Skip to main content

tv   Politics and Public Policy Today  CSPAN  August 4, 2015 3:00pm-5:01pm EDT

3:00 pm
this is your e-mail. yes, i was there. the e-mail came from my doctor and i click on it and they are in. 85% of the chinese rate. and they just increased their rate by 53%. i'm not the smartest guy in the room but in the fbi we would call that a clue. we have problems abreuing so i appreciate the discussion and thanks for including me. >> that is fantastic. we have about 15 minutes or so to really open up for questions. focus on the evolving threat and from this panel it became clear the threat is from our adversaries from ourselves against ourselves as well. i don't know if someone has a mic or a small enough room. sir. >> hello. my name is georgetown morneau and is there any difference in
3:01 pm
approach to cyber warfare between the public and the private sector. can we say all private sector and the public sector goes one way and are there any differences in the approach to that? thank you. >> you want to take that. >> and i have a little bit of a different perspective than my panelists so this should be a interesting discussion. 85% of the networks in the united states are private. and contrary to popular belief the national security agency is not on those networks. not unless they have a warrant to be there and that is highly unlikely. and so what happens is you have intelligence services overseas and trying to bring it back to protect the government and we want to share that information in realtime so the private sector it protect themselves today. that is where we are today. it is not working. sharing is terrible. no one wants to do it for liability reasons an a whole host of good reasons not to share so we can fix. and here is the problem with the
3:02 pm
private sector saying heck with it, i'm going to go and flick whoever i think did this. attribution and determining and attributing that attack to a certain nation state or international criminal organization. there are capabilities all over the map. some can do it very well some think they can do it very well and some don't have a clue on how to do it but wouldn't stop them from doing it either way. but the government is in the responsibility of how do i protect 25 businesses from what would be the second order impact. if i attack you and you flick me in the forehead, i guarantee you won't sleep on it overnight. they will come back over night. and why? because they've been trained there isn't much of a consequence for that. and how do you contain that. i argue you have to have a good defense if your going to do something to your neighbor. if you want to punch him in the nose, hit the weight room for a
3:03 pm
while because he is likely to hit you back and so today we don't have that for 85 % of the networks. a lot of companies i wouldn't have any problem doing that. but what do you do when you take out the 15 companies that are the suppliers that can't handle attack and now we have a nation state watching happen as a government entity and what do you do? how do you stop the escalate. from a government entity wul ways of stop -- to deescalate any event and you have none of that in cyber space. we have to get all of that right before we allow that to happen. >> just real quickly. i love being on this panel with these gentlemen, it is awesome. and three problems. and you've identified a critical question. the adversaries don't differentiate between public and private. the autocratic and the totalitarian states, it is all
3:04 pm
one. the economic power and influence is part of a state power. the chinese has identified the banks as a strategic asset. and so our adversaries in this space don't differentiate. and secondly, if we think about national defense, resilience, our health system, our financial system, our infrastructure is a part of that. and so in some ways, the clear divide between public and private in this environment doesn't make a lot of sense. the third point would make is one of the challenges and mike referenced this is how we interact between the public and the private sector. information sharing is a leading edge of that question. but also it is a fundamental question of our national security architecture. how do we enlist the private sector in a way that enables them defends them and makes us part of a national resilient campaign when there is a clear
3:05 pm
blend. and one way of thinking about this and that is where mike and i disagree, i think there is a way of thinking about this aggressively a senate private earring model that takes from the constitution and the founding at the republic came at a time when there was much unease about the maritime constitution and now they can leverage private ears in the merit i'm domain because of the threat of violence. and they don't differentiate between public and private. we don't want to do damage to the constitution or the way we foster and protect the private sector but we can't ignore the private sector whether it is sans sony or jp morgon they have all part of the
3:06 pm
constitution. >> it is something the chairman and juan talked about with what is government and private sector owned but it goes past that. in our country and in most of the western countries there is a very hands-off view to the internet. you have to allow technology to innovate and governments have it as a philosophy to not get overly engaged in the infrastructure. that is not happening everywhere in the world. so the countries that we've already mentioned that get thrown out russia, china, north korea, they are bull cannizing the internet and you don't realize it. they own and monitor the infrastructure and they can take it up and turn it down, have resilient approaches. and so that relationship that we have with the private sector where we are hands off but on the same hand it is not resulting in secure
3:07 pm
outcomes and it is not being followed everywhere and what we're seeing as the rest of the world, those who are the aggressors are looking down their infrastructure. we are going in exactly the opposite direction in a way that would really not be considered -- i guess obvious when we do other things. for example, if i were to say i could develop one cell tower that has so much power that all you need is one cell tower and you'll always have your four bars all over the country but it will give you cancer. people will say that is a ridiculous invention and don't use it and don't build it. and if i can bield a car that goes 2,000 miles per hour and you can go to california in an hour and our roads aren't set up for it. and that is ridiculous idea i've heard. but in technology, you can sell anything regardless of the economic consequences to our
3:08 pm
country and we have to start thinking about what we're permitting and the relationship between the private sector and the government has to shift in common cause to health and safety and security. >> great. thank you. we'll take a couple questions. i just want to renks in the monograph both in juan's chapter and in michael's chapter there are discussions about letter of mark. and in fact there are interesting footnotes about this law school article that have been written by letters of mark and cyber that i commend you to. >> good afternoon. keith smally. i want to follow up on your last comments mr. chabbinski. a lot of the focus is how do we make the network for defendable, for robust and resilient and trigger the threat who hacked the system and at what point do we flip the model and holding the manufacturers accountable because i garuarantee you in most
3:09 pm
of the intrusions, whether it is sony or elsewhere it may have come in by spear phishing but it was using adobe or flash or some other vendor software running on that network and when do we hold them accountable and start cleaning our own house. >> i think it is the wrong perspective quite frankly. we don't demand perfect security in any other aspect of our lives. i would never dream if my house got burglarized i wouldn't go after the architect and say someone was able to tunnel through the ground. this is low cost, quick to market products that don't have the level of security. but never will. i'm not saying that there can't be a better job in coding and there are companies that have done it and an excellent job and i'm all four it but the fundamental position today we are talking about wouldn't change. that nation states and organized crime groups that are persist ebts and determine -- persistent
3:10 pm
and determined can break in because it is impossible to secure a dynamic interoperable environment which is what we have in the internet. the only time you see it in a physical world is like a bank or a fortress. it doesn't move or change over time and you can really secure it. but once you are going to meet up with everybody and change the time through updates and upgrades and connections that is the fool's errand. so the real choice is how do we tart taking the money and put it into a robust conversation and intellectual analysis and bring analytic standards to operations when these things happen what do we build platforms that when necessary are not necessarily better at being seek bur but are better at detection and attribution and figuring out what the policy choices are. and despite you took the card i'll make it this one -- some of the systems we need the best security for, coincidentally and
3:11 pm
goodco incident has the least privacy concerns. but if you have power the standard electric power grid everybody wants to have perfect knowledge of who is on it at any given time. that is where i would start. not cleaning up the house from a vulnerability point of view which could be done, but figuring out how to build in detection attribution and policy choices to give to our leaders in those areas that matter most. juan. >> just really quickly. i think there is a different dimension here that is important because what we haven't enabled is privately the private sector bar. with the attribution revolution there is an opportunity to think about class-action law enforcements, key time actions,
3:12 pm
victims of malignant cyber attacks that allow victim companies and individual sharmds to -- shareholders to go after companies that are taking advantage. so chinese soe's using stolen data why aren't they subject to government action and private litigation. so i think the question of liability is none important one but we need to flip the model more and empower the private sector to be an actor and deterrent. >> jim, i think we have time for one quick question. michael, quick. >> just to get you all on the record on this. >> how fast the tables change. >> yes. is it fair to say that the u.s. private sector in cyber has no right of self-defense according to the law that is our policy, we have no right of
3:13 pm
self-defense. and in the same way there is a duty to retreat, there is no right of self-defense. and i would like to begin with juan because you advise banks on this. and when you listen to the lawyers and the lawyers seek to work with you on this, do they feel the bank has a right to defend itself when it comes under attack by either criminals or nation states. >> i think part of this is how you define defense. because if you define defense passively and say of course we have the right to defend and we have the right to great layers and redundancy and a lot of the criticism is they haven't done those and the cyberine -- hygiene. and there is a lot of reticence of getting involved too actively. there are a lot of companies that don't want the idea of hack-back or to be active defenders of systems. they want the government to do it. they want more information to do it themselves.
3:14 pm
so in that sense if you define defense broadly, yes, they do. do they have an active defense role to play at this point and is there a legal structure for that? no. >> look, i mean, defense of person or property is a justification, right. so it is an another wise illegal activity. it is uncertain. we haven't seen prosecutions against companies. that might be prosecutorar discretion. and that is a case taken up. and most of this is theoretical but there is to certainty in this area. and unlike individuals who are more likely to roll the dice businesses hate uncertainty. and we're a nation that can't even get a national data breach law, we are stuck with dozens upon dozens of individual state laws in the area of data breach notification, so what is the chance of a company figuring they have certainty of action even within the united states,
3:15 pm
no less how that might be observed outside of the country where they are likely doing business. so i think the short answer is, do they there is no clear answer but that factor is enough to make it that big businesses that are responsible are not going to touch it. >> i think when you start talking about extra torit oriole defense, that is a loser from the get go. if you do not have proper legal authority, it is a disaster. in the stand your ground circumstance, you are dealing with a personal threat to your life and the way the law is written is it has to fit that criteria. this could you never make that -- that legal argument here number one. and number two, again when you decide you are going to breach territorial jurisdiction and go after someone, you have opened up a can of worms well beyond the scope of their threat and that is why we have to -- and our policy is not there.
3:16 pm
we don't in the united states have a good offensive policy. i think it was admiral rogers, not that long ago in the last few months, said just as much as that, woe dent have a good cyber offensive policy. we talked about it add em fin item for the entire time i was on intelligence community and we could never agree to move to the next place on what that cyber defense is. and the administration is going to make china pay for the consequence of the opm hack, i can't wait. i can't wait to see what the heck that is. and candidly i'm not too excited about what it will be. we haven't crossed that threshold to bring everybody into a room and work through this problem. i would -- long answer to your question, but i don't believe they have the right to go extra trtal to protect what they perceive would be a threat at that point. >> that is fantastic. thank you. thank you so much.
3:17 pm
if we could give a hand to the speakers. [ applause ] >> you can see how we can take many hours talking about that but we'll roll right into the next panel. capabilities needed to protect and defend economic work. so this played perfectly into that. [ pause in proceedings ]
3:18 pm
we want to get you out in a relatively timely fashion. so if we can ask you to reclaim your seat or somebody else's. so while we're getting our seats, before i turn it over to the panelists for this discussion i want to read a very sport paragraph. there is an intellectual no-man's land where military and political problems meet. we have no tradition of systematic study in this area and thus fewly intensely
3:19 pm
prepared experts. the military profession has traditionally depreciations the importance of strategy where policy is important as compared to tactics. and now we are faced with novel and baffling problems where we try to adapt strategic ideas from the past. we may be better able to judge whether they fit the present and the future. so this was writ flen 1959 by bernard brody in his treaty strategy in the middle age. and i recommend it to all. his calls for new ideas in scholarship to deal with the atomic age help the u.s. create the doctrine and capabilities that guided us for the last half century at least. but i would add there is a no-man's-land where political, military and economic problems meet wnd no tradition of
3:20 pm
systematic study in this area. and in our monograph and earlier seminars i have turned to earlier work and i and others did on the nuclear kill chain and thought about the app plick ability to the evolving cyber and economic warfare and there are indeed vast differences namely development and acquisition in use. and also what i call in the previous panels somewhat referenced it, could we be in a war and not notice metric. i think it is hard to ignore the use of a nuclear weapon. but as we heard in the last panel, we are fully engaged in a cyber enabled economic war. so the kill chain of needed capabilities so to speak may have to be thought about differently. but nonetheless, it is basic elements intelligence, deterrence forensic interdiction, consequence management and recovery serve as a useful way to gage our current capabilities an create the
3:21 pm
doctrine and technology that we need going forward. at this point i want to welcome our three amazingly talented individuals that will talk about technology and developments. the first is mark dubbo witz from the foundation of defense of democracies where he leads an sanctions and np -- nonproliferation and iran and the sanctions issue. he heads the center on sanctions and illicit finance and the coauthor of a dozen studies on economic sanctions against iran. so mark. off to you. >> great. sam, thank you very much. first of all, sam, i hope you will keep me to my five minutes so maybe give me a nudge if i've over five minutes. i'll try to make my remarks short. i want to thank very much for involving me in this project.
3:22 pm
an amazing project amazing people. ken, thank you very much for hosting this allowing fdd to co-host this and mark and michael good to be with you. and a special note to a young woman who co-authored this report with me any fixler who is based in new york who is the next generation of economic wars. and i know juan and samantha knows her well and it is satisfied to the three of us when we're off playing golf in our retirement someone like annie will continue the fight. we'll talk a little bit about the paper that we wrote together. and i want to put us in context. the paper is called cyber enabled swift warfare. and we call it swift warfare because the case study as part of the analysis is the swift financial messaging system so which is the global standard if i want to wire money to one my
3:23 pm
citi bank has swift codes and juan's bank at chase can talk to each other and i can wire money to juan which i do often. >> thank you. >> absolutely. so the key of looking at swift swift was the high point of the u.s. government's economic warfare campaign against iran. and it reminds me there was a point in time where we engaged in economic warfare against iran. this is coming at a particularly troubling moment for me having spent a lot of time working on iran to see the u.s. government dismantle the sanctions infrastructure we've put in place in pursuit of this nuclear deal but that is a topic for another panel. but certainly for a period of time, as david sanger explained in "the new york times," the u.s. treasury department where juan worked and under juan's leadership and stewart levy's leadership and david's and now
3:24 pm
adam, it was described as the president favorite noncombatant command. for good reason. it was the locust for economic warfare against the iranian regime and it was a decade of measures that began under president bush and the designation of key iranian banks an revolutionary gardenities and it cul main ated in the passage of sanctions legislation by congress, congressman rogers played a key role in that and it was fascinated because as the sanctions escalated you saw over time, a dramatic impact on the iranian economy and the decision-making. and some of the key events along the way included the u.s. treasury deposit patriot act 311 where there was a finding that the jurisdiction of iran, the financial sector was a jurisdiction of money laundering concern. it was legislation passed by menendez and kirk which
3:25 pm
designated the central bank of iran as the primary concern of money laundering. and in 2012 congress over the objection passed legislation threatening sanctions against the bords of directors of swift and that encouraged the europeans and eventually swift to excel dozens of iranian banks from the swift system. it was unprecedented. the first time in swift system it was the de-swifting of financial systems an cut off iran from the global financial system and made it impossible through the iranians through the system to move money and finance trade and to repatriate their foreign exchange earnings. now it was special a tool of very effective coercion: but it was something our adversaries have learned from. and i would note when it comes to swift, we've seen called from the u.s. congress and the
3:26 pm
british congress and from pro-palestinian organizations to use swift as this instrument as economic coercion. and last year palestinian versions asked swift to de-swift the branches in the territories. they asked to deswift russian banks an that led to the response of one of the largest banks vtb bank said that deswifting of the bank would be an act of war, an act of economic war. we've seen our adversaries try to take our playbook on iran and use it in other ways. in russia, the russians are using economic warfare against our allies in central and eastern europe. there they are using energy warfare. the dependence that our european allies have on russian natural gas for example. there is a series of measures offensive measures against
3:27 pm
russian because of the annexation of crimea and invasion of eastern ukraine and retaliatory measures by the russians against our allies and the united states leading to the need for defensive measures. if you move to asia-pacific the chinese has used political warfare against taiwan to persuade the international community it should not be recognized as an independent state. the chinese cut off the export of rare earth minerals for a couple of months and the rare earth minerals were key to the japanese chick and in the south china sea there is territorial disputes between japan and other countries and they have match add naval maneuvers with economic coercion. and so what you are seeing is our adversaries learning from us that the power of economic
3:28 pm
warfare and co ergs as a dominant instrument as coercive state craft. now the united states and our allies in the middle east and asia and in europe are lucky because the united states is still remaining the dominant global financial super power. 81% i think it is of global transactions are done in the u.s. dollar. 60% of foreign exchange reserves are held in the u.s. dollar. 45% of global financial transactions are done in the u.s. dollar. so because of the u.s. dollar's dominant position in the global financial system we still wield tremendous power. but make no mistake, that is changing and it is changing in fundamental rays. the russians an the china are creating an alternative to the swift football messaging system. it is in a nascent form right now and they have 10,500
3:29 pm
institutions using the swift position but in time it may erode the global dominant position of swift. the chinese have a credit card and interact card which is available in 100 plus countries around the world and it represented 45% of the total number of cards in global circulation and something like 25% to 30% of the total transaction value is quite extraordinary. and for the chinese it is useful and the russians because it is delinked from new york. so when we imposing sanctions on russian banks and the chinese moved in and offered this who can offer a credit card delinked from new york and not susceptible to our sanctions. the china have set up the asian structure investment bank. and as a final example and there
3:30 pm
are many others, the chinese have gone to the imf and asked that the -- something called the sdr, special drawing rights, which represent a global asset, a foreign exchange asset and that asset is linked to a basket of currencies including the u.s. dollar an the chinese yen and they are appreciate ooging to change the percentage allocation so the wand is more highly represented. and these are examples of how over time the chinese are trying to rerode our global dominance. we may witness a parallel financial system over time that diminishes the power of the u.s. dollar. and let me add on this with specific recommendations. annie and i conducted inviews with folks in the u.s. government and treasury and state officials, people in europe and asia because we really wanted to find out what
3:31 pm
kind of defensive measures were we actually taking. we've been very good ons offense but how -- on the offense and how good have we been on the defense. in the u.s., there isn't as much thinking about defensive economic warfare. how do we create a economic defensive shield to protect the u.s. and our allies from the use of offensive weapons by the iranians, the russians, the china and other -- the christians chinese and others. and the monograph came out with specific recommendations but within the government. institutional changes within the interagency. the idea of create an office of policy and planning at the treasury. state has an office of policy planning and our recommendation is the treasury department should have a department where they think about these defensive measures and they have the time unlike those from the treasury who are drinking from a fire hose every day to think what kind of specific measures to put
3:32 pm
in place to defend the united states and the allies. and number two was economic warfare at a sub director from the nsc and there are folks there with a long of -- a lot of strong planning on the economic side and they understand markets and financial markets but having people at the nsc who understand sanctions and elicit finance in the use of economic warfare would be useful. and three was establishing a doctrine. we have doctrined from the nuclear age. we have doctrines about missile defense and we certainly have a new cyber doctrine that folks have spoken about and an economic warfare doctrine would be effective. how should we be using this offensively or defensively. but the idea of setting up an economic warfare demand. we have commands in the u.s. government, most of them at the pentagon, but this idea is a kbhik warfare demand drawing the best and the brightest and the
3:33 pm
necessary resources across the interagency and our recommendation was to location it at treasury. i'm sure there will be debates about that. but the doctrine and the institutional changes are so we can protect our allies against the use of economic coercion. and i'll end with this. israel is an interesting example because the boycott against israel suggests we're seeing the canary in the coal mine. here is a small liberal democracy, an ally of the united states and all of a sudden economic warfare is being used against israel in order to achieve political objectives of those who oppose israel's position in the territories. whatever position you take on the territories, whatever position you take on the these regional disputes, my assessment and my conclusion is we should be protecting our allies with cyber defenses, ballistic
3:34 pm
missile defenses and economic warfare defenses, regardless of the assessment of who is right with respect to a regional dispute. this is canary in the coal mine. as terrorism came to our shores economic warfare will come to our shores and we knee to think about the -- need to think about the economic doctrines to defend that shield. >> that is great. the only thing i would take with is economic warfare has reached our shores. and in their chapters they do delve in if we are going to be serious about this and let's be serious and what does that mean in terms of organizational changes necessary in the u.s. government. but our next two speakers focus on where really the rubber meets the road, in terms of the technology needed. how we think about that. because ultimately you know we're going to have to be able to back up our words of
3:35 pm
deterrence with technology. and the first speaker is mikele hsieh in the innovation office at darpa which is the defense advanced response agency. previously he was a research scientist at saic and a scientific consultant and holds a hpd in chemistry from princeton. michael. >> thanks. i think i speak for mark as well too when i say that those of us who work on the technology side of the house found this to be a very useful and fun exercise to think about the broughter context in which a lot of our work lives. and a premade remark since i'm still in government, all of the opinions are my own and not those of darpa or the u.s. government.
3:36 pm
so i'm going to begin on a slightly down beat note. today you can't -- you can barely turn on your news browser without seeing a fresh story about another u.s. firm victimized by economic espionage or intellectual property theft. and what is vexing about today's state of affairs is there is not a good path out of this equilibrium. we hope to find new thinking to help us out of the state. one by taking the opinion of a timeless instrument of competition between nation states. and number two, a scientistic perspective on technologies that can potentially help us flip the script on the economic spies and the ip pirates targeting our national industry and our strength. so to begin we have some history here. the notion of intellectual property noted over centuries as thenen shinement to the
3:37 pm
inventors of valuable ideas. the economy is sensitive to the climate in which such rewards are expected because in a report by the patent and trademark 75 out of 223 are category gorized as ip intensity and they account for 17% of all employment in the u.s. in 2010. according to the 2013 report by the commission on the theft of american intellectual property, the us loses $300 billion in protection. if they did that overseas as they did here, it will include jobs and economic growth. not all countries in the world are serious about protecting a rule of law based ip rights regime but perhaps one of the great ironies of history is the united states has been here before this this problem but on the other side of the problem. in the immediate aftermath of
3:38 pm
america's war independent from the u.k. our young republic engaged in a no holds barred campaign of tolerated ip theft against british industry to super charge the young person manufacturing economy. now the british response to this was quite rigorous. they were fully aware of the stakes of this conflict. they imposed export control on machines an designed and restrictions on grigs and acts of arson against u.s. factors installing stolen ip. and i know there are hack-backs but this isn't what we have in mind. the idea of hack backs is not new but it has been tried. but arson aside it would not look unofficial to americans today. but the british policy completely failed to stop the diffusion of the most sensitive manufacturing ip into the families of the oceanic rival which went on to clip the u.k.
3:39 pm
as the manufacturers leader. all of this may sound distressing today and in 2013 it is america playing defense in this game. so to examfy the struggles of our -- to exemplify, will focus on the software industry not only because they are largest by export value but there are new ideas pertinent to the industry that might inspire new thinking for other industry protections as well. to give a portion illustration of what our software industry struggles with, in a report by the business software alliance. 19% of the software sold in the u.s. is pirated. but across flarjs is copyrights. there is the deeper and far more morin sid yent theft made possible by extracting theal go ridges and ideas created through vast sums in research and
3:40 pm
development dollars. so how do we stop something like this. through the lense of how we might protect our software industry we develop a new model of thinking how to protect our ip based not only on law of diplomacy but on technology and economics as well. that may change the dynamic between attacker and defender in the ip conflict. the status quo in defending the nation's ip industry in general tilts toward the british and as we've seen through historical experience there are fundamental limitations to this kind after poach so it is useful to pull back a step and think about the problem at a basic level. ip theft is fundamentally as much economic as it is a criminal phenomenon and we have seen through historical experience that laws and diplomacy are limited in deterring criminals from this kind of crime so the question is
3:41 pm
can we deter economic decision makers from deciding to steal as opposed to not steal. can we raise the technical cost of stealing to such high levels it no longer becomes worthwhile to do so. the good news is the answer is yes but there are some major caveats. today commercial software is defenseless against being wrung by ip by reverse engineers by the state of art in defending against theft largely consisted of in certificating passive junk code to enable the tacker to give him more code to read and to understand. however, this security through obscurity approach can almost always be defeated in under a day with standard software tools and universally guard assin effectual among software security experts. but a recent mathematic break through by collaborators has opened up the doors that can baffle even the best engineers.
3:42 pm
it requires writing the source code equivalent to computing a mathematical problem that requires lifetimes of effort even with the most super computers and algorithms known today. that is exciting. because this is the break through could be the impetuous to imagining where our ip rights are governed by the laws of mathematics. but here are there luge caveats. realizing such technologies not only for software but maybe for other products as well will radically require new scientific ideas that will take years if not decades of sustained research and effort. but if these efforts are successful, it could ensure far into the future. and to pivot to another problem one of the issues that we have in the cyber threat today is that victims are caught up in a very pathological dynamic in
3:43 pm
which they have sometimes an interest in concealing their own victim hood. we talked about this in the context of cyber threat sharing. so one of the things that has emerged over the past 30 years is the field called secure multi party computation and this began as something of an academy problem about a little bit more than 30 years ago this was called the millionaires problem. and two millionaires wanted to see how much money each one has but didn't want to reveal how much they have. but this is a contrived problem but have a cryptographic matter it is not confusing and a whole field built up into this in what we call sm pc today. and given that wasn't a problem 30 years ago, what this has evolved into 30 years later is a very valuable and practical
3:44 pm
technology in a very real problem. so in space today there are some dozens, if not scores of space bearing nations. they have satellites going at high speeds and every interest has -- and every one has an interest in not having them collide but you can give away information but so how do you share information about your satellites would you giving away those kind of secrets. so where the research has gone from the contrived millionaires problem 30 years ago to technology, to actual software today that could help the likes of national space agencies and companies share -- share their information without revealing private information. this is obviously exciting because these are not trivial problems. for the math gila bendeeks out there, there are objects going
3:45 pm
relatively speeds. so it is a heart problem and computationally very difficult. and again there is software after decades of investment that gets us closer to that problem. and it is not hard to see how this maps on to the kind of sharing problems within the cyber threat realm which has a nontrivial and important privacy component as well too. so to conclude i think it is fitting that the ingenuity of the american system that let us develop world changing ideas could be the source of defenses to protect those ideas. thank you. >> michael. doesn't it make you feel he's in the government protecting us. >> why should something feel good. >> he's tremendous. but the modern day problem of the millionaire's problem now is to figure out how much money does donald trump have. that is what it has evolved to. and finally, mark tucker is the founder and ceo of temperal
3:46 pm
defense systems and founding board member of the cyber insurance company of america. and at tds he leads a team of experienced white hat hackers and technology that are redefining the paradigm to safeguard networks in the cyber war era. so mark. >> thank you. that was a mouthful. thank you samantha and thank you for inviting me. this is a great way to look at the problem. it is a complex problem. and not quite understood. but when you marry the two terms of cyber war with economic cyber war it brings multiple notions that cross pollinate and define the problem. so before i go into a few things and ideas that i think might help correct the problem, i think we're still at the point where we need to quantify and -- and basically understand the problems' dynamics. and when i heard a few things in the previous panel i was
3:47 pm
opposed. and was down there and i couldn't talk to i've held some of those things and i understand where the comments were made and the comments were made because of the trends and the economic things happening and trying to understand the essence of what is going on here is what forums like this are about. and so when you look at cyber economic warfare, you are like well, what is it? well it is war. it is not crime. there is a difference between a war environment and a criminal environment. crimes happen in war. but i think it is safe to say that if we get some actionable assumptions and say okay maybe it is not approval 100% by preponderance of the evidence means this ascension is pretty good and we -- means this is start pretty good idea and we need the department of cyber command now and multiple departments of everything.
3:48 pm
but the core of the problem, i think is still a little bit illusive. so i think a few things in the first panel were perfect and spot on. so let's say actionable assumption. cyber war is here and upon us. and i would go so far as to say when did cyber crime become cyber war? what inflection point in time did that happen? that happened in the stocks net attack. that was the shot heard around the world and that is when cyber war became -- kind of like the turning point of criminal gangs and all of the activities happening to something that became a -- a physical damage was caused and it caused geopolitical out comes because of it. and that is the shot heard around the world, we can assume that cyber war is herech and then we look at what is the dynamic of cyber war look look. it looks like low intensity. that is what it looks like to
3:49 pm
me. it is not the balance between the nuclear war area where everybody put up the huge offenses and nobody struck. why? because the proliferation has already occurred. that dynamic doesn't exist in cyber because there are too many actors and it takes one individual so that would be equivalent to saying well if we think about it like trying to do a nuclear power arms race buildup of offensive cyber weapons, it won't work because we can't control it. there are too many points of attack heading through. but if you look at it like a low intensity intensity conflict you can say cyber war is here for a long time and there are interesting things that will happen. and the playing field if i could compare a few examples of where a low intensity con flick is occurred -- conflict is occurred, we look at iraq in 2004. america comes in. we take the country over.
3:50 pm
i was there, so the ground truth i had then is equal to the ground truth i have now on the problem and so i see it on all different levels. so when i was first there there was a bomb here and in essence, there was a power void, saddam was gone and nobody knew what to do. the criminal gang started to move first. there was a little bit of activity happening. what happens when those types of low intensity conflicts evolve there's coordination and then there's six bombs going off at the same time and frequency going up. when we look at the threat horizon over a 20 year period basically we're seeing a negative threat for 20 years, negative trend occurring. when most of that occurred -- think of it as cyber crime era -- now in the cyber war era we've seen the curve steepen. in essence, what's happening,
3:51 pm
you look at the battlefield and the battlefield is interesting because it's all around all of us and it's global. you say what's going on? the frequency of attack is occurring and battlefield softened. we see attacks on the banking system, on the transportation systems and all these negative economic pieces, we haven't seen anything yet. this is the normal course of a low intensity conflict. the next stage is coordination. when coordination occurs people will get worried and scared and plan is completely required. what we should be doing is learning from these types of discussion points to get ahead of the curve and make this plan. if we take the assumption we're in the cyber war era, it looks like low intensity conflict. we've got a power void because nobody is controlling what's going on, then we're saying, okay, well maybe we need to come up with some assumptions of
3:52 pm
how we got here. why is security so bad? you can borrow economic principles to understand that. it's pretty easy. the question was asked is why don't the manufacturers share in the liability? you want to know why? because bill gates' dad was an attorney and very smart attorney. every time you load software hit an okay button and basically take the liability and shift it over to you or company, you do shift that to your company. it makes total sense we have so many security holes because the economic incentive is not with the manufacturer of these products. a part of what steve was talking about, while i disagree with him, i understand how he got to those notions. you can't fix the problems so all we have is offense. i would suggest this, that we can fix the problem. the defensive problem is fixable. like any problem, we have to be
3:53 pm
able to quantify it. if we don't quantify the problem and we can't measure the problem, we don't know if it's improving or getting worse. we can see the attacks move up and down, but we don't know how to compare one technology against another technology. what is this security of this industry? what is the baseline? we don't have any of those metrics right now. one of the technologies that maybe won't shift liability back to the manufacturers, and people know one operating system scores a three and another scores a four in security. so what that will do is it will allow economic principles to basically take the security responsibility and allow the consumers and purchasing manages to buy more secure stuff. once we know how to measure it, and that technology is in existence now, we can say, all right, we will change the
3:54 pm
evolutionary path of technology because now that we can measure it, it's no longer good enough to say i have good security. i have a firewall, i have antivirus. and i have an intrusion detection system. what will happen is you will say your security is a 3. you may have all those things but those things aren't basically raising your level of security so by raising the standard use of measure for technology, which is called qsm, which is one of our company's products which we worked with george mason university over years to solve is a block to change this shifting liability landscape and allowing the security level to go back into technology. we look at these problems, there's an okay button. that okay button sure did a lot. yes, it did. but there's also things that did a lot to technology. moore's law, for example, every two years a chip gets twice as fast. there hasn't been any
3:55 pm
interesting profound observational laws even, right? if we have this 20 year negative trend threats keep going higher and higher now at an increasing point, we can get ahead of that curve by let's say two years so all of a sudden, we have the ability to measure technology security and we can start to use america's creativity and america's production force and harness the country's resources on a technological basis that's now focuses toward better security, we can come up with maybe the ravage law and say, well, if america stays two years ahead on security, then we're basically going to hit an inflection point where that trend starts to go down. as long as we stay two years ahead, then all of a sudden we're heading in the right trajectory for defensive security. in this american cyber action plan, kay, 85% of resources are
3:56 pm
some number. 85% is defense and the rest offense. for example. we have to come up with those measures and those metrics and then we basically have to coordinate as a country to utilize our resources to win. we're america, we own the technology market still. we way not own the manufacturing base, they're still our ideas. why do you think they're stealing our ip? we're ahead. lets use the things america can basically take to market and the fact that our vulnerability is the fact that we're connected, right? that's also our greatest strength. if we harness what put us here and look at it in a different way, i think we can make an improvement on the defensive side and on the offensive side if we start thinking of the problem like low intensity conflict and we create things to beat cyber insurgencies which is basically what's happening, and we kind of look at the surge, we can have a banking industry
3:57 pm
surge to basically take the fight back to them and to create those deterrent portions. it's not going to be police type of effort because there's no laws being enforced and ability to basically bring someone to justice is very difficult. it will look like a low intensity conflict cyber war environment. anyway, my time is up. thank you. >> thank you, mark. before we do to the questions, i wanted to mention, when we started this project, we really wanted to create a larger group of people that are interested in this topic that take different pieces of the research on to move it forward. we never wanted it to be that this is the be all and end all. there's a lot to go forward on this. one of the things i think this panel and the last one really showcased are the needed kind of places where policy and new
3:58 pm
technologies come to bear. on that, i was hudson -- hudson institute's co-founder herman kahn, wrote the six desirable characteristics of a deterrent. a deterrent to be successful must be frightening, inexorable, persuasive, cheap, non-accident-prone and controllable. if we even start with those six things and you can imagine having the policymakers, war fighters, technologists around a table saying here's the problem, how do we create a deterrent that rests with sound policy, doctrine and the technologies to be able to do what kahne recommended, i think we would really move this conversation ahead. my trajection -- yeah. wait one second.
3:59 pm
>> fdd center on sanctions and elicit finance. great thought provoking panels. there was something said on the first panel that provoked a question i think is appropriate for you all which was the reference to us losing the space race. it made me think about president kennedy decades ago. he set the goal when he set the goalposts and the undercurrents of getting to the moon and the space race. the undercurrent was our competition with the soviet union and tremendous threat that was there. over that decade he really galvanized the country galvanized with this goal inspiring and very positive. if we were to look at the cyber war, cyber race, what would be the goal or goalposts? is there a way to galvanize this next generation of young people and others within our society to target a specific goal so we could win the cyber race, which we're losing. >> do you want to take this
4:00 pm
first? >> that's an analogy often drawn. of course it's problematic because with a space race, there's clearly defined goalposts as to progress, sending a man to space setting a man on the moon, sending a device to mars and beyond and so on and so forth. the problem with cyber is the agenda is much more diffuse. there are the kind of cyber problems that exist on machines in networks and as chairman rogers mentioned to previous panel, anthropological problems. one of the things that tends to be a distracter on the cyber debate is overemphasis on technological dimensions. there's homoen dimension as well. all security problems are human problems. looking at statistics of the type of compromises that occurs, somebody opens an e-mail or opens an attachment and goes to
4:01 pm
a link and all hell breaks loose after that. at the end of the day, you're not going to get away from that because we don't design software and networks for machines. we design them for ourselves. where we could possibly direct one area of research actually is to say that we should stop blaming the human because we are human. we should be able to open up a link or attachment or go to a site without trembling in mortal fear it will compromise the entire enterprise. whereas i think there's going to be a much more diffuse kind of agenda for the cyber problem i think there are some problems could still be very ambitiously stated, very much like the problems of the space race, too. that's one of them, but i'm sure there are others, too. >> i would add to this, maybe too simplistic. when it comes to cyber the notion of winning we're cautious about.
4:02 pm
we're careful about. we don't actually want to win in cyber, we want to survive. in historical terms we invent the cannonball. we don't want to win using the cannonball, we want to survive if the other side gets one. we invent missiles. again, we don't want to just win using missiles. we want to create missile defense shields just in case the other side develops bigger missiles than we have. there seems to be hesitation when it comes to cyber. i don't work in the cyber field, but i sense it in the language. the goal should be we will win this cyber war and any country that launches a cyber attack against us will be met with fearsome retaliation. i don't know what we will do against chinese because of opm. no idea. i don't hear in the rhetoric of the president a commitment to actually win. i think we need to send a message, we're the united states of america and whether you hit us us with cannon balls or missiles or cyber attacks, our
4:03 pm
retaliation is fearsome and our goal is to win in the cyber world as we won i think, in missiles, and we won in cannonballs. it's a commitment at that level before we get into exactly how we do it on a technical level and how we reorient the u.s. government on an institutional and a doctrinal level in order to do so. >> mark. >> i also think there's measurable goalposts along the way. for example when we hit this turning point in the 20 year trend ticks down, what is going to actually happen? if we say what will happen on the pla side or china side, unit 61398, all of a sudden, all the millions of agents they're watching on their screens and monitoring, go dark. that's actionable. when that happens you know what we will see? we will see that unit freak out.
4:04 pm
we will see them go back in the drawing board and working day and night start sending minions out to try to get new points so they can basically reinsert new types of agents. this is what i mean by we've got to stay two years ahead. if we can stay two years ahead the effects are dramatic. right now, what we have done is stayed complacent and let all these agents and things and supply chain infections permeate everything. just like that where we're saying, lrtd, when the turning point hits, how will you know? that unit the biggest unit in the world right now that is basically one unit against us they're basically, their agents go dark. then we'll see actions because of it. i think we can measure the number of cyber events that occur and measure the amount of money that's stolen from a bank or credit card. i think we can come up with measurable are we winning
4:05 pm
metrics. >> here's just a quick addition to that. here's an indication how you're losing. i was read through the iran deal the other day and everyday it's a new surprise. but my yikes moment of last week is i discovered that united states and our allies, we commit to protecting the iranian nuclear program against sabotage. okay? so in effect what we're saying is we're going to predict the iranian regime's nuclear program against the ability of the united states, israel, other allies to use cyber offensive weapons against iran's nuclear program. regardless of what happens with that nuclear program in, ten years, 15 years time it will be of industrial scale with near zero breakout and sneakout. they'll have an icbm and powerful economy and even then we'll commit to defend their nuclear program against cyber sabotage. so, that's not the shot to the moon. that's not a commitment to winning. that's actually, we're going to
4:06 pm
harden our adversariy's cyber defenses. >> sir? >> my name is rich willhelm. i ran all of our business with the intelligence agencies. but 20 years ago i had a job similar to yours on vice president gore's staff, samantha, where we did round one of all of this. you're so much farther ahead now. but i'm struck by one thing. yes, we are much farther ahead. we understand the threat a lot better and there's a lot more technology out there. but i'm struck by how little progress we've made in solving the central policy issues that will be required to actually move ahead. and, you know, my thinking over the years, i think has matured some what and it seems to me that we're essentially trying to solve the problem where boundaries don't count on a
4:07 pm
legal policy, an organization and bureaucratic framework where boundaries really do count. and i'm not just talking about geographic boundaries. i'm talking about the difference between private and public sector responsibilities between domestic and foreign, you know, if you look at the intelligence community. and we need some new framework. what -- this is a question really for you, mark. you talked about -- i mean the government response has been to create new organizations but not fundamentally alter the existing boundaries that exist in law of our existing agencies. what do you think a likelihood is that we can solve that problem over the long run and that there is a new paradigm
4:08 pm
that will emerge so that -- so that the interfaces between the various agencies operate a hell of a lot more smoothly than they do right now? >> right. thank you for that question and for your service on these issues. i would say that i'm somewhat optimistic. i have seen it from the outside on the offensive side. i think we've done a pretty good job. a lot of credit to juan and the folks at the office of terrorism and financial terrorism and treasury. who ever heard of tfi or ofac 15 years ago? i hadn't. i'm sure lots of folks in this room hadn't. but what juan and his colleagues did at tfi and ofac had been around a long time, is they took institutions, agencies in the u.s. treasury department, and they turned them on offense. i think that a really remarkable job not just leveraging government but leveraging markets. the real secret sauce of our
4:09 pm
financial coercion on offense was not what we did to governments. it's what we did to companies and financial institutions in changing their risk/reward assessment with respect to doing knz with rogue regimes or terrorist organizations. it was giving them a fundamental choice. can you do business with our 17 trillion economy or iran's $3 auto billion economy. if you do business with their $350 billion economy, you're going to be doing business with the revolutionary guards and a number of very bad actors who are engaged in a range of elicit financial activity. that was the sort of genius of that program. congress played a significant role, other agencies played a significant role. i would say it's been a very successful program. i'm obviously very skeptical about whether we actually use those incredible resources and achievements towards right diplomatic ends. but at the end of the day we certainly hone the instruments and our paper tries to look at it from the other point of view.
4:10 pm
now with those instruments honed on offense and other countries and adversaries using the same powers, how can we reorient the government to start thinking about creating a defensive economic shield? we started to make moves on the side where we have cyber command. i'm learning about the deficiencies we've got in that area. but from an economic warfare perspective, the folks at tfi don't have the time to actually think through defensive shields. which is why an office of policy planning is useful. it will be useful to have that director at nsc. i think it would be useful to have an economic warfare command to think through on the cyber side and on the traditional economic warfare side, how do we defend the united states. and i'll end with this. here's a good news story to me. state of south carolina just passed legislation. and the legislation simply says that any country that actually uses economic warfare against
4:11 pm
one of our allies will be denied federal -- state grants from south carolina and that the state pension fund of south carolina will have to divest from any companies engaged in economic warfare. against one of our allies. that's interesting. that's at the state level. it's the state of south carolina. it's effectively saying you use economic warfare against the united states or our allies, don't come do business in the state of south carolina. and you're starting to see the spread across the country. illinois just did something similar and other states are contemplating. that's creating a defensive shield at the state level, which i think could be created at the federal level through executive orders legislation, and creating a defensive economic architecture led by many of the same people who have been so successful on offense. >> that's great. and take one last question. and just so that you political scientists or ir theorists don't think that there is a place for
4:12 pm
you in this robust debate and moving forward and just a place for economists and technologists, we need a better understanding of how the different adversaries view their strategy towards us. there is absolutely no reason to think that what is in -- what the russians are doing or how they're organizing is in any way similar to what the chinese are doing or the iranians are doing or north koreans are doing. so an understanding of those states and how they view strategy and tactics is a must in all of this piece and one telling point on this is that in the weeks before the sony hack, the north koreans were speaking out at every opportunity they had, screaming that the movie that sony -- that sony was going to release "the interview" was an existential threat to north
4:13 pm
korea. so the north korean watchers, you know, knew that the north koreans may possibly be gearing up to take action, retaliatory action. of course, when the sony hack hit, they were the first ones to say, you know, look over at pyongyang. all right. last question, sir? >> dr. shea used the phrase cryptographicly sound. it reminded one that there are parts of the u.s. government that are using cryptographically sound practices. which raises the question how serious the u.s. government is about the whole idea about being cryptographically unsound has its advantage, and any technology you have, the guy will get in a year or two afterwards. any comments. >> i should preface all this by saying today i'm speaking as an individual and not as a representative of either my agency, department, or the u.s.
4:14 pm
government at large. but i think i should also preface or append to my earlier comments that i'm essentially talking about things that still live very much in the research space. and so obviously cryptography means a lot of different things. when you're talking about mature technologies verses a lot of things that still happen in academic circles and so on and so forth. and so when i say use terms like security and this cryptograph context, maybe the better word should be provable security. in a sense that we can quantify how much security we're getting given certain settings. i think that is a more accurate way to characterize that. >> well that's wonderful. i think with that i'm going to wrap up unless you have one last statement? okay. all right. i thank you so much.
4:15 pm
and stay tuned for the synopsis of this seminar, the survey results. again, i encourage you all to take it if you haven't. it's fast and anonymous. thank you again. have a good day.
4:16 pm
this month, c-span is looking back at the cities and towns we visited this year, showing you the history and cultural life of the areas. today, we stop in austin, texas. that begins at 6:00 eastern. tomorrow, the senate banking committee holds a hearing on sanctions relief that's part of the iran nuclear agreement. witnesses include the lead negotiator for the u.s., wendy sherman, undersecretary of state for political affairs. you can see live coverage on c-span3 tomorrow morning at 10:00 eastern. president obama goes to american university here in washington, d.c. tomorrow to talk about the iran nuclear agreement. he's expected to counter criticism of the deal and explain why congress shouldn't block it. c-span will have live coverage
4:17 pm
of the president tomorrow morning at 11:20 eastern. yesterday, president obama spoke to a class of 500 mandela washington fellows, part of a presidential summit for young leaders from subsahara africa. the purpose is to train them with entrepreneurial skills they can take back to their communities. president obama talked to the group for just over an hour. >> thank you. well, hello, everybody. ♪ happy birthday to you happy birthday to you ♪
4:18 pm
♪ happy birthday to you ♪ >> thank you. thank you. everybody, sit down. thank you so much. well. this is a good crowd here. first of all can everybody please give grace another big round of applause. you know not only does she do incredibly inspiring work in nigeria, but i have to say following grace is a little bit like following michelle. you know she's so good that you kind of feel bad when you're walking out. because you're thinking, i'm not going to be that good. but she's just one example of the incredible talent that's in
4:19 pm
this room. and to all of you, i know that you've been here in the united states for just a few weeks but let me say on behalf of the american people, welcome to the united states. we're thrilled to have you here. and your visit comes at a perfect time. because yes, it's soon my birthday. and that's a very important thing. but that's not the main reason it's a perfect time. the main reason is because as many of you know i just returned from africa. and it was my fourth trip to subsaharan africa. more than any other u.s. president, and i was proud to be the first u.s. president to visit kenya, the first -- [ cheers and applause ] the first to visit ethiopia. the first to address the african union, which was a great honor. and the reason i have devoted so
4:20 pm
much energy to our work with the continent is as i said last week even as africa continues to confront many challenges africa is on the move. it's one of the fastest growing regions in the world. africa's middle class is projected to grow to more than 1 billion consumers. with hundreds of millions of mobile phones and surging access to the internet. african aare beginning to leap frog old technologies into new prosperity. the continent has achieved historic gains in health from fighting hiv/aids to making childbirth safer for women and babies. millions have been lifted from extreme poverty, so this is extraordinary progress. and young people like you, are driving so much of this progress. because africa is the youngest continent. i saw the power of youth on my trip. in kenya.
4:21 pm
richard ruuto helped build yes youth can, one of the country's most prominent civil society groups with over one million members. at the global entrepreneur center in nairobi they spoke about how they started brilliant footsteps academy in nijore yeah, which uses education to fight religious extremism and provide more opportunities for young muslim youth. i met judith, an yauntentrepreneur who co-founded a nonprofit that trains young women living in the slums of nairobi in computer programming and graphic design and helps place them in tech jobs. so i saw the talent of young people all across the continent. and as president, i want to make sure that even as we're working with governments, we're also helping to empower young africans like all of you. and that's why ieded yali,
4:22 pm
young african leadership initiative, to help you access the resources -- to help you access the resources and training and networks you need to become the next network of leaders in all areas, in civil society and business and government, and the response has been overwhelming. so far more than 140,000 young people across africa have joined our yali network. so young africans with new ideas can connect with each other and collaborate and work together to put their plans into action. i want to welcome all of the yali network members across africa who are watching this town hall today. i'm proud of all of you. i'm proud that we've made so much progress together after just a few years. and last year, i said we would launch a new set of tools for our yali network. so today we've got more than 30 online lessons available on
4:23 pm
everything from public speaking to how to write a business plan, mentoring. new ways to network across africa, around the world. new training sessions. meetings with experts on how to launch a start-up. and we're launching three new online mandela fellow washington fellowship institute courses so that all members of the yali network can access some of the great ideas you have been sharing. last year, i said that we would create yali regional leadership centers across africa to provide skills, networks and opportunities to even more young african leaders. and in kenya, i had a chance to visit the regional leadership center in nairobi. this morning, we opened a new center, and two more will be open by the end of the year. [ cheers and applause ] last year, i said we would do even more to support young entrepreneurs with grants.
4:24 pm
to help you start a business or nonprofit. and with new training for thousands of aspiring entrepreneurs in small towns and rural areas. so at the recent global entrepreneur summit in nairobi i announced we secured more than $1 million in commitments from banks and philanthropists to support emerging entrepreneurs around the world, including in africa, with half the money going to support women and young people. and last year, i welcomed our first class of mandela fellows. this year, the response was overwhelming again nearly 30,000 applied. and today i am honored to welcome you, the second mandela washington fellows class. we're on track to double the mandela washington fellowship program to 1,000 fellows by next year.
4:25 pm
and i know you've been busy. over the past few weeks schools and businesses all across america, you have been taking courses, developing the skills you'll need to make your ideas a reality. so that you're able to continue the great work that you're already doing, but take it to the next level. that's what brian plans to do. where is brian? where is he? there he is right there? so brian uses music to advocate against things like gender-based violence and to educate youth on hiv/aids. so while in the u.s., he's learned about our health care system, met the founder of an american hiv/aids organization, and now he plans to start a record label for music about
4:26 pm
social change. brian, we're proud to be your partner. or we've got kadijah diallo where is khadijah? there she is. so, she helped lead unicef's media campaign to stop the spread of ebola. with the management skills she gained at wagner college, she wants to work on improving the lives of women and girls back home in guinea. we're proud to be your partner. or we've got jamila mayanja of uganda. are you posing? she is posing. jamila is not a fashion model.
4:27 pm
that's not -- she's started a door-to-door laundry company to employ more youth and teach them entrepreneurial skills and she hopes to take what she learned at her time at dartmouth university to meet her goal of getting 1,000 youth to work in or run their own business. we're proud to be your partner. so that's just a sampling of the incredible projects that are being done by fellows all across africa. so this program's going to help all of you make a real difference back home. but fatou from senegal, where is fu futou. she wrote me a letter and said if the real value of yali is for young people to learn for mothers, maybe we should start sending young americans to
4:28 pm
africa also. she made the point, not just to help poor communities as they usually do, but to learn from other societies with humility. and which i thought is absolutely true. so i have good news. from now on we'll give americans an opportunity next summer, up to 80 american leaders will join -- [ cheers and applause ] up to 80 yearn american leaders will join yali and go to africa to learn from you and your countries. and you guys are going to have to look after them when they're there. you know, show them good places but not too much fun. they need to be doing some work while they're there. so these connections and partnerships and friendships they forge an understanding that brings our peoples closer
4:29 pm
together. after six weeks here, some of you are now officially texas longhorns or notre dame fighting irish. you've shared african cooking with your american friends. but you have also had a burger and a hotdog and a fourth of july celebration. i'm told many of you went bowling for the first time. i heard it didn't go that well. there were a few strikes. by the way, there was at least one marriage that came out of last year's class. [ cheers and applause ] so who knows what might happen here. so as your time in america comes to a close, i want you to remember this is really just the beginning. we just started this. and the truth is that our greatest challenges, whether
4:30 pm
it's inclusive development or confronting terrorism dealing with conflict climate change, increasing women's rights children's rights. these are bigger than any one nation or even one continent. our hope is that 10 15 20 years from now, when you've all gone on to be ministers in government or leaders in business or pioneers of social change, that you'll still be connecting with each other that you'll still be learning from each other and that together you'll be reaching back and helping the next generation. that you'll not only be making a difference in your own countries, but you'll be the foundation of a new generation of global leadership. generation that's going to be working together across borders to make the world safer and more prosperous and more peaceful and more just. that's my hope for you. we've brought you here because
4:31 pm
we benefit from your leadership. but we're counting on you to work together to make sure that you're also reaching back to those who are going to be coming behind you. couldn't be prouder of you so with that, let me take some questions. all right. thank you very much. all right so i think you have been told how this works but i'm going to just repeat it. i'm just going to call on as many people as possible. when i call on you, introduce yourself. tell me what country you're from. make your question relatively short. so that we can get as many questions in as possible. and i'm going to go boy girl boy, girl. to make sure that it's fair. all right?
4:32 pm
okay. so let me see who i'm going to start off with. this is such a good looking group. i'm going to start with this young lady right here. right in the middle. yeah. there you go. with the african earrings. very appropriate. >> i am from kenya. yes. and my question is, i'm curious how you keep the balance in terms of your background as an african-american and the kind of struggles you've had to get over to get here and be married to michelle obama. she's amazing, and as a father as a husband, but you seem to not let that interfere with your work, and you have been effective. so how do you keep the balance? >> well, first of all, i wouldn't be who i was without michelle. so she's my partner.
4:33 pm
[ applause ] and that's true professionally but that's true in terms of my character and who i am. one of the things i'm very proud of is the fact that i married someone who is strong and talented and opinionated. and my equal. and part of the reason why that's so important to me is because she's the role model now for my daughters. and so malia and sasha, they have expectations of being strong and talented and being treated as an equal by their partners as they get older. much older.
4:34 pm
you know the balance -- i have written about this, the balance isn't always perfect. i think one of the things that my generation but now even more your generation has to manage is if you have two people working in the house outside the home, how doo you manage that in a way that we're both good parents we're both able to succeed in our work, and what michelle and i found was that we had to recognize that at any given point in our careers, one person might sacrifice a little bit, maybe this was a time that she really had to focus on something
4:35 pm
and so i had to cover for her more. there were times where i was able to do something and she had to handle things more. now, i'm not suggesting that it's been completely equal because i'm the first one to acknowledge that she's probably made more sacrifices given the nature of a political career than i have. but what i have learned from her is that if she doesn't feel respected and fulfilled, then i'm going to end up being less successful ultimately. and that's something that i think that men in africa in particular, but men everywhere, but men in africa, i have spoken about this a lot. you know the best measure of how a country does economically in terms of development is how
4:36 pm
does it treat its women? and as i said in a speech a couple of the speeches that i gave while i was in kenya and ethiopia, if you're mistreating your women, then you're just holding yourself back. you're holding yourself down. you may have some false sense of importance, but ultimately, you don't benefit if women are being discriminated against because that means when your rur're working, your family has less income. if they're not educated that means your children are less likely to be educated. typically, the mother is the first educator of the child. if they see you disrespecting your wife, then what lesson is your -- not just your girls but what lesson are your sons learning from you?
4:37 pm
and so, this is something that i really think everybody, especially the young generation of african men have to learn. and internalize. and i want to see more men creating peer pressure among themselves. if you see a friend of yours, a classmate, one of your buddies abusing a woman you have to say something. you know, you have to ostracize them. and say that's not acceptable. because ultimately, this is not just an issue of laws although here in the united states we're still fighting for equal pay for equal work. we're still fighting to make sure that women have the same opportunities as men. but it's also a matter of culture and what our expectations are. and your generation is going to have to change expectations. you do not lift yourself up by
4:38 pm
holding somebody else down. and that's especially true within your own family and the people you're closest to. that young man right there in the striped shirt. yeah, you. >> thank you mr. president. my name is andre, from rwanda. >> we have a little cheering section here. got the flags. >> mr. president, there is a big problem of climate change, and research has showed that africa would be the most continent to climate change. africa is the continent which is responsibility for reducing greenhouse gases in global warming. i saw that africa was the last continent to get the funding for climate change mitigation and
4:39 pm
adarptation. what does the president of the united states empower africa so our community can adapt themselves to climate change in the next future? thank you. >> first of all, first of all, this generation has to understand that climate change is going to be one of the critical issues that you face. now, oftentimes you'll hear people say well, environmental issues, climate change we don't have time to worry about that right now because we have much more urgent issues. we have to educate our children, feed people develop, maybe later we can worry about environmental issues. which i understand why a lot of african countries and, you know, poor countries in asia or latin america or other places would say that, because historically, that's basically what the united states and developed countries did. the united states used to be
4:40 pm
terribly polluted. if you went to los angeles you couldn't -- it was like beijing is now. it was very hard to breathe if you ran outside. you had lakes and rivers that were so polluted that one of them caught fire. that's serious. that's some pollution there. you know, the same is true in london. when london was first developing. during the industrial revolution. because of all the coal that was being burned and the soot. here's the problem. whether it's fair or not the issue of climate change is not like traditional environmental issues in the sense that it's just isolated in one area. global climate change will affect everybody. and because the changes could be so severe, frankly, the
4:41 pm
countries that are most likely to be adversely effected are the poorer countries. because they have less margin for error. so if you have changing weather patterns in, let's say, the indian subcontinent and the monsoon rains shift, suddenly you could have millions of people whose crops completely fail. the same is true in africa if rain patterns and drought starts changing subsistence farmers are completely vulnerable. if you are in coastal communities and the oceans begin to rise millions of people could be displaced. so this is something that everybody is going to have to take seriously. now, what we're going to be doing is here in the united states, we are initiating some of the most aggressive action to
4:42 pm
start reducing the emission of carbon that produces climate change. there's going to be a paris conference later this year in which we're organizing china and other countries that are big carbon emitters to participate and set targets for reduction of carbon pollution. now, africa per capita doesn't produce that much carbon, so some african countries have said, well, why should we have to do anything? well, the answer is that you have to project where you're going to be 20 years from now or 30 years from now. if you get locked in now, in, for example, the way you produce energy, that's producing a lot of carbon, given the youth of africa and its rising population, you could end up being the major carbon emitter if you don't take plans now. so what we're saying is learn from our mistakes and find new sustainable ways of generating energy that don't produce
4:43 pm
carbon. when i was in nairobi i highlighted the work we're doing with something called power africa. which has generated billions of dollars with a goal of electra electrification throughout seb saharan africa. but part of what we're trying to encourage countries to do is don't automatically take the old models. think about new models of energy production and try to leap frog over the old models. so for example, with solar energy, we were looking at solar panels that you could send into rural areas put on the roof of a hut, and for the same price per day that people are purchasing carekerosene, they could have a small solar panel and pack that generates light and provides what they need, and in
4:44 pm
fact, it will pay for itself in a year and then they'll save money after that. and so in the same way that you have seen banking and financial trancesactions off smartphones, cell phones, leap frogging some of the other ways of doing business in advanced countries, the same has to be true for energy. and we want to encourage new models. we are going to be providing the united states another wealthier countries are going to be provided billions of dollars in money for adaptation and mitigation, but how do we create the energy needed for africa's growth and development in a way that does not make the problem worse but instead makes the problem better. all right. okay. this young lady right here. yeah. you got the mike coming.
4:45 pm
>> hello. so my -- >> speak up just a little bit. >> hello. my name is amel. i'm 23 years old. so my question is simple. you, as a president, and you as a citizen, a u.s. citizen, will you after leaving the white house keep up this program because we still need it? >> yeah. it is a simple question. and i've got a simple answer. yes. now, here's where we're going to try to do. we want to institutionalize the program so that the next president and future presidents and the u.s. government continue to sustain the program. so that's going to be important. and you know, since i still have this job for the next 18 months
4:46 pm
i haven't been completely focused on what i'm going to do afterwards. the first thing i'm probably going to do is catch up on my sleep. i'm going to do that for a couple months. but i can guarantee you that one of the things i'm interested in doing when i leave office is to continue to create these platforms for young leadership across the globe to network, get relationships, to work together to learn with each other. and by the way it's not just in africa. so we've set up a young leaders program in asia. we're doing the same thing in latin america. because the goal is, eventually, i want not only for there to be a network of thousands of young african leaders who know each other across borders are
4:47 pm
sharing best practices sharing ideas, but i also want you to know young leaders in indonesia or young leaders in you know chile, or young leaders around the globe. because as i said before ultimately, you're going to be global leaders not just leaders in your own country. it begins in your own countries, where you can make your mark. but one of the powerful things about technology and the internet now is you can learn and forge relationships and learn best practices from every place. so if you're an advocate for women's rights and you're doing great work in nigeria, it may be that somebody in burma can on the internet see how you organized your campaign and how you were able to finance it and what you were able to accomplish, and suddenly, what
4:48 pm
you've done in one country becomes a model for action all across the world. so this is going to be a top priority of mine. i will definitely continue to be involved in that. all right. let's see. got to call on a man now. let's see. let's see. i'm going to call on this guy right there. you right there. no, no. yeah, you right there. just because -- just because i like that hat. that's a sharp looking hat right there. >> my name is sabir. i come from madagascar. >> there you go. >> we are involved in the environmental entrepreneurship. what is the commitment of the
4:49 pm
united states towards young entrepreneurship and climate change? >> well, as i said before, we are pledging -- we've got a billion dollars for entrepreneurship. half of it we are going to direct towards women entrepreneurs and young people who are entrepreneurs because they have been underrepresented in terms of access to capital. and as i mentioned to the young man earlier, the opportunities for entrepreneurship related to clean energy, related to conservation, which oftentimes in a place like madagascar involves tourism and ecotourism there's huge potential there if it's done properly. so the key is in some cases just the access to financing, but part of what you've learned hopefully with yali is part of it is also having a well thought out plan.
4:50 pm
now, not everybody can afford to go to a fancy business school and graduate and one of the things that we're trying to do particularly through online learning is to create some of the basic concepts for how a business or nonprofit can get started and how it can be properly managed and do the accounting in a way that is sufficient. we wab to make sure -- want to make sure that we are a continuing partner for you as you start your business and you learn. and that is where the regional networks that we're setting up is also useful. because not only do we have online learning but the regional hubs initially in four regions of africa allow you to continue to network and access through
4:51 pm
the u.s. embassy or the chambers of commerce or private sector participants partnering with us so you can have hands-on mentoring and learning as you're developing your business plans and trying to move forward. the one thing for those of you entrepreneurs or aspiring entrepreneurs is to remember, all around the world even in the united states, not every idea succeeds. so if you want to be an entrepreneurs with all your business, you have to believe in your heart you will succeed and if the business fails you have to get up an dust yourself off and learn from what you started and start another business. and eventually it is from continually refining your ideas
4:52 pm
and exploring what works and understanding what your market is and what consumers are looking for that eventually you have a chance to succeed, all right. okay. so a young woman's turn now. well she's just dancing over here. so we'll have to call on her. that doesn't mean by the way that everybody should dance. i wanted to point out. >> mr. president thank you. my name is madeline gamu from cameroon and i would like to find out when you will support africa offer for prerm innocencely as the u.n. security council. thank you. [ applause ] >> so the security council was formed after world war ii. and obviously the world and the
4:53 pm
balance of power around the world look different in 1945, 46, 47, than it does in 2015, 16 and 17. so the united states is supportive in modifications to the structure of the unationed nations security council. i'll be honest with you, how that happens and how you balance all of the equities is complicated. as a matter of principal i would think that there should at least be one representative from the african continent on the security council along with representatives from the other regions of the world and some of the other powers that have emerged. i will tell you that, because for example, latin america does
4:54 pm
not have a country that is represented. it does get complicated because you have to figure out how -- let me put it this way. everybody thinks they should put it on it. so even in africa they say we should have an africa. is it south africa is nigeria is it -- see. uganda. see, everybody is thinking, well why not me. the same is true in -- japan considers itself one of the largest economies in the world brazil thinks it should be on -- india, the world's largest democracy. so we're going to have to design
4:55 pm
a process whereby all of the various legitimate arguments are sorted through. but what i very much believe is that for the united nation's security council to be effective it has to be more representative of -- of all of the various trend lines that have occurred over the last several decades. one thing i will say though about the united nations, everybody wants a seat at the table but sometimes people don't want the responsibilities of having a seat at the table. and that is happening even now. and the one thing i've learned both in my personal life and in my political life is that if you want more authority then you also have to be more
4:56 pm
responsible. you can't wear the crown if you can't bear the cross. and oftentimes in the united nations, and i'm dedicated to and the agencies there do critical and important work, but when it comes to who will actually ten up and contribute to peace keeping, who is gooding to write a check when it comes to making sure that we're dealing with the ebola crisis? who is going to show leadership in tackling climate change? are you willing to speak out on issues even when it contradicts your own interest or when it is politically hard or when it is uncomfortable? if you are not willing to do
4:57 pm
those things, thos not just something we're -- where i have a membership key to the club and now i'm just going to show off how important i am and you see that sometimes. this happens -- and sometimes it happens in our own agencies. on human rights when i was in kenya, i said it is not enough for the united states always to be the heavy who has to point out that it is unsuitable for leaders to ignore their constitution and try to cling on to power. their neighbors have to speak up as well. even if it's uncomfortable, right. so my attitude is if you want -- --
4:58 pm
[ applause ] -- if you want to participate then you have to recognize you have broader responsibilities and that is something that the united states, by the way, for all of our occasional mistakes or flaws or our policy is not perfect all of the time, the one thing we do try to be is responsible. if there is a earthquake or a tornado somewhere or a hurricane somewhere, we're there. we're stepping up. when ebola happened we stepped up. even when other people were kind of looking around and trying to figure out, well, i don't know what should we do? and that is part of leadership. that is true by the way, for you individually, as well. you have to be one to take some risks and do some hard things in order to be a leader. a leader is not just a name a title, you know, privileges and
4:59 pm
perks. so all right. let's see. i think it is a gentleman's turn, isn't it? this guy looks sharp right here in the corner. that is a serious looking coat. huh? look at that. that is a good-looking coat. don't worry, i'll call on somebody who is just wearing a suit at some point. >> thank you, mr. president. i'm franklin gochi from cameroon. so we are very grateful for the american leadership in our fight against violent extremism and the military response. so my question is what kind of engagement and what kind of support can we expect from you in brazilian communities aespecially along the sahara where we are grappling with
5:00 pm
these issues. >> well this is a sign that is is -- something that is very important. look, the sources of violence around the world are multiple. and it is important for us to recognize that sadly the human race has found excuses to kill each other for all sorts of reasons reasons. in the continent of africa a lot of times it is along ethnic and tribal regions texas has to be with you speak a little different language than me or you look just a little bit different. in northern ireland it was religious. in other places it just has to do with trying to gain power or majority group

31 Views

info Stream Only

Uploaded by TV Archive on