vimarsana.com
Home
Live Updates
Transcripts For CSPAN Values Voter Summit - Gorka Bannon In
Transcripts For CSPAN Values Voter Summit - Gorka Bannon In
CSPAN Values Voter Summit - Gorka Bannon Ingraham October 15, 2017
Postelection audits. If you can talk about how to get a
Political Climate
of urgency which just does not seem to be there. Well, so i think that is one thing i think that is exactly why were trying to do this. This is exactly why we are partnering with the
Atlantic Council
which is one of the preeminent
National Security
organizations and the country. Without firmly positioning this problemational security it is we will never get the urgency we need and that is exactly why were here today and exactly why were so excited conveney have agreed to this broad friday of people to come up with best practices. Of, likesort imagination, like going from the abstract to the concrete where you have so many things to worry about. This is one more. It now that it has arrived, you have to take steps and that is scary because now you have a new problem. There is no four years of
Nuclear Deterrence
around this. This is another issue which brings risks. You know, you have entrenched lobbying interests. I am sure the manufacturers do not like being called out. Who would . Nobody would. I am sure people have staked their reputations on the budget so there are a lot of interest involved and you have to pull a youturn and that is going to be a problem. Is fundamentally a mental shift from the presumption your vote is secure or our votes are secured to now i think the presumption that, you know, maybe they are not so secure. That does not come overnight. That is why van slyke today, the def con experience, this report are so important. Likeat is why events today, the def con expense, this report are so important. Were trying to amplify that message nationally so there is broad recognition it is a
National Security
problem. That it is bipartisan or non partisan and goes across all structures. We have to wake up. At one time we thought we were invulnerable, it turns out we are vulnerable. Go ahead. Go ahead. Hello. Reuters. The last question on the topic is broader, more systemic vulnerabilities. Recently notified hackers. By russian it is come out that a couple states said that is not true. What you told us was not in our election systems but maybe department or labor or something was scanned or one or two others. So i am wondering if the issue of how we run elections in america, the
United States
is on sort of this state, federal relationship if that is a specific vulnerability in your view that makes the united makes itre that more difficult to address these problems because of those tensions specifically. Dhs has said it is trying to work more with the states, the states have said they are trying to work more but there is still a lot of tension in the room when they tried to discuss these ideas and figure out what really happened last year and move 2020. D to 2018 and how does that relationship between dhs, the states, and the federal government improve
Going Forward
. Forward, dhs working with the states has agreed that there will be eight much more invigorated process for notification and information sharing. Theyve agreed they will create what is called elections information sharing capability analysis. Results on that collaboration and coordination will go a long way to resolving some of what i saw were the problems of the past. I think a lot of the problems of the past were if i could describe, there were technical activities that were recognized and the
Technical Community
within different organizations were notified. Now, that happens every day. That happens every day so it was the tie to the elections and as out,sador lute pointed weve woken to the new significance to some of these potential threat patterns and i think that caused some of the confusion, is that at the time was anrecognized there activity but it was viewed as a event. Themill, everyday it was only in retrospect when it was linked to a pattern of it became tothen rise to the level of saying, ait a minute, this is campaign with a particular objective and then i think all
Early Communications
sort of got sort of lost and so i been
Going Forward
theres a commitment to say, all right, we just need to make sure were those keyith and localrs in state governments with elections responsibility and not just the
Technical Community
. Helps a little bit. In the back thank you very much. Much, def con, for the work youve done and all who have collaborated. I have an historical question related to the supply chain. Year butnow the exact it was roughly about eight years ago when an individual mine colleague of came, after a trip to china, and thought waswhat he equipment being manufactured at a location in p. R. C. Basebutted a and i told him to report that to proper authorities and linked him on that. Im wondering if anyone knows situation. Out that i think diebold is out of the business now but the idea that is being manufactured and ifuntry like china any analysis, do we have any thatsis of any equipment doctored, say, specifically doctored for the were exercising an option if they chose to affect an election. Two things to. That one is when you look at holes, its full of hard to understand are the holes or is it just because its just sloppy, its quality. Dumb are not adversaries are not done, theyll make sure that if there number of problems, one is their back door in and if theyre caught, theyll say of problems here, its hard to tell if that problem was intentionally put there to be used or not. Only once you get to really highly secure systems where the are so few that you can tell thats a sophisticated back door, you can have this conversation but at this level of technology, you know, they probably dont have to install anything specific ofause its already so full problems. One of the exemptions with the dmca, though, prohibits us from sharing so researchers got the machines. They dumped the software in a lot of these machines but a prohibition for copyright where you cant just publish the software dumps. Can you look at them, analyze them foryou cant post anybody to download so were a little bit hampered because you to get your own machine, dump your own software, analyze your own software and you foundorld what without releasing the software but some people are doing that and theyre going through the there anyng for, are signs that binarys been tampered with or weird functions that dont make sense but its would like as we because we cant share it to a
Larger Community
to get a widespread analysis. Harry had an interesting find on one of the taiwan machines. So, first of all, one of the which is from diebold actually says manufactured from taiwan. Find the company to find that their main well, listed
Production Facility
is in china so thats manufactured there. More to this point, second, jeff, in this area, for the whole im i have been working is almost impossible to make any kind of reasonable educates about whether you are looking incompetence or malice. You want to think its incompetence. So many things where you really in the findings you say, what would be the legal use for this feature . What would be the reason you this . Do the answers always, its a test feature. Would like to point out by the way, coming from because i wasnt planning to do a live demo here because of the time we have. I want to point out that hardware is the new software. Mentally think that software is cheap and hardware of dollars of production costs and whatnot. Ins is a whole computer made chenshown. Starter withck 98,000 funding which was already 4 each. Sold this is a server with capabilities. This is the other computer you need. Actually, the computer, physical in oneeighth of an inch thick. Not anymore something which is expensive. The other thing is, electronics something you could inspect, you can understand. Be fairly reasonable whatcap the chip and look the chip is inside. Today, its not anymore. Are no anymore designed by humans. The microchips are designed by you write that chip as a form of software. Is today, whether you have a chip which you dont itw who designed it and how made theetched, who maps, you dont know what the chip is going to do and a very features areidden found. Recently, we all learned from to have a hidden processor capability inside the processor. Recently it was found that one the biggest manufacturers of aips for cars, they have hidden processor inside the processor and nobody has an comesation where the code to that person and that person the memory so if you control that, the game is over. So we are in a situation where its really the ability of machines are gone. You cannot audit the machine. The results and i think the results matter and really when we look in the thingon, its a good to especially when were about
Voter Registration
and also
American Election
is so cannot that you really go hand count. You have to use technology. The key there is audit. Audit the results. Make sure that the results make sense. Think theyre absolutely certain the result is why not audit it . If you dont audit, you dont know what is the result. Really today, in next four years there will be no machine where anyone in this i absolutely guarantee that will be honest what itsing exactly supposed to do because you cannot make that promise. Its unfeasible. You can make the best effort but you cannot give a guarantee. Important. Very to your basic question, we did find there were parts made in china in most or all of the machines. Sherry, do you want to comment should we care about that . A former nation state hacker hat on . We absolutely should care about that. And even if we didnt care about the nation state, individuals and sold and so we should absolutely care about manufactured in the u. S. I dont think we could be absolutely sure theyre today the bulk of the not manufactured in the u. S. And its almost impossible to audit the chips. Even random selection, theyre too complicated. Thisjust hard to say, yes, chip is built exactly like it was designed and like it was meant and it works exactly like supposed to. You would want the machines manufactured by companies with a of secure record operations, secure software cycles, hiringe good secure teams, being transparent and open and all of that is lacking. The kind of companies we rely on for other dimensions of
National Security
communications, control of nuclear weapons. We dont just outsource this material. This is done through a very strict chain of reliable suppliers and that just simply does not apply today to the election process. And in fact, if you look look at the want to d. O. D. As an example, theyve started down a path by trying to a secure foundry for some of the weapons systems, not enough for all of them, but to weually build chips that have more faith that theyll work and do the function the way theyre supposed to. We have a question from handle. Def con yes. Live streaming this on the voting village twitter page and the report is downloadable on defcon. Org. Is ifestion from twitter securing democracy involves a federal bipartisan effort, are optimistic it will be found in congress . They said that in 140 characters . So ive learned not to make such predictions. Ok. But part of the story today and part of the story in this report that this is not just a state and local problem. Governmentfederal problem. A
National Security
problem, a
National Security
the trackity and record at the federal level is opening
National Security
issues is that there is bipartisan support. I think theres a long track of comingstory together when the nations at risk and thats what were here. Ng on thanks to the atlantic they brought a
Bipartisan Group
of members of congress to the voting village. Heard, republican from texas, did a
Facebook Live
and there said its not a democrat or republican issue but a
National Issue
and were going to
Homeland Security
to brief them on the findings of this report ran by a obviously, republican administration, have been taking it very seriously been veryst i have impressed with their response to this so far. There,
Rebecca Kaplan
with cbs news. I wanted to know if the results where you saw def con caused you acceptedon the widely conclusion that no votes were tampered with during the 2016 election even though there is admission that databases with were hacked. Ation back to 2007 when we did the study for state ohio, back then, bonnerretary attorney asked me, well, there has been never a documented incidence votes have been changed during the real election and my answer was, please continue this method and that will remain to be true forever machines dont have capability of providing you if ic evidence to see they cannot prove they were honest. They cannot prove they have been hacked. Dont have the basic capabilities of providing you that forensic evidence, that data. You can see that the machine was hacked is that the be found thatd to it was hacked. Thats the sad truth. So anyone who says i have or another,one way thats an opinion. Is, it can be done without leaving trace. As i mentioned in my remarks, this effort represented here on the stage is not about the forensics from last year in actually affecting the results. Were going to let the federal government deal with that problem. We know enough, however, at this point, to be concerned enough to forward towards best practices because at least 14 states are at least somewhat reliant still on these kinds of machines and what we know from d. H. S. Published report, some 20 states there were at probes at the registration databases in at least 20 states. Enough for us to get moving and thats what this group is going to do. Running over so this will be the last one. Go ahead. Marks. Joe for anyone interested, the
Congress Considers
extending the dmca exemption right now. There particular things you would like them to rewrite in it to give you broader room to there anynd is concerted effort, either commenting or otherwise, to try to do that . Good question. A so i think in the original dmca
Safe Harbor Provision
for reverse engineering for security purposes. Was never litigated or was a validied what security purpose and none of the researcher wanted to be the test for that. So a lot of people tiptoed inund and dipped their toe and had several friends who have been intimidated and their dmcarch shut down by threat. Its common in the security conference world to have your talks pulled at the last second because the manufacturer threatens them with a lawsuit. Specifick the exemption was for electronic voting
Machine Technology
and pretty clearly written. I think matt blaze and coalition of academics were active in the workedet correct wording correct. That should be permanent but issue,just one electronic voting. What about automobiles . What about other
Life Safety Systems
. They shouldnt be, like, well, on carsears im working and that one will expire and in three years ill do automobiles and then back to cars when that exemption starts again. A concertedve ability for the nations researchers to search and find sued intoar of being sued oblivion, to find problems in software that all of us use and trying to solve the exploits. Theyre trying to basically provide a public service. It should be like a
Public Benefit
corporation, there a shield for
Public Benefit
research, especially the you work with manufacturer to get the problems fixed. An act of congress to protect us. The library ofn congress. Well wrap up after are to protectws proprietary information and trade secrets. You design software, usually big part of that trade specification, how the software is going to run. That in thee election world, the specification is the statues and laws. A why we are protecting where the fulfilled the law from information if theyre fulfilling the statues and the laws. Right now, i want to really con, we didnt have the back end system. We didnt run an election. We affect the system in a most fundamental level. We went to the basement and see if we can turn the lights on and off and we found we can. The conclusion of that is we of things done a lot on the upper layers which is the actual election but we didnt do that because we didnt have the back end system. Im not a u. S. Citizen. Im a european. Come from a little bit different culture in that way incomprehensible for me protected and why there is barriers for inspection fulfillingystem is the law and protections stopping researchers to verify that the are selling what they claim to be selling. Thank you all very much. [applause] [captions performed by national captioning institute] [captions
Copyright National
2017]satellite corp. Cspans washington journal live every day with news and policy issues that impact you. Theng up sunday morning,
Tea Party Patriot
founder addresses her groups call for
Mitch Mcconnell
to resign. A political reporter on the epa decision to roll back the obama administrations clean power plan. And former cbs and nbc correspondent and author talks about his new book on russia and communism. Be sure to watch washington journal, joined the discussion. Sunday night on af theords, and author on career of newt gingrich. He is interviewed by former virginia congressman tom davis. Cable news was not there. It was before cnn or msnbc. A
Little Pocket
here and there, that mostly reruns of i love lucy. No talk radio to speak of. Media and cspan. Realizes the potency of giving a fiveminute speech and carrying into homes all over the country. Say, would you go give a speech to 100,000 people, and he said, of course you would . He said, that is what you are doing with cspan. Becomes he becomes a cold political leader and he is week. G 700 letters per georgia. Mber from hes receiving a national following. Watch on cspan twos book tv. Tuesday, we are live at jefferson city, missouri for the next up on cspan city capitals tour. Js croft will be our guest on washington journal starting at 8 00 a. M. Now, remarks from sebastian gorka,
Political Climate<\/a> of urgency which just does not seem to be there. Well, so i think that is one thing i think that is exactly why were trying to do this. This is exactly why we are partnering with the
Atlantic Council<\/a> which is one of the preeminent
National Security<\/a> organizations and the country. Without firmly positioning this problemational security it is we will never get the urgency we need and that is exactly why were here today and exactly why were so excited conveney have agreed to this broad friday of people to come up with best practices. Of, likesort imagination, like going from the abstract to the concrete where you have so many things to worry about. This is one more. It now that it has arrived, you have to take steps and that is scary because now you have a new problem. There is no four years of
Nuclear Deterrence<\/a> around this. This is another issue which brings risks. You know, you have entrenched lobbying interests. I am sure the manufacturers do not like being called out. Who would . Nobody would. I am sure people have staked their reputations on the budget so there are a lot of interest involved and you have to pull a youturn and that is going to be a problem. Is fundamentally a mental shift from the presumption your vote is secure or our votes are secured to now i think the presumption that, you know, maybe they are not so secure. That does not come overnight. That is why van slyke today, the def con experience, this report are so important. Likeat is why events today, the def con expense, this report are so important. Were trying to amplify that message nationally so there is broad recognition it is a
National Security<\/a> problem. That it is bipartisan or non partisan and goes across all structures. We have to wake up. At one time we thought we were invulnerable, it turns out we are vulnerable. Go ahead. Go ahead. Hello. Reuters. The last question on the topic is broader, more systemic vulnerabilities. Recently notified hackers. By russian it is come out that a couple states said that is not true. What you told us was not in our election systems but maybe department or labor or something was scanned or one or two others. So i am wondering if the issue of how we run elections in america, the
United States<\/a> is on sort of this state, federal relationship if that is a specific vulnerability in your view that makes the united makes itre that more difficult to address these problems because of those tensions specifically. Dhs has said it is trying to work more with the states, the states have said they are trying to work more but there is still a lot of tension in the room when they tried to discuss these ideas and figure out what really happened last year and move 2020. D to 2018 and how does that relationship between dhs, the states, and the federal government improve
Going Forward<\/a> . Forward, dhs working with the states has agreed that there will be eight much more invigorated process for notification and information sharing. Theyve agreed they will create what is called elections information sharing capability analysis. Results on that collaboration and coordination will go a long way to resolving some of what i saw were the problems of the past. I think a lot of the problems of the past were if i could describe, there were technical activities that were recognized and the
Technical Community<\/a> within different organizations were notified. Now, that happens every day. That happens every day so it was the tie to the elections and as out,sador lute pointed weve woken to the new significance to some of these potential threat patterns and i think that caused some of the confusion, is that at the time was anrecognized there activity but it was viewed as a event. Themill, everyday it was only in retrospect when it was linked to a pattern of it became tothen rise to the level of saying, ait a minute, this is campaign with a particular objective and then i think all
Early Communications<\/a> sort of got sort of lost and so i been
Going Forward<\/a> theres a commitment to say, all right, we just need to make sure were those keyith and localrs in state governments with elections responsibility and not just the
Technical Community<\/a>. Helps a little bit. In the back thank you very much. Much, def con, for the work youve done and all who have collaborated. I have an historical question related to the supply chain. Year butnow the exact it was roughly about eight years ago when an individual mine colleague of came, after a trip to china, and thought waswhat he equipment being manufactured at a location in p. R. C. Basebutted a and i told him to report that to proper authorities and linked him on that. Im wondering if anyone knows situation. Out that i think diebold is out of the business now but the idea that is being manufactured and ifuntry like china any analysis, do we have any thatsis of any equipment doctored, say, specifically doctored for the were exercising an option if they chose to affect an election. Two things to. That one is when you look at holes, its full of hard to understand are the holes or is it just because its just sloppy, its quality. Dumb are not adversaries are not done, theyll make sure that if there number of problems, one is their back door in and if theyre caught, theyll say of problems here, its hard to tell if that problem was intentionally put there to be used or not. Only once you get to really highly secure systems where the are so few that you can tell thats a sophisticated back door, you can have this conversation but at this level of technology, you know, they probably dont have to install anything specific ofause its already so full problems. One of the exemptions with the dmca, though, prohibits us from sharing so researchers got the machines. They dumped the software in a lot of these machines but a prohibition for copyright where you cant just publish the software dumps. Can you look at them, analyze them foryou cant post anybody to download so were a little bit hampered because you to get your own machine, dump your own software, analyze your own software and you foundorld what without releasing the software but some people are doing that and theyre going through the there anyng for, are signs that binarys been tampered with or weird functions that dont make sense but its would like as we because we cant share it to a
Larger Community<\/a> to get a widespread analysis. Harry had an interesting find on one of the taiwan machines. So, first of all, one of the which is from diebold actually says manufactured from taiwan. Find the company to find that their main well, listed
Production Facility<\/a> is in china so thats manufactured there. More to this point, second, jeff, in this area, for the whole im i have been working is almost impossible to make any kind of reasonable educates about whether you are looking incompetence or malice. You want to think its incompetence. So many things where you really in the findings you say, what would be the legal use for this feature . What would be the reason you this . Do the answers always, its a test feature. Would like to point out by the way, coming from because i wasnt planning to do a live demo here because of the time we have. I want to point out that hardware is the new software. Mentally think that software is cheap and hardware of dollars of production costs and whatnot. Ins is a whole computer made chenshown. Starter withck 98,000 funding which was already 4 each. Sold this is a server with capabilities. This is the other computer you need. Actually, the computer, physical in oneeighth of an inch thick. Not anymore something which is expensive. The other thing is, electronics something you could inspect, you can understand. Be fairly reasonable whatcap the chip and look the chip is inside. Today, its not anymore. Are no anymore designed by humans. The microchips are designed by you write that chip as a form of software. Is today, whether you have a chip which you dont itw who designed it and how made theetched, who maps, you dont know what the chip is going to do and a very features areidden found. Recently, we all learned from to have a hidden processor capability inside the processor. Recently it was found that one the biggest manufacturers of aips for cars, they have hidden processor inside the processor and nobody has an comesation where the code to that person and that person the memory so if you control that, the game is over. So we are in a situation where its really the ability of machines are gone. You cannot audit the machine. The results and i think the results matter and really when we look in the thingon, its a good to especially when were about
Voter Registration<\/a> and also
American Election<\/a> is so cannot that you really go hand count. You have to use technology. The key there is audit. Audit the results. Make sure that the results make sense. Think theyre absolutely certain the result is why not audit it . If you dont audit, you dont know what is the result. Really today, in next four years there will be no machine where anyone in this i absolutely guarantee that will be honest what itsing exactly supposed to do because you cannot make that promise. Its unfeasible. You can make the best effort but you cannot give a guarantee. Important. Very to your basic question, we did find there were parts made in china in most or all of the machines. Sherry, do you want to comment should we care about that . A former nation state hacker hat on . We absolutely should care about that. And even if we didnt care about the nation state, individuals and sold and so we should absolutely care about manufactured in the u. S. I dont think we could be absolutely sure theyre today the bulk of the not manufactured in the u. S. And its almost impossible to audit the chips. Even random selection, theyre too complicated. Thisjust hard to say, yes, chip is built exactly like it was designed and like it was meant and it works exactly like supposed to. You would want the machines manufactured by companies with a of secure record operations, secure software cycles, hiringe good secure teams, being transparent and open and all of that is lacking. The kind of companies we rely on for other dimensions of
National Security<\/a> communications, control of nuclear weapons. We dont just outsource this material. This is done through a very strict chain of reliable suppliers and that just simply does not apply today to the election process. And in fact, if you look look at the want to d. O. D. As an example, theyve started down a path by trying to a secure foundry for some of the weapons systems, not enough for all of them, but to weually build chips that have more faith that theyll work and do the function the way theyre supposed to. We have a question from handle. Def con yes. Live streaming this on the voting village twitter page and the report is downloadable on defcon. Org. Is ifestion from twitter securing democracy involves a federal bipartisan effort, are optimistic it will be found in congress . They said that in 140 characters . So ive learned not to make such predictions. Ok. But part of the story today and part of the story in this report that this is not just a state and local problem. Governmentfederal problem. A
National Security<\/a> problem, a
National Security<\/a> the trackity and record at the federal level is opening
National Security<\/a> issues is that there is bipartisan support. I think theres a long track of comingstory together when the nations at risk and thats what were here. Ng on thanks to the atlantic they brought a
Bipartisan Group<\/a> of members of congress to the voting village. Heard, republican from texas, did a
Facebook Live<\/a> and there said its not a democrat or republican issue but a
National Issue<\/a> and were going to
Homeland Security<\/a> to brief them on the findings of this report ran by a obviously, republican administration, have been taking it very seriously been veryst i have impressed with their response to this so far. There,
Rebecca Kaplan<\/a> with cbs news. I wanted to know if the results where you saw def con caused you acceptedon the widely conclusion that no votes were tampered with during the 2016 election even though there is admission that databases with were hacked. Ation back to 2007 when we did the study for state ohio, back then, bonnerretary attorney asked me, well, there has been never a documented incidence votes have been changed during the real election and my answer was, please continue this method and that will remain to be true forever machines dont have capability of providing you if ic evidence to see they cannot prove they were honest. They cannot prove they have been hacked. Dont have the basic capabilities of providing you that forensic evidence, that data. You can see that the machine was hacked is that the be found thatd to it was hacked. Thats the sad truth. So anyone who says i have or another,one way thats an opinion. Is, it can be done without leaving trace. As i mentioned in my remarks, this effort represented here on the stage is not about the forensics from last year in actually affecting the results. Were going to let the federal government deal with that problem. We know enough, however, at this point, to be concerned enough to forward towards best practices because at least 14 states are at least somewhat reliant still on these kinds of machines and what we know from d. H. S. Published report, some 20 states there were at probes at the registration databases in at least 20 states. Enough for us to get moving and thats what this group is going to do. Running over so this will be the last one. Go ahead. Marks. Joe for anyone interested, the
Congress Considers<\/a> extending the dmca exemption right now. There particular things you would like them to rewrite in it to give you broader room to there anynd is concerted effort, either commenting or otherwise, to try to do that . Good question. A so i think in the original dmca
Safe Harbor Provision<\/a> for reverse engineering for security purposes. Was never litigated or was a validied what security purpose and none of the researcher wanted to be the test for that. So a lot of people tiptoed inund and dipped their toe and had several friends who have been intimidated and their dmcarch shut down by threat. Its common in the security conference world to have your talks pulled at the last second because the manufacturer threatens them with a lawsuit. Specifick the exemption was for electronic voting
Machine Technology<\/a> and pretty clearly written. I think matt blaze and coalition of academics were active in the workedet correct wording correct. That should be permanent but issue,just one electronic voting. What about automobiles . What about other
Life Safety Systems<\/a> . They shouldnt be, like, well, on carsears im working and that one will expire and in three years ill do automobiles and then back to cars when that exemption starts again. A concertedve ability for the nations researchers to search and find sued intoar of being sued oblivion, to find problems in software that all of us use and trying to solve the exploits. Theyre trying to basically provide a public service. It should be like a
Public Benefit<\/a> corporation, there a shield for
Public Benefit<\/a> research, especially the you work with manufacturer to get the problems fixed. An act of congress to protect us. The library ofn congress. Well wrap up after are to protectws proprietary information and trade secrets. You design software, usually big part of that trade specification, how the software is going to run. That in thee election world, the specification is the statues and laws. A why we are protecting where the fulfilled the law from information if theyre fulfilling the statues and the laws. Right now, i want to really con, we didnt have the back end system. We didnt run an election. We affect the system in a most fundamental level. We went to the basement and see if we can turn the lights on and off and we found we can. The conclusion of that is we of things done a lot on the upper layers which is the actual election but we didnt do that because we didnt have the back end system. Im not a u. S. Citizen. Im a european. Come from a little bit different culture in that way incomprehensible for me protected and why there is barriers for inspection fulfillingystem is the law and protections stopping researchers to verify that the are selling what they claim to be selling. Thank you all very much. [applause] [captions performed by national captioning institute] [captions
Copyright National<\/a> 2017]satellite corp. Cspans washington journal live every day with news and policy issues that impact you. Theng up sunday morning,
Tea Party Patriot<\/a> founder addresses her groups call for
Mitch Mcconnell<\/a> to resign. A political reporter on the epa decision to roll back the obama administrations clean power plan. And former cbs and nbc correspondent and author talks about his new book on russia and communism. Be sure to watch washington journal, joined the discussion. Sunday night on af theords, and author on career of newt gingrich. He is interviewed by former virginia congressman tom davis. Cable news was not there. It was before cnn or msnbc. A
Little Pocket<\/a> here and there, that mostly reruns of i love lucy. No talk radio to speak of. Media and cspan. Realizes the potency of giving a fiveminute speech and carrying into homes all over the country. Say, would you go give a speech to 100,000 people, and he said, of course you would . He said, that is what you are doing with cspan. Becomes he becomes a cold political leader and he is week. G 700 letters per georgia. Mber from hes receiving a national following. Watch on cspan twos book tv. Tuesday, we are live at jefferson city, missouri for the next up on cspan city capitals tour. Js croft will be our guest on washington journal starting at 8 00 a. M. Now, remarks from sebastian gorka,
Deputy Assistant<\/a> to president trump, stephen bannon, and political","publisher":{"@type":"Organization","name":"archive.org","logo":{"@type":"ImageObject","width":"800","height":"600","url":"\/\/ia804705.us.archive.org\/35\/items\/CSPAN_20171015_033500_Values_Voter_Summit_-_Gorka_Bannon__Ingraham\/CSPAN_20171015_033500_Values_Voter_Summit_-_Gorka_Bannon__Ingraham.thumbs\/CSPAN_20171015_033500_Values_Voter_Summit_-_Gorka_Bannon__Ingraham_000001.jpg"}},"autauthor":{"@type":"Organization"},"author":{"sameAs":"archive.org","name":"archive.org"}}],"coverageEndTime":"20240629T12:35:10+00:00"}