comparemela.com

Socalled internet of things. This is just under one hour. Thee will get started well coffee corner sorts itself out. This panel is on the internet of things. The internet of things is a wideranging term generally describing Computing Devices or machines connected to the internet and possibly to each other. Some are household products. Im slowly connecting all my lights to alexa. You have to do new things about worrying about your lightbulbs updating your firmware which they have never had to do before. My wife is not happy with this, but i keep telling her it is Getting Better and better. Before you know it turning on the lights of these easy as flipping a switch. [laughter] Household Items are probably the least important part. Enterprise in industrial uses have the potential to radically allocate resources more efficiently. There are two principal challenges we are all talking about. The first is the network. What kind of infrastructure do we need to facilitate a robust iot . Second, had a we secure the network . It is one thing for terrorists to know i need more ice cream. It is another when you talk about yourself driving car or the electrical grid. Today andgreat panel we will go to discussion. Global innovation and R D Consortium of the cable industry. He guided u. S. Wireless broadband policy is chief data officer. He shakes to mitigation policy at the White House Office of management and budget. Ashley dermer, Senior Vice President for the legato networks. She is responsible for promoting the companys vision to provide connection ration conductivity. Next generation conductivity is iot. She is a former capitol hill staffer there worked with chris dodd in the election of barack obama. Erry faulhaber he previously served as chief economist at the fcc. His Current Research includes wireless markets, public markets, policy in Public Safety radio, filesharing, music copyright, Net Neutrality and iot security. The honorable terrell issa represents the california 49th district, kcet has held since two of one. These on the House Judiciary Committee where he served on a subcommittee for intellectual property and the internet, along with democratic congresswoman suzan delbene. He speaks to these issues not just as a representative of his district, but as a practitioner. Thatlds 37 patents, found an Electronics Company and also served as chairman of the Consumer Electronics association. David young is Vice President for Public Policy at verizon where he identifies and assesses merging issues, developing corporate issues and assessing Key Technology instrumentation industry trends. He has practical experience in todays ectopic todays topic. He worked on Data Architecture and audiovideo compression. Tos a member of the ieee mitigation society. Yes, i did a debate in high school. I can talk a lot faster than that if you want me to. Lets get started. A brief, quick definition of iot. Rob, maybe you can expand on that a little bit. With we mean when we talk about the internet of things . Rob thank you having me. Its a pleasure to be here with the congressman and his team of colleagues. Thank you for scheduling this power before the only the unique alignment of space and time that makes iot seem like miniature. Bit have a quibble a little with the agenda. You put iot after a. I. I think all the devices that we call iot are actually in input to the applications that we think about only think about a. I. In that term i mean in the narrow definition, not the generalized super intelligence and will one day rule us all. The more narrow verticals of applications and the transportation sector and health care and a number of other sectors of the economy. Is easy answer is iot everything connected. We can break that down into smaller and smaller categories. Things like enterprise versus consumer. Maybe just to set the stage a little bit, is useful to talk about some aspects of why it is interesting. It is growing a lot. Thats a big reason we are talking about it. You look at analysts forecast coming out analysts are never wrong. The forecast is at least two times growth of the next five years. It is probably more than that. Estimates differ on where we are starting from. By some counts were at several billion already. Others have said 1510,000,000,000. There is a lot. It is poised to grow more. There is some skepticism around that. I think it is some organic trends that are driving things in the direction of everything that could be connected eventually becoming connected. Driving down the cost and upping the capability of devices generating a lot more things that produce data. We have advances and analytics to make use of that data. On the network we have ipv6, and then were best bandwidth making room for connected devices. Hink there is something science pointing in the direction of growth. We just heard a lot about that in the prior panel in terms of the applications they can make use of this data. Saving lives, increasing productivity. I think when you start to get into, is this all hype . What is the next later below all these highlevel trends . There are challenges. Things are a little more complicated than it might appear at first. Some of the challenges our technologybased. The big one is power and power consumption. We think about billions of devices out there, a good number of them are not going to be plugged into the grid all the time. They will need Battery Power of some sort, or the ability to generate their own power. There is some tradeoff with their ability to communicate and her energy consumption. That will drive certain considerations in terms of the architecture of iot going forward. Potential tradeoffs of how you program these devices. They will be out in the wild for 510 years. Have you keep them updated . There are challenges in the market. And a robber ability interoperability is one of the things we see right now. Not all devices can talk to each other. Proprietary ecosystems you need to take as a consumer before you can take advantage of some of these technological advances. There are issues of trust, consumer trust. There are other challenges. I put two out the most relevant for this room because i think of them as horizontal challenges that are enablers of not of iot and that is spectrum insecurity. As you have the ilions more devices coming online, we need Wireless Resources to make sure they can perform their function. And we need to make sure that as the number of devices grow, we dont see the number of attacks. I was that ask you a question but your you have something to say about it. Jerry i thought i would maybe jump in here. Rob knows this stuff better than i do. Im kind of at the opposite end of the spectrum. Some months ago he said how would you like to give a paper on Cyber Security and the internet of things . I dont know a damn thing about the. I did even have an internet of things in my house. I dont have a smart refrigerator. Wait a minute, i do have a smart tv. Most of us have smart tvs. I had a connect this to my wifi. Yep, its on the internet and it is a thing. Ok, i dont to worry about it too much. Then i was recently that said it is a it is a samsung. Samsung to these have this thing where you can gesture at it. You can speak to it. It will follow your commands. I then read it also sense that to a thirdparty. Anything that it hears is sent to a third party for analysis. Ok. Now the next step is it also has a camera so you can gesture to it. So you dont have to use your remote. It also sense that to a thirdparty. Ok, now here is the kicker. The tv is in our bedroom. Ok. So all of a sudden the internet of things [laughter] kind ofrnet of things hit home as you might suspect. What happens is occasionally i wife and i have to move the tv out of the bedroom. That is what the internet of things is. That is the other side of what rob was discussing. That is what it means in reality. We already know this from you tube. [laughter] jerry it is on youtube, right . That is all i wanted to say. Scott privacy and security related privacy are a big deal. That also raises questions. The best part of what this infrastructure is all about. Apparently we need lots of bandwidth for video streaming from jerrys house. That is specifically designed for things. One of the things that makes for connectingd devices as it allows for lowpower operations. It also does not deliver the high bandwidth. For some applications that is not the most important thing. Ubiquitys con activity for altra ubiquitous conductivity, you may look to. Atellite area when we think about what you need really, the networks of the future are going to require each of those and a mix of those in order to provide and serve the diversity of applications that will result in. We are focused on the enterprise side of the equation, which will reliability, and ubiquitous coverage, which satellite does provide. We are also strong believers, as david mentioned, in being tech neutral. Historically, your Satellite Company your cell phone company, wifi, all different applications can benefit from a mix of those technologies. As far as the industrial internet of things, they will require the satellites for coverage for pervasive connectivity, and then for the in the lowerance bandwidth applications. Excellent stock about the policy aspect of it. About thes talk policy aspect of it. What are you see as the biggest you see is thedo biggest policy impediments to developing an internet of things, and what is the role of congress, and how does your caucus work . Policy, we have to unwind the bad decisions of past policymakers. Intended to be a joke, that is very, very sincere. Validatedk at how we spectrum, how we sold it, how we made decisions i will not name names in the beginning, there were discussions about how to we come up with wifi, which is today the clear backbone of so many internet of things, including this which is your wife continues to be confronted your wifee switches continues to be confronted with. Should not say useless, because Baby Monitors were considered yes, the baby will cry and you will be hearing it in the next room on this lowpower device. It was replacement for the other junk stuff, because we have cbn and all ofse cb these others. But you look at this history, and say ok, if you were going to start again, and if i could put everybody in this room with so hidden agendas in a room and said ok, what works for the people who are not in the room, which is your wife, but consumer, and say ok, what do we need to do . Recognize the technology of today is no longer bandwidth can find, meaning the idea of i make a product and it can do x amount of bandwidth with an antenna, that is very passe. There are broadband products that can listen before talking, operate in very diverse ways with very different power that means you can have devices that are much better than they once were, where dof course, as you see the newest wifi a mesh network that is somewhat intelligent and covers all of the available bands and uses a third band so does not trying to make a decision about what you are doing on a band that was, in fact, a junk band, but one that troubles further than the cells, so that when the cells to not talk to each other, the devices in the mesh network can. Those are succeeding in spite of history, if you will. Let me go through two things. One, i talked to people and theised i would comment on shovel being an artificial intelligent device, along with the horse. Is, intch in your system many ways, a shovel, because you can push on the button and it turns on and off. It is the horse, because it is a little smarter when you hook it to your iphone, and even a little smarter, welltrained, maybe a welltrained dog when you tell alexa that you want to turn the lights on at 50 on red , if you have that feature. We are not yet talking about Artificial Intelligence, where Artificial Intelligence is clearly that next step as it continues to think, learn, and get smarter than anyone director of it. Necessary, andbe none of it necessarily needs government involvement, which is a good thing. But let me bring you back to two closing items. When i was a young, young, young things came to our house. Three a post man, men came to our house. There was a postman, a milkman, and a bread man. The milkman and the bread man are gone today, even know amazon has sort of replaced it for both. One time, the government made the decision that there is a universal delivery obligation in other words, there was a service that was there, the service was free, even if you , and we made sure it had every point on the planet. When the government is trying to decide about this essential news service, have we fallen short in three areas . One, 100 coverage of our entire country, even if it is inconvenient which the post office does. For real standards set truly universal lowpower. And obviously, the question of proprietary high power, the classic license space. That is where we see the question of are we there . Have we really done that . Cyber we get a new into cyber and the questions of security. We will all have to work on it, and the government does not have that it is the private sector. But if you go back to not the shovel but the milkman, mailman, bright guy bread guy, and ask is there one universal guarantee to every point in america, and if not, is that the governments primary role . Ensuring universal access, which is not done just by licensing space . It has to be done by initiatives beyond that. You are speaking about institutions that do and do not exist for host iot and iot security. How does this lay into that . Play into that. . I can talk about online do not policy, but nobodys going to count on a congressman to do that. Let me discuss the institutions issue. All, thention first of Cyber Security issue we have hundreds of manufacturers making little computers that go on refrigerators. They have to be part of the story. Dozens of sellers who are selling refrigerators, alarm systems, there are a whole bunch of different industries. Millions of consumers, most of whom do not know they have a computer. At least with people who have know you should download and antivirus think. With a smart refrigerator, you do not know that. You do not care. What makes this even worse is that the real danger is not that put something in your refrigerator and someone will forward how often you open the door, the real problem is a tax on other people. Attacks on other people. If you are one of the people who launched it, you do not know it, and the damage is done through you. How do you fix that . This is an industry where you need to establish standards throughout the vertical chain. You need customers to be involved. That is what you need. There are a couple of conclusions about this. To add another question to ago i was onars and Academies Panel looking at software liability. It always kept coming back to a question of connectivity versus reliability. Is there a tradeoff here, the the moree connected a device is, the less secure it is, or is that a false tradeoff. A report came out that included Cyber Security, maybe you can start off by answering that. Then i want to hear from the Network People and how they view that. In terms of your question, if you think about it narrowly, perhaps the answer is yes. A more open i. T. At the device level would be open to reductions in security area. I do not really think the level that is important to consumers there is that tradeoff. , aprovide an example lightbulb in your house does not need to be talking to the entire internet. Sending sam,pending but it can talk to your home hub, a gateway in your house that has an appropriate firewall and in tales no reduction in utility for that liberal label. We think not about just devices, but systems and connectivity. Growing inectivity recent history, and much further back than that . Is going to beot growing, it will be because there is value in devices and systems being connected, in a smart way. Of the very, very highest sense in anit make to design the devices to be able to go through a hub or something that has more control . Is a cheaper to build something that can connect to anything . Cheaper can be a problem in space. You can have device to device, device to hub, device to hub, cloud to cloud. The tradeoff between security id cheapness, as you put it, think there is a way to bridge. Hat gap we get a little bit to be institutions question jerry was outlining, and spoke to the congressman in terms of developing standards and making it easy for new suppliers of these devices to build to those standards, and allowing consumers the ease of connectivity that comes from a common platform. So you have industry coming together, writing a standard, making that available broadly. You get past the problem of the small iot manufacturer with five people and their company trying to stand of a product and not thinking about security. They can easily adopt the Industry Standard as the base code for their device, get it out quickly, and it is secure. We actually dont think connectivity and security are mutually exclusive and anyway. There is such a diverse range of applications and products, and the iot system itself you have the architecture, the application on the other end. We like to think about it as each layer of a stack, essentially. They will all require a at whatt kind of look security requirements are necessary. Allo not think they are created equal, all applications be created equal, and should electric grids have the same type of security requirements as my young daughters electric toothbrush that connects to my phone . Probably not. As an industry, what we are looking at is what type of security requirements and best practices do we need to implement at the device level or to ensure thatl each application has the security requirements that it needs to meet a Consumers Expectations . We also believe in consumer education, data is really what is becoming extremely important here in terms of enterprise, industrial entities taking the connectivity to the next level. What can we do with that data and improving our operations and maintenance . Making sure the consumers understand what type of data is being collected is extremely important as well. Hubou asked about the versus the directly connected devices. Being a hub certainly can advantageous, particularly for low cost consumeroriented devices that are operating in the home, but that just moves the Security Point to the hub, which is connected to the internet. We still have the same security issues, but now it is hopefully being taken care of by a man who understands that space and has the resources to make sure it is done properly. The good news is that most of the tools are already available to produce the secure internet of things, whether you are talking about Digital Certificate that will authenticate devices and allow them to be managed securely, updated securely, encryption over the network that will ensure the integrity of the it flows,ows the data all of these tools are available. The problem is not everybody either knows they are available or chooses to use them. Even worse, there are some really basic practices that are often ignored, like creating an internet of things device that has a default password that is published. So it is easily accessed by anybody who wants to go in and change the settings. Available, itre is just a matter of producing the education of the consumer level and in the tools are ble just because the tools are available, i have not heard about these incentives . Lets look at the incentives as it is never going to be good enough. The education is never going to be good enough. So decades ago, i was a young officer training for how we were going to beat the russians in an next war, and there was interesting difference between how the u. S. Went to war and the soviets went to war. We went to war with every single had a radio and full training on how to command. Every private has the same level of training of what would happen if you went to war. There was a union that used hand signals for the most part, and literally did not put radios in anything except the command vehicles. They put fake antennas on the rest. Part of the process was they did trust their shoulders soldiers. Skip forward. And arein a battle going to have losses. In the case of the soviets, our goal was to knock out their command and control and the rest of the guys did not know what the hell to do. When we look at these trillions of devices and we know there will be failures, the first question is how do we ensure , 100, 1000, of one one million is not the failure of a system . So rather than say we will have better education, change the passwords, put a hub in, the first thing is the system has to be built with an assumption that there will be failure. The assumption that the systems, whether it is the electric grid, thenternet, through denial of service protection, has the ability to protect itself and deal with inevitable losses. And some of those are when Electronic Systems go haywire. There are some that create their own noise, like this one, and i think you start with that. The second part, which has a bigger public interest, is the debate that is not settled. I am very personally involved in it, if you will. The former fbi director comey came before congress and swore under oath that he had no ability to get the information he needed from , except by ancing apple to create active remote back door into the probe. That is what the magistrate had ordered, feeling there were sufficient constitutional protections in this order. Now, a matter of weeks later, an israeli company, for 1 million, gave him the data he wanted. A few weeks after that, a cambridge professor showed him how he could do exactly what a Rube Goldberg guy like me said he could do in this argument. We have to have a debate about whether encryptions and protections are real and unbreakable, because if they are not real and unbreakable, then they will be exploited. People,are real and on organizations like the fbi, cia, and others will be constantly disappointed that they cannot get what they desperately wants. This is not a new argument. Back in the 90s, quite frankly, we had 128 bit encryption as a cap, annually way we got past that was that microsoft and others began having their software hacked and given away for free all over the world, and it created a pressure because of its failure. We are repeating that right now, just as we did with justin correcting software so it could not be easily copied, or repeating the question of do you have an absolute right, and do we have an obligation to make these things secure, and if so, that inevitably will empower those who use it for nefarious purposes to be protected. To thet goes all the way highest levels of governments around the world. How does that fit in to your institutional yeah, let me finish appear. I certainly do not want to get in the way of the eclipse. Let me talk about some of the incentive issues with some of the institutions we could set up. One of the problems was there was such a very wide variety of major is him in this game, how are we going to get everybody on board . Well, there are two extremes here. Lets set up volunteer organizations, and we will sell that. All the way to the ftc or somebody, saying we will have regulation. Havenk there is i identified number of things, one is the volunteer approach. This works well when you have a small number of firms, all of whom can internalize this, but when you have hundreds of thousands of firms, it becomes very difficult to actually police this. This would work, for example, if you said lets do the equivalent of the Good Housekeeping seal of approval. That is a totally voluntary thing, and if everyone signed up for it, this would be the solution. Im not too sure this is the best solution. The second one would be voluntary standards, but with legal enforcement. Lawyers would love this because, in fact, Product Liability becomes a way to enforce it. That works the problem of this is enforcement is costly. May completely miss it, which is to say i have this on my refrigerator. It creates this damage to somebody else, but i do not care about suing. This is perhaps not a good way to do this. Regulatory, this is the third regulatory joint efforts with with the industry. Joint effort. An example to this might be epa and energy star, where the appliance people get to put on the energy star thing, but that is done jointly with the epa. It form ofthat is joint regulation in the industry. Involved withnot the problem, and there are some externalities. Potential for regulatory ughing] this could work well for iot. You have to have, if you do full regulation, it is not going to respond to technical change really well. This would be epa fuel efficiency, ok . It can be enforced, but it is slow to change. In the technical field, that is not a good solution. I would tend to go excuse me regulatory joint operation. I think that would be a good solution to come up with. It is enforceable, and change the technology, and it is something i think would work well with iot. It would not be perfect, and we have heard a lot about what happens to the tale of things, and everything you said was excellent. But you need to have some institutional structure around which laws and standards can be built. It is important to think them think through going totally private versus totally public. You asked about incentives, and suggested that there is a lack of incentive. I would push back on that. I think there is no one internet of things. We are talking about a Broad Spectrum of applications and solutions. And youre a business are connecting your fleet of trucks, you have strong incentive to make sure that those systems are secure and will require the supplier that you are working with to ensure that security, and take all the steps that you need because a failure will cost your business orher in terms of reputation actual loss or damages. If you are a city and you are deploying a smart Traffic Management solution, you have a strong incentive to make sure mess something up. There are incentives for all sorts of things, but when you start getting down to the Security Camera for your home that you are buying from a small company, and you as the consumer might not care about a denial of service attack, but others would. So segmenting the use cases and the problems and identifying where perhaps the incentives are weaker might be helpful. But there are also Mitigation Solutions that can be put into place. Ai came before this, and one of the applications of ai could be abnormalng communications and traffic patterns. So if a video camera starts engaging in abnormal behavior, sayi in your home router hey, you might want to unplug that thing and check the passwords. I think there are a lot of incentives already in place, but that said and then of course, the fcc as a backstop if you do fail to properly secured door iot network and consumers data is lost, you are liable to be called in front of the sec fcc and enter in a loan consent decree. The onehat is probably issue that i think is least resolved right now and ever security in Cyber Security. The diverse one is my favorite, the Michael Doherty case, for those who have not heard it or read the book. They could not name best practices, they did not have a standard, and yet they wanted to hold somebody accountable for things which they had not published. And after the fact with into, and you look and say well, there is where the rubber is rub is, i think jerry was very good. The government cannot keep up with best practices, but that means when government enforces or lawyers and force them, they are alluding to the idea that you should have known, and i think that is where a lot of what the internet of things is going to be all about, is industries creating best practices, governments quickly making them known, that they are from a regulatory standpoint a need to know if you are going to manufacture hardware or software for the industry, and then pushing that down. Of course, the updating question comes along. Is whenis all the part we get back to the consumer. Because i came out of the Consumer Electronics industry, where our motto is if they have to read the instructions, you have failed in the product. I know that is not just for the men in the world. The reality is that if we do our job right, the internet of which will be products may have to be shutdown when you do something wrong, but will not require the that that is where we have to change the government view, keep the plaintiffs lawyers out of it, particularly when we are talking about a product that is updated hourly. Cable is the intersection of standards and companies. This is a place where these efforts can come together. Without naming names, who exactly is not paying attention . Whatble to go along with is going on . All right. Can i name names . All right. Can i name names . [laughter] no, no. The reality, as service providers, we work for the cable industry. We have an ongoing relationship we feel austomer and pretty hefty responsibility to do what we can to protect our customers. Ist sort of relationship uniform across the i. T. Ecosystem. There are those that want to shift units and there are those who want to have an ongoing relationship with the consumer. It is a challenge. A lot of what has been discussed is exactly the right type of thing. The Public Comment process takes a year, two years to play that out. Think that moves too slowly and in addition its a much more complex problem we are dealing with. I think it really is up to and providestep up the tools the ecosystem needs to address these issues. , andust as a bit of a plug as an example for what the industry is doing in this space, cable and verizon are members of the open connectivity foundation. Companies0 or so actually riding code. We are not just talking about best practices. We write code that enables security for devices. That allows us to get at the issue of the small guy trying to stand up for product. To solutions are starting take root. Defining success is important to keep in mind. It is tricky. If we go back to the example jerry mentioned, being attacked net, to putt bot the magnitude of that in perspective, security researchers have concluded the net had a steady state usage of 220,000 devices. That sums like a lot until you think of the billions of devices out there. This is less someone percent of the devices on the market today or responsible for major event. We need to because just about what success looks like. We will have security. Make are tools in place to incremental, if not more than that, improvements. A different kind of question. Issues withe the spectrum what are you talking about . [laughter] are certain aspects of setting up the network for this sort of future easier . And are there also more difficult things like these groups . We view it as an unbelievable opportunity. I think what the congressman is talking about, how do we undo a lot of these things . A significant amount of spectrum that is largely unencumbered right now. That gives us an opportunity to start implementing from the start, the best practices that are already out there and focusing the network on Core Industrial Industries Like the utility that is just not quite meeting the needs they have right now as they look to further automating their systems and such. So yes, our story is not new to anyone in this room. Other are looking at the side, and really seeing a unique opportunity to deploy greenfield that needs anday uses the best technology that we have and tools that we currently have today. We have a little time for questions. The answer is 11 43. [laughter] on thene of the authors report on i. T. Security. I was really interested in what i read about oh cf, because one of the things that i identify is industry that the iot needs something that is the equivalent of the wifi lineups, and if you can put pressure on it and define test procedures and all of that and provide expectations a step further. So congratulations, i glad youre doing that. We are not quite there yet. We just started up last year, but it is a forum where these sorts of discussions are happening. The intent is to make it a Consumer Brand that people can recognize, a certification against it. And we should not forget that not that iot has an eight security problems, the internet itself is not very secure. When wifi was first developed, it was not at all secure. There is kind of a process that new technologies go through where the big challenge is to and then you worry about having to make it secure. I think there is a change in that mindset where we will start designing security. Questions . Ok. Well, that seems like a good place to wrap this up. Would likell, and i to thank the panel for this great discussion. Now we can all go up there and see nothing, if it all works out, and we will have viewing glasses for you up there. [indistinct conversations] tonight on q a, we take a look at anthony clarks book how last campaign president s rewrite history, run for posterity, and enshrine their legacies. Everything has been either one of two topics. How angry people are to learn what is happening, or how flabbergasted they are. It is not i have not received any mild oh, i read it and it was ok. Why are they angry . I think it is because we have these president ial libraries that are missed you house records, and here, some of the records will not be open for another 100 years. We are paying for recreation and legacy building. The white house says President Trump and his National Security team our meeting today to discuss north koreas announcement that it has conducted its most powerful nuclear test to date. A short while ago, the president tweeted the United States is considering, in addition to other options, stopping all trade with any country doing business with north korea. \ more reaction from secretary steven mnuchin, congressman adam schiff, and senators and ted cruz. I did speak with the president , and it is clear that this hate your is completely unacceptable. We have already started with sanctions against north korea, but i would like to see the sanctions package to send to the president for his strong grit ration that anyone wants to do trade with them would be trade or from doing business with us. We will work with our allies and work with china, but people need to cut off north korea economically. This is unacceptable behavior. Does this put us closer you talk about sanctions, diplomatic efforts, does this put us closer to a military response, sir . The president ink made it clear that he will consider everything, but we are not going to broadcast our actions, and we will continue to look at all at our options. But my focus right now, working with the president , with others to ensure that we put additional economic sanctions, we work with china and others. China has a lot of trade with them. Cute is a lot we can do to them off economically, much more than we have done already. Quex it is much more of a powerful weapon they have tested before. Point. Ear at this so it certainly could be a fusion device were boosted fusion device. We can assume late in the days to calm and we will make that a server nation, but it certainly underscores behind importance of us working with china more aggressively to cut off trade with north korea. I do think it means we will staff to start we will have to start opposing secondary sanctions on other countries doing business with north korea. We should be aiming for cessation of these programs in the first instance, and hope that will lead to negotiations were we can actually roll back certainlyrams, but another very disturbing sign. For 20 years, the diplomacy appears to have not worked very well. Russia and china both being interested in solving this problem do not work very well. I think the president putting everything on the table is not a forthing right now, mostly north korea but maybe more and howtly for china, inconsequential this behavior is. On the Intel Committee i serve on, i do not think it discloses anything to say that in the last year, this has probably been the number one topic among us. What was happening there, what we are going to do about it, and i hope the neighborhood understands how critical this is. We need to plan for the immediate and the longterm. You look at longterm planning, you look at what israel has been able to do with missile tech. The incredible success. Missile Interception Technology has increased dramatically, and the next arena, the next theater is going to be in space. China is enhancing its ability to take out satellites in space, and we need we need to do the investment now so in years to calm the have intercept capability. The second part of what we need to do is to use economic toge to go to against go against not only north korea, but every company that does business with north korea. All of them rely on the u. S. Financial system. Cutting off their money is another critical part. The third pieces delegitimizing the oppression of the regime. Here is more reaction to the announcement from todays washington journal. This is about 40 minutes. We are going to welcome robert gallucci, he was at the table back in 1994 during the clinton administrations negotiations with north korea. Thank you very much for being with us. Thank you for having me. Lets talk about the news overnight. How concerned are you about the successful testing apparently of a Hydrogen Bomb . Guest there are two parts to that question whether it was a true thermonuclear weapon or not. I think analysts are going to be looking at that, starting with the yield, but the yield is as initially reported, 100

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.