Skip to main content

tv   [untitled]    July 12, 2021 2:30pm-3:01pm +03

2:30 pm
ship then it was time to celebrate. france's plan is to make space tourism possible earthlings. following today's successful flight, there will be several more tests the branson spacecraft. the goal is to send tourists into space beginning next year. the price tag $250000.00 each. rob reynolds al jazeera in sierra county, new mexico. ah . what's going on with lisa hill, rob linda hall? one of our top stories damian court has sentence to former officials to 15 years in prison, plotting a coup against the monarchy. they are accused of pushing form to the throne. prince hands are as no turnitin to king abdullah. a woman been this bit and would you remember? well regarding the 1st criminal bass in our dela, the court has sentenced him to temporary imprisonment for
2:31 pm
a period of 15 years for the 1st charge. and 15 years for the 2nd charge. only one of these 2 rules applies to him, which is temporary work for 15 years, starting from the date of his arrest in april with, with regard to the 2nd criminal sharif hassan been said, the court has sentenced him to temporary imprisonment for a period of 15 years for the 1st charge, and 15 years for the 2nd charge, he shall be subject to any one penalty which is 15 years of temporary imprisonment . cuba has seen its biggest anti government protests in decades. thousands march to as an economic crisis grips the nation. government handling of the pandemic and us sanctions are being blamed. the contagious delta variant has been blamed for a rapid rising current virus infections, in se asia thailand has gotten to lockdown for 2 weeks and south korea has imposed tougher restrictions. tokyo has now entered another state emergency 2 weeks ahead of the olympic games. residents are expected to watch the events from home with bars and restaurants not allowed to serve alcohol around. 2000 infections are being
2:32 pm
reported daily. and the us government is warning china that any attack on the philippines and the south trying to see what the response intra mutual defense treaty. that repeated warning comes as dozens of activists in manila valley on the 5th anniversary of a court ruling against china's claims to territory in the south china sea. british prime minister boris johnson has condemned the online racist abuse against england . black footballers mark has rochefort jayden santo and k is sacker. were targeted have the missing penalty kicks and sundays. a euro 2020 final against italy, the metropolitan police say it's opened an investigation. of course you can follow all of those stories on our website at algae there at dot. com is updated throughout the day. of course on top story. the events in george will validate through the day, if not more than half an hour. next, it's inside story with the hub jumped you do stay with me.
2:33 pm
ah, ah, ah, ah, the us gives russia an ultimatum. stop ransomware attack hackers, extort millions of dollars by targeting businesses and infrastructure. so what's needed to stop the cyber criminals and contain the threat to global security? this is inside story. ah, ah. hello and welcome to the program. i'm a hammer, jim john ransomware attacks are becoming a global security threat. hackers break into computer systems lock up files and
2:34 pm
hold them for ransom. as the name suggests, many cyber criminal networks are believe to be in russia with most of their victims in the u. s. a recent attack on an american i t for crippled, nearly $1500.00 businesses around the world. this prompted us president joe biden to demand action from the kremlin. he told latimer potent to stop the hackers. if not the us may retaliate by attacking ransomware servers. when the pair met in geneva last month, byte and gave put in the list of 16 critical infrastructure sectors that he said were off limits to cyber attacks. us politicians have been urging biden to do more well spec, when we're already coming from historical even though it's not, not sponsored by mistake,
2:35 pm
expect them to actually give them enough information to access it. and secondly, that we've set up the cases baskets on a regular basis to be able to communicate to one another when you think something's happening, other countries in the hall. so it went well, you said, well, there are, yes. ransomware gangs have launched a series of high profile attacks in recent months. an assault on colonial pipeline in the u. s. disrupted almost half of the east coast fuel supply in may. the world's largest meets supplier j. b. s. had to pay $11000000.00 to resume its american operations last month. and last week, around 500 co op supermarkets were forced to shut in sweden. they were effected by an attack on one of the chains software suppliers in florida. ransomware attacks were estimated to cost american victims around 1400000000 dollars last year.
2:36 pm
the. all right, let's bring in our guess in birmingham, michigan, richard steen and chief research analyst that i t harvest. richard is also author of the books there will be cyber war and cyber defense countering targeted attacks . in toronto, albania, policemen were at the founder and ceo of pen g, a wire group, a geopolitical consultancy, and geneva defined to get chief executive officer of cyber peace institute. the font has lead projects to counter cyber crime and online terrorism. a warm welcome to you all. thanks for joining us today on inside story. richard, let me start with you today. i just like to take a step back for a moment and ask you to explain to our viewers what exactly constitutes a ransomware attack and how it works. yeah, it's pretty straightforward. a attacker find some vulnerability inside the network
2:37 pm
ground somebody's computer, infects it, and downloads tool, the ransomware software itself that encrypts the complete hard drive making without a key that you know about. so it makes it impossible to get access to your data if it's spread throughout a large network, like calling your pipeline can shut down all of the office systems of an organization. and then the attacker demands ransom usually right on the screen of the infected computer. and they say pay us x amount in fairly untraceable crypto currencies and we'll give you the key to decrypt your hard drive. and it's as simple as that, but it's devastating policeman. until recently, the u. s. was treating ransomware as more of a criminal problem or a criminal act. it seems that the thinking on that really changed, especially after this colonial pipeline attack. and also this attack that happened over the 4th of july weekend. is it now the case that the u. s. is treating
2:38 pm
ransomware and ransomware attacks is more of a national security threat. it seems to mohammed, but i think the main point to stay here is that shouldn't, it shouldn't take a seismic cyber type. so the u. s. government to reassess the priority when it comes to cyber. the us government has no for a long time. the people are always growing. it's becoming cheaper and more accessible to anyone who wants to learn how to use it. and they can cause devastating repercussions for the actions that they take. so this is, i think it's a little bit too late, but hopefully not too little in terms of their reaction to the cyber types. savant, how difficult is it to deter ransomware attacks it leads to the complexity of the change because of the read, some was a very simple type of attack, the normal actors. but i'll be quite numerous. we saw in the very same time that
2:39 pm
the ransomware business model, he showed me to this evil from a one criminal group. you bring the whole criminal chain to the he sliced against in between criminal groups. you know, that's what i want to pull targets in a very recent case. it's wrong with specifically specialized into finding one of the team system to make the intrusion and using another criminal group affiliation program in order to deploy the run some way. so the question of the parents, it's about the responsibility of states to reduce the space between all the benefits today in order to leaving the broad infinity in cyberspace because it's human mis here. i mean, you know, there's not these guy know who the, that is hiding behind a computer, cyber crime as a whole and cybersecurity responsibility of states. and that will be modern for
2:40 pm
maneuver to make this a successful difference company. richard, president biden has warned president, and yet again, demanding that russia do more to crack down on, you know, cyber warfare and ransomware attacks. we've been down this road before, but if the u. s. now decides to actually retaliate against russia, what exactly can it do? what does a retaliation look like? how does it play out and can russia then just escalate all of this and can it get worse? yes, to that last question. and that's the trouble with retaliation. but obviously, president biden has a diplomatic options. he even has military options as it's been over 10 years that the military has been kind of granted the ability to respond with
2:41 pm
kinetic attack against cyber attack, which they probably would. ready in certain limited cases, in this case, it sounds like president biden is threatening of cyber attack that would be in kind and proportional the us government has tremendous cyber capabilities. and one of the dangers of using those say, per cape of cyber capabilities is they might be using some 0 de vulnerabilities that they've researched or developed themselves. and as soon as they use them, the victim has copies of it and can reverse engineer it and turn it around and use it as a weapon against their own victims. so it's very dangerous to use some of those technologies which i think explain some of the reticence of the tellers community in the military and using these cyber weapons. so. ready it might take longer
2:42 pm
to create a cyber weapon that reuses ruskin, capabilities. so they're not giving away anything new. and they turn around and use those things to conduct some sort of disruptive attack. policemen, what are some of the ways that countries around the world can engage in cyber warfare these days? think it's very easy to paint it all with one brush as riches that in the past definition of different varieties. but also companies have abilities to protect themselves against cyber attacks. and also individuals themselves are always developing new ways in which in which to use cyber in their arsenal of, of attack. so when it comes time to understanding the cyber landscape is what is easiest thing, cyber attacks as one title. there's so many different ways in which cyber can be used to be, we're unaware, spyware, etc. and to really, to get this done, i think it takes someone who do is defending their architecture through to understand it more so than the attacker who can just find one weakness in the defenses of their target to really close. not damage so far when we're talking
2:43 pm
about ransomware, we're not talking just about cyber criminals. we're also talking about an industrialized business these days, right? i mean, how sophisticated are these groups and how sophisticated are there operations? so the recent history of the rent showed the continuous innovation in the criminal model and war from the experts in crib consistent. you know that we're old, the victim that we came to random and then it was not enough. so long side you take, there was interested in the system just before blocking everything, steaming all the data. so that was not being there wasn't the 2nd level of the black mail. if you don't be, we are going to make sure that your data would be like next on the internet. and we seen a nother very dark innovation, which is the data that the stolen. they are used,
2:44 pm
targeted black males to each and every victim. that in fact, of their own data as part of the system that was targeted, we set up certainly who in finance where patients organic. so their data stolen by criminal, each one of them was completed by the criminal not to say how you bade. i'm going to put your life your conversation, we psychologist all that on the internet. so it's quite a complicated business model to your point before any state policy, any state foreign policy should start and end looking at the human cost of a duck. so any dream that escalation, that issue is going to have the parents is just the dream because at the end of the day, escalation would only lead to sophistication of attack and will continue to of the want to that even more when you and i, everyone that is using the richardson i was just talking about the business model
2:45 pm
of these ransomware criminals. as i understand it, they usually demand payment in crypto currency. and so i want to ask you, if that makes this all much harder to trace. yeah, completely and that's very affect the, you know, the cause of the surgeon ransomware attacks was the availability of almost random way of getting paid. so in the past, ransoms were demanded with. ready wire transfers in western union, things like that. they're ultimately, you know, we're because of money laundering. we're very traceable. and in 2009, we saw the 1st ransomware using bitcoin. and now there are different versions of a couple of currencies that are even less traceable when big coin it. so it's definitely in the driver of all of us. policemen, if we're now at a moment where we are seeing countries start to shift their attitudes and treat
2:46 pm
cyber criminals more as threats to national security or even potentially terrorists . what legal avenues are available to these countries? how can they go after them going forward? that's a very good question and then i think what was missing so far, the simulation with the legal aspect, because any action that a nation state takes, they need to consider the legal ramifications. and russia, i think, has for me, some of the best legal scholars because they're able to cause a lot of damage and do a lot of things which is in degrees on of, of the law. so for a nation which is being attacked, they're able to use the same methods that have been used on them to bring that guilty nation back in line with international law. but the issue is, is actually finding what the, what law they broke in order for them to retaliate our way. because we can't find a legal basis for their retaliation. the best they can use our torsion techniques,
2:47 pm
for example, sanctions or expending drugs, which is what the us and europe have been doing towards russian, russian attackers for a long time. so it's the legal basis. what laws are they broken specifically? and when that that comes their legal, i've been if you through then respond to that attack, what becomes even more difficult is building coalition to say yes, this is what i, what this is what has happened. and this is what we're going to do and respond back to you. this is very difficult to bring a consensus together and talk in manual which was created and i think in 2007, 8. and it was updated recently explains the legal basis for cyber attacks, outer space attacks and, and other legal agree zones which nation states and companies are facing in the modern world. so let me ask you the same question. what are the legal avenues available to countries around the world to deal with this? and also, are we going to start seeing more of a global and coordinated effort to counter the threat posed by ransomware?
2:48 pm
i think it was the question the, there's not forget that the cyber just mean to an end. so if you're there just cyberg ability is happening in the context of the conflicts economic conflict between states. then the roles that are very well known and doors, but international community applies international military law, charter trust, international law, and so on. there's also some specific convention in the context of cyber crime that exists. some states i need some did not put up its convention and you have this body of unknowns because even recently again of the united nation that you're all going to be working group, which is also explaining quite clearly dictation in terms of behavior that should be predictable and very transparent by so a lot of the problems that wife attacks. oh,
2:49 pm
exploding i would say the speed of, of lights in the community can not even react. no, a dispute overload. so even in the body over there is put in place. what, what is that to be done is more a acceptance by states that they are comfortable that they come to be in for the bridge that did take the loaded the b to there should be going to be today. the problem is that when doesn't a duck, there's not this body of knowledge that would be available for the victim. because again, we think that the business to choose the bottom is the victim. that what that person to understand or have been at that and the body of luck in research, we know that to get 3 pair altogether. just this is that one. and this is information that can use in other to seek redress. and this is absolutely amazing. richard, you know, this attack that occurred over july, 4th weekend, the targeted this american ip from i believe the company was based in florida. you know, this crippled nearly 1500 businesses around the world that is staggering to think
2:50 pm
about. i'm curious to get your thoughts on how much americas cyber defense is, whether it, whether it comes to, you know, private enterprises or whether it comes to government institutions actually need to be beef up beefed up right now and how vulnerable as the country from cyber attack it feels like i've been beating this job for at least 20 years, and most people in the security industry feel the same way. it's we keep telling you what to do and you don't do it. and i think it's just because that, you know, of business managing somebody else's id is just not aware of, of all the dangers to them. and can say in, in the united states have a piece of software that was completely vulnerable in several researchers had pointed that out over the years, including a group in the netherlands. and those on abilities were used in a very targeted and campaign that occurred. of course, friday of
2:51 pm
a 3 day holiday in the united states. so people won't be able to react quickly enough to it. so i think that's the, yes, everyone's vulnerable, of course, is not the united states of brown's as united states is the most, you know, connected to the internet and realize the most news driving the most benefit from technology. right. in the end, there's millions of companies sort of moved to using the internet and the web and interacting with customers, especially pose coded working with their employees remotely. so the vulnerability exposure just increases constantly and grows as fast as everybody's economies have been growing since the late 1900 ninety's. so we're just wide open and it's something we have to learn to live with. chrisman is the cybersecurity industry stretched far too thin right now, and if so, what are the implications of that? sure. i think the thing to keep in mind is that not every company has the same
2:52 pm
capabilities, financially know, so in terms of their knowledge base to deal with the cyber attacks. you know small, medium sized enterprises, especially now the covert are barely getting by as it is. so add onto that side because cyber regulation and cyber per preparedness, which is not going to not develop as an industry unto itself, which is it is currently developing probably to the size of a money laundering legislation and, and checks if you see cyber becoming an industry to itself, which it is cost for businesses are going to rise, which means that bottom lines are going to be squeezed, which means they're going to be under a lot more pressure and stress, especially now during cold we, we don't know when this is going to end so it's costs are a big thing, it's also their knowledge is also another big thing and also bigger firms. and now think about how to defend against them, which is going to cost the money. but the good thing that's coming out of this is that the governments are waking up more and more so slowly or b as we can a more more so to helping the private sector and combat cyber types. although if
2:53 pm
you austin cyber criminals, they said that nothing would turn them to just continue being more innovative. and, you know, finding whole the systems as time passed, which is natural or the technology like this it's, it's continuous and it's exponential in its development. so it's going to continue about, and this is only the beginning, the fun i want to get back to the issue of crypto currency for just a moment from your vantage point. how much has the availability of crypto currency contributed to the rise of ransomware attacks? so it's the one of the many accelerate things like that, but not the only one that if i did of course you cannot escape the follow the money trail. he's helping a lot criminal scheme, but just not on the run. some way i would say it's, it's an impact on the why the organized crime ecosystem, but never forget that kind of innovation. again, it's one of the money i've been call these 3 of crime for, for decades. before i read somewhere, before people currencies, there was
2:54 pm
a lot of fantasies that the criminals were moving the money across bank account in the world when we're using cash and very innovative way to use cash or around the world to make sure they would profit from the crime, so we should be careful about this patricia, a way to investigate properly. ransomware would be to have clear capability to get all the money on ring ring for the criminal christian richard. i saw you nodding along to some of what's the phone was saying there, did you want to jump in and add to the point he was making? yeah, i follow the solution, so security solutions and now i am seeing several organizations that are trying to track ranch where wallets, actual long identifiers associated with, with each crypto currency and their co lading widths. anybody who is attacked by ransomware shares say this wallet is the one that, that they want me to pay into. and by that they're kind of doing a broad,
2:55 pm
broad based analysis of where all the money is flowing. because eventually, you know, each crypto wallet that's used is emptied and put into a bigger one, and that's probably the one that belongs to the cyber criminals. so there's technology coming to bear to hope to locate and identify the people who are controlling berg, ransomware attacks, stuff on it, look like you want to jump in as well. did. did you, did you have a reaction? yes, very good point is just me now and make me think about your question before what can state do in terms of exclamation resources, investments in law enforcement in independent justice. you know, to be sure that when criminal innovating and at the same level of innovation when it comes to enforcement and just, it's not something that is coming from the author. point of view of how to make instigation. but i mean, the right resources for the entities, don't portsmouth,
2:56 pm
and just out there to protect the policeman from your vantage point. what are the concrete steps that need to be taken to stop cyber criminals and to contain this threat to global cybersecurity? i think containing a threat like this is an illusion because we've opened, we've all competitors box when it comes time to these kinds of technologies and the more nation for money behind it, the more cyber criminals are going to have knowledge of how to say how to overcome these kinds of cash. i don't think we've seen something of this magnitude globally ever before in our human existence. where with very simple means one after and was a lot of damage, non physical damage to, to an industry, to, to, to security, to energy, energy assets accept. so this isn't something that can become contained as such. i think this is something that can be monitored and protected against incrementally as time passed, but a sort of
2:57 pm
a silver bullet 30 nip it in the bud isn't going to be available anytime soon because technology will continue to hold. actors are going to continue to grow, it's going to become cheaper, and it's going to be more of a headache for government and also for corporations as time passes. all right, we've run out of time, we're going to have to leave the conversation there. thanks so much, all of our guests, richard steen and policemen were at the and it's defined to got and thank you to for watching. you can see this and all of our previous programs. again, anytime by visiting our website, i'll just here a dot com and for further discussion, go to our facebook page at facebook dot com forward slash ha, inside story. you can also join the conversation on twitter. our handle is at a g inside story. for me, mohammed jim, jim, and the whole team here. bye for now. the news ah,
2:58 pm
ah. ah, vaccines a promising pause out of the sun demik, but implementing the greatest inoculation in history, it's testing the global community around the world. already a clear gap has emerged between rich nations and poor ones when it comes to vaccinating their populations from the geo politics to the pure economics. the misinformation, the latest developments, what's going on here is very different. first stop, the vaccine comes in the form of a nasal spray, especially coverage of the colona virus pandemic on a jessina. when a war crime is committed, is it coming to the how does it follows that goes in human rights investigator, on his unprecedented journey to the french high court?
2:59 pm
i says it every place to make sure that to bring its context, taking on the arms trade in his fight for justice, for innocent palestinians, and their families made in france on all disease. escaping a war, siding a new identity, confronting the reality of racism, religion and the struggle to be accepted, al jazeera, tells the story of what it's like to be lebanese, and call us trailer home. once upon a time and punch bowl on al jazeera, a lot of the stories that we cover a highly complex. so it's very important that we make them as understandable as we can to as many people as possible, no matter how much they know about a given crisis or issue. in this area,
3:00 pm
the smell of death is overpowering. as i'll just recall respondents, that's what we strive to do. play an important role checking. ringback in i am can vanelle and will help develop stories on al jazeera accord. and jordan has sentence to form officials for an alleged plot against the monarchy. former oil court chief and finance minister, bottom dollar was given 15 years hard labor sharif us on bons, i. it's a member of the world family, 50 news, the verdict center ontologies of attempting to the stabilize the kingdom, and involving a former to the throne for some one and been disputed. miller regarding the 1st criminal bass.

19 Views

info Stream Only

Uploaded by TV Archive on