In texas, and its a long and tangled tale. You can read about it in the book. But its really astonishing that schreiber, the former Surgeon General of the third reich, was living in texas. But as i said, the cold war was heating up, and this was the threat. The threat was that the soviets, who, bill the way, had their own program of german scientist, they got a lot of rocket scientists, but unlike our program, we sort of put the german scientists on pedestals. Pedestals and treated them with great regard and made them the top dogs of our program. The soviets loathed the germans. There was deep animosity from the war, and so their german rocket scientists were kept at a second tier and they were actually squeezed of the information, and sent back to germany by the russians, at which point the cia stepped in, grabbed up all those german scientists to learn what they could about the soviet missile program, but what they learned was nothing, because the soviets didnt share with the gem german scientists that top tier of information. We moved forward with our biological Weapons Program. This is the eight ball. Blome consulted on this and this where is we test ordinary bubonic plague weapons and our star rein gas weapons. And westerner von braun became the head and the hero of the Nasa Space Program there he is with jfk. Arthur rudolph, father of the saturn rocket, i write at length about this story in operation paperclip. Its really just remarkable how he went from a guy without a college education, running the slave labor tunnel at nord hausen to being the father of the saturn rocket in the United States. One of the very few paperclips who was actually investigated, and in the 80s the department of justice got some information its funny the department of justice would have to get information declassified but they did, and they were able to see his complicity in war crimes in the tunnels and they gave hem an option as an old man. Either stand trial in the United States this is the the mid80s or return to germany. He chose to return to germany. And lastly, and i think most peculiar to me, is kurt debis, just those dueling scars alone make him look sinister, but many regard him as an American Hero and told me so. I found out a very different story researching his thick dossier, declassified now. One of the mythed of the german scientists was they were just trying to do science and they were sort of skirting around trying to stay out of the eye of the nazi party, who was this big bad wolf. But you find out in reading closely at the now declassified documents about debus, he turned his superior, another scientist, over to the guess tap bow during the war for making antihitler remarks and that remarkable push and pull. You can see one arm of the pentagon saying we cant bring this guy to the United States. He was an ardent nazi. He turned a colleague over to the gestapo. This was a malicious act they used that word then you see the pentagon saying, we need him. And he came. There he is as the first director of the jfk space center, and every year still the National Space club gives another the kurt de bu s award, and when i interviewed the head of the space club, said, what do you say when someone asks you. What about kurt debus . The wore the s st. Uniform to work. He turned over a colleague to the gestapo. An ardent nazi. What dot you say so that . The answer was no one has ever asked me that question before. So, id like to end with the idea that einstein had it right in my opinion. He left germany, prior to hitlers armaments build buildud always maintained the reason he left as ascientist was because he was not going to work for a raw and rabid nazi militia. There he is get his citizenship and he is one of the few people with power that petitioned truman not to have operation paperclip happen, but to no avail. My last thought is this, which is written over the gate at an a concentration camp and its a german prove verb that says everybody again what they deserve. And when i was writing this book i would often ask myself, does everybody really get what they deserve . And i hope that you if you has to reed operation paperclip, come to your own conclusion. Thank you very much. [applause] , are. So i have couple for questions. In your research, beyond the lsd stuff, did you come across anything about the techniques used to split peoples personality . Did you find anything about that coming out of research that what started in the death camps . Well, i dont know about splitting personalities but ill do in the that camp king, that photograph i showed you, that is where the mk program began. It had two names, one was Operation Blue byrd and one was art choke, and they began the scenario i spoke about during the presentation and also rite about in the book. What was the theory the nerve gas was never used . And to bring these people out, were any vatican passports used . The first part of the question about why chemical weapons werent used. I would say the prevailing theory is that because when hitler was a soldier in world war i he missed the ends of the war because he was gassed, and mustard gas, and so allegedly he had a deep aversion to chemical weapons. But the nazis produced tens of thousands of tons of nerve agent. So there were so many individuals under his command that really wanted to use those nerve agents. It really is nothing short of a miracle it wasnt used. Your second question was . Asking if vatican passports were used to get them to argentina and then back to the states . Well, unfortunately for operation paperclip there was no need to do that because the nazi scientists who came to america were given good old american visas and later became u. S. Citizens. Yes in the back. I have a both slightly nauseous and cant wait to get my hands on your book. I have actually living in nordhausen when it was bombed because of the v2 operation, and we left my my father was also one that worked for werner von braun, and after the war in 1950, my mother was also a cic agent before it became the cia. To identify nazis before as they were trying to leave the country, and but my question was, we left munich in 1950, and we my father, my actually my stepfather had gone back and forth to geneva because he was juan of the scientists that either americans or russians were vying for, and there are questions i have. We left germany in 195051. Didnt take either or the offers. He decided to go to damascus, syria, instead, with ten other german rocket scientists who world with von braun and i never understood. I was only ten years old at the time. I never first of all we left with nongerman passports, arabic passports. And everytime the conductors came for passports i had to look out the window. My mother said, dont talk. So, my question has always been, theres so much that i dont know because as a child, you just live with it. And the american ambassadors are actually helped us leave damascus. My father came to america with us. We came together when there was a coup in 1953 in syria, and he wound inworking for lockheed, the head of the missile test program in the santa cruz mountains. One of the other scientists, rudie, worked in sacramento, worked for aero jet for 40 years and was instrumental in developing the cycle its so fascinating. Maybe you can stay afterwards and speak with me. And did you have a question . Well, i want to know, how did the other german scientist, how many did so many of them who did leave why did they use arabic passports and why because they were nazis talk to me afterward, the middle eastern connection is interesting and paste not part of operation paperclip but we can chat after. Thank you very much. Yes . What happened in new york around genetically modified organisms, lyme disease, that whole thing. General lukes, who became very friendly with the chemists, was in charge of setting up farm island, and eric child, who worked under dr. Blome, was in charge of the weaponizing and for the reich, and child is connected with plumb island. He came to the United States, worked for the navy, worked for the department of al cull agriculture and theres a lot of suggestion that he also set up plum island and worked there but i could find no official documents that made that connection sound. But it certainly is reasonable speculation. Good question. During the 1960s, 66, 67. There were people in this country who were trying to confront the Justice Department to say, we had a lot of naz say war criminals here and why dont you find them and put them on trial or deport them to a jurisdiction where they should be put on trial and dealt with. And the Justice Department always said, we dont have any nazi war criminals in this country. And beside, you people who are asking the question are leftists communists, and were not boyfriend in what you have to say. But they did have an office in 1960 to address the issues of whether people were nazi war criminals. They just couldnt find any. Im wondering, did you come across any Research Like senate. Yes its a great point. A number of individuals in the state department the state department was an important part of operation paperclip on this end because the state department was the organization that had to give those visas, and there was a couple individuals, one in particular named samuel claus, who was outraged by the program but was very quickly accused of bag communist, and he was moved out of the state department. The reason why to answer the second part of your question. That is a great question. The first part is no, there was not even a sliver of accountability on the part of the scientist. They always denied they were part of it. Although he originally started with the military officers about what went on, very quickly it became what they did and not me. And i was always a position. And as far as remorse is concerned, there was only one not the position out of all of the sciences but i looked at, only one scientist showed any remarks. And that was doctor fischer. That is when we heard a gruesome bit of testimony by some survivors buried he turned to one of the Intelligence Officers who is really one of the heroes of the book and said just hanging out. But that was it. Verse, another notorious person from world war ii who was involved was [inaudible] and even now there are issues at stake about using the information in going through the experiments. Does your book touch on that at all . I did not come across any other information about him. He was in germany for a long time. He went to south america. But the question remains about the information being used, it was extremely important. I will tell you that there is a twopart u. S. Air force manual that is very difficult to get your hands on that actually uses data from the concentration camps. You see the credit in the footnotes go to the doctors that i showed you the photograph of it were hauled off to nurnberg. One was from the air force manual from his prison cell. With the responsibility of the not these coming to the americas, they made it happen, is there anything that you found about awareness approval or anything else . Truman approved the program. Im sorry if i left that out and here we are on president s day and and operation paperclip was a classified military program. But it had a benign public face. So the joint chiefs knew that if he started having upwards of 1600 german scientists running around and was going to catch on to the fact that the was going on in so they propagated this meant. I dont believe from my research that neither truman nor eisenhower really had access to actual dossier. They will would not as president had even asked. Certainly it would have been kept from them. So they approved the program as it was told to them, from my understanding. Way in the back . Had i not stumbled upon the blurb in the book passage, i never wouldve known about any of that. So my question to you is the broader context that we call the mainstream media. What has been your experience in trying to figure this out . The book was just published extinct ago and is doing remarkably well considering the story is seen on your soul. I give a lot of credit to my fellow readers, and i think that we are all uneducated bunch of people here in america for the most part. We really just want to read and find out about things. Its why i write books others namely a door and secret. But ultimately they have readers, which is really remarkable. Is there any significance to the name the operation was even . Thats a great question. We have the classified program, and we had the same thing going on in germany were these Intelligence Officers are interviewing the scientists and really trying to find out about them. And it needed to be kept secret. It being the dark hearted part of this and a system was devised whereby very discreetly ate eber clip would be placed upon the top of the file in a certain position to indicate that this is an important file that someone needs to look at. That someone being an individual who was up for the program. Maybe you senate and i missed it. But does this program have a particular purpose or is it part of selecting random german scientist and what were the major objectives and was there one person that put it together, you organized it . Well, do not seize almost won the war area there was a point when their weaponry was so much further along than ours was. Hiller and others call it wonder weapon. And there was this idea that we are really behind the curve here. So is the war was ending, thats why the rich can about which is what we have to grab this and i think that the most interesting conclusion ive come to was that the cold war really began in the last month of world war ii. Scientists are now at one manto creating genetically modified organisms and social media out of hundreds of people, fluoride is in our water that came from the knotty scientist. Did you find any of that in your research . Thats a fascinating question. So that not a Science Program was rolled up into another element of the department of defense. Which is the office of research and engineering. That became the Defense Advanced Research project which is the subject of my next book. A shameless plug. Yes you. [applause] see talked about the russian and was there a reason for this . Remapped they couldnt stand the german scientist. And thats a very interesting question. But they sent them back to germany and we had a program that was called operation dragon return. And we scooped up anyone who had been in the soviet union working on the Weapons Program and use them as intelligent asset area. Is it true that allen dulles was sort of the front man and he was setting up the cia . Good question. He was at camp king and he was the head heller soviet Intelligence Program on the soviet union Intelligence Program. He became a major player in all of this, sadly. And his story is interwoven into this, but he is at camp king with his team of officers and former intelligence agents and they were all run by the Army Intelligence and the cia took them over. So then the soviet spies who were talking to them and subjected to those enhanced interrogation programs were actually caught in it. One more . Yes, could you speculate to what impact this new information might have based on the inquiry is and im just wondering what you think has been a part of this . As i said earlier, i think that when people are interested, it just kind of creates a bigger web of information. So hopefully my reporting, because it is just the tip of the iceberg, one of the things i mentioned earlier today was how ambrose was he convicted not a war criminal, he came to the United States on the u. S. Department of energy contract. He came here three times in the 1960s. While i couldnt get any information about what he was doing and what his program was on. And by the way as i write in the book, neither could president ronald reagan. But i thought to myself, he came to the United States as a convicted not a war criminal and the freedom of information act tried to write out about his travels and how you came here in who he is being sponsored by. And that information was also classified areas its probably not lost or classified. I couldnt find it out, but i that am curious journalist and youre well. [applause] [applause] thank you all. If you have a book, please call us and we will get it signed. Single file line. You are watching booktv. Nonfiction authors and books every weekend cspan2. Next month with tv, peter singer talks about Internet Security and cyberwarfare. This is about one hour. [applause] thank you. I want to thank the panel for helping to host this. And also for organizing it in the very kind introduction. So i am old enough that i remember the very first time that i ever saw and used a computer. My dad took me to a ryan center in North Carolina at the age of seven years old area i learned how to program this amazing device to design a smiley face out of a series of letters. And then i printed out on one of those oldschool printers with perforated paper and it was my First Experience with computers are you so since then, this neutrality computers is almost impossible to fathom. For example, we live in a world where every year over 40 trillion individuals are sent, and the first webpage was made in 1991 area there is now more than 30 trillion individual webpages out there and moreover the internet is no longer about compiling and sharing information. It is also emerging to have an impact on the world beyond the online demand and for example cisco estimates that over the next five years there will be more than 40 billion internetenabled devices. Everything from refrigerators to cars to thermostats to a couple billion dollars for a thermostat business smart power grid all linking together and what that means is the domains ranged from communication to critical in the structure to conflict. 90 of u. S. Military operations that run over the internet. All of these domains are increasingly cyberdependent. We truly do live in a digital age area but with this relatively short history of computers and the network that barely into, i think that we have reached a turning point or leased a defining point, just as our dependence on this is going, this is as well. You can see this in a number of different ways. One would be the astounding numbers. For example every single second, nine new pieces of now where are discovered. Every second of the day. Let me repeat that, nine every second. 97 of fortune 500 companies noticed that they have been hacked and the other 3 have been as well but they just dont want to admit it to themselves. Over 100 different nations have created some kind of cybermilitary command, designed to fight and win wars in the United States and beyond. And these very first pew poll took a survey about what americans feared most. And it found that they feared cyberattacks more than Iranian Nuclear weapons and authoritarian russia or climate change. So it means that these fears have coalesced into a blooming industry and the private sector across the world and also on the government side. Whether youre talking about this at the National Level or the a level or the world level, and so for all the hope and promise of the digital age, we also have to admit that we are living in an era of cybersecurity is not secure. I talked about something that was a little bit counterintuitive that will help us possibly make that ring. As we introduce before, how do you write on a seemingly technical topic and make it access will understand. And particularly what kind of visuals when it comes to talking about the space of zeros and ones for Software Area what we have done is put together what we believe is a model collection and helps to make a point. My choice for the best and worst example of cyberwar are. So its going to play for you. I wont speak directly. This is for a couple of things. One is to officially drive him the story of cyberand purity that is out there read another is the fact that there have been studies that have found that people are 60 more likely to retain what youre saying in a speech if theyre looking at something at the same time and it doesnt have to link what the person is saying to its one of the weird ways that are human brain works and it connects out to a broader discussion in the book. And so we need to recognize the human side of this and everything that we bring to this. So hopefully the technology will work with us and all right. Here we go. So moving on, lets go back on all of this. Why a book about cybersecurity and why now . Well, its best encapsulated by two quotes. The first is from president obama. He declared that cybersecurity risk posed the most serious economic and National Security challenges of the 21st century. The second quote is from the former cia director who says what is something so important and so talked about less and less clarity and less apparent understanding. So that cross between something incredibly important but less understanding, again we can see it in all sorts of different ways trade and also some different field. For example 70 of business executives, not csos, but 70 of executives in general have made some kind of decision for their Company Despite the fact that Major BusinessProgram Teaches that as part of the normal responsibility. That same gap happens with what we teach our journalists and lawyers and diplomats and even folks in the military. The book is also filled woods range but kind of sad antidotes, particularly in senior leadership. The former secretary of Homeland Security is in charge of cybersecurity and she talked to us about hocybersecurity and so us about how she had used social media for over a decade. Not because she didnt think it was secured, but because she just didnt think it was useful. With a Supreme Court justice who talked about how they had an yetman gotten around to email. In the upcoming years it will decide cases that read from everything to Net Neutrality to the constitutionality of some of the nsa remedies. Things that havent yet gotten around. This problem is just not an american problem. We saw the same thing with meetings from officials from china, great britain, rants, the uae, the lead civilian official in the cybersecurity czar in ostrow that had never even heard of a critical technology. But if you have an in part of this, you had the gap among people with grave responsibility. And so the result is that cybersecurity is an issue that is as crucial as a personal level two areas that we care about from your bank account to your personal privacy to shaping the personal politics themselves. And in terms connecting us back to the personal level when you look at questions of privacy likely like we see in Edward Snowden and nsa affair. Its treated as a domain for what i call be a crowd. And so the problem and the challenge to the Technical Community understands the workings of the hardware and the software, but it doesnt deal well with the wetware. All the ways that ripples out beyond. So looks at this through a very specific one and it fails to appreciate certain things. So the dangers are diverse. Each of us in whatever role he played five, again, whether a professional role or business or organization or our role as the sensible and about political topics and how to protect ourselves and our families. We all make decisions, cybersecurity decisions that face the future and the online world and also the real world. And we often do so without the proper tools. It defines whats possible and even so what is proper or right and wrong. And so it often weaves together obscure and what happens with where we are right now in reality with where we are headed tonight and so we have some threats that are overblown and overreact to. And we have other real threats that are just been ignored. So i am someone who loves history. And it pains history. And it pains me, and this has been done from senators white house officials to generals to news columnists, saying things like cyberweapons are just like this and this is just like the cold war. This is a cybercold war. You see those terminologies all the time and if you know both your history, you quickly realize that the parallel is not the one that they think that they are making. If theres any parallel to this, if the early days when we didnt will understand ologies of it even more so the political dynamics. That period of history when we took the realworld version seriously. That is the better parallel to today. So what are some of them in a position to come out of this . Well, we too often lumped together unlike things simply because they involve zeros and ones. And the lead u. S. General who is in command of both the military cybercommand and wearing the hat as director of the nsa, which we would not see happen in other fields but somehow we think it is okay here. He testified to congress that everyday Americas Armed forces face millions of cyberattacks. But to get those numbers he was combining everything from unmotivated stands who never even tried to Enter Network or an attempt to carry out pranks or political protest and tends to carry out espionage and diplomatic espionage and National Security espionage. All together. But none of those millions of attacks in the wider body of politics saw this when they said it erred the socalled digital pearl harbor were cyber9 11. And they have not only been excused in major government speeches ive been reported over a half lean times. So essentially what happens when people are talking about cyberattacks as they are bundling together all of these various things simply because they involve the internet and its related technology. The parallel would be a lot like saying that a group of teenagers with firecrackers and political protesters in the street with a smoke bomb, terrorist with roadside bombs, james bond with his pistol and a russian cruise missile, these are all one in the name because they involve the technology and the chemistry of gunpowder. Well, of course not. We would never do that. But somehow it is acceptable in this state. We take the organization. I had a senior u. S. Military official argue with me that anonymous and al qaeda were the same thing. Now, wherever you stand on this, and i figured out that im probably more empathetic than pretty much anyone in the dc security establishment, wherever you stand on this, they differ from al qaeda and everything from their organization and their personnel in their profile other means in there and. Pretty much the only thing they share is dave have actors to begin with the same letter. If you put them together it is nonsensical whether you are trying to support them or come up with a strategy against them. The disconnect of policies and realities and technologies mean that we are not only thing growing tensions, its one of the things thats feeding into poisoning the u. S. And china relationship, but it also means that we are being taken advantage of at the individual level. By that email that you receive from your mom, saying that im stuck in iceland. Please send me your bank account information. And you say oh, goodness, i didnt know mom was there, but i better help her. And it takes even the most senior of people. A diplomat at the g20 conference, the most Important International conference of the year received what is known as a spear phishing email. An exciting offer that said you click this link you will be able to see new photos of the former french first lady. A great offer. Many click the link. Instead of getting the photos downloaded spyware from the Espionage Agency into their computers are in or being taken advantage of at the organizational level. The business level or the university level. Alternatively not doing enough to protect ourselves or hiring those who promise a hundred security through some kind of Silver Bullet solution. Well, we are being taken advantage of at the National Political level which is part of what played out with the revelations. Obama expressed his frustration that the complexity of the technology was overwhelming policymakers. Our inability to have a proper to russian about all this not only can create a distortion effect, but even more so in this application of resources. Possibly the best illustration of another number, 31,300. That is the number of academic Journal Articles that have focused on the phenomenon of cyberterrorism. And that is the number of people who have actually been hurt or killed by a real incident of cyberterrorism. A joke that cyberterrorism is a lot like the discovery channels shark week, were reassessed about the danger of sharks even though youre more likely to be hurt in other ways. But charles was fictional but people have actually been hurt by sharks are able to be 100 clear here. I am not saying that terrorists dont use the internet are there chapters me book about how to use the internet. Much of how we use the internet. Im also not saying that theres another possibility or likelihood of cyberterrorism in the future with realworld impact, as for example the first cyberweapon revealed or it was the same story shows how it is not the way it is too often depicted, whether it is a diehard scenario that would disintegrate into this and all the power in the u. S. Will go down, or the way of former u. S. Military officials to talk about a couple of teenagers sitting in their parents basement wearing flipflops and sipping red bull could carry out this style of an attack in know, there is danger here. But it also requires to carry out something about high operational level and a deep set of expertise. Not just one of the top cyberexpertise in the world, but also everything from an telogen vernalis and collection to visit ranges from engineering to nuclear physics. Its not something that a couple of teenagers sipping red bull dead. Red bull gives you wings, but not that. So my point here is to put it a different way. If you want to sum it up. Al qaeda would like to, but it can. China could, but it doesnt want to. And so what im trying to say is that in the larger level strategy, whether national or political strategy, Business Strategy for your individual strategy, its always about sources and priorities. So we need to weigh this what we talk about, what we focus on versus what is real and are there greater threats out there. So for example squirrels have taken out power grids were times and 0 tons that hackers out. It doesnt mean that its not what happened. What im talking about in terms of real term. The fictionalized scenario versus the real and largest threat in all of Human History is happening right now. The Massive Campaign of intellectual property theft that involves both an Economic Security impact than by one measure over a trillion dollars with the value lost to the National Security impact and maybe a decades worth of this lost on a potential battle. So this may not be as sexy as a cyber9 11 discourse. Even if your talking about how the military uses. So lets focus on the reality of Computer Network operations versus the hollywood scenario. But its also as we have learned from regular terrorism, its not merely about the direct impact of something but the Ripple Effect and even more so your own actions and response they can determine the true story of how it plays out. One that deeply worries me is how this critical value to the internet at 12, the trust is being damaged and hollowed out. Its been damaged by cybercrime that is out there. And also being damaged by other actions and responses to threats. For example a furor over traditional terrorism leads to a Metadata Collection Program that has been not only part of Americas National standing but also to the estimated over 180 billion of revenue will be lost because of a grid or the impact on the growing attempts by certain authoritarian government. Particularly russia and china, to push for a more statecontrolled internet governance model and what does this mean for the future. What im getting at is that there is a value of trust that has allowed the internet to be run successfully and to become, i would argue, the greatest force for social and economic change not just in our lifetime and maybe all of his area. Its being threatened and the internet that i grew to love, you may not be the one that my sons inherit. That scares me. These disconnects also means but sometimes we act on bad assumptions or dont make assumptions in ways that truly matter. So if you take the discourse over interNational Security circles versus cybersecurity circles and the notion has taken hold that cyberoffenses privileged against the defense in the u. S. Military report says that its not just that in damage and it will be so for the foreseeable future. As long as we can look out in the future, cyberoffense will dominate against the cyberdefense for those arguments. 2. 5 times as much to cyberoffense that is cyberdefense research and development. In the first problem is cyberoffense is not as easy as it is often depicted. We need more than that can of red bull. Juju elites do an Actual Campaign and not just one attack in the defense and term is not lying or helpless. Theres a series of what they can do and its not so simple as its often for trade and Bumper Sticker seductions. And secondly the military history, pretty much every time they would get a wakeup call. Roughly the hundred year anniversary, if you look back at the European Army in 1914, every single one of them thought because of the new technologies of the day the offense would dominate. And they urged their government if there was any point in crisis we have to be the first to go and we dont restart on the defense. And that was one of the forces that helped spark world war i and turned out to be wrong. The offense wasnt so dominant. The third issue as you can think out in terms of the metaphor is in terms of applying this binary political framework to turn the structure to a more complex cyberworld. If youre sending in a glass house and youre worried about more than 100 different everything from gangs of teenagers to military attacks and the like, the best way to secure yourself is not to say what i really need to buy is a stone sharpening kit and i will solve the album are you so what can we do . The last third of the book is part of the questions. Everything what we do from the global level to the National Level or business level down to what can we do at an individual level to secure ourselves and how to secure the internet. Im not going to try to rise 100 pages. What im trying to do is identify what i think are key themes that carry through all this. The first is that knowledge matters and its absolutely vital that we demystify this realm if we ever want to get anything done and be effective in securing this. We have to move past the situation that were in right now for the president of the United States received a briefing on cyberissues, and then asked for it this time in english. That same thing would happen at pretty much every Major Corporation in every university and in most households as well. We have to move past thinking that this is solely for the in crowd or another white house official said the domain for the nerd. No, it is for all of us. We are all the same. In the second is that people matter. Cybersecurity as part of a wicked problem area because of all the tradeoffs and complexities in this is in large part not because of the technical side but because of the outside. The people side makes it very useful for writers respected because he can tell false stories, everything from the role of one and the history of the internet in every security to the episode where pakistan kidnapped all the worlds cue cat videos for the day. A great story, but what it also means the that if youre trying to set up responses of the global level or a business level and etc. Come you have to recognize that the people behind the machine are inherently part of every threat and every response. And so if you want to understand why something is or isnt happening and cybersecurity, look to the motivation. Look to the relative costs. Look to the tensions that playing the issue. There is a reason why finance companies are doing better, not only with their own cybersecurity but was sharing information about it like power companies. There incentivized to understand this in a very different way. And this also points to the world of government can and should be talking about and in some situations there is a researcher or resource like we have done in a wide variety of market places in the house to help change some of the doctors out there. The fourth point is that history matters. Theres a history as to how we got here with the internet and understanding this, especially when you hear silly ideas that have been expressed serious places like this. Like that we need a new and more secure internet. If the idea of rebooting the internet is rebooting Beverly Hills 9021 oh. Its a bad idea and it never should have happened. And the point is not just that you need to know our internet history and how should the online world, but also we can learn from other histories beyond. So how do we deal with individual criminal groups and other groups in the domain of commerce and communication and conflict. We can actually look back for installation and how they dealt with a different kind of private situation back then. Thinking about what Government Action is needed, lets take a look at the instances of the most successful Government Agencies out there. We look at the center for disease control, which starts with members of it taking a 10dollar connection in donations and that agency goes on to do everything from eradicate malaria inside the United States at the global level, the smallpox campaign to a crucial back channel to the soviets during the cold war area this leads to the fifth and final. Ben franklin had the same that an ounce of prevention is worth a pound of cure. The cdc did studies that found that franklin had an idea, his idea actually does hold true when you test it out in public health. Its really the best place to put resources into it. And it goes a long way. And its the same thing and cybersecurity. Despite all of the intense too complex or via an turn the fear factor up and the spinal tap volume style to something where you would need a man to comment on horseback and save you, whether its a man on uniform or someone in a cybersecurity company. The reality is that very basic steps of cyberhygiene would go an incredibly long way. One study found that the simple measures of top 20 controls would stop up to 94 of all cyberattacks. People was onto that sometimes they say that im special. The first thing is that we cant all be in that top percentage. And toptier i. T. Department if they didnt have to spend so much time running down this stuff, they could focus on the high end stuff. And finally the reality is that many of these tough challenges still use very basic steps with cyberhygiene. The most important outside have penetrated the network and happen one a u. S. Soldier found a memory stick on the ground in a parking lot and thought it was a good idea to pick up the memory stick and take it inside to the base and plug it into his computer to do it was on it. That is not just cyberhygiene but basic hygiene. Of the 52nd rule. This idea of it is important not just because of the lessons on the idea and the prevention going a long way. But also the ethics we need to build a better collective responsibility. The global level down to the individual level. We teach our kids the basics of hygiene in things like covering your mouth when you and cost. But also to give our kids and ethics of they are responsible for protecting everyone that they come into contact with during the day. That is the name kind of ethic that we need to be building in cyberspace and the only way that we will get to a greater sense of actual cybersecurity. So at the beginning of this talk i explained how is introduced to computers as a young kid when they will allow bad guys and how will allow them to steal identity, be a weapon of mass disruption. I would have begged and pleaded with my dad not to turn on that big power button and thats what we would have thought of as superpowers. The idea that you could have run down this answer to any question in a path. You could communicate, that you could talk and you can see that you are friends with someone that you never met with water. Today we take them for granted. The same as it was back then is the way it is now where i think it should be in the future. And we have to accept and manage the risks of the online world and the real world because of all that can be achieved that. To steal a line from the title of the book but that is really what Everyone Needs to know. Thank you. And i think that we have some time for questions and comments. Go ahead and just stand up and raise your hand. Any questions or comments at all . Hello. What about not you have to watch out for someone hijacking my refrigerator or Something Like that. [laughter] so how does that play into your ideas . Well, its one of the two trends changing in nationality and reshaping the internet. And the thing is a classic example of how it is right now. And we have to make that appointment for you. The next stage of this is a lot like the internet itself. And so your car communicates your thermostat because it connected to the smart power grid and shifts to where you like it. But the problem is that we are already