comparemela.com

Selling technology. We are no different than any other technology. Supreme court, april 22. He is the ceo and founder. Thank you. Cspan. Created by americas Cable Companies and brought to you as a Public Service by your cable or satellite provider. On newsmakers, a Financial Services roundtable ceo. He will talk about key issues facing the banking and credit card Interest Rates . Credit card industries. From that prevent banks making speculative trade with their own money. Newsmakers, sunday at 10 00 a. M. And 6 p. M. Eastern on cspan. Host joining us now, lee rainie of the Pew Research Center, he is the director for the internet and American Life project. Thank you for joining us. 18 of people finding that their information has been compromised . Guest even more strikingly, we did a survey last summer asking the same question and found that 11 of Internet Users had had their really Important Information compromised, Social Security number, record number, a banking information, stuff like that. Just in january when we did this new survey, it jumps to 18 . It was particularly striking among younger folks, people between the ages of 18 and 29. So the line of breaches that we have seen in recent months starting with the target store breach around christmas time, now with new information coming out pretty regularly, a lot more people are aware of whats going on and they have probably had direct experience. Host with the server you took, how to these breaches take place . What kind of information was compromised . Guest we did not press people on that. We did not press people on that. It included such things as Social Security numbers, credit card numbers, and things like that. In many cases, people have heard from their credit card companies. They themselves did not discover the bridge, but their Credit Card Company said there is weird activity or maybe a credit application, something that does not have all of the right information, so they are hearing from banks and other finance companies that there are problems with their accounts, and that is what discovers it for them. Host what his reaction, though, as far as what people find out . Guest they feel hugely vulnerable. Many feel like theyre playing by the rules and they are following the basic good commonsense advice of they get from their companies and friends and stuff like that. Other people just assume the best. Theyre using the internet, nothing bad has happened so far, but they are now discovering that they have got a problem, and someone notifies them and things like that. The other number that was really interesting for the us is that 21 of Internet Users have found that an account of theirs has been compromised like an email account or social media account or things like that. People are newly sensitized to the idea that people are messing with their accounts and they can come back to haunt them. There is a lot of tension out there now that did not exist when we were just a couple of years ago. Host lee rainie, we live in an age where we are told about our information was of is a change in practice . Guest not so much. We know that lots of people would like to be safe online and take rudimentary steps to do that. It occasionally change their password, though it is still the case that lots of people use Pretty Simple and not very smart passwords. Are now more people sorted taking elementary steps and we saw in a survey that we did last summer that more people are encrypting their email or using Services Like Virtual Personal Networks that allow their activity to be anonymized and hidden from viewers. Part of that is just there worry about surveillance, part of that is that they have heard enough Horror Stories from their friends and things like that. So there are hundreds of levels of awareness and it is stitched into a broad range of peoples concerns about their security and surveillance online. Host you hinted at this, but are there differences in how people protect their information depending on age and where they fall in that . Guest yeah, interestingly enough, one of the consistent things we found is contrary to what people believe, that young people are indifferent to privacy, that young people are not very protective of what they do. We actually find a younger adults and teenagers are the most active folks who are trying to do best practices and trying to keep their reputation say. One of the other elements of onlyof course is that not is personal information related to finances at issue but just your reputation, who you are, and what your identity is and who could know that and things like that. Younger folks are more active in managing a reputation, trying to keep up with their password than older folks. Even though there is a lot of finger waggling from their parents and grandparents, they are doing a little bit better job about that. But it is a new environment now where people sort of have a sense that they are being surveilled and sort of have a sense that their information might be compromised, and they are a little bit confused about what the right steps are because even though they have been told go to these websites and dont share any information unless you see attps, the signal of a secure website, or the little green lock at the top of your browser. If you see that, you can be safe. The horrible thing that has happened in the past days is the disclosure about the vulnerabilities in that system. Host lee rainie is our guest, he is with the pew center and talks about internet issues. If youd like to ask him questions about privacy and online concerts, here is your chance to do so. 202 5853881 for republicans, 202 5853880 for democrats, 202 5853882 for independents. Twitter cspanwj and email journal cspan. Org. You mentioned about event reported this morning with this michaels arts and crafts store, a data breach that occurred. Guest michaels is just the latest in the run of stores about the vulnerabilities that companies have had. He big one was targets during the holiday giftgiving season, but there are data breach is almost weekly at some level. A laptop is stolen with lots of government accounts on it. Lots of Web Companies now are having to disclose to their customers that they have been hacked, and basic information like email addresses and passwords and sometimes personal information like Social Security numbers have been hacked. So this is sort of an omni present aspect of online life now. What is interesting is that public apprehension has risen, there has not been a significant drop off in internet use. For instance, after the Edward Snowden disclosures in the National Security agency Surveillance Programs were unveiled, you might suspect that people who were nervous about such things would have changed their behaviors or that anyone of these data breaches like the target story might have driven people away from sites like that and basically using Financial Information and sharing their credit card number online. Absolutely not. Ecommerce, the willingness of people to share personal Information Online has not been interrupted by any of these disclosures. It is sort of an interesting phenomenon because you think if people felt this vulnerable, and if many people have experiences drug problems, they would be marching with pitchforks against somebody somewhere, yet there is not a tremendous amount of public outrage, even though people would really like the laws to be tighter and really feel more vulnerable. Ift i was going to say people have reacted i will give up on the internet altogether because of these things. Guest no, it is so baked into peoples lives that they do not feel they can afford to be off the grid. We are all network individuals. We depend on our friends to share things with us, we depend on it for news, for commerce and things like that. So it is in many cases not an option for people to go offline because that really puts them at a disadvantage or so many things come in and there is lots of enjoyment to be had on the internet, too. So it is not the case that people are fleeing. Theyre trying to figure out how to be smart about it, and things like the heartbleed bug come out in april there had to say even if the experts cannot prevent things like this, it is not too good of a situation for me. Host you mentioned the heartbleed. Is there a limited way to understand this . That runsre is a bug the secure website, the https websites and things like that, lots of websites, anywhere from 500,000 to one million or even more use this basic kind of software. What is interesting as it is Opensource Software. A company did not put it out. It is an open source immunity where people of their own time volunteer to write code to make things better on the internet. And it turns out that they ssled the open community made a mistake in coding. A simple mistake that was i inadvertent. Vulnerability that has existed for over two years because it was released in march 2012. There are so many eyeballs on it. One of the other iconic examples of open source stuff is the leading operating system, which runs lots of the servers that runs lots of websites. I would bet heavily that cspan servers are run with the linux operating system. There are lots of people looking at this code and find boehner abilities and one of the ways you increase your status and get a better job is to find boehner abilities or to write more elegant code. The problem with this open sll very manyere werent people doing it. It only got 2000 last year in 2013, so the people who are doing this are just doing it out of the goodness of their heart. Who wrote this mistaken code posted on new years eve because that is when he had a little downtime to try to upgrade some of the security in the system. The system has a variety of folder ability. Vulnerability. When the Affordable Care act whats i out, and it was privatey, written by a company or several private companies, some of the early reactions was we should have used Opensource Software because it is so much more ubiquitous and so many more people are watching her. This is the flipside that something really valuable is still causing a lot of problems. Host the first call for you come from paul in montana. Beler mr. Rainie, i hate to a wet blanket, but i have a very simple question to ask you. Why, what reason would someone have two posted their personal, private Financial Information and personal information in the computer when they know or suspect that it can be taken, misused, or abused . I would really like to know that. In many cases, companies have spent a lot of time and effort making systems really convenient for people to use was of you can go to a website, you can buy something in a couple of cliques of your mouth and get the thing delivered in a couple of days. In theis an upgrade Shopping Experience for a lot of people. The other thing is up until this heartbleed situation, most people were convinced that the existing Security Systems and the elaborate encryption of personal information was good enough to rent problems like this. The other thing that you often hear when people talk about why do people trust the internet in these ways when it is so clear that it can be hacked or there can be data breaches think about the last time you went to a restaurant or the last time that you gave your credit card to somebody at a coffee shop or at a bookstore. You are trusting that the system of recording that information, your waiter or clerk at the store was an honorable person that was going to be doing it. We are a credit carddependent society that is decided we really love the internet and all of the benefits that you get from it, and breaches are now a part of life because there are people that wanted a given edge of things like that. I was going to say you do not see to the people writing checks these days. Guest even those can be vulnerable and hacks. Host Security Breaches are a fact of life now says jody on twitter. Guest in the financial world, there is an arms you know, thers an arms race of hackers. Financial institutions of other kinds are in an arms race with hackers. Im sure a lot of viewers of this program have had the experience of their Credit Card Company calling them or writing them saying, there are weird charges on your account, so your behavior is being pretty well monitored. Your normal patterns, where you live, etc. , and if your Credit Card Company sees anomalies, they will flag it and you will get a call. Smart people are watching, people have the sense, and the systems are good enough to protect me. And even though we asked questions about vulnerabilities on the internet, people do not necessarily know where the breaches in their information came from. You are sharing information. It is hard to know exactly what the problem was. About thetalked changed practices. Heartbleed, it was a wakeup call. What happened to change it . Are mechanisms for that. A data breach becomes a publicrelations disaster, a problem for anybody who wants to change. The other problem, there is the white hack community out there, looking for vulnerabilities, and bringing them to the attention of companies they are hearing from. There are people having interactions with companies and parts of the internet oversight system saying these are problems, you got to fix them. Coding is a process. You keep making improvements. You keep finding problems. The system keeps improving even as its vulnerabilities are exposed. Guest is that why most of our cards have an magnetic swipe and other countries have an encrypted ship and could we see that . Host sure. We are not as far along. In scandinavia and parts of asia, people use their cell phones. It is not a matter strip. You use your cell phone. You can swipe that. People say, oh, my gosh, your cell phone is the well of your life. If that gets hacked, the vulnerability is vulnerabilities multiply exponentially. Of hackinge target could go from standstill computers to mobile computers. One of the problems with heartbleed is it is prebaked into the android operating system for cell phones. There are lots of android systems that use this encrypting, and there is a scramble in the community and google to fix it. Texasrepublican line from for lee rainie. Go ahead. Hi, fellas. My opinion is, these guys are so confident, so brilliant as they undoubtedly are, it just seems a little too conveniently keeps happening. They know everything that you do. My thought is at some point they will say everybody has to take a microchip, and i just want to say, im not taking no microchip and im pretty sure the average listener will not take no microchip. That is the mark of the beast. And that is how i feel. Interestingf the things since hardly came to attention is how fragile the system was. It is not that there are masterminds behind it trying to survey livery body. It was that there were a handful coders in charge of the central mechanism for securing Information Online, and i think there will be a very active effort now to increase the funding for the Security Systems system thisrt beat exploits and companies will try to step into the breach, because it was very convenient for lots of companies to take advantage, for free, of this open Source Software and put it in their systems. That was a best practice on the internet. Now i think they have a much more acute sense of the vulnerabilities, the limits of it, how few people were working on it. Software that lots of people work on is awesome. Having software a very few people work on could be very vulnerable. Host matt smith says yeah, that is the other side of it. One of the great arguments for the open Source Community is anyone can make a contribution. You do not need a credential. You do not need a pass card. If you feel like writing code, if you want to participate in a community, you are in. The way you raise your credibility and become an Important Community member is to make contributions. The way that this works amazingly well online, but there are also ways there are too few people being asked to do too much. Michael from alabama on our democrats line. Hi. Morning. Oh, i could not read his name on the screen without my glasses. There are millions or at least hundreds of thousands in this country who do not own of we haves because autism is, in my case a very rare or high functioning autism called asked burgers. This is also why i do not have a checking account, because the checking fees caught me way off guard in the 1990s, and so we pay cash for everything. Well, money orders, International Money orders when we buy stuff online. I admit credit cards are vastly more convenient. The good news is this has saved our bacon from getting into much too high reddit card fees. The bad news is, we are considered this has saved our bacon from getting into much too high credit card fees. The bad news is we are considered nonpersons for car dealerships, anything where you have to pay something on time. Also there are vendors on the internet who will not allow anything except paypal. Of any credit score, fica score, bills in Congress Like one that suzy orman is championing . Also, do you know any paymentive systems for most vendors will put where we do not have to put our telephone number and Social Security number and so forth . Thomas finally, what Security Breaches can you get on your computer just from belonging i do not want to chat sites. I belong to sites having to do with my art career. Caller, youve said a lot. Lets let our guest answer. I dont know any particular legislation. If shes is suze orman, is championing legislation, she has a big enough following that someone is seriously considering that. An alternative for people who do not have a credit card. One of the decisions people have in this world, how are they going to encode this information in their life . Are they going to have a credit card or debit card to engage with vendors who are requiring the things you are talking about. Too many, they do not feel like there is an option accept to get get ait card except to credit card or to get the kind of financial material that will allow them to pay things on an installment basis or Something Like that. Host she used the term nonperson for not paying with a credit card. Yeah, there is a presumption with retailers that you are online and you have basic relationship and a relationship with a Financial Institution they would like to take note off. It is increasingly hard not to be in this network and on this grid for that. Why aone of the reasons bitcoin, as separate digital currency, came to prominence. Much information is available about me in too many places. I would like the capacity to use a currency that does not track to me and does not have any footprints. We will probably see more of that in the digital age. It is easy enough to create. Groupsbe we will see like the one this collar caller was talking about. You do not want to comment on legislation. How much is congress doing on this and regulatory matters . Guest there is so much discussion in recent years about what to do, but it is a struggle though. There is a huge group of industry stakeholders and privacy advocates who have spent with two a year trying to, protocols on privacy. Who to share it with, how it will be disclosed. And it fell apart last fall. There could be no coming together of this community. Now they have thrown up their hands and they are hoping that their advocates in college or in congress or state legislatures, where were this is taking place, will take up their cause. Now there is probably more transparency. Forget if we are making rules of the road to Tell Companies how to behave. At least share what you are doing. There is a lot of energy in that, too. And there is a lot of exploration about data brokers, people who have a tremendous data mass and what they can or cannot do with that information. Is lee rainiet. Rom the Pew Research Center he is the director of the American Life project. Lisa on our republican line. Hi. Caller hi. I am not too familiar with this hi. Hi. , grew up in the bay area Silicon Valley and all that other kind of stuff. Struggle the whole time. Two days ago i got on the computer and everything was completely wiped off. All the emails, the social, all everything. I am talking to years worth of stuff and i did not even know what to do. Hey took my passwords they took everything else. When i finally got it back up and running, but it is still not running right. What is this thing going on with the nsa and the Supreme Court . Are they even going to be able to rule on that . Courts athink federal all levels will continue to rule on elements of the government Surveillance Program. We have not seen the end of that. Im very confident. Your situation is like a lot of peoples. Some set of circumstances, there are things you did where you had no idea you were vulnerable or causing yourself problems. Something bad happened to your computer and it is hard to know whether it is internal to your computer or introduced by an outside force or Something Like that. But a lot more people have described to us stories like yours, where they lost enormous amounts of personal data, material they were trying to save for one reason or another, longstanding email accounts, things like that. So, among other things everybody recommends, you set up good passwords, you keep changing them, and you keep backing up your systems. There will be times, for one reason or another, things are going to go wrong and you will want to retrieve your passwords. The head of the Financial Services roundtable spoke with program, andrs one of the topics of discussion was this idea of Cyber Security and reducing bugs from phone abilities like heartbleed. [video clip] have securityto clearances so when problems arise they can access information from the government and act on it. You are in, if singapore, and you have to respond in five minutes, your coo can access it. Number two, information. Are when you think about Government Agencies that have useful and actionable evidence about Cyber Threats including the nsa, the fbi, the cia, the treasury and more, being able to work with legalithout fear of liability or recriminations is important for that kind of protection. And frankly, the current laws in that regard need to be upgraded. They are not current. Congress needs to act. Host lee rainie, your takeaway . Guest that is a well articulated view of the financial community. A lot of senior executives, past and present administrations basically make the same argument, that vulnerabilities are staggering, there is less information sharing then there there aree, that inhibitions in talking to the government about Something Like that. The other part of this he ran through the institutions that are vulnerable. He did not mention utilities. One of the things that has happened as the internet has become prominent and personal lives, lots of systems, vital systems important to this country, are online. They are encrypted or there are some levels of security. People have a prickly pretty substantial feeling of vulnerability. They just dont know. There were tons of experts who had no sense this was a level of vulnerability. It took a special geeky guy at google and a private citizen to figure out this vulnerability, and it had set out there for two years. Been a flipe has and the public and Expert Community now, thinking, we were ok, five years ago. We were not that vulnerable. Now there is a probable sense that we do not even know what vulnerabilities are. The unknown unknowns are worrying people. And i think mr. Polin see was speaking to a range of things everybody is working on. Host up next, gary from indiana, democrats line. I. I would just like to pull out something that i think should be more emphasized in a hasbeen. These computer hackers and identity thieves, i believe there should be a process established, i mean a stringent one, that will discourage these people from even thinking about it. They cut peoples hands off overseas . Why dont we do it here . Pretty easy not easy, but it is possible to track down the bad actors here. Came tortbleed prominence, lots of Companies Went immediately to their websites to figure out what theyre vulnerabilities were. Within days there were a number of test sites where individuals could put in a url from a website and see whether that website was secure or not. The Response Time too many problems is pretty fast once the vulnerabilities are known. Manye Response Time to problems is pretty fast was the bomb abilities are now. Canada, a bunch of companies discovered they were vulnerable. Yahoo is scrambling to fix it systems. There are lots of ways people are trying to respond to this. The penalties are pretty severe already for people caught breaking the law. John is from holyoke, massachusetts. Independents line. Lee rainie. You are on. Caller please dont interrupt me. Of me give you a summary what happened. The nsa is like ibm. Been for the had punchcards, hitler would not have assassinated so many dues and pole locks and everything else. Gm built the First Nuclear plant in russia. Internationalic corporate fascism. It is population control. People are feeling vulnerable. 86 of American Adults use the internet. They depend on in their lives. It is the saurian singh and scary when lots of vulnerabilities come to light. It is disorienting and scary when lots of him abilities come to light. You thought that you were operating in a safe manner. Now it no longer works for you. It is a scary things. There are global actors who are the purchase of guns on the internet. One of the other things about this media is you do not have to ask permission. You get an independent software writer, like tim bernerslee, who creates a program that essentially gives you the world wide web. He did not ask anybodys permission to release the code that gave us this amazingly powerful and beneficial resource that all of us use in our daily lives. At the same time, this letsssionless environment bad people do even more bad things with more tools. It is a hard environment to regulate and its hard to figure out whether the whole law can apply to these situations. We are struggling to figure out what the right regulatory and punishment regime is and what the right role of corporations it makes and environment really interesting to study as a researcher, but really are to operate i am sometimes. To be lessegies visible online. Clear cookies and browser history. Deleted or edited something you posted in the past. Set your browser to disable or turn off cookies. Going down the list, as the average person know how to do this . Decreases. Lots of people know how to clear out their cookies if they need to. Not many people know how to encrypt their email and there are questions about whether that makes you as secure you hope you might be. There are surveillance folks out there who can figure that out. I think more people have a sense that too much of their personal information is online, and they have a sense they can take personal steps to limit it, the list you were going through. They would really like a little bit more activity from lawmakers and the Regulatory Committee to give them more privacy protections, the right to go after people who abused or misused their information, things like that. We are in an interesting policy moment right now. Host you talked about encrypting email. Is that available on a consumer level . Guest yeah, yeah. There is a service that allows you to do pretty powerful encryptions. There are ways that people can take that step in their system for steps that are not too expensive to create Virtual Networks that anonymize all of your activities online. Host nextel or from indiana, independent line. Good morning, go ahead. Yes, you have been talking about encryption the last few minutes. With the nsa being able to and,pt things from google well, the rest of them, email and so on and so forth, and the fact that the nsa owns so Many Companies that no one knows classified, il would like to know your opinion on their ability to decrypt your and getnd purchases your information that way. Thank you. There are wellpublicized efforts by the nsa and prep but simply other organizations. They are codebreakers. They have been important parts of the government for a long, long time. Done. Possible it can be it is possible it is plain old individual hackers who can figure out even the very tough math used in encryption systems. It is probably safe to presume at some point not everything you are doing will be kept in a private realm and things like that. What most people will say to us, we cannot live our lives assuming the worst and assuming we are going to be broken into and assuming our information will be promoted out there. Most people have not had the experiences of having one of the dark side possibilities fall into their laps. We have this data that 18 now have lost significant personal Financial Information. It is a big and growing number. But it also means 82 of Internet Users havent had that happen. It is a challenging environment, but most people do not think they can just walk away from it entirely. Host Edward Snowden back in the news after an exchange with Vladimir Putin over issues of Internet Security. Talk about the exchange if you want, but has Edward Snowden changed to wait to think about Internet Security matters . Very yes, there is a robust discussion about whether he did the right thing or the wrong thing in the first place. There is a discussion about what is the right role of government in surveillance activities. When we did the very first poll right after the revelations in june last year, a majority of americans were ok with the idea of surveillance, particularly in the cause of catching terrorists or other bad actors. But more generally, if you ask fort Surveillance Programs whatever cause theyre going after, most people are pretty leery of them. The other thing we have seen in our data, a lot of americans think the nsa is capturing more information than has been disclosed. We know from the snowden revelations that metadata who you are calling, who your emails are being sent to, what times, things like that but we do not necessarily know under the snowden revelations with the content of emails or phone calls is being monitored. Lots of americans think that is the case. The literal content other emails and phone calls is being captured. And even some people who fear that, they are ok with these programs, because they say, you have to fight bad guys with methods like this. Host jamie in texas, goahead. If the i was wondering guest could speak to Identity Theft insurance . I understand it might be able to refund lost money, limit liability. Can it repair my credit damage . Can it restore my name if criminal activities were done as me . Guest i am not actually sure about the range of policies now being made available by Insurance Companies on things like this. It is probably the case that some of the things may be restored, some of your lost assets, obviously cleaning up your record at some level as part of the offering of some of those companies. But im not sure the specific ones or if they can literally give you a fresh start or what about a let the damage that you folks have suffered on this. Host here is our last call. Ida, good morning. Caller good morning. Mr. Rainie. Hi. Er guest those i am one of privacy people. I do not have a credit card. I do not have a cell phone. I make all of my payments on money order. I like to read and write, so that is why i do not have a computer. I dont want Technology Controlling my life. Im sure it does one way or another. Once you go to a doctor, everything is on paper. Portiones, there are a of americans who are just like you. They are so concerned about possible bad consequences of sharing materials, they really want to be off the grid. They want to not be known, and it is a very common expression of american independence and privacy and things like that. Many more people think that these are essential tools for our lives, having credit, having access to the internet, using a smartphone, all of those benefits they get from that, when they do the tote board in the situation, they say the benefits outweigh some of the problems related to it. But absolutely, a portion of the population feels exactly like you do. They are worried about the vulnerabilities and they are taking as many steps as possible to avoid it. What is the next area of concern in your mind when it comes to the internet and security . Until the heartbleed thing, i would not have even said rouser material and things like that. In many respects, it is unknown. I think there is a big reckoning we are about to have about amassing databases. Material your Credit Card Company knows, combined with what your phone company knows, combined with what your is a lotnows there of concern about who controls that, what they know, what they share with others Justice Scalia and ginsburg talked about revelations about the Surveillance Program of the nsa and they also talked about the relationship between the justices. As you know, a composer, who is with us tonight, has produced it, toera and in beautiful music, you are locked in a room, unable to get out compromiseagree on a consistent with the constitution. Ruth,point scalia says, can you read . The constitution says absolutely nothing about this. Manyurg replies, how times must i tell you your searching in vain for a right fine solution. The beautiful thing about the constitution is that it can evolve. Weve only got a minute or so. Are you ever going to agree on big issues and maintain the friendship . We agree on a whole lot of stuff. Ruth is bad only on the kneejerk stuff. [laughter] shes a really good textual list. In most things where the text is what she is guided by, she is terrific. She is very smart. In most cases, i think, we are together. We are together in a lot of criminal defense cases. Upholding the rights of the criminal defendant. Ruth and i are frequently in the sent in dissent from the courts decision. We agree on a lot. You have it wrong. You can watch the entire tonight at 9 00 p. M. Eastern here on cspan. On the next washington journal, creating jobs with brey and Daniel Mitchell of the cato institute. Outlines options for the Federal Reserve to stabilize the economy and matthew at the Wilson Center discussions Vladimir Putin and the unrest in ukraine. And well take your calls and you can join the conversation at facebook and twitter. Washington journal on cspan. At the white house, president obama awarded the table Academy Football team with the commanderinchief trophy. He also spoke briefly from the rose garden. This is 10 minutes. Ladies and gentlemen, the president of the united states. [applause] everybody, have a seat, have a seat. Welcome to the white house. Congratulations to the navy midshipmen. [applause] does this get old . Never. No . Okay. Its good to see coach ken again. And i want to recognize vice admiral mike miller for his service to the academy and to our country. This is the second time these seniors have come here to claim the commanderinchiefs trophy. If you guys have your punch cards with you, the next one is free. [laughter] im pretty sure coach ken would agree that this was one of the best teams yet. First of all, you had incredible talent. Senior captain Cody Peterson and d. J. Sargenti led the defense. I hear that theyre known in the locker room as the meatheads. On a Football Team, though, thats high praise. This year, quarterback Keenan Reynolds had one of the best seasons in school history. His 31 rushing touchdowns werent just an Academy Record they were a division i record for a quarterback. [applause] he is one of only a handful of players in division i history to rush for 30 or more touchdowns in a single season. I think its fair to say that if youre on a list with Barry Sanders youre doing pretty good. So this team had the leadership, it had the tools. But this is a team that also had a knack for getting the job done under some pretty tough circumstances. When the government was forced to shut down, you didnt even know if the game against air force was going to happen. Luckily, the secretary of defense stepped in, gave the green light which tells you how important it was, because secretary hagel has a few things on his plate, but he personally intervened on this one. A few weeks later, you beat san jose state in triple overtime with keenan scoring seven rushing touchdowns, the most ever by a division i quarterback in a single game. And you kept on rolling through the games that really mattered. In the snow, you beat army for the 12th time in a row theyre starting to feel bad about this locking up the commanderinchiefs trophy for the 9th time in 11 years. You went on to beat middle Tennessee State to win your first bowl game since 2009. So, overall, this was a pretty good year on the gridiron. Whats more impressive is the fact that for these Outstanding Young men, football isnt even the main thing. When these guys sign up, when you sign up to play at annapolis, you know youre in for a different experience. A typical day starts at 6 00 a. M. In the training room. Breakfast is at 7 00 a. M. After that, its class, lunch and football meetings. Then more class, football practice, dinner. Free time starts at 8 00 p. M. , which most players use to study until midnight. And when students at other colleges are enjoying summer vacation, these guys are busy with military training and Summer School and offseason workouts. So, yes, its about learning to be a good football player, but more importantly, its about learning how to be a good leader and to be a good man. And thats what these outstanding americans are and will continue to be. Next month, 14 of these guys are going to be commissioned as ensigns in the navy. Another eight will become 2nd lieutenants in the marine corps. Senior captain matt aiken will serve on a ship down in norfolk. And wave ryder by the way, if your name is wave ryder, then youve got to be in the navy [laughter] will suit up as a naval aviator. Thats their commitment to service. Thats the commitment to country and to each other that sets this team apart. Today, that commitment is as strong as ever. Last month, i know that all of us were mourning the loss of will mckamey. Two busloads of classmates and teammates made the eighthour trip to knoxville to attend his funeral, as did coach ken. I understand your motto for this season is i will in memory of him. And thats what camaraderie is all about honor. Courage. Commitment. Thats what makes the midshipmen so strong. And thats why im so proud to serve as your commanderinchief not only in fact, not primarily because of what youve done on the football field, but because of your dedication to each other and your service to america. So today it is my privilege to present you with a trophy that weighs about as much as i do. Congratulations, guys, once again. [applause] mr. President , it is always a great honored and we are humbled to be your guest. Your general told our Football Team the night before the game, youfootball need men of character. Behind you are 75 men of great character. 22 of them will serve you in your fleet in the navy marine continue may the lord to bless you, our young men, and all of those who serve our country, the greatest country in the world. Thank you for having us. [applause] [applause] on newsmakers, Temple Lindsay tim pawlenty. Newsmakers, sunday at 10 00 a. M. Eastern on cspan. We should have finished al qaeda in 2001. Our general who was there, all of us think back when we attack. More americans died than a pearl harbor. We had al qaeda. We had Osama Bin Laden trapped in mountains. We didnt finish him off. Escape over the other side of the mountain because that is pakistani territory. Think for a moment. Can you imagine during world war the battle midway , which change the entire war against japan. The pacific and attacked the japanese. Destroyed their fleet. 1942. He went across the International Date line. Ose he said we get to these mountains in the middle of nowhere and we allow al qaeda to escape. It makes no sense. Our entire country had become more legalistic. We should have finished it then. The wrong war. Sunday, may 4, our next indepth. He guest, Luis J Rodriguez his work includes the awardwinning always running. A discussion about the social changes occurring in small towns and cities across the country. A conversation with scalia and ginsburg. After that, Hillary Clinton among the participants in the women in the world summit. James fallows and his wife deborah fallows sit down to talk about their observations of social changes taking place across the cry

© 2025 Vimarsana

comparemela.com © 2020. All Rights Reserved.