tv Washington This Week CSPAN April 19, 2014 7:00pm-8:01pm EDT
7:00 pm
create, maintain your quitman or software on and on -- you are free to come and go as you well. none of those things are prohibited in any shape or form. you could walk into radioshack or walmart. you can make installment payments. any time you purchase an antenna, you are leasing it. you have an ongoing relationship. if you don't really -- pay your bill in advance. where you draw the line on these things? there is no basis at all. saying that how you chart somebody makes a difference. the question is, what are you selling, and is it technology or content? established we are
7:01 pm
selling technology. we are no different than any other technology. supreme court, april 22. he is the ceo and founder. >> thank you. c-span. created by america's cable companies and brought to you as a public service by your cable or satellite provider. >> on newsmakers, a financial services roundtable ceo. he will talk about key issues facing the banking and credit card interest rates? -- credit card industries. from that prevent banks making speculative trade with
7:02 pm
their own money. newsmakers, sunday at 10:00 a.m. and 6 p.m. eastern on c-span. host: joining us now, lee rainie of the pew research center, he is the director for the internet and american life project. thank you for joining us. 18% of people finding that their information has been compromised? guest: even more strikingly, we did a survey last summer asking the same question and found that 11% of internet users had had their really important information compromised, social security number, record number, a banking information, stuff like that. just in january when we did this new survey, it jumps to 18%. it was particularly striking among younger folks, people between the ages of 18 and 29. so the line of breaches that we have seen in recent months starting with the target store'' breach around christmas time, now with new information coming out pretty regularly, a lot more
7:03 pm
people are aware of what's going on and they have probably had direct experience. host: with the server you took, how to these breaches take place? what kind of information was compromised? guest: we did not press people on that. we did not press people on that. it included such things as social security numbers, credit card numbers, and things like that. in many cases, people have heard from their credit card companies. they themselves did not discover the bridge, but their credit card company said there is weird activity or maybe a credit application, something that does not have all of the right information, so they are hearing from banks and other finance companies that there are problems with their accounts, and that is what discovers it for them. host: what his reaction, though, as far as what people find out? guest: they feel hugely vulnerable. many feel like they're playing by the rules and they are following the basic good commonsense advice of they get from their companies and friends and stuff like that. other people just assume the
7:04 pm
best. they're using the internet, nothing bad has happened so far, but they are now discovering that they have got a problem, and someone notifies them and things like that. the other number that was really interesting for the us is that 21% of internet users have found that an account of theirs has been compromised like an e-mail account or social media account or things like that. people are newly sensitized to the idea that people are messing with their accounts and they can come back to haunt them. there is a lot of tension out there now that did not exist when we were -- just a couple of years ago. host: lee rainie, we live in an age where we are told about our information was of is a change in practice? guest: not so much. we know that lots of people would like to be safe online and take rudimentary steps to do that. it occasionally change their password, though it is still the case that lots of people use pretty simple and not very smart passwords. are now more people sorted taking elementary steps and we saw in a survey that we
7:05 pm
did last summer that more people are encrypting their e-mail or using services like virtual personal networks that allow their activity to be anonymized and hidden from viewers. part of that is just there worry about surveillance, part of that is that they have heard enough horror stories from their friends and things like that. so there are hundreds of levels of awareness and it is stitched into a broad range of people's concerns about their security and surveillance online. host: you hinted at this, but are there differences in how people protect their information depending on age and where they fall in that? guest: yeah, interestingly enough, one of the consistent things we found is contrary to what people believe, that young people are indifferent to privacy, that young people are not very protective of what they do. we actually find a younger adults and teenagers are the most active folks who are trying to do best practices and trying to keep their reputation say. one of the other elements of onlyof course is that not is personal information related
7:06 pm
to finances at issue but just your reputation, who you are, and what your identity is and who could know that and things like that. younger folks are more active in managing a reputation, trying to keep up with their password than older folks. even though there is a lot of finger waggling from their parents and grandparents, they are doing a little bit better job about that. but it is a new environment now where people sort of have a sense that they are being surveilled and sort of have a sense that their information might be compromised, and they are a little bit confused about what the right steps are because even though they have been told -- go to these websites and don't share any information unless you see attps, the signal of a secure website, or the little green lock at the top of your browser. if you see that, you can be safe. the horrible thing that has happened in the past days is the disclosure about the vulnerabilities in that system. host: lee rainie is our guest, he is with the pew center and talks about internet issues.
7:07 pm
if you'd like to ask him questions about privacy and online concerts, here is your chance to do so. (202) 585-3881 for republicans, (202) 585-3880 for democrats, (202) 585-3882 for independents. twitter @cspanwj and e-mail journal@c-span.org. you mentioned about event reported this morning with this michael's arts and crafts store, a data breach that occurred. guest: michaels is just the latest in the run of stores about the vulnerabilities that companies have had. he big one was targets during the holiday giftgiving season, but there are data breach is almost weekly at some level. a laptop is stolen with lots of government accounts on it. lots of web companies now are having to disclose to their customers that they have been hacked, and basic information like e-mail addresses and passwords and sometimes personal information like social security numbers have been hacked. so this is sort of an omni
7:08 pm
present aspect of online life now. what is interesting is that public apprehension has risen, there has not been a significant drop off in internet use. for instance, after the edward snowden disclosures in the national security agency surveillance programs were unveiled, you might suspect that people who were nervous about such things would have changed their behaviors or that anyone of these data breaches like the target story might have driven people away from sites like that and basically using financial information and sharing their credit card number online. absolutely not. e-commerce, the willingness of people to share personal information online has not been interrupted by any of these disclosures. it is sort of an interesting phenomenon because you think if people felt this vulnerable, and if many people have experiences drug problems, they would be marching with pitchforks against somebody somewhere, yet there is
7:09 pm
not a tremendous amount of public outrage, even though people would really like the laws to be tighter and really feel more vulnerable. ift: i was going to say people have reacted -- i will give up on the internet altogether because of these things. guest: no, it is so baked into people's lives that they do not feel they can afford to be off the grid. we are all network individuals. we depend on our friends to share things with us, we depend on it for news, for commerce and things like that. so it is in many cases not an option for people to go off-line because that really puts them at a disadvantage or so many things come in and there is lots of enjoyment to be had on the internet, too. so it is not the case that people are fleeing. they're trying to figure out how to be smart about it, and things like the heartbleed bug come out in april there had to say even if the experts cannot prevent things like this, it is not too good of a situation for me. host: you mentioned the
7:10 pm
heartbleed. is there a limited way to understand this? that runsre is a bug the secure website, the https websites and things like that, lots of websites, anywhere from 500,000 to one million or even more use this basic kind of software. what is interesting as it is open-source software. a company did not put it out. it is an open source immunity where people of their own time volunteer to write code to make things better on the internet. and it turns out that they ssled -- the open community made a mistake in coding. a simple mistake that was i inadvertent. vulnerability that has existed for over two years because it was released in march 2012. there are so many eyeballs on it. one of the other iconic examples of open source stuff is the
7:11 pm
leading operating system, which runs lots of the servers that runs lots of websites. i would bet heavily that c-span servers are run with the linux operating system. there are lots of people looking at this code and find boehner abilities and one of the ways you increase your status and get a better job is to find boehner abilities or to write more elegant code. the problem with this open sll very manyere weren't people doing it. it only got $2000 last year in 2013, so the people who are doing this are just doing it out of the goodness of their heart. who wrote this mistaken code posted on new year's eve because that is when he had a little downtime to try to upgrade some of the security in the system. the system has a variety of folder ability. --
7:12 pm
vulnerability. when the affordable care act what's i out, and it was privatey, written by a company or several private companies, some of the early reactions was we should have used open-source software because it is so much more ubiquitous and so many more people are watching her. this is the flipside that something really valuable is still causing a lot of problems. host: the first call for you come from paul in montana. beler: mr. rainie, i hate to a wet blanket, but i have a very simple question to ask you. why, what reason would someone have two posted their personal, private financial information and personal information in the computer when they know or suspect that it can be taken, misused, or abused?
7:13 pm
i would really like to know that. in many cases, companies have spent a lot of time and effort making systems really convenient for people to use was of you can go to a website, you can buy something in a couple of cliques of your mouth and get the thing delivered in a couple of days. in theis an upgrade shopping experience for a lot of people. the other thing is up until this heartbleed situation, most people were convinced that the existing security systems and the elaborate encryption of personal information was good enough to rent problems like this. the other thing that you often hear when people talk about -- why do people trust the internet in these ways when it is so clear that it can be hacked or there can be data breaches/ think about the last time you went to a restaurant or the last time that you gave your credit card to somebody at a coffee shop or at a bookstore. you are trusting that the system of recording that information,
7:14 pm
your waiter or clerk at the store was an honorable person that was going to be doing it. we are a credit card-dependent society that is decided we really love the internet and all of the benefits that you get from it, and breaches are now a part of life because there are people that wanted a given edge of things like that. i was going to say you do not see to the people writing checks these days. guest: even those can be vulnerable and hacks. host: security breaches are a fact of life now says jody on twitter. guest: in the financial world, there is an arms you know, thers an arms race of hackers. financial institutions of other kinds are in an arms race with hackers. i'm sure a lot of viewers of this program have had the experience of their credit card company calling them or writing them saying, there are weird
7:15 pm
charges on your account, so your behavior is being pretty well monitored. your normal patterns, where you live, etc., and if your credit card company sees anomalies, they will flag it and you will get a call. smart people are watching, people have the sense, and the systems are good enough to protect me. and even though we asked questions about vulnerabilities on the internet, people do not necessarily know where the breaches in their information came from. you are sharing information. it is hard to know exactly what the problem was. about thetalked changed practices. heartbleed, it was a wake-up call. what happened to change it? are mechanisms for that. a data breach becomes a public-relations disaster, a problem for anybody who wants to
7:16 pm
change. the other problem, there is the white hack community out there, looking for vulnerabilities, and bringing them to the attention of companies they are hearing from. there are people having interactions with companies and parts of the internet oversight system saying these are problems, you got to fix them. coding is a process. you keep making improvements. you keep finding problems. the system keeps improving even as its vulnerabilities are exposed. guest: is that why most of our cards have an magnetic swipe and other countries have an encrypted ship and could we see that? host sure. we are not as far along. in scandinavia and parts of asia, people use their cell phones. it is not a matter strip. you
7:17 pm
use your cell phone. you can swipe that. people say, oh, my gosh, your cell phone is the well of your life. if that gets hacked, the vulnerability is -- vulnerabilities multiply exponentially. of hackinge target could go from standstill computers to mobile computers. one of the problems with heartbleed is it is prebaked into the android operating system for cell phones. there are lots of android systems that use this encrypting, and there is a scramble in the community and google to fix it. texasrepublican line from for lee rainie. go ahead. hi, fellas. my opinion is, these guys are so confident, so brilliant as they
7:18 pm
undoubtedly are, it just seems a little too conveniently keeps happening. they know everything that you do. my thought is at some point they will say everybody has to take a microchip, and i just want to say, i'm not taking no microchip and i'm pretty sure the average listener will not take no microchip. that is the mark of the beast. and that is how i feel. interestingf the things since hardly came to attention is how fragile the system was. it is not that there are masterminds behind it trying to survey livery body. it was that there were a handful coders in charge of the central mechanism for securing information online, and i think there will be a very active effort now to increase the funding for the security systems system thisrt beat
7:19 pm
exploits and companies will try to step into the breach, because it was very convenient for lots of companies to take advantage, for free, of this open source software and put it in their systems. that was a best practice on the internet. now i think they have a much more acute sense of the vulnerabilities, the limits of it, how few people were working on it. software that lots of people work on is awesome. having software a very few people work on could be very vulnerable. host: matt smith says -- yeah, that is the other side of it. one of the great arguments for the open source community is anyone can make a contribution. you do not need a credential. you do not need a pass card. if you feel like writing code, if you want to participate in a community, you are in. the way you raise your
7:20 pm
credibility and become an important community member is to make contributions. the way that this works amazingly well online, but there are also ways there are too few people being asked to do too much. michael from alabama on our democrat's line. hi. morning. oh, i could not read his name on the screen without my glasses. there are millions -- or at least hundreds of thousands in this country -- who do not own of we haves because autism is, in my case a very rare or high functioning autism called asked burgers. this is also why i do not have a checking account, because the checking fees caught me way off guard in the 1990's, and so we pay cash for everything.
7:21 pm
well, money orders, international money orders when we buy stuff online. i admit credit cards are vastly more convenient. the good news is this has saved our bacon from getting into much too high reddit card fees. the bad news is, we are considered -- this has saved our bacon from getting into much too high credit card fees. the bad news is we are considered nonpersons for car dealerships, anything where you have to pay something on time. also there are >> vendors on the internet who will not allow anything except paypal. of any credit score, fica score, bills in congress like one that suzy orman is championing? also, do you know any paymentive systems for
7:22 pm
most vendors will put where we do not have to put our telephone number and social security number and so forth? thomas finally, what security breaches can you get on your computer just from belonging -- i do not want to chat sites. i belong to sites having to do with my art career. caller, you've said a lot. let's let our guest answer. i don't know any particular legislation. if shes is suze orman, is championing legislation, she has a big enough following that someone is seriously considering that. an alternative for people who do not have a credit card. one of the decisions people have in this world, how are they
7:23 pm
going to encode this information in their life? are they going to have a credit card or debit card to engage with vendors who are requiring the things you are talking about. too many, they do not feel like there is an option accept to get get ait card -- except to credit card or to get the kind of financial material that will allow them to pay things on an installment basis or something like that. host: she used the term non-person for not paying with a credit card. yeah, there is a presumption with retailers that you are online and you have basic relationship and a relationship with a financial institution they would like to take note off. it is increasingly hard not to be in this network and on this grid for that. why aone of the reasons bitcoin, as separate digital currency, came to prominence.
7:24 pm
much information is available about me in too many places. i would like the capacity to use a currency that does not track to me and does not have any footprints. we will probably see more of that in the digital age. it is easy enough to create. groupsbe we will see like the one this collar -- caller was talking about. you do not want to comment on legislation. how much is congress doing on this and regulatory matters? guest: there is so much discussion in recent years about what to do, but it is a struggle though. there is a huge group of industry stakeholders and privacy advocates who have spent with two a year trying to, protocols on privacy. who to share it with, how it will be
7:25 pm
disclosed. and it fell apart last fall. there could be no coming together of this community. now they have thrown up their hands and they are hoping that their advocates in college or -- in congress or state legislatures, where were this is taking place, will take up their cause. now there is probably more transparency. forget if we are making rules of the road to tell companies how to behave. at least share what you are doing. there is a lot of energy in that, too. and there is a lot of exploration about data brokers, people who have a tremendous data mass and what they can or cannot do with that information. is lee rainiet .rom the pew research center he is the director of the american life project. lisa on our republican line.
7:26 pm
hi. caller: hi. i am not too familiar with this -- hi. hi. , grew up in the bay area silicon valley and all that other kind of stuff. struggle the whole time. two days ago i got on the computer and everything was completely wiped off. all the e-mails, the social, all -- everything. i am talking to years worth of stuff and i did not even know what to do. .hey took my passwords they took everything else. when i finally got it back up and running, but it is still not running right. what is this thing going on with the nsa and the supreme court? are they even going to be able to rule on that? courts athink federal
7:27 pm
all levels will continue to rule on elements of the government surveillance program. we have not seen the end of that. i'm very confident. your situation is like a lot of peoples. some set of circumstances, there are things you did where you had no idea you were vulnerable or causing yourself problems. something bad happened to your computer and it is hard to know whether it is internal to your computer or introduced by an outside force or something like that. but a lot more people have described to us stories like yours, where they lost enormous amounts of personal data, material they were trying to save for one reason or another, long-standing e-mail accounts, things like that. so, among other things everybody recommends, you set up good passwords, you keep changing them, and you keep backing up your systems. there will be times, for one reason or another, things are going to go wrong and you will want to retrieve your passwords.
7:28 pm
the head of the financial services roundtable spoke with program, andrs" one of the topics of discussion was this idea of cyber security and reducing bugs from phone abilities like heartbleed. [video clip] have securityto clearances so when problems arise they can access information from the government and act on it. you are in, if singapore, and you have to respond in five minutes, your coo can access it. number two, information.are when you think about government agencies that have useful and actionable evidence about cyber threats including the nsa, the fbi, the cia, the treasury and
7:29 pm
more, being able to work with legalithout fear of liability or recriminations is important for that kind of protection. and frankly, the current laws in that regard need to be upgraded. they are not current. congress needs to act. host: lee rainie, your takeaway? guest: that is a well articulated view of the financial community. a lot of senior executives, past and present administrations basically make the same argument, that vulnerabilities are staggering, there is less information sharing then there there aree, that inhibitions in talking to the government about something like that. the other part of this -- he ran through the institutions that are vulnerable. he did not mention utilities. one of the things that has happened as the internet has become prominent and personal
7:30 pm
lives, lots of systems, vital systems important to this country, are online. they are encrypted or there are some levels of security. -- people have a prickly pretty substantial feeling of vulnerability. they just don't know. there were tons of experts who had no sense this was a level of vulnerability. it took a special geeky guy at google and a private citizen to figure out this vulnerability, and it had set out there for two years. been a flipe has and the public and expert community now, thinking, we were ok, five years ago. we were not that vulnerable. now there is a probable sense that we do not even know what vulnerabilities are. the unknown unknowns are worrying people. and i think mr. polin see was speaking to a range of things everybody is working on. host: up next, gary from
7:31 pm
indiana, democrats' line. i. i would just like to pull out something that i think should be more emphasized in a has-been. these computer hackers and identity thieves, i believe there should be a process established, i mean a stringent one, that will discourage these people from even thinking about it. they cut people's hands off overseas? why don't we do it here? pretty easy -- not easy, but it is possible to track down the bad actors here. came tortbleed prominence, lots of companies went immediately to their websites to figure out what they're vulnerabilities were. within days there were a number of test sites where individuals could put in a url from a website and see whether that website was secure or not. the response time too many
7:32 pm
problems is pretty fast once the vulnerabilities are known. manye response time to problems is pretty fast was the bomb abilities are now. canada, a bunch of companies discovered they were vulnerable. yahoo! is scrambling to fix it systems. there are lots of ways people are trying to respond to this. the penalties are pretty severe already for people caught breaking the law. john is from holyoke, massachusetts. independents line. lee rainie. you are on. caller: please don't interrupt me. of me give you a summary what happened. the nsa is like ibm. been for the had punchcards, hitler would not have assassinated so many dues
7:33 pm
and pole locks and everything else. gm built the first nuclear plant in russia. internationalic corporate fascism. it is population control. people are feeling vulnerable. 86% of american adults use the internet. they depend on in their lives. it is the saurian singh and scary when lots of vulnerabilities come to light. -- it is disorienting and scary when lots of him abilities come to light. you thought that you were operating in a safe manner. now it no longer works for you. it is a scary things. there are global actors who are the purchase of guns on the internet. one of the other things about this media is you do not have to
7:34 pm
ask permission. you get an independent software writer, like tim berners-lee, who creates a program that essentially gives you the world wide web. he did not ask anybody's permission to release the code that gave us this amazingly powerful and beneficial resource that all of us use in our daily lives. at the same time, this letsssionless environment bad people do even more bad things with more tools. it is a hard environment to regulate and it's hard to figure out whether the whole law can apply to these situations. we are struggling to figure out what the right regulatory and punishment regime is and what the right role of corporations it makes and environment really interesting to study as a researcher, but really are to operate i am sometimes. to be lessegies
7:35 pm
visible online. clear cookies and browser history. deleted or edited something you posted in the past. set your browser to disable or turn off cookies. going down the list, as the average person know how to do this? decreases. lots of people know how to clear out their cookies if they need to. not many people know how to encrypt their e-mail and there are questions about whether that makes you as secure you hope you might be. there are surveillance folks out there who can figure that out. i think more people have a sense that too much of their personal information is online, and they have a sense they can take personal steps to limit it, the list you were going through. they would really like a little bit more activity from lawmakers and the regulatory committee to give them more privacy protections, the right to go after people who abused or misused their information, things like that. we are in an interesting policy moment right now. host: you talked about
7:36 pm
encrypting e-mail. is that available on a consumer level? guest: yeah, yeah. there is a service that allows you to do pretty powerful encryptions. there are ways that people can take that step in their system for steps that are not too expensive to create virtual networks that anonymize all of your activities online. host: nextel or from indiana, independent line. good morning, go ahead. yes, you have been talking about encryption the last few minutes. with the nsa being able to and,pt things from google well, the rest of them, e-mail and so on and so forth, and the fact that the nsa owns so many companies that no one knows classified, il
7:37 pm
would like to know your opinion on their ability to decrypt your and getnd purchases your information that way. thank you. >> there are well-publicized efforts by the nsa and prep -- but simply other organizations. they are codebreakers. they have been important parts of the government for a long, long time. done.possible it can be it is possible it is plain old individual hackers who can figure out even the very tough math used in encryption systems. it is probably safe to presume at some point not everything you are doing will be kept in a private realm and things like that. what most people will say to us, we cannot live our lives assuming the worst and assuming
7:38 pm
we are going to be broken into and assuming our information will be promoted out there. most people have not had the experiences of having one of the dark side possibilities fall into their laps. we have this data that 18% now have lost significant personal financial information. it is a big and growing number. but it also means 82% of internet users haven't had that happen. it is a challenging environment, but most people do not think they can just walk away from it entirely. host: edward snowden back in the news after an exchange with vladimir putin over issues of internet security. talk about the exchange if you want, but has edward snowden changed to wait to think about internet security matters? very: yes, there is a robust discussion about whether he did the right thing or the
7:39 pm
wrong thing in the first place. there is a discussion about what is the right role of government in surveillance activities. when we did the very first poll right after the revelations in june last year, a majority of americans were ok with the idea of surveillance, particularly in the cause of catching terrorists or other bad actors. but more generally, if you ask fort surveillance programs whatever cause they're going after, most people are pretty leery of them. the other thing we have seen in our data, a lot of americans think the nsa is capturing more information than has been disclosed. we know from the snowden revelations that metadata -- who you are calling, who your e-mails are being sent to, what times, things like that -- but we do not necessarily know under the snowden revelations with the content of e-mails or phone calls is being monitored. lots of americans think that is the case. the literal content other
7:40 pm
e-mails and phone calls is being captured. and even some people who fear that, they are ok with these programs, because they say, you have to fight bad guys with methods like this. host: jamie in texas, go-ahead. if the i was wondering guest could speak to identity theft insurance? i understand it might be able to refund lost money, limit liability. can it repair my credit damage? can it restore my name if criminal activities were done as me? guest: i am not actually sure about the range of policies now being made available by insurance companies on things like this. it is probably the case that some of the things may be restored, some of your lost assets, obviously cleaning up your record at some level as part of the offering of some of those companies. but i'm not sure the specific ones or if they can literally
7:41 pm
give you a fresh start or what about a let the damage that you folks have suffered on this. host: here is our last call. ida, good morning. caller: good morning. mr. rainie. hi.er: -- guest: those: i am one of privacy people. i do not have a credit card. i do not have a cell phone. i make all of my payments on money order. i like to read and write, so that is why i do not have a computer. i don't want technology controlling my life. i'm sure it does one way or another. once you go to a doctor, everything is on paper. portiones, there are a of americans who are just like you. they are so concerned about possible bad consequences of
7:42 pm
sharing materials, they really want to be off the grid. they want to not be known, and it is a very common expression of american independence and privacy and things like that. many more people think that these are essential tools for our lives, having credit, having access to the internet, using a smartphone, all of those benefits they get from that, when they do the tote board in the situation, they say the benefits outweigh some of the problems related to it. but absolutely, a portion of the population feels exactly like you do. they are worried about the vulnerabilities and they are taking as many steps as possible to avoid it. what is the next area of concern in your mind when it comes to the internet and security? until the heartbleed thing, i would not have even said rouser material and things like that.
7:43 pm
in many respects, it is unknown. i think there is a big reckoning we are about to have about amassing databases. material your credit card company knows, combined with what your phone company knows, combined with what your is a lotnows -- there of concern about who controls that, what they know, what they share with others justice scalia and ginsburg talked about revelations about the surveillance program of the nsa and they also talked about the relationship between the justices. as you know, a composer, who is with us tonight, has produced it, toera and in
7:44 pm
beautiful music, you are locked in a room, unable to get out compromiseagree on a consistent with the constitution. "ruth,point scalia says, can you read? the constitution says absolutely nothing about this." manyurg replies, "how times must i tell you your searching in vain for a right fine solution. the beautiful thing about the constitution is that it can evolve." we've only got a minute or so. are you ever going to agree on big issues and maintain the friendship? >> we agree on a whole lot of stuff. ruth is bad only on the knee-jerk stuff. [laughter] she's a really good textual
7:45 pm
list. in most things where the text is what she is guided by, she is terrific. she is very smart. in most cases, i think, we are together. we are together in a lot of criminal defense cases. upholding the rights of the criminal defendant. ruth and i are frequently in the sent -- in dissent from the court's decision. we agree on a lot. you have it wrong. >> you can watch the entire tonight at 9:00 p.m. eastern here on c-span. on the next "washington journal," creating jobs with brey and daniel
7:46 pm
mitchell of the cato institute. outlines options for the federal reserve to stabilize the economy and matthew at the wilson center discussions vladimir putin and the unrest in ukraine. and we'll take your calls and you can join the conversation at facebook and twitter. "washington journal" on c-span. at the white house, president obama awarded the table academy football team with the commander-in-chief trophy. he also spoke briefly from the rose garden. this is 10 minutes. >> ladies and gentlemen, the president of the united states. [applause]
7:47 pm
>> everybody, have a seat, have a seat. welcome to the white house. congratulations to the navy midshipmen. [applause] does this get old? >> never. >> no? okay. it's good to see coach ken again. and i want to recognize vice admiral mike miller for his service to the academy and to our country. this is the second time these seniors have come here to claim the commander-in-chief's trophy. if you guys have your punch cards with you, the next one is free. [laughter] i'm pretty sure coach ken would agree that this was one of the best teams yet. first of all, you had incredible talent.
7:48 pm
senior captain cody peterson and d.j. sargenti led the defense. i hear that they're known in the locker room as "the meatheads." on a football team, though, that's high praise. this year, quarterback keenan reynolds had one of the best seasons in school history. his 31 rushing touchdowns weren't just an academy record -- they were a division i record for a quarterback. [applause] he is one of only a handful of players in division i history to rush for 30 or more touchdowns in a single season. i think it's fair to say that if you're on a list with barry sanders you're doing pretty good. so this team had the leadership, it had the tools. but this is a team that also had a knack for getting the job done under some pretty tough circumstances. when the government was forced
7:49 pm
to shut down, you didn't even know if the game against air force was going to happen. luckily, the secretary of defense stepped in, gave the green light -- which tells you how important it was, because secretary hagel has a few things on his plate, but he personally intervened on this one. a few weeks later, you beat san jose state in triple overtime -- with keenan scoring seven rushing touchdowns, the most ever by a division i quarterback in a single game. and you kept on rolling through the games that really mattered. in the snow, you beat army for the 12th time in a row -- they're starting to feel bad about this -- locking up the commander-in-chief's trophy for the 9th time in 11 years. you went on to beat middle tennessee state to win your first bowl game since 2009. so, overall, this was a pretty good year on the gridiron. what's more impressive is the fact that for these outstanding young men, football isn't even the main thing.
7:50 pm
when these guys sign up, when you sign up to play at annapolis, you know you're in for a different experience. a typical day starts at 6:00 a.m. in the training room. breakfast is at 7:00 a.m. after that, it's class, lunch and football meetings. then more class, football practice, dinner. free time starts at 8:00 p.m., which most players use to study until midnight. and when students at other colleges are enjoying summer vacation, these guys are busy with military training and summer school and offseason workouts. so, yes, it's about learning to be a good football player, but more importantly, it's about learning how to be a good leader and to be a good man. and that's what these outstanding americans are and will continue to be. next month, 14 of these guys are going to be commissioned as ensigns in the navy. another eight will become 2nd
7:51 pm
lieutenants in the marine corps. senior captain matt aiken will serve on a ship down in norfolk. and wave ryder -- by the way, if your name is wave ryder, then you've got to be in the navy -- [laughter] -- will suit up as a naval aviator. that's their commitment to service. that's the commitment to country and to each other that sets this team apart. today, that commitment is as strong as ever. last month, i know that all of us were mourning the loss of will mckamey. two busloads of classmates and teammates made the eight-hour trip to knoxville to attend his funeral, as did coach ken. i understand your motto for this season is "i will" in memory of him. and that's what camaraderie is all about: honor. courage. commitment.
7:52 pm
that's what makes the midshipmen so strong. and that's why i'm so proud to serve as your commander-in-chief -- not only -- in fact, not primarily because of what you've done on the football field, but because of your dedication to each other and your service to america. so today it is my privilege to present you with a trophy that weighs about as much as i do. congratulations, guys, once again. [applause] >> mr. president, it is always a great honored and we are humbled to be your guest. your general told our football team the night before the game, youfootball need men of character. behind you are 75 men of great character.
7:53 pm
7:58 pm
-- newsmakers, sunday at 10:00 a.m. eastern on c-span. >> we should have finished al qaeda in 2001. our general who was there, all of us think back when we attack. more americans died than a pearl harbor. we had al qaeda. we had osama bin laden trapped in mountains. we didn't finish him off. escape over the other side of the mountain because that is pakistani territory. think for a moment. can you imagine during world war the battle midway
7:59 pm
, which change the entire war against japan. the pacific and attacked the japanese. destroyed their fleet. 1942. he went across the international date line. -- ose he said we get to these mountains in the middle of nowhere and we allow al qaeda to escape. it makes no sense. our entire country had become more legalistic. we should have finished it then. "the wrong war." sunday, may 4, our next in-depth .he guest, luis j rodriguez
8:00 pm
his work includes the award-winning "always running." >> a discussion about the social changes occurring in small towns and cities across the country. a conversation with scalia and ginsburg. after that, hillary clinton among the participants in the women in the world summit. >> james fallows and his wife deborah fallows sit down to talk about their observations of social changes taking place across the cry
36 Views
IN COLLECTIONS
CSPAN Television Archive Television Archive News Search ServiceUploaded by TV Archive on