106
106
Oct 12, 2014
10/14
by
CSPAN
tv
eye 106
favorite 0
quote 0
you're working on these untrusted machines on this untrusted network. that doesn't make it impossible, but it means you need to be going through each and every step on this untrusted stuff and say how can we get it trustworthy enough so that it's as least as trustworthy as the paper of the stuff it's going to replace. that can become a very difficult spot, especially when the manufacturers of this gear aren't always as nice as d.c. was. they put it up online so it could get tested. when it got hacked, they did not try to go to prosecutors. they said maybe in fact it is not ready for prime time. >> part of the issue here is that we are trying to solve a problem in a very small scale and it has to operate in a very large scale. we have different types of elections. we have federal, state, and local, and each has its own specific needs and requirements. when you're looking at a microcosm of a local election, it's easy to see how electronic voting, online voting could potentially work. but it doesn't scale to a state or large u.s. kind of national election.
you're working on these untrusted machines on this untrusted network. that doesn't make it impossible, but it means you need to be going through each and every step on this untrusted stuff and say how can we get it trustworthy enough so that it's as least as trustworthy as the paper of the stuff it's going to replace. that can become a very difficult spot, especially when the manufacturers of this gear aren't always as nice as d.c. was. they put it up online so it could get tested. when it got...
78
78
Oct 9, 2014
10/14
by
CSPAN
tv
eye 78
favorite 0
quote 0
you're working on these untrusted machines on this untrusted network.that doesn't make it impossible, but it means you need to be going through each and every step on this untrusted stuff and say how can we get it trustworthy enough so that it's as least as trustworthy as the paper of the stuff it's going to replace. that can become a very difficult spot, especially when the manufacturers of this gear aren't always as nice as d.c. was. they put it up online so it could get tested. when it got hacked, they did try to go to prosecutors. they said maybe in fact it is not ready for prime time. >> part of the issue here is that we are trying to solve a problem in a very small scale and it has to operate in a very large scale. we have different types of elections. we have federal, state, and local, and each has its own specific needs and requirements. when you're looking at a microcosm of a local election, it's easy to see how electronic voting, online voting could potentially work. but it doesn't scale to a state or large u.s. kind of national election. the
you're working on these untrusted machines on this untrusted network.that doesn't make it impossible, but it means you need to be going through each and every step on this untrusted stuff and say how can we get it trustworthy enough so that it's as least as trustworthy as the paper of the stuff it's going to replace. that can become a very difficult spot, especially when the manufacturers of this gear aren't always as nice as d.c. was. they put it up online so it could get tested. when it got...
38
38
Oct 27, 2014
10/14
by
CSPAN3
tv
eye 38
favorite 0
quote 0
so once again, the uavs should not be sitting there with untrusted software on them, with untrusted operating systems. they should be loaded for that specific mission at the time of the mission, from a strong root of trust. the people flying the uavs and controlling them should have their identity authenticated into that system so that they can move the uavs over to the areas of interest. then the ground forces will have some device that is also built from a strong root of trust. so that they can receive the realtime video they need to conduct their mission. and in the end, all of those systems will come back, they'll get wiped clean, they'll be given new identities, and once again, that system is essentially disposed of. never used again. so this is a concept that would be very frustrating to an adversary. imagine them spending their time mapping, trying to find holes. maybe they actually identified some. but the next time they come back to take advantage of that, that system's no longer there. so how do we get there? how do we move from the react and chase model to this proactive disposable
so once again, the uavs should not be sitting there with untrusted software on them, with untrusted operating systems. they should be loaded for that specific mission at the time of the mission, from a strong root of trust. the people flying the uavs and controlling them should have their identity authenticated into that system so that they can move the uavs over to the areas of interest. then the ground forces will have some device that is also built from a strong root of trust. so that they...
107
107
Oct 19, 2014
10/14
by
ALJAZAM
tv
eye 107
favorite 0
quote 0
there is deep, deep untrust between the parties. as far as i know, there are a number of mps from both sides trying to find a solution, and the biggest or the most important day that earn is awaiting is the ruling of linian constitutional court on sessions held in tobruk no one nose the future. >> we'll leave it. thank you. >> medical and security sources in egypt say six security force perm have been killed by a roadside bomb in the sinai peninsula. the bomb exploded as part of a security patrol >>> al jazeera demand the release of its journalists in egypt. peter greste, mohamed fadel fahmy and baher mohamed have been in prison now for 295 days. they are falsely accused of helping the muslim brotherhood, and are appealing against their convictions >>> one of the legacies of the u.s. war in iraq and afghanistan is the high survival rate of troops injured in combat. they are having to deal with physical and psychological injuries requiring more than treatment. rosalind jordan has this report. >> reporter: once upon a time this man di
there is deep, deep untrust between the parties. as far as i know, there are a number of mps from both sides trying to find a solution, and the biggest or the most important day that earn is awaiting is the ruling of linian constitutional court on sessions held in tobruk no one nose the future. >> we'll leave it. thank you. >> medical and security sources in egypt say six security force perm have been killed by a roadside bomb in the sinai peninsula. the bomb exploded as part of a...
262
262
Oct 23, 2014
10/14
by
FOXNEWSW
tv
eye 262
favorite 0
quote 0
in a piece for the atlantic, she notes that digital tools are aiding the unfaithful and the untrustingshe describes sneaking and spying apps as a, quote, arms race of infidelity-themed weapons aimed at the consumer's heart. they call from certain contexts. while find my iphone can be used to track spouses suspected of cheating. i can bench press 300 pounds. are you a snooper or sneaker? >> i suck at lying so i am a snooper. i will do research on my husband. >> your husband is no where around. do you look at his stuff? >> all the time. >> what do you find? >> nothing. >> so he has the other technique? >> he is either really good or very faithful and i think it is the latter. >> he put a lot of money into that oculous wrist thing. >> we got such a nice check and i thought great for christmas. >> how do people cheat before these apps? >> the american way. they had a sidepiece. if you can't cheat -- the terrorists are winning. this is america. you should be allowed. >> at least what? >> i don't know. i don't think my husband -- we are both sort of over it. >> you know when you get what you
in a piece for the atlantic, she notes that digital tools are aiding the unfaithful and the untrustingshe describes sneaking and spying apps as a, quote, arms race of infidelity-themed weapons aimed at the consumer's heart. they call from certain contexts. while find my iphone can be used to track spouses suspected of cheating. i can bench press 300 pounds. are you a snooper or sneaker? >> i suck at lying so i am a snooper. i will do research on my husband. >> your husband is no...
39
39
Oct 21, 2014
10/14
by
CSPAN2
tv
eye 39
favorite 0
quote 0
so once again, the uavs should not be sitting there with untrusted software on them, with untrusted operating systems. they should be loaded for that specific mission at the time of the mission from a strong root of trust. the people flying the uav and controlling them should have their identity authenticated into that system so that they can move the uav over to the area of interest. and then the ground forces will have some device that is also built from a strong root of trust so that they can receive the realtime video they need to conduct their mission. and in the end, all of those systems will come back, they'll get wiped clean, they'll be give new identities, and once again, that system is essentially disposed of, never used again. so this is a concept that would be very frustrating to an adversary. imagine them spending their time mapping, trying to find holes. maybe they actually identified some, but the next time they come back to take advantage of that, that system's no longer there. so how do we get there? how do we move from the the react and chase model to this proactive, disposa
so once again, the uavs should not be sitting there with untrusted software on them, with untrusted operating systems. they should be loaded for that specific mission at the time of the mission from a strong root of trust. the people flying the uav and controlling them should have their identity authenticated into that system so that they can move the uav over to the area of interest. and then the ground forces will have some device that is also built from a strong root of trust so that they...