59
59
Sep 30, 2013
09/13
by
CSPAN2
tv
eye 59
favorite 0
quote 0
there's never anybody kill order injured an a cyberattack. when you talk about cyber war as so many people are doing. we are talking about it in the war on drugs or gun -- gun which is is serious. i'm not try to talk it down at all. we're talking about the real thing. military operations, executed without a computer code that has real strategic effects on tactical effects. the book is trying to offer a framework to distinguished between it and the real thing. >> okay. but then one of the obvious responses to that is when you say cyber war take place, -- [inaudible] by defining war in a particular way. in a particular way put out a century before there were computers and warfare. now it's just simply, okay, even if so far no one has been killed. political damage, isn't this what war is about? killing people is a way in which you assert your will. >> yes, indeed. absolutely. to keep in mind whenever we use weapons and whenever we speak about the use of force, the use of force in a international or domestic arena. indian you interested in organi
there's never anybody kill order injured an a cyberattack. when you talk about cyber war as so many people are doing. we are talking about it in the war on drugs or gun -- gun which is is serious. i'm not try to talk it down at all. we're talking about the real thing. military operations, executed without a computer code that has real strategic effects on tactical effects. the book is trying to offer a framework to distinguished between it and the real thing. >> okay. but then one of the...
54
54
Sep 11, 2013
09/13
by
CSPAN
tv
eye 54
favorite 0
quote 0
we know russia and china have cyberattacks as part of their warfighting strategy. this is a condition of not only military and diplomatic and business activity, international activity. but again, where you need the public and private sector to sit down and cooperate and determine if there is an attack, what are the consequences and who is responsible for returning it to sender. all of this has to be worked out. and again it just calls for collaboration and cooperation, communication and doesn't require for a regulatory scheme where you check the compliance box and everybody feels safe after that. >> senator coburn. >> i think secretary ridge agrees with this. we spend billions on grants every year. is it your opinion that those grants ought to be risk-based rather than parochial based? >> absolutely. >> senator coburn, following the attacks of 9/11, i was the atlantic area commander. i was concerned about the posture of our ports on the east coast and put a team together that developed port security risk assessment model. we look at impacts trading off what you wou
we know russia and china have cyberattacks as part of their warfighting strategy. this is a condition of not only military and diplomatic and business activity, international activity. but again, where you need the public and private sector to sit down and cooperate and determine if there is an attack, what are the consequences and who is responsible for returning it to sender. all of this has to be worked out. and again it just calls for collaboration and cooperation, communication and doesn't...
63
63
Sep 12, 2013
09/13
by
CSPAN
tv
eye 63
favorite 0
quote 0
we know russia and china have cyberattacks as part of their warfighting strategy. this is a condition of not only military and diplomatic and business activity, international activity. but again, where you need the public and private sector to sit down and cooperate and determine if there is an attack, what are the consequences and who is responsible for returning it to sender. all of this has to be worked out. and again it just calls for collaboration and cooperation, communication and doesn't require for a regulatory scheme where you check the compliance box and everybody feels safe after that. >> senator coburn. >> i think secretary ridge agrees with this. we spend billions on grants every year. is it your opinion that those grants ought to be risk-based rather than parochial based? >> absolutely. >> senator coburn, following the attacks of 9/11, i was the atlantic area commander. i was concerned about the posture of our ports on the east coast and put a team together that developed port security risk assessment model. we look at impacts trading off what you wou
we know russia and china have cyberattacks as part of their warfighting strategy. this is a condition of not only military and diplomatic and business activity, international activity. but again, where you need the public and private sector to sit down and cooperate and determine if there is an attack, what are the consequences and who is responsible for returning it to sender. all of this has to be worked out. and again it just calls for collaboration and cooperation, communication and doesn't...
65
65
Sep 14, 2013
09/13
by
CSPAN
tv
eye 65
favorite 0
quote 0
today we can hardly go a day without reading about a cyberattack or hearing about a cyberattack in the news, often many attacks. to respond to the challenge of ever-changing threats, we need a department of homeland security that's flexible and ready to adapt when necessary. sometimes we just need to use some commonsense. if a program is not work, we shouldn't just keep throwing good money after bad. rather we must work smarter with our limited resources and find ways to get ever better results for less money or the same amount of money. that's why dr. coble and i are holding this hearing and a series of others today. at the beginning of the year he suggest wed focus on re-authorization, we've never done a re-authorization of the department of homeland security and he suggested a way to do that would be to do a year-long series of hearings that are relevant to the department and its if you thinks and this is one of those hearings, a really important one. we're doing this top to bottom review of the department to learn where it succeeded and where it comes up short. this information wil
today we can hardly go a day without reading about a cyberattack or hearing about a cyberattack in the news, often many attacks. to respond to the challenge of ever-changing threats, we need a department of homeland security that's flexible and ready to adapt when necessary. sometimes we just need to use some commonsense. if a program is not work, we shouldn't just keep throwing good money after bad. rather we must work smarter with our limited resources and find ways to get ever better results...
98
98
Sep 3, 2013
09/13
by
CNNW
tv
eye 98
favorite 0
quote 0
a group calling it the syrian electronic army is claimed responsibility for a cyberattack on the marine recruiting website and it's a bold strike and said to be in response to the growing threat of a u.s. military strike. the syrian group wrote -- we understand you're patriotism and love for your country so please understand our love for ours. obama is a traitor what wants to put your lives in danger to rescue al qaeda insurgents. this group has gone after other u.s. companies in the past month, all obviously in defense of a syrian president al-assad. so another attack on an american website what do we know? >> similar to the "new york times" and "washington post", it appears the site itself, marines.com was not breached. the marine say no confidential or personal information was compromised but people continue access the information and they were redirected to another site. i spoke with the cybersecurity expert who has investigated the syrian electronic army and says the hackers could be doing much more damage than they are right now. they're able to control what people see, where they
a group calling it the syrian electronic army is claimed responsibility for a cyberattack on the marine recruiting website and it's a bold strike and said to be in response to the growing threat of a u.s. military strike. the syrian group wrote -- we understand you're patriotism and love for your country so please understand our love for ours. obama is a traitor what wants to put your lives in danger to rescue al qaeda insurgents. this group has gone after other u.s. companies in the past...
92
92
Sep 12, 2013
09/13
by
CSPAN
tv
eye 92
favorite 0
quote 0
an exponential increase in cyberattacks, edward snowden and one part of al qaeda is in the boonies in yemen. there is good news. one, information sharing is improving. i know there's much to continue. second, resilience. we showed resilience after boston, in particular, after the boston marathon bombing. and common sense is emerging in the way we approach homeland security, and to senator coburn's point, i think there's more support and there should be for a risk-based approach. collaboration with the private sector on cyber, that is happening, and credit should go to the -- i guess she's just retired -- to the secretary of homeland security, janet napolitano, for personally working on this issue. and we are getting ahead of let me just touch on these very briefly, because my time's running out too. information sharing, tom ridge talked about it. but the committee should take credit for the fact and the department should that homeland security grant money was critical. according to the boston p.d., it helped make sure that the city was trained to share information rapidly during the e
an exponential increase in cyberattacks, edward snowden and one part of al qaeda is in the boonies in yemen. there is good news. one, information sharing is improving. i know there's much to continue. second, resilience. we showed resilience after boston, in particular, after the boston marathon bombing. and common sense is emerging in the way we approach homeland security, and to senator coburn's point, i think there's more support and there should be for a risk-based approach. collaboration...
199
199
Sep 2, 2013
09/13
by
CNNW
tv
eye 199
favorite 0
quote 0
a group calling it the syrian electronic army is claimed responsibility for a cyberattack on the marine recruiting website and it's a bold strike and said to be in response to the growing l threat of a u.s. military strooik. the brooir syrian group wrote we understand you're patriotism and love for your country so blees understand our love for ours. obama is a traitor what wants to put your lives in danger to rescue al qaeda insurgents. this group has gone after other u.s. companies in the past month, all obviously in defense of a syrian president al-assad. so another attack on an manneamn website what do we know? >> similar to the "new york times" and "washington post", it appears the reyooirnlt site itself, marines.com was not breached. the marine say no confidential or personal information was compromised but people continue access the information and they were redirected to another site. i spoke with the cybersecurity expert who has investigated the syrian electronic army and says the hackers could be doing much more damage than they are right now. they're able to control what peopl
a group calling it the syrian electronic army is claimed responsibility for a cyberattack on the marine recruiting website and it's a bold strike and said to be in response to the growing l threat of a u.s. military strooik. the brooir syrian group wrote we understand you're patriotism and love for your country so blees understand our love for ours. obama is a traitor what wants to put your lives in danger to rescue al qaeda insurgents. this group has gone after other u.s. companies in the past...
78
78
Sep 12, 2013
09/13
by
KCSM
tv
eye 78
favorite 0
quote 0
. >>> japanese government officials are warning of possible cyberattacks from china. they say a hacker group has posted threats on its website calling for attacks next week on 270 japanese sites. government officials say the sites targeted include the prime minister office and foreign ministry as well as local governments and media organizations. chinese hackers have launch add tax the past few accepts and coincide with the anniversary of an incident in 19 31 that led to japan's real of manchuria. china claims the islands and the hackers hit the websites of at least 19 japanese organizations, including the supreme court. >>> security investigators are analyzing the group's website to see if they can find outing in about the hackers or their methods. >>> japanese media have taken part in a drill with japan's maritime self-defense force over the islands. a fleet of planes carried out the exercise over the east china sea. the squadron consisted of p 3 c control from fleet air wing 5 and the planes controlled the wooirn space over the east china sea about 1 r50 kilometers
. >>> japanese government officials are warning of possible cyberattacks from china. they say a hacker group has posted threats on its website calling for attacks next week on 270 japanese sites. government officials say the sites targeted include the prime minister office and foreign ministry as well as local governments and media organizations. chinese hackers have launch add tax the past few accepts and coincide with the anniversary of an incident in 19 31 that led to japan's real...
94
94
Sep 10, 2013
09/13
by
CNNW
tv
eye 94
favorite 0
quote 0
but what about cyberattacks, what about anything? it's either war or nothing. if there were a dome over syria, so it was not about bomb or don't bomb, what are something some of the creative things that we could do without war? >> unfortunately, if there were a dome over syria there's nothing we could do to stop the bloodshed. finally, the patriots, the freedom fighter syrians have gotten help from outside. but they're still getting decimated. >> this is america. you're saying there's nothing we can do. it's either tomahawk missiles or nothing. >> but the dome doesn't exist, van. that's fantasy land. this is reality. >> let me say something about the dome. >> van jones dome. >> the dome is unreal, but what that really reminds us of is that their neighbors their, israel, iraq, jordan, lebanon, they're all being badly affected. >> this is a crisis, how can we get out of this without bombs. you tell us. >> that as why rick santorum during the presidential campaign said we should be arming the rebels, supporting them militarily, we should be supporting them economi
but what about cyberattacks, what about anything? it's either war or nothing. if there were a dome over syria, so it was not about bomb or don't bomb, what are something some of the creative things that we could do without war? >> unfortunately, if there were a dome over syria there's nothing we could do to stop the bloodshed. finally, the patriots, the freedom fighter syrians have gotten help from outside. but they're still getting decimated. >> this is america. you're saying...
73
73
Sep 29, 2013
09/13
by
CSPAN2
tv
eye 73
favorite 0
quote 0
missiles for an hour and it raised the possibility are command-and-control system might be vulnerable to cyberattack. so a lot of the problems that i write about in the book have been addressed but to say that command-and-control issues have been solved with the mistake because it was something like command-and-control which is a process that's never fully achieved. the record -- the safety record is perfect until it's not. >> host: so they are still risks as long as you have nuclear weapons and the differences from the past to the present has to do with the ways in which some dangers have a risk in some of those are not as difficult as in the past. clearly the different arsenals that is the united states and russia are different in terms of their safety and if you ask me i would probably tell you i could stay awake learning -- worrying about pakistan and india and their nuclear arsenals. i think it's important to make those differences not to say that there are problems and i don't think anybody says there couldn't be but understand the nature of the problems. >> i'd try to make that point clear in
missiles for an hour and it raised the possibility are command-and-control system might be vulnerable to cyberattack. so a lot of the problems that i write about in the book have been addressed but to say that command-and-control issues have been solved with the mistake because it was something like command-and-control which is a process that's never fully achieved. the record -- the safety record is perfect until it's not. >> host: so they are still risks as long as you have nuclear...
111
111
Sep 30, 2013
09/13
by
CSPAN2
tv
eye 111
favorite 0
quote 0
it raised the possibility that our command and control system might be vulnerable to cyberattack. so a lot of -- >>>> host: that question -- >> guest: a lot of problems they write about in the book have been addressed, but to say the command and control issues have been solved would be a my -- mistake. because something like command and control -- which is a process. it's never fully achieved. the record -- the safety record is perfect until it's not. >> host: you're absolutely right. there are still risks as long as you have nuclear weapons. you know, the differences from the past to the present have do with kind of the ways in which some dangers have arisen. and some of those are not as difficult did -- >> guest: yeah. >> host: as in the past. clearly the different arsenals that is the united states and russia are different in terms of their safety. >> guest: yeah. >> host: and if you ask me, i would probably tell you i could stay awaking worrying about pakistan and india. >> guest: absolutely. >> host: and their nuclear arsenal. i think it's important to make the differences. n
it raised the possibility that our command and control system might be vulnerable to cyberattack. so a lot of -- >>>> host: that question -- >> guest: a lot of problems they write about in the book have been addressed, but to say the command and control issues have been solved would be a my -- mistake. because something like command and control -- which is a process. it's never fully achieved. the record -- the safety record is perfect until it's not. >> host: you're...
58
58
Sep 11, 2013
09/13
by
CSPAN
tv
eye 58
favorite 0
quote 0
today we can hardly go a day without reading about a cyberattack or hearing about a cyberattack in the news, often many attacks. to respond to the challenge of ever-changing threats, we need a department of homeland security that's flexible and ready to adapt when necessary. sometimes we just need to use some commonsense. if a program is not work, we shouldn't just keep throwing good money after bad. rather we must work smarter with our limited resources and find ways to get ever better results for less money or the same amount of money. that's why dr. coble and i are holding this hearing and a series of others today. at the beginning of the year he suggest wed focus on re-authorization, we've never done a re-authorization of the department of homeland security and he suggested a way to do that would be to do a year-long series of hearings that are relevant to the department and its if you thinks and this is one of those hearings, a really important one. we're doing this top to bottom review of the department to learn where it succeeded and where it comes up short. this information wil
today we can hardly go a day without reading about a cyberattack or hearing about a cyberattack in the news, often many attacks. to respond to the challenge of ever-changing threats, we need a department of homeland security that's flexible and ready to adapt when necessary. sometimes we just need to use some commonsense. if a program is not work, we shouldn't just keep throwing good money after bad. rather we must work smarter with our limited resources and find ways to get ever better results...
64
64
Sep 13, 2013
09/13
by
CSPAN2
tv
eye 64
favorite 0
quote 0
cyberattacks on the likes. we should be treating those attacks and human rights that occur in the united states every bit as seriously as we treat the russian government's abuses inside russia. and again, dhs could be authorized to go looking for ways to bring those sanctions to bear. and then finally with the private sector come it seems to me the private sector knows more about the attackers inside their networks and we will ever know. they are more motivated to find the attackers and to pursue the attackers a into as their competitors, which is often the case, was being stolen is competitive information. those competitors are operating in our markets. and if we can gather that intelligence and close that loop, we can bring to bear criminal and other penalties on the beneficiaries of these attacks. that is not something we're doing now because there's not enough integration between the people who have the resources and incentive to do that, individual companies were under attack, and the law enforcement agenc
cyberattacks on the likes. we should be treating those attacks and human rights that occur in the united states every bit as seriously as we treat the russian government's abuses inside russia. and again, dhs could be authorized to go looking for ways to bring those sanctions to bear. and then finally with the private sector come it seems to me the private sector knows more about the attackers inside their networks and we will ever know. they are more motivated to find the attackers and to...
112
112
tv
eye 112
favorite 0
quote 1
this following major cyberattacks by the same group last week against the new york times and twitter and huffington polk and joining us from washington mike rosen of cybersecurity and tom kellerman. it seems if our government does decide to retaliate in syria, that these syrian electronic army guys are going to go while. why is it even after these guys have cracked into a dozen media websites, how did they continue to get access? why can't they stop it from happening? >> many of these websites are not secure with regard to how they insulate themselves from these types of robust stage attacks. you need to comprehend the allies of syria, the syrian electronic army are allowing them to download the various cyberweaponry that allow you to bypass the fire walls and the encryption use to protect these sites as well as allowing them to target more particular new ones, not just websites that back end net works. what we need to worry about is not just the sight the being redirected to information pages but whether or not they are used as watering holes to attack anyone who visits those sites
this following major cyberattacks by the same group last week against the new york times and twitter and huffington polk and joining us from washington mike rosen of cybersecurity and tom kellerman. it seems if our government does decide to retaliate in syria, that these syrian electronic army guys are going to go while. why is it even after these guys have cracked into a dozen media websites, how did they continue to get access? why can't they stop it from happening? >> many of these...
223
223
Sep 6, 2013
09/13
by
KPIX
tv
eye 223
favorite 0
quote 0
this suggests to me the nsa could do a lot of the cyberattacks on other country's banking systems maybe that we hadn't known about. >> really not their first concern though. the nsa's first concern is are we going to pick up a foreign conversation with the boston marathon bombers? by the way, if they do, they can't listen because the boston marathon bombers were american. are they going to pick up a plot for syrian retaliation? they are -- before they were an intelligence agency, they were code breaking agency. breaking encryption is what they were born to do. if they're going to be charged with protecting the united states from spies, from terrorist, from people selling nuclear secrets from iran or north korea, they're going to have to break encryption codes or they won't be able to read what they need to. >> once more the question of the nsa wants the power to do whatever it needs to do but it's projsi inpromising it won't do anything that invades the privacy of private citizens. >> that happens. every now and then they'll pick up an american. there are alarm bells that go off when so
this suggests to me the nsa could do a lot of the cyberattacks on other country's banking systems maybe that we hadn't known about. >> really not their first concern though. the nsa's first concern is are we going to pick up a foreign conversation with the boston marathon bombers? by the way, if they do, they can't listen because the boston marathon bombers were american. are they going to pick up a plot for syrian retaliation? they are -- before they were an intelligence agency, they...
358
358
Sep 5, 2013
09/13
by
KPIX
tv
eye 358
favorite 0
quote 1
threats include cyberattacks against american companies and government targets. our senior correspondent john miller is a former director. we heard some concerns about these members of congress about a backlash if america attacks. how do you assess those possibilities? >> that's what the intelligence community's been working on. which is what is the likelihood of retaliation and in what form. parent and part of the calculus is this is an operation against syria for using chemical weapons. if they retaliate against that they're upping the ante. the question is, would it be syria, would they use hezbollah, with iran step in in the shadows or would it just be cyber? >> what are they doing to prepare? >> a number of things. from the fbi standpoint they're going through their cases and saying where do we have suspected syrian intelligence officers? where do we have sources? are we looking at iran cases? are we checking hezbollah files? are we tickling those wires? that's for situational awareness awareness. >> hasn't this started to occur? a group associated with syri
threats include cyberattacks against american companies and government targets. our senior correspondent john miller is a former director. we heard some concerns about these members of congress about a backlash if america attacks. how do you assess those possibilities? >> that's what the intelligence community's been working on. which is what is the likelihood of retaliation and in what form. parent and part of the calculus is this is an operation against syria for using chemical weapons....
196
196
Sep 2, 2013
09/13
by
CNNW
tv
eye 196
favorite 0
quote 0
. >>> happening in the "newsroom" cyberattack. a marine recruitment site hacked by the syrian electronic army. one photo saying i did not join the military to get involved in other country's civil wars. >>> plus, breaking this morning, swimming into history. diana nyad 100 miles from havana to the florida keys. just a few miles away from key west. this is what she morning. it's a dream 35 years in the making. will she finally make it. >>> a battle over your paycheck. how much is a living wage anyway? walmart and washington going head-to-head. can the super store afford to pay their part-timers another 4 bucks an hour? >>> no fancy title, no gigantic castle, but he's pippa's pick. is another middleton ready to get hitched. "newsroom" starts now. >>> good morning from washington, i'm carol costello. we begin with the crisis in syria and new developments holding the world's attention. the u.s. military sends a new warship into the red sea. today united nations inspectors send to a lab the evidence that can prove chemical weapons were
. >>> happening in the "newsroom" cyberattack. a marine recruitment site hacked by the syrian electronic army. one photo saying i did not join the military to get involved in other country's civil wars. >>> plus, breaking this morning, swimming into history. diana nyad 100 miles from havana to the florida keys. just a few miles away from key west. this is what she morning. it's a dream 35 years in the making. will she finally make it. >>> a battle over your...
152
152
Sep 6, 2013
09/13
by
CNNW
tv
eye 152
favorite 0
quote 0
by targeting america's infrastructure for a potentially devastating cyberattack. >> we'd actually cause a pipe rupture in this process. >> reporter: that pipe is filled with water. but it could be filled with oil even acid. >> there are safeties in here such that when the isolation valve is closed we should also turn off this pump. >> reporter: that didn't happen because these energy researchers were able to hack the controller. >> you can't do anything. as an operator you're completely locked out. >> reporter: it's the same thing used at oil and gas facilities, that means this hack could cause gas pipes and water tanks to explode or overflow. it could also represent modern day warfare. taking down major infrastructure by infiltrating the code that makes it run. >> you can definitely cripple an entire country through cybermeans and attacking infrastructure. >> reporter: kennedy says that if there's a conflict with syria, damascus could respond in cyberspace. >> they have some very big allies that have a lot of decent capabilities out there such as iran and russia and they're definitely
by targeting america's infrastructure for a potentially devastating cyberattack. >> we'd actually cause a pipe rupture in this process. >> reporter: that pipe is filled with water. but it could be filled with oil even acid. >> there are safeties in here such that when the isolation valve is closed we should also turn off this pump. >> reporter: that didn't happen because these energy researchers were able to hack the controller. >> you can't do anything. as an...
223
223
Sep 2, 2013
09/13
by
CNNW
tv
eye 223
favorite 0
quote 0
. >>> happening in the "newsroom" cyberattack. a marine recruitment site hacked by the syrian electronic army. one photo saying i did not join the military to get involved in other country's civil wars. >>> plus, breaking this morning, swimming into history. diana nyad 100 miles from havana to the florida keys. just a few miles away from key west. this is what she morning. it's a dream 35 years in the making. will she finally make it
. >>> happening in the "newsroom" cyberattack. a marine recruitment site hacked by the syrian electronic army. one photo saying i did not join the military to get involved in other country's civil wars. >>> plus, breaking this morning, swimming into history. diana nyad 100 miles from havana to the florida keys. just a few miles away from key west. this is what she morning. it's a dream 35 years in the making. will she finally make it
79
79
Sep 26, 2013
09/13
by
CSPAN
tv
eye 79
favorite 0
quote 0
to protect our country's most critical infrastructure from destructive cyberattacks, what authority do you feel u.s. cybercom, the n.s.a. and/or the private sector needs that they might not have now? >> i think the most important thing that we need is we need the ability to share information with industry. right now we can't see what's hitting industry. we have no realtime tipping and queuing capability between industry and the government. and i don't say that that has to come uniquely to cybercommand and the n.s.a. i agree that if we do this in a transparent process, send it to the government all at once, d.h.s., f.b.i., n.s.a. and cybercommand, that way everybody will know we're doing the right thing, it's transparent, and we get that information at network speed. f.b.i. can look at it to see if it's law enforcement, criminal- related. n.s.a. can look at it to see if there's a foreign nexus and cybercommand can look at it and say, what do i have to do to defend the country given this information? but you have to know the information. and right now what happens is the attack goes on a
to protect our country's most critical infrastructure from destructive cyberattacks, what authority do you feel u.s. cybercom, the n.s.a. and/or the private sector needs that they might not have now? >> i think the most important thing that we need is we need the ability to share information with industry. right now we can't see what's hitting industry. we have no realtime tipping and queuing capability between industry and the government. and i don't say that that has to come uniquely to...
60
60
Sep 10, 2013
09/13
by
CSPAN
tv
eye 60
favorite 0
quote 0
potential cyberattacks on american critical infrastructure in both the financial services and energy sectors. an unleashed hezbollah and other unforeseen asymmetrical responses. i'm depply concerned about this as we all should be. we can't just look at syria in isolation. we have to look at it in a broader context of the mideast. unfortunately and i'm gong to have to be critical of the president at this time, witness how president obama turned his back on egyptian president mubarak, who, in 2011, after two weeks of uprising. whatever his faults, whatever his shortcomings, mubarak was a loyal, 30-year friend of the united states. a lesson learned by our friends and our allies throughout the region and throughout the world. of course, back -- prior to that incident, there was the green revolution in iran where we saw a lot of very brave people nigh ran stand up to the ahmadinejad regime in ian, we witnessed that, and it seemed that this administration could barely utter words of support to these very brave people who stood up to a tyrant, ahmadinejad, who obviously made all sorts of re
potential cyberattacks on american critical infrastructure in both the financial services and energy sectors. an unleashed hezbollah and other unforeseen asymmetrical responses. i'm depply concerned about this as we all should be. we can't just look at syria in isolation. we have to look at it in a broader context of the mideast. unfortunately and i'm gong to have to be critical of the president at this time, witness how president obama turned his back on egyptian president mubarak, who, in...
727
727
Sep 4, 2013
09/13
by
KNTV
tv
eye 727
favorite 0
quote 1
samsung will begin installing it after reports showed those phones are hosting more than 90% of mobile cyberattacks. today we get data showing more americans bought cars in the month of august but what wall street is waiting for is friday when the employment data is released. strong jobs numbers, good for the overall economy but it could mean the federal reserve will start pulling back. stocks will fall as a result, natalie. >> thank you so much. it was a full house in more ways than one on tuesday. senator john mccain finding ways to pass the time during the senate forei committee on syria. that is senator mccain on his phone playing poker. mccain didn't deny it. in fact, he came clean posting this to his twitter account. it says, quote, scandal! got playing iphone game at three-plus hour senate hearing, worst of all, i lost. scandal here on the plaza, all of my cohosts caught playing iphone games. >> black jack for me. >> thanks for listening guys. >> blackjack. >> got a double word. >> i'm on a hot streak here. >> did you win? >> we've all done it. >> 21. >> nice. >> well, some winners as far as
samsung will begin installing it after reports showed those phones are hosting more than 90% of mobile cyberattacks. today we get data showing more americans bought cars in the month of august but what wall street is waiting for is friday when the employment data is released. strong jobs numbers, good for the overall economy but it could mean the federal reserve will start pulling back. stocks will fall as a result, natalie. >> thank you so much. it was a full house in more ways than one...
665
665
Sep 25, 2013
09/13
by
CSPAN
tv
eye 665
favorite 0
quote 2
to protect our country's most critical infrastructure from destructive cyberattacks, what authority do you feel u.s. cybercom, the n.s.a. and/or the private sector needs that they might not have now? >> i think the most important thing that we need is we need the ability to share information with industry. right now we can't see what's hitting industry. we have no realtime tipping and queuing capability between industry and the government. and i don't say that that has to come uniquely to cybercommand and the n.s.a. i agree that if we do this in a transparent process, send it to the government all at once, h.s., f.b.i., n.s.a. and cybercommand, that way everybody will know we're doing the right thing, it's transparent, and we get that information at network speed. f.b.i. can look at it to see if it's law enforcement, criminal-related. n.s.a. can look at it to see if there's a foreign nexus and cybercommand can look at it and say, what do i have to do to defend the country given this information? but you have to know the information. and right now what happens is the attack goes on and
to protect our country's most critical infrastructure from destructive cyberattacks, what authority do you feel u.s. cybercom, the n.s.a. and/or the private sector needs that they might not have now? >> i think the most important thing that we need is we need the ability to share information with industry. right now we can't see what's hitting industry. we have no realtime tipping and queuing capability between industry and the government. and i don't say that that has to come uniquely to...
202
202
Sep 2, 2013
09/13
by
MSNBCW
tv
eye 202
favorite 0
quote 0
. >>> what are the consequences of a successful cyberattack. how can that be used to harm? >> right now the acu attacks they're launching are not disruptive, but not destructive. they're domain-name hijacking. they're stealing those domains and redirecting traffic to another computer, but right now there hasn't been any evidence that these folks are actually breaking into sensitive computer systems and stealing people's personal information. the problem is that these folks are fairly sophisticated. what they are doing is not that easy to do. if they're capable of doing that, the question is if something bad happening in syria, will they escalate their activities? will they actually go after the actual servers that host this information? that's some of much more serious than simply stealing a domain name. >> for the average person how might they attacks affect them? could they target systems that run municipal systems? inconvenient? or loss of life? >> if you want an idea about what could happen here, look at the al kazzam cyberfighters. they've been launching denial of serv
. >>> what are the consequences of a successful cyberattack. how can that be used to harm? >> right now the acu attacks they're launching are not disruptive, but not destructive. they're domain-name hijacking. they're stealing those domains and redirecting traffic to another computer, but right now there hasn't been any evidence that these folks are actually breaking into sensitive computer systems and stealing people's personal information. the problem is that these folks are...