Transcripts For CSPAN2 BOOK TV 20160221 : vimarsana.com

CSPAN2 BOOK TV February 21, 2016

Primaries. In fact, primaries were not important at all. They existed but they were not important. Suppose, for instance, that our three returning president s, roosevelt, dwight d. Eisenhower, and john kennedy, found themselves in the middle of a campaign for a partys nomination. The object today would be the same as it had been in their days, to accumulate a majority of delegates at the partys nominating convention. There, however, the similarities would end. The strategy for winning the nomination today bears little resemblance to the strategy of days gone by because the system is so different. For instance, imagine roosevelts confusion to hear people talking about momentum in february of the year of the convention. In roosevelts day, momentum was a term described that described behavior at the convention itself. Imagine eisenhowers reaction to the news that senator howard baker had given up his job as majority leader of the senate as well as his senate seat, four years before the president ial election. In order to campaign fulltime. And imagine how all of these men would react to a democratic primary race in which two senior democratic senators, joe biden and chris dunn, who between them had logged 70 years in the United States congress, were never seriously considered for their partys nomination because all the attention and energy were consumed by a former first lady and the first and a firstterm africanamerican senator. So, the point here is that the Electoral College race is still very much the same as it has been throughout our history, but between 1968 and 1972, the Democratic Party was part and parcel of a huge reform system, a reform of the nomination system. The proximate cause of those reforms was the feeling on the part of antiwar democrats and women and minorities that the old system cut them out of the action. That the old system, famously categorized as old white men with cigars were simply not representative of the party and what the party was becoming. So, between 1968 and 1972, and then 1976, a whole series of commissions were appointed in the Democratic Party, and i write about these in the book. And who the players were and what they were thinking about. And they fundmentally changed the nomination system from what it had been from about 1832, all the way to 1968. You can watch this and other programs online at booktv. Org. Heres a look at authors recently featured on war words. Barry lassiter, criminal justice prefer at City University of new york, discussed his research on Violent Crime in america. Daily callers senior contributor matt lewis explained that the run party must reembrace conservative principles to remain relevant. And Princeton University professor argued that america continues to suffer from racial inequality in the coming weeks j. D. Dionne will explain that the runs Party Adoption of goldwater withtive prims is drivel away moderate voters. Michael hey depp will asks the decisions he made as a following september 11th. And coming up Michael Eric Dyson will talk about how race impacted the Obama Administration and cory booker recounts his upbringing. My parents were relentless my father joking at me, an 18yearold boy, high school a uamerican football player, i had a my father would say, boy, development you dare walk around this house like you hate triple. You were born on third base itch worked hard in high school and my father would try to remind me of the blessings i enjoyed. Anybody who calls themselves american we are better to be born in this country than a lot of other places on the planet earth. Were reaping the harvest other other folks. So the next step in understanding that is this idea of taking responsibility. When you dont like somebody in the world, dont care if its mass incarceration or the environmental contamination that suchness ft. There are many towns in the country that are facing challenges flint is facing, that is hurting our children right now. I always say you have a choice. You can accept things as they are or take responsibility for changing them. After words airs saturday at sunday and you can watch all programs on our business, booktv. Org. Welcome. Its my pleasure to proabuse and have a conversation along with you with mr. Edward lucas, talking about his book cyberphobia. I think it has a great deal of interest and really in two different ways for this audience, and others. One is your own personal security of your computer, your information, your bank accounts, and all sorts of other things. Second of all, also deals in the book is the National Security issues involved. You can imagine or read about the cyber how cyber can affect the nations defenses, utilities, security systems, and i think we have already seen many examples of that. Mr. Lucas, is a Senior Editor at the economist. He has a long career as a correspondent in both russia and eastern europe. I should point out one book that im familiar with, published in 2008 called the new cold war and came out with a revision in 2013 and a third in 2014, which if you take a look its youll see that many of the things he said earlier are even more true than true now that were predicted back then. But tonight, the subject is cyber phobia, and just have mr. Lucas talk about his book, then well engage you and the audience in questions you want to ask and well have a general discussion. Were good here until 6 00. So with that, mr. Lucas. Thanks very much indeed for having me here and to all the people involved in organizing this. I presented the new cold war in 2008, and it was a pretty skeptical audience then. At a time when people thought that although we were having temporary difficulties in our relationship with russia and the difficulties became repugnant and i wished i had been proven wrong. No one would be happier than me. With went back to a Good Relationship with russia and our allies were safe and unthreatened. I hope this wont be too gloomy because my message is a gloomy one. Be designed the internet putting convince putting convenience and low cost as priorities and we have didnt doing that for 2030 years, and never really made security a priority, and the result ills that we have a huge amount of vulnerabilities bake bid the system. Insecure software which people using. Insecure hardware, we have networks, we have which can be exploited by any number of the possible categories of we have spies, hostile governments, hostile military operations conducted over computers and networks. We have hooligans and the activists and the pranksters and then criminals, and although it makes sense to divide them into those categories when we are looking at them as threat actors, many of the tools theyre using are really similar the vulnerability for social engineering that can be used by anyone. People did say to me when i first started writing this, why are you turning your attention from European Security, which you claim to know little bit about even though many people think youre wrong and mad to Internet Security which you have record of, and actually as i started researching this, i became more and more aware of the parallels that we built off the European Security order at the end of the cold war basically with the that was based on an assumes of goodwill and trust, we all basically get on. We h we may have difficulties but we can resolve them, and this Security Order very few sanctions but a lot of cooperation and dialogue, will work for the indefinite future, and thats the way we set the internet up, assuming the beginning was going to be for academic purposes. We never thought about questions of identity and anonymity and we we never thought about ecommerce. I was against the rules to use the internet for commercial purposes back in the beginning. And if anyone said this will become the Central Nervous system of life and well use it for message, ecommerce, banking. All people said, hang on, its not designed for that . Are you sure you want to go down this flood but we went down it becaused work. I i was chief, con event, flexible. And i think one of the first messages in my book is this is going to get worse and quite possible lay lot worse before it gets better. We have become habituated if i said opm will be hacked and 20 million files on Government Servants are going to be stolen. People would have first said, whats opm. Or might have said, whats hacks but we have breaches happening all the time. Its difficult to get reports. My friends at the ft and other papers say, make just been hacked. 10 million customer details gone, maybe chinese, maybe criminals, we dont know. And the responsibility of the news organizations is same old same old as the breach last week. We have got use used to the idea at that time breaches are normal but theyre not end. Tens of billions of dollars are flowing from our pockets into the criminal economy. Very skeptical of the estimates made by Cyber Security companies because they have interest in talk the threat up. But people are talking about 500 billion a year. Thats not just a loss to us. A large chunk is going into the pockets of some of the worst people on the planet, people who like to do us harm in other ways. So quite gloomy. We can get on to what to do in the kuo a but the q a and we have to start speaking english and germn or russian, other languages that people speak. Most important feature of the book, maybe what makes it different, is that ive not used any computer jargon in it. The word cyber appears twice in the book. Once on the cover and once in the glossary where i say this is a word used to confusion rather than illuminate. When we talk about Public Health we dont talk about epidemiology or biology or detail houston the dna work in bacteria we have very simple messages, wash your hands, coughs and sneezes spread diseasessed, very simple messages which get cross complicated idea. Road safety, you dont need to know the difference between a pin and a gasket to be a safe driver of a safe car. Were not there yet on the internet. Fundmentalityly the solutions to the problem wed have are not primary technical. We kind of know what we need to do, and i get into that in the q a, identity assurance, defense in debt, Better Network design. The tools are being secured are pretty much there. The problem is changing human behavior. Its the attackers are humans, we need to deter them and get into the criminal economy and disrupt it, rates the cost of doing business weapon need to save people who dont at the moment feel theyre hurting, actually are hurting, and people who dont feel theyre scared, actually should be scared. More people are scared or hurting, then the change their behaviors, whether its individuals, candidate, governments, or anything else. So stop there i look forward to robust questions, so if you have read the book and you think its rubbish, tell me. If you havent read the book and you still think its rubbish you can eatable tack me for that. And if you want to ask about russia, thats okay, too. So well kick off with questions. If i could just have you pursue the issue you mentioned about some of the simple measures, and although a gloomy prognosis, is this are we in a period now where well talk about the wild west . I mean western United States in the 19th century and not other wild wests. In other words, where theyre sorting these thingsout and it will take several years, or as these things become uncovered, that based on where we were maybe five or ten years ago, were moving in the right direction, either by governments or by personnel or are we really marking time and looking for a way ahead . I think its worse than that. All vulnerability is increasing all the time. The criminal economy is get mortgage and more sew is in tick indicated. When i sophisticated when i was writing this book i was impressed you could sale malware on the dark web. There are threetocustomer support, basic help line which is how die make this work. Second temperature help line, can you help me tweak so it it works in this way, and a tier for under the hood, can you help. So i think that both the threat at the surface, the number of things that are vulnerable to attack, is increasing, particularly with the excess of things which were tumbling into headlong, and the criminal economy is get fogger more sophisticated and could use your wild west analogy we dont have the sheriff, we dont have a posse and dont have visualization. We know i am not sure you can say this we know there are indians on the hill but we dont know who theyre going to attack or how and whats going to happen. Im not making a nasty point about native americans. Just a general cultural reference. We have to start at the very basic level of making people feel this is not this is different from any real world analogy. A badly run computer may be no threat to you what be doing something very bad to somebody else. A million enslaved computers whose owners have no idea that the attachment the clicked on or the link they opened is taking a little bet of the processing card and has made that computer into something that can then do a huge attack, not a web site off air could be used to spread more malware. Lots of things you can do with a botnet. And this maybe cost me five cents a year in electricity. Doesnt impede the function of my computer. Why shy worry . Well, our answer should be, its as if you have multidrugresistant tuberculosis, or typhoid or Something Like that you can be a carrier of a disease that isnt hurting you but is endangering everybody you have contact with, and the most freedom loving states in america, if you have to communicable disease, they will lock you up and in your house and say you dont go out until your cured. So we have ways to think about it but havent adopted that to computers. Any country that is more ahead than, say, the United States, for instance, when estonia had the massive hack several years ago, have the hey taken any measures that appear to be thwarting these measures. There are any see estonians in the audience. Im a huge fan of they estonians, and theres three thing is think are really important here. One is that is ddoes attack. A very crude kind of cyber attack. Highend stuff with you see in hollywood screenplay. A straightforward attack. It didnt knock them over. Imimpedeed things, slowed things down, few web sites went down but they did not succeed in bridging estonian economy to a halt, didnt destroy their banking system, didnt do the things that the people who launched it thought it was going to do. Since then estonia has a whole lot better in terms of defending itself against ddos and looking at the critical infrastructure. Thats easy in a country of a million people, like a small u. S. State, but theres plenty of stuff there to look at. I think the most important thing about estonia, predates this attack, and that is theyve got the fundamental business of identity assurance absolutely licked. That is with this thing, disis the esteen ya national i. D. Card and your identity is in this chip, and u you dont share that dat with all the people you need to identify yourself. To you type in a pin code. The pin code clicks with the chip, and it sends a signal saying, yes, this is edward lucas. Say i need to sign a document, put in a pin code and that is a legally binding signature in this country if you ask for Digital Signature people print out a document, the sign it with a wet signature, then the make a pdf and email it back. This is something i suppose to be secure. Simply dont understand this in most countries, identity and access are hopelessly conflated. So if you want to rent a microphone system, sort of thing im talking on now, and you want to rent that good britain you hand over your address, your date of birth and a coach your driving license or passport. That is enough information to open a bank account. Just to rent radio microphone system. This is crazy. Were handing out our immutable personal data. You will never guess another mothers maiden name. If you hand that stuff over and its copied youre in sirrous dish syruppous youre in serious trouble. Much better too have this crypto gric

© 2025 Vimarsana