tv Washington Journal CSPAN April 29, 2016 11:01pm-12:10am EDT
11:02 pm
in the student videos. >> it is a remarkable video showing tremendous insightht of what happens with mental illness in america with lack of access to care and the cost and the costa perpetuity and whether it was elected officials it is america is greatest health care embarrassment teeseven what is the federal government's role right now? >> under the affordable care act and medicaid medicare it is pretty sizable but it also creates the barriers that prevents people from getting the care. we passed a few years citgo sova prior insurance the provides end of an in those
11:03 pm
11:04 pm
11:05 pm
11:06 pm
11:07 pm
11:08 pm
11:09 pm
11:11 pm
11:12 pm
way to press his to check wounds and to but oftentimes is in the criminal-justice system because after all the judge knows when they have committed a crime they yes to provide. the judge then says that isn't a crime to be crazy. weis isn't a crime to have pay but in that dehumanizing environment and relegated them to the backroom and alleys of mental health
11:13 pm
11:14 pm
you're on with senator murphy. >> caller: thank-you. my question is that i have seen in there was no qualms but a charge about what to do with them but did not want to get sued. then the tragedy happened instead of dealing with his mental issue it was put on the guns. the guns are the issue.they d they know what to do with mental health but so they do
11:15 pm
get a hold of the guns legally. nothing was said about that or the responsibility for a fairer and though the knicks >> you are a great point that when these tragediess occur every year by roofers who was mentally ill. >> but it is six or 10 times more likely to be victims of crime and crime and fraud
11:16 pm
and abuse and rape and homicide. sole also she likes to do something that when you mention it out we used to put people in asylums but we have to get rid of those days because they are warehouses of a cruelty but the leading person to get it moving the goal was get these bin to the petered and with those abuses to protect someone's rights. >> we have not changed much but what is in their mind?
11:17 pm
teeseven poughkeepsie a new york. >> caller. >> good morning. congressman i'm sorry not senator. >> don't promote me. [laughter] >> i am used to seeing the mental health area said closedown to preferred year's asian. those two so we both know that they are mutually exclusive. so i am wondering if we go back to that direction? i wouldn't categorize this institution that we have here but they were given in good care and i work in a
11:18 pm
nursing, but probably better than 80% have some sort of a psychiatric problem. and the but some people but they could save money because of a significant part of theca state's budget but then patients because many were assigned to those places but what happened after treatment 88 community-basedse care and that is where people were arrested in going to jail because we focused and for them to die
11:19 pm
with their rights on an york changed some of this that they a system without patient treatment because a person has a history of violence and incarcerationotectd when not in treatment so does a judge me of resuatient care. but what they have found ae the results are staggeringly positive natalie do they say my case worker was doing well but near 80 percent for rest and incarceration and homelessness reduction and health care cost and the costs went down by half. i think it is more to maine
11:20 pm
to do that. but the work also spent money on outpatient care teeseven sebastian florida democratic klein. >> caller: good morning. they insert taking my call. comi as a psychologist at was watching your program this morning talking about immigration. when the congressman get up there for two years than why don't you know, ?senate o no matter what party we
11:21 pm
cannot leave this for our children grandchildren. >> key is a little off topiccons you are now in your seventh term with a short take? >> its mental health. but i am chairman of the oversight investigation subcommittee in we have had witnesses come forward to deal with this issue in the cost of health care sometimes they have not done their work we're giving it a region that is misleading. so we are hearing for example, why are you spending betty on $5,000 on the painty sitting on a rock?
11:22 pm
like you have sing-along songs a website for the people please it has nothing to do with serious mental illness they don't even the gin the words bipolar or schizophrenic in their document. where's the money going? now with regard to the overall issue don't die in house on a colleague's but tension is part of politics even before we started to disagree but add millions to us like a struggle with mental illness they go this firsthand those to come to
11:23 pm
them to say how do we get a list?ve they feel that saved misery and say wills' of stigma and investment we say it is okay had in america when we make is so difficult and those that are standing for courage a courageous million. s but he is getting better. god bless him i want to seeat more to do that.
11:24 pm
but that doesn't make good copy for the do. >>. >> a very sympathetic person to work of the wording of some of the divides it will take them how many billions of dollars to deal with that but then to go with that but the do when intense study how was out working. that is the biggest hurdle with the cost. we're also looking at
11:25 pm
11:26 pm
>> caller: i have vague comment. mr. murphy, want to congratulate you because you made the comments and the hospitals how they transferred to one or the other and how the prices go up. i have been given the in and out of the hospital to tell me what my do we hear again? we don't have enough to read mitt you. so something has to be done. for the people in our area.
11:27 pm
but we cannot afford it stick it is important. i want to show you. with the poll of people who support the legislation. the numbers are staggering also are they more or less likely. >> to they have their own alternative? >> but the democrats have been alternative the day and are well attended the rumor
11:28 pm
11:29 pm
11:30 pm
11:31 pm
i don't know part of it is a lack of money, i think part part of it is for treatment programs and medication, it was very frustrating when a psychiatrist. >> host: joanna, what was it like to deal with the federal government? [laughter] >> caller: it was very frustrating. it would repeal their decisions and it would take nowhere. it would take forever and meanwhile someone is suffering. their behavior is out of control or they are on the street. the bureaucracy and red tape that you had to go through would take forever.'s >> host: thank you. let's hear hear from the congressman. >> guest: thank you for your service. she is aptly right news aspectsi obviously we want to have theple support of employment. employees are afraid of hiring h and they said how does he get
11:32 pm
his son a job. he knows with support he can define. there's people in the workplace who in treatment do great. but they need someone to checks in on them on a regular basis. are you handling your stress atu work? it's better to do that then have a person who is not doing their own job or gets fired or takess up the stress at home. she brings another point about medication. cms has worked with this that will limit the types of medicine they haven't go for the cheap one. here's the thing. when when you have eight or nine antidepressant drugs on the market they'll treat depression, but the side effects can be very different. a patient who may take drug a may do well, on drug see the side effects are not good so they don't want to take it anymore. but if drug c is cheaper and they say that's when you're
11:33 pm
going to get, that% manned ups and i'm not going to take that anymore. i don't like the side effects. so what we want to say is have a protective class of drugs that for psychotropic medications i do not want any federal bureaucracy interfering with the doctor's ability to prescribe what is best for that patient. to me that's malpractice. if you don't have a license to practice, stay out, stay out of it. because of that important issue of the side effects and most effectiveness of drug. now the department it of defense will try to resolve some of it but i will see patients at walter reed hospital get discharge of certain medication would be a say that's not enough, that were going to try something else.e, if it so we have said wait a minute, if it works leave them alone. let them let them continue tom take that medication that helps them. why trim them into a guinea pigs and experiment. these are human beings. and the cost of when that person stops taking medication and the other a fax effects. far
11:34 pm
outweigh the cost of those drugs. let's focus on doing what's right. >> host: jeff, you we we have about one minute left. >> verse well i want to thank c-span very much for the service they provide and my question is a little off-topic but it seems like there is a clinical that iy affecting the congressman about not being willing to accept what most people consider science when it comes to climate change. i would would be interested in hearing the congressman's reaction's. >> host: anything you want to address their. >> guest: instead of looking to what divides us and building on the prejudice against the parties i'm reaching across the out constantly send this is an area where members of our
11:35 pm
country are suffering. let's not work at other ways to pick a fight, let's look at ways to pick a solution. >> host: din speaker ryan speak favorably about your legislation recently. >> guest: he is very supportive of this and he will support a vote. leader said, i hope during may which is mental health month in america that we can do something, you're wearing a green green time i'm wearing a green time, that's the color spring, rebirth, mental health support. >> host: it's an election year will it pass this year? >> guest: i believe it will. the senate has a version that they're working on, that doesn't go as far as ours in some areas but senators want to have something in there. even if you don't understand issue what i'm showed you before in terms of that graph of support, americans want to see that. and just the politics alone outside of polict
11:36 pm
people should be passing this and going to the constituents.ir >> please come back and talk to us on a late longer segment. >> host: now joining us is a ted lou, democrat from california was recently featured on 60 minutes. congressman, why were you on 60 minutes? spee2 60 minutes gave me an apple iphone that they bought from a store and said keep it for one week. we're week. we're going to try to hack it. one week later they play back the conversations i had with my chief of staff and others. it was quite disturbing and really creepy. they basically had hackers in germany hack into this phone knowing just the phone numbers. >> host: what was their goal? was this after san bernadino? >> guest: it was, but their goal was to reveal a flaw, it's a technical technical term but what it means is the cell phone networks have this design flaw where foreign governments and
11:37 pm
hackers just by knowing your phone number can listen in on your conversation, get your text messages and also track your location. they knew where i was washington d.c. in california, they could get my text messages and here in real-time the conversations i was happening. this this could happen to anyone cell phone. >> host: so what's the solution. >> guest: have called for congressional investigations, very pleased their different committees now looking at investigating and i'm very pleased that the fcc has now started an investigation. keep in mind, again, again they just need yourself phone number.o yop it is not related to your phone, it's related to the network you happen to be on. so this affects hundreds of millions of phones. >> host: what is ss seven? were talking about cell phone privacy, were talking about other communication privacies as well besides this ss seven
11:38 pm
technical issue that the congressman is bringing to our attention. >> guest: it's sounds for system number seven. it's how networks communicate with each other. then there then there is a flaw and how they designed it. it was first revealed in 2014 at a hackers conference. now they figured out how to use it. any foreign government has access to it. including the foreign governments of iran, china, russia, be quite surprised ifs conversation of elected officials, both in congress as well as appointed officials were not being monitored by foreign governments as we speak right now. >> host: does it have to do with what's in the cell phone with wi-fi tower? spee2 it has nothing to do with what's on the cell phone. it has to do with what your network is. if is. , so if you are in 3g, the flaws in their part if you own a 4g network it is possible the
11:39 pm
possible the flaws in there. as as we moved to a new 5g system in about ten - 15 years the flaw will go away but the problem gets worse because that systemm is now open because it's based on the entire internet and anyone can try to access it. >> host: are there patches available.ai >> guest: in the meantime there is something that you can do in the public can do and that is go to encryption. after i watch the 60 minute episode because they don't show you the episode before they do it, i went i went ahead and started encrypting my text messages. there are different apps you can download on your phone one is called cigna no. there's other applications. want to once you get that your text messages are encrypted. as long as the other person is using the same application. >> so no longer do you use your provider's text message system
11:40 pm
is that correct. u >> guest: i try to shift my staff to this other app and asat's what i'll be using asas well sing crip to my voice communications. which means now for foreign government or hacker is now intercepting these text messages they cannot do very i much with it because it's all encrypted. >> host: how does one encrypt a voice message?at >> guest: we have applications that do this. i have actually no idea, even though i am a recovering computer science major to rated program to encrypt. you have applications that do it for you. you download an application, yol install it on your phone and then use it. it's encrypted. >> host: if you want to talk about electronic privacy please call in, go ahead and dial in
11:41 pm
electronic communications privacy act it passed 419-zero. what was the bill my did you support it. >> guest: i'm a big believer in privacy. you had mentioned in addition about wi-fi. one of the areas you can get is if you go to a coffee store or hotel, anyplace with a wi-fi network and you think you are using the coffee stir but it's a hackers sitting 5 feet away from you and you sign onto his network that looks just like the starbucks network you thought your on and then all your phone data gets to that hacker. in terms of privacy i think it is going to be one of the cecil key civil rights issues of the 21st century. that's why why it last year we worked hard to rain back what some of our intelligence agencies were doinr
11:42 pm
in terms of seizing phone records and to me that violates the fourth amendment. the fourth amendment amendment is prettys clear says government shall not engage in unreasonable searches and seizures unless they have a warrant on you.. i can guarantee you they did not have 300 some million warrants on people. so we wring that back in any bill that helps protect privacy i'm going to support, right now there is a dispute between the fbi and smart phone manufactured like iphone in terms of whether they can violate your privacy and get the company to unlock. these phones by writing new software. i oppose that as well, i'm very pleased the fbi withdrew their w lawsuit against apple. >> the provider support which you guys did yesterday correct. >> what i was talking about with apple and hadn't more to do with the actual product. >> what you did yesterday the providers is supported. what's
11:43 pm
been the reaction of the nsa, or the government agencies. >> guest: we typically don't comment.. i've learned they usually don't say anything at all. we'll see what happens when they sign or veto expects they don't. comment or what congress does is just react to it and try to deal with it. >> host: were talking about security and privacy in priva electronic communications. lou, you are the first call go,. ahead. >> caller: thank you so much. i'm a retired political science teacher and i love love your show and all the wonderful things you do. for your guess, did have a quick question that i would be interested. he seems seems like a very intelligent person. i would like to know, what has he run into any discussionshe we about the connections of the whole issue of national security
11:44 pm
i've often been concerned about the readings i've done about the possibilities of foreign governments hacking into the pentagon and missile computers. is there any connection here with that they can do all the things in the -- world.st >> guest: that's a great question. let me tell tell you two issues related to this. with the fbi versus apple case, you saw a split within our own government with the national security establishment including carter came up very strongly saying we want strong encryption , we do not want backdoors into that encryption. we do not want vulnerabilities introduce and we do not want to do things during times of anger and grief. so national security establishment is very strong inv terms of pushing back it againso two weekend subscription.
11:45 pm
law-enforcement has a different view. they want to look at every iphone and get the data. i understand that urgent impulse but that does affect u.s. national security because what happens is if you do not have strong encryption then we get massive cyber attacks, both in the federal government as well as the public sector. last year the office of personal management had a cyber attack over 20,000,000 security records released including my own. i. i notice because a few months ago i got a letter saying your sensitive information was stolen and here's three years every credit monitoring. if you don't have strong encryption you don't have any backdoor. >> host: back to this, maybe i'm getting a little paranoid. i use
11:46 pm
use my providers text message service, wire the providers providing encryption.e why do we have to go down load and app, they could, i do not know the answer to that, but i will actually asked that question because it's a good issue you just raised.ca >> caller: good morning. i have a question, i've seen on television shows that the goodod wives it because i do not watch all the and cis's. a room full of government employees sitting him monitoring telephone calls. politicians, whoever, and they also one time turn the iphone into a hot mic and they could record any conversation they had, is is that true?ha does that really happen?
11:47 pm
>> guest: to answer your question, yes it is. if you look at articles in the media they do re- port some documents that were released and they showed that our own intelligence words using this flaw to exploit it which means they would've been listening to people's phone conversations. what they're supposed to do is listen in on foreign nationals, foreign agents and so on.ei i had no problem with doing that, but it's doing it on american citizens without arnmet warrant. with any government to listen in without just knowing the cell phone number is huge problems affecting people's conversations conversations with loved ones to banking transactions to stop trade, to blackmail.
11:48 pm
the amount of information the foreign governments can get, whether it's a ceo of a company or elected official, we need to fix this flaw. just because our intelligence agency might have some benefit from using thised a fall, that is outweighed by hackers and foreign governments to also use it. >> host: if it was so easy to get into your phone, why did the fbi spent 1,000,000, or, or whatever to break into the san bernadino? >> guest: these are differents a flaws, the ss seven flaw is a network flaw. it's really what network you're using. what the fbi had problems with the apple iphone was because it was encrypted and had a passcode and if you try to change or put the wrong passcode
11:49 pm
too many times it would wipe the phone clean. the fbi wanted to find a way way to get around it. they did not know how to do it but eventually they asked hackers who did it for them. >> host: to you, as a congressman congressman feel they should have done that? enf >> guest: i don't have a problem with law-enforcement trying to use whatever legal means they have to get evidence. d my problem with the fbi and the appliqués is that the fbi was asking the company apple to do something extraordinary. which is to create something they did not have, new piece of software. design it, write it, test it, to weaken their own product. that's an extraordinary overreach. imagine what the federal government to make five it citizens or private companies to, what else can they make people create or do just for law-enforcement? to me that was making apple, i think that was the wrong precedents.
11:50 pm
i'm pleased that they did not go that way. >> host: go ahead caller. >> caller: good morning, i have a question for mr. lou. i was wondering how you feel about the fbi ruling the supreme court ruling that they can hack into any computer without a, warrant's, i was wondering if you could go into more explanation about that? >> guest: sure. that's a great question. that just happened recently. one that allows the fbi and the court to be is that you can have a judge in southern california authorized a search in new york of a computer. that seems problematic to me, i'm gonna study this decision some more, if congress doesn'tns do anything this becomes effective in a few months.ths. if congress asked to stop it it
11:51 pm
won't happen because it just recently occurred i'm going to take some time to study it comes in general what it would allow to do is to get a judge in any state to issue a ruling so thousands a mile away. >> host: maverick wants to know what model or version was hacked, not all are createdknow equal. >> guest: i don't know the answer to that question. i know the version the fbi got hackers to hack in the san bernadino case was an older version. so it does not work on the newer version iphone. >> host: who creates these encrypted apps? she goes on or he goes on to answer, the government creates these encrypted at. >> guest: government can createn
11:52 pm
encrypted applications as well as the private sector. i happen to use what's app forrn my text, facebook actually owns host. >> host: we read about the bombers in france and belgium were using and that this is creating a very strong terrorist network. >> guest: my reading is that they use a temporary cell phone. so in that case they would not have mattered if law-enforcement had a backdoor and it is absolutely correct that if you have encryption sometimes bad people can use the same tools. but keep in mind all the benefits of encryption. it. it is what allowed banking to happen. it is commerce to happen, it
11:53 pm
allows our entire classified system to function. there is huge benefits to encryption that to me far outweigh the small possibility that some bad people may be using it, even as we sit here today and congress has askedquen this question the fbi has not been able to come up with a single case where a backdoor into an encryption would have prevented any terrorist attack anywhere. >> host: pj, in montana. >> caller: hi peter. it's a great show. i like to comment on a slightly different aspect of this computer security. i hear people, the increase of people complaining about about their identity being stolen. seems to me to be common sense that if you do not want your
11:54 pm
identity stolen, yet you do not put it in your computer, your regular prevention, your medical information and things of that nature. that were the case, i would imagine there would be less identity theft of personal information. do you agree with that? >> guest: that's a good point you raise. i think in terms of how daily society function, it's it's very hard to implement. every time you swipe your credit card, that can be stored somewhere, that information. people have had their credit cards stolen because they use it for example at home depot or target. a lot of times it is you using products and whether or not you are conscious of it, information information is being released from me to a third party.
11:55 pm
in terms of cell phone, people need to understand it is like carrying a supercomputer in your pockets. the technology there, according to something i read ie the equivalent to the technology that would launch the person to a moon. we have all this technology in people have vast amounts of information that they carry around with them. that is why i'm a big believer in strong encryption. that's what keeps hackers, hackers, criminals from getting your identity off of yourself on.01 in 2013, over 3 million cell phones were lost or stolen in america. if you do not have strong encryption, that is going to be a lot of identity theft, lot of crimes being committed to getting data off that phone. that's why believe the fbibi should also release how they
11:56 pm
hacked the iphone to apple because what they're basically saying this, we don't care about the millions of people that may lose iphones and get the data stolen, because we want to keep the secret to our self. i don't think that is a good cost, benefit approach. >> host: larry in indiana. >> caller: i have a comment for a representative. i may be a little cynical, worked 26 years with the federal law enforcement. this seems like a collusion between cbs, representative ble into the democratic party and we are on the dawn of the fbi getting ready about whether to indict or not indict hillary clinton. this could be right wing conspiracy from her. >> host: okay, tie this in tof t the server and whether foreign
11:57 pm
governments could have access that? >> guest: i do not all know the answer to that, i know there is zero evidence that the former secretary of state clinton broke any laws. keep in mind, the foreign governments can attack any service weather is public or private. just look at the massive fiber reach breaches last year. the federal government offers a personal management there databases repeatedly hacked. as a database database the federal government controlled over 20 million security records are gone. also millions of federal employees had social security numbers release. that's why this issue of encryption is bipartisan, i introduced a bill called encrypted act, along withmight h republicans and another democraf
11:58 pm
what this does is states cannot put him back doors to encryption. you cannot really have apple make an iphone just for nevada. and you have states to put in different backdoor standards, this afternoon preempt all that and say this is what the federal government has to decide. >> the next call is on marilyn, bill, please go ahead you are on with ted to. >> caller: you had mentioned the representatives in congress are probably getting phone hacks just like you horse. i'm also trying to find out it's not only their text messages but also the access they have to their e-mail. i see a lot of pictures and for
11:59 pm
instance hillary clinton where she is looking at a blackberry or cell phone and i'm assuming she's accessing her e-mail that way remotely. behind that, also the other phone which is the same type of practice, behind that to you make recommendation and policy changes in the federal government in general and their use of their cell phone and other noble devices?that q >> people who have access to that are doing it on secure networks. so those would not be subject to this ss seven flaw, that applies to on classified networks such as the cell phone that i and other people in america use
12:00 am
every day. the problem with this flaw is that it affects hundreds of millions of americans and foreign governments can listen in on people cell phones just knowing their phone number. i cannot tell you for a fact that they are doing it on any member of congress, just be surprised if they were not doino it. they certainly could. certainly could. in terms of changes, i'm going to meeting with the house cio they do a great job protecting the house of representatives in terms of cyber security. of mobile, cell phones, laptops, tablets, that to me ist a huge gap because the issue you really raise, if i take my cell phone and i go to the local coffee shop and i sign into what i think is coffee shops wi-fi
12:01 am
network and it looks just like a starbucks network but it turns out to be a harker simulating that what my network, sitting a few feet away from me. i would not know that. once i entered that everything on my phone that is gone. everything that we have on ours system is gone if we sign onto a spoof network. i'm trying to get more people aware, not just in congress how easy it is to get identity stolen and to protect yourself, larry, on twitter what sap can you trust facebook? i trust what sap based on what i know. but there's other applicationsy so you can pick whatever you want to pick. >> host: that what's at, theebook still has access at
12:02 am
some point to all of your text messages, correct? so if the federal government wanted to see your text messages for any reason, could they access even though you are encrypting them?s >> guest: that's a great question, that's one of those in the fbi versus apple case.crypt in the said we want you to put it back and just give us the information. the federal government tried to give private sector companies to institute vulnerability and get information from law-enforcement i would generally oppose that. >> host: should that test message you send have the same standards if legal protection if you sent a letter, in your view. >> guest: , i would think i would think it should.
12:03 am
keep in mind it's an issue raised that law-enforcement does have a legitimate point. with technology we are creatinge tat they call dark spaces. places where they cannot access information. keep in mind we have had these dark spaces for a very long time. such as your bedroom, the beach, there is a lot of places where would we say we are not going t- have law-enforcement monitoring conversation. we also also have the products like paper shredders. i'm certain paper shredders have destroyed a lot of evidence that law-enforcement would've loved to get their hands on. but we allow paper shredders, we encourage them because they have these massive benefits of protecting privacy, your information, your identity, and just something to think about. just just because something may se law-enforcement does it read when you apply across america that that it is a good idea. >> caller: hello. how are you doing?
12:04 am
so a few comments here. not actually sure when people started encryption, encryption is actually saving information and people's information doesn't get into the public domain. 2i don't believe the fbi paid anyone to open any phones because trust me people can get into an iphone. three, law-enforcement needs to be up-to-date with what needs to be going on in the encryption space and spend more money on those kind of programs and some of the human intelligence that yields zero for the period so there's tried to stop at people from using good products they should be ahead of the curve when not behind trying to get people to break into word to break the law so to speak,
12:05 am
because they do have to get a yo warrant, so i just thought i'de comment on those things. >> those are great points you made it is a phenomenally good thing. without encryption, you could not do, ebay would not exist. but you could not do regularth banking, their silly things that rely on encryption. in addition you you have folks who rely on encryption to protect themselves from bad foreign government.tedl that's why human rights came out and supported apple because you have people fighting where theys need to have secure communication so that they themselves are protected. if you
12:06 am
look at what happened in panama papers expose by a journalist, the only way that happened was that you had journalist use encryption because that unit one other people to know what happened. and the people that leaked this information required and demanded encrypted files. encryption has a host a good benefits. >> host: a democrat from california, think every time's morning. >> thank you peter. >> c-span's "washington journal" is live every day. coming up saturday morning, heritage foundation south asia lisa will join us to discuss the administration strategy for isis and the role of allies in the region. then the founder and ceo will want to talk about his support of the bernie sanders campaign. after losing 54 out of five states this week. pwg media greet patrick gavin
12:07 am
joins us to preview the white house correspondents dinner and have a dinner from out one night he also directed and produced nerd bomb inside washingtons while this week. watch us beginning my saturday morning. join the discussion. >> independent media is the oxygen of a democracy. the central, holding those in power accountable. we are not there to serve some kind of corporate agenda. when we cover worn mps were not brought to you by the weapons factory.
12:08 am
host of the executive producer democracy now talks about the book she is co-authored, democracy now, 20 years covering the movements, change in america which looks back at some of the stories of people who show covered. >> the idea of democracy now starting 20 years ago really has not changed. ringing out the voices of people at the grassroots in the united states and around the world and they very much represented the majority of the people. think people were concerned deeply about war and peace, about the growing inequality in this country, about climate change, saving the planet, are not a fringe minority. not even a silent majority. but the silenced majority silenced by the corporate media which is why we have to take it back. sunday night on eight eastern. on q&a. >> madam secretary, we probably give 72 of of our delegate votes to the next president of the united states [applause].
12:09 am
>> fridays white house press briefing began with a surprise appearance who played the white house press secretary, west wing. after her parents, press secretary josh earnest takes questions about the u.s. military's airstrike against military's airstrike against the civilian hospital in afghanistan, funding for the spread of the zika virus and this weekend's correspondence dinner. this is an hour and a half.
132 Views
IN COLLECTIONS
CSPAN2 Television Archive Television Archive News Search ServiceUploaded by TV Archive on