He is not embarrassed about it and angry about the label thats associated with it and he said, these were federal tax dollars that came from my constituency and we decided to get how to spend them. Now, in my district, thats close to 400 and we have to sort that out. I will end with this, mr. Chairman, i dont like the translation, those folks ought to be in jail, if they are doing something they are proud, they ought to be on tv. We talk about spending as itas exploded inhe modern age. What has exploded is the ability to help hold members of congress and administrations accountable. Theres not a member in the room who has seen pork barrel because it didnt originate in 1990s or 1970s or 1950s. We have had the challenge since 19th century and the earliest days of the institution. I would like to believe that with your leadership where we have been challenged but i but to mr. Sullivans point of low e Approval Ratings, i dont want the suggestion to be made that folks, that anyone wants to
Where would fall in the range of these things like narcotics, like human trafficking, like maritime piracy, and where would it come out . The cycle report took the lessons from the first one which involve lots of interviews with intellectual property lawyers and Law Enforcement officials. And it had to come up with a global estimate we collected data on a number of individual countries. In some cases we used interviews with Law Enforcement officials or intelligence officials that knew about csis. That when came up with a global estimate using the model we created the first report of about 450 billion, the global cost of cybercrime. Im going to give you a single number but, of course, you know we used a range, the low was about 390, and the high was about, the midpoint was 450. It seemed like a safe bet compared to other crimes we looked at. This is at the report and so at mcafee would look at whats changed, right . Theres been a steady increase. A fact the time we did the numbers we th
This panel will look to what we can and are doing at home and internationally to counter those threats. Specifically, the panel will explore questions the rise of these threats and the parallel rise of the new world of ubiquitous connectedness and the internet of everything raise for policymakers. How do we protect connected societies . Whos responsible for what . What are the rules of the road . What are the ways where we think it a place where normative behavior is agreed upon internationally . Moderating the session we have john, probably the longest and oldest reporter covering this, going back to the 1970s. Writing the same stories until most recently. A reporter in the science section of the new york times. Part of a group of reporters who won the Pulitzer Prize for explanatory reporting in 2013. He has a book coming. Request for Common Ground between humans and machines. [applause] thank you, everyone. My panelists to my left, the director of the National Security agency. Suzann
Down and say, can we do both . What about our allies and other countries . That is the debate. It is not an easy answer. You can see both sides of the issue. Aside. E to set that one we have to solve that problem. Without it, we are going to have something bad happened. Security, that is a different issue. How networks are secure. We should talk about that. It is not the same as communications. If i look at that particular use case. What it tells me, Security Issues are only going to become more and more personalized in our society. The situation where you have terrorist organizations recruiting people on twitter. Ofis a pointer to me technology becoming a more personalized aspect of our lives. In particular, the upcoming generations. I think is going to be important for us, not just a focus on what is happening Technology Becomes more personalized and a part of what we are doing, we have to think around what are the indications of that from a policy perspective. A security perspective
The watson come here quick moment of the internet happened on october 29th, 1969 at 10 00 p. M. At night. It was a message sent between node one and node zero, in los angeles at ucla. It involved it was actually the cloud, it was not electronic mail message it was remote login to a machine. A young hacker by the name of bill due val typed l and o and g. On g the system crashed and it crashed because of a buffer overflow problem. A very straightforward programming error, design error and i checked today. And here we are 45 years later and there were announcements both by the chrome team at google and firefox team that they patched buffer overflow errors. Its quite remarkable that the system that we built is still that kind of fragile system. And this final note before we start on metaphors, were charged with the notion of discussing the rules of the road. This notion of a data highway is perhaps one of the worst metaphors we could possibly pick for the world were living in. Maybe if thi