only 3-4 in john deutsch's memo and that simplify the process a great deal. writing this is where the system is bogged down because there is a temptation to ask for the imp possible. and i think the defense contractors have a great motive to say week do that easy -- we can -- cheap and it turns out not to be that way. one of the areas that should be focused on is the whole process of writing requirements. and thinking about big safari which developed the predator and one of their mottos is look for the 80% solution and that is not a bad motto. >> thanks for a great presentation. my question is given the extensive attacking me experience, target, home depot and the chinese hitting and the nsa as well. how can we make sure, and be sure, that these predators are not going to be controlled by a hacker and turn against another targeting, including ourselves? >> that is a question that is on a lot of people's minds. i would be lying if i said i know the technical answer because i am not an engineer. i am a story teller. i have told the story by interviewing people