Higher u. S. Education standards. Public support for common core standards is dropping. Live coverage begins at 10 30 eastern here on cspan. The American Bar Association continues its Homeland Security conference with a focus on Cyber Security. The government challenge and the dressing security breaches, this afternoon at 3 10 eastern. Weh friday night this month, travel to Historic Places and we hear from authors that shaped the nation. Tonight we focus on the Civil Rights Movement and focus on the 1917 race, riot, and here at the civil right movements. He witnessed a lynching when he was only 12. His father said that is what they do. So he said, i am sure he was a little bit angry and hurt. Getting away from it, getting away from mississippi, he enlisted into the army when he was only 16. He said defending america doesnt matter about the color of your skin, until he came home to mississippi. He tried to register to vote. He and his brother charles. He said a group of white men turned
Have the domestic authority, do we have the International Authority on all actions . As we do on everything we do. I refer you back to the president s comments on mission creep. This is not about mission creep. Public bethe american steeled for another long, hard slog against isis . In july, you painted them as an imminent read. Not even george bush when he was hyping the war in iraq all the Saddam Hussein and imminent threat. He called him grave and gathering. You talk about defeating isil over time. Should the public the prepared for another long, hard slog fighting al qaeda in the fight. O eliminate isil as far as the imminent threat, i think the evidence is pretty clear. When we look at what they did to mr. Foley, what they have threatened to do to all whatcans and europeans, they are doing now, i dont know any other way to describe it other than barbaric. They have no standard of decency, of responsible Human Behavior stop i think the record is clear on that. Imminent readat to ev
It comes to Government Agencies . So, there are a couple of different aspects to your question. Certainly, from our perspective, weve gotten a lot of feedback of sources, bunch including the sector coordinating councils, our different agencies that have connections with different industries, treasury with the Financial Services industry, the Energy Department with the energy providers. And our own connections with the tech sector. In general, the feedback has been very positive for the framework. Sven companies that oftentime they will tell us, we are not going to completely come out publicly and embrace the framework, but we are using it internally. Were using it even if we are not officially using it, we ar to measure ourselves against. In general, we are seeing more and more different uses for the framework. You are seeing different sectors come up with their own overlays for the framework. View success is one measure would be that when people start using it for things we never anti
This armament, but ferg season it seems very much over the top and they seem like they are not at all trained to use it. Tazer. A tazer would have been much more effective in dealing with Michael Brown but they say tazers arent 100 effective. Maybe they ought to make them more effective plus the fact there was a Second Police officer in the car with them, with wilson, i believe. Could be the baku with the gun. I think there is going to be some definitely review of the procedures they used in ferguson and whether those are the ones they were trained. Also, a story came out that t theple was with another Police Department which was so ineffective and so apparently arrive with racism that they fired everybody in the department and hired a new. Some of the people, you could apply for the job, but this particular officer instead got a job in ferguson. You know, that doesnt necessarily say that he was part of the problem there. But we are beginning to learn a little bit more about him and, t
Really to two root problems. The first is that the Cyber Systems that we rely on are inherently vulnerable. So the commercial operating systems, the commercial software packages, the commercial hardware platforms, these are all designed rimarily to address profit motives. They are easily obtained by the attacker. They can exploit and find the vulnerabilities in those systems and that is largely what they take advantage of. Thats probably not going to change any time soon. And then the second problem is that you have machines against people in a high speed battle. And now what do i mean by that . Well, you have hundreds of thousands of malware samples being generated every month. Thats not people writing that malware. Those are machines. Those are machines automatically circumventing all of our defense systems. That malware typically operates inside of an infrastructure that is also automatically controlled by machines. So the command and control notes, the hot points, the channels that