Forgive me for turning this into a lightning round. But general clark we talked , about systemic financial risk. I wish we had five minutes to devote to this. Were basically out of time, but you talked about a book you wrote that discuss this and maybe you can give us the kind of elevator version of it. Gen. Clark dont wait for the next war. We create an awful lot of debt in the Financial System and we havent addresses the systemic issue. Still hundreds of trillions of dollars of derivatives based on Interest Rate and if you ask the inside banking crowd, when are we going really raise Interest Rates . When are we going to get away from quantitative easing . The answer is never. And its only a matter of time before some smart young Hedge Fund Guy says, you know what . This debt is not sustainable and will spread like wildfire through the Financial Community and well be back in some trouble again. We have to take our Financial Resources and invest in real projects. We need petrochemical projects. We need energy projects. We need Infrastructure Projects and highway, highspeed rail aviation. These are things that create jobs. Derivative trading is great and you make a lot of money if youre a banker. Im a banker. I know something about it. But it is not creating jobs and wealth in a real economy. If we are going to do what Prime Minister blair says, we have to use the Financial System to fund and drive the economy, not the opposite. And what has happened is theres too much of the opposite right now. It takes from the real economy plays the financial games. So dont wait for in the next war. Its my book. Please read it. Michael ok, great. Thank you for that. Thank you for coming. We have to wrap up. [applause] the state minister would like to make a concluding remark, very briefly. Minister nakayama last word from me, yes. And i am general for Parliamentary Friendship League between japan and israel and i went to simon center yesterday and i really touched by what she sees said by anne frank. She cannot say anything right now, so through me i will send a message. She said, how wonderful it is that no one has to wait but can start right now to gradually change the world. This is what she told me to us. Michael a great note to close on. Thank you minister. Thank you, everyone for coming. We appreciate it. [applause] and we take you live now to the National Press club in washington dc. Googles chief internet evangelist is one of the people widely recognized as being cofounder of internet. He is being introduced right now by the National Press club. It was the earliest version of the internet. One of those involved in the demonstration today is todays speaker. Since 1972, vint cerf has developed the architecture of the internet and ushered the continued spread of the web and has become one of the most widely expected respected authorities on internet policy and governance. Many call him the father of the internet. Since 2005, he has served as the chief internet evangelist for google. He says he took that monitor because they wouldnt approve the title of archduke. [laughter] dr. Cerf is well versed the values and capabilities of internet. The voice concerns that the 21st century could become an information blackhole unless we find ways to preserve photos, documents, and other Digital Content, which is hard because we dont know how computers of the future will function. His solution for now if you want to make sure that some Important Information survives for posterity, printed out. Print it out. [laughter] dr. Cerfs current project is the interplanetary internet which way is working on with nasa and it is likely what you sound like it sounds like. It is a Computer Network for planet to planet communication. His list of awards and commendations is as you can imagine quite lengthy. If you want to learn more about them, you will just have to look them up on the internet. [laughter] Vint Cerf Google it. [laughter] please give a warm National Press club welcome to googles chief internet evangelist, vint cerf. [applause] vint cerf well, first of all, thank you very much. This is number 208 which is if you feed them, they will come. That is my favorite dram. Second, im not going to use presentation charts because power corrupts and powerpoint corrupts absolutely. You will just have to listen instead. I want to tell you in an attempt which i think is relevant to especially this population. I worked on something called mci mail way back in the 1980s. We turned it on on september 27 1983. Among the first people to sign up for this electronic mail service or reporters one of them was william f oakley. I maintained a lovely correspondence with well before he passed away. I remember that had come and gone to join and then i rejoined nci to help get into the internet business. It was very clear that charging people for email was not a great Business Model anymore. We shut down the mci mail service and i got a whole bunch of angry emails from reporters who said that i had my mci mail address since 1983. How could you do this . The honest answer was that it was time for that service to go. I have two games that i would like themes that i would like to address this afternoon. The first one is technology and i will drop into a geek. I apologize but it is the only way to be precise. Then we will talk a little bit about policy. I have a point on the tech side and four or five points on the policy side. Let me start on the technology side. Im really proud of the fact that the internet continues to evolve. This is not a design which was fixed in time for years ago. But rather it is one which has adapted to new technology and has swept in the communication capability and become an important element of the smartphone, both the internet and the smartphones are mutually reinforcing in many ways. One of the things that bob and i do not quite get right was the amount of numerical address space that is needed in the internet. When we designed it 40 years ago, we did some calculations and estimated that 1. 3 burly and terminations ought to be enough for an expanded. 1. 3 billion exterminations ought to be enough for the internet. We got it wrong. The we ran out of the ip address experiential address space around 2011. The ceo of americas registry for internet numbers is right over there. You can wait to him. If you need ip addresses, he is the guy to talk to about that. I am proud to serve as the chairman of the board, but we need ipv6 now which has 128 bits of address space. It is to 10 to the 34th power of address space. It is a number that only congress can appreciate. It is absolutely vital to get all the ips to turn on. The laptops and software is on. But the Internet Service providers need to turn on which is parallel with the service that you are using today. You can do me to favorites give one as individuals, talked your eyes peas and demand an answer on when im going to get these addresses. I want dates and times. As reporters, will you kindly do the same thing . But do it with the megaphone that is afforded to you by the for the state. Why do i care about having more addresses back no one answers the next wave of stuff is the internet of things. You know that. This is real. Every appliance that you can possibly imagine is shifting from electromechanical controls to programmable control. Once you put a computer inside of anything, there is an opportunity to put it on the net. There are good things and bad things about that. The good thing about the internet is that everything is connected. The bad thing about the internet is that everything is connected. We really need the address space in order to accommodate this explosion of devices. Cisco says that there may be 50 billion devices by 2020. It may not be as crazy as it sounds because every lightbulb to potentially have its own ip address. Some of them already do like the lightbulbs made by phillips called hev. H you need. Yohue. We need to get that info mentor. The second one is even more obscure. The label is buffer bloat. You might think what is this . When you are watching streaming videos have you ever noticed that a get real jerky and think slow down and the delays are going up and used that they are for things to reload . It turns out that it is not true that having more buffer memory space is always a good thing. Let me explain. You have a router home typically. Maybe is supplied by a table cable or Telephone Company or you bought one and installed it or hired a geek to do that. So this thing has memory in it. Imagine for moment that you are running a local network at home and it is running at media 100 megabits a second or maybe 10 megabits or even a gigabit per second, but the connection that you have out to the rest of the world is not running that fast. Unless you happen to be on one of the google Fiber Networks which is a gigabit per second, but most of them dont get to that speed. What happens . The programs that you have running inside the house are pushing data like crazy into this buffer is is filling up an empty and slowly because of the data rate on the other hand lower than the rate at which your pumping it in, which means that there is increasing amounts of delay from the standpoint of the sender over here, waiting to hear acknowledgments coming back from the other end. At some point, the Program Inside your house is saying, oh my god, they didnt get what i sent. I better send it again. You keep retransmitting and producing and creating a highly congested conditions. It is counterintuitive, but when you have to do is design the system so that it does not put too much buffer space in the path. It should put only enough to deal with the differential between the highspeed and lowspeed side. This also works in the other direction. Heres the code word for you. The letters that you want to refer to are called codelfq. That is the kind of thing and technology that you want in your routers. While you are pounding on the table for ipv6, i want codelfq in my router and i want a pony. [laughter] next point. All of you are familiar with the fact that we are bad with picking passwords. Some of us still use password for password because it is easy to remember, but everyone else does that so it is not a good thing. So youre told to make a complicated password with punctuation and other stuff and keep changing all the time. You can never member them and you a list and stick it on your computer, or you put it in your wallet. Ok, so i googled, you will remember and some of you reported that we were attacked in 2010 and penetrated. So we decided that we needed to do something about that. In addition to username password , which we still ask people to change on a regular basis, we also have a piece of hardware that is called a gnubby . Dont ask me why. It is a two factor identification device. It creates a onetime password using an algorithm system. And i log into my google accounts, and you can do this to if you are gmail, when you log into the account if youre asking for two factor authentication, it will do one of several things. If you have this little device you will take a live because the light will come back on and it will send the data back and forth. Or it sends a random number your mobile or you have an algorithm running on the mobile which generates the number for you. All those cases imply that you have to have this other thing in your mobile or gnubby or a message coming from google giving the latest password, in addition to knowing the username and password. That is why it is two factor authentication. If they have your username, they cant get in because they dont have the second factor. We would like to encourage everyone to adopt that practice because that would make it safer for you and for me. The fourth Point Security and safety of privacy are really important. One way to achieve that, in part, is to use what is called ht tps. Hypertext transport protocol was invented in late 1989 and released in part of the World Wide Web. There is a secure version of this called https. And the purpose behind it is to increase the traffic between you and your laptop and desktop and mobile or tablet and the server on the other hand google in my case. The ideas that everyone should be making use of this cartographic means of the transmitting data back and forth. While youre using webbased applications, the information is kept in encrypted form and only decrypted on it reaches the other end. This is called encryption for transmission. Which leads me to the fifth point, which is that google and others believe that all transmissions, regardless of whether it is from your edge device to our services, or between our data centers or any other place, and ought to be encrypted in order to protect confidentiality. We see crypto as a very important technology, which should be incorporated into normal use on the net. No, i dont have a much time, so i wont tell you stories about how i work with nsa back in 1975 to design and build a secured internet. The only problem was that the details were classified at the time and i cannot share it with my colleagues. So i felt schisms rent for a long time, but now we have the Technology Available to make it so much more confidential and environment. We think also that it is important to encrypt data once it lands in place. Your laptops should be encrypted. It describes should be acquitted. Your mobile should be encrypted. We will encrypt data as it lands into our data centers as we move it back and forth between the data centers. We keep getting credit so if the data center were penetrated or you lost your laptop or your tablet, the information would be very hard for someone to extract. Crypto is important. The seventh point is another geek thing. It is called dns sect. Use domain names all the time. It is the security extension. How do i do this in a couple of seconds . When you do a lookup of a domain name, you may not see that happening, but when you type www. Google. Com, your computer says, where the hell is that on the net . It will look it up on a big database. What it gets back is an ip numerical address. These two pieces of information then the main and ip address are very important. What happens if someone can go in and change the numeric address associated with the domain name. You may think you are long into bank of america. Com, but if someone has hacked the system, youre off to some bad site, which is distracting extracting your username and password in every thing else. The solution to use is the Digital Signature. Some have heard public cryptography. Digital signatures arise out of that technology. We can digitally signed a binding of the domain name and ip address. When you get that pair back from doing a query, you can check if anyone change the binding or alter the numerical part. I checking the Digital Signature, you can verify it has not been modified. This protects against all kinds of attacks that would otherwise be harmed. We think it should be a fomented. It is being an fomented implemented throughout the domain name system, but we need more of the mentation as a goes down into the hierarchy. The a thing on the geek side youre going to love this. It is bcp 38. What the hell is that deco it is basking indications practices number 38. What the hell is that . It is best indication practices number 38. If you are operating a network and accepting traffic from people that will eventually be set out to the rest of the internet, the first thing that you should do is check to see whether the source internet address the miracle internet address is coming from a legitimate source. Is it coming from a network that owns that address space . Bcp 38 basically says dont let traffic into the net that has fake source addresses. It is possible to fake the source address by stating that this is coming from that place over there even though it is common from here. We dont want people to do that. We think the isps should be executing this bcp 38 thing. You can tell that i have a very strong message, which i ask you to amplify, to tell the icps to get on the stick. Improve the safety, security, and confidentiality of the net. Now we switch over the policy. They told me they were going to tell me when this thing was going to die. It says i have 19 minutes left . It is 19 after, seo got so you have got vint cerf seven minutes. Eight things and seven mins. [laughter] some of you may be reading and writing about this idea that the ntia has to transfer whatever response ability it still retains to the Internet Corporation for assigned names and numbers. This is called the iana transition. The multistakeholder bodies of the internet, all of us, become part of the operation and policy development for the internet rather than having a specific agency of the u. S. Government taking place of that. When it was created in 1998 that was the intent. It was supposed to be a two or three year period and then it would settle down in the ntia would relinquish response ability. It has been some years since 1998. It is now time. The ntia has proposed to do that. It would show how to operate without the benefit of this oversight. Although there is controversy over this, i am a strong believer that we should the government should step away from the special responsibility or authority and return this to the community which has created and operated the internet since its inception. That is point number one. Second i cannot imagine that you would disagree that freedom of expression and access to information is absolutely fundamental to our democratic societies and we need to make sure that the internet continues to support that. I would like to add one more freedom to this and that is freedom from harm. We dont often speak about that but unless people feel that they are safe in using the internet, and they will not use it. If they dont, and some comedies Business Models including mine, may very well be undermined. It is very important in addition to freedom of extortion and assembly and access to information that we do everything we can to protect people from harm, which is why i was talking about all those other geek thi