00:00All right, here we are, John.
00:21And Islamic State militants, I'm just trying to get some clarity on which specific groups were targeted.
00:27I think it was a great first step.
00:29I think there's going to be many more of these in the future, but we're charting what we don't have right now.
00:34So at the end of the day, it's a transitory location used by multiple threat groups.
00:38And so the ongoing analysis of exactly the effects of intel sharing, sharing TTPs, tactics, techniques, and procedures, as well as enable.
00:49So we do not plan on having any U.S. boots on the ground, but it's all about enabling the partners much like we have done.
00:56We're charting the roadmap to deeper cooperation from a Department of War perspective that's counterterrorism related.
01:08So how can we enable our Nigerian partners to be more effective?
01:12And it's the whole gamut of intel sharing, sharing TTPs, tactics, techniques, and procedures, as well as enabling them to procure more equipment,
01:21the right equipment that will be the most effective against ISIS and other VEOs.
01:26We've gotten a lot more aggressive and working with partners to target kinetically the threats, mainly it's ISIS.
01:36So from Somalia to Nigeria, the problem sets connected.
01:40And so we're trying to take it apart and then provide partners with the information they need to go do counterterrorism operations.
01:47And so it's been about more enabling partners and then providing them equipment and capabilities with less restrictions so that they can be more successful.
01:58We're not in the market to create a drone base anywhere.
02:05We are much more focused on getting capability to the right place at the right time and then leaving.
02:12And so we don't seek long term basing in any of the Western African countries.
02:17We seek long term partnerships and relationships, things like exercises, training, building partner capacity, and then enabling them to do counterterrorism operations on their own.
02:29Is it that there's Russians are in those two, three countries.
02:34And then there's online presence of different different nations, contracted cyber actors from the private sector who were contracted by China, Russia to do malign activity in support of their own interests.
02:53Are you preventing attacks on Christians?
02:55No, there's many at risk groups in Nigeria.
02:58We're trying to protect help Nigeria, protect all of its citizens.
03:02But there are some places where the terrorist threat converges where Christians live.
03:07That's mainly up in the Northeast.
03:10So that's where we're focused.
03:12But we are in tune to all the Nigerian security issues and we try to help them solve those problems.
03:32So that's where we're building.
03:34We try to catch things like that.
03:35We don't think we CAN.
03:36There you go, right?
03:38If you think there's a club in j Fire大的 encounter.
03:40No, we are on the east side.
03:41Not…
03:42Looking at it.
Comments