81
81
Mar 12, 2016
03/16
by
KQED
tv
eye 81
favorite 0
quote 0
cyber command's mission. we knew when we first created this construct that the two will be closely linked and aligned. the question that will play out over time is that alignment optimized with one individual doing both jobs. we'll see how that plays out. for now, my input has been given the maturity of cyber command, the strategic choices we made when we created cyber command by making it dependent and reliant in some ways on the capacity of the abilities of n.s.a. to help it do its mission, i don't think right now is the time to separate the two. >> rose: turning to n.s.a., how has it changed since edward snowden's disclosures? >> it's certainly made the mission more difficult. you know, nation states, groups, actors now have a greater sense of our capabilities, have a greater sense of what we focus on. we've watched that play out particularly in the counterterrorism arena and i've publicly said that before, that's probably where we've seen the greatest change in terms of target behavior, and you can trace
cyber command's mission. we knew when we first created this construct that the two will be closely linked and aligned. the question that will play out over time is that alignment optimized with one individual doing both jobs. we'll see how that plays out. for now, my input has been given the maturity of cyber command, the strategic choices we made when we created cyber command by making it dependent and reliant in some ways on the capacity of the abilities of n.s.a. to help it do its mission, i...
43
43
Mar 15, 2016
03/16
by
BLOOMBERG
tv
eye 43
favorite 0
quote 0
cyber command. last month, the agency announced it would consolidate its offensive and defensive operations. a colonel said last week that isis would accelerate attacks on networks. i am a pleased to have admiral mike rogers at this table. thank you for being here. what did secretary carter mean when he said he would accelerate the digital effort against isis? >> he has publicly acknowledged that we are flying cyber capabilities against isis in iraq. the a publicly acknowledged we are adding cyber as another tool in the broad set of capabilities we are trying to ring together for the fight against isis. charlie: can you explain to me how cyber tools can be used in fighting isis. what are you talking about? adm. rogers: you could view it capability if he wanted to -- we will talk about it much more broadly, as opposed to specifics -- you could use cyber as a tool, how much you have an impact on social media efforts. how much you have an impact on the ability of a group to communicate. just as we, for
cyber command. last month, the agency announced it would consolidate its offensive and defensive operations. a colonel said last week that isis would accelerate attacks on networks. i am a pleased to have admiral mike rogers at this table. thank you for being here. what did secretary carter mean when he said he would accelerate the digital effort against isis? >> he has publicly acknowledged that we are flying cyber capabilities against isis in iraq. the a publicly acknowledged we are...
50
50
Mar 20, 2016
03/16
by
CSPAN2
tv
eye 50
favorite 0
quote 0
oh, it's cyber, cyber. and yet, as i was just saying a bit, a few minutes ago, nobody knows what they're doing. there's no concept of deterrence, there's no concept of what happens on the second day of the cyber war. so you have this whole machinery, and it's all incredibly classified. this machinery growing up, and you're going way advanced in the technology field before even the finished layer of policy and strategy have been really cemented onto the foundations. so that's kind of a dangerous thing. >> i'd love to dig into this, but i -- the gentleman in the middle, and then i think there was a gentleman over here. >> you answered my question -- [inaudible] >> oh, okay. [laughter] >> then gentleman in the white shirt. >> hi, david spencer, georgetown student and army officer. so what do you propose we do to respond to strategic-level cyber attacks, and that was it. >> well, what do you mean by strategic-level cyber attacks? >> so an actual cyber attack rather than cyber espionage -- >> on what? >> so stra
oh, it's cyber, cyber. and yet, as i was just saying a bit, a few minutes ago, nobody knows what they're doing. there's no concept of deterrence, there's no concept of what happens on the second day of the cyber war. so you have this whole machinery, and it's all incredibly classified. this machinery growing up, and you're going way advanced in the technology field before even the finished layer of policy and strategy have been really cemented onto the foundations. so that's kind of a dangerous...
81
81
Mar 14, 2016
03/16
by
BLOOMBERG
tv
eye 81
favorite 0
quote 1
cyber command. last month, the agency announced it would consolidate its offensive and defensive operations. a colonel said last week that isis would accelerate attacks on networks. thank you for being here. meandid secretary carter when he said he would accelerate the digital effort against isis? he has publicly a knowledge -- we have publicly acknowledge that we are adding cyber as another tool. in the fight against isil. charlie: can you explain to me can be used in .ighting isis it. rogers: you could view as a capability -- we will talk about it much more broadly, as opposed to specifics -- you could use cyber as a tool, how much you have an impact on social media efforts. how much you have an impact on the ability of a group to communicate. time,s we, for a long have used traditional, connecticut-based -- kinect-bas ed facilities, cyber offers us similar kinds of capabilities. charlie: it seems to me that in the fight against isis, it is all in. adm. rogers: no doubt about that. you are seeing
cyber command. last month, the agency announced it would consolidate its offensive and defensive operations. a colonel said last week that isis would accelerate attacks on networks. thank you for being here. meandid secretary carter when he said he would accelerate the digital effort against isis? he has publicly a knowledge -- we have publicly acknowledge that we are adding cyber as another tool. in the fight against isil. charlie: can you explain to me can be used in .ighting isis it. rogers:...
41
41
Mar 1, 2016
03/16
by
CSPAN2
tv
eye 41
favorite 0
quote 0
with respect to cyber, i think you're referring to our use of cyber, which we have talked about generallyn the counter-isil campaign, particularly in syria, to interrupt, disrupt, isil's command and control, to cause them to lose confidence in their networks, to overload their networks so they can't function, and do all of these things that will interrupt their ability to command and control forces there , control the population and the economy. so, this is something that is new in this war, not something that you would have seen back in the gulf war, but it's an important new capability and it is an important use of our cyber command, and the reason cyber command was established in the first place. >> mr. secretary said we had both an increase in quantity and quality. on the quantity side, the operation at mosul much bigger than ramadi and the training of the forces going to conduct operations in mosul has already started. so, we're already working with them. i think back to the theme of lessons learned, like afghanistan. we look at ramadi. we worked with the iraqis very closely to take
with respect to cyber, i think you're referring to our use of cyber, which we have talked about generallyn the counter-isil campaign, particularly in syria, to interrupt, disrupt, isil's command and control, to cause them to lose confidence in their networks, to overload their networks so they can't function, and do all of these things that will interrupt their ability to command and control forces there , control the population and the economy. so, this is something that is new in this war,...
55
55
Mar 1, 2016
03/16
by
CSPAN3
tv
eye 55
favorite 0
quote 0
and it is an important use of our cyber command and the reason the cyber xhcommand was established. >> mr. secretary said we would have an increase in quality and quanti quantity. the operation of mosul bigger than ramadi. the training of the forces has started. we're working with them. i think back to the theme of lessons learned like afghanistan, we look at are a in ramadi. there's a couple things we want to do. we want to position ourselves to most effectively support combined arms for the iraqis as they conduct operations. in the second piece is we want to make sure that we have flow of logistic support. when i make a recommendation to the secretary, it will really -- that's where the qualitative changes would be may. we take a hard look at lessons learned, how do we best posture u.s. forces to enable what is an iraqi operation, but how do we best posture our operations to have effective arms to maintain momentum and to make sure they have the support necessary to continue operations without what we would describe as an operational pause. that's where i think the both qualitative
and it is an important use of our cyber command and the reason the cyber xhcommand was established. >> mr. secretary said we would have an increase in quality and quanti quantity. the operation of mosul bigger than ramadi. the training of the forces has started. we're working with them. i think back to the theme of lessons learned like afghanistan, we look at are a in ramadi. there's a couple things we want to do. we want to position ourselves to most effectively support combined arms for...
94
94
Mar 18, 2016
03/16
by
CSPAN3
tv
eye 94
favorite 0
quote 1
to cyber attacks. last year the massive breaches at the office of personnel management led to the resignation of the then director as well as release of millions of social security numbers of federal employees and over 20 million security clearance data records stolen. these records have been called the crown jewels of american national intelligence, congressman seth and i had our records stolen as part of a breach and a foreign adversary has them. as a recovering computer sipes major the problem is we have outdated systems in our federal government. they need to be upgraded. some of these systems were written in a language, for example, known as cobalt which is simply not equipped for the 21st century hack attacks but the other problem is you have systems that run across federal agencies. because each agency does their budget individually it is sometimes hard to upgrade a system that runs across the federal government. the administration has proposed and what this amendment does is fulfill their propo
to cyber attacks. last year the massive breaches at the office of personnel management led to the resignation of the then director as well as release of millions of social security numbers of federal employees and over 20 million security clearance data records stolen. these records have been called the crown jewels of american national intelligence, congressman seth and i had our records stolen as part of a breach and a foreign adversary has them. as a recovering computer sipes major the...
156
156
Mar 6, 2016
03/16
by
WJLA
tv
eye 156
favorite 0
quote 0
again, this is not cyber for cyber.his is cyber links to our future combat control systems, the future use of different communication systems, and how we use cyber for that. so, he did it, and for the short-term will be to federate all of the national -- international initiatives, i think. vago: pentagon is working on a third offset strategy to stay ahead of competitors and push innovation. from your standpoint, what should the third offset strategy be, and what is the key to having an integrated command? the strip -- cyber the strategy, as far as i understand from the presentation the strategy, as far as i can understand for the presentation, is how we can use artificial intelligence -- exactly what i talked about when i talked about clouds. it is important for me to continue t see how we can have some kind of synchronization. that is a specific call for a .c.t.. the european union tried to promote the idea of a research and development fund to bringing new research, new ideas, and we do the same in nato. there is a si
again, this is not cyber for cyber.his is cyber links to our future combat control systems, the future use of different communication systems, and how we use cyber for that. so, he did it, and for the short-term will be to federate all of the national -- international initiatives, i think. vago: pentagon is working on a third offset strategy to stay ahead of competitors and push innovation. from your standpoint, what should the third offset strategy be, and what is the key to having an...
122
122
Mar 28, 2016
03/16
by
CSPAN
tv
eye 122
favorite 0
quote 1
with respect to cyber, this is our use of cyber which we have talked about generally. we've tried to interrupt and disrupt isis command-and-control. we want them to lose confidence in their networks. you overload their networks so that they can't do alln print we want to these things will interrupt their ability to command-and-control forces. new.is something that's it's not something you would of seen in the gulf war. it's an important capability and it's an important use of our cyber command. command waser established in the first place. host: bring us up-to-date on this effort. this was a historic admission that they were using offensive cyber case abilities for the larger campaign. that was very much created to do this. we don't have a window into previous operations or using cyber capabilities. this is key. he is pointing out that the future of cyber warfare in connection with other forces looks like this blended effect. they want to disrupt the command-and-control of isis. it's going to be a global organization. it has to be able to communicate on different chann
with respect to cyber, this is our use of cyber which we have talked about generally. we've tried to interrupt and disrupt isis command-and-control. we want them to lose confidence in their networks. you overload their networks so that they can't do alln print we want to these things will interrupt their ability to command-and-control forces. new.is something that's it's not something you would of seen in the gulf war. it's an important capability and it's an important use of our cyber command....
39
39
Mar 25, 2016
03/16
by
CSPAN
tv
eye 39
favorite 0
quote 0
the challenge we face in investigate cyber crimes is that cyber criminals often think it's a freebieto reach into the united states to do harm and steal what matters to us and we. they are halfway around the world and trying to use anonymous asian techniques -- ization techniques. no matter where they are we will try to reach them. and a matter how hard they work to hide their identity and their tradecraft we will find ways to pierce that shield and identify them. that is the message of this case. that is what it is so important we bring this case. i want to say thanks to the men and women of the fbi who worked very hard on this for a number of years across the country. what is also interesting about this case is we did virtually. we used the new york field office, cincinnati's, chicago, san francisco in phoenix. all working together we found a reasonably good u.s. attorneys office to work with. and together those offices contribute into a single effort impose charges on people who thought before this it was a freebie. i went to thank the u.s. attorney's office and the national secur
the challenge we face in investigate cyber crimes is that cyber criminals often think it's a freebieto reach into the united states to do harm and steal what matters to us and we. they are halfway around the world and trying to use anonymous asian techniques -- ization techniques. no matter where they are we will try to reach them. and a matter how hard they work to hide their identity and their tradecraft we will find ways to pierce that shield and identify them. that is the message of this...
371
371
Mar 12, 2016
03/16
by
KQED
tv
eye 371
favorite 0
quote 0
. >> rose: the fight against isis has moved into cyber space.h, the pentagon cyber warriors began attacking the communications capabilities of jihadists defending the city of mosul. admiral mike rogers is the commander of cyber command and also the director of the national security agency. >> we have publicly acknowledged that we are adding cyber as another tool in the broad set of capabilitiecapabilities that weg to bring together, both as department of defense, and as a nation, in the fight against isil. >> rose: how would you characterize not just social media but cyber? >> they clearly nnd understand the power of information. they clearly have applied that knowledge and insight as part of a broader strategy. there are a whole lot more than activities we see on the battle field, so to speak, in terms of the physical domain. we pay great attention watching to see how does their capability with respect to how they employ cyber capabilities, how does that change over time? that has not been a significant issue to date. but oftentimes, i'm asked
. >> rose: the fight against isis has moved into cyber space.h, the pentagon cyber warriors began attacking the communications capabilities of jihadists defending the city of mosul. admiral mike rogers is the commander of cyber command and also the director of the national security agency. >> we have publicly acknowledged that we are adding cyber as another tool in the broad set of capabilitiecapabilities that weg to bring together, both as department of defense, and as a nation, in...
41
41
Mar 9, 2016
03/16
by
CSPAN2
tv
eye 41
favorite 0
quote 0
you read about the cyber attack on the power grid system in ukraine. you look at the potential of solar storms and geo- magnetic disturbances. look at north korea. i'm concerned about around. these threats are real. i guess can you just talk about, across the board the infrastructure, particularly particularly the electrical grid which is the number one, electricity's go down and lights go out, were in a in a world of hurt and we have these massive power transforms. doctor garwin, he is a real national treasure. he referred to him as one of the true geniuses he ever met. can you speak to me on what the department has done in terms of the charger were given based on the 2008 commission on critical infrastructure, particularly electrical grid where we had on that? better than we were but there's more to do. i don't agree with everything in ted koppel's book, but i think he was right to put a spotlight on the issue. since the earthquake in japan in 2012 there were a lot of lessons learned for u.s. government and private sector critical infrastructure. sin
you read about the cyber attack on the power grid system in ukraine. you look at the potential of solar storms and geo- magnetic disturbances. look at north korea. i'm concerned about around. these threats are real. i guess can you just talk about, across the board the infrastructure, particularly particularly the electrical grid which is the number one, electricity's go down and lights go out, were in a in a world of hurt and we have these massive power transforms. doctor garwin, he is a real...
208
208
Mar 24, 2016
03/16
by
CNBC
tv
eye 208
favorite 0
quote 0
the challenge we face in investigating cyber crime is that cyber criminals often think that it's a freebeehe united states to do harm, to steal what matters to us, to wreak havoc. they think it's a freebee because they're halfway around the world and trying to use non mization techniques. the message of this case is that we will work together to shrink the world and impose costs on those people, so that no matter where they are, we will try to reach them, and no multihow hard they work to try to hide their identity and trade craft, we will try hard to pierce that shield and identify them. that's the message of this case. that's why it's so important that we bring this case. i want to say a word of thanks to the men and women of the fbi who worked very hard on this for a number of years across the country. what's also interesting about this case is that we did it virtually. we did the new york field office, cincinnati, chicago, san francisco and phoenix, all working together. we found a reasonably good u.s. attorney's office to work with. and together, those offices contributed to a single
the challenge we face in investigating cyber crime is that cyber criminals often think that it's a freebeehe united states to do harm, to steal what matters to us, to wreak havoc. they think it's a freebee because they're halfway around the world and trying to use non mization techniques. the message of this case is that we will work together to shrink the world and impose costs on those people, so that no matter where they are, we will try to reach them, and no multihow hard they work to try...
41
41
Mar 5, 2016
03/16
by
ALJAZAM
tv
eye 41
favorite 0
quote 0
but it's an important new capability, and it's an important use of our cyber-command and the reason cyber-expand was established in the first place. >> reporter: carter gave few details about the new cyber-offensive except to say cyber bombs overloaded its computer systems so they can't function, which in turn would cause a loss of confidence in its networks and limit i.s.i.l.'s ability to spread propaganda. >> we have to attack their command and control, one of the ways to do it. >> physically and virtually limit i.s.i.l, limit their abilities to conduct operations locally and tactic le. >> not much different than friendly force he are doing ton ground, just as in northwest syria, where be al shazazi was captured. carter says it also gains valuable intelligence. >> as our partners take control of shadadi, i brief we'll learn a lot more about i.s.i.l.'s criminal networks, enterprise and what it does to sustain them. >> we're trying the gain control of i.s.i.l. and trying to stay a step ahead of them. >> iraqi troops prepare to take back mosul. the deployment of apache attack helicopters when he
but it's an important new capability, and it's an important use of our cyber-command and the reason cyber-expand was established in the first place. >> reporter: carter gave few details about the new cyber-offensive except to say cyber bombs overloaded its computer systems so they can't function, which in turn would cause a loss of confidence in its networks and limit i.s.i.l.'s ability to spread propaganda. >> we have to attack their command and control, one of the ways to do it....
34
34
Mar 8, 2016
03/16
by
CSPAN2
tv
eye 34
favorite 0
quote 0
part of this is going to be do we have to look at cyber, do we have to have cyber reactions to cyber actions. or can we integrate cyber into how we think about things. it's very sensitive and tightly controlled as it should be given the repercussions that could come back not just on the defense but also on the society at large. working through these these issues is important from a theoretical perspective but that has to be coupled with what you can akin to to understand how you want to look at it in theory. >> tony, back there in the back. >> tony with bloomberg news. how does your vision of a we have to be able to do it all square with the looming as the next in administration has to start playing for 2021. howdy square those two? how much money roughly will the next ministration have to pony up or have to fight starting in 2021 just to in 2021 just to pay for the nuclear modernization upgrade, the bf 35 ramp up, be 21, how do you square your two goals that we have to do it all yet we have to navigate? >> great question. just one clarification for the group, this future years defen
part of this is going to be do we have to look at cyber, do we have to have cyber reactions to cyber actions. or can we integrate cyber into how we think about things. it's very sensitive and tightly controlled as it should be given the repercussions that could come back not just on the defense but also on the society at large. working through these these issues is important from a theoretical perspective but that has to be coupled with what you can akin to to understand how you want to look at...
53
53
Mar 8, 2016
03/16
by
CSPAN
tv
eye 53
favorite 0
quote 0
personneln the new for your cyber ops. how does the budget support implementation of the information sharing legislation enacted in the last year we worked on it together? support the budget that? sec. johnson: the short answer is further investments in maintaining technology and building upon what we have. investments in the einstein system, further investments in cdm. it specifically authorizes dhs to go into other departments and agencies to detect and block intrusions. that's a good thing that congress gave us the authority to do that because we were finding considerable uncertainty. one of my top priorities for cyber security while i am in office is to have eta in place to lock intrusions across our entire surveillance system and that's one of the legal mandates in the bill. platform forlso a building additional capabilities goingt we are not just after known intrusions but suspected intrusions. there are pilots out there now to that and we need to do that for the future. the funding for additional technology that i t
personneln the new for your cyber ops. how does the budget support implementation of the information sharing legislation enacted in the last year we worked on it together? support the budget that? sec. johnson: the short answer is further investments in maintaining technology and building upon what we have. investments in the einstein system, further investments in cdm. it specifically authorizes dhs to go into other departments and agencies to detect and block intrusions. that's a good thing...
69
69
Mar 24, 2016
03/16
by
WNYW
tv
eye 69
favorite 0
quote 0
is serious about cyber-crime. ernie: thank you for that. joining me with more on the terrorism expert and ceo of the investigative management group. thanks for being here. we both like to deal with progress that we make, all of these things that have been foiled in the past. at the same time, we're dealing with this frightening new frontier of cyber-crime. it's not an easy problem to solve. i know that you're part of trying to look for solutions. how do we deal with this? >> this is a tough one. we both are positive and we both have a lot of good things to talk about when it comes to security, what new york city is doing, what homeland security is doing in the u.s., but cyber-crime is always changing. it's a big threat. it's very difficult to stay ahead of. the fbi director, our homeland security director, they all say this is the biggest threat against the united states. ernie: they've made it a top priority. >> they have absolutely made it a priority. and they're constantly bringing the best people in, the best engineers, trying to build
is serious about cyber-crime. ernie: thank you for that. joining me with more on the terrorism expert and ceo of the investigative management group. thanks for being here. we both like to deal with progress that we make, all of these things that have been foiled in the past. at the same time, we're dealing with this frightening new frontier of cyber-crime. it's not an easy problem to solve. i know that you're part of trying to look for solutions. how do we deal with this? >> this is a...
166
166
Mar 17, 2016
03/16
by
CSPAN3
tv
eye 166
favorite 0
quote 0
we talked about cyber security. we operate only with an opt-in principle. >> so you agree there should be mandatory standards? >> no. i think we're operating with privacy as a very important part of how we implement this. i think we'll continue to work with regulators on what is appropriate. >> i have to say -- i'm not a technology person. i'm a country lawyer from connecticut. if i ask somebody, do you think that that red light means stop and they came back and said, let me put it this way. under these circumstances maybe. we have great respect for stop lines and, et cetera. i would say, the answer is yes, because again the credibility that this technology has will be extremely fragile if people can't trust standards that are uniform and mandatory, not necessarily for you but all the other actors that may come into this space at some point. it's a reason that senator markey and i have introduced this legislation. the private sector, companies can do it voluntarily, i would have more trust in that argument if the an
we talked about cyber security. we operate only with an opt-in principle. >> so you agree there should be mandatory standards? >> no. i think we're operating with privacy as a very important part of how we implement this. i think we'll continue to work with regulators on what is appropriate. >> i have to say -- i'm not a technology person. i'm a country lawyer from connecticut. if i ask somebody, do you think that that red light means stop and they came back and said, let me...
26
26
Mar 14, 2016
03/16
by
BLOOMBERG
quote
eye 26
favorite 0
quote 1
cyber command. last month, the agency announced it would consolidate its offensive and defensive operations. a colonel said last week that isis would accelerate attacks on networks. thank you for being here. meandid secretary carter when he said he would accelerate the digital effort against isis? he has publicly a knowledge -- we have publicly acknowledge that we are adding cyber as another tool. in the fight against isil. charlie: can you explain to me can be used in
cyber command. last month, the agency announced it would consolidate its offensive and defensive operations. a colonel said last week that isis would accelerate attacks on networks. thank you for being here. meandid secretary carter when he said he would accelerate the digital effort against isis? he has publicly a knowledge -- we have publicly acknowledge that we are adding cyber as another tool. in the fight against isil. charlie: can you explain to me can be used in
105
105
Mar 1, 2016
03/16
by
ALJAZAM
tv
eye 105
favorite 0
quote 0
military is touting a weapon in the fight against isil, called the cyber bomb. al jazeera's correspondent is the at the pentagon for more. secretary carter called the cyber offensive an important new capability, and argued that it's one reason in his view the momentum shifted from isil to the u.s. side. >> the military says the u.s.-led coalition whittles away at revenue, support facilities and supply lines. these videos show some of the latest attack against oil and gas facilities controlled by isil in syria. at a pent already news conference deputy ash carter boasted the u.s. is targetting i.s.i.l.'s computer network. >> this is something that is new in this war. not something you would have seen back in the golf war. it's an important capability, and an important use of our assault occasioning actual bodily harmer command and the recent command established in the first place. >> carter gave few details except to say cyber bombs were to disrupt command and control, which in turn will cause a lose of confidence in the network and limit i.s.i.l.'s ability to spr
military is touting a weapon in the fight against isil, called the cyber bomb. al jazeera's correspondent is the at the pentagon for more. secretary carter called the cyber offensive an important new capability, and argued that it's one reason in his view the momentum shifted from isil to the u.s. side. >> the military says the u.s.-led coalition whittles away at revenue, support facilities and supply lines. these videos show some of the latest attack against oil and gas facilities...
130
130
Mar 24, 2016
03/16
by
WNYW
tv
eye 130
favorite 0
quote 0
it's being called a new frontier for cyber-crime. the obama administration announced the arrest of seven scientists with ties to the government for the hacks. the hacks targeted dozens of u.s. banks at the time as well as infiltrating the supervisory control system of the bowman dam. this could have been a catastrophic event except for take a listen to attorney general loretta lynch explain what could have happened at the dam. it was at a press conference this afternoon. >> the dam was undergoing maintenance and had been disconnected from the system. but for that fact, that access would have given this defendant the ability to control water levels, flow rates and outcomes that clearly could have posed a clear and present danger to the public health and safety of americans. >> reporter: one thing to note is none of the hackers have been arrested. iran would never send them to the united states to face justice. officials do say the indictment is important and it signals an increased effort by the u.s. to confront cyber-crime. steve: it
it's being called a new frontier for cyber-crime. the obama administration announced the arrest of seven scientists with ties to the government for the hacks. the hacks targeted dozens of u.s. banks at the time as well as infiltrating the supervisory control system of the bowman dam. this could have been a catastrophic event except for take a listen to attorney general loretta lynch explain what could have happened at the dam. it was at a press conference this afternoon. >> the dam was...
98
98
Mar 7, 2016
03/16
by
CSPAN
tv
eye 98
favorite 0
quote 1
and we also have to look at do we have cyber reactions to cyber actions, or do we look at figuring out how to integrate cyber into how we think about things at large. it is still very sensitive as tightly controlled, as it should be, given the repercussions that could come back on society at large. to these issues is important, from a theoretical perspective. but frankly that has to be coupled with what you can and cannot do to understand how you want to look at it in theory. we have a lot of questions. yes, in the back? vision of weour have to be able to do it all square with the looming next administration in 2021 when they have to start planning for next year? roughly, will, the next administration have to to payarting in 2021 ramp-up,,grades, the how do you square those goals of we have to do it all again we have to manager manage this coming? >> a great question. just one clarification for the group, this year's future years defense plan is the first one in which the real bulk of that nuclear waste is within a planning horizon. this represents the target procurement data for the f
and we also have to look at do we have cyber reactions to cyber actions, or do we look at figuring out how to integrate cyber into how we think about things at large. it is still very sensitive as tightly controlled, as it should be, given the repercussions that could come back on society at large. to these issues is important, from a theoretical perspective. but frankly that has to be coupled with what you can and cannot do to understand how you want to look at it in theory. we have a lot of...
31
31
Mar 24, 2016
03/16
by
CSPAN2
tv
eye 31
favorite 0
quote 0
and i want to say in conclusion, because we saw many of the same conditions, but cyber -- ms. chair -- security is a threat and my discussion with public companies and large private companies they have all their own systems in place so how we coordinate disclosure so we can learn from what happens is important. there are so many issues and appreciate you being in the middle of it. >> mr. yoder. >> madam chair, good to see you again. thank you for your service. there is a pending rule before the commission that would increase the number of firms that would have to register with finra. i am hearing it is overly broad and would require some firms to register with little regulatory benefit. this committee is responsible for oversight of your budget which is why we are here but who is responsible for the oversight of the fin budget? the rulemaking will increase their budget and oversight. how can this committee be sure they are using the resources effectively and efficiently and not creating undo burdens on certain parts of the market? >> the sec does have oversight responsibilitie
and i want to say in conclusion, because we saw many of the same conditions, but cyber -- ms. chair -- security is a threat and my discussion with public companies and large private companies they have all their own systems in place so how we coordinate disclosure so we can learn from what happens is important. there are so many issues and appreciate you being in the middle of it. >> mr. yoder. >> madam chair, good to see you again. thank you for your service. there is a pending...
118
118
Mar 30, 2016
03/16
by
FBC
tv
eye 118
favorite 0
quote 0
that is cyber-crime and it affects each and every one of us.microsoft created the digital crimes unit to fight cyber-crime. we use the microsoft cloud to visualize information so we can track down the criminals. when it comes to the cloud, trust and security are paramount. we're building what we learn back into the cloud to make people and organizations safer. with toothpaste or plain water.an their dentures and even though their dentures look clean, in reality they're not. if a denture were to be put under a microscope, we can see all the bacteria that still exists on the denture, and that bacteria multiplies very rapidly. that's why dentists recommend cleaning with polident everyday. polident's unique micro clean formula works in just 3 minutes, killing 99.99% of odor causing bacteria. for a cleaner, fresher, brighter denture every day. deirdre: attacks and potential attacks on the west are truly a threat to the west. isis targeting new jersey transit officers and edge couraging lone wolves to carry out attacks. they released the names, addre
that is cyber-crime and it affects each and every one of us.microsoft created the digital crimes unit to fight cyber-crime. we use the microsoft cloud to visualize information so we can track down the criminals. when it comes to the cloud, trust and security are paramount. we're building what we learn back into the cloud to make people and organizations safer. with toothpaste or plain water.an their dentures and even though their dentures look clean, in reality they're not. if a denture were to...
103
103
Mar 5, 2016
03/16
by
ALJAZAM
tv
eye 103
favorite 0
quote 0
is this program a smart idea to help strengthen cyber defenses? >> it might be, thousand that you mentioned a moment ago that you have to go through a background check, that was quite interesting. i actually 30 it's a good idea if it complements security testing. in other words, government agencies should use firms that are interruptible and very secured staff, to look for vulnerabilities as well. as a complementary program i fully agree with it. >> so the people who are trying to do this don't actually access. >> can't pay what the private industry can or what some governments are paying. >> well typically bug bounties are kind of low. there's been cases where facebook and google has paid out tens of thousands of dollars. but i'm really curious how much the government will pay out. and also they're going to get tons of people probably submitting security vulnerabilities which are really thought that important, that really can't be exploited. so they're going to be deluged with a lot of people trying collect some cash reward. usually, it's a lot l
is this program a smart idea to help strengthen cyber defenses? >> it might be, thousand that you mentioned a moment ago that you have to go through a background check, that was quite interesting. i actually 30 it's a good idea if it complements security testing. in other words, government agencies should use firms that are interruptible and very secured staff, to look for vulnerabilities as well. as a complementary program i fully agree with it. >> so the people who are trying to...
36
36
Mar 8, 2016
03/16
by
KUSA
tv
eye 36
favorite 0
quote 0
cyber security expert john silio. >> it has shifted the entire cyber criminal world. >> reporter: according to silio roughly 90% of victims affected by ransom ware have paid off their hackers mainly because those victims have no external file back up and no other option for getting their data back. >> in the coming two to three years it will be probably 100% penetration because it's so effective and it's so good at making money. >> reporter: silo says backing up your computer files, not opening suspicious e-mails and keeping your security current is all helpful against hacks >> we're at the tip of the ice burg right now with ransom ware. >> reporter: the tip of the iceburg which could cause you or someone you know to have to make that decision. >>> who's looking like -- or what's looking like another round of stormy weather like this week. >>> doctors from the cleveland transplant. their hoping it will help those who suffer from infertility. doctors implanted a uterus from a deceased donor into the body of the recipient. she'll be taking medication to keep her body from rejecting the organ.
cyber security expert john silio. >> it has shifted the entire cyber criminal world. >> reporter: according to silio roughly 90% of victims affected by ransom ware have paid off their hackers mainly because those victims have no external file back up and no other option for getting their data back. >> in the coming two to three years it will be probably 100% penetration because it's so effective and it's so good at making money. >> reporter: silo says backing up your...
141
141
Mar 19, 2016
03/16
by
CSPAN
tv
eye 141
favorite 0
quote 0
finally, as we talk about cyber cyber security, we are acutely aware of security. meet at the just pay in activities to further improve cyber security threats and coordination across the country. agencies tong with ensure that we meet requirements and leverage open source information protocols. thank you again for the time and opportunity to testify before .he committee >> members of the committee, good afternoon. i as a vice president of government relations for lyft. thank you for the opportunity to testify today on this exciting and important topic. you have the best engineering minds in the world who has made this possible. and you have lyft, a company fitted to bring this technology country.ers across the there are two other components that will determine the future of autonomous vehicles. the first is the interaction of everyday people with these new vehicles. the second is the much more unpredictable interface of the government with this entirely new transportation resource. has a unique exterior in these two areas, and that is where i will focus the technol
finally, as we talk about cyber cyber security, we are acutely aware of security. meet at the just pay in activities to further improve cyber security threats and coordination across the country. agencies tong with ensure that we meet requirements and leverage open source information protocols. thank you again for the time and opportunity to testify before .he committee >> members of the committee, good afternoon. i as a vice president of government relations for lyft. thank you for the...
127
127
Mar 9, 2016
03/16
by
CSPAN3
tv
eye 127
favorite 0
quote 0
the final thing is personnel and cyber. happy to work with you there in terms of what do we need to do. is it trying to get people from the private sector to take a two-year sabbatical and come here, whatever imaginative program we can to track those individuals. i'm very impressed with the individuals, like yourself, like mr. diehl, that really your entire team here. the quality of the federal workforce. these people are patriots. they take their mission seriously about keeping this nation safe, but also understand the constraints. i'm a private sector guy. i know what private sector will pay for talent and you're constrained there. we'll have to put our heads together and figure out what do we need to do -- >> just a couple minutes left in this hearing. we'll leave it here. you can see it in its entirety at our website cspan.org. we'll go live now to capitol hill as five state level environmental protection regulators are testifying at a senate environment and public works committee on federal epa regulations and their im
the final thing is personnel and cyber. happy to work with you there in terms of what do we need to do. is it trying to get people from the private sector to take a two-year sabbatical and come here, whatever imaginative program we can to track those individuals. i'm very impressed with the individuals, like yourself, like mr. diehl, that really your entire team here. the quality of the federal workforce. these people are patriots. they take their mission seriously about keeping this nation...
101
101
Mar 1, 2016
03/16
by
ALJAZAM
tv
eye 101
favorite 0
quote 0
command, and the reason cyber command was established in the first place. >> reporter: he said cyberombs were designed to disrupt isil's command and control by overing load its computer system so they can't function which will limit their ability to spread propaganda. >> we have to attack their command and control. this is one of the ways of doing it. >> if you are trying to physically and virtually isolate isil, limit their ability to communicate, and limit operations. >> reporter: he says the cyber warfare is not all that different from what friendly forces are doing on the ground, such as the capture of a critical training and logistics node for isil. >> as our partners take control of the base, i believe we'll learn a great deal more about the krim call networks, criminal enterprise and what it does to sustain them. >> we're trying to make life difficult for isil, and stay a step ahead of them. >> reporter: carter also said the u.s. would be doing more to back up iraqi troops as they get ready to take back mosul. he said the u.s. would provide capabilities that were offered befor
command, and the reason cyber command was established in the first place. >> reporter: he said cyberombs were designed to disrupt isil's command and control by overing load its computer system so they can't function which will limit their ability to spread propaganda. >> we have to attack their command and control. this is one of the ways of doing it. >> if you are trying to physically and virtually isolate isil, limit their ability to communicate, and limit operations....
84
84
Mar 1, 2016
03/16
by
BLOOMBERG
tv
eye 84
favorite 0
quote 0
we talked to the symantec ceo on cyber threats. victory for apple in a separate but related privacy battle moving to a court in brooklyn, with the judge ruling that the techtarget does not have to help the government unlocked and alleged terrorist iphone. i want to get to our editor for legal coverage to have the latest in new york. first of all, what exactly happened? >> it is the first judge to exhaustively look at this issue. they said the demands were excessive by the government, and has now said this can be to lunch. this will not have a direct on the california terrorism case that will be in the public domain and will influence thinking about it in the higher court where these issues are likely to go forward. emily: how is this case similar and different to the california case? >> we are trying to decide how much security is essential, and does an invention of visual privacy trump that national security -- and does individual security trump national security? it is a drug dealer's iphone. he has been convicted. the terrorism
we talked to the symantec ceo on cyber threats. victory for apple in a separate but related privacy battle moving to a court in brooklyn, with the judge ruling that the techtarget does not have to help the government unlocked and alleged terrorist iphone. i want to get to our editor for legal coverage to have the latest in new york. first of all, what exactly happened? >> it is the first judge to exhaustively look at this issue. they said the demands were excessive by the government, and...
821
821
Mar 11, 2016
03/16
by
FOXNEWSW
tv
eye 821
favorite 0
quote 0
attacks we are going to have to beef up the cyber command. heather: ohio governor john kasich at last night's debate on the need to pressure china to get their help bring in north korea and its leader. south korean officials say the cyber attacks from the north have doubled in the past month and that's on the heels of news that north korea launched two more ballistic missiles at a report from the state broadcaster that claims that kim jong un has now ordered more testing. the us has a big stake in what's happening between those nations. there are roughly 30,000 american servicemen and women stationed in south korea. let's check in with our benjamin hall, he had the latest live from our london bureau. a lot going on in that region. reporter: you mentioned china. it significant that just today china and russia were both weighing in on this issue of north korea but warning not only north korea but also the us. today new images were released of those wargames between south korea and the us and its these wargames as well as recent sanctions to whi
attacks we are going to have to beef up the cyber command. heather: ohio governor john kasich at last night's debate on the need to pressure china to get their help bring in north korea and its leader. south korean officials say the cyber attacks from the north have doubled in the past month and that's on the heels of news that north korea launched two more ballistic missiles at a report from the state broadcaster that claims that kim jong un has now ordered more testing. the us has a big stake...
103
103
Mar 25, 2016
03/16
by
BLOOMBERG
tv
eye 103
favorite 0
quote 0
and into the world of cyber security. i sit down with the ceo of tanium, as he takes the reins from his father. first to our lead. yahoo! investor star board, wiping out the entire board of investors, including ceo, marissa mayer. increasing holdings to 1.7%. the activist shareholder is nominating their own a ceo, jeff smith, for election at the yahoo! meeting later this year. smith writes, we believe the board clearly lacks the leadership, objectivity, and perspective needed to make decisions in the best interest of shareholders. in response, yahoo! noted that they will review the nominees and respond in due course. what do these nominees have to offer? joining me now, eric jackson. and neil doshi, from securities during the here and that studio. neil, what is your reaction here to star board the clearing an all-out war on yahoo!? neil: it is definitely expected. what we think is, this is going to be a huge uphill battle for yahoo! to fight. yahoo! will experience a pretty costly endeavor to go to all their shareholders
and into the world of cyber security. i sit down with the ceo of tanium, as he takes the reins from his father. first to our lead. yahoo! investor star board, wiping out the entire board of investors, including ceo, marissa mayer. increasing holdings to 1.7%. the activist shareholder is nominating their own a ceo, jeff smith, for election at the yahoo! meeting later this year. smith writes, we believe the board clearly lacks the leadership, objectivity, and perspective needed to make decisions...
50
50
Mar 22, 2016
03/16
by
CSPAN3
tv
eye 50
favorite 0
quote 0
of a major domestic cyber attack?and do you believe they're adequately trained, equipped, and funded to meet that expectation? finally, do you believe each responsible agency cyber mandate, defense or otherwise, has the authorities it needs to coordinate an effective response domestically? >> thank you, senator. let me take the part about the guard first if i may. i was out in washington state a couple of weeks ago where there's a terrific national guard unit working on exactly what you're talking about, that is defending the nation and also defending our d.o.d. networks upon which we're so again independent from cyber attack. these are people who -- whose day job is to be the cyber defenders for some of our most important i.t. companies and tech companies, so think ear at the highest skill level that the private sector has. and yet they're making their skills available to their country through the national guard. so this is a tremendous strength among many of the national guard, the ability to bring us, to us a talen
of a major domestic cyber attack?and do you believe they're adequately trained, equipped, and funded to meet that expectation? finally, do you believe each responsible agency cyber mandate, defense or otherwise, has the authorities it needs to coordinate an effective response domestically? >> thank you, senator. let me take the part about the guard first if i may. i was out in washington state a couple of weeks ago where there's a terrific national guard unit working on exactly what...
137
137
Mar 1, 2016
03/16
by
ALJAZAM
tv
eye 137
favorite 0
quote 0
commanders are using cyber attacks as a weapon of war against isil.((úz@úxóxkxÑ($9 >>> on the greek border, macedonian police fired tear gas on hundreds of migrants today who stormed the crossing. [ shouting ] [ screaming ] >> earlier the exhausted refugees tore down part of the fence demanding to be let through. aid agencies report many had been at the crossing for up to ten days. greek officials estimate 22,000 migrants are stuck in that country. >>> clashes erupted in calais, france today. hundreds of migrants and activists threw stones at police, as authorities started clearing out a section of the camp. police fired tear gas. officials say the clamp needs to be cleared out for humanitarian reasons. they say only a thousand refugees will be effected, and they will be able to move into better conditions at a different camp. >>> the uneasy ceasefire in syria has now held for three days, but in some parts of the country the hostilities have neither ceased nor slowed. >> reporter: day two of the truce in syria got off to a bad start. a war plane beli
commanders are using cyber attacks as a weapon of war against isil.((úz@úxóxkxÑ($9 >>> on the greek border, macedonian police fired tear gas on hundreds of migrants today who stormed the crossing. [ shouting ] [ screaming ] >> earlier the exhausted refugees tore down part of the fence demanding to be let through. aid agencies report many had been at the crossing for up to ten days. greek officials estimate 22,000 migrants are stuck in that country. >>> clashes...
100
100
Mar 11, 2016
03/16
by
CSPAN3
tv
eye 100
favorite 0
quote 3
and part of this is going to be, do we have to look at cyber -- do we have to have cyber reactions to cyber actions or do we look at figuring out, how do we integrate cyber into how we think about things at large? it's still very sensitive and still very tightly controlled as it should be, given the repercussions that could come back not just on the defense force but also on the society at large. so working through each of these issues is important from a theoretical perspective but frankly that has to be coupled with what practically you can and can't do to understand how you want to look at it in theory. >> we've got a lot of questions. how about tony in the back. >> tony with bloomberg news. how does your vision of we have to be able to do it all square with the looming bow wave the next administration starts to face in 2021 when they have to start planning for 2021 next year basically. how do you square the two? how much money roughly will the next administration have to find starting in 2021 just to pay for the nuclear modernization upgrade, the f-35 ramp-up, b-21, ssbnx. how do
and part of this is going to be, do we have to look at cyber -- do we have to have cyber reactions to cyber actions or do we look at figuring out, how do we integrate cyber into how we think about things at large? it's still very sensitive and still very tightly controlled as it should be, given the repercussions that could come back not just on the defense force but also on the society at large. so working through each of these issues is important from a theoretical perspective but frankly...
31
31
Mar 21, 2016
03/16
by
CSPAN3
tv
eye 31
favorite 0
quote 0
so we take cyber security very, see seriously.ink going forward the car needs to be designed from the ground-up with cyber security in mind, and that is our intent. >> all right. thank you. >> thank you. >> thank you, mr. chairman. thank you to the witnesses for your time and testimony today. i think there's been a lot of great questions today and obviously a lot of interest and intrigue in how this will move forward and what technologies will emerge on top and the questions i think are just the tip of the iceberg here as we all try to figure out and understand how this is going to affect our culture, our society, our innovation and our safety and our economy. a couple of things i think. 2005 probably when auto-steer tractors became the latest rage in agricultural, useful economic tool for productivity, today based on that over a decade-long experience, i think if you want to get down to a 12-inch accuracy in the field whether you are planting corn or drilling wheat, it probably cost $7,000 to retro fit an old piece of commitment.
so we take cyber security very, see seriously.ink going forward the car needs to be designed from the ground-up with cyber security in mind, and that is our intent. >> all right. thank you. >> thank you. >> thank you, mr. chairman. thank you to the witnesses for your time and testimony today. i think there's been a lot of great questions today and obviously a lot of interest and intrigue in how this will move forward and what technologies will emerge on top and the questions i...
57
57
Mar 24, 2016
03/16
by
KTVU
tv
eye 57
favorite 0
quote 0
bullying and cyber bullying. with cyber bullying, it's using a digital device or a web page or even now multiplayer on-line games where kids are playing games and they're talking to others on a headset, but it's repetitive mean speak and it's far more common. part of it is mobile teg nothing is becoming more affordable, tablets are becoming cheaper. they're coming into homes, school. but now there's more exposure in schools. there's this disinhibition effect that kids tend to feel when they're in front of a screen. >> it's almost easier to do it. >> totally. >> even when adults do it, you can be a little meaner, a little tougher in an e-mail. >> that's led to some of this almost feeling like it's easier to do it. >> so we know it's happening more. it's probably easier to do on- line than in person. what can parent do if you think your child is a victim? >> first recognize their children can play many roles. it they can go in and out of it. as you think about the four main rules, the target, the individual that's
bullying and cyber bullying. with cyber bullying, it's using a digital device or a web page or even now multiplayer on-line games where kids are playing games and they're talking to others on a headset, but it's repetitive mean speak and it's far more common. part of it is mobile teg nothing is becoming more affordable, tablets are becoming cheaper. they're coming into homes, school. but now there's more exposure in schools. there's this disinhibition effect that kids tend to feel when they're...
138
138
Mar 1, 2016
03/16
by
FOXNEWSW
tv
eye 138
favorite 0
quote 0
issues, cyber security is a huge concern of ours as well. not just in terms of the individual attacks, people who have had their identities stolen, those are devastating and i think the average american can relate to that, in a very, very real way. possible threats to our corporate i.t., to our corporate intellectual property p.m. the goodwill and brain trust so to speak. those challenges are big and growing. >> just last week, the director of national intelligence expressed skepticism over the september cyber agreement between president obama and the chinese president. he said this. >> cyber espionage against the united states, and whether their commitment of last september remains to be seen. >> you back in december, along with homeland security secretary johnson. sat across the table from your chinese counter parts and discussed this very issue. do you agree and share the assessment? >> it was an agreement they would not engage in economic espionage. we will be constantly looking at and monitoring u.s. companies to alert them if we see an
issues, cyber security is a huge concern of ours as well. not just in terms of the individual attacks, people who have had their identities stolen, those are devastating and i think the average american can relate to that, in a very, very real way. possible threats to our corporate i.t., to our corporate intellectual property p.m. the goodwill and brain trust so to speak. those challenges are big and growing. >> just last week, the director of national intelligence expressed skepticism...
59
59
Mar 15, 2016
03/16
by
CSPAN3
tv
eye 59
favorite 0
quote 0
we talked about cyber security.we operate only with an opt-in principl principle. >> so you agree there should be mandatory standards? >> no. i think we're operating with privacy as a very important part of how we implement this. i think we'll continue to work with regulators on what is appropriat appropriate. >> i have to say -- i'm not a technology person. i'm a country lawyer from connecticut. if i ask somebody, do you think that that red light means stop and they came back and said, let me put it this way. under these circumstances maybe. we have great respect for stop lines and, et cetera. i would say, the answer is yes, because again the credibility that this technology has will be extremely fragile if people can't trust standards that are uniform and mandatory, not necessarily for you but all the other actors that may come into this space at some point. it's a reason that senator markey and i have introduced this legislation. the private sector, companies can do it voluntarily, i would have more trust in that
we talked about cyber security.we operate only with an opt-in principl principle. >> so you agree there should be mandatory standards? >> no. i think we're operating with privacy as a very important part of how we implement this. i think we'll continue to work with regulators on what is appropriat appropriate. >> i have to say -- i'm not a technology person. i'm a country lawyer from connecticut. if i ask somebody, do you think that that red light means stop and they came back...
127
127
Mar 31, 2016
03/16
by
CSPAN
tv
eye 127
favorite 0
quote 0
of our cyber initiative.ofounder -- no one is happier than me about that. [applause] josh is also cofounder of a grassroots organization that encourages new security approaches in cyberspace and beyond in response to the world digitalng dependence on infrastructure. the program will be heading more in the direction of today's conversation but even much further. josh has employed a very unique policyh to security and by connecting human factors, adversary motivation, social impact, to help position him as one of the most trusted in this space. he served as the chief fellowogy officer and a at the ponta minute institute. we're really thrilled to have him. i would also like to thank our media partner pass code from the christian science monitor for joining us and welcome those of you following the conversation online. i encourage all of you to join the conversation on twitter .sing our # josh will give you another account to tweet from. thank you very much. >> all right. thank you all for coming. my name is josh
of our cyber initiative.ofounder -- no one is happier than me about that. [applause] josh is also cofounder of a grassroots organization that encourages new security approaches in cyberspace and beyond in response to the world digitalng dependence on infrastructure. the program will be heading more in the direction of today's conversation but even much further. josh has employed a very unique policyh to security and by connecting human factors, adversary motivation, social impact, to help...