Senator Hagan. Are you planning to?
    Ms. Lacey. I am.
    Senator Hagan. When will that be done?
    Ms. Lacey. Ma'am, I am sure that is at least a year off 
before we will have the results.
    Senator Hagan. Dr. Walker?
    Dr. Walker. Yes. In my opening statement, I mentioned one 
of the benefits of having one lab with multiple tech 
directorates in different locations as efficiencies. So one of 
the things we have been able to do by the one lab concept is 
look across the lab and see what are our needs. So we have a 
list of 10 things that we want to do.
    As you mentioned, oftentimes those are not judged just on--
the Major Command does not look just at research value. They 
look at safety and runways and other things. I would say over 
the last 10 years, the MILCON that has been approved by the Air 
Force is roughly in the $40 million range. One of the reasons 
for that is we had this BRAC in 2005 that provided about $450 
million to upgrade AFRL facilities in different locations.
    So I feel like right now AFRL is in pretty good shape in 
terms of facilities and infrastructure. We can always do more. 
The thing on our top 10 list right now is putting a fence 
around the Rome information directorate which does not have a 
fence around it, and that is where we do cyber work.
    Senator Hagan. That is very important.
    Dr. Walker. That is on our top 10.
    Senator Hagan. You mentioned 539 in your opening comments.
    Dr. Walker. 539 facilities at 10 different installations. 
Those are buildings at 10 different installations.
    Senator Hagan. Thank you.
    Secretary Lemnios, it appears to me that, my time is up and 
I will come back. But first, I guess I am surprised that we do 
not know the depth and breadth of the laboratories that are 
under your purview. Do you want to comment?
    Mr. Lemnios. Let me just briefly comment. Asking a very 
simple question, not getting a simple answer is a frustration 
for everybody. We should have that and we simply do not. The 
reason for that is that the operating models are different. A 
warfare center looks a little bit different than a basic 
research laboratory, looks a little bit different than an 
engineering center. So some of this is driven by what is the 
function of those facilities and how do we structure that, 
which goes precisely to the challenge that Congress gave us in 
terms of building a workforce model and a strategic plan for 
our workforce so we really understand where the core 
competencies are. I can take a building number and I can map it 
to a ZIP code and I can map it to a functional element, but at 
the end of the day, I have to also make sure that I have the 
right workforce in that environment. So some of this is driven 
by buildings and a lot of it, I think, is driven by personnel.
    It is a daunting challenge.
    Senator Hagan. It seems like we need an integrated approach 
to what is it that we need, how is it helping the warfighter, 
and what our long-term R&D goals are and looking at it at an 
integrated level.
    Mr. Lemnios. Ma'am, you are exactly right.
    Senator Hagan. Senator Portman?
    Senator Portman. Thank you very much, Madam Chair.
    I was just remembering being out at AFRL at Wright-
Patterson and seeing some of the Wright brothers wind tunnel 
projects there. So it is not 1828 buildings, but some of the 
facilities there are also in need of some modernization. But 
you have done a terrific job and I appreciate your support of 
the lab.
    I would like to ask a general question first, if I could, 
and it really, I guess, is directed to you, Secretary Lemnios, 
which is about sequestration. We are talking about $492 billion 
in sequestration that is on the books. It is slated to happen 
January 1st next year. That is about $55 billion in fiscal year 
2013. What I would like to hear from you is how would that 
impact the labs, one? Two, what contingency plans do you have 
in place to deal with it?
    Mr. Lemnios. Senator Portman, it would be absolutely 
devastating. We have no plans right now for that. But I will 
tell you, as the Secretary has testified, that that would be a 
devastating effect on DOD and certainly on the Nation.
    Senator Portman. You say you have no plans to deal with it. 
Do you have any contingency plans to try to deal with, as you 
call it, devastating impact of the sequestration reductions?
    Mr. Lemnios. The effect is so severe that until we get to a 
point where we understand what the parameters are, we could be 
looking at pluses and minuses of very large numbers, and we 
simply have not gone through that exercise yet. We are hoping 
that that will be resolved on the Hill, that in fact we will 
see a solution that does not get us to that edge of the cliff.
    Senator Portman. Do you think that it would endanger our 
national security and specifically put our warfighters in 
danger not to have the level of funding you think is necessary 
at our labs?
    Mr. Lemnios. I think the Secretary has testified that the 
effect would be serious and the impact, following that thread 
back to the laboratories--I have not done that assessment, but 
the Secretary's testimony has been that this would be a serious 
impact.
    Senator Portman. He has used the word ``devastating.'' He 
has also said it would hollow out the force. We will work with 
you to try to avoid this. But I do think that you ought to make 
your initial assessment at least and let it be known to this 
subcommittee and others within DOD so that we can be more 
effective in making our arguments as to why sequestration would 
be so damaging to our labs and our research and to the 
warfighters ultimately.
    I have to ask about the Defense RIP. You heard me talk 
about it a minute ago. $700 million received so far. Never been 
in the Department's core budget. Why have you not ever asked 
for funding for it? Do you think it is not important? Do you 
think it is something that is not on a priority list?
    Mr. Lemnios. Senator, this came to the table at a time when 
we were collapsing the budget through the Budget Control Act. 
We had submitted the President's budget request for 2012 at a 
time when this came up. At the same time, we were trying to 
balance the issues that we had on the table. This was passed in 
fiscal year 2011. There was $500 million that was appropriated. 
We had four broad agency announcements that were put out. We 
are, in fact, evaluating those now. We are going through source 
selection, and we are about to award efforts on those.
    The good news is the legislation is well-structured with 
clarity of effect; that is, once a contract is let, within 2 
years we will know whether we have a capability that supports 
either our warfighter or supports an acquisition program where 
we can measure the effectiveness. As we go through the first 
round of RIP funding, we want to see what those effects are. 
Did we, in fact, get the impact that was postulated when the 
legislation was written? We hope we will, and we will know once 
those contracts end.
    I think the question as to why it was not in the base 
budget, it was simply a time when we were looking at what our 
base efforts were going to be, let alone trying to add $500 
million into the budget. In fact, we took the leadership from 
the Hill on that.
    Senator Portman. Does the Defense RIP benefit the labs?
    Mr. Lemnios. The RIP certainly uses technologies that come 
out of the labs. To date, we have received 3,600 white papers. 
Not all will end up in contract awards. Many of those use 
technologies that came out of our labs, were submitted through 
contract R&D agreements or other efforts. So in many cases, the 
ideas are seeded across the defense industrial base.
    Senator Portman. You talked about the importance of human 
capital--all of you did--the importance of your people and 
having a trained workforce and the need for us to continue to 
focus on some of these core disciplines. I think you would all 
agree that without the scientists and engineers being world-
class, we cannot have a world-class program and that there is 
an important relationship between the DOD graduate school 
programs and the officers that end up in your labs. Certainly I 
have seen that with the Air Force Institute of Technology 
(AFIT) and AFRL. As a whole, DOD's laboratory budgets have 
fared pretty well as I said earlier.
    In some cases, these Service graduate programs have served 
to pay the bill, I think, for some other parts of DOD's budget 
including the labs. As an example, in the Air Force, Dr. 
Walker, AFIT, which is your graduate school--and it is not just 
for the Air Force. It is used Service-wide, very important for 
developing those scientists and engineers. But AFIT will lose 
in your fiscal year 2013 budget 25 percent of its manpower. Is 
that right?
    Dr. Walker. Sir, I would have to check on that for you. It 
is not part of my portfolio. It is not part of the S&T 
portfolio.
    Senator Portman. I will assert it then and maybe instead 
ask you what you think about that. Given these planned 
reductions, are you concerned about the impact it is going to 
have on your laboratories' futures, the scientist and engineer 
talent pool that you rely on?
    Dr. Walker. That would be a concern. I think AFIT does a 
great job at educating military, Air Force, and other folks 
especially at the master's degree level, and it is really a 
center of some of our cyber training that we give our folks. 
But that is actually a different budget.
    Senator Portman. It is a different budget, but it impacts 
your lab and it impacts all of your labs, I would assert 
although the Navy has its own graduate program, as I understand 
it. So I would hope that you all would speak up about that and 
work with us to try to ensure that we are not making decisions 
that short-term seem to be necessary for budget savings but 
longer-term are going to create the very problems you talked 
about in all of your testimonies which is having the kind of 
human capital to have a cutting-edge research program for our 
warfighters. So we appreciate your giving us whatever input you 
can on the impact of that proposed reduction of 25 percent in 
AFIT on your labs, particularly the AFRL.
    The final question that I have really relates to this 
infrastructure question. If you can give us more detail as to 
what capabilities specifically we are in danger of losing 
because of outdated facilities, that is very helpful to us. In 
this budget climate, we need to know specifically which of your 
facilities, if not updated, will result in a capability being 
lost. Are we losing any quality researchers because of it? You 
have made general points about the need to attract the best and 
the brightest. Is there an aging facility within your ambit 
that is causing you to either not be able to attract or retain 
the best people?
    Then, of course, how much, as the chair talked earlier, 
does this relate to our competitive position vis-a-vis other 
countries, particularly China, but other countries that are 
moving ahead with updated, modern laboratory facilities? Ms. 
Lacey, I think you might have some comments on that right now. 
We are happy to hear from you now, but also anything specific 
you can give us would be very helpful.
    Ms. Lacey. Sir, I would prefer to take that for the record.
    [The information referred to follows:]

    The Department of the Navy recognizes the need to continue 
investment in the technical infrastructure to maintain technological 
advantage for the future. Within the year, the Department will begin a 
review of the laboratory facilities to assess their condition, 
capability, and capacity with regard to their ability to perform their 
mission and retain/attract scientists and engineers. Until the review 
no specific examples of capabilities in jeopardy can be cited.

    Ms. Lacey. We have a wide variety of technologies that we 
work on in our laboratories, and as Mr. Lemnios pointed out, 
you have to take a look at the context for each and every one 
of them. But we do have some areas where we are concerned.
    Senator Portman. Thank you.
    Thank you, Madam Chair.
    Senator Hagan. Senator Shaheen?
    Senator Shaheen. Thank you, Madam Chair, and Senator 
Portman. Thank you both for holding this hearing this 
afternoon.
    Thank you all for your testimony. Please share our 
appreciation for the work of the dedicated scientists and 
engineers who work at all of our Nation's laboratories. As you 
all may know, I represent New Hampshire where the Cold Regions 
Lab is located in Hanover, NH. Dr. Freeman, I was there last 
year when they celebrated their 50th anniversary. So I can 
appreciate the facilities challenges that you are raising. I 
think they have had some rehab done there, but clearly that is 
an issue that a lot of our facilities have.
    Secretary Lemnios, I want to follow up on the issues that 
Senator Portman was raising about workforce because all of you, 
as he said and as you said so eloquently in your testimonies, 
talked about the importance of a workforce educated in the STEM 
subjects who can be the scientists and engineers that we need 
to do the research in our laboratories. Right now over 57 
percent of Federal employees in DOD S&T labs are over the age 
of 45. So clearly making sure that we can recruit the next 
generation at a time when we are not turning out the number of 
scientists and engineers and STEM graduates that we need in 
this country is challenging. So I wonder, Secretary Lemnios, if 
you could talk a little bit about the strategies that you are 
using to recruit those folks.
    I would really also like to very much hear from Ms. Lacey--
you talked about the number of engineers and scientists that 
you have hired since 2009, Secretary Lemnios would you please 
add to that, some of the things that you are doing to recruit 
those folks.
    Mr. Lemnios. Senator, let me start by providing some 
insight on a couple of things. It is not all doom. There is 
some great points of light here that we ought to recognize.
    This summer we have over 400 students, Students Making 
Academically Rewarding Trips (SMART) students from our STEM 
program, entering the Department's laboratories. These are 
first-rate undergraduates that are providing a year of service 
in our laboratories for each year of scholarship that we 
provide them. It is a remarkably effective program, and it is a 
program that couples us with rising stars in their freshman and 
sophomore years, and in many cases we have hired those students 
as laboratory employees. That is a great thing.
    In fact, in my career path, I will tell you--it is not in 
the testimony, but I will tell you that my graduate work was 
partially sponsored by the Office of Naval Research (ONR). In 
fact, a good friend of mine, Max Yoder, was one of my peers, 
one of my mentors, and provided me tremendous insight very 
early in my career and helped me along the way.
    Senator Shaheen. Can I just ask how you recruit those 
students?
    Mr. Lemnios. It is an open call. We have a website, a STEM 
website, where we announce this. The submissions have just been 
completed for the fall 2012 semester. It is very similar to a 
college application. It is a terrific program for students. We 
offer undergraduate students $25,000 a year plus tuition, plus 
$1,000 for books and health insurance and a guaranteed position 
in one of DOD's laboratories. So beyond the money, which sounds 
great, it is the ability to work side-by-side with a researcher 
on a DOD challenge that few people would see. So I look at that 
as really an important subject.
    The other part of this, of course, is the connections that 
the laboratories have built with academia. Our DOD request for 
basic research--that is, the most fundamental research in our 
portfolio--is about $2 billion a year. Much of that is executed 
through our DOD's laboratories and most of that is actually 
executed in academia side-by-side with a researcher in our 
laboratories.
    Just very quickly. Last fall I had an opportunity to visit 
many of the Department's laboratories, and I spoke with the lab 
bench researchers, people that I like to hang out with. We have 
several hundred post doctoral researchers in our laboratories. 
By all measure, that is a great indicator. The laboratories 
today are receiving patents from the U.S. Patent and Trademark 
Office at just shy of 600-a-year, almost 2-a-day. This is on 
par with best-in-class world companies around the world.
    So while I challenge our laboratory infrastructure 
internally and get these guys, let us think, how do we drive 
faster, how do we make transitions happen more quickly, the 
numbers that I am seeing give me a sense--there is a remarkable 
sense of horsepower here. I would challenge that we are in 
second place. We are not in second place.
    Senator Shaheen. That is good to hear.
    Ms. Lacey, are you all doing anything that is different?
    Ms. Lacey. Ma'am, we are doing much of the same. We are 
taking great advantage of the OSD SMART program, the 
scholarships. About a third of those are actually doing summer 
internships at our Navy laboratories and warfare centers.
    But at the end of the day, recruiting is a contact sport, 
and we need to have our supervisors develop relationships with 
those universities, whether it is in conducting that research 
or collaborating on that research or making sure that the 
professors are aware of the needs of the laboratory because the 
students listen to them more so than they listen to the 
recruiters or listen to us. So we found those relationships 
particularly important.
    To that end, for example, we have established a system 
engineering graduate curriculum at Tuskegee. We have formed 
consortiums with the University of Michigan and other 
universities in naval engineering, which is, of course, 
particularly important to us. With the section 219 program, we 
have actually sponsored graduate fellowships at our NRL that 
are called the Karle Fellows, named after our Nobel Prize 
winner, Dr. Jerome Karle, and his wife who was also there.
    So there is a wide variety of activities that are going on. 
Most of our warfare centers and laboratories also have unique 
relationships with the universities that they tend to recruit 
from located close by because students, once they graduate, 
tend to not move real far.
    Senator Shaheen. Let me just point out the University of 
New Hampshire has a very good engineering school.
    Ms. Lacey. Yes, ma'am. We hire in our Newport laboratory 
from the University of New Hampshire.
    Senator Shaheen. Thank you.
    Now, can you talk about how--I do not know who would like 
to address this, but talk about how these labs interact with 
private industry and how they aid technology transfer? Also, 
specifically, can you talk about whether or not you make use of 
the Small Business Infrastructure Research (SBIR) program in 
helping you with some of the work that you are doing? Dr. 
Freeman?
    Dr. Freeman. If I may, let me start with that.
    The first thing that we do is that the money that is in the 
core budget, in our S&T core budget, pays for people in the 
laboratories, as well as facilities, but also a large portion, 
particularly of the 6.3 dollars, goes out to industry to 
actually build the prototypes, someone to help us get the 
hardware and really do the research to make it real. In other 
places we have small business, as well as large companies, 
involved in that.
    We use the SBIR program and we use the RIF as well to try 
to focus and then line up even more this connection with these 
technology-enabled capability demonstrations that we have been 
doing in the Army. We are trying to get the Rapid Innovation 
Fund (RIF) proposals tied up with those efforts that are going 
on internal to the laboratory, many of which will actually go 
out and have proposals in order to build the hardware that is 
going to be demonstrated in large industries but also bringing 
these smaller companies and these nontraditional folks in 
through the RIF and the SBIR process in to be able to compete 
and/or participate in those programs and those demonstrations. 
So a lot of our efforts are done through industry.
    A couple of the things that I wanted to focus on with 
transition. We have a number of programs and efforts that do 
transition and have transitioned recently. Most of those 
transitions are where industry has taken something--we have 
either written a specification, we have written a tech data 
package, or they have been performers on the S&T program, and 
then when those things went into acquisition, those are the 
people who actually then either compete for the things that we 
specified or indeed then are the performers on those 
acquisition contracts.
    So a large number of things. We have affordable seeker 
programs that are being competed where industry is trying to 
build some seekers for S&T so that they can be affordable, and 
that can only be done in industry, working on those things.
    Similarly we had software code being worked. Then we worked 
that and we transitioned that to industry so that they can 
compete and/or use that in their communications program. So we 
have a number of mechanisms both using the core dollars and 
then transitioning either directly or through industry to get 
those things out into acquisition programs and eventually out 
to the warfighter.
    Senator Shaheen. Thank you. My time has expired, but Madam 
Chair, I have to go preside. Can I ask one more question before 
I leave?
    Senator Hagan. Certainly.
    Senator Shaheen. This is for Ms. Lacey. I know that both 
the Army and the Air Force are working on this, but I know a 
little bit more about what the Navy is doing. I know that 
Secretary Mabus had set a very ambitious goal for moving to 
energy efficiency and renewable and alternative technologies 
for your energy use. I wonder if you could speak to the role 
that the labs are playing and how you are moving on energy 
issues in a way to make us more energy independent.
    Ms. Lacey. Ma'am, we have been involved in certain energy 
issues for a long, long time, and the fuel requirements for 
ship and aircraft has always been a big deal to us. Back in the 
1990s and early 2000s, we were working on technologies in our 
ship hull design, for example, to reduce drag which has the 
side effect of increasing fuel efficiency, the stern flap, if 
you have ever heard that.
    Senator Shaheen. I have. I was on the USS Kearsarge and I 
saw that demonstrated very clearly, hull coatings that reduce 
the adhesion of barnacles go a long way to reducing that 
friction and things like that.
    Ms. Lacey. So we have been in that world for a long, long 
time. Now, of course, the game is kicked up a few notches here, 
and we are in that part of the business where there is a 
military-unique requirement that we need to understand, but at 
the end of the day, many of these technologies are going to be 
scaled up by our industry partners to make them viable to meet 
the Navy needs.
    Senator Shaheen. Thank you.
    Anything that the Army or Air Force is doing in this area 
that you think is worth noting?
    Dr. Freeman. Yes, absolutely, ma'am. We have across all of 
our portfolios, whether it be the soldier portfolio or the 
ground portfolio or the air portfolio or the C3I portfolio--we 
maintain a focus on power and energy. In fact, in our 2013 
budget request, we have $161 million associated with efforts to 
look at improving power and energy, looking at the efficiency 
efforts, looking at not only components but power management, 
looking at how to get alternative fuels into engines for those 
things, alternative battery technologies. So we actually have 
been doing this also for quite a long time and are moving very 
much into getting it into the Army lexicon as well, along with 
Ms. Hammack, the Assistant Secretary for Installations, Energy, 
and Environment. We are working those things particularly on 
operational energy. Our focus is looking at operational energy. 
So S&T is really, really into this in the Army.
    Senator Shaheen. I am hoping we can get it into the lexicon 
of all of our Federal agencies.
    Dr. Walker. In the Air Force, ma'am, we are heavily 
invested in turbine engine technologies to reduce fuel 
consumption 25 percent over state-of-the-art engines today. So 
we have a new program starting up to look at technology options 
for future engine programs.
    Senator Shaheen. Thank you all very much.
    Thank you, Madam Chair.
    Senator Hagan. Thank you, Senator Shaheen.
    I wanted to go back to the RIP. Secretary Lemnios, you had 
an opportunity to speak and then, Dr. Freeman, you mentioned it 
a little bit in your answer a few minutes ago.
    But, we established this program 2 years ago to help fund 
the rapid transition of innovative technologies largely from 
the small business community to the warfighter. I also serve on 
the Small Business Committee, and last year data was presented 
that showed that while the small business community receives 
only 4 percent of Federal R&D dollars, the small businesses 
actually produce 38 percent of the patents granted.
    So, Dr. Freeman, Ms. Lacey, and Dr. Walker, what are your 
views on the RIP, and do you find the program useful to meet 
time-sensitive DOD needs in a responsive manner?
    Dr. Freeman. Let me start and I will try to be as brief as 
possible. I believe this new initiative really has been a boon 
to the Army, and the value that it has had for us is opening up 
more collaborative opportunities with both small business and 
nontraditional suppliers to the Government. These processes by 
which we have put out these BAAs--and we had an Army BAA that 
went out--we got over 1,000 responses, and then we were able to 
sort through those. We did put them up against our priorities 
in S&T, those technology-enabled capability demonstrations. We 
have selected those. They were totally competitive. It was a 
very, very tough competition. We had not just the laboratories 
involved, but we had the program managers involved who would be 
receiving these technologies, et cetera. It was a very, very 
rigid process by which we worked through and rated these 
things. Then we picked over 10 percent to actually fund with 
the fiscal year 2011 available funds. So that is a pretty good 
return on investment for everybody doing it.
    Having said that, we also then scrubbed that list again and 
said, hey, there are some really neat things that did not 
exactly fit in with these tech Ds. We may want to pursue these 
out of our core budget as well. So part of that was we got 
information that we would have gotten no other way about 
innovative small business and nontraditional folks, and we got 
it in and we have coupled it with our program managers in S&T 
really trying to give them opportunities then to use these and 
have the companies demonstrate their technologies so everybody 
can see them.
    Senator Hagan. Ms. Lacey?
    Ms. Lacey. I will just add to that. We see some of the same 
benefits. We also see that many of these companies have 
proposed teaming up with our laboratories and warfare centers 
to then actually test, try out, and analyze the products that 
they make because they do not come to the table with a full 
understanding from the warfighting point of view. So that is a 
good thing that I see happening.
    The other thing is we too saw that ``aha'' from some of our 
program managers where they looked at something and said it did 
not quite fit the ground rules but they liked it and they have 
started collaborations with the companies.
    So we are cautiously optimistic that we are going to see 
results. We have only let two contracts so far, but we are in 
negotiations with almost 5 dozen as we speak.
    Dr. Walker. I will just pile onto the comments already 
there. I am cautiously optimistic. I think we are seeing the 
value in that our product centers are much more engaged with 
looking at small business because of the RIF program and seeing 
how what they offer can feed into their programs of record. So 
that has been a good thing. We specifically looked at small 
businesses that had technologies that were at about a tech 
readiness level of 7. So they were ready. With a little bit 
more money, they could be transitioned into our programs of 
record. So we are not only working with the product centers 
with RIF but also having meetings with the larger companies 
saying if these smaller companies are successful, how are you 
going to team with them and bring this into the programs.
    Senator Hagan. That sounds positive to me.
    Let me move to the Laboratory Quality Improvement Program 
(LQIP). The DOD LQIP, established in 1993, seeks to improve the 
efficiency of the labs by streamlining their business practices 
and granting the heads of the labs increased authority to 
operate their organizations in a business-like fashion.
    One of the outcomes of the LQIP was the creation of a panel 
to provide recommendations on DOD lab personnel issues.
    Secretary Lemnios, currently the panel for personnel falls 
under your oversight, and what has this panel recently 
accomplished?
    Mr. Lemnios. Senator, I have looked at the LQIP, the 
organization, and what has happened. I asked a very simple 
question. When is the last three times you met and what did you 
actually produce? There was a long pause.
    As I have looked at it, you challenged us, Congress 
challenged us, through 10 U.S.C. 1115 to build a functional 
capability set of managers around a workforce model that the 
Department can use much more broadly. We are looking at how we 
take what was being done under LQIP or what should have been 
done under LQIP and apply it to a workforce model for the 
Department at large; that is, understand where we have 
strength, where we have gaps in our workforce broadly to 
include our engineering functional areas and our S&T functional 
areas. The S&T functional manager is actually a new element of 
this enterprise. So working with the Services, we are looking 
at how we fit this strategic model and really capture not only 
what exists now but what needs to exist in our laboratories 
going forward.
    Senator Hagan. We have heard that DOD is considering moving 
this panel out from under your oversight to the Under Secretary 
of Defense for Personnel and Readiness. Would it be beneficial 
to the labs to do that?
    Mr. Lemnios. I am not sure. I am not sure how we are going 
to go on that candidly. I think there are arguments that I have 
heard--well, there are arguments that I have heard both ways on 
this. Again, I want to go back and look at how this work ties 
to the broader charge that the U.S. Code has given us to lay 
out a workforce, a functional management activity for DOD.
    Senator Hagan. Our other witnesses, what are your views on 
the effectiveness of the LQIP, and do you feel that it should 
stay under the Secretary or potentially shift to the Under 
Secretary of Defense for Personnel and Readiness? Should there 
be other panels, for instance, laboratory infrastructure?
    Ms. Lacey. Ma'am, if I could. First of all, I believe that 
the LQIP has done tremendous work over the years, and ``over 
the years'' is the important thing here. They took a lot of the 
lessons that we learned with the China Lake demo in the 1980s 
and translated that into some of the flexibilities that 
Congress granted us around the S&T reinvention laboratories. We 
have had a fair amount of authorities, and we have not really 
needed much. The panel, as Mr. Lemnios said, slowed down.
    Now, that said, I do think that an infrastructure panel, 
which was originally envisioned under the legislation, should 
be activated, number one.
    Number two, you asked about where does it belong. In AT&L 
or underneath P&R? I feel strongly it belongs under AT&L, but 
there needs to be a partnership with P&R. Over the years, that 
has been stronger and weaker.
    Dr. Freeman. Let me add on to that. So this is very much 
the same thought process. I believe that the intent of having a 
group of people from across the Services who understand what 
the laboratory systems are, how they operate, and what they 
need is really, really an important body to have. Whether we 
actually had the right people after everything got restructured 
over the years on the panels, that could be part of why they 
did not, in the last couple of years, operate as much as they 
should have. So I believe we really do need to review, 
restructure, and reconstitute some kind of a group like the 
LQIP to be able to provide advice and recommendation to both 
the senior service leads and to ASDR&E.
    I do believe that if you put it in and move it to the 
personnel side only, you are actually probably not doing a 
great service in that because I believe it is much broader than 
just personnel issues. I believe that the effectiveness and the 
efficiency of such a group deals with much more than policy and 
personnel. Therefore, the Army has not been supportive at all 
of moving it over to P&R.
    Senator Hagan. Dr. Walker?
    Dr. Walker. The Air Force agrees with the Army and the 
Navy. [Laughter.]
    Senator Hagan. Thank you.
    I think Senator Shaheen was asking about personnel, and 
obviously our personnel I think are our national assets. We 
want to be sure that we have the engineers and scientists 
coming up through the educational areas throughout our country 
to be sure that we can fill these very, very important STEM 
jobs that will be so necessary not only now but in the future.
    I know the Army has a program called Military Accessions 
Vital to the National Interest which grants rapid U.S. 
citizenship to non-U.S. citizens that enlist with medical or 
cultural and linguistics expertise. What are your views on 
expanding this program to gain access to non-U.S. citizens that 
graduate with advanced technical degrees from our U.S. 
universities and then could become DOD civilians?
    Dr. Freeman. Since the Army has the program, I will start 
and then let everybody else talk.
    I believe that the concept of making offers to people who 
have the kind of education we need, who want to be in this 
country--I believe that that is a really good and positive 
thing if they want to be part of what we do. So I am supportive 
of the program that you mentioned that the Army has started.
    I have raised issues and questions about that as we have 
been talking about expanding that or where we are going to go 
with that. I think we really need to study it a good bit more 
because I think there are second and third order effects that 
we really need to think about.
    The real solution here I believe wholeheartedly is to 
really get more U.S. citizens into our schools through STEM 
education and into getting the degrees and the advanced degrees 
in the fields that we need them whether they be the traditional 
STEM type things or some of the other talents that we are going 
to need in the future which includes some of the softer 
sciences. Particularly in the Army, we really need some of the 
softer science type capabilities like sociology and so on and 
so forth that are not traditionally considered STEM in many 
places.
    So I am supportive but I am saying and I am telling my 
leaders that I think we need to look at it a little bit more 
before we extend it without a lot more study. The real solution 
is getting folks in our universities in our organizations and 
young people engaged in getting the advanced degrees, getting 
the degrees in STEM.
    Senator Hagan. Mr. Secretary, any comments?
    Mr. Lemnios. Ma'am, I would agree. I think the challenge 
here is that we are competing globally for talent. We are 
competing with the private sector for the same talent. In my 
role as DOD's chief technology officer, I am absolutely 
concerned and committed to make sure we have a talent base 
within our laboratories, but I also need to make sure we have a 
talent base within our industrial base because at the end of 
the day, the Department is acquiring systems and those systems 
are built by a workforce, some of which might be within our 
laboratories, much of which is in the defense industrial base. 
There is going to be a stream of ideas that we see offshore 
that we want to pounce on and elevate and make happen, and we 
do that. The pace of this train is moving faster every day and 
the complexity of it is growing every single day.
    So as I step back and look at the subject of the 
Department's laboratories, yes, we really do need to make sure 
that we have our A game on with regard to workforce. There is a 
huge challenge with regard to the infrastructure and making 
sure we have the bricks and the mortar and glass and everything 
in the right place and the laboratories in the right place. At 
the end of the day, it is about driving innovation and 
transitioning those concepts with the warfighter. Some of that 
occurs eloquently and every day in the laboratories that you 
visited, ones that we are a part of, and much of that occurs 
within the defense industrial base. All of that is fed by 
talent that we see in all sectors.
    So when we talk about workforce, I think broader than just 
how many additional billets do we need at this lab or that lab. 
I am thinking about how does this enterprise actually operate 
and how do we build a defense industrial base model that 
replicates the efficiency, the cost, and the genius that we see 
in the private sector.
    Senator Hagan. Thank you.
    Ms. Lacey?
    Ms. Lacey. The Navy has looked at the authority that the 
Army has and frankly we are still studying it. As Dr. Freeman 
pointed out, the second and third order effects of such an 
authority we are concerned about, and we would like to have a 
better understanding of what they might be and how they might 
impact us.
    Dr. Walker. We are looking at something called Citizenship 
for Service, which would be like a pilot program that we could 
run in the labs, similar to the Army's. We have not instituted 
that yet.
    I agree with Dr. Freeman's comment about getting more U.S. 
citizens in the pipeline. One idea we had is the LQIP. This 
committee has supported expedited hiring authority for those 
folks with master's degrees.
    One thing that could help us get more U.S. students in the 
pipeline is expedited hiring authority for just undergraduates, 
speeding that hiring authority up for very qualified S&Es so 
that we can hire them in 25 days not over a period of 120 days 
which sometimes is what it takes. So if there is some authority 
like that for the laboratories, that might help us get more 
U.S. citizen students into the pipeline.
    Senator Hagan. We can certainly work on that. I know I have 
spoken quite often with Secretary Lemnios on this issue.
    I certainly echo everybody's concern that we have to have 
more science, technology, engineering, and math students coming 
up through middle school, high school, obviously our 
universities and graduate schools. It is imperative I think for 
the safety and security of our country.
    I think Senator Portman is coming back sometime in the next 
few minutes but I will keep on asking a couple of questions.
    The DOD has, more or less, preserved its top line funding 
for S&T, and in part this is due to increases in basic research 
at the expense of more applied research and technology 
development. While increased basic research obviously is 
important, there are concerns over decreases in more applied 
research funding than for activities that can help transition 
technologies across what has classically been labeled the 
``valley of death,'' the gap between the labs and the military 
users.
    If you could respond to the question. Do you feel that 
balance between basic research, applied research, and advanced 
technology development is right? Dr. Walker, why do we not 
start with you?
    Dr. Walker. I do feel like we have been skewed a bit too 
much towards basic research in the last few years. One of the 
things we are trying to do in AFRL is transition technologies 
that our warfighters care about. In order to do that, you have 
to have a balanced 6.1, 6.2, 6.3 program and have enough money 
in the 6.3 budget to do integrated demonstrations and 
experiments of a variety of technologies to show the warfighter 
that there is a capability here that they should be interested 
in.
    So I think our 6.1 budget has grown quite a bit over the 
last few years, and it is now the largest piece of the budget 
that AFRL has. So I would be in favor of balancing that a bit 
more across the 6.1, 6.2, 6.3 spectrum.
    Senator Hagan. Ms. Lacey?
    Ms. Lacey. I am of a similar mind, that I would like to see 
more of an investment in our BA-3 and BA-4 accounts that can 
help us transition across the valley of death, as you have 
heard it referred to. To that end, Rear Admiral Klunder and I--
the Chief of Naval Research--have joined together to take a 
good, hard look at how do we navigate that 6.3-6.4 continuum to 
ensure that we are getting those investments through that 
portal.
    Senator Hagan. When you say ``navigate,'' if you can 
explain that to me, being in the Navy.
    Ms. Lacey. So inside the Navy, the Chief of Naval Research 
has oversight of the 6.1 through the 6.3 accounts, but the 
programs, the PEOs, and program managers generally are the 6.4 
and above. So to navigate that portal, we have to get the 
people together and make sure that our processes involve both 
sides of that portal. So that is the divide we are trying to 
navigate and ensure that we have things tied together. We have 
quite a bit of investment in the 6.1, 6.2, 6.3 world that if 
program managers knew about it, they would want it. The reason 
they do not know about it sometimes is because they do not have 
time to listen. So we have to do a better job to make sure that 
we provide them the information they need and the motivation to 
take advantage of those S&T developments.
    Senator Hagan. Certainly.
    Mr. Secretary?
    Mr. Lemnios. Senator, as we spoke maybe a month ago, I 
briefed you and your staff on a comprehensive review that we 
did late last year. Again in my role, I have the responsibility 
of providing the Under Secretary and the Secretary with some 
assurance that DOD's portfolio is well-structured both in the 
basic research side but also in applied side. We have to cover 
both avenues with sufficient resources and ideas.
    I was looking for two things when we did that assessment 
last fall. Is the budget in the right location? That is, are we 
investing the right dollars? But more importantly, I was really 
trying to understand what are the ideas that we are investing 
in, what are those concepts, what are the technical ideas, what 
is the core of the concepts that we are investing in. Through a 
series of dialogues with the Services late last year, in fact, 
we made some adjustments. We added funding in hypersonics. We 
added funding in advanced imagers. We put some funding in for 
some special programs with the Navy. We took ideas out that we 
thought were either duplicative or were far past the maturity 
that were being done elsewhere in Government.
    At the end of the day, we presented a President's budget 
just short of $12 billion that is, in fact, shaped by our bets 
in the future and our needs for today. We can sit down and go 
through it, but that is how we looked at it. In fact, it has to 
be a balance. We have to have those space shots and ideas that 
are going to be those for the Nation that we see 5 and 10 years 
are going to be the coin of the realm that we will need not 
within the Department but within our defense industrial base.
    Senator Hagan. Thank you.
    Dr. Freeman. I feel pretty strongly about this, and I would 
agree with my comrades here with respect to I do think we have 
a little imbalance at this point. One of my things when I came 
in the job about a year and a half ago, almost 2 years ago now, 
one of my goals was to try to figure out what the right balance 
is across the entire portfolio. The first thing with basic 
research is just like we did in the 6.3 portion where we have 
focused our 6.3 portion now on some very specific problems and 
challenges, not all of it, but a portion of our 6.3 that are 
focused on improving the warfighters' capabilities at the small 
unit and the soldier level, I need to do that in the rest of 
the portfolio.
    I really appreciate the comment that you made at the 
beginning, that we really have done a lot of work in trying to 
refocus our efforts on capabilities for soldiers. So thank you 
for that.
    But now that we have done that for our portion of 6.3 that 
we have problems and challenges that we are focusing our 
programs on, now I am taking that to the rest of the 6.3 and 
the 6.2 portion to figure out what are the problems and the 
challenges we should focus on in the time frame of 2020 to 2028 
which is kind of where that investment would start paying off.
    I also have an effort going on to try to figure out for 6.1 
what are the sets of problems and challenges that we should be 
focusing our research efforts to help soldiers in the 2030 and 
beyond time frame, which is where that research starts to pay 
off.
    So we actually have some workshops started that are going 
to happen early in May. The basic research one is happening the 
1st and 2nd of May to try to get a community of people together 
to try to project into that time period what is it that we need 
to do. Once we know what we need to do, then we can go back and 
say here is the right amount of money to put into it.
    Now, that does not say we are not going to have innovation 
and invention and disruptive technologies. What it does say is 
that I believe, as I think my colleagues believe, that in the 
Services, our main job in the 6.1, 6.2, and 6.3 is to focus it 
on what our Services really need. Then as Mr. Lemnios said, 
then we can focus on what we need to do together to complement 
one another.
    So I really am in the process of trying to figure out what 
is the right amount of 6.1 to solve our problems and where do, 
if any, we need to shift to be able to do what we need to do 
for the Army in those time periods when those funds would pay 
off.
    Senator Hagan. Thank you.
    Senator Portman?
    Senator Portman. Thank you very much. I am sorry I had to 
step out for a moment, but I understand you all covered a lot 
but not everything. So I look forward to just asking a couple 
more questions. Thank you again for all your help today.
    Globalization of S&T. This is a challenging area because, 
after all, we are in world of defense policy and we have to be 
sure that the classified nature of much of what you do is 
maintained. But we also know that while I would agree with 
Secretary Lemnios that the United States is still in the lead, 
the rest of the world is catching up and there is a lot of 
research being done globally that we could benefit from.
    I was on the plane the other day late last week going back 
to Dayton because I was unable to get a flight into Cincinnati 
flying into Dayton, Delta Airlines. I was on with some of the 
AFRL scientists. One had come here on a visa and has a green 
card now, but there are a lot of folks who you all have 
benefitted from who have been trained at least in their 
undergraduate training in other countries and then come here 
often to get a graduate degree and then stay and help us.
    It also is true that each of you, Dr. Freeman, Ms. Lacey, 
Dr. Walker, have global outreach. You have offices in Europe, 
Asia, and South America, as I understand it. So the 
globalization is already happening both in terms of folks 
coming here and you all reaching out. I just wonder how that is 
working. Are you able to leverage some of this international 
research that we wish was being done here on our shores but is 
not to be able to help our warfighters? Is that appropriate to 
do more of that? How do you balance this need for having 
confidentiality and classified research with the need for us to 
take advantage of the most cutting-edge research globally?
    Then finally, is it economically or even under statute 
feasible for us to open satellite research laboratories in 
areas of the world where there is a high degree of scientific 
research going on? I think of parts of India, for instance. Is 
it possible to have our researchers working side by side with 
foreign researchers in some of these areas that have defense 
implications?
    So if the three of you--and Dr. Lemnios jump in too, but 
give me your thoughts on that.
    Dr. Freeman. All right. I will start.
    We do in the Army. We have what we call international 
technology centers or located in several places around the 
world. Each one of those is operated through and primarily 
through Research, Development and Engineering Command, and we 
have a senior, GS-15, or a colonel who is in charge of that 
area. Then we send researchers over in certain fields and 
certain areas that we have identified in those regions to spend 
a year or 2 participating and looking for opportunities both 
from industries in those regions but also from universities and 
from local military research laboratories. So that is one way 
we have done that. Usually what happens then is that they 
identify a technology or they identify a product and because of 
their knowledge, they call back to a laboratory or a center and 
to a colleague in the laboratory or center who is an expert in 
that area or field, and then they work together to get those 
people to talk to one another and/or to get those products 
evaluated and looked at.
    Another opportunity that we have, in addition to that, is I 
think everybody here--we participate in what we call 
roundtables with other countries. Recently I just got back from 
Israel, and I have a meeting coming up with five countries--
Canada, Australia, New Zealand, the United States, and the 
United Kingdom--where we get together and talk about 
technologies and talk about what we are doing not only in the 
laboratories but what the opportunities are in those countries 
to see technologies and we share those technologies as well and 
bring them into our research programs and/or into solutions in 
our acquisition side. So we have those fora and we have those 
opportunities to do that.
    One of the things I just did with these tech Ds, these 
challenges, these problems and challenges--I offered to every 
one of the countries that we were working with in Germany and 
lots of others. I said here are the things we are working on. 
Here are our priorities. What do you have? What do you know 
about that is in your region or your area that you can come 
back and tell us about that we can look at that might help us 
to solve these problems?
    The last piece that I would recommend is that we have 
scientists and engineers who attend international conferences 
all the time, and they make these determinations of figuring 
out what is out there and they bring it back to their own 
laboratory. That is useful because in many cases--actually I do 
not have it on hand, but we have many examples of where we have 
taken some of these foreign either company products and/or 
technologies and we have incorporated them either in our own 
research projects or gotten them into some systems.
    Now, of course, there is a lot of challenge with that 
because you have ITAR regulations that you have to be careful 
of. You have classification issues. We have ``Buy American'' 
issues, and so it is complex. But we do a lot already and 
continue to do a lot to understand what is out there in the 
global economy and make use of it the best we can.
    Senator Portman. I want to hear, if I could, from the other 
two Service S&T folks. But let me just also add another 
question, I guess, that any recommendations you have ranging 
from immigration policy where I assume you have some thoughts 
to ways in which we should change any either statutory or 
regulatory constraints on what Dr. Freeman just talked about, 
which is this more free flow. The four countries you mentioned 
happen to be four of our strongest allies in the world and ones 
with which we have an unusually strong military relationship 
and an information sharing relationship. I do not know as much 
about New Zealand, but it certainly is true with Australia and 
Canada and the UK. So thoughts on that. Ms. Lacey?
    Ms. Lacey. The Navy has many of the same kinds of 
activities underway that Dr. Freeman talked to. We do them 
through our overhaul and repair, we call it, global 
organization, and I would be happy to provide you additional 
information, all the details on the activities that we have 
underway.
    One thing, though, that we have had discussions with the 
ONR about is that activity tends to focus very much on the S&T 
side of the house and miss the opportunities that perhaps are 
there on the industrial side of the house. So I want to see a 
greater connection between the S&T view of the world and the 
industrial sector view of the world and our warfare centers. So 
we have started those discussions.
    Senator Portman. Dr. Walker?
    Dr. Walker. We have a spectrum of activities at AFRL from 
basic research to even classified work going on with 
international partners. We have the offices you mentioned, 
European Office of Aerospace Research and Development in London 
and then Asian Office of Aerospace Research and Development in 
Tokyo. We have offices now in the South America region as well.
    In the late 1990s/early 2000s, I was at AFOSR working a 
project with the Russians on the plasma physics and hypersonics 
activities. It was 6.1, it was basic research. So we were able 
to have that communication and dialogue. They were the best in 
the business in terms of plasma physics.
    As I mentioned, we have this other spectrum of activity, 
even classified work, with partners like Australia and others 
that we carry on all the time.
    AFRL is building a relationship with Singapore which is in 
a vital part of the world. I was just there with Joe Sciabica, 
the executive director, looking at even increasing our activity 
there at a fundamental science and applied science level.
    In terms of regulations, we mentioned, when you were out, 
an idea for our pilot project in terms of Citizenship for 
Service. The lab is interested in looking at how can we take 
foreign nationals that are in our universities that are really 
outstanding who want to work for us and bring them into the lab 
for a couple years and get them on a fast track to a green card 
status and make them one of our employees. So we are interested 
in a pilot project on that. I will have to get back to you on 
what regulation changes we would need to do that.
    Senator Hagan. Mr. Secretary, anything?
    Mr. Lemnios. I would just simply add two comments. Actually 
right after this meeting, I am headed to San Diego to meet with 
my counterpart from Australia. Part of that discussion is our 
joint S&T areas that we have structured with the Australians.
    The foreign S&T engagements that we have are really quite 
broad. They are across the full scope of the 6.1 funding, and 
they even, in some cases, move into the acquisition programs. A 
very important part of DOD's portfolio.
    But one thing that has changed over the past several 
years--and you have seen this in the private sector and we are 
starting to address it within the Department--research is no 
longer sequential. It is no longer that you go from basic 
research through the next stage 2, stage 3, stage 4. All of 
this stuff is occurring simultaneously. You will see a 
researcher at AFRL or at the Army Research Laboratory that is 
absolutely at the leading edge on some physical concept that 
nobody else has seen that is thinking about the application of 
that concept and is coupling with a partner elsewhere in the 
laboratory to quickly transition it. So the sequential model 
for basic research has changed.
    The other thing that has changed, to your point, the teams 
that actually come together to do research are--it is seldom 
that a single investigator is developing the lead concept. It 
really does take a team of people, and in most cases--and the 
laboratories are great examples of this--that team has to 
include a user. It has to include somebody that understands the 
application of that concept in the user space. That is what is 
really unique about the laboratories.
    Senator Portman. Thank you all. My time has expired, but I 
appreciate you being here.
    Let me just piggyback on what you were saying about working 
with industry then if I could for a second because the chair 
has given me a little bit more time.
    Joe Sciabica came to an aerospace conference we had week 
before last at a GE facility outside of Cincinnati. We brought 
in people from all over the State. It was a great example of 
where some of the work you are doing can be commercialized in a 
way that helps to create jobs, economic growth in our States, 
but also helps you to be able to perform your mission because 
you are taking, as Ms. Lacey said, information from the 
industry as well as them benefitting from some of your basic 
research. So I did not want to miss that opportunity, since you 
mentioned Joe, to say he is doing a very good job I think 
reaching out and working with some of the original equipment 
manufacturers and some of the suppliers who are unable to do 
the basic research but can provide some of the more 
application, I guess, research you would call it that is 
helpful to you all.
    The final question that I have has to do with your 
priorities. Last year Secretary Gates listed seven of them: 
cyber, electronic warfare, data decisions, engineered resilient 
systems, counter weapons of mass destruction, autonomy, and 
human systems. I am not sure what autonomy means. So if you 
could explain that to me, that would be helpful.
    But with regard to these seven, as Secretary Lemnios has 
indicated, things are moving rapidly at the speed of something, 
light, sound, maybe quicker. Are these still your priorities? 
If not, which ones can you tell the subcommittee are missing 
from this list of seven or are some of these now a lower 
priority than they would have been even early last year?
    Mr. Lemnios. Senator, we developed those almost 2 years ago 
now, and they actually all apply to the space that the 
Department has moved into on the strategic plan that was issued 
January of this year. In fact, the President's budget request 
for 2013 reflects that. As we went back and looked at the 
projects that we had planned last fall and as we were building 
our budget for the President's budget request for 2013, we in 
fact referenced the strength that we had in each of those 
areas. Some of those we had to strengthen and that is what is 
really on the Hill right now for deliberation.
    As far as autonomy, think robotics. Think robotics without 
people. Think about a PackBot that can operate without a joy 
stick. Think about a car that could operate because you are in 
the driver's seat and maybe a disabled person can think about 
driving and the car drives. So we are on that path. In the 
commercial sector, you see Google making a big investment in 
that area. In fact, the State of Nevada has now authorized 
autonomous vehicles to operate on their roads. Interesting 
commentary. But we are headed in that direction. You see it 
with cars that can self-park in a very, very simple way. But I 
think in the not too distant future you will see vehicles and 
other systems that interoperate with humans in very natural 
ways, almost conversationally. Think Siri on steroids. Think of 
a system that understands you and understands what your needs 
are a day from now, 2 days from now, say, for travel or 
something and then presents that information to you without you 
having to ask for it.
    Senator Portman. Thank you. Do you think there is any 
danger of replacing elected representatives? [Laughter.]
    Mr. Lemnios. No. The complexity is too great. It is just 
not going to happen.
    Senator Portman. It is complex.
    Thank you all very much.
    Dr. Freeman. Could I just add one thing to the last 
comment? So what Mr. Lemnios was talking about were the seven 
are the cross-cutting for all of DOD, and as he mentioned 
before, those are the priorities that we have agreed that 
affect each and every one of us. Every one of us also then has 
our own Service priorities of the things that we have to do 
with the rest of the budget that we have to meet our own 
priorities, and we are in the process in the Army of better 
establishing, better advertising, and better articulating to 
everybody what those priorities are for Army S&T and getting 
leadership to agree to those for that Service-specific part of 
the portfolio as well.
    Senator Hagan. I have two quick questions and then we will 
adjourn.
    One of the greatest challenges facing DOD today is the 
increased cost of its weapons systems. The DOD S&T enterprise 
historically has done a laudable job of increasing the 
performance of these weapons systems but with little 
consideration for cost. In today's budget constrained 
environment, affordability is now a key driver for weapons 
systems. As an example, commercial electronics continue to 
increase in performance and yet decrease in cost. The same can 
hardly be said for any DOD major defense acquisition program.
    What are you specifically doing in your S&T enterprise to 
address the development of technologies and design 
methodologies and manufacturing technologies to improve 
affordability? Mr. Secretary?
    Mr. Lemnios. Sure. Senator, there are several areas that 
directly address that. The first is the work that the 
Department has done on risk assessments, technical risk 
assessments, to really understand well before milestone A and 
actually before milestone B, and in some cases even before 
milestone A, what the technical readiness level is of the given 
technology in the architecture it is going to be used in.
    Senator Hagan. How long has that been in effect?
    Mr. Lemnios. This was part of the Weapons Systems 
Acquisition Reform Act of 2009 that you passed unanimously and 
the President signed May 2009. We are implementing that with 
great effect. In fact, two elements of that that have been 
absolutely central are the technology assessments and the 
systems engineering work that is being done well ahead of a 
commitment to go and acquire a system. The impact of those your 
committee has heard about and certainly others have in terms of 
identifying problems very early where we can make an 
engineering change well before we are into production.
    The other piece of this that I think is going to be 
critical--and each of the Services is addressing it--is an 
increased focus on modeling and simulation. That is building 
greater fidelity tools that allow us to model a very costly 
experiment in a new domain--pick hypersonics. Actually pick 
your ADVENT system, the high performance engine. Much of that 
work was simulated well before we cut the first metal. Now we 
are at a point where not only is the first metal matching 
simulation, but we are able to then move into what will be an 
acquisition phase with much higher confidence that the 
technology is in fact ready. So getting that early stage risk 
assessment done, strong modeling and software is absolutely 
critical.
    Senator Hagan. I had one last question. Here it is. Thank 
you.
    One of the criticisms of DOD is the slow pace of its 
acquisition process and the role of the DOD laboratories in 
order to rapidly take technologies to the field. I think we 
spoke a little bit about--one prime example was the need for 
the creation of the Joint Improvised Explosive Device Defeat 
Organization to handle the IED threats. What are you doing to 
increase the speed and the agility of the laboratories to help 
deploy the systems to the warfighter, and how are you ensuring 
that the labs can quickly respond to rapidly emerging threats 
or the urgent needs of our combatant commanders? Mr. Secretary?
    Mr. Lemnios. Senator, I will give you the counter example 
that everybody knows well and that is the mine-resistant ambush 
protected vehicle story that went from a request from theater 
in September 2009 to the first vehicles being delivered in 
theater less than 3 months later. That has now been the vehicle 
of choice. It has saved thousands, that has saved hundreds of 
lives clearly in theater.
    The reason that that worked is because we had core 
competency at the Tank Automotive Research, Development, and 
Engineering Center laboratory in Warren, MI, and we had 
ballistic effects understood at Aberdeen. We had a set of 
contractors that understood it. We also had a Secretary of 
Defense, as the current Secretary of Defense is, very much 
behind it. Secretary Gates was very much behind this. In fact, 
we were able to move that very rapidly in the span of months 
from a concept to a capability delivered to theater.
    In fact, the persistent ground surveillance system is 
another example. It came out of our joint capability technology 
demonstration program, coupled with the Service laboratories to 
make sure we had the technology right. In fact, the sensors 
were commercial sensors but the integration was done in our 
Service lab, quickly deployed to theater.
    The efforts that we have put in place to deliver 
capabilities to the fight previously in Iraq, currently in 
Afghanistan, have taught us the value of production integration 
facilities in DOD's laboratories. That probably would not have 
been done by the private sector alone. The private sector 
simply did not have the context, the operational context and, 
in some cases, in fact with Aberdeen, did not have the 
ballistic models to understand what the threat looked like. So 
the fact that we were able to couple those two domains so 
effectively, in fact, provided immediate support to the 
warfighters. That is the path we are on.
    Senator Hagan. We certainly had an urgent reason to do so.
    Mr. Lemnios. We had a very urgent reason to do so.
    Senator Hagan. On behalf of the subcommittee, I thank you 
each and every one of you for your testimony today and, in 
particular, your service to our country. I think we all will be 
looking forward to seeing the results of the survey, once it is 
completed, on the labs and the aging infrastructure and moving 
forward. So thank you.
    The hearing is adjourned.
    [Questions for the record with answers supplied follow:]

              Questions Submitted by Senator Kay R. Hagan

                  STUDY OF DEPARTMENT OF DEFENSE LABS

    1. Senator Hagan. Mr. Lemnios, the fiscal year 2013 President's 
budget requests $4.8 million for lab resource management. We understand 
that you are conducting a study of the Department of Defense (DOD) 
labs. When will that study be completed?
    Mr. Lemnios. The study will be completed by December 2012, not 
using fiscal year 2013 funds.

    2. Senator Hagan. Mr. Lemnios, in addition to this study, what else 
are you planning to do with these funds?
    Mr. Lemnios. As detailed in the February 2012 Research and 
Development (R&D) Descriptive Summary for Program Element 0605798D8Z, 
the $4.8 million funding will be used to develop and collect more 
effective metrics describing the condition, benefit, and payoff of the 
DOD laboratories. The $4.8 million funds includes funds for about four 
support contractors, development of an implementation plan for the 
ongoing laboratory assessment study, and so forth. While we have been 
effective in measuring things such as building age, we have not been as 
effective in developing the metrics. The $4.8 million will help us 
address where laboratories are and are not effective as they could be. 
The results will enable the Office of the Secretary of Defense (OSD) 
and laboratory management staffs to identify shortfalls and missed 
opportunities, and thereby harvest greater benefits from R&D 
investments.

                        DIRECT HIRING AUTHORITY

    3. Senator Hagan. Dr. Walker, during the hearing you mentioned the 
need to more rapidly hire scientists and engineers (S&E) with only 
undergraduate degrees. Would you please amplify on your statement and 
explain why direct hiring authority, which is currently used for 
scientists and engineers with advanced graduate degrees, would be 
needed?
    Dr. Walker. The balance of skill levels in the Air Force Research 
Lab (AFRL) S&E workforce requires that approximately 10 percent of new 
hires consist of entry level candidates. In addition, to maintain a 
diverse workforce AFRL has also found that it is most successful in 
recruiting high quality minority and female candidates when they are at 
the entry level.
    Prior to its rescinding in December 2010, the Defense Career Intern 
Program (DCIP) hiring authority allowed AFRL to target, successfully 
recruit, and quickly on-board well-qualified, highly sought after, 
recent and prospective S&E graduates from the country's colleges and 
universities.
    In response to loss of DCIP authority, DOD laboratories developed 
the Distinguished Scholastic Achievement Appointment authority which 
requires graduates have a 3.5 grade point average (GPA) overall or in 
major field of study. However, other than the restriction on GPA, this 
authority is no different from any delegated examining unit (DEU) 
announcement, which requires a 5-day announcement on USAJOBs and does 
not limit the pool of candidates to those recently graduated with 
Bachelor of Science degrees. This means that any candidates with 
experience who obtained a 3.5 GPA can apply and will rank higher than 
recent graduates due to that experience. This reduces the ability of 
hiring officials to select targeted high quality candidates, to include 
minority and female candidates, from universities that complement 
laboratory skills requirements. Furthermore, due to the time necessary 
to process actions (90 days, similar to other DEU actions), managers 
have found that desired candidates typically accept positions with 
private industry organizations that can hire them much faster.
    A hiring authority that mirrors the flexibility of DCIP would allow 
AFRL to add a sufficient level of entry level S&E to balance its 
workforce and help increase minority and female S&E representation.

                   AFFORDABILITY OF NEW TECHNOLOGIES

    4. Senator Hagan. Dr. Freeman, Ms. Lacey, and Dr. Walker, one of 
the greatest challenges facing DOD today is the increased costs of its 
weapons systems. DOD science and technology (S&T) enterprise 
historically has done a laudable job of increasing the performance of 
these weapons systems, but with little consideration for cost. In 
today's budget-constrained environment, affordability is now a key 
driver for weapons systems. In the commercial sector, electronics 
continue to increase in performance and decrease in cost. The same can 
hardly be said for any DOD major defense acquisition program. What are 
you specifically doing in your S&T enterprise to address the 
development of technologies, design methodologies, and manufacturing 
technologies to improve affordability?
    Dr. Freeman. The Army does consider costs in technology 
development, and affordability is one of the key metrics considered in 
our S&T efforts. To do this, we identify key technology cost drivers, 
improve manufacturing technology, and leverage commercial industry 
technologies.
    To give one example, the Army is developing active electronically-
steered radar arrays to reduce the cost of missile seekers. Cost 
reductions of these arrays are achieved by leveraging commercial 
technology matured by the telecommunications industry. The beam of a 
phased array radar seeker is steered through electronic phase shift, 
eliminating the need for large mechanical gimbals. The major technology 
hurdles are transmitting adequate power from the miniature devices and 
achieving the required thermal management within the packaging. The 
Army is collaborating with industry to overcome these challenges. Costs 
for the phased array antennas currently used for air and missile 
defense missile seekers are projected to be reduced by 50 percent. An 
additional benefit of the reduced cost seeker technology is increased 
reliability, eliminating the potential impact of obsolescence in 
unitary radio frequency transmitter sources. On a smaller scale, image 
stabilization algorithms have been developed to enable low cost seekers 
to be employed. These algorithms enable the operator or targeting 
algorithms to see a steady picture while the munition is flying, 
enabling lower cost visual and infrared cameras to be used that are 
fixed and non-gimbaled, to reduce the complexity (moving parts).
    Ms. Lacey. As budgets tighten, the demand for affordability of new 
technologies has shifted the focus of S&T investments to ensure they 
are defined and linked to requirements and platforms with an increased 
emphasis on total ownership cost. The Navy is addressing affordability 
through a three-phased approach:

    (1)  Issuance of policy and guidance
        - Naval Open Architecture Contract Guidebook for Program 
        Managers to reduce the overall risk to the Department; and
        - Navy S&T Strategic Plan that focuses on affordability by 
        pressing for transformational scientific breakthroughs in 
        critical areas, improved methodologies for design, improved 
        manufacturing processes; technology insertion opportunities to 
        reduce life-cycle costs through reduced manning and extended 
        operational viability.

    (2)  Increasing the Department's technical capabilities
        - Directed Department Program Managers to use in-house 
        technical workforce to understand and optimize pre-Milestone B 
        technical work to strengthen our understanding of technical/
        cost tradespace;
        - Increasing the Department's focus on basic through applied 
        research strengths to better understand and document the long-
        term implications of intellectual property and data rights and 
        publish and patent as appropriate to protect the intellectual 
        property rights for/of the S&T community.

    (3)  Continued pursuit of technology breakthroughs
        - The Commercial-Off-The-Shelf (COTS) world has a high volume 
        over which to amortize development costs. Where appropriate, 
        DOD and Navy already use and are increasing COTS products; and
        - The Navy has been actively engaged in shipbuilding 
        affordability.

           The Single Ship Tank Coatings Project delivered a 
        rapid cure single coat system for tank preservation that 
        provides a 20-year service life. This product is now in use and 
        is available for purchase from the qualified products list.
           The High Performance Topside Coatings project is 
        developing exterior ship freeboard and topside coatings that 
        are reducing cost by improving durability while decreasing 
        solar absorbance.

        - The F-35 JSF's Automated Fiber Placement Bismaleimide 
        Manufacturing Technology project has improved the process and 
        lay down rate for fiber placement on the wing skins and nacelle 
        structures by 47 percent and 62 percent respectively for a cost 
        avoidance of more than $100 million over the life of program.

    Dr. Walker. Integral to Air Force S&T are programs focused on 
improving affordability in the development of new technologies for 
weapon systems spanning their entire life cycle from cradle to grave.
    The Air Force Manufacturing Technology (ManTech) program, as part 
of our S&T portfolio, is a key enabler for affordability in Air Force 
systems. ManTech efforts span the entire acquisition lifecycle to 
shorten cycle times and improve producibility, availability, cost, and 
quality for hardware-intensive weapon systems. High return investments 
are formulated in partnership with program offices and associated 
industry members in the acquisition, sustainment, and S&T communities. 
For example, the Advanced Manufacturing Propulsion Initiative (AMPI) 
works with the engine Original Equipment Manufacturers (OEM) and supply 
base across seven different technology areas (e.g., ceramic matrix 
composites, advanced casting) and is projecting a $2.9 billion 
lifecycle cost avoidance for F-35 alone. Manufacturing improvements for 
Active Electronically Scanned Array radar systems are delivering over 
$380 million in cost avoidance to the F-35 and F-22. A new 
manufacturing process for aircraft panel seals has a projected cost 
avoidance for the F-35 and F-22 of $881 million. The Engine Rotor Life 
Extension project is enabling longer service life for high cost turbine 
engine components of legacy systems and is projecting a life cycle cost 
avoidance of $1.1 billion. The ManTech space solar cell project has 
enabled ultra high efficiency arrays for numerous space systems 
resulting in trade space of having reduced mass, volume, and cost per 
watt. Finally, a Manufacturing Critical Small Business Innovation 
Research project leveraged by ManTech cuts the time to drill the Joint 
Strike Fighter inlet ducts from 50 hours per shipset to 12 hours, 
saving over $25 million.
    The ManTech program is also identifying potential future 
investments for agile, affordable low volume, high mix production 
involving earlier consideration of manufacturing in the acquisition 
cycle, tools, and models to increase performance of the integrated 
supply base, application of advanced digital tools and models to 
facilitate efficiencies across design/production/operations, and 
development of advanced factory floor assembly/machine/infrastructure 
technologies.
    Additional efforts throughout the AFRL are also focused on 
enhancing affordability of Air Force systems and acquisitions. For 
example, we have research to understand the root cause of material 
failure under the conditions in which they are used since improvements 
in affordability are directly related to increasing the mean time 
between failures of the part or component of the weapon system and are 
rooted in its material system. We are also building design tools that 
improve the ability of engineers to successfully design components and 
systems thereby reducing development risks and cost. The Upper Stage 
Engine Technology (USET) program is one such example: it is a physics-
based modeling and simulation tool for liquid rocket engine 
development, replacing expensive and time-consuming empirical test-
driven development and providing great fidelity earlier in the design 
process. USET has had 57 industry applications to date and supports the 
Air Force's new upper stage rocket acquisition.

                 MEASURING PERFORMANCE OF LABORATORIES

    5. Senator Hagan. Mr. Lemnios, Dr. Freeman, Ms. Lacey, and Dr. 
Walker, there are many ways to measure the performance of a laboratory 
enterprise, whether it is numbers of peer-reviewed research papers, 
patents, or technologies transitioned to acquisition programs. How do 
you measure the performance of DOD laboratories?
    Mr. Lemnios. Measuring laboratory performance presents a difficult 
challenge. As outlined in this question, numbers of papers and patents 
are important metrics because they provide an indication of innovation 
in the labs. Other metrics that I consider crucial in measuring 
laboratory performance include the scale and impact of transitions to 
industry, effectiveness of solutions provided in response to Joint 
Urgent Operational Needs Statements (JUONS), and ability to develop 
technology prototypes that offer significant new capabilities to the 
DOD. Lastly, the ability of the Department's laboratories to compete 
for top talent is significantly driven by the quality and impact of 
work in our laboratories.
    By all measures we are seeing solid levels of performance across 
the Department's laboratory enterprise.
    Dr. Freeman. Measuring the performance of a laboratory enterprise 
is a challenging endeavor, particularly when the enterprise spans the 
spectrum from basic research to applied technology development. The 
Army looks at all of the measures mentioned above; in addition, the 
Army also looks at metrics such as citations, patents awarded, 
conference presentations and keynote addresses, and cooperative R&D 
agreements.
    Ms. Lacey. Navy laboratories conduct broad-based, multidisciplinary 
scientific research and advanced technological development directed 
toward maritime applications of new and improved materials, techniques, 
equipment, systems, and platforms. To be successful, Navy laboratories 
must conduct the right research, it must be world-class research, and 
it must have high payoff for the Department. This research is measured 
using criteria appropriate to assessing the quality of the science/
engineering that are frequently used by academia and other world-class 
scientific research laboratories such as:

        - Number and quality of papers in scientific journals, patent 
        applications submitted and patents received, citations to those 
        papers and patents, licenses granted, royalties received, and 
        CRADAs negotiated.
        - External recognition of the scientific staff by election to 
        membership in the National Academies, and by selection to be 
        Fellows of the various scientific societies.
        - The fraction of the scientific staff holding a PhD or other 
        advanced degree, the number and quality of newly hired staff 
        members, and the experience of the staff.
        - Recognition of the staff with prestigious scientific and 
        engineering awards, and selection to be members of high level 
        Navy, DOD and National/International panels, boards, and 
        committees, and as committee chairs of conferences and as 
        officers of scientific societies.

    Measures used to assess the value and impact of research activities 
include:

        - Transition to/adoption of acquisition and non-acquisition 
        programs in the Department satisfying requirements of the 
        Fleet/Force.
        - Rapid response to emergent/urgent needs of the Fleet/Force to 
        meet/correct operational deficiencies.
        - Number of times and total funds received from other agencies, 
        services, laboratories, and companies for the products, 
        services, and technical expertise of the Laboratory or Center.

    Dr. Walker. While some quantitative measures, such as those 
mentioned in your question, can be useful when considering the 
performance of the AFRL, we have primarily focused on assessing 
performance through qualitative means due to the nature of the Air 
Force S&T program. The true test of performance of the lab is whether 
or not the basic research, applied research, and advanced technology 
development is focused on meeting the current and future needs of 
warfighters.
    To ensure the lab efforts are postured for successful transitions 
to warfighting capability, the Air Force deliberately aligns S&T 
planning, technology transition planning, and development planning. The 
linkages between these planning activities are critical to initiating 
acquisition programs with more mature technologies and credible cost 
estimates, and we are institutionalizing these linkages in Air Force 
policy.
    Operational users document their capability development priorities 
as part of the larger Air Force strategic planning system. Capability 
Collaboration Teams, with participation from the lab, product centers, 
and operational users, then derive S&T needs from those capability 
development priorities and work together to develop S&T solutions that 
will provide technology options with reduced risk for future 
acquisition.
    Successes such as the High Velocity Penetrating Weapon (HVPW) and 
Precision Air Drop (PAD) Flagship Capability Concepts (FCC) have proven 
the process and provided us a means to assess the performance of AFRL. 
HVPW was initiated as the S&T planning processes were being developed 
and has served as a pilot for these processes. The HVPW FCC was 
grounded in development planning activities that helped define the key 
technology drivers for various hard target defeat concepts. These key 
technologies are informing the upcoming analysis of alternatives for 
the Hard Target Munition family of systems. The PAD FCC was the first 
effort created in direct response to a documented capability 
development need. The lab, product center, and operational user put 
together a set of technology development efforts to address the entire 
problem set. The first of these solutions is scheduled to be 
demonstrated in fiscal year 2013.

         DEFENSE SCIENCE BOARD'S STUDY ON DOD'S BASIC RESEARCH

    6. Senator Hagan. Mr. Lemnios, Dr. Freeman, Ms. Lacey, and Dr. 
Walker, in the recent Defense Science Board (DSB) study on DOD's basic 
research, it was stated that they found ``an alarming level of 
bureaucratic business practices hindering the conduct of basic 
research.'' Would you explain your understanding of what these business 
practices are and how can they be made more efficient?
    Mr. Lemnios. My understanding is that the DSB is referring to 
bureaucratic requirements that divert researchers' time from the actual 
performance of their research and thereby reduce their productivity. 
The DSB gave examples on pages 33-34 of their report. For instance, the 
DSB cited a survey of university faculty conducted by the Federal 
Demonstration Partnership (FDP), a collaborative effort of universities 
and Federal research funding organizations to streamline research 
administration. The FDP survey found that (only) 42 percent of the time 
available to research faculty for their federally supported research 
was being spent on research-related administrative tasks.
    It would be nice to say that reducing the bureaucratic burden would 
be simple, but this is not the case. The source of bureaucracy comes 
from numerous Federal and State statutes, some internal DOD processes, 
and other internal university processes. I have asked my Director, 
Basic Sciences, and the Defense Basic Research Advisory Group to 
develop a plan to address the DSB recommendations, and specific to this 
question, reduce the bureaucracy where possible. This will start with a 
DBRAG analysis of the FDP data for DOD awards and identifying 
individual requirements that are the cause of the burdens on 
researchers. This will let us focus on the burdens that matter most. 
Reduction of bureaucratic burdens is something we do try to achieve. 
For instance, in the past couple of years, we addressed the 
bureaucratic burdens for publication of fundamental research by issuing 
a memorandum clarifying policy on fundamental research, consistent with 
National Security Decision Directive 189. I suspect we will find other 
areas that will let us cut bureaucracy.
    Dr. Freeman. The DSB report referenced several business practices 
they deemed questionable, to include: attending training that may be 
inappropriate in a basic research environment or detract from time 
spent on research; checking research tools and equipment in and out on 
a daily basis; and performing repairs to lab equipment rather than 
employing expert technicians. Also referenced in the DSB study, the FDP 
conducted a survey among university researchers and found a similar set 
of concerns. While we are always open to improve our methods of 
conducting the business of doing research and will work with our 
laboratory directors to identify burdensome practices, we must also be 
mindful of the training and procedures that are required to maintain a 
high level of quality within our workforce and be conscious of the 
costs associated with supporting our laboratory enterprise.
    Ms. Lacey. While raising the administrative burden issue, the DSB 
report did not identify specific examples nor did they recommend any 
specific processes to eliminate. To a large extent the report supported 
how business is done now and makes some recommendations that could, in 
fact, create more administrative work for program managers/officers. 
The sources of bureaucratic burden include legislation, administration 
requirements imposed from outside DOD, requirements imposed from within 
DOD, requirements imposed by the Services, and requirements imposed by 
the basic research performing organizations themselves.
    The Navy recognizes the S&T community may be called upon to answer 
datacalls and provide technical reviews. To the extent the Navy has 
control; we strive to mitigate these actions using existing data and 
information. It is always our goal to maintain efficient operations 
with the effective use of all resources.
    Dr. Walker. Over the last few years, the Air Force has been 
proactively identifying and addressing bureaucratic processes that 
reduce the effectiveness of basic and applied research in the 
laboratory.
    For example, some tool control procedures, originally designed for 
flight line activity but also applied to the AFRL, do not make sense in 
the research laboratory environment. The administrative burden 
associated with tool control procedures such as checking tools in and 
out of tool cribs, completing forms for broken tools, and getting tools 
etched, takes time away from critical research activities. We estimate 
that up to 30 minutes each day per researcher is spent executing tool 
control procedures which is time lost from research. The Air Force 
recognized this additional burden on research activities and has now 
granted waivers to lessen tool control responsibilities for the 
laboratory environment.
    Precision Measurement Equipment Laboratory procedures, also 
originally designed for flight line activity but applied to AFRL, also 
often do not make sense in a research laboratory environment where 
instruments are regularly calibrated by the research scientist 
performing the experimentation. The administrative burden and lost 
research time associated with instrument calibration at contract 
facilities takes time away from critical research activities and often 
is unnecessary. The Air Force recognized this additional burden on 
research activities and has now granted waivers to instrument 
calibration responsibilities in research laboratories.
    The Air Force is committed to continuing to identify and reduce 
bureaucratic processes which impact our research capabilities.

                          DECKER-WAGNER REPORT

    7. Senator Hagan. Dr. Freeman, it is our understanding that the 
Army has an ongoing study in the wake of the Decker-Wagner report 
looking at, among many other things, how Army S&T should be managed and 
how the laboratories can best be organized for the future needs of the 
Army. What is the status of this study?
    Dr. Freeman. The Decker-Wagner Army Acquisition Review recommended 
the disestablishment of the Research, Development and Engineering 
Command (RDECOM) because in the study group's view, RDECOM ``has not 
added enough value to be continued.'' The Army did not concur with this 
assessment. RDECOM provides a valuable service by integrating R&D 
efforts across different Research, Development and Engineering Centers. 
Currently, the Army is studying how to optimize materiel development 
and sustainment efforts, to include research, across the Army 
acquisition and materiel communities. This study is considering how 
best to leverage the R&D headquarters to efficiently apply S&T across 
the community to solve critical Army problems. This effort, which is 
primarily focused on improving processes, is ongoing.
                                 ______
                                 
             Questions Submitted by Senator Robert Portman

                             SEQUESTRATION

    8. Senator Portman. Dr. Freeman, Ms. Lacey, and Dr. Walker, during 
the hearing, Secretary Lemnios stated that the effects of sequestration 
would be devastating to the laboratory enterprise. Do you agree with 
that assessment?
    Dr. Freeman. I agree that cuts of the magnitude mandated by 
sequestration would have severe consequences for the Army's S&T 
programs.
    Ms. Lacey. The Department of Navy has not begun planning for or 
assessing potential impacts of sequestration with the hopes that 
Congress will work out a larger deficit-reduction plan. Impacts to Navy 
laboratories and warfare centers directly result in impacts to specific 
programs; however, specific program impacts are unknown until more 
detailed planning has occurred.
    Dr. Walker. Yes. A significant cut to DOD and the Air Force S&T 
budgets resulting from sequestration could negatively affect laboratory 
enterprise.

    9. Senator Portman. Dr. Freeman, Ms. Lacey, and Dr. Walker, does a 
devastating impact mean that you would be forced to shut down needed 
facilities?
    Dr. Freeman. At this time, we have not done a detailed study on 
what consequences sequestration would have for our facilities 
specifically.
    Ms. Lacey. The Navy has not begun planning for or assessing 
potential impacts of sequestration with the hopes that Congress will 
work out a larger deficit-reduction plan. Until specific programmatic 
impacts are known, the Navy is uncertain if it would be result in the 
shutdown of facilities.
    Dr. Walker. Until specific parameters of sequestration are defined, 
we are unable to provide specific programmatic, personnel, and 
infrastructure impacts.

                            HIGHER EDUCATION

    10. Senator Portman. Dr. Walker, there seems to be an important 
relationship between DOD graduate school programs and the educated 
officers it provides to your labs, both in concurrent research and in 
the future. As a whole, the DOD's laboratory budgets faired relatively 
well in the fiscal year 2013 President's budget request, while in some 
cases these service graduate programs served as near-term billpayers. 
How do Air Force Science, Technology, Engineering, and Mathematics 
(STEM) programs incorporate the Air Force Institute of Technology 
(AFIT) into their strategies for building a skilled Air Force S&T 
workforce?
    Dr. Walker. The Air Force recognizes that advanced STEM degrees for 
officers are critical not just to laboratory research efforts, but also 
to a myriad of Air Force missions, ranging from cyberspace to 
reconnaissance and beyond. We are working closely with the Office of 
the Deputy Chief of Staff for Personnel, Manpower, and Services (AF/A1) 
to ensure we can leverage limited resources as best as possible.
    We work very closely with AFIT to incorporate student research 
activities with the needs of the AFRL and the greater STEM community. 
We also hand select each officer to follow their AFIT education with a 
job that best utilizes their new degrees. Our goal is to have officers 
attend AFIT early in their careers so the STEM advanced degree can be 
used on multiple tours of duty. In addition, the Air Force policy is 
that any student sent for an advanced degree for the purpose of 
teaching at the Air Force Academy or AFIT first serve an intervening 
STEM operational tour before going to the classroom environment.
    The Air Force Office of Scientific Research (AFOSR) funds basic 
research conducted by AFIT faculty members, postdoctoral research 
associates, and doctoral candidates (approximately $1.4 million in 
fiscal year 2012). In addition, AFOSR sponsors a seminar series at AFIT 
to bring distinguished scientists and engineers to Dayton, OH, to give 
presentations on cutting edge research. The relationship between AFOSR 
and AFIT helps to educate and train the future STEM workforce for the 
Air Force.
    AFIT is also used to hone important skills, such as software 
engineering, through the Software Professional Development Program. 
AFIT's School of Systems and Logistics is the sole provider of more 
than 80 professional continuing education courses in acquisition 
management, logistics management, contracting, systems management, 
software engineering, and financial management delivered to warfighters 
around the globe via customer-focused delivery methods including 
resident and online courses.
    The Civil Engineering School has provided civil engineer 
professionals with education from building initial skills to learning 
technical and management disciplines to developing the advanced skills 
necessary to serve as Civil Engineering squadron commanders. Since 
1990, the Environmental Department faculty has provided DOD 
environmental professionals the education needed to meet the critical 
demands of ensuring environmentally compliant installations.
    AFIT's Graduate School of Engineering and Management serves the Air 
Force as its graduate institution of choice for engineering, applied 
sciences, and selected areas of management. The Graduate School offers 
a variety of programs leading to the award of master's and doctoral 
degrees, as well as graduate certificate programs. Graduates from AFIT 
enable the Air Force to maintain our technological warfighting 
advantage by developing, acquiring, sustaining, and operating 
sophisticated capabilities.
    AFIT also maintains a strong applied research component through its 
research centers. The Center for Cyberspace Research, established in 
March 2002, conducts defense-focused research at the masters and 
doctoral levels. On June 19, 2008, the Secretary and Chief of Staff of 
the Air Force designated the Air Force Institute of Technology and the 
Center for Cyberspace Research as the Air Force's Cyberspace Technical 
Center of Excellence. AFIT is also home to several other research 
centers including those focused on Systems Engineering, Advanced 
Navigation Technology, Directed Energy, Operational Analysis, and 
Technical Intelligence Studies and Research.

    11. Senator Portman. Dr. Walker, what do you assess to be the 
impact of proposed cuts at AFIT on current and future partnered 
research between AFIT and AFRL and what impact do you assess on the 
future Air Force S&T workforce and management?
    Dr. Walker. The AFIT-AFRL partnered research program is a valuable 
part of Air Force S&T research and our workforce pipeline. AFIT 
recently completed a top-down prioritization of all of its academic and 
research programs which resulted in many efficiencies. In light of this 
reprioritization and resulting efficiencies, we believe reductions will 
have little impact on meeting the current and future partnered research 
between AFIT and AFRL and the future Air Force S&T workforce and 
management.

    12. Senator Portman. Dr. Walker, are you involved in Air Force 
decisions regarding the budgeting for graduate school programs?
    Dr. Walker. Indirectly, yes. We work closely with the Air Force 
Education Requirements Board (AFERB) within the Office of the Deputy 
Chief of Staff for Personnel, Manpower and Services (AF/A1) to justify 
and prioritize our graduate school programs. This process ensures Air 
Force S&T equities are considered as AF/A1 defines and articulates 
their budget requirements.

    13. Senator Portman. Dr. Walker, how do you coordinate with Air 
Education and Training Command (AETC) to communicate S&T priorities 
that impact AFIT?
    Dr. Walker. We communicate our priorities for advanced degrees 
through the AFERB process within the Office of the Deputy Chief of 
Staff for Personnel, Manpower and Services (AF/A1). This process works 
hand-in-hand with both AETC and AFIT. The AFERB process allows us to 
prioritize from requirements across the Air Force those degrees for 
education through AFIT. We continue to work to find the best ways to 
capitalize on the S&T advanced degrees we need the most in this budget 
and personnel-constrained environment.

                      BASE REALIGNMENT AND CLOSURE

    14. Senator Portman. Mr. Lemnios, Dr. Freeman, Ms. Lacey, and Dr. 
Walker, for the National Defense Authorization Act for Fiscal Year 
2013, DOD is requesting congressional authority to begin a new round of 
Base Realignment and Closure (BRAC). A new round of BRAC would no doubt 
affect the laboratory enterprise to some degree. Have the laboratories 
been planning for possible base closures and/or laboratory 
consolidation?
    Mr. Lemnios. BRAC enables the Department to reconfigure its 
infrastructure to match the demands of leaner, more flexible forces and 
to accommodate our changing strategic emphasis. It is an important tool 
for the Department to use to make the tough fiscal choices necessitated 
by current budget challenges. If Congress does authorize the requested 
BRAC rounds, the Department will undertake the BRAC rounds in 
accordance with the statutory directive to consider all installations 
equally and make decisions based on a 20-year force structure plan and 
statutory selection criteria which give primary consideration to 
military value. In this context, the Department will examine all its 
missions and functions, including the laboratory enterprise.
    Dr. Freeman. The Army laboratories and research, development, and 
engineering centers have just concluded consolidation of a large number 
of facilities at the Aberdeen Proving Ground, MD, associated with the 
last round of BRAC. At this time, the Army is not planning for any 
additional consolidation.
    Ms. Lacey. The Navy has not begun planning for a BRAC.
    Dr. Walker. The Air Force has found efficiency by successfully 
consolidating AFRL into a single, unified laboratory structure over the 
last 2 decades. We currently do not have any more plans for laboratory 
consolidation. If another round of BRAC occurs, rest assured, every 
laboratory facility will receive fair and equal consideration using 
each of the criteria established by the Secretary of Defense.

    15. Senator Portman. Mr. Lemnios, Dr. Freeman, Ms. Lacey, Dr. 
Walker, what impact, if any, did previous consolidation efforts have on 
laboratory performance?
    Mr. Lemnios. My impressions gained from visiting the labs impacted 
by the consolidations of BRAC 2005 are favorable. For example, the 
Army's consolidation of labs at Aberdeen, MD, and the Air Force 
consolidation of labs at Wright-Patterson Air Force Base have resulted 
in significant facility and equipment modernization. At these sites I 
have seen true state-of-the-art laboratories constructed and equipped, 
which has resulted in these Services' ability to attract high quality 
graduates in a variety of science and engineering disciplines.
    Dr. Freeman. Previous consolidation efforts have had a short-term 
negative impact on laboratory performance. Much of the negative impact 
stems from the loss of personnel and concomitant loss of experience, 
the decrease in morale, and the loss of productivity and time 
associated with shuttering existing facilities and building new 
facilities. The construction of new facilities associated with recent 
BRAC moves may increase laboratory performance over the longer-term, 
although it is too early to make that determination.
    Ms. Lacey. The overall impact of previous consolidation efforts has 
been positive to neutral for Navy laboratories. While the impact to 
individuals where activities lost mission responsibilities can be 
traumatic, over time, these consolidations have enabled the Department 
to improve the effective use of intellectual capital and resources.
    Dr. Walker. AFRL is unique among the Services as this one 
laboratory houses all Air Force efforts to discover, develop, and 
integrate affordable aerospace warfighting technologies. Two decades 
ago, the Air Force laboratory system spread research across 14 
different individual laboratory organizations nationwide. In 1990, 
these locations were merged into four superlabs. Finally, in 1997, the 
current single, unified AFRL structure was completed, bringing Air 
Force S&T to a new level of efficiency, collaboration, and innovation.
    The 2005 BRAC provided further efficiency by consolidating human 
performance research and sensor technology research at Wright-Patterson 
AFB, OH, space vehicle technology research at Kirtland AFB, NM, and 
information technology research at Rome Research Site, NY. The 
Laboratory's BRAC realignments successfully realized the Secretary of 
the Air Force's priorities for BRAC 2005, including the goals of 
realigning Air Force infrastructure with the future defense strategy, 
maximizing operational capability by eliminating excess physical 
capacity, and capitalizing on opportunities for joint activity.

                           LABORATORY REVIEW

    16. Senator Portman. Secretary Lemnios, in 2009, former Chief 
Scientist of Army Materiel Command, Dr. Richard Chait, published a 
report on DOD laboratories. In it, he said that since 1962 there have 
been at least 100 studies and related reviews of government 
laboratories, and that each had emphasized consolidation and increased 
efficiency. How will the current assessment of the laboratory 
enterprise that you have launched be different from the other studies 
that have been reported?
    Mr. Lemnios. I expect that some of the results from the current 
study may echo findings and recommendations from previous studies. 
However, I have directed that the current study focus on DOD labs as an 
integrated enterprise oriented towards the Department's strategic 
directions articulated in January of this year. As a result, I 
anticipate that some findings and recommendations will differ from 
previous studies as we align this enterprise with the Department 
strategy.

    17. Senator Portman. Secretary Lemnios, what goal would you like to 
achieve with this new assessment?
    Mr. Lemnios. This assessment will provide recommendations for how 
DOD should operate its Laboratory Enterprise to support the needs of 
the Department. In particular, the assessment is focused on approaches 
for the Department's Laboratory Enterprise to deliver prototype 
concepts to the warfighter and products to the Department's acquisition 
programs, either directly or through the industrial base. This 
assessment seeks to answer the question: ``How should the Department 
operate a DOD Laboratory Enterprise to support the current and evolving 
needs of the Department?''

    18. Senator Portman. Secretary Lemnios, are you emphasizing 
consolidation and increased efficiency like previous studies?
    Mr. Lemnios. No. This assessment will provide recommendations for 
how DOD should operate its Laboratory Enterprise to support the needs 
of the Department. In particular, the assessment is focused on 
approaches for the Department's Laboratory Enterprise to deliver 
prototype concepts to the warfighter and products to the Department's 
acquisition programs, either directly or through the industrial base. 
This assessment seeks to answer the question ``How should the 
Department operate a DOD Laboratory Enterprise to support the current 
and evolving needs of the Department?''
    The assessment will provide recommendations for laboratory 
enterprise models that promote technology transition and provide 
incentives to ensure effectiveness and efficiency of the Department's 
Laboratory Enterprise for the next decade and beyond.

                             BASIC RESEARCH

    19. Senator Portman. Dr. Freeman, a 2012 report on DOD's basic 
research by the DSB stated that about 25 percent of DOD's basic 
research budget goes to the laboratories. Do you believe this is an 
appropriate investment in basic research within the Army's portfolio?
    Dr. Freeman. The Army executes approximately 30 percent of our 
basic research investment within our laboratories. At this time, this 
is an appropriate level; however, we strongly believe in seeking the 
strongest performers to conduct basic research in areas relevant to the 
Army mission and the soldier--whether that is in our laboratories, or 
our academic and industry partners. The Army needs a high-quality, 
inquisitive, agile in-house and extramural basic research program with 
a long-term time horizon, in part because geopolitical futures and the 
needs of the future Army are uncertain. We also seek to leverage our 
investment, where appropriate, to maximize the return on our basic 
research investment portfolio.

    20. Senator Portman. Dr. Freeman, does the basic research being 
performed have direct application to the warfighter?
    Dr. Freeman. While by the commonly accepted definition basic 
research has no specific application, we focus our Army basic research 
investments in areas that will provide superior technical capabilities 
for our warfighters. For example, we focus our basic research 
investment in materials science to provide fundamental knowledge that 
will provide our soldier greater protection, at lighter weight--both 
for personal protection as well as for vehicles and facilities. We rely 
on our program managers within our research facilities to conduct an 
aggressive basic science research program on behalf of the Army so that 
cutting-edge scientific discoveries and the general store of scientific 
knowledge will be optimally used to develop and improve the technical 
capabilities for our warfighters.

    [Whereupon, at 4:30 p.m., the subcommittee adjourned.]


DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 
               2013 AND THE FUTURE YEARS DEFENSE PROGRAM

                              ----------                              


                         TUESDAY, JUNE 12, 2012

                           U.S. Senate,    
                   Subcommittee on Emerging
                          Threats and Capabilities,
                               Committee on Armed Services,
                                                    Washington, DC.

 PROLIFERATION PREVENTION PROGRAMS AT THE DEPARTMENT OF ENERGY AND AT 
                       THE DEPARTMENT OF DEFENSE

    The subcommittee met, pursuant to notice, at 2:31 p.m. in 
room SR-232A, Russell Senate Office Building, Senator Kay R. 
Hagan (chairman of the subcommittee) presiding.
    Committee members present: Senators Hagan and Portman.
    Majority staff members present: Jonathan S. Epstein, 
counsel; Richard W. Fieldhouse, professional staff member; and 
Robie I. Samanta Roy, professional staff member.
    Minority staff members present: Adam J. Barker, 
professional staff member; Daniel A. Lerner, professional staff 
member; and Elizabeth C. Lopez, research assistant.
    Staff assistants present: Jennifer R. Knowles and Kathleen 
A. Kulenkampff.
    Committee members' assistants present: Christopher Cannon, 
assistant to Senator Hagan; and Brent Bombach, assistant to 
Senator Portman.

      OPENING STATEMENT OF SENATOR KAY R. HAGAN, CHAIRMAN

    Senator Hagan. I would like to go ahead and call this 
hearing to order. The purpose of today's hearing is to review 
the President's fiscal year 2013 request for proliferation 
prevention programs at the Department of Defense (DOD) and 
Department of Energy (DOE). The hearing was originally planned 
for April 24, but we had to postpone it because of a number of 
the Senate votes that were taking place that afternoon.
    Today we plan to have a hard stop at this hearing at 3:45 
p.m. so that we can adjourn to the Office of Senate Security in 
room SVC-217 of the Capitol Visitor Center for a closed session 
with today's witnesses.
    We're joined today by three expert witnesses to help us 
understand these programs that are underway in both 
departments. Hon. Madelyn R. Creedon is the Assistant Secretary 
of Defense for Global Strategic Affairs and she is responsible, 
among many other subjects, for the policy aspects of these 
programs at DOD. This is your third time this year before the 
Senate Armed Services Committee and, as you can tell, we miss 
you very much. So we're glad to have you back today.
    Mr. Kenneth A. Myers III is the Director of the Defense 
Threat Reduction Agency (DTRA) at DOD, which is focused on 
reducing the threats from weapons of mass destruction (WMD). 
The agency is responsible for the Cooperative Threat Reduction 
(CTR) program. He's also the Director of the U.S. Strategic 
Command Center for Combating WMD, located at the agency.
    Ms. Anne Harrington is the Deputy Administrator for Defense 
Nuclear Nonproliferation at the National Nuclear Security 
Administration (NNSA) of DOE.
    We thank all of you for the service that you are giving to 
our country and we thank you for being here today with us.
    For fiscal year 2013, DOD and DOE propose to spend on the 
order of $3 billion to help stem the flow of WMD. Most of the 
programs, such as the CTR program, are well-established in 
Russia and the former Soviet states and have made noteworthy 
accomplishments in securing bomb-grade nuclear weapons 
materials, as well as chemical weapons and biological 
materials.
    I understand we are now transitioning many of these 
programs to countries in the Southeast Asia region and Africa. 
As these programs transition geographically to address other 
emerging proliferation concerns, we will be looking for a 
threat assessment in each case to justify the transition and a 
set of measurable goals or metrics to measure programmatic 
success. The authorization bill that was just passed by this 
committee would require a set of concise program metrics to be 
included in the annual report for the program.
    Within the DOE's NNSA, I have concerns about the mixed 
oxide (MOX) fuel program. The purpose of the 13-year-old 
program is to turn 34 metric tons of excess weapons-grade 
plutonium into reactor fuel for peaceful purposes, a laudable 
nonproliferation goal. As originally envisioned, the program 
was to be operational in 2014 at a total cost of $3.6 billion. 
This cost included three facilities: a facility to prepare 
plutonium feedstock for the reactor fuel, a fuel fabrication 
building, and a waste handling facility.
    In 2008, the total program cost rose to $4.7 billion and in 
2010 the operational date shifted back 3 years to 2017. Since 
1999, we have spent over $6 billion on this effort. I 
understand that last year the plan to build the plutonium 
feedstock facility was dropped due to cost growth. Instead, 
there is a proposal to use existing facilities at Los Alamos 
and the Savannah River Site.
    So we now have a situation where we are building a $4 
billion fuel fabrication building with no dedicated feedstock 
facility to provide it plutonium, and apparently no commercial 
reactor vendor has signed a contract to use the plutonium fuel 
even at below market rates.
    The bill passed by this committee would increase oversight 
on this project by requiring an assessment on what facilities 
will be used for supplying feedstock and the cost in doing so 
over the entire lifespan of the program.
    I also understand the program will have a new baseline 
established this summer, so there is continuing uncertainty 
about cost and schedule. Please make sure you inform Congress 
of the results of this baseline adjustment, and I look forward 
to hearing from NNSA today on actions that they are taking to 
rein in the cost of this project.
    I did want everyone to note that, due to some scheduling 
conflicts, we need to depart from the closed portion of today's 
hearing around 4:30 p.m., so what I'd like to do is wrap up 
this open session at 3:45 p.m. if that's sufficient time for 
our questions and then move to the Office of Senate Security 
for the closed session, which will begin as planned right 
around 4 p.m.
    To save time, if this is concurrent with Senator Portman, I 
would like to ask the witnesses if they could submit their 
testimony and oral statements directly for the record so that 
Senator Portman and I could go directly into questions.
    I do thank you for your testimony, and before we begin 
asking questions of our witnesses, I want to turn to my 
colleague and ranking member, Senator Portman, for any comments 
that he might wish to give.
    Senator Portman.

                STATEMENT OF SENATOR ROB PORTMAN

    Senator Portman. Thank you, Madam Chair, and I'll be brief. 
I want to join you in welcoming these witnesses and thank them 
for their work and for the dedicated men and women in their 
respective agencies who work every day to protect our Nation.
    We find ourselves in a global security environment today 
starkly different than ones we've faced in the past and so this 
is a great hearing to talk about some of the challenges that we 
face. During the Cold War, we knew who the enemy was and we 
actually had a pretty good understanding what their 
capabilities were. Today, that's not the case. We have rogue 
nations, non-state actors who seek to acquire WMD that if 
employed successfully would have catastrophic consequences for 
our Nation and for those of our allies.
    We have made some progress in mitigating such risks--we'll 
hear about that today--through ongoing efforts to secure or 
destroy some of the world's most dangerous weapons and 
technologies, and yet extremist actors remain intent on 
obtaining and potentially using these materials to conduct 
attacks.
    The witnesses today represent the primary entities within 
DOD and DOE responsible for preventing the proliferation or use 
of WMD. In addition to dealing with a challenging and 
increasingly complex security environment the witnesses also 
have to contend with the growing budgetary crisis that will 
require difficult decisions in the months and years ahead. We 
look forward to talking about the budget and about what's 
happened over the last few years and what's likely to happen 
going forward.
    It's imperative we spend every dollar in our counter-WMD 
efforts in the most cost-effective way possible and be sure 
that we're not wasting any on duplication or underperforming 
programs. We'll again have a chance to talk about a Government 
Accountability Office (GAO) study and some other questions, I 
think, with regard to making sure that we are being as cost-
effective as possible.
    Coordination across the interagency and among our 
international partners is increasingly essential in this regard 
to avoid overlap and fragmentation of our efforts. We have to 
be mindful of the potential impact of sequestration, which will 
force an additional across-the-board reduction of nearly half a 
trillion dollars to the defense budget if it's allowed to 
stand. I want to hear more about that today and what is being 
planned. As much as we'd like to avoid it, what would have to 
happen should we go to sequestration?
    So I look forward to an assessment from our witnesses on 
sequestration with regard to the programs that specifically you 
oversee and your ability to execute the missions you've been 
assigned.
    Again, Madam Chair, I thank the witnesses for joining us 
today and look forward to their testimony and questions.
    Senator Hagan. Thank you, Senator Portman.

 STATEMENT OF HON. MADELYN R. CREEDON, ASSISTANT SECRETARY OF 
  DEFENSE FOR GLOBAL STRATEGIC AFFAIRS, DEPARTMENT OF DEFENSE

    [The prepared statement of Ms. Creedon follows:]

             Prepared Statement by Hon. Madelyn R. Creedon

                              INTRODUCTION

    Madam Chairman, Ranking Member Portman, and members of the 
subcommittee, I am pleased to testify today about the recent progress 
the Department of Defense (DOD) has made in carrying out the full range 
of the Department of Defense's efforts to counter weapons of mass 
destruction (CWMD).
    The Department has a solid record of achievement in supporting 
whole-of-government efforts to prevent the proliferation and use of 
nuclear, biological, and chemical weapons and related materials, 
protect the United States and its allies and partners from weapons of 
mass destruction (WMD) threats, and respond to WMD threats should 
prevention fail. DOD accomplishes these objectives by supporting the 
global, multilateral WMD nonproliferation regime, robust partner 
engagement and capacity-building efforts, as well as further developing 
U.S. capabilities to counter WMD. I am pleased to be here, today, with 
two colleagues whose efforts are vital to countering the threat of WMD: 
Mr. Kenneth A. Myers III, the Director of the Defense Threat Reduction 
Agency (DTRA); and Ms. Anne M. Harrington, the Deputy Administrator of 
the National Nuclear Security Administration (NNSA). Together, we are 
working to make the world safer from WMD threats.
    In my role as the assistant Secretary of Defense for Global 
Strategic Affairs in the Office of the Under Secretary of Defense for 
Policy, I oversee Defense efforts to counter WMD, as well as setting 
Nuclear and Missile Defense Policy, Space Policy and Cyber Policy. My 
team develops strategies and policy guidance to counter WMD, sets 
Departmental priorities, and participates in interagency groups and 
international relationships, all on behalf of the Secretary of Defense. 
DTRA, as ably led by Mr. Myers, implements our CWMD guidance by 
managing and executing the CTR Program and other efforts to counter 
WMD. Mr. Andrew C. Weber, the assistant Secretary of Defense for 
Nuclear, Chemical and Biological Defense Programs, provides acquisition 
guidance and oversight for DTRA's work. Together, we work with the 
Joint Staff, the Combatant Commands, and the Services to execute DOD's 
CWMD responsibilities.
    DOD's efforts are well coordinated with Ms. Harrington and her team 
at NNSA, as well as with our colleagues at the Department of State and 
other U.S. Government departments and agencies. It is through the close 
collaboration, teamwork, and dedication of the men and women at each of 
our agencies that we are effective and able to succeed in our mission 
to ensure the security of the United States and its citizens.

                     THE GLOBAL THREAT ENVIRONMENT

    There is no greater threat to the American people than weapons of 
mass destruction, particularly the danger posed by the proliferation of 
nuclear weapons to additional states and their pursuit by violent 
extremists. We know that both state and non-state actors continue to 
seek WMD and related materials and expertise. This fact, combined with 
advances in nuclear, chemical, and life sciences, as well as increases 
in access to scientific information and expertise, pose new and growing 
challenges to preventing potential adversaries from acquiring WMD.
    The global security environment continues to change, and has become 
more unpredictable as the global order has become more unstable since 
the end of the Cold War. Instability anywhere in the world could 
present us with new challenges, and underline the need to enhance U.S. 
capabilities and international partnerships to counter the WMD threat. 
The instability or collapse of a WMD-armed state, such as Syria, is 
among the most troubling security concerns in the world today. Such an 
occurrence could lead to rapid proliferation of WMD material, weapons, 
and technology, and could quickly become a global crisis posing a 
direct physical threat to the United States and all other nations. 
Threats like this are at top priorities for the Department of Defense, 
Whether they emanate from Syria or elsewhere, I can assure you that DOD 
is committed to efforts to prevent the proliferation or use of WMD, 
protect the United States and our allies from WMD threats, and respond 
to WMD threats should our prevention efforts fail.

                           STRATEGIC GUIDANCE

    DOD's efforts to counter WMD are guided by the national-level, 
White House-issued strategy guidance, including the National Security 
Strategy of the United States and the National Strategy for Countering 
Biological Threats. The guidance contained therein informs the 
Department's strategy documents, including the Quadrennial Defense 
Review, the Nuclear Posture Review Report, Secretary Panetta's January 
2012 strategic guidance, ``Sustaining U.S. Global Leadership: 
Priorities for the 21st Century,'' and the National Military Strategy 
of the United States of America.
    The National Security Strategy outlines a comprehensive 
nonproliferation and security agenda, including reducing the size of 
the U.S. nuclear arsenal and the role of nuclear weapons, promoting 
regional stability, and ensuring the effectiveness of our deterrent and 
defensive capabilities.
    The National Strategy for Countering Biological Threats guides our 
efforts to prevent and respond to the proliferation and use of 
biological weapons by states or non-state actors through increasing 
worldwide capability to detect outbreaks of disease, whether 
intentional or natural, through the application of targeted and proven 
tools for biological risk management.
    The Quadrennial Defense Review (QDR) establishes ``Preventing 
Proliferation and Countering WMD'' and ``Defending the United States 
and Supporting Civil Authorities at Home'' among the Department's six 
key mission areas.
    The Nuclear Posture Review better aligns our nuclear policies and 
posture to our most urgent priorities--preventing nuclear terrorism and 
proliferation while ensuring the maintenance of a safe, secure, and 
effective nuclear deterrent for as long as nuclear weapons exist.
    Sustaining U.S. Global Leadership: Priorities for the 21st Century 
provides us with the latest strategic vision from the Secretary of 
Defense on how to prioritize our efforts in a resource-constrained 
environment, while still carrying out our essential mission to defend 
the Nation. The guidance firmly ensconces countering WMD as one of the 
ten primary missions of the U.S. Armed Forces.
    Finally, the 2011 National Military Strategy of the United States 
of America aligns the activities of the Armed Services and Combatant 
Commands to the National Security Strategy, the QDR, and other top-
level guidance.
    Together, these documents emphasize the need to have the 
capabilities to both prevent WMD proliferation to state and non-state 
actors, and respond to proliferation or use, should those efforts fail. 
We also will continue to build the capacity and capabilities of our 
partners to participate jointly in these efforts and reinforce the 
effectiveness of the global, multilateral WMD nonproliferation regime.

                            THE DOD RESPONSE

    As I stated previously, DOD works to prevent the proliferation of 
WMD and build our and partner nations' capacity and capability to 
prevent and respond to WMD threats. These efforts include the necessary 
research, doctrine development, training and education to ensure that 
these capabilities remain effective components of the response by DOD 
and our partners. DOD protects the homeland and our allies and ensures 
that our troops, along with those of our coalition partners, can fight 
and win in an environment contaminated by WMD hazards.

    1.  Reinforcing the Global WMD Nonproliferation Regime

    The United States has worked with our allies and partners to 
support and enhance a global nonproliferation regime to share the costs 
and increase the effectiveness of our collective efforts to reduce our 
vulnerability to WMD. Each part of the global regime reinforces the 
others. For instance, the Biological Toxin and Weapons Convention 
(BTWC), the Chemical Weapons Convention (CWC), and the Nuclear Non-
Proliferation Treaty (NPT) help set global norms against biological and 
chemical weapons proliferation and nuclear proliferation. Agreements, 
such as the International Atomic Energy Agency's Additional Protocol 
(IAEA AP) and the as-yet unratified Comprehensive Test Ban Treaty 
(CTBT), and a potential Fissile Material Cutoff Treaty (FMCT), raise 
and reinforce the barriers to WMD proliferation. Other international 
bodies, such as the United Nations Security Council, seek to establish 
norms for proliferation prevention and build roadblocks for potential 
proliferators. Regional agreements, such as nuclear weapon free zones, 
and regional security organizations, such as NATO, and other efforts, 
such as the Washington and Seoul Nuclear Security Summits, and the 
Global Partnership Against the Spread of Weapons and Materials of Mass 
Destruction provide forums to focus efforts and attention on 
reinforcing the norms and behaviors associated with the global WMD 
nonproliferation regime.
    We see real benefit in strengthening the global regime, both to set 
the example of good global citizenship, and to build support for global 
action when countries cheat. Unilateral approbation can be a powerful 
tool in seeking compliance, but our efforts are stronger when the rest 
of the world agrees and acts with us against cheaters and 
proliferators. Of course, some countries, such as Syria, Iran, and 
North Korea, refuse to play by the rules and continue to challenge 
international norms of good behavior. The United States will continue 
to uphold the highest standards of nonproliferation and hold cheaters 
and proliferators to account.
    The norms against biological weapons, stated in the BTWC, are among 
the strongest. The parties at the December 2011 BTWC Review Conference 
agreed to an ambitious Intersessional process to strengthen 
implementation. The BTWC bans the development, production, acquisition, 
stockpiling, retention, or transfer of biological weapons. The number 
of countries that have not signed or ratified the Convention, however, 
is too long. In addition, some countries do not fully participate in 
the BTWC confidence building measures. DOD's efforts include supporting 
expert discussions and providing information on DOD facilities and 
activities as part of the confidence building measures. DOD also has 
taken steps to increase the transparency of our biological defense 
activities. We hosted the Chairman of the BTWC at the U.S. Army Medical 
Research Institute of Infectious Diseases (USAMRIID) at Fort Detrick, 
MD, in 2011, and we have invited select BTWC Ambassadors to visit 
USAMRIID later this year. The United States encourages other BTWC 
parties to do the same and provide transparency to their bio-defense 
efforts.
    The parties at the NPT Review Conference in 2010 achieved consensus 
on an Action Plan that reinforces the Treaty's role as the cornerstone 
of the global nuclear nonproliferation regime and commits to specific 
action to improve its effectiveness during the intersessional process. 
The Action Plan calls for strengthening the three pillars of the 
Treaty--improving safeguards to ensure nuclear nonproliferation, 
working towards nuclear disarmament, and sharing the benefits of the 
peaceful uses of nuclear energy. The United States has demonstrated 
leadership in pursuing nuclear reductions--most notably by bringing 
into force the New START treaty with Russia--and DOD actively 
participates with our colleagues at State and the NNSA in supporting 
proposals and activities to fulfill the commitments contained in the 
action Plan. In addition, DOD implements certain U.S. Government 
commitments under the IAEA Additional Protocol--an important facet of 
U.S. compliance with its nonproliferation obligations--including 
providing information on non-sensitive DOD facilities and activities, 
and supporting managed access visits.
    The administration is committed to seeking ratification of the CTBT 
and its entry-into-force. The CTBT bans the testing of nuclear weapons, 
thus creating another barrier to non-weapon states that may seek to 
acquire nuclear weapons. The CTBT also hinders existing nuclear powers 
from developing new, potentially destabilizing types of warheads. The 
United States demonstrates our commitment to entry-into-force by 
maintaining a nuclear weapons testing moratorium and supporting the 
development of onsite inspection procedures and the International 
Monitoring System. The ability of both the international community and 
the United States to detect nuclear tests has improved greatly since 
1999 when the Senate first considered the Treaty. The Department of 
Energy's Stockpile Stewardship Program continues to ensure the safety, 
security, and effectiveness of our nuclear deterrent without nuclear 
tests. CTBT remains fully in America's national security interest. The 
United States continues to seek a FMCT, and is working in Geneva at the 
U.N. Conference on Disarmament towards a negotiation to ban production 
of fissile material for use in nuclear weapons. DOD provides experts to 
form interagency positions on the FMCT, supports discussions, and 
participates in discussions among technical experts.
    President Obama in 2009 announced a goal of securing all vulnerable 
nuclear materials worldwide. The President hosted the first Nuclear 
Security Summit in Washington in April 2010 to focus world leaders on 
nuclear security and to secure concrete commitments for action. At the 
second Nuclear Security Summit, held in Seoul in March 2012, 
participants reported the progress they have made in meeting their 2010 
commitments--an analysis by the independent Arms Control Association 
indicates that 90 percent of these commitments were completed. In one 
such success, President Obama stood with President Medvedev of Russia 
and President Nazarbayev of Kazakhstan to announce the imminent 
completion of a trilateral project, managed for the United States by 
DOD's Nunn-Lugar Cooperative Threat Reduction Program (CTR), to secure 
hundreds of kilograms of vulnerable nuclear material at the former 
Semipalatinsk Test Site in Kazakhstan. The project represents the most 
visible, but far from the only, DOD contribution to the President's 4-
year effort to lock down vulnerable nuclear material globally.
    The Department supports various nuclear security conventions aimed 
at preventing global nuclear terrorism and proliferation, such as the 
International Convention for the Suppression of Acts of Nuclear 
Terrorism (ICSANT), which addresses terrorism involving nuclear weapons 
and other radioactive materials; the Amendment to the Convention on 
Physical Protection of Nuclear Material (CPPNM), which addresses the 
physical protection of nuclear material used for peaceful purposes; and 
the Two Protocols to the Convention for the Suppression of Unlawful 
Acts Against the Safety of Maritime Navigation and the Convention for 
the Suppression of Unlawful Acts Against the Safety of Fixed Platforms 
Located on the Continental Shelf, which address the potential use of 
maritime vessels or platforms for terrorism or WMD transport. In 2008, 
the Senate unanimously provided its advice and consent to ratification 
of all four treaties. The Department of Defense encourages the passage 
of implementing legislation currently before Congress that will allow 
the United States to ratify these agreements to bolster our efforts to 
protect the American people against proliferation threats.
    In May 2011, the President submitted the protocols to the Treaties 
of Pelindaba and Rarotonga to the Senate for its advice and consent to 
ratification. DOD supports U.S. accession to the Protocols to both of 
these Nuclear Weapon Free Zones (NWFZs)--in Africa and the South 
Pacific, respectively--because both are consistent with the U.S. 
Nuclear Posture Review and enhance U.S. security by furthering our 
global nonproliferation and arms control objectives. Neither Protocol 
requires any changes to U.S. law, policy, or practice, nor would they 
require any changes to our defense plans or posture. We hope the Senate 
will take up the Protocols for both Treaties for consideration and 
provide its advice and consent for ratification. Looking further 
forward, we have reached an agreement in principle that resolves our 
concerns regarding the Protocol to the Southeast Asia NWFZ Treaty by 
completing a revised Protocol. We will continue our efforts to clarify 
remaining questions over the Protocol to the Central Asian NWFZ Treaty.
    Finally, we engage with regional partners to leverage further our 
countering WMD capabilities. One such partner is NATO. The NATO 
Strategic Concept, adopted in Lisbon in 2010, provides the roadmap for 
further developing NATO's capacity to defend against the threat of 
chemical, biological, radiological, and nuclear weapons. The United 
States ensured that the Concept included direction to improve the 
capacity of allies to counter proliferation of WMD and their means of 
delivery.

    2.  Working with Partners

    DOD also responds to global WMD threats by working with allied and 
partner nations. This includes robust partner engagement efforts to 
leverage existing capabilities and build partner capacity through the 
Nunn-Lugar Cooperative Threat Reduction (CTR) Program, the 
International Counterproliferation Program (ICP), and the Proliferation 
Security Initiative (PSI).
    In terms of our threat reduction and capacity-building efforts, I 
would like to refer specifically to the Nunn-Lugar CTR Program--a 
highly-effective effort to work bilaterally with partner governments 
around the world to reduce and eliminate existing or past WMD programs 
on their territory. The Nunn-Lugar CTR Program is the primary DOD 
mechanism that supports the President's goal of improving the security 
of all nuclear material world-wide. For 2 decades, the Nunn-Lugar CTR 
Program has reduced the threat emanating from the legacy WMD programs 
of the Soviet Union. In recent years, the program has adapted to go 
beyond the former Soviet states and take on new and emerging WMD 
threats in other regions. CTR's many achievements are extraordinary; 
however, I will focus my remarks on our most recent achievements and 
our future goals and plans.
    For fiscal year 2013, the Department of Defense has requested 
$519.1 million for the CTR Program; this includes $99.8 million for the 
Global Nuclear Security (GNS) Program; $32.4 million for the 
Proliferation Prevention Program (PPP), and $276.4 million for the 
Cooperative Biological Engagement Program (CBEP). Congressional support 
for this request will enable the Department to continue its important 
contributions to reducing nuclear and biological threats.
    During 2011, the CTR program continued to expand globally to build 
new partnerships to support our nonproliferation efforts, managing its 
largest 1-year budget in its history, and making more new political 
commitments than ever. We increased CTR's reach with new partnerships 
in Africa, the Middle East, South Asia, focused on improving 
responsiveness and stewardship of the program. We have adapted CTR to 
meet emerging threats with agility--identifying enduring partnerships 
with countries focused on providing sustained effort, adjusting our 
efforts where attention is not as focused, and enhancing our engagement 
across DOD and the interagency.
    In Russia, CTR's Global Nuclear Security (GNS) program remains 
focused on improving the site and transportation security of nuclear 
weapons and related materials. Naturally, this includes close 
cooperation with the Department of Energy, building on our joint 
experience improving local capacities to sustain and improve security 
systems. Since 2010, the GNS program has helped Russia consolidate its 
nuclear warhead storage, maintain and improve nuclear weapon storage 
security and accountability, transport highly-enriched spent nuclear 
fuel from decommissioned submarines for disposal, increase nuclear 
security training capacity, and assess new security technologies and 
methods.
    The Nuclear Security Centers of Excellence is another important 
effort that builds a sustainable partnership to support nuclear 
nonproliferation. DOD, through the CTR program and in partnership with 
DOE, is providing technical expertise and a modest level of resources 
to support the Center of Excellence for Nuclear Security in China. We 
also are discussing a partnership with India in the nuclear security 
component of its Global Center for Nuclear Energy Partnership and 
providing some initial facilitation support to Kazakhstan's nuclear 
security center of excellence. These Centers will allow us to exchange 
nuclear security best practices, demonstrate security equipment, 
contribute to national and regional training programs, and collaborate 
on the research and development of nuclear security technologies.
    Our strategy requires a layered defense against proliferation 
threats. The WMD Proliferation Prevention Program (PPP) is CTR's means 
to enhance our partners' ability to detect and interdict WMD on-the-
move through the provision of detection, surveillance, and interdiction 
capabilities. CTR's increased engagements in Southeast Asia, the 
Caucasus, Ukraine, and Moldova are critical to assist in developing the 
capability to detect and interdict WMD and related materials in 
transit.
    Although not an element of CTR, the ICP is a DOD activity that 
complements the capital-intensive investments of the CTR/PPP program 
through its modest, yet effective ``train-and-equip'' efforts. ICP is 
unique in that its legislative authority explicitly directs a 
partnership with the FBI and U.S. Customs and Border Protection to 
deter WMD proliferation in priority countries and regions. ICP and PPP 
are coordinated closely with complementary programs managed by our 
interagency partners, to include the State Department's Export Control 
and Related Border Security (EXBS) Program.
    DOD also participates in the G8 Global Partnership Against the 
Spread of Weapons and Materials of Mass Destruction as an important 
mechanism to coordinate and deconflict international threat reduction 
and nonproliferation assistance. This year the United States is serving 
as chair and seeking to strengthen Partnership efforts and focus on 
creating tangible deliverables to increase global bio-security. The 
United States is working to strengthen global efforts to counter 
biological threats by working with vitally-important international 
organizations, such as the World Health Organization (WHO), the 
Organization of Animal Health, and the Food and Agriculture 
Organization, each of which are dedicated to reducing risks and 
detecting outbreaks early. As an example of our cooperation, the United 
States has entered into a memorandum of understanding with WHO to 
improve global health security.
    While the Global Partnership has made it easier to share work on 
threat reduction projects with like-minded international partners, 
thanks to CTR's legislative authority to receive funds from outside 
contributors, we now have greater flexibility also to share costs. Let 
me give you one example. Pursuant to the National Defense Authorization 
Act for Fiscal Year 2010, I am currently seeking the determination of 
the Secretary of Defense, with the concurrence of the Secretary of 
State, to enter into memorandums of understanding (MOU) with the United 
Kingdom, Canada and the Netherlands in pursuit of cooperative threat 
reduction goals of the Global Partnership Against the Spread of Weapons 
and Materials of Mass Destruction. The specific CTR projects and scope 
of work to be funded will be mutually decided by DOD and outside 
contributors on a case-by-case basis once the MOUs are in place. We 
anticipate that the priorities for such contributions will include 
cooperative biological engagement work in the former Soviet Union, 
Iraq, Africa, and Southeast Asia.
    The most dynamic area of CTR activity continues to be biodefense 
engagement through the CBEP. The CBEP counters the threat posed by 
especially dangerous pathogens, related materials and expertise, and 
other emerging infectious disease risks in accordance with the National 
Security Strategy for Countering Biological Threats. This includes 
strengthening global health security, obtaining timely insight on 
emerging outbreaks, reducing the potential for exploitation of life 
sciences material and technology, and reinforcing norms of safe and 
responsible conduct. CBEP focuses its work in four program areas: (1) 
Secure and consolidate collections of especially dangerous pathogens; 
(2) Enhance partner country's capability to prevent the sale, theft, 
diversion, or accidental release of biological weapons-related 
materials; (3) Enhance partner country's capability to detect, 
diagnose, and report epidemics, bio-terror attacks, and potential 
pandemics; and (4) Ensure that the capabilities are sustainable within 
each partner country.
    Defending against infectious disease outbreaks, whether an attack 
or natural, is a global concern that requires a multinational effort 
and response. All governments share mutual goals of protecting their 
populations from infectious disease and, in doing so, they protect the 
global community in the process. This is why DOD, through the Nunn-
Lugar CTR Program, is building partner capacity in critical regions 
around the world that elevates the concern over bio-security risks and 
bio-surveillance for potential weaponized outbreaks alongside the 
broader global commitments to public health. In addition, CTR's legacy 
work eliminating the threat posed by the former Soviet bio-weapons 
enterprise, and DOD's own work developing the means for our soldiers to 
conduct operations in bio-contaminated environments, provides the DOD 
enterprise with unique skills and interests in reducing bio threats.
    Recently, the CBEP program has shifted from an FSU focus to areas 
of emerging bio-threats, such Southeast Asia, the Middle East, and 
Africa. With global connectivity bringing people from all parts of the 
world to U.S. shores every day, we cannot afford to ignore the threat 
that the combination of endemic or unsecure pathogens and terrorists 
seeking bio-weapons material or expertise poses. As CBEP has expanded 
beyond the former Soviet Union, it has adapted its approach to meet the 
unique regional needs and concerns to reduce overall footprint 
requirements and find lower-cost, more sustainable solutions for 
storage and research on these pathogens. As an example of CBEP's 
emphasis on emerging threats, a number of high-impact projects are 
underway in Kenya, including improvement of perimeter fences and 
security procedures, analysis of pathogen repository needs for over 100 
unsecured freezers at one facility, and cooperative biological research 
on some of the most challenging endemic diseases in the country. We 
will continue to assess the program's approaches and adapt to partner 
capacity and collaborative opportunities with other Global Partnership 
countries.
    DOD has led efforts with our interagency colleagues to make the 
Proliferation Security Initiative (PSI) a durable and effective effort 
to prevent the proliferation of WMD. Since its founding in 2003, 98 
countries have endorsed the PSI Statement of Interdiction Principles, 
and many of these partners work with the United States through military 
exercises, workshops, and training to improve interdiction and 
coordination capabilities. Building on these activities, the United 
States has proposed the Critical Capabilities and Practices effort for 
PSI. This effort seeks to take advantage of the significant work PSI 
partners have done to identify interdiction-related tools and ensure 
all PSI-endorsing nations have access to those tools. Examples of these 
tools include WMD and ballistic missile-related identification manuals, 
legal analyses and model legislation for seizing illicit goods, 
interdiction related training, and guidelines for sharing information 
related to cargoes. Related efforts over the next year include major 
multilateral PSI exercises such as Leading Edge co-hosted by the United 
Arab Emirates, which will send a significant deterrent message to 
proliferators.
    The benefit of these efforts to work collaboratively with partner 
and allied nations was demonstrated in the overwhelming U.S. response 
to the March 2011 Japanese tsunami and its aftermath through Operation 
Tomodachi. While this was not a response to a WMD attack, Operation 
Tomodachi highlighted DOD's unique ability to bring vast expertise and 
resources to aid allies in the event of a radiological accident or 
incident. DOD's extensive military infrastructure in the Pacific, our 
close working relationship with Japanese military and civilian 
partners, and vast experience in nuclear and radiological consequence 
management allowed us to quickly and effectively provide assistance 
where it was most needed, including radiation monitoring of the 
Fukushima Power Plant, support for humanitarian relief efforts, assist 
in search and rescue, and help in containment and decontamination. We 
were able to augment domestic Japanese response capabilities in key 
areas where we have greater capacity and expertise and assist a close 
ally in their critical time of need. This response also served as a 
good opportunity to work with our interagency partners and identify 
where there was a need for improved coordination.

    3.  Building U.S. Capabilities

    Finally, DOD responds to global WMD threats by looking internally 
to improve DOD capabilities and capacities to counter WMD. Over the 
last several years, DOD has invested significant time and resources to 
develop and enhance capabilities for detection, interdiction, 
elimination, and consequence management operations.
    We have gained important experience and learned valuable lessons 
from our efforts to field specialized consequence management response 
forces for chemical, biological, radiological and nuclear (CBRN) 
events. Complementing the evolution of earlier force structures, DOD 
and the National Guard are building the CBRN Response Enterprise (CRE), 
which will achieve full operational capability by October 2012. The CRE 
is a Federal and state military construct designed to decrease response 
times, save more lives, and standardize training, evaluations and 
exercises. The Homeland Response Force (HRF) is the centerpiece of 
National Guard portion of the CRE and provides a regional response 
capability to each of the 10 FEMA regions. The 556-person HRFs are 
prepared to deploy 12 hours or sooner after notification to support 
civil authorities with emergency medical, decontamination, and search 
and rescue assets.
    As a Department, we take very seriously our responsibility to 
protect the force and ensure it is able to operate fully within WMD 
environments, as well as defend the homeland from WMD attacks. To 
accomplish these objectives, we are building an integrated, layered 
defense, which includes working with the Department of Homeland 
Security to enhance the protective posture of the homeland; 
coordinating with the Intelligence Community to better identify likely 
proliferation pathways and illicit procurement networks; and, looking 
across the U.S. Government to invest in new capabilities to detect and 
characterize chemical, biological, or nuclear WMD threats.
    For instance, to counter the nuclear threat, DOD is looking both 
internally at how we should organize and invest to ensure an effective 
response as well as supporting NSS-led efforts to develop a whole-of-
government response plan. Faced with an unpredictable security 
environment, we are working towards a whole-of-government, synchronized 
response to detect, interdict, and contain loose nuclear weapons and 
related materials. This would include activities such as securing 
material at the source, intercepting material on the move, and 
increasing defenses to protect against an attack on the homeland. Our 
work at DOD has focused on how U.S. military units would coordinate 
with other U.S. agencies and with allies and partners in the face of 
such a ``loose nuke'' threat scenario. These efforts are critical to 
both preventing terrorists from obtaining or acquiring nuclear weapons 
or significant nuclear material, and ensuring we are prepared and 
postured to effectively respond should the worst case materialize.
    We also must enhance our ability to respond quickly to an attack 
should these efforts fail. In this regard, the President's budget 
request includes new resources to improve capabilities for technical 
nuclear forensics technologies and the fielding of new capabilities, 
including funding for air sample collection, in order to support the 
rapid source attribution of a terrorist attack. For fiscal year 2013, 
we have requested $6.5 million to accelerate integration, testing, 
evaluation, and certification of new particulate air sample collection 
systems, and we are conducting a comprehensive review of the overall 
nuclear sample collection requirements to inform future-year efforts. 
This study is due to be completed later this month.
    DOD plans and operations must reflect the dizzying pace of change, 
the limits on U.S. action, the challenges to intelligence in rapidly-
changing situations, and enduring technical hurdles related to WMD 
detection. These challenges, among others, have led DOD to establish a 
Standing Joint Force Headquarters for Elimination (SJFHQ-E) to serve as 
a permanent, joint advocate for refining tactics, techniques, and 
procedures to enhance our ability to locate, characterize, and secure 
WMD threats, to dissuade their use, and to remove or neutralize them if 
necessary, especially in non-permissive environments. SJFHQ-E also 
ensures that these capabilities are integrated into doctrine, training, 
and exercises across DOD. On February 3, 2012, the Commander of U.S. 
Strategic Command activated the SJFHQ-E. The headquarters, which will 
reach full operational capabilities in fiscal year 2013, will integrate 
DOD counter WMD assets, including nuclear disablement teams, CBRN 
Response Teams, radiation assessment teams, deployable laboratories, 
and tactical intelligence. It will greatly increase DOD's capability to 
locate, characterize, secure, and disable or destroy hostile WMD 
programs in a non-permissive or semi-permissive environment. It also 
will provide a focal point for working with allies and partners to 
build their awareness and capacity for WMD elimination operations 
worldwide.
    Emerging biological threats are no less dangerous than chemical or 
nuclear threats. An important priority of the National Strategy for 
Countering Biological Threats is increasing capability to conduct 
effective and timely disease surveillance worldwide. CTR, as I 
described earlier, is addressing this threat through CBEP, which 
collaborates with DOD's overseas medical research laboratories to 
leverage their technical expertise and regional relationships. CBEP 
provides expert technical training to CTR partners and conducts 
cooperative biological research to discover novel pathogens or 
characterize pathogens that are not generally found in the United 
States. Within the military medical community, these DOD overseas 
medical research labs are well-known for their intrepid work protecting 
U.S. military members from disease.
    DOD also is seeking to address new and novel threats resulting from 
the revolution in biotechnology and the chemical industry. While this 
revolution can provide tremendous benefits in medical science and 
economic growth, it also can undermine our confidence in existing chem-
bio defenses. With growing access to expertise, equipment, advanced 
technology, and the precursors needed to produce new chemical or 
biological compounds, we continue to devote more resources to research, 
doctrine development, training and education to develop improved 
countermeasures, personal protection gear, and new decontamination 
techniques to mitigate the effects of novel chemical and biological 
agents.

                               CONCLUSION

    The threat posed by WMD continues to evolve, and so do our efforts 
to combat it. These efforts span a range of unilateral and multilateral 
counter-proliferation and non-proliferation responses. The efforts I 
have outlined today keep DOD ahead of WMD threats. We continue to 
coordinate our efforts within the interagency and with our 
international partners to prevent and protect against these most 
dangerous threats. But none of the efforts I have described to you 
today would be possible without the continuing support of Congress. The 
authorities, budget, and personnel that you provide allows DOD to 
participate in the most important mission I can imagine--to protect the 
American people from a WMD attack. I thank you for your support for our 
fiscal year 2013 budget and look forward to continuing to partner 
closely with Congress to counter these threats.

STATEMENT OF ANNE HARRINGTON, DEPUTY ADMINISTRATOR FOR DEFENSE 
      NUCLEAR NONPROLIFERATION, NATIONAL NUCLEAR SECURITY 
              ADMINISTRATION, DEPARTMENT OF ENERGY

    [The prepared statement of Ms. Harrington follows:]

                 Prepared Statement by Anne Harrington

    Madam Chairman, Ranking Member Portman, and members of the 
subcommittee, thank you for opportunity to testify before you today on 
the President's fiscal year 2013 budget request for the National 
Nuclear Security Administration's (NNSA) Defense Nuclear 
Nonproliferation Programs. I will also share with you a brief summary 
of the successful achievements from the Nuclear Security Summit which 
concluded in Seoul, South Korea in March 2012.
    One of our most important missions at NNSA has been to support the 
administration's commitment to secure the most vulnerable nuclear 
material across the globe in 4 years. Our accomplishments in securing 
plutonium and highly-enriched uranium (HEU) around the world have made 
it significantly more difficult to acquire and traffic the materials 
required to make an improvised nuclear device, and I am proud to say 
that we are on track to meet our goals to remove or dispose of 4,353 
kilograms of HEU and plutonium in foreign countries, and equip 
approximately 229 buildings containing weapons-usable material with 
state-of-the-art security upgrades.
    The Defense Nuclear Nonproliferation budget request, and the 
National Defense Authorization Act for Fiscal Year 2013, as passed by 
the full Senate Armed Services Committee, provides the $2.46 billion 
needed to continue these and other critical nonproliferation and 
nuclear security efforts. Our continued focus on innovative and 
ambitious nonproliferation and nuclear security efforts is vital. The 
threat is not gone, and the consequences of nuclear terrorism and state 
proliferation would be devastating. Detonation of a nuclear device 
anywhere in the world would lead to significant loss of life, and 
overwhelming economic, political, and psychological consequences. We 
must remain committed to reducing the risk of nuclear terrorism and 
state-based proliferation.
    But there is no silver bullet solution, which is why we will 
continue to implement a multi-layered strategy to strengthen the 
security of nuclear material around the world by removing or 
eliminating it when we can; consolidating and securing it, if 
elimination is not an option; reducing the civilian use of HEU--
particularly for research and medical isotope production--where low-
enriched uranium options exist or can be developed; and maintaining our 
commitment to detecting and deterring nuclear smuggling. Many of you 
are familiar with the significant contributions that NNSA's Second Line 
of Defense program has made to the worldwide effort to combat nuclear 
trafficking. In light of the constrained budget environment that we 
find ourselves in, NNSA has initiated a strategic review of the program 
to evaluate what combinations of capabilities and programs make the 
most effective contribution to national security.
    We will continue to research and develop tools and technologies to 
detect the proliferation of nuclear materials as well as nuclear 
detonations. We will provide technical support and leadership to our 
interagency colleagues during the negotiation and implementation of 
arms control treaties, as we did with New START. We will expand on our 
ongoing efforts to strengthen the capabilities of our foreign partners 
to implement international nonproliferation and nuclear security norms, 
and support the critically important work of the International Atomic 
Energy Agency. We will continue to play a supporting role in the 
negotiation of Peaceful Nuclear Cooperation Agreements (so-called 123 
Agreements), which are so crucial for achieving our nuclear 
nonproliferation and trade objectives.
    The President's fiscal year 2013 budget request also keeps focus on 
our commitment to eliminate U.S. excess weapons materials and supports 
the Mixed Oxide Fuel Fabrication Facility and Waste Solidification 
Building at the Savannah River Site in South Carolina. The $569.5 
million committed to the MOX program and related activities this year 
will lead to the permanent elimination of enough plutonium for at least 
8,500 nuclear weapons, which will be matched by similar commitments by 
the Russian Federation. We have eliminated the line item for a Pit 
Disassembly and Conversion Facility from the MOX program, opting 
instead for a preferred alternative approach to producing feedstock 
that is much less costly by utilizing existing facilities at the 
Savannah River Site and Los Alamos National Laboratory.
    The President's proposed budget for fiscal year 2013 provides the 
funding necessary to carry out all of these activities; however, given 
the current fiscal constraints on all government agencies, we have 
stepped up our efforts to identify areas where our interagency partners 
and other nations can help share the costs associated with this 
important work. I am pleased to report that since Congress granted NNSA 
programs the ability to accept international contributions in fiscal 
year 2005, we have received nearly $80 million from Canada, the United 
Kingdom, Finland, South Korea, New Zealand, Norway, the Czech Republic, 
and the Netherlands. In addition, our nuclear and radiological security 
and Second Line of Defense activities with Russia have moved to a cost 
sharing basis with Russia assuming a growing share of the installation 
and sustainability costs of these projects. The full value of cost 
sharing with our international partners can be difficult to estimate 
precisely, but the financial, technical, and diplomatic resources that 
they bring to these efforts have enabled and accelerated important 
nuclear security efforts and saved the U.S. Government millions of 
dollars over the last several years.
    Nowhere is the positive impact of the international collaboration 
more demonstrated than in the Nuclear Security Summit process. The 
Nuclear Security Summit in Seoul issued a Communique, supported by 53 
Heads of State and Government, as well as representatives of the 
International Atomic Energy Agency (IAEA) and Interpol, all of which 
unanimously agreed that nuclear terrorism continues to be one of the 
most challenging threats to international security. Countries not only 
reported on their very substantial accomplishments since the Washington 
Nuclear Security Summit in 2010, they pledged additional actions to 
strengthen the IAEA; securing, accounting for, and consolidating 
nuclear materials; securing radioactive sources; enhancing the security 
of materials in transport; combating illicit trafficking; improving 
nuclear forensics capabilities; fostering a nuclear security culture 
through education and training; protecting sensitive information and 
enhancing cyber security measures; and engaging in international 
cooperation to achieve all of these goals. NNSA has been and will 
continue to be at the forefront of supporting efforts in all of these 
areas.
    Every country attending the Summit announced its accomplishments in 
a number of critical areas. Each statement in its own right was 
significant, but taken together they constitute a tremendous leap 
forward in the global effort to prevent nuclear terrorism. These 
achievements would not have been accomplished in such a short amount of 
time without the high-level attention that President Obama and his 
counterparts have focused on this issue. Some of the most impressive 
accomplishments announced at the Summit included: the United States, 
Mexico, and Canada working together to remove all HEU from Mexico; the 
United States, Russia, and Ukraine announcing the removal of the final 
HEU from Ukraine; and the removal of all plutonium from Sweden to the 
United States. As a result of these shipments, 22 countries have now 
been cleaned out of all HEU and Plutonium. It took 13 years to remove 
all special nuclear material from 13 countries prior to the President's 
April 2009 Prague speech announcing the 4-Year Effort. With the 
momentum of the Nuclear Security Summit process, 9 additional countries 
have been cleaned out of HEU and Plutonium, bringing the total to 22 
countries.
    A key to our efforts to reduce the threat of nuclear terrorism is 
minimizing the civilian use of HEU. Our agreement with Belgium, France, 
and the Netherlands to eliminate the use of HEU in medical isotopes 
production while concurrently assuring the reliable supply of these 
isotopes to patients in need, makes a meaningful contribution to this 
effort. The President also announced a previously secret program with 
Russia and Kazakhstan to remediate vulnerable nuclear material from the 
former Semipalatinsk Test Site. In addition, there were several key 
illicit trafficking deliverables, including the creation of counter 
nuclear smuggling teams in countries such as Jordan and a counter 
nuclear smuggling center of excellence in Lithuania. Finally, nearly 20 
countries also ratified key nuclear security and nuclear terrorism 
treaties: the Convention on the Physical Protection of Nuclear 
Materials and the International Convention on the Suppression of Acts 
of Nuclear Terrorism. There is much more to add, but this hopefully 
gives you a flavor of the positive and constructive framework that the 
Nuclear Security Summit process provides.
    In conclusion, I want to thank you for the opportunity to testify 
today on the NNSA's contributions to nuclear security. Working in 
concert with other U.S. Government programs and partners around the 
world, we are making concrete contributions to reducing the risk of 
nuclear terrorism and building a more secure future. Thank you for the 
tremendous support that our programs have enjoyed over the years from 
this committee and Congress. I welcome any questions you may have.

  STATEMENT OF KENNETH A. MYERS III, DIRECTOR, DEFENSE THREAT 
  REDUCTION AGENCY, DEPARTMENT OF DEFENSE; AND DIRECTOR, U.S. 
    STRATEGIC COMMAND CENTER FOR COMBATING WEAPONS OF MASS 
                          DESTRUCTION

    [The prepared statement of Mr. Myers follows:]

               Prepared Statement by Kenneth A. Myers III

                              INTRODUCTION

    Madame Chairwoman, Ranking Member Portman, and members of the 
subcommittee, it is an honor to be here today to address the programs 
and activities performed by the Defense Threat Reduction Agency (DTRA) 
and the U.S. Strategic Command Center for Combating Weapons of Mass 
Destruction (SCC-WMD). I serve as the Director of both DTRA and the 
SCC-WMD.
    The threat posed by Chemical, Biological, Radiological, and Nuclear 
(CBRN) weapons is one of the greatest security challenges facing our 
Nation and has the potential to undermine peace and stability around 
the globe. The May 2010 National Security Strategy of the United States 
of America cites reversing the spread of nuclear and biological weapons 
and the securing of nuclear materials as one of the Nation's six 
essential tasks to provide enduring security for the American people.
    The December 2002 National Strategy for Combating Weapons of Mass 
Destruction (NSPD-17), and the 13 February 2006 National Military 
Strategy to Combat Weapons of Mass Destruction further recognize the 
importance of cooperation with allies and other partners to prevent, 
deter, defend against, and respond to WMD threats. Most recently, the 
January 2012 Department of Defense (DOD) strategic guidance, entitled 
``Sustaining U.S. Global Leadership: Priorities for the 21st Century,'' 
included countering WMD (CWMD) as one of the ten primary missions of 
the U.S. Armed Forces. Furthermore, the ``Defense Budget Priorities and 
Choices'' document issued that same month stated that ``We [OSD] 
protected investment in this area (CWMD) and expanded its scope in the 
area of biological weapons.''
    The mission of DTRA and the SCC-WMD is to safeguard the United 
States and its allies from global WMD threats by integrating, 
synchronizing and providing expertise, technologies, and capabilities 
for reducing and eliminating WMD threats at their sources 
(Nonproliferation); deterring, interdicting, or defeating them 
(Counterproliferation); and and mitigating the consequences of their 
use (Consequence Management). Together we provide synergy and momentum 
for more effective and efficient implementation of national and 
department CWMD strategy and policy. We provide Counter WMD (CWMD) 
expertise and capabilities to a growing range of partners across DOD, 
the U.S. Government, and the international community. DTRA also 
combines science and technology with operational needs and 
requirements, providing capabilities tailored to the DOD operating 
environment. Additionally, DTRA provides support for the continued 
safety, security, and effectiveness of our nuclear deterrent, the 
importance of which was reaffirmed in the Defense Budget Priorities and 
Choices document.
    However, we could not do our job without the strong support of 
Congress and I thank you and your colleagues for fully approving the 
DTRA fiscal year 2012 budget request. I can assure you that we will be 
responsible stewards of the resources you have provided and the trust 
you have placed in us.

          DOD AND THE NATION'S EXPERT ON WMD THREAT REDUCTION

    DTRA and the SCC-WMD provide the core of the DOD and national 
expertise on the full scope of the CWMD mission. While many DOD and 
other U.S. Government organizations contribute to WMD threat reduction 
against a background of a broader mission scope, we focus full time on 
just CWMD. We are a policy and strategy implementation and execution 
team. We do not perform all functions in the CWMD mission, nor do we 
control all the resources or provide all of the capabilities.
    However, DTRA is the primary repository for the Nation's knowledge 
on the effects of Chemical, Biological, Radiological, Nuclear, and 
High-Yield Explosive (CBRNE), and in seamless partnership with the SCC-
WMD and in collaboration with others across the U.S. Government, 
performs unique CWMD responsibilities.
    Our activities and program span the full spectrum of the national 
CWMD strategy--from Nonproliferation through Counterproliferation to 
Consequence Management--and all eight of the military CWMD mission 
areas: Security Cooperation and Partner Activities, Threat Reduction 
Cooperation, Interdiction, Elimination, Offensive Operations, Active 
Defense, Passive Defense, and Consequence Management.
    Our responsibilities also require that we perform CWMD research and 
development for, and provide CWMD operational support to, the combatant 
commands (COCOMs). DTRA Research, Development, Test and Evaluation 
(RDT&E) programs combine Science and Technology (S&T) with operational, 
needs, requirements, and operating concepts, delivering capabilities 
that better enable the warfighters to counter WMD threats. In so doing, 
we also help shape concepts of operation, and the tactics, techniques, 
and procedures that forces in the field employ.
    This requires us to have a firm understanding of the environments 
in which DOD would perform its CWMD responsibilities. Many on our staff 
have military backgrounds and we also depend heavily on the 37 percent 
of our workforce provided by the Armed Forces. Our uniformed personnel 
keep us current on operational needs and procedures, and their 
assignments to DTRA and the SCC-WMD also provide a critical way for the 
Services to maintain their own CWMD expertise.
    Because our S&T and operational support responsibilities are 
intertwined, DTRA has a unique workforce with a wide range of 
professional disciplines that collaborate on CWMD challenges. DTRA 
microbiologists, computer scientists, health physicists, structural 
dynamics experts, and Special Operations Forces personnel work together 
on a daily basis to solve WMD-related challenges. Our nuclear experts 
are supporting efforts from global nuclear weapons lockdown, protection 
of our nuclear deterrent, and the hardening of U.S. Nuclear Command, 
Control, and Communications against nuclear weapons effects, to nuclear 
weapons employment plans. Our biologists are consolidating and 
improving the security of dangerous pathogen collections across the 
planet, working cooperatively with international partners to counter 
emerging infectious diseases, and developing new means for protecting 
our military personnel against biological terrorism and naturally 
occurring diseases. Our chemical weapons experts are assisting with the 
elimination of chemical weapons in the United States and Russia; 
developing means for improved force protection; and are working on 
policies, actions, and procedures that will ensure decontaminated air 
transport airframes are in fact safe for continued use. DTRA structural 
dynamics experts are working on solutions to hold underground WMD 
facilities at risk while also developing new means for mitigating blast 
effects resulting from vehicle-borne improvised explosive devices.
    Our workforce performs CWMD planning and exercise support, and 
provides CWMD expertise to the combatant commands and other U.S. 
Government customers. However, our CWMD S&T development is conducted 
differently. We do not have our own laboratory. Instead, we select from 
the full range of national expertise, wherever that may be. Our 
performers include the DOD and Department of Energy/National Nuclear 
Security Administration (DOE/NNSA) labs, contractors, federally Funded 
Research and Development Centers, University-Associated Research 
Centers, and academia. Our technical and operational experts provide 
direction and oversight for these performers and we select S&T 
performers on the basis of ``best of breed.''
    The contributions of the DTRA/SCC team are made daily at national, 
theater, and battlefield levels. For example, during the negotiations 
on the New Strategic Arms Reduction Treaty (New START), DTRA 
interpreters and onsite verification experts comprised 15 of the 56-
members of the U.S. negotiating team in Geneva. In addition, DTRA has 
conducted vulnerability assessments of the White House, the Capitol, 
and national-level command and control infrastructure. The Combatant 
Commanders rely upon us for CWMD planning and exercise support, 
training, and augmentation of their internal subject matter expertise 
to assist their CWMD efforts from theater security cooperation through 
warfighting and WMD elimination. We provide ``boots on the ground'' in 
hostile and uncertain environments to conduct vulnerability 
assessments, assist current military operations, and provide CWMD 
training. We are simultaneously and continuously addressing strategic, 
operational, and tactical level CWMD challenges. Our customer base 
continues to grow, as do the expectations of those we serve and 
support.

                             RELATIONSHIPS

    DTRA's roots reach to the early days of the Cold War when its 
predecessor organizations provided planning, technical, and operational 
nuclear weapons expertise to the Military Services, U.S. Strategic 
Command (STRATCOM), and that command's predecessors. Over the decades, 
our understanding of weapons effects has expanded from nuclear/
radiological to the full range of WMD effects, adding chemical, 
biological, and high-yield explosives to our portfolio of WMD effects 
expertise.
    The agency performs its mission in response to direction provided 
by the Office of the Secretary of Defense (OSD). As the Director of 
DTRA, I report through Mr. Andrew Weber, the Assistant Secretary of 
Defense for Nuclear, Chemical, and Biological Defense Programs, to the 
Under Secretary of Defense for Acquisition, Technology, and Logistics. 
Because DTRA performs S&T, we also work in close partnership with the 
Assistant Secretary of Defense for Research and Engineering. Since the 
DTRA/SCC-WMD team implements DOD and national security policy, and 
often with international partners, we are partnered with the Assistant 
Secretary of Defense for Global Strategic Affairs in the Office of the 
Under Secretary for Policy at OSD, and also work in collaboration with 
the Department of State.
    DTRA is also the DOD Combat Support Agency charged with providing 
CWMD expertise and support to the Joint Chiefs of Staff, the Military 
Services, and the combatant commanders. While we serve all combatant 
commanders, we work most closely with the six Geographic Combatant 
Commanders (GCCs), STRATCOM, and the U.S. Special Operations Command.
    Given the catastrophic nature of the WMD threat, timely and 
accurate intelligence is fundamental to preventing and attributing WMD 
attacks. A close relationship between WMD experts and the Intelligence 
Community is essential.
    Because the CWMD mission requires whole-of-government solutions, 
DTRA works closely with NNSA, the Department of Homeland Security 
(DHS), and Department of Health and Human Services (HHS), in particular 
leveraging our collective S&T investments and ensuring collaboration 
between our programs and activities. While DTRA, NNSA, DHS, and HHS 
share an interest in WMD-related science, the DOD application of that 
science is quite different from that of DHS as DOD forces must deploy 
and operate in unstable or hostile military environments at great 
distances from supporting infrastructure and logistical support. The 
military forces that we support face space, volume, and weight 
limitations, and must be easily deployable, supportable, reliable, 
rugged and survivable, yet simple to use.

                     DTRA AND STRATCOM PARTNERSHIP

    Since the early days of the Cold War, DTRA's predecessor 
organizations have had an extremely close and strong partnership with 
STRATCOM's predecessors on the nuclear mission. Seven years ago, that 
partnership was expanded to include the CWMD mission. In late 2005, the 
Secretary of Defense assigned the Commander, STRATCOM (CDRSTRATCOM) 
responsibility for integrating and synchronizing DOD CWMD efforts in 
support of U.S. Government objectives. The CDRSTRATCOM, turned to DTRA 
for its CWMD expertise and established the SCC-WMD alongside the agency 
at Fort Belvoir, VA, to leverage the agency's expertise and provide a 
seamless bond between the two organizations. On 31 January 2006, the 
Secretary of Defense assigned the DTRA Director to serve in the 
additional capacity as the Director, SCC-WMD, under the authority, 
direction, and control of the CDRSTRATCOM.
    The SCC-WMD supports STRATCOM's assigned CWMD Unified Command Plan 
(UCP) responsibilities:

         Synchronizing planning for DOD CWMD efforts;
         Advocating for CWMD capabilities;
         Providing military representation to U.S. national 
        agencies, U.S. commercial entities, and international agencies 
        related to CWMD, as directed;
         Integrating Theater Security Cooperation activities, 
        deployments, and capabilities that support campaigns to combat 
        WMD, as directed by CDRSTRATCOM;
         Developing and maintaining a global CWMD concept of 
        operations;
         Coordinating global CWMD operations support;
         Planning against designated CWMD threats; and
         Executing CWMD operations, as directed.

    The CDRSTRATCOM has delegated Coordinating Authority to the SCC-WMD 
Director for synchronized planning of DOD-wide CWMD efforts in support 
of STRATCOM UCP missions. The major functions performed by the SCC-WMD 
are planning synchronization across geographic boundaries; 
identification and assessment of CWMD capability requirements; and 
promoting a unified approach across the U.S. Government.
    On 3 February 2012, at the STRATCOM-sponsored biannual CWMD Global 
Synchronization Conference, a new CWMD mission component, the Standing 
Joint Force Headquarters for Elimination (SJFHQ-E) was activated to 
provide a needed enabling capability to eliminate WMD in hostile and 
uncertain environments. Appreciation for the need for such an 
organization was an outgrowth of our experiences in Iraq beginning in 
2003, and the requirement was established in the 2006 and 2010 DOD 
Quadrennial Defense Reviews. This new headquarters will be a full-time, 
fully trained, scalable, deployable, joint command and control element 
able to quickly integrate into an operational headquarters such as a 
GCC or Joint Task Force (JTF) headquarters. As the core of a JTF-E HQ, 
the SJFHQ-E, appropriately augmented, will enable command and control 
of the fielded WMD elimination forces attached to the JTF. Initial 
operational capability is planned for January 2013 with full 
operational capability to be achieved by the end of that year. The 
SJFHQ-E will be co-located with DTRA and the SCC-WMD at Fort Belvoir, 
VA. The SCC-WMD Deputy Director, Air Force Major General Eric Crabtree, 
will be dual hatted as the Commander of the SJFHQ-E. Major General 
Crabtree will report to General Kehler in his role as SFJHQ-E 
Commander, and he will continue report to me in his role as the SCC-WMD 
Deputy Director.
    Together, DTRA, the SCC-WMD, and the SJFHQ-E will provide a more 
capable DOD CWMD team that is better integrated within overall U.S. 
Government CWMD community. They will leverage and maximize skills, 
expertise, capabilities, and resources across all, and think and act as 
an integrated CWMD team.

                            NONPROLIFERATION

    DTRA and SCC-WMD perform several major nonproliferation programs 
and activities.
Nunn-Lugar Cooperative Threat Reduction Program
    The Nunn-Lugar Cooperative Threat Reduction Program's overarching 
mission is to partner with willing countries to reduce the threat from 
WMD and related materials, technologies, and expertise. The program 
focuses on eliminating, securing, or consolidating WMD, related 
materials, and associated delivery systems and infrastructure, at their 
source in partner countries. It also builds partnership capacity to 
prevent the proliferation of WMD materials across borders.
    Since its enactment into law in the National Defense Authorization 
Act for Fiscal Year 1993, the Nunn-Lugar program has proven highly 
effective. It enabled the elimination of nuclear weapons from Belarus, 
Kazakhstan, and Ukraine, ensuring that Russia would be the only 
nuclear-armed successor state to the Soviet Union. As of 29 February 
2012, the assistance provided through this program has deactivated 
7,619 nuclear warheads; destroyed 793 Intercontinental Ballistic 
Missiles (ICBM), 191 ICBM mobile launchers, 906 air-launched cruise 
missiles, and 33 nuclear-powered submarine-launched ballistic missile 
(SLBM) submarines (SSBNs); eliminated 498 ICBM silos, 155 bombers, 492 
SLBM launchers, and 680 SLBMs; sealed 194 nuclear test tunnels and 
holes; destroyed 2,803.5 metric tons of declared Chemical Weapon 
agents; safely and securely transported 562 nuclear weapons train 
shipments; upgraded 24 nuclear weapons storage sites; and built and 
equipped 38 Biological Threat Reduction Zonal Diagnostic Laboratories.
    Although Nunn-Lugar activities in Russia continue, the program is 
evolving in accordance with the National Defense Authorization Act for 
Fiscal Year 2008 to address emerging security challenges and urgent 
threats in regions of the world beyond the Former Soviet Union (FSU). 
Today, the Nunn-Lugar CTR Program supports a layered defense approach 
to countering WMD threats, builds strategic relationships with key 
international partners that enhance threat reduction on a global scale; 
and support the resilience of the global nonproliferation framework by 
building partnership capacities to enforce the tenants of that 
framework. The program is expanding its activities beyond the FSU, and 
promoting cooperative biological engagement, security, and early 
warning in East Africa and South Asia, and is currently authorized to 
operate in Russia, Ukraine, Armenia, Azerbaijan, Georgia, Uzbekistan, 
Afghanistan, China, India, Pakistan, Iraq, Djibouti, Kenya, Tanzania, 
Uganda, Burundi, and Rwanda.
    Strategic Offensive Arms Elimination
    Projects in Russia include ICBM (SS-25, SS-18, and SS-19) and SS-N-
18 SLBM elimination; SS-18 and SS-19 silo and launch control center 
elimination; and dismantlement of nuclear reactor core and missile 
launcher sections of Delta III-class and Typhoon-class SSBNs. 
Additionally, this project assists Ukraine with the storage and 
elimination of rocket motors from dismantled SS-24 ICBMs.
    Chemical Weapons Destruction
    Russia, as a state party to the Chemical Weapons Convention (CWC), 
is obligated to eliminate its stockpile of over 40,000 metric tons of 
chemical weapons (CW). The United States, Russia, and other 
international partners funded construction of the Shchuch'ye Chemical 
Weapons Destruction Facility (CWDF). Russia began CW destruction 
operations at this facility in March 2009. DOD continues to provide 
technical support to this effort through the Nunn-Lugar Program. As of 
31 December 2011, 2,601.8 metric tons of CW agents have been destroyed. 
Russia also is constructing with its funds a similar CWDF at Kizner, 
with a completion date in late 2012. The DOD has agreed to provide the 
Kizner CWDF with technical support similar to that provided at 
Shchuch'ye.
    Global Nuclear Security
    This project provides assistance for the improved security of 
Russian nuclear weapons and at-risk material rail shipments and 
storage. It also helps establish Centers of Excellence with partner 
countries to enhance training capability, consistent with international 
best practices, for nuclear security, material control, and inventory 
management. This effort is closely coordinated with other related U.S. 
Government activities and international governmental and non-
governmental organizations. Through an unprecedented partnership with 
Russia and Kazakhstan hundreds of kilograms of weapons-usable nuclear 
material was secured at the former Soviet Semipalatinsk Test Site in 
Kazakhstan.
    Cooperative Biological Engagement
    This project implements the National Security Staff directed policy 
priorities for countering biological threats. Cooperative Biological 
Engagement (CBE) is the largest effort within the Nunn-Lugar CTR 
program and involves a growing number of international partner states 
across Europe, Asia, and Africa. It responds to the threat of state and 
non-state actors acquiring biological materials and expertise that 
could be used to develop or deploy a biological weapon. The program 
destroys or secures Especially Dangerous Pathogens (EDPs) at their 
source, builds partner capacity to sustain a safe, secure, disease 
surveillance system to detect, diagnose, and report EDP breakouts, and 
to work collaboratively with partner country scientists in engagements 
that support the ethical application of biotechnology to a better 
understanding of endemic EDPs and their control and prevention. The CBE 
leverages the expertise, capabilities, and international access of 
other U.S. Government departments and agencies, international partners, 
and the private sector, and provides tailored approaches that 
recognize, build upon, and enhance regional and partner countries' 
indigenous capacities. For relatively small investments, this program 
delivers a high return by improving biological safety and security; 
improving disease surveillance, detection, diagnosis, reporting, and 
response capabilities; and increasing cooperative biological research 
and engagement.
    Proliferation Prevention
    This project enhances the capability of non-Russian FSU states and 
other partner countries to deter, detect, report, and interdict illicit 
trafficking of WMD and related materials across international borders. 
It is coordinated with the DOD International Counterproliferation 
Program and other U.S. Government border security programs, and 
furthers interagency collaborations that contribute to a holistic 
approach to export control, border security, and law enforcement-
related capacity building efforts.
    Threat Reduction Engagement
    This project funds relationship building engagements intended to 
advance the Nunn-Lugar CTR mission. Specific activities include non-
proliferation and counterproliferation symposia or workshops; bilateral 
or regional CTR-related symposia; high-level exchanges or planning 
activities; and tabletop exercises. Although historically focused on 
engagement with foreign military organizations, engagement is 
increasing with foreign civilian organizations and entities, primarily 
for supporting CBE and improving border security.

Arms Control
    DTRA performs several critical arms control mission 
responsibilities related to on-site inspections and monitoring. Onsite 
inspection is not the sole mechanism for verification, but one part of 
a system of complementary reinforcing measures that include National 
Technical Means (NTM) of verification; periodically exchanged data on 
weapon systems and facilities; regular notifications updating this 
data; on-site inspections; and a compliance and implementation body.
    Onsite inspection was a key component of the verification 
frameworks of the Intermediate-Range Nuclear Forces Treaty (INF), and 
the Strategic Arms Reduction Treaty (START), and now, remains a key 
component of the New START Treaty. Such inspections provide eyes-on 
evaluation of the facilities and systems to confirm that what has been 
reported in data exchanges are actually what exists at individual 
sites; access and perspective not achievable through data exchange and 
NTM alone; and a deterrent to misreporting data or cheating by 
including a short-notice inspection regime that each side knows 
provides the other to spot-check declarations and discover 
discrepancies between what has been reported and facts on the ground. 
Although DTRA inspectors provide the eyes on site, DTRA does not make 
verification or compliance judgments. Our inspectors observe, document, 
and report the factual findings of inspection activities to the U.S. 
Government interagency policy community, who uses that information to 
determine treaty compliance.
    Additionally, DTRA is responsible for coordinating and conducting 
the escort of foreign inspection teams for inspections or continuous 
monitoring activities in the United States and at U.S. facilities 
overseas.
    Because DTRA has extensive experience with onsite inspections and 
monitoring under the INF Treaty and the START treaty, U.S. policymakers 
and treaty negotiators concerned with the development, implementation, 
or evaluation of compliance with arms control treaty provisions 
consistently call on the agency's technical and operational experience. 
The DTRA team supporting the U.S. delegation at the New START 
negotiations in Geneva provided years of arms control implementation 
expertise and negotiating experience, linguistic ability, and 
administrative support to the delegation as a whole and to the chief 
negotiator, Ms. Rose Gottemoeller, the acting Under Secretary of State 
for Arms Control and International Security, and the assistant 
Secretary of State for Arms Control, Verification, and Compliance. DTRA 
personnel fulfilled key roles in the negotiating working groups on 
Inspection Activities, Conversion and Elimination, and Treaty Articles 
and Definitions, and played a critical part in the development of those 
portions of the new treaty. DTRA military linguists augmented the 
language support staff at the U.S. Mission, providing much-needed help 
in translating the large number of negotiating documents, and were 
frequently called on to interpret for high profile or technically 
oriented meetings due to their exceptional language abilities and 
precise knowledge of arms control terms. In addition, DTRA personnel 
continue to support the Bilateral Consultative Commission in Geneva as 
discussions are undertaken to fine tune the implementation process.
    The agency spent a full year prior to New START entry into force 
preparing itself, as well as U.S. facilities subject to inspection, for 
treaty implementation. This effort involved comprehensive internal 
training sessions which utilized experienced personnel from both the 
INF and START Treaties to adapt over 20 years of onsite inspection 
experience into the DTRA implementation plan for New START. DTRA 
conducted mock inspections or staff assistance visits at each major 
U.S. facility subject to inspection to ensure a smooth implementation 
process once New START entered into force.
    During the New START Treaty's first year in force, DTRA conducted 
the full annual quota of 18 inspection missions in the Russian 
Federation and provided escort functions for 18 Russian inspections 
conducted in the United States. DTRA inspectors also participated in 
one exhibition of a Russian ICBM and two exhibitions of U.S. heavy 
bombers.
    In all, DTRA performed 276 arms control treaty and agreement 
related missions in fiscal year 2011; is planning to conduct 320 such 
missions in fiscal year 2012; and anticipates performing 340 in fiscal 
year 2013.
    The agency also acquires and fields technology capabilities 
required to implement, comply with, and allow full exercise of U.S. 
rights and prerogatives under existing arms control treaties and 
agreements, and in support of the administration's arms control goals. 
Despite the technology available, to date the equipment used for onsite 
inspections remains low-tech. Current equipment includes tape measures, 
#2 pencils, small notepads, and reference photos to determine the type 
of item being inspected. Limited use of radiation detection equipment 
during the New START treaty inspections is allowed only to prove that 
an object is non-nuclear. The counting of deployed warheads is limited 
to counting covered objects declared to be warheads and placed on a 
deployed missile or bomber. There are no photographic confirmation, 
measurement, or radiation detection equipment provisions for the 
nuclear weapons. Future onsite inspection equipment must be 
manportable, robust, and easy to use. Such equipment must be well 
understood by all parties, but will likely need to be as minimally 
invasive as possible. This could require joint development or 
certification and/or use by a neutral international body. Reliable and 
trusted procedures still will be needed to allow parties to 
authenticate and functionally check the equipment prior to use.

International Counterproliferation Program
    The DOD is the lead agency for, and partnered with the Federal 
Bureau of Investigation and DHS, on the International 
Counterproliferation (ICP) Program, a program that is the primary tool 
for the COCOMs to apply in their theater security cooperation strategy 
to combat trafficking of WMD and related materials. The program 
provides specialized training designed for foreign officials involved 
with border security, customs, and law enforcement. Some training 
courses include critical equipment packages to enhance the capacity of 
partner countries to deter, detect, investigate, and respond to the 
attempted proliferation of WMD. Training is sustained with periodic 
local and regional WMD Integrated Exercises which enable students to 
use program skills and equipment within a realistic training 
environment. ICP program partners span the Baltic States, the Caucuses, 
Eastern Europe, the Balkans, and Central Asia. In September 2011, the 
Secretary of Defense approved ICP program engagement with new partners 
in South Asia, Southeast Asia, and Africa (excluding Egypt). 
Additionally, the ICP is incorporating cost-saving efficiency measures 
such as shifting from bilateral to regional engagement, combining 
events into single missions, and reducing the cost of equipment 
provided by the program.

Proliferation Security Initiative
    DTRA and the SCC-WMD support GCC and U.S. Government participation 
in international cooperative activities under the Proliferation 
Security Initiative (PSI), an international effort by 98 countries to 
stop trafficking of WMD, their delivery systems, and related materials 
to and from states and non-state actors of proliferation concern. These 
activities have been centered upon cooperative maritime interdiction of 
illicit WMD trafficking. The SCC-WMD operates the PSI Support Cell with 
DTRA assistance to increase COCOM staff and partner nations' 
understanding of and support for the PSI by providing subject matter 
expertise during exercise and activity planning and execution.

Small Arms and Light Weapons
    DTRA supports nonproliferation efforts to assess, reduce, and 
secure stockpiles of Small Arms and Light Weapons (SALW) worldwide by 
supporting the DOS Office of Weapons Removal and Abatement. This 
program helps foreign governments ensure that Manportable Air Defense 
Systems, small arms and light weapons, conventional ammunition, and 
other ordnance are properly secured, and managed, and that excess 
stockpiles are destroyed. DTRA SALW teams perform assessments, provide 
technical advice, and share U.S. best practices through training and 
seminars.

Regional Security Engagement Program
    Through the Regional Security Engagement (RSE) Program, DTRA 
creates regional networks with shared understanding and approaches to 
countering WMD threats that implement common counterproliferation goals 
by leveraging existing resources. This program supports the development 
of a shared regional threat picture; the development and use of common 
methods for risk analysis and targeting; the development of a common 
indicator and warning methodology; the identification of regional gaps/
overlaps of CWMD capabilities; and the reinforcement of existing 
information-sharing mechanisms. Additionally, the program integrates 
partner states into the global counterproliferation community while 
supporting COCOM CWMD theater campaign plans. Pilot events were held in 
December 2010 and April 2011. Four events are planned for 2012 and 
eventually six suited to COCOM needs on an annual basis

Planning and Plans Coordination
    The DTRA/SCC-WMD contribution to nonproliferation includes a wide 
range of plans and planning development support, coordination, and 
synchronization across DOD and with other U.S. Government 
organizations. For example, planning synchronization across geographic 
boundaries is achieved through STRATCOM's biannual Global 
Synchronization Conferences and regional CWMD campaign plans, among 
other means.

            COUNTERPROLIFERATION AND CONSEQUENCE MANAGEMENT

    Nonproliferation is only part of the larger DTRA/SCC-WMD effort and 
we also perform counterproliferation and consequence management 
activities. Our counterproliferation programs deter and defeat WMD use 
and we are providing capabilities for some of the most challenging CWMD 
mission needs including:

         Capabilities to detect, track, and interdict WMD in 
        hostile and uncertain environments at great distances from our 
        homeland;
         Sensors, novel energetic materials and weapon design 
        technologies, and operational concepts to hold at risk WMD and 
        WMD-related facilities, including those deeply underground; and 
        the
         Protection of people, systems, and infrastructure from 
        WMD effects.

    Over the past year, we have made significant achievements in the 
areas of counterproliferation and consequence management:

         Assisted activation of the STRATCOM SJFHQ-E to support 
        the elimination of WMD in hostile and uncertain environments.
         Responded to 1,695 requests in fiscal year 2011 for 
        Reach Back support from a wide-range of DOD and other U.S. 
        Government customers with the top five customers being U.S. 
        Pacific Command (PACOM), U.S. Africa Command, STRATCOM, the 
        National Guard, and the Navy.
         Conducted 17 surety inspections of nuclear capable 
        units in fiscal year 2011; a similar number are planned for the 
        current fiscal year; and 18 are planned for fiscal year 2013.
         Provided continuous high-level nuclear policy support 
        analysis for a wide range of senior-level DOD and other U.S. 
        Government organizations and oversight committees in sustaining 
        and modernizing the nuclear deterrent force and countering the 
        nuclear threat.
         Conducted 30 nuclear weapons accident and incident 
        exercises and seminars in fiscal year 2011; planning to conduct 
        a similar number in fiscal year 2012; and anticipate performing 
        29 in fiscal year 2013.
         Conducted 39 consequence management exercises and 
        seminars in fiscal year 2011; planning to conduct 40 in fiscal 
        year 2012; and anticipate performing 40 in fiscal year 2013.
         Initiated the Consequence Management Assessment 
        Program (CMAP) in fiscal year 2012 to assist the COCOMs in 
        building consequence management capacity in select partner 
        states by increasing the tactical training and operational 
        capabilities of partner nations to effectively respond to WMD 
        incidents, supporting COCOM requirements to aid partner nations 
        to effectively respond to WMD, and building partnership 
        capacity to prevent WMD proliferation. Under this program, DTRA 
        and U.S. Central Command are conducting planning and training 
        events in Bahrain, Jordan, and the United Arab Emirates 
        throughout this fiscal year. Additionally, DTRA is working with 
        PACOM to expand CMAP activities into its area of responsibility 
        beginning in fiscal year 2013. Nine CMAP events will take place 
        in fiscal year 2012 and 24 are anticipated in fiscal year 2013.
         Conducted 88 vulnerability, survivability, and Red 
        Team assessments and training events in fiscal year 2011. This 
        number will grow to 101 in fiscal year 2012 and 106 in fiscal 
        year 2013.
         Supported Operations Odyssey Dawn/Unified Protector 
        and Tomadachi concurrently in fiscal year 2011 and will 
        maintain a focus on potential WMD events in the Middle East and 
        Asia.
         Continued to support Air Force testing of the Massive 
        Ordnance Penetrator in support of fielding in fiscal year 2012.
         Demonstrated optimized dual and multiple delivery of 
        hardened target defeat capabilities.
         Continued to support Bio-Response Testing and 
        Evaluation with DOD, Environmental Protection Agency, DHS, CDC, 
        and FBI partners.

                        NUCLEAR SUPPORT MISSION

    DTRA also performs essential support functions for sustaining and 
safe, secure, and effective U.S. nuclear deterrent. These include 
providing targeting support to STRATCOM; management of the nuclear 
stockpile accounting and tracking system; independent Nuclear Safety 
and Security Inspections for the Secretary of Defense and Chairman, 
Joint Chiefs of Staff; development of technologies and operational 
concepts for protecting our nuclear weapons and conducting tests of 
nuclear security policies; nuclear weapons familiarization training; 
and maintenance and logistical assistance.

             FISCAL YEAR 2013 DTRA BUDGET REQUEST OVERVIEW

    The DTRA budget request for fiscal year 2013 is $1.474 billion as 
follows: $443.382 million in Operations and Maintenance (O&M), Defense-
wide funding; $13.146 million in Procurement, Defense-wide funding; 
$498.194 million in Research, Development, Test, and Evaluation 
(RDT&E), Defense-wide funding; and $519.111 million for the Nunn-Lugar 
CTR program. I also urge your support for the $511.6 million requested 
for the DOD Chemical and Biological Defense Science and Technology 
(CBDP S&T) Program, which DTRA executes. Details and highlights for 
these requests follow.

Operations and Maintenance Funding
    Nearly 60 percent of DTRA O&M funding directly supports warfighters 
and national missions as it pays for planning, training, exercises, 
conferences, and other means for collaboration across DOD and the U.S. 
Government, and with international partners. Consistent with OSD 
direction, we have taken steps to reduce O&M funding for Temporary Duty 
(TDY); however, the nature of the CWMD mission necessitates a 
relatively high level of TDY funding for efficient and effective 
support to the Combatant Commanders including augmentation of their 
limited on-site expertise, the conduct of arms control treaty 
inspection and escort missions, the building of partnership capability 
with our allies and friends around the globe, the operation of the 
Defense Nuclear Weapons School that provides CWMD and nuclear mission 
training, and the performance of safety and security inspections and 
assessments of our nuclear deterrent. O&M funding is the fuel that 
enables us to reach out to our components and personnel, the 
warfighters, and international partners across the globe. Reductions to 
our O&M request would necessitate cutbacks in essential support that we 
uniquely provide.
    The requested O&M funding would be applied as follows:

         Nonproliferation Activities ($71.718 million) for arms 
        control activities including the conduct of U.S. Government 
        inspections of foreign facilities, territories, or events; 
        coordination and conduct of the escort of inspection teams for 
        inspections or continuous monitoring activities in the United 
        States and at U.S. facilities overseas; and the acquisition and 
        fielding of technology capabilities required to implement, 
        comply with, and allow full exercise of U.S. rights and 
        prerogatives under existing and projected arms control treaties 
        and agreements. Treaties, agreements, and other 
        nonproliferation programs to be supported by this funding 
        include: New START, CFE, CWC, OS, ICP, CFE Adapted, Plutonium 
        PPRA, SALW, International Atomic Energy Agency (IAEA) 
        Additional Protocol, DTIRP, and the RSE Program.
         WMD Combat Support and Operations ($174.332 million) 
        for a wide range of combat and warfighter support to the Joint 
        Chiefs of Staff, the COCOMS, and military forces as they engage 
        the WMD threat and challenges posed to the United States, its 
        forces and allies. DTRA supports the essential WMD response 
        capabilities, functions, activities, and tasks necessary to 
        sustain all elements of operating forces within their area of 
        responsibility at all levels of war. DTRA supports OSD 
        oversight of DOD nuclear matters by performing stockpile 
        tracking; conducting nuclear surety inspections; and providing 
        advice and support for maintenance, safety, Joint Nuclear 
        Weapon Publications, logistics, policy, planning, training, and 
        exercises. The agency provides the Combatant Commanders with 
        deployable Technical Support Groups that support and assist 
        COCOM designated search forces. This budget also funds DTRA's 
        24 hour/7 day Technical Reach Back and Operations Center 
        capability. Technical Reach Back is provided by a core group of 
        specialized CBRNE trained subject matter experts that provide 
        decision-response and support capability for deliberate, 
        crisis, and immediate planning and operations to first 
        responders, National Guard WMD Civil Support Teams, COCOMs, 
        OSD, the Joint Staff, the Intelligence Community, command 
        elements, and Federal, state, and local government 
        organizations. Most of these requests require modeling a 
        variety of operational and exercise scenarios related to WMD. 
        Additionally, DTRA serves as the Program Manager for the 
        Foreign Consequence Management (FCM) Exercise program that 
        creates a series of exercises that prepare Geographic Combatant 
        Commanders (GCCs) to respond to foreign WMD attacks or the 
        accidental release of radiological or toxic materials. This 
        request also funds the supporting CMAP. The Balanced 
        Survivability Assessment Program conducts mission vulnerability 
        and continuity assessments of critical and vital U.S. and 
        allied national/theater mission systems, networks, 
        architectures, infrastructure, and assets; our Red Team 
        provides a unique assessment capability simulating an 
        independent, multidisciplinary adversary and performs all 
        assessments from an adversarial perspective emulating threats 
        ranging from well-funded terrorist organizations to foreign 
        intelligence services; and the Joint Staff Integrated 
        Vulnerability Assessments advise the Services, COCOMs, and DOD 
        agencies on facility vulnerability to terrorist operations and 
        the means of reducing mass casualties and damage to mission-
        essential materials. The Defense Threat Reduction University 
        (DTRU), located on Kirtland Air Force Base, NM, is composed of 
        the Defense Nuclear Weapons School (DNWS), the Defense Threat 
        Reduction Information Analysis Center (DTRIAC), and the 
        Publications and Strategic Studies Branch. DNWS is the only DOD 
        school for courses that familiarize the U.S. nuclear community 
        with the national nuclear weapons stockpile and the nuclear 
        weapons program and also provides training on nuclear and 
        radiological incident command and control, incident response, 
        and WMD effects modeling for DOD, Federal, State, and local 
        agencies. The DTRIAC is the key DOD source of information and 
        analysis on nuclear weapons effects. Its information collection 
        has over three million records; over two million still photos; 
        and over ten million feet of video. If not preserved, these 
        important items will be lost forever due to treaty-based 
        restrictions on nuclear testing. The Publications and Strategic 
        Studies Branch is DTRA's focal point for review and updates to 
        Joint Doctrine, publication of Lessons Learned, and 
        implementation of the Joint Training Systems through the annual 
        publication of the Joint Training Plan.
         U.S. Strategic Command Center for Combating WMD 
        ($12.389 million) for DTRA direct support to the SCC-WMD 
        including development of tools; providing strategic and 
        contingency planning, policy, and analytical support; 
        developing interagency relationships; and working closely with 
        STRATCOM partners to establish the means for assessing and 
        exercising capabilities to combat WMD. DTRA's efforts focus on 
        enhancing global WMD situational awareness and providing for 
        the development and maintenance of a worldwide common operating 
        picture. The agency also provides access and connectivity to 
        CWMD expertise critical for strategic and contingency planning, 
        facilitates the integration of DTRA-unique capabilities, and 
        provides situational awareness for integrating and 
        synchronizing efforts across DOD to support national CWMD 
        objectives. What appears to be a considerable reduction in this 
        year's request from the $25.253 million authorized and 
        appropriated by Congress for fiscal year 2012 actually is a 
        realignment of $9.970 million for Technical Reach Back and 
        Operations Center mission execution to the Combat Support and 
        Operations sub-activity group, and the realignment of $3.363 
        million for Agency Strategic Planning activities to the Core 
        Mission Sustainment sub-activity group. These realignments do 
        not change the level of support DTRA historically has provided 
        to the SCC-WMD.
         Core Mission Sustainment ($184.943 million) for a wide 
        range of enabling capabilities which provide the necessary 
        resources to support all DTRA mission essential functions. The 
        requested amount provides for the management of a total mission 
        portfolio that exceeds $3 billion. Activities specifically 
        funded by this account include information management; resource 
        management; security and asset protection; acquisition and 
        logistics management; strategic planning; strategic workforce 
        planning; hiring and retention incentives; leadership and 
        professional development; and providing the safety, security, 
        and efficiency necessary for mission success. In recent years, 
        DTRA has increased investment in its Information Technology 
        systems to provide secure and dependable connectivity for 
        global mission execution.

Nunn-Lugar Cooperative Threat Reduction
    The request of $519.111 million for this important program would be 
used as follows:

         Strategic Offensive Arms Elimination ($68.271 million) 
        for elimination of Strategic Offensive Arms in Russia and the 
        storage and elimination in Ukraine of rocket motors from 
        dismantled SS-24 ICBMs. Specifically in Russia, the funding 
        would eliminate 4 SS-18, 11 SS-19, and 24 SS-25 ICBMs; 
        eliminate 15 SS-18 silo launchers and launch control centers; 
        dismantle and eliminate 11 SS-19 silo launchers and launch 
        control centers; eliminate 27 SS-25 road-mobile launchers; 
        eliminate 4 SS-N-18 SLBMs; dismantle nuclear reactor cores and 
        launcher sections of one DELTA III-class SSBN and eliminate 16 
        SLBM launchers; and continue dismantlement of nuclear reactor 
        cores and launcher sections of one Typhoon-class SSBN and 
        eliminate 20 SLBM launchers.
         Chemical Weapons Destruction ($14.630 million) for 
        technical support to the Russian chemical weapons destruction 
        operations at the Shchuch'ye CWDF and, as recently decided by 
        OSD, the Kizner CWDF.
         Global Nuclear Security ($99.789 million) for 
        improving Russian capacity to sustain 18 nuclear weapons 
        storage sites, and the sustainment of 5 rail transfer points 
        and 2 regional security training centers; transportation of 
        approximately 48 trainloads of deactivated nuclear warheads 
        (1,000 to 1,500) from deployed locations to enhanced security 
        storage sites or dismantlement and from storage to 
        dismantlement facilities; continued support for Nuclear 
        Security Centers of Excellence; and assistance with future 
        shipments of Spent Nuclear Fuel that meet the IAEA criteria.
         Cooperative Biological Engagement ($276.399 million) 
        to initiate biological engagement in Burundi, Rwanda, and other 
        African regional partners and begin a regional engagement in SE 
        Asia; continue cooperative research efforts in Cooperative 
        Biological Engagement (CBE)-engaged countries; continue to 
        implement the Electronic Integrated Disease Surveillance System 
        in CBE-engaged countries; continue construction and equipment 
        installation of Secured Pathogen Repositories in Kazakhstan and 
        in other partner states; continue Cooperative Biological 
        Research projects in Afghanistan, Africa, Armenia, Azerbaijan, 
        Georgia, Kazakhstan, Pakistan, Ukraine, and other CBE-engaged 
        countries as valuable projects are approved; continue to 
        provide training in laboratory diagnostics techniques, 
        epidemiology, clinical sample collection, outbreak 
        surveillance, laboratory and health system management, and 
        biosafety, biosecurity, and bioethics in CBE-engaged countries; 
        continue the sustainment of 42 diagnostic labs in Azerbaijan, 
        Georgia, Kazakhstan, Ukraine, and Uzbekistan; continue 
        construction for a National Public Health Laboratory in 
        Afghanistan; continue construction of a Veterinary Central 
        Diagnostic Facility in Ukraine; complete construction and 
        equipment installation for Secured Pathogen Repositories in 
        Azerbaijan and Ukraine (Azerbaijan is funding the cost of its 
        construction); complete the Biological Medical Research Center 
        in Pakistan; complete 11 diagnostic labs in Kenya, Uganda, 
        Ukraine, and other countries to fill gaps in analytical bio 
        surveillance capacity; complete biorisk assessments in select 
        areas of Asia and Africa; and continue to provide for bio-
        related conference support.
         Proliferation Prevention ($32.402 million) to enhance 
        the capability of non-Russian FSU states and other partner 
        countries to deter, detect, report, and interdict illicit WMD 
        trafficking across international borders. In Armenia, these 
        funds would continue to increase WMD command and control, 
        communications, surveillance, detection, and interdiction 
        capabilities along the Georgia border; continue project 
        assessments and support efforts to upgrade international and 
        state ports of entry and inland clearing stations. In Moldova, 
        these funds would continue to increase WMD command and control, 
        communications, surveillance, detection, and interdiction 
        capabilities along the Ukraine border; continue project 
        assessments and support efforts to upgrade international and 
        state ports of entry and inland clearing stations. In Southeast 
        Asia, these funds would continue to increase WMD command and 
        control, communications, surveillance, detection, and 
        interdiction capabilities, and sustainment in initial 
        countries, and begin implementation in additional countries 
        along the Strait of Malacca and in other regional waters and on 
        land borders.
         Threat Reduction Engagement ($2.375 million) to 
        conduct engagements with the FSU states and in new geographic 
        areas to support program expansions.
         Other Assessments/Administrative Support ($25.245 
        million) to ensure that DOD-provided equipment, services, and 
        related training are fully accounted for and used effectively 
        and efficiently for their intended purposes; provide for Nunn-
        Lugar CTR program travel, translator/interpreter support, and 
        other agency support to include support to program personnel 
        assigned to U.S. Embassy offices in partner states.

    Reductions to the fiscal year 2013 request would result in missed 
opportunities to build international partnerships and partner 
capabilities, protect extremely dangerous pathogen collections from 
potential terrorist threats, and eliminate WMD and WMD-related 
materials that could fall into the hands of terrorists or states 
potentially hostile to the United States.

Research, Development, Test, and Evaluation
    On 26 January 2012, in his press briefing on the DOD fiscal year 
2013 budget request, Secretary Panetta stated: ``And lastly, with 
regards to key investments in technology and new capabilities, we have 
to retain a decisive technological edge. We have to retain the kind of 
leverage the lessons of recent conflicts have given us. And we need to 
stay ahead of the most lethal and disruptive threats that we're going 
to face in the future.'' Consistent with this decision, DTRA RDT&E 
programs respond to the most pressing CWMD challenges including stand-
off detection, tracking, and interdiction of WMD; modeling and 
simulation to support weapons effects and hazard predictions; 
classified support to Special Operations Forces; defeat of WMD agents 
and underground facilities; and protection of people, systems, and 
infrastructure against WMD effects.
    DTRA RDT&E is unique in being focused solely on CBRNE; tied closely 
with the agency's Combat Support responsibilities; has a top-notch in-
house field test capability; relies upon competitive bids, the national 
labs, industry, and academia rather than an in-house laboratory 
infrastructure, allowing for a ``best of breed'' approach to performer 
selection; and is nimble and responsive to urgent needs.
    The agency has a comprehensive, balanced CBRNE S&T portfolio that 
supports DOD goals and is well connected with DOD customers, as well as 
interagency and international partners. Our RDT&E approach balances the 
need for near-term pay-off with the need for long-term knowledge and 
expertise. The requested RDT&E funding includes $45.071 million in 
Basic Research to provide for the discovery and development of 
fundamental knowledge and understanding by researchers primarily in 
academia and world-class research institutes in government and 
industry. This program leverages DOD's $2 billion annual investment in 
basic research by ensuring a motivation within the scientific community 
to conduct research benefiting WMD-related defense missions and by 
improving DTRA knowledge of other research efforts of potential 
benefit.
    The DTRA fiscal year 2013 request also includes $172.352 million 
for WMD Defeat Technologies Applied Research, $275.022 million for 
Proliferation Prevention and Defeat Advanced Research, and $5.749 for 
WMD Defeat Capabilities System Development and Demonstration.
    Multiple projects span these program elements:

         The Fundamental Research Project is the ``transition 
        enabler'' that bridges the gap between basic research and 
        technology development. Examples of work being done under this 
        project include developing nuclear materials detection 
        capabilities with the potential for pre-detonation nuclear 
        weapon detection systems, and a new carbon-based transistor 
        with the potential for becoming the basis for next generation 
        radiation-hardened electronics and for space sensors.
         The Detection Technology Project includes nuclear and 
        radiological detection; post-nuclear detonation forensics; and 
        treaty verification related S&T development. Protective and 
        targeting planning tools, and WMD Intelligence, Surveillance, 
        and Reconnaissance S&T development is conducted under the WMD 
        Battle Management Project.
         The Advanced Energetics and Counter WMD Weapons 
        Project develops novel energetic materials and weapon design 
        technology for rapid, directed, and enhanced (non-nuclear) 
        energy release providing new capability to defeat difficult WMD 
        and hardened and deeply buried targets. It also covers the 
        systematic identification and maturation of advanced 
        technologies for combating WMD with specialized hardened target 
        defeat expertise; developing innovative kinetic and non-kinetic 
        weapon capabilities for the physical or functional defeat of 
        WMD structures; and minimization of collateral effects from 
        incidental release of WMD agents.
         The Systems Engineering and Innovation Project 
        develops improved high performance computing methods and tools 
        for 24/7, near-real time CBRNE decision support; develops and 
        integrates individual-based social networks and realistic 
        behavioral models with infrastructure such as power and 
        transportation grids; and demonstrates capabilities to model 
        selected secondary and tertiary effects and course of action 
        impacts for CWMD scenarios.
         The Nuclear and Radiological Effects Project provides 
        nuclear weapons effects subject matter expertise, model/code 
        development, and analysis. Under this project, DTRA is 
        reversing the decline in nuclear weapons effects and system 
        hardening that occurred in the decades following the end of the 
        Cold War, but with focus on 21st century threats. For example, 
        we are supporting the standup of a Nuclear Weapons Effects 
        Network across DOD, NNSA, and the United Kingdom, and are 
        delivering three-dimensional models of nuclear fallout to the 
        U.S. Army Nuclear and Chemical Agency, STRATCOM, and DHS for 
        better predictions of fallout from ground or low altitude 
        detonations and improved prediction of nuclear weapon urban 
        environment effects. This project also is integrating 
        conventional, unconventional, and nuclear software planning 
        tools within a net-centric framework that provides simplified 
        near real-time access for customer use of DTRA expert support 
        and CBRNE tools in classified and unclassified environments, 
        and meets user requirements at the state/local, national, and 
        international levels.
         The Target Assessment Project supports targeting and 
        Intelligence Community technology analytical needs. Efforts 
        underway include providing geotechnical, structural and 
        functional analysis in a time-dependent, 3-dimensional model to 
        defeat WMD targets in underground facilities; creating a 
        software tool that integrates buildings, bunkers and tunnels 
        into a common operating picture for functional vulnerability 
        and defeat analysis of WMD targets; and developing modeling and 
        simulation capability for a network of WMD target systems 
        analysis. In collaboration with the Defense Intelligence Agency 
        (DIA) and DOE National Labs, it also provides technology for 
        the DTRA/DIA Counter WMD Analysis Cell, integrating engineering 
        insights and operational expertise for exploitation of 
        vulnerabilities to counter WMD targets and developing 
        capability to perform strategic level technical analysis of 
        adversary WMD programs.
         The Nuclear Survivability Project develops radiation-
        hardened microelectronics and nanotechnology to keep pace with 
        commercial technology advances; applies trusted U.S. commercial 
        design and foundry capabilities to achieve capability for =45 
        nanometer radiation hardened microelectronics; develops and 
        demonstrates technology to support hardening of 
        microelectronics and photonics to meet DOD's missile and space 
        requirements; provides for High Altitude Electromagnetic Pulse 
        (EMP) protection, operational vulnerability assessments, 
        technical assistance to Service Acquisition Special Projects 
        Officers, defense agencies, and COCOMs; and provides expert 
        advice on System EMP Certification for STRATCOM and DOD CBRN 
        Survivability Implementation. In addition, this project 
        supports nuclear surety programs through field-able nuclear and 
        non-nuclear physical security equipment for the Services and 
        interagency partners; provides for Force-on-Force tests and 
        evaluation of DOD, Service, and COCOM nuclear weapons security 
        policies and capabilities; evaluates nuclear security policy 
        for waterfront restricted areas; and conducts engineering 
        studies and out-of-cycle tests focused on specific portions of 
        the nuclear environments.
         The Test Infrastructure Project provides a unique 
        national test bed for simulated WMD facility characterization, 
        weapon/target interaction, and WMD facility defeat testing; 
        provides test articles, construction, tunnel operation, data 
        acquisition systems, test optics, and data analysis for the Air 
        Force's Massive Ordnance Penetrator; and provides the test 
        environment for the Treaty Verification Technologies Program 
        and Source Physics Experiments to support Comprehensive Test 
        Ban initiatives.

    Reductions to the DTRA RDT&E request would delay or terminate 
solutions to priorities received from the Combatant Commanders and miss 
opportunities to take advantage of emerging technologies and 
operational concepts to counter WMD threats.

Chemical and Biological Defense Program S&T
    The Department's CBDP S&T programs support DOD-wide efforts to 
research, develop, and acquire capabilities for a layered, integrated 
defense against CBRN agents; better understand potential threats; 
secure and reduce dangerous materials whenever possible; and prevent 
potential attacks. Although funding for the CBDP is not part of the 
DTRA budget request, the agency executes the S&T portion of this 
program, for which the Department has requested approximately $511.6 
million in fiscal year 2013. The agency also manages funding execution 
in support of CBDP advanced development and procurement.
    DTRA is addressing key chemical and biological defense mission 
areas in multiple ways including: emphasizing innovation and discovery 
in Basic Research and the Physical Sciences; bio surveillance; 
biological diagnostics; and medical countermeasures such as 
advancements in regulatory S&T of agile, flexible manufacturing and 
rapid enhanced product development and new avenues of treatment against 
CB threats. DTRA and the CBDP leverage each other's expertise, unique 
capabilities, resources, and investments--as well as those of the other 
DOD, U.S. Government, and international partners--in a wide range of 
areas including Basic Research, modeling and simulation, Technical 
Reach Back support, Consequence Management Assessment Team Support, 
Cooperative Threat Reduction and Nunn-Lugar Global Cooperation Support.

Procurement Funding
    The DTRA Procurement, Defense-wide request provides for essential 
vehicle replacement and procures new investment items, including 
mission-critical information technology, required for the agency's 
global mission execution. The fiscal year 2012 request is for $13.146 
million.

                  IMPACT OF DEFENSE-WIDE EFFICIENCIES

    DTRA has achieved efficiencies in its mission execution, yielding 
$52.73 million from all of our appropriation accounts as part of DOD-
wide adjustments. This includes savings of $19.78 million in O&M, $1.88 
million in the Nunn-Lugar CTR program, $32.59 million in RDT&E, and 
$2.24 million in Procurement. We terminated the Innovative Technologies 
program, the Systems Engineering program, and the University Strategic 
Partnership Program. Additionally, reductions were made to our travel 
budget; contract costs related to security support; core operational 
support; contracts related to the CWC; contract costs related to S&T; 
ICP; DTRIAC; Basic Research; Advanced Energetics; wargaming; 
environmental restoration; WMD National Test Bed; Test and Technology 
Support; strategic research and dialogues; countering WMD terrorism; 
and nuclear surety. We continue to seek innovative ways to reduce 
operating costs and find more efficient and effective ways of executing 
our mission.

                               CONCLUSION

    Mr. Chairman and other members, WMD pose a global threat that is 
growing in scope and evolving in its potential applications. DTRA and 
the SCC-WMD provide much of the expertise and the daily focus that is 
applied to countering this threat by the Department and, indeed, by the 
U.S. Government. We also build and harness CWMD partnership capability 
with our friends and allies around the globe.
    The challenge facing us is great. The DTRA fiscal year 2013 budget 
request is critical and central to DOD, U.S. Government, and 
international efforts to counter WMD. The relatively small national 
investment in the DTRA/SCC-WMD/SJFHQ-E team provides a tremendous 
return to national and global security. I urge your support for the 
DTRA fiscal year 2013 budget request and would be pleased to discuss it 
in greater detail with the subcommittee at your convenience.
    I hope that DTRA and the SCC-WMD will continue to earn your 
support. I would be pleased to respond to your questions.

    Senator Hagan. We will go ahead and proceed with the 
questions. Secretary Creedon, I'd like to ask you about the 
transitioning of the CTR programs in Russia. The CTR program is 
transitioning from Russia and the former Soviet states to 
Southeast Asia and the African continent. The emphasis has been 
shifting from the nuclear programs in Russia and the former 
Soviet states to engagement in these new regions on handling 
and storing the dangerous biological pathogens.
    What's the long-term vision for the CTR program in Russia 
and the former Soviet states? Then I have a series of questions 
regarding the nuclear security investments in Russia and the 
former Soviet states and how they will be maintained over the 
long-term as we make this transition.
    Ms. Creedon. Thank you, Senator. We are gradually shifting 
to more of a biological threat reduction program and that then 
allows us to place less emphasis on the nuclear programs. With 
all the work that's gone on in Russia over the better part of 
the last 20 years, a tremendous amount has been accomplished. I 
think you are all familiar with the scorecard, which does 
indicate the literally thousands of items that have been 
destroyed as part of the CTR program.
    Senator Hagan. I was very impressed when I looked over the 
report.
    Ms. Creedon. I should give a plug actually to Senator 
Lugar. That whole scorecard was actually one of his ideas to 
demonstrate the success of the program.
    But in any event, we do continue to do a wide variety of 
work with Russia, and in time that will phase down a bit. We 
also value that relationship with Russia and in that context 
are seeking an extension of the umbrella agreement that allows 
for the work in Russia. It expires next year and we are seeking 
an extension of that so that we can continue to do some work, 
although at a lower level in Russia, particularly in some of 
the areas of sustainment, chemical weapons, and some small 
amount of additional destruction work.
    We also continue to work in the states of the former Soviet 
Union, although primarily in Kazakhstan we have some very large 
biological security programs ongoing, and we have some similar 
programs in Ukraine. Those are probably the largest programs.
    Then we are beginning to shift the focus in the biological 
program to Africa and the Middle East. So in time we will 
transition over to those areas of the world as well.
    Senator Hagan. How will the nuclear and security 
investments in Russia and the Soviet states be maintained 
during this period of transition?
    Ms. Creedon. One of the key aspects of all this is, in 
fact, the umbrella agreement, and that's why we're working to 
continue the umbrella agreement, which expires in June of next 
year.
    Senator Hagan. What is involved in order to extend it?
    Ms. Creedon. Both sides, both the United States and Russia, 
have to agree to continue it, basically to just extend it for 
some period of time, because it's that umbrella agreement that 
allows us to do the work in Russia. So if the umbrella 
agreement isn't extended, although we think that it will be--so 
far our very preliminary discussions are positive. But if we 
don't have that agreement, then pretty much the work stops.
    Senator Hagan. How much of a percentage is Russia paying on 
that agreement?
    Ms. Creedon. I can't give you those--maybe Ken can give you 
some more specific numbers. Over time, obviously, the United 
States has paid for everything. But it has changed over time. 
Probably one of the biggest examples of where Russia has kicked 
in a substantial amount is in the various security upgrades 
that frankly both departments participated in as a result of 
the Bratislava agreement some years ago. My recollection was 
that was a very hefty percentage of Russian participation in 
that overall program. DOE and DOD did the exterior and Russia 
did all the interior work.
    The other big program that is definitely transitioning to 
Russia is there's been a train-the-trainers program, and that 
program built a training facility not too far outside of 
Moscow, and Russia is now running that facility. It was 
recently upgraded. They are bringing their people there. 
They're training their people. Then their people go out, and 
that's important for sustainment of the security work that 
we've done over time.
    Senator Hagan. Do you have concerns about Russia and the 
other Soviet states actually maintaining the equipment over the 
long-term?
    Ms. Creedon. That is, in fact, one of the things that we 
are continuing to discuss. All the parts and pieces of DOD were 
over there just last week, and that's one of the topics of 
discussion on the table, is the long-term sustainment of the 
programs, and I think that's the same for DOE.
    Senator Hagan. I forgot to say, we should probably take 
maybe 15 minutes, unless more members show up and then we'll 
cut that back a little bit.
    Ms. Harrington, for fiscal year 2013 the administration is 
proposing to reduce the Second Line of Defense (SLD) program 
from $262 million to $92 million. This program has received 
wide support for installing nuclear detection systems at ports 
and borders around the world to detect illicit transfers of 
nuclear material. The fiscal year 2013 budget states that much 
of the work of installing these detectors has now been 
completed, resulting in the $115 million reduction.
    Is it accurate to say that in fiscal year 2013 and onwards 
you will not be installing future detection systems and 
concentrating on maintaining what we have?
    Ms. Harrington. Thank you, Senator, for your question. On 
the SLD program, we recognize that that program has had a large 
degree of success. As Secretary Creedon just mentioned, one of 
our biggest successes has been in Russia, where we co-funded, 
equal shares U.S. and Russia, the installation of 383 land, 
sea, and air border crossings.
    The maintenance and sustainment of those systems will in 
the next year or so transition 100 percent to Russia. From 
everything that we see, they are vigorously maintaining their 
system and in some senses it will be on a par or even better 
than what we have in the United States.
    Senator Hagan. That transition is to be completed, what 
date did you say?
    Ms. Harrington. In about the next year.
    Senator Hagan. Okay.
    Ms. Harrington. So this is an area where we've seen them 
really step up. The installations use Russian equipment that we 
have brought to the United States and certified as meeting 
international standards, and we have seen evidence that the 
equipment is indeed working.
    We also provide the training for that, and as we look into 
the future again, as with DOD, we really will be focusing on 
keeping up the discussion with them, continuing to exchange 
best practices, making sure that the systems are up and 
working.
    There are other installations in the area surrounding 
Russia that we also are either completing this year or will 
complete next year. We will have about 40 new installations 
next year.
    What we are doing in our strategic pause or program review 
is evaluating what we should be doing beyond the former Soviet 
Union. There we've had some extremely interesting recent 
discussions at the Seoul nuclear security summit. Many 
countries in areas, new areas to us, for example Southeast 
Asia, the Middle East, becoming increasingly concerned about 
having this capability because many nations, despite the 
Fukushima events, still do plan to expand nuclear energy. So 
that means larger commerce in nuclear materials, more need to 
be able to track and ensure the proper management and control 
of those materials.
    So there is a global interest. But what we are doing right 
now is working closely with our interagency colleagues, with 
the Department of Homeland Security, which has a lot of 
experience in this area, along with law enforcement, which 
plays a critical role, to really see what the best balance of 
technical capabilities and programming will be for some of 
these new sites.
    So we have not finished that process yet. We will be happy 
to come brief you when we do.
    Senator Hagan. My next question is, could you be specific 
on these new sites or new areas? You said Southeast Asia. Any 
more specifics on that?
    Ms. Harrington. Since we're still in the process of review 
and we are, of course, evaluating some of the threat assessment 
with the Intelligence Community--we should within the next 
month or two be able to come back and give you a more 
substantial briefing.
    Senator Hagan. Okay. The 5-year budget profile for this 
program is reduced further in fiscal year 2014 to $47 million, 
and then it increases to $64 million in fiscal year 2017. If 
additional detectors have to be installed, will this 5-year 
budget profile support these additional detectors?
    Ms. Harrington. As we move forward into the more specific 
2014 build and the years beyond, we will take into account the 
results of the program evaluation. We will also seek to engage 
our international partners. We have the ability to accept 
foreign funds, for which we thank this committee a great deal 
for supporting that capability. We now have, following the 
nuclear security summit and under the U.S. leadership of the G8 
global partnership, a renewed commitment by countries to 
address border security issues, in particular.
    So we are hoping that we can really leverage U.S. 
taxpayers' investments with dollars from other countries. We 
also will look across our whole suite of programs if we need to 
rebalance internally to provide more funding for this program.
    Senator Hagan. Thank you.
    Director Myers, in your testimony you list two jobs that 
you hold: first, as the Director of DTRA; and then second, as 
Director of the U.S. Strategic Command Center for Combating 
WMD, which integrates for DOD capabilities to defeat WMD.
    I understand this year that the U.S. Strategic Command 
(STRATCOM) has created a new component called the Standing 
Joint Forces Headquarters for Elimination, which is supposed to 
provide a capability to eliminate WMD in hostile or uncertain 
environments.
    It seems to me that you are wearing three hats now instead 
of two. Can you explain in layman's terms these roles and how 
they differ?
    Mr. Myers. Certainly. Thank you. As the DTRA Director, we 
are a combat support agency and a defense agency. To break 
those down in layman's terms, as a combat support agency we 
need to be available 24 hours a day, 7 days a week, to support 
the combatant commanders, support the Military Services, to be 
able to respond to any WMD threat or challenge that they might 
face, whether it be in combat or whether it be as part of a 
domestic issue, whether it be a civil support team through the 
National Guard or what have you.
    As a defense agency, one of our prime responsibilities is 
to perform and to manage a research and development (R&D) 
portfolio, to develop the tools and capabilities that the 
warfighter will need to address and to operate in a WMD 
environment, whether that be nuclear detection, whether that be 
chemical, biological protection gear, actually uniforms or 
detectors, as well as the capability to interdict and defeat 
WMD.
    Most recently, we have transitioned the massive ordnance 
penetrator (MOP) to the Air Force, which is a deep earth 
penetrator conventional weapons system.
    So in layman's terms, that's the DTRA side of the house. On 
the STRATCOM Center (SCC) for Combating WMD, I report to 
General Robert Kehler, Commander, STRATCOM. STRATCOM has 
responsibilities under the unified command plan for 
synchronizing the U.S. response to WMD and in advocating on 
behalf of counter-WMD funding and the support needed across 
DOD.
    So in a lot of ways the SCC responsibilities and the DTRA 
responsibilities dovetail nicely together.
    The Standing Joint Force Headquarters, as you pointed out, 
was stood up on February 3 by General Kehler at an event near 
Fort Belvoir. I am not the commander of the headquarters. The 
commander of the headquarters is Major General Eric Crabtree, 
USAF. He is also the Deputy Director of the SCC, so there is 
that connection between the two STRATCOM components, SCC as 
well as the Standing Joint Force Headquarters.
    We spent quite a bit of time thus far this afternoon 
talking about our nonproliferation efforts, the Nunn-Lugar 
program, the SLD. All of those programs are based upon a 
cooperative relationship with a country, based upon a 
nonviolent environment, where those programs can be carried 
out.
    The Standing Joint Force Headquarters is designed to be 
able to provide the same type of capability in a nonpermissive 
environment or one in which we are not permitted a cooperative 
opportunity to reduce WMD. So in a lot of ways DTRA, the SCC, 
and the Standing Joint Force Headquarters all have different 
roles in the counter-WMD mission area.
    General Kehler has determined he wants the Standing Joint 
Force Headquarters to be co-located with DTRA and the SCC at 
Fort Belvoir so we can get the most from leveraging the three 
organizations, get the most in terms of effectiveness and 
efficiency across the board, to ensure that we don't have to 
have three separate organizations with all the different types 
of support mechanisms, to permit the headquarters to lean on or 
rely on maybe specific expertise that DTRA or the SCC might 
have and that they don't need to maintain that independently on 
their own.
    So while there are three separate mission areas, having us 
all colocated, working together on the same mission with the 
same goal in mind, we seek to get the best bang for the buck 
for the taxpayers, as well as for the committee.
    Senator Hagan. Thank you. Thank you, Director Myers.
    Senator Portman. Thank you, Madam Chair.
    I appreciate those responses. I want to back up a little 
bit and talk about some questions that relate to our oversight 
responsibilities, specifically measures of performance, 
metrics, and looking at our budget this year as requested and 
going forward. The fiscal year 2013 budget request, Ms. 
Harrington, on the DOE side for NNSA and specifically for your 
defense nuclear nonproliferation program is $2.46 billion, 
which is an increase of about $160 million from fiscal year 
2012. I actually look at it here on the chart from fiscal year 
2009, until this request in fiscal year 2013, there was 
actually a 60 percent increase in your funding of just over 
$900 million, almost $1 billion.
    With that kind of substantial growth, of course, it's the 
responsibility of this committee to ensure that the appropriate 
metrics are in place to evaluate the effectiveness of our 
efforts. You've talked about some of those efforts in response 
to the chair's questions.
    GAO released a study in December 2011, concluding that some 
of the defense nuclear nonproliferation programs failed to 
satisfy key program performance measures that GAO has long 
considered essential to measuring and validating program 
effectiveness. This is really nothing new. In December 2010 
they had a report that found that the President's 4-year global 
nuclear material security initiative ``lacks the specific 
details'' on implementation, overall cost estimates, timeframe, 
and scope of planned work remain unclear.
    So I would ask you, Ms. Harrington, if you could respond to 
that. Do you believe that GAO's assessment is accurate, and 
again in the context of a substantial increase in the budget? 
If not, why not? If you believe you are taking steps to address 
what GAO has outlined, we'd like to hear about those as well.
    Ms. Harrington. Thank you, Senator. My view has always 
been, no matter what agency I've worked for, that it's always 
valuable to have somebody from the outside take a look at your 
work, how you manage it, and whether you can improve it. GAO is 
one of the key elements in that process for us in the 
government. We, of course, have our own inspector general, who 
is not inactive, I can assure you, in terms of internal 
oversight.
    On the specific Global Threat Reduction Initiative (GTRI) 
study, the GTRI program has existed for a number of years, but 
was given a very specific boost or impetus in April 2009 when 
the President made a speech in Prague and announced that the 
United States was going to undertake a very focused leadership 
role for 4 years to try to lock down dangerous materials 
worldwide.
    We launched into that effort working very specifically with 
Russia and the International Atomic Energy Agency because among 
the three of us we are the key players in terms of that 
mission. Now, there are many other key players--all of the 
countries that are the targets of the program where the 
material resides. So the criticism in December 2010 that there 
was not a very detailed time line plan for every single action 
that would need to take place really doesn't take into account 
the diplomacy, and sometimes we have to work with our 
colleagues at the Department of State (DOS) to even get our 
foot in the door in a country, negotiation of agreements, the 
management of transportation contracts, the technical work--
sometimes we would not have full information before going in a 
country, what condition the materials were in, the length of 
time it takes material to be extracted from a research reactor, 
for example, cooled, and then safely removed.
    All of those technical issues have variables that go along 
with them. The diplomatic issues have variables that go along 
with them. So it makes very specific day-by-day planning a real 
challenge. Governments fall, new governments are elected. 
Policies change. Contracts have to be renegotiated. All of 
those things are just a fact of life of working in the 
international environment.
    It makes life complicated and it requires a certain amount 
of flexibility on our side and I would say on the side of those 
who provide oversight.
    So I would take some issue with the conclusions of GAO, but 
not any difference at all in terms of agreeing with them that 
there has to be an orderly and responsible management of these 
efforts. We are, after all, using taxpayers' dollars. But there 
is that flexible requirement within the overall context.
    Thank you.
    Senator Portman. I guess what we would like to know from 
you today, and maybe you can follow up in writing, is what then 
are the metrics that you think are appropriate? Obviously, you 
believe that the GAO program performance measures are not 
appropriate to validate your effectiveness, and yet you 
indicate that you do believe that, given the tax dollars going 
into these programs and the substantial increase in funding 
over a 3-year period, about a 60 percent increase overall, that 
there ought to be metrics that you're held accountable to.
    So do you feel you have those metrics in place and that you 
think that this is something that is more appropriate to your 
task, as you've talked about needing more flexibility than what 
GAO has outlined in terms of their metrics?
    Ms. Harrington. I think the bottom line metric, 
particularly for GTRI, is are we removing the material? I think 
that goes without saying. We can document that some 4,600 
kilograms of material, both plutonium and highly-enriched 
uranium, have been physically removed from the countries that 
we had on our original target list.
    We have a schedule. In fact, some of the details of the 
next removals are being discussed in an international meeting 
today.
    So the planning process is a very precise and well thought 
through process. It's just the timing of that process does need 
to be flexible enough to reflect the realities of international 
diplomacy. I think if you look at where we said we would be and 
where we are right now in terms of the targets and the number 
of kilograms of material removed and the number of buildings 
secured, that we are quite on track at this point.
    Senator Portman. So you have metrics, and the number of 
kilograms is meeting and maybe exceeding your expectations, 
because you have metrics in place and you're measuring it? I'm 
trying to help you here.
    Ms. Harrington. Yes, yes. Yes, indeed, indeed. We always 
have had.
    Senator Portman. Okay. I guess again what we would like is 
if you could follow up with this hearing, with your more 
specific response. I'm talking about now the GAO 2011 report as 
well. To the extent you believe you have established metrics 
that are appropriate for this program as it's grown, we'd like 
to get a response more formally from you to the GAO report.
    [The information referred to follows:]

    The Global Threat Reduction Initiative's (GTRI) removal program is 
measured and evaluated based on the number of kilograms of highly-
enriched uranium or plutonium that the program removes or eliminates 
each year. This metric is appropriate for the program as it measures 
the amount of material that is removed from civilian sites and 
permanently eliminated so it cannot be used by terrorists to make 
nuclear weapons. GTRI's metric for removals under the 4-year plan is 
4,353 kilograms removed or downblended by the end of December 2013. To 
date, we have removed and/or downblended 3,333 kilograms. Shipments 
remaining include:


  Uzbekistan....................  INP...............  Spent HEU.........  2012..............  Russian
  Poland........................  Maria.............  Spent HEU.........  2012..............  Russian
  Poland........................  Maria.............  Fresh HEU.........  2012..............  Russian
  Uzbekistan....................  INP...............  Spent HEU.........  2012..............  Russian
  Czech Republic................  Rez...............  Spent HEU.........  2013..............  Russian
  Vietnam.......................  Dalat.............  Spent HEU.........  2013..............  Russian
  Belarus.......................  Pamir.............  Fresh HEU.........  2013..............  Russian
  Uzbekistan....................  Photon............  Spent HEU.........  2013..............  Russian
  Hungary.......................  BRR...............  Spent HEU.........  2013..............  Russian
  South Africa..................  SAFAR I...........  Spent HEU.........  2013..............  South African
  South Africa..................  SAFAR I...........  Fresh HEU.........  2013..............  South African



                                                                                              [GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
                                                                                              
      
    [GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
    
      
    [GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
    
      
    [GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
    
      
    [GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
    
      
    [GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
    
      
    [GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
    
      
    [GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
    
      
    Senator Portman. Ms. Creedon, on your side, section 1304 of 
the National Defense Authorization Act (NDAA) for Fiscal Year 
2010 required the National Academies to assess the 
effectiveness of tools used to evaluate the CTR programs in 
response to the National Academy of Sciences' findings, which 
included a recommendation for CTR programs to better refine its 
stated objectives. I understand you're undergoing a top-to-
bottom review of the CTR program.
    What's the status of that review and what lessons learned 
through this exercise do you believe can be shared or even 
replicated at NNSA to ensure greater accountability and 
effectiveness?
    Ms. Creedon. The section that you refer to, section 1304, 
required a sequential series of events, and the first event was 
the submittal by DOD of a report that laid out how these 
metrics were going to be developed in the future.
    We came to this with a background of probably what, for 
lack of a better description, were easy metrics, because we 
knew how many intercontinental ballistic missiles we'd 
destroyed, how many launchers we'd destroyed, how many 
submarines we'd cut up. That was a fairly easy way to approach 
this. As we were going to transition into more of the 
biological side, that's when a lot of the discussion of metrics 
came up.
    So in that report that we submitted initially, and I 
believe it was September 2010, in response to the requirement 
in the NDAA, we laid out how we have developed metrics for all 
of the more traditional programs, the nuclear element 
destruction, the chemical weapons destruction--again, counting 
things; you know how many tons of something you've destroyed--
and looking at the biological weapons really is where the 
challenge is.
    So in that report we laid out a series of things that we're 
going to look at as metrics in the expansion of the biological 
threat reduction program. That report was recently reviewed by 
the National Academy. We're now in the next step of finalizing 
the metrics, and that report is in its final stages. In fact, I 
think there were some staff briefings to some of the committee 
staff here a couple of weeks ago.
    When you look on the biological side, each country will 
have an agreement, based on what the requirements are of the 
country and what the needs are of the country. When we look at 
some of the countries that are more advanced in this work, such 
as Kazakhstan, you look at things like how many collections of 
dangerous pathogens do they have, how are they secured, should 
they be consolidated, should you combine the sort of veterinary 
pathogens and human health pathogens, or does it make more 
sense to keep them apart?
    The focus of CTR historically has been on trying to 
consolidate to the greatest extent possible consistent with the 
requirements of the country, to reduce the number of these 
sites. So we've done a lot of work on consolidation.
    We look at the security of these sites, and again we've 
done a lot of work, particularly in Kazakhstan and in some 
other places, Ukraine, on making sure that these sites are 
secure. You look at the safety, what's the biological safety 
level of these facilities? Do these facilities meet 
international health regulations and standards?
    We also look at the overall disease surveillance 
capabilities of the country, because that's why we, DOD, are in 
this to begin with, because it's a national security 
requirement to make sure that our troops in the area, our 
families in the area, were protected. We wanted to make sure 
particularly in these countries that had naturally occurring 
incidents of diseases that could be weaponized, that we knew 
whether or not an outbreak was manmade or whether it was 
natural. So we wanted to make sure that these countries also 
had surveillance capabilities and that they had forensics 
capabilities.
    So as we expand the biological program, these are the 
things that we're going to look at with respect to each 
country, each agreement, as we go forward on the biological 
program.
    Senator Portman. What's the timing of that report?
    Ms. Creedon. It's almost done. I think it's probably within 
the next couple of weeks, I think the final version.
    Senator Portman. Would you be planning to brief the 
subcommittee?
    Ms. Creedon. We have had some preliminary briefs to the 
staff a couple of weeks ago, and when it's done, we'll be happy 
to come back and brief the subcommittee.
    Senator Portman. Yes, we would appreciate getting that in 
that briefing and looking carefully again at making sure we're 
avoiding duplication and doing this in the most cost-effective 
way possible. It sounds like you've laid out a lot of metrics 
that you feel comfortable with.
    The next question I have relates to what I talked about in 
the opening, which is sequestration, how are we going to deal 
with this. In addition to the $487 billion in proposed cuts to 
the defense budget already in place, which I know you've had to 
deal with, although again your budgets for the most part have 
been increased, we now have this additional $500 billion across 
the board.
    I believe we should act as a Congress to avoid that. I know 
the chair shares my concern about that. So we're not here to 
tell you that we think it's the right thing to do. But I think 
it is appropriate for us to plan for the possibility that 
Congress does not figure out a way to find offsets or otherwise 
deal with sequestration.
    Can you provide us today--and I guess I would direct this 
really to all three of you; maybe Mr. Myers because he's been 
off the hook so far--how would these additional cuts affect 
your respective agencies? I look at a lot of your programs, 
some of them involve international commitments. In other words, 
they're obligations to other countries. I just wonder if you 
can talk a little about that.
    What would these cuts mean? Would we be violating 
international obligations? How would you deal with it should 
sequestration not be avoided and should as of January 1, 2013, 
we have these across-the-board cuts in place? Mr. Myers?
    Mr. Myers. Thank you, Senator. To start off with, the 
impact of sequestration would be devastating. The U.S. strategy 
for dealing with WMD in my opinion is based upon developing and 
constructing lines of defense--at the source when possible in a 
cooperative way, at the borders in terms of interdiction--open 
spaces, if you will, in terms of detecting whether something is 
moving by sea or over land or in the air; and when necessary, 
have the ability to identify, detect, and eliminate weapons and 
materials of mass destruction, if necessary; and obviously, if 
one is unsuccessful, consequence management in the event of a 
WMD incident.
    I believe sequestration would cause a major erosion in 
these lines of defense. It's very difficult for me to tell you 
exactly what the budgetary impact would be on each and every 
single one of them, but I think across-the-board our efforts 
would erode. I think we would have a lot of problems in terms 
of manning and being able to implement arms control treaty 
obligations and the R&D portfolio that we have today.
    We have no planning going on for sequestration, but we are 
hopeful that it can be avoided, because I believe that the 
impact will be severely detrimental, if not devastating.
    Senator Portman. What concerns me about your answer is it 
sounds like you have not been directed to come up with a plan 
and, although I agree with you it'll be devastating, just 
looking at it on a general level, because it's across-the-
board, I think it would be really helpful to understand better 
what the consequences would actually be and whether, as you 
indicate, it might result in the United States not meeting some 
of our international obligations, because a lot of those lines 
of defense you talk about are involving partnerships, including 
the source, the border, even the transit.
    Ms. Harrington, Secretary Creedon, would you like to 
respond to the question about sequestration?
    Ms. Creedon. Sir, only to just add from the policy office 
perspective. We obviously were very much in support of the 
Secretary's development of the strategic guidance for DOD that 
was put out in January and, as the Secretary has indicated, 
that strategic guidance would not be executable under 
sequestration. But the Secretary has not directed us to plan 
for sequestration at the moment.
    Senator Portman. How about DOE?
    Ms. Harrington. That's similarly the case in DOE. We have 
not been instructed by the Secretary.
    Senator Portman. Thank you all.
    Senator Hagan. Thank you, Senator Portman.
    Director Myers, as part of the counterproliferation program 
legacy DTRA had the principal role in developing the fuse 
systems for the MOP that you mentioned in your answer a minute 
ago, a bomb that's designed to attack hardened and buried 
targets. What's the status of the follow-on efforts in these 
weapons and, in particular, being able to defeat or neutralize 
biological or chemical weapons facilities?
    Mr. Myers. The MOP has been successfully transferred to the 
U.S. Air Force. They're carrying out testing of their own at 
this time. DTRA is in full support of them in this, but I'm not 
aware of the exact way that the Air Force would characterize 
the status of the MOP at this time.
    I know we believe that when we transferred it over to the 
Air Force it was in good condition, and I think that they're 
continuing ways to improve it and improve performance.
    Senator Hagan. When did that transfer take place again?
    Mr. Myers. It was 9 to 12 months ago.
    Senator Hagan. Thank you.
    Deputy Administrator Harrington, the MOX fuel program has 
been under way since 1999 and, according to GAO, we've spent 
over $6 billion to date on the program, $5 billion in 
construction and another $1 billion in research. I understand 
its importance from a nonproliferation perspective, but I 
question in hindsight if there was a more cost-effective means 
for the taxpayers to dispose of the excess weapons-grade 
plutonium.
    I want to have a series of questions about this. What's the 
status of obtaining a reactor operator who will use the MOX 
fuel and has the Nuclear Regulatory Commission (NRC) granted a 
license for this new form of fuel?
    Ms. Harrington. Thank you for your question. The MOX 
program--and I think you appropriately characterized it--a lot 
of times people get distracted by one facility or the other. It 
is a capability to dispose of U.S. excess weapons plutonium, 
and there are several components to that capability. In terms 
of the operator, of course we need to have a customer. We have 
been working closely with the nuclear industry for a number of 
years on this, and currently specifically we are working with 
the Tennessee Valley Authority (TVA). We have very regular 
interactions with them and they are studying the technical and 
regulatory requirements associated with irradiating MOX fuel in 
five of their reactors.
    The current schedule with TVA is to execute the fuel supply 
agreement for MOX fuel in 2013, after the NNSA completes a 
supplemental environmental impact statement, in which TVA is a 
cooperating agency, so we're working extremely closely together 
on this.
    In addition, we have ongoing conversations with a variety 
of fuel fabricators regarding the option of having them market 
MOX fuel to their utility customers. In some cases, the fuel 
fabricators are coming to us with interest, not us reaching out 
to them. So it has been interesting to see that as the project 
progresses, the interest in the commercial sector also has been 
increasing.
    We also are developing other strategies to engage 
commercial customers. I think we are confident that when the 
fuel fabrication plant comes on line there will be customers 
ready to use the fuel.
    In terms of the NRC, we also are working very closely with 
them on the licensing aspects of the MOX. The whole process 
takes about 30 months and a variety of technical papers need to 
be submitted by Areva in order for that review to take place. 
Areva plans to submit these licensing topical reports in the 
2013 to 2014 timeframe to allow enough time for NRC review and 
then that should mesh with the target production date.
    So right now we see these two tracks going on in parallel, 
but timing to meet the targeted production dates.
    Senator Hagan. I understand that last year NNSA cancelled 
the facility that will supply the plutonium feedstock to the 
fuel assembly building, and I commented on this in my opening 
remarks. But in our fiscal year 2013 authorization bill this 
committee asked NNSA to supply a long-term plan for the life of 
the program on facilities and costs you will incur to obtain 
the plutonium feedstock.
    Do you see any issue with meeting our December 31, 2012, 
deadline?
    Ms. Harrington. Senator, I do not. I am very confident that 
we can provide a plan that is credible and that will indeed 
provide the stable and necessary feedstock for the facility. I 
have been very intimately involved in this particular element 
of the project. I have been out and gone through the facility 
at Los Alamos. We've had detailed discussions with our 
colleagues in Defense Programs, because we, in fact, would be 
sharing capabilities within a facility at Los Alamos. Not only 
does that not cause a problem, it helps both of us preserve a 
plutonium capability for the United States that we need for 
both programs, that without our interaction on the MOX project 
would be very difficult to preserve.
    In addition, we are building up a feedstock in South 
Carolina of MOX, of the actual oxide, plutonium oxide, that is 
ready to go into the plant now. We have more than four tons and 
by the time the plant actually goes into cold startup or warm 
startup, we'll probably have about 10 of the 34 tons already 
there on site ready to use.
    Senator Hagan. When will that be?
    Ms. Harrington. Right now we're looking at 2016. But if we 
are at that point, and I think we can be, even before 2016, I 
see no reason why we can't be fully confident that the 
feedstock issue is behind us.
    Senator Hagan. Did you say you'll be getting it from South 
Carolina?
    Ms. Harrington. We already have the 4 tons there, and we 
are working with our colleagues in the Environmental Management 
side of DOE on how to clean up some of the additional material 
there, which has the double benefit of reducing the amount that 
we need to put into waste, long-term waste, and upping the 
amount that we have available for the MOX plant. So it's a win-
win situation for us.
    Senator Hagan. I understand that the main fuel fabrication 
building, which is under construction, will have its cost and 
schedule baseline revised this summer. Is that correct? If it 
is revised, will you be obtaining an independent cost estimate 
(ICE)?
    Ms. Harrington. We are in the process right now of 
evaluating the cost and schedule impacts associated with a 
number of the cost pressures and challenges that I think we've 
spoken to this subcommittee about before. We are, as part of 
this evaluation of a possible baseline change, we will 
definitely obtain an ICE.
    Senator Hagan. Do you have any idea now as to the impact of 
that change of the baseline?
    Ms. Harrington. There are several elements that are being 
considered in a comprehensive review, which also includes the 
possibility of putting a furnace inside the MOX plant that will 
turn the plutonium metal into oxide as part of the feedstock 
program. So there are a lot of moving parts in this analysis 
right now.
    Senator Hagan. Is that being done anywhere else in the 
world?
    Ms. Harrington. Yes. It, in fact, was a solution that was 
proposed to us by Areva, which controls the technology for the 
plant. It's something that we've reviewed with them in great 
technical detail, and the analysis is that, yes, this is 
something that's compatible with the approach at the reference 
plant.
    Senator Hagan. Is it being done currently?
    Ms. Harrington. In this precise configuration, no.
    Senator Hagan. Thank you.
    Director Myers, DTRA and NNSA both have active programs to 
develop radiation detection systems. How do you and NNSA 
coordinate these programs and budgets, and are there any 
differences in how the detectors are used?
    Mr. Myers. Thank you, Senator. DTRA and NNSA coordinate 
very closely on not only nuclear detection, but all programs 
and projects that we have in the nonproliferation and 
counterproliferation arena, as well as the arms control arena. 
The three of us and other colleagues meet at least on a 
quarterly basis, if not more often, just to compare and 
contrast what the goals are, where we're headed, the pathway 
we're taking, the needs and requirements each of us have within 
our own portfolios, and what we're trying to accomplish.
    Specifically in the area of nuclear detection, the 
scientific expertise that Ms. Harrington has at NNSA and the 
scientific expertise in nuclear detection at DTRA get together 
even more often than we do within the bridge meetings. They 
have a slightly odd sense of humor. They consider themselves 
the ``trolls'' because they're under the bridge. They are 
constantly working together.
    I would point out, Ms. Creedon said earlier today about 
NNSA, DOD policy, DTRA, and other elements working together 
last week in Moscow. We had an executive review of the Nunn-
Lugar program in Moscow. It is to the point in the relationship 
between the organizations, it would almost be unthinkable for 
DTRA and OSD policy to go to that executive review without our 
colleagues from NNSA joining us to ensure that we don't have 
any overlaps, that we don't have any gaps, that there is no 
duplication in our efforts, not only on domestic programs like 
you laid out in nuclear detection, but also our international 
efforts, to ensure that we are a united front and that we have 
one policy that is covering the entire waterfront with regard 
in this case to the Russians.
    Senator Hagan. Thank you.
    Ms. Harrington, a major element of your portfolio is 
converting reactors here and abroad from highly-enriched 
uranium to the low-enriched uranium, and as a part of that 
effort to develop a domestic supply of medical isotopes using 
low-enriched uranium, called molybdenum-99.
    Can you please explain the vendors you're working with in 
the United States to develop a domestic supply of these medical 
isotopes, and when do you expect it to be commercially 
available here in the United States?
    Ms. Harrington. Thank you for raising a very important part 
of our mission, Senator. The reason that we are so interested 
in this area is that traditionally moly-99 has been produced in 
many places around the world using highly-enriched uranium and, 
we are firmly committed to reducing and to the extent 
eliminating the use of highly-enriched uranium in civilian use.
    So when we reached out to the U.S. commercial community and 
asked for expressions of interest by U.S. companies in working 
with us to develop a domestic capability, we were very pleased 
when Babcock and Wilcox, GE-Hitachi, Northstar Medical 
Radioisotopes, and Morgridge Institute for Research responded 
positively and submitted proposals which we have been working 
on collaboratively with them since then.
    The whole idea is to accelerate the production of a viable 
technology for moly-99 use in the United States in 2016. That 
is our target date.
    Senator Hagan. I understand that Russia still supplies this 
isotope using the highly-enriched uranium. What are you doing 
to help them make this medical isotope from the low-enriched 
uranium? Is our medical isotope industry supportive of your 
efforts? I appreciate the comments on the companies.
    Ms. Harrington. In terms of Russia, we have reached a 
point, I think, of breakthrough with them in terms of their 
commitment to begin converting their research reactors to low-
enriched uranium. We engaged in a series of studies on six of 
their reactors. Four of those studies are now complete. Two 
will be in the coming months.
    The initial conclusions are that one reactor can be 
converted immediately. A second probably can be converted over 
the next 18 to 24 months. The Russians have informed us that 
they intend to proceed, are looking to us to work with them 
technically to accomplish this. That will lead ultimately to 
their commitment, which they have made, to convert their 
isotope production also to low-enriched uranium.
    So after a number of years of trying to move forward on 
this, we are extremely excited that finally we are seeing some 
concrete progress.
    Senator Hagan. Did we use to make this medical isotope in 
the United States?
    Ms. Harrington. I don't believe we did, but we may have in 
the past. I would have to get back to you on that specifically.
    [The information referred to follows:]

    Yes, Mo-99 was produced in the United States prior to 1989. Chapter 
3 of the 2009 National Academy of Sciences study ``Medical Isotope 
Production without Highly-Enriched Uranium'' discusses the history of 
Mo-99 production in the United States. Following is the excerpt from 
Chapter 3, and the entire report can be found at the following URL: 
http://www.nap.edu/openbook.php?record--id=12569&page=R1

          ``PAST PRODUCTION OF Mo-99 IN THE UNITED STATES--Although 
        there is currently no commercial production of Mo-99 in the 
        United States, this was not always the case. Prior to 1989, 
        Cintichem, Inc. produced Mo-99 for the U.S. market using a 5 
        MWt (megawatt thermal) research reactor located in Tuxedo, NY. 
        This reactor was shut down when tritium contamination of 
        surface waters adjacent to the reactor site was confirmed. A 
        decision to decommission the reactor was subsequently made 
        after a risk-benefit study carried out by Cintichem's parent 
        company, Hoffman-LaRoche, determined that its continued 
        operation was not justified. Cintichem offered to arrange a 
        long-term supply agreement with the other North American 
        supplier, the Canadian company Nordion (later MDS Nordion), to 
        supply Mo-99 to U.S. technetium generator manufacturers 
        (Amersham [now GE Healthcare], Mallinckrodt, and DuPont).''

    Senator Hagan. Thank you.
    Assistant Secretary Creedon, the interagency coordination 
of the CTR programs, especially the biological engagement 
programs, has been an area that Congress and GAO continue to 
monitor. Explain, please, how you vet these programs across the 
interagency community, especially with the Centers for Disease 
Control (CDC) and the Department of Agriculture?
    Ms. Creedon. There's an interagency process that is led by 
the White House staff where a lot of these topics come for 
discussion, and in the normal process of working out, as I 
mentioned earlier, with respect to the various countries where 
we engage with the agreements, we bring in these other 
countries. So for instance, one of the long-term goals of these 
programs is to make sure that the various facilities that we 
establish are sustainable and that they become part of the 
World Health Organization, they comply with those standards. 
CDC will become a key part of that.
    I mentioned some of the work that we've done in some of the 
countries of the former Soviet Union. One of those is also 
Georgia, which I hadn't mentioned earlier. Georgia also has a 
laboratory that's a very nice laboratory--it meets all current 
standards--that the CTR program has built, and we're now 
transitioning to operation by the Georgians. Their equivalent 
of the CDC is going to work with them, as is our CDC is also 
going to have a presence there.
    So this lab is actually turning into, and will turn into 
over time, a regional center with both Georgian health effects 
people and the international and the CDC. So in all of these 
efforts, we're trying to bring our CDC in, because that's 
really the key, is the involvement of the CDC to the long-term 
sustainment and the ability of these countries to sustain these 
labs in the long-term so that CTR isn't the source of the 
sustainment funding forever.
    Senator Hagan. How about the Department of Agriculture?
    Ms. Creedon. The same is true on the veterinary side. So 
that's the human health side, so on the veterinary side we work 
pretty closely with our U.S. Department of Agriculture to make 
sure that we're coordinated with them on the security and 
cooperation and to the extent that we can we work with their 
labs as well. Their laboratory structure is obviously different 
from the CDC, but we coordinate with both of them.
    Mr. Myers. Senator, if I might add a quick comment, 
Secretary Creedon very accurately described the interagency 
process here in Washington. The element that I would like to 
add to that is that the DTRA work, the Nunn-Lugar program 
efforts and the DTRA personnel that are working in these 
countries are part of an embassy team, and they are working 
side-by-side with colleagues from the CDC or the Department of 
Agriculture or Department of Health and Human Services. They're 
bringing together consolidated strategies.
    Obviously, DOD, we have a skill set that we bring to the 
table in terms of the security and the safety and a lot of the 
disease surveillance. But our colleagues from these other 
departments and agencies in many cases have been on the 
continent or in this area longer than we have. We're trying to 
learn those lessons that they've learned over 30 or 40 years 
from them, so we don't have to learn them ourselves. Being a 
part of that team, doing it together in full coordination, 
allows us to skip ahead an awful lot down the path in terms of 
understanding and in terms of building those kind of relations 
and ensuring that when we approach a foreign government entity, 
whether it be a department of health or a Department of 
Agriculture, we do it on a consolidated front across, so it's 
one U.S. Government position.
    This is developing extremely well. Just in the last 12 to 
18 months, one sees real huge strides, especially in sub-
Saharan Africa. I think it's something we'll continue to see 
improve.
    Senator Hagan. Senator Portman.
    Senator Portman. Thank you, Madam Chair.
    I have a couple questions that maybe we can go into further 
during closed session. But one is about Syria. I was over in 
the region last week and heard a lot about it publicly and a 
lot of discussions about their chemical and biological weapons 
stockpile. I'm looking here at a Reuters story which was from 
last month, but talks very openly about the concern. This 
Reuters story says what we have heard, which is that many 
countries, including the United States, believe that this may 
be the world's largest remaining stockpile of undeclared 
chemical weapons, and obviously with the unrest and instability 
in that country and that part of the world, it's a major 
concern.
    The first question is, what is your assessment of the size 
and the composition of the chemical and biological weapons 
stockpile in Syria? Second, of course, should the Assad regime 
fall, are you confident that a plan is in place to help secure 
these deadly materials? I'll leave it open to all three.
    Ms. Creedon. Syria does have a substantial stockpile of 
chemical weapons at the moment, at a variety of locations 
across the country. We believe these weapons are secure at the 
moment, and it would be an understatement to say we worry about 
them a lot and we think about them a lot. Like DOD does in all 
circumstances, we think about options that might be developed 
to deal with them.
    Senator Portman. Mr. Myers, anything to add?
    Mr. Myers. Senator, I'd prefer to address the issue in the 
closed session if that's all right with you.
    Senator Portman. That's fine with me. I just wanted to give 
you a chance in the public session to respond to the question, 
and I think you have.
    Since you were talking about low-enriched uranium and 
medical isotopes, I'd like to talk about the more general issue 
of national security requirements for enriched uranium. I have 
a document here from NNSA regarding that. In fiscal year 2013 
your budget request includes $150 million for domestic uranium 
enrichment R&D. Due to certain treaty obligations, we need U.S. 
origin and unobligated uranium to support certain national 
security missions, such as producing tritium for our nuclear 
weapons stockpile. It's my understanding that this R&D effort 
is the only planned technology capability that can fulfill 
those requirements.
    In addition, this effort will allow NNSA to better 
understand uranium enrichment technologies to support 
nonproliferation by discouraging the unnecessary spread of 
enrichment technology, by having a source, an alternate source 
that the United States can provide at a reasonable cost and a 
reliable way.
    I think it also increases confidence in the international 
commercial enrichment market and improves the ability to detect 
proliferant programs. Then finally, it produces the necessary 
tritium.
    Ms. Harrington, maybe you're the right person to answer 
this question; can you explain what the administration means 
when it says U.S. origin, unobligated uranium and why the 
United States has this requirement?
    Ms. Harrington. I wish I had my team of lawyers here, but I 
think I can answer your question. We engage other countries in 
nuclear commerce and nuclear cooperation under the general 
article of the nonproliferation Treaty on Peaceful Uses. Under 
the Nuclear Nonproliferation Treaty, it is very specific that 
when you do engage in that kind of cooperation, it is 
exclusively for peaceful uses. So under the Atomic Energy Act 
we have the ability, under the negotiating leadership of DOS, 
to negotiate and conclude what we call 123 agreements.
    Those agreements allow us to engage in nuclear commerce and 
for countries to come to the United States and establish 
facilities for uranium enrichment, fuel fabrication, et cetera. 
So it's all part of both our commitment under the Nuclear 
Nonproliferation Treaty as well as our commitments under 
bilateral peaceful uses agreements.
    When we look at our needs for national security, production 
of tritium for our weapons or the production of the highly-
enriched uranium that's needed for our naval nuclear propulsion 
systems, that material cannot come from facilities that were 
established in the United States either using foreign 
technology, which is covered under the peaceful uses 
requirement, or a foreign-owned facility.
    So that means that we have to have what we call an 
unencumbered U.S. origin source of material. That is absolutely 
critical from our perspective to sustain the long-term 
viability of our nuclear stockpile, as well as our nuclear 
Navy.
    That is why this particular issue is so important and why 
we have this particular piece of funding in our budget for next 
year.
    Senator Portman. By the way, Deputy Secretary Dan Poneman 
has been terrific in my view at pointing out this requirement, 
and also emphasizing the need to have a source as the 
administration gets even more aggressive in nonproliferation 
efforts. I heard recently the President say that in his second 
term, should he be reelected, he intends this to be one of his 
top priorities, and we'll need to have the ability to tell 
countries that would like to pursue this technology that they 
don't need to have an enrichment capability because we can 
provide it, but we need to have a secure means of doing so.
    Would you agree with that?
    Ms. Harrington. I do agree with that. We invest a lot of 
our diplomatic capital trying to persuade countries that they 
do not need to establish enrichment or reprocessing 
capabilities, in part because it doesn't make economic sense 
unless you have a very large suite of reactors. It's also part 
of the global concept that is beginning to gain real traction 
on comprehensive fuel services, that if a country offers to 
build a reactor it can offer at the same time to provide the 
fuel and take it back, so the customer doesn't have to deal 
with some of the messier parts of the nuclear fuel cycle.
    It makes it more difficult for us to persuade countries to 
go down that path if we can't offer some of those services 
ourselves. At this point we really don't.
    If we are successful in this R&D project, we could serve 
nonproliferation and national security in two senses: one, to 
be able to meet our own domestic needs for defense; but also to 
then, if we have a competitive commercial technology, to be 
able to, as you very correctly pointed out, be able to compete 
on the global stage and reduce the need for countries to 
develop the capabilities themselves.
    Senator Portman. That's well put. As you said, we don't 
have that capability now because both for the requirement you 
talked about, which is the U.S. origin unobligated uranium, and 
also to be able to encourage more countries not to go down the 
road of enrichment, we need to have a U.S. source that's 
reliable and one that has technology that can be competitive.
    The Paducah gaseous diffusion plant is the only current 
operable enrichment plant that meets the domestic requirements 
currently, isn't that accurate?
    Ms. Harrington. That is true.
    Senator Portman. They've just been given another year to 
operate. But with that very dated technology, the gaseous 
diffusion technology, as opposed to the centrifuge technology, 
which is very energy inefficient, among other things, that 
certainly is not our long-term solution. So I agree with you 
that the R&D effort is important.
    I guess what I would ask you is, can you tell me if there 
are any other planned new enrichment capabilities deployable in 
the near future that can meet the requirements that you spoke 
about previously, other than the R&D?
    Ms. Harrington. Not that I'm aware of, no.
    Senator Portman. I would appreciate it if you could outline 
DOE's strategy for meeting the national security mission 
obligations following the end of the R&D effort, which will be 
in fiscal year 2013, and elaborate more on why you believe this 
effort is so important going forward? In other words, after the 
R&D what comes next?
    Ms. Harrington. At the end of the R&D program what we hope 
we will have in hand is a sufficient proof of principle and 
pilot operation that would allow the commercialization of the 
technology. That is not necessarily something that is DOE's 
responsibility. That would be something that we would look to 
the private sector to be very involved in.
    But we do think it's worth another year of investment in a 
technology that we believe is promising and could have 
commercial potential to see if we can prove that principle.
    Senator Portman. I appreciate your testimony today and I 
would just make the obvious point that over 3\1/2\ years into 
the loan guarantee program, it seems to me we need to move 
forward on a longer-term solution, as you have indicated how 
important that is to our national security, as well as our 
nonproliferation efforts. I would hope that you and your 
colleagues would continue to promote this effort, including 
encouraging my former Office of Management and Budget (OMB) to 
understand the significant issues you've raised today, because 
those are difficult to take into account under their current 
methodology when they come up with a credit subsidy, and I 
think that's been one of the issues with regard to the loan 
guarantee not going forward to provide the necessary, as you 
said, source of U.S. origin unobligated uranium.
    So I would thank you, Ms. Harrington, for your efforts 
already and hope that you would continue to work with us on 
that effort.
    Thank you, Madam Chair.
    Ms. Harrington. Thank you, and we would be happy to work 
with you and draw on your OMB experience any time.
    Senator Portman. I hope you'll have better luck than I've 
had. [Laughter.]
    Senator Hagan. Thank you, Senator Portman.
    To our witnesses today, thank you so much for your 
testimony. I would like to adjourn this meeting and then let us 
reconvene almost immediately, at least by 4 p.m., for the 
closed session.
    Thank you all again. This hearing is adjourned.
    [Questions for the record with answers supplied follow:]

              Questions Submitted by Senator Kay R. Hagan

            METRICS FOR COOPERATIVE THREAT REDUCTION PROGRAM

    1. Senator Hagan. Secretary Creedon, Congress has worked with your 
office over the past 3 years on developing program metrics to ensure 
the Cooperative Threat Reduction (CTR) program has clear goals and end-
states to ensure each program in a particular country has a transition 
path out once the program has met those goals. Do you support the 
objectives of developing such program metrics?
    Ms. Creedon. Yes. I agree with the need to establish durable 
metrics that can account for dynamic changes in the operating 
environment and new technologies (particularly for the capacity-
building program elements), and to support the sustainment and 
transition of the program to the partner country.

    2. Senator Hagan. Secretary Creedon, in this year's authorization 
bill, this committee directed the Department of Defense (DOD) to 
include metrics in the CTR annual report and to identify the transition 
path for a program once it is completed. Do you support these 
objectives?
    Ms. Creedon. Yes. Metrics are an important element to enable any 
program to track and report progress, including charting a path to 
sustain and/or transfer a program once completed.

               STRATEGIC REVIEW OF SECOND LINE OF DEFENSE

    3. Senator Hagan. Deputy Administrator Harrington, your testimony 
states that for fiscal year 2013 the ``National Nuclear Security 
Administration (NNSA) has initiated a strategic review of the second 
line of defense (SLD) program to evaluate what combinations and 
programs make the most effective contributions to national security.'' 
Can you please describe this review and who is participating in it?
    Ms. Harrington. The review is well underway and is being supported 
by subject matter experts in the Federal Government, at the national 
laboratories and in private industry. The SLD Program is utilizing all-
source information to reassess trafficking incidents and adversaries, 
the models it uses to prioritize countries and ports, green and blue-
border trafficking vulnerabilities, the detection and deterrence role 
of the equipment provided, and how SLD equipment and training fit into 
the Global Nuclear Detection Architecture. The NNSA has engaged other 
U.S. Government agencies for their opinions on the program and any 
improvements they would suggest. In addition, the role of fixed and 
mobile systems is being discussed at interagency meetings chaired by 
the National Security Staff (NSS), and ideas provided by the NSS and 
attending agencies are also being integrated into the recommendations. 
The review should be completed in time to impact the fiscal year 2014 
budget--probably in August or September 2012.

    4. Senator Hagan. Deputy Administrator Harrington, when completed, 
can you share the review with this committee so we can understand its 
implications on future budget submissions?
    Ms. Harrington. NNSA is willing to brief the subcommittee at the 
time that the strategic review is completed, or before, if you wish.

                        BIO-SURVEILLANCE NETWORK

    5. Senator Hagan. Secretary Creedon, there has been concern about 
the ability of the CTR's bio-surveillance network, which is carried out 
as part of the cooperative biological engagement program, to monitor 
the development of dangerous pathogens by countries that do not fully 
participate with the network or by non-state actors and groups who 
might be able to circumvent such a network. Can you please explain what 
this bio-surveillance network is and how it works with other U.S. and 
international agencies?
    Ms. Creedon. DOD participates in bio-surveillance as part of a 
larger U.S. Government biodefense effort. DOD's strategic approach, 
however, does not promote undertaking Cooperative Biological Engagement 
Program (CBEP) work on a global scale, and DOD does not intend to build 
a global biological surveillance network through the CBEP. DOD has 
taken a deliberate, sequenced, and measured approach to expanding our 
biological engagement while maintaining sustainability, focusing on 
building cooperative partners' national capacities for accurate and 
timely bio-surveillance, and encouraging broader regional cooperation 
and transparency. We continue to ensure that our investments are 
complementary on regional and global levels to increase information 
sharing where possible. However, DOD invests in high-priority areas, 
and we measure the success of these investments against their threat 
reduction performance at the local and regional levels. All of these 
individual efforts are developed with a view towards supporting broader 
international efforts to improve information sharing among all relevant 
countries and regions.
    DOD and the CTR program, through the CBEP, partner with health and 
security experts and other elements of the U.S. Government and 
international community to ensure that health security risks are 
mitigated. The program works in a variety of ways to reduce the risk of 
biological weapons development and use, and it also works with partner 
countries to strengthen capabilities to detect, diagnose, investigate, 
and report infectious disease outbreaks anywhere in the world. In 
addition, the CTR program supports broader U.S. Government efforts to 
encourage rapid response to contain and eliminate the cause of such 
outbreaks.

    6. Senator Hagan. Secretary Creedon, do you think this network has 
vulnerabilities associated with these concerns, and if so, what are you 
doing to correct them?
    Ms. Creedon. DOD does not intend to build a global biological 
surveillance network through the CBEP. DOD participates in bio-
surveillance as part of a larger U.S. Government biodefense effort with 
a focus on sustainability, building cooperative partners' national 
capacities, and encouraging broader regional cooperation and 
transparency. This CBEP effort must take into account select agents and 
other specific biological-related threats while other agencies are 
focused on protecting the public from infectious disease outbreaks. 
Although the security mission and the public health mission are not 
identical, the U.S. Government's national security entities--including 
the Departments of State and Defense--work in concert with the 
Departments of Health and Human Services, Agriculture, Commerce, 
Energy, and Homeland Security, the Federal Bureau of Investigation, the 
U.S. Agency for International Development, and a wide range of 
international and nongovernmental partners to address problems that are 
of shared concern. DOD has regular dialogue with its interagency 
partners and international organizations to ensure that we are building 
safe, secure capacity that is capable of mitigating and warning of 
critical biological events that could affect U.S. national security, 
and that we are doing so in ways that are harmonized and coordinated 
with broader bilateral and multilateral relationships with CTR program 
partners.

    7. Senator Hagan. Secretary Creedon, will the CTR program maintain 
this network over the long-term or will other health monitoring 
agencies sustain it?
    Ms. Creedon. DOD does not intend to build a global biological 
surveillance network through the CBEP. DOD participates in bio-
surveillance as part of a larger U.S. Government biodefense effort with 
a focus on sustainability, building cooperative partners' national 
capacities, and encouraging broader regional cooperation and 
transparency. Through this effort, the CBEP contributes substantial 
time and energy into establishing a unified voice within the U.S. 
Government that focuses on improving bio-surveillance. DOD has found 
ample opportunity for a shared commitment to strengthen cooperation to 
ensure that we effectively manage global and regional health risks 
through collaboration.

           TECHNICAL SKILLS AND SOPHISTICATION IN NEW REGIONS

    8. Senator Hagan. Director Myers, the CTR program in Russia and the 
former Soviet states concentrated on protecting nuclear assets and 
biological research laboratories all relying on a high degree of 
technological sophistication. As the CTR program transitions to 
Southeast Asia and Africa, are you able to use the same skill mix of 
people, training, and equipment, or do you have to retool for these new 
regions, and will you need the same level of technical sophistication?
    Mr. Myers. In order to effectively team with new partners in 
Southeast Asia and Africa, we need to first understand the unique needs 
and capabilities of each partner state. A key lesson we have learned is 
the need for varying levels of equipment and training within each 
partner at the various laboratories at the national and local levels. 
In some cases, the same equipment used in our programs in the former 
Soviet Union generally works at the national level labs with our new 
partners. Our goal at this level is to enable these partners to sustain 
this sophisticated equipment over the long-term. We expect that we may 
encounter situations where less complex and costly technology should be 
used to increase capability in bio-surveillance. Moving beyond national 
labs into regional or rural labs presents new, but manageable changes. 
Since we do not expect these facilities to have access to the same 
utility infrastructure and educational opportunities as the urban 
locations, we have to change or, as you put it, retool our approach. 
With our interagency partners we have identified more sustainable 
approaches to develop the human and technical capacity to safely detect 
and report dangerous diseases. In some cases, even simpler technology 
cannot be sustained. So, we work with the host nation to develop 
alternative ways to detect and report outbreaks. We are finding ways to 
provide the right level of technology that works best for each 
individual partner state. In addition to taking a closer look at 
technology, we examined the expertise of our people as we transition to 
new locations. We have added more biological and regional expertise to 
our Nunn-Lugar work force to address these evolving threats in new 
regions around the world.

                       CTR AGREEMENT WITH RUSSIA

    9. Senator Hagan. Secretary Creedon, the current CTR agreement for 
activities with Russia is set to expire in June 2013. Are there any 
issues or concerns at the present time that Congress should be aware of 
related to its renewal?
    Ms. Creedon. In Russia, the CTR program has a very successful 
legacy of developing the institutions, industries, and culture needed 
to secure and eliminate WMD and related technologies. Now that Russia 
has become a relatively wealthy nation, the CTR program is shifting its 
focus to cooperative activities designed to increase Russia's capacity 
to continue developing, sustaining, and upgrading those improvements 
with organic resources.
    Under this concept, the cost and scale of the CTR program's 
proposed activities in Russia will be much lower than in years past. 
But DOD believes that our continued engagement with Russia will be very 
valuable in securing and eliminating WMD and related technology, and 
that to continue this will require extending or renewing the CTR 
agreement with Russia. To this end, the United States is proposing to 
the Government of Russia that the U.S.-Russia CTR agreement be 
extended, which would also cover existing program work.

                           PROGRAM TRANSITION

    10. Senator Hagan. Deputy Administrator Harrington, for fiscal year 
2013, the Global Initiatives for Proliferation Prevention (GIPP) has 
been phased out and replaced by the Global Security through Science 
Partnership (GSSP) program. Can you please explain why the prior 
program was phased out and how this new program differs and why it is 
important?
    Ms. Harrington. In 2010, NNSA completed an all-source assessment of 
the expertise proliferation threat, including an extensive intelligence 
component. The assessment concluded that there is a significant WMD 
expertise proliferation threat that is no longer limited to expertise 
acquired by direct involvement in weapons programs, and that the threat 
is exacerbated by the increasing global availability of weapons-usable 
information and knowledge. The report concluded that a global scientist 
engagement program could help mitigate the evolving threat of WMD 
expertise proliferation and that the GIPP program should be reoriented 
to address this threat. Taking into account the recommendations of the 
reassessment, NNSA is planning to restructure its approach to scientist 
engagement in 2013 through a renamed activity, the GSSP program. 
Working through GSSP, NNSA will address the expanding threat of WMD 
expertise proliferation by: (1) refocusing and retargeting efforts 
geographically; (2) emphasizing engagements that build sustainable 
partnerships rather than providing assistance; and (3) using a whole-
of-government approach that leverages complementary NNSA and U.S. 
Government resources.
    The GSSP program will focus on creating opportunities for 
international partners to share information on scientific best 
practices, including the protection of WMD applicable knowledge and 
information. Targeted training and capacity-building efforts will be 
designed to strengthen scientists' abilities to recognize and stop WMD 
expertise proliferation. The promotion of targeted research and 
development initiatives also will be emphasized to mitigate the WMD 
expertise proliferation threat by fostering transparency and advancing 
nonproliferation objectives through scientist-to-scientist cooperation. 
NNSA's innovative approach to advancing nonproliferation goals through 
global scientist engagement is timely and tailored to an age where 
access to WMD-related technical know-how can spread effortlessly 
through the internet. The program is finalizing a country 
prioritization tool, and will present selected countries for 
engagement, along with discrete metrics designed to measure engagement 
progress, in July.

                        GREATEST THREAT CONCERN

    11. Senator Hagan. Director Myers, what is your greatest concern in 
terms of threats as the CTR program moves from Russia and the former 
Soviet states to South East Asia and Africa?
    Mr. Myers. The Nunn-Lugar CTR program has been a tremendous success 
in the former Soviet Union. By reducing from four to only one nuclear-
successor state, dismantling large portions of the former Soviet 
nuclear, biological, and chemical complex, and enabling Russia to 
better protect its remaining nuclear weapons against insider and 
terrorist threats, we have significantly reduced opportunities for 
potential proliferators. On the other hand, terrorists and potential 
state proliferators may take advantage of modern information age to 
weaponize dangerous, naturally occurring pathogens found in Africa and 
Southern Asia. This threat concerns me greatly. The expansion of the 
Nunn-Lugar program from the former Soviet Union to these parts of the 
world is intended to address this evolving threat. We are working with 
partner states in helping them to protect and account for the dangerous 
pathogens maintained at national and regional levels as part of their 
public health system. DOD works closely with our interagency partners 
in Southeast Asia and Africa, where terrorist groups are known to be 
active, in order to help the host nation with the security and safety 
of their biological laboratories. At relatively small cost, we are 
making these laboratories less attractive potential targets for 
terrorists who we know want to acquire such pathogens.
    We are also better integrating these new partners into regional and 
global health surveillance systems. We are also helping countries to 
prevent proliferation and the capability to interdict smugglers by 
training and equipping key partner agencies such as their coast guard, 
border guards, and customs. Preventing terrorists from acquiring 
biological weapons and helping the international community improve its 
bio-surveillance capabilities are critical investments for our national 
security.

                     UNENCUMBERED ENRICHED URANIUM

    12. Senator Hagan. Deputy Administrator Harrington, if fully 
licensed by the Nuclear Regulatory Commission, would General Electric's 
separation of isotopes by laser excitation process be considered a 
viable source of unencumbered uranium for defense purposes?
    Ms. Harrington. No. Enriched uranium produced by General Electric's 
separation of isotopes by laser excitation process is not available for 
defense purposes. The terms of the Agreement for Cooperation between 
the United States of America and Australia Concerning Technology for 
the Separation of Isotopes of Uranium by Laser Excitation provide that 
any material produced by this isotopic separation process shall not be 
used for any military purpose.

    [Whereupon, at 3:45 p.m., the subcommittee adjourned.]

                                 



NEWSLETTER
Join the GlobalSecurity.org mailing list