89
89
Apr 26, 2012
04/12
by
CSPAN
tv
eye 89
favorite 0
quote 0
who are determined to use cyberattacks to steal from us and weaken us. this bipartisan amendment will further solidify our commitment to protecting the homeland from foreign nation states wishing use it us harm while protecting civil liberties. this amendment significantly narrows the bill's current limitation of the federal government's use of cyberthreat information that is voluntarily shared by the private sector. specifically, this amendment strictly limits the federal government's use of voluntary shared cyberthreat information to the following five purposes. cybersecurity purposes, investigation and prosecution of cybersecurity crimes, protection of individuals from danger of death or serious bodily harm, protection of minors from child pornography, any risk of sexual exploitation and serious threats to the physical safety of a minor and finally protection of our national security of the united states. if the government violates the use limitation, the bill provides for government liability for actual damages, costs and attorney fees in federal cou
who are determined to use cyberattacks to steal from us and weaken us. this bipartisan amendment will further solidify our commitment to protecting the homeland from foreign nation states wishing use it us harm while protecting civil liberties. this amendment significantly narrows the bill's current limitation of the federal government's use of cyberthreat information that is voluntarily shared by the private sector. specifically, this amendment strictly limits the federal government's use of...
129
129
Apr 3, 2012
04/12
by
CSPAN3
tv
eye 129
favorite 0
quote 0
should invert the defense/offense ratio to signify that a cyberattack on the united states will have negative consequences. and your answer, as i understand it is, well, we'll act in some -- in some way or fashion. perhaps you can be a little more specific how we can regain, how can we can gain the offense here. >> i actually agree with this statements, and i'd like to characterize it in my words, if i could, senator, in that more than 90% of our force was developed -- all of our force in cyber as we started was on the defense and operate. we didn't have an offensive capability. and so what we're looking at now is how to we grow that capability? if you think about what we have within our fleets, air wings and brigades is the operate and defend capabilities. the offensive capabilities primarily lies in the exploitation xpablts of s capaba and others. we're developing those. i agree we need to develop those more and faster, and we're working on that with the services and that's part of our growth plan. i think in terms of this, senator, i don't want to give you the impression that i do
should invert the defense/offense ratio to signify that a cyberattack on the united states will have negative consequences. and your answer, as i understand it is, well, we'll act in some -- in some way or fashion. perhaps you can be a little more specific how we can regain, how can we can gain the offense here. >> i actually agree with this statements, and i'd like to characterize it in my words, if i could, senator, in that more than 90% of our force was developed -- all of our force in...
258
258
Apr 22, 2012
04/12
by
KGO
tv
eye 258
favorite 0
quote 0
. >> reporter: they're on the front lines defending america from cyberattacks. >> trying -- >> reporter: government and industry insiders say you're practically guaranteed a job in cybersecurity if you have the right stuff. >> there's a lack of expertise and a lot of people clamoring for people who know the internet world, can work in this area. >> reporter: last year the department of homeland security's cyberunit responded to more than 106,000 cyberattacks. dhs secretary janet napolitano says unless we train more cyberexperts our economy could be the biggest casualty and add thousands of cyberexperts already work in the federal government, but they're a desperate need for more. >> we need people who are analysts, people who are engineers, we need people who are experienced in intelligence, as it relate thoaz cyber universe. >> george washington yieforts on a short list of institutions answering that need. the university will launch a masters program in cybersecurity this fall. >> we get calls all the time from industry and government, wanting to hire students and to find students who
. >> reporter: they're on the front lines defending america from cyberattacks. >> trying -- >> reporter: government and industry insiders say you're practically guaranteed a job in cybersecurity if you have the right stuff. >> there's a lack of expertise and a lot of people clamoring for people who know the internet world, can work in this area. >> reporter: last year the department of homeland security's cyberunit responded to more than 106,000 cyberattacks. dhs...
70
70
Apr 4, 2012
04/12
by
CSPAN2
tv
eye 70
favorite 0
quote 0
cyberattack is the main area of vulnerability behalf today.shame on us if we look at this as business regulation. this is homeland security. we have to get together before too long and make this happen. i want to come to the particular difference between the two bills. there are two critical things that have to be done. one is information sharing authorization. the other is protection of the most critical cyberinfrastructure, which is owned by the private sector. 90% of it, finance, transportation, electricity, water, all of which is vulnerable to attack. both bills have information sharing. the bill that senator collins and i introduced is a provision for dhs to work with the private sector. not every business to take certain actions to defend their network to defend our country. general alexander, i just want to have you confirmed this, what you believe that we need both of those authorities and governments. that is information sharing and a system for protecting and better defending privately owned critical infrastructure. is that right? >>
cyberattack is the main area of vulnerability behalf today.shame on us if we look at this as business regulation. this is homeland security. we have to get together before too long and make this happen. i want to come to the particular difference between the two bills. there are two critical things that have to be done. one is information sharing authorization. the other is protection of the most critical cyberinfrastructure, which is owned by the private sector. 90% of it, finance,...
132
132
Apr 3, 2012
04/12
by
CSPAN3
tv
eye 132
favorite 0
quote 0
if we have a cyberattack coming in and no one tells us that that's that cyberattack is going on, we can't stop it. today, we're in the forensics mode. what that means is, an attack or an exploit normally occurs, we're told about it after the fact. i think we should be in the prevention mode in stopping that. a lot of that can be done by industry. i think that industry should have the ability to see these and share that with government in realtime. when you think about it it's almost like the neighborhood watch program. somebody's breaking into a bank, somebody needs to call the authorities to stop it. in cyberspace, what we're saying is armed with the signatures, the software, those things that help us understand an attack is going on we believe that industry is the right ones to tell the government that they see that, and get us respond to it. so i just want to clarify, because i do not believe we want nsa or cybercommand or the military inside our networks watching it. we think industry can do that. we think that's the right first step. and we think actually that's in both of these bill
if we have a cyberattack coming in and no one tells us that that's that cyberattack is going on, we can't stop it. today, we're in the forensics mode. what that means is, an attack or an exploit normally occurs, we're told about it after the fact. i think we should be in the prevention mode in stopping that. a lot of that can be done by industry. i think that industry should have the ability to see these and share that with government in realtime. when you think about it it's almost like the...
139
139
Apr 25, 2012
04/12
by
MSNBC
tv
eye 139
favorite 0
quote 0
and so we are having cyberattacks every day that succeed.y don't destroy things, they steal things. there's a massive transfer of intellectual property, of research and development. massive transfer from american companies and government labs to china. and the government is doing nothing to stop it. largely because the congress won't set up laws and regulations that allow the government to defend the united states. >> richard clarke, the book is "cyberwar: the next threat to national security and what to do about it." it's just out in paperback. it was a "new york times" best seller in hardback. and we were talking before the break, this is something that has changed the discussion both in policy making circles and those of us that are just interested in national security. congratulations on the success of this so far. nice to see you again. >> and congratulations on your success too with your book. >> oh, appreciate it. we will be right back. a physics teacher by the name of mr. davies. he made physics more than theoretical, he made it real
and so we are having cyberattacks every day that succeed.y don't destroy things, they steal things. there's a massive transfer of intellectual property, of research and development. massive transfer from american companies and government labs to china. and the government is doing nothing to stop it. largely because the congress won't set up laws and regulations that allow the government to defend the united states. >> richard clarke, the book is "cyberwar: the next threat to national...
155
155
Apr 23, 2012
04/12
by
KRON
tv
eye 155
favorite 0
quote 0
. >> reporter: they're on the frontlines, defending america from cyberattacks.vernment and industry insiders say you're practically guaranteed a job in cybersecurity if you've got the right stuff. >> there is a lack of expertise, and there are a lot of people clamoring for people who know the internet world, can work in this area. >> reporter: last year, the department of homeland security's cyber unit responded to more than 106,000 cyberattacks. janet napolitano says unless we train more cyber experts, our economy could be the biggest casualties. thousands of cyberexperts already work in the federal government, but they need more. >> we need analysts, engineers, people who are experienced in intelligence as it relates to the cyberuniverse. >> george washington university is on a short list of institutions addressing that need. they'll launch a master's program this fall. >> we need to find students who have this expear tease and training. there are not people that are educating as fast as they can. >> reporter: and design systems that hackers can't easily penet
. >> reporter: they're on the frontlines, defending america from cyberattacks.vernment and industry insiders say you're practically guaranteed a job in cybersecurity if you've got the right stuff. >> there is a lack of expertise, and there are a lot of people clamoring for people who know the internet world, can work in this area. >> reporter: last year, the department of homeland security's cyber unit responded to more than 106,000 cyberattacks. janet napolitano says unless...
63
63
Apr 26, 2012
04/12
by
CSPAN
tv
eye 63
favorite 0
quote 0
cyberattack can take place very, very quickly. it's something we must do everything in our power to protect ourselves against. this bill does not solve all the problems. but it certainly leads us in the right direction and again, i want to thank the chairman, i want to thank everybody involved for the bipartisan effort and making the security of our nation our number one priority. with that, i urge all members to vote for this bill and i yield back. the speaker pro tempore: the gentleman from maryland yeeds back the balance of his time. the gentleman from california is recognized. mr. issa: in closing i urge all member togs support the pass and -- members to support passage of this bill and i want to make one closing statement. often we talk about cybersecurity and people think about just the internet. we sit here in a room that is essentially windowless. i've been in this room when the lights are out. it is very, very dark. we would have a hard time finding our way out. and yet the very essence of keeping the grid up requires com
cyberattack can take place very, very quickly. it's something we must do everything in our power to protect ourselves against. this bill does not solve all the problems. but it certainly leads us in the right direction and again, i want to thank the chairman, i want to thank everybody involved for the bipartisan effort and making the security of our nation our number one priority. with that, i urge all members to vote for this bill and i yield back. the speaker pro tempore: the gentleman from...
149
149
Apr 26, 2012
04/12
by
CSPAN
tv
eye 149
favorite 0
quote 0
rep companit slaught of cybintrusions that stealtive inrmation, even our own govent cyberattacks this costs american companies valuable inatio intelleual propernd rech and osts ment rk and it c erican wke their jobs. 's hd ay exactly how much cyberattasost our nation economy, but it wld much as $400 billioa , accoing to one rort fromcomputer security institute and thf.b.i. toy, the house will begin consideration of a bill that will hp protect our om the kinds o threat. the inti - t cyberintelligence a shari twould allow private mpans to voluntarihare formatio withach otr with the governmt a of publriva internet panersp. the bill inudignificant safeguardsto protectersonal and private infmation. it signifintlymi the ral fedevernme's use of at imaon tt e ivate compans voluntarily prid cluding e govement ity to searcday tafment ituires anndepende inecrgeneral for the intelligence community audit -- audit this information shared with the government and report regularly to congress for oversight. it encourages the private sector to make the information shares with others, including the gove
rep companit slaught of cybintrusions that stealtive inrmation, even our own govent cyberattacks this costs american companies valuable inatio intelleual propernd rech and osts ment rk and it c erican wke their jobs. 's hd ay exactly how much cyberattasost our nation economy, but it wld much as $400 billioa , accoing to one rort fromcomputer security institute and thf.b.i. toy, the house will begin consideration of a bill that will hp protect our om the kinds o threat. the inti - t...
135
135
Apr 21, 2012
04/12
by
CNN
tv
eye 135
favorite 0
quote 0
. >> they're on the front lines defending america from cyberattacks. >> just looking for signs that the are trying to gain access. >> government and industry insiders say you're practically guaranteed a job in cybersecurity if you have the right stuff. >> there is a lack of expertise, and there's a lot of people clamoring for people who know the internet world, can work in this area. >> last year, the department of homeland security's cyberunit responded to more than 106,000 cyberattacks. janet napolitano says unless we train more cyber experts, our economy could be the biggest casualty. she adds thousands of cyb cyber experts already work in the government, but there's a desperate need for more. >> we need people who are analysts, people who are engineers, we need people who are experienced in intelligence as it relates to the cyb cyber universe. >> george washington university is a short list of institutions answering that need. the university will launch a program in cybersecurity this fall? >> we get calls all the time from industry and government wanting to hire students and to fin
. >> they're on the front lines defending america from cyberattacks. >> just looking for signs that the are trying to gain access. >> government and industry insiders say you're practically guaranteed a job in cybersecurity if you have the right stuff. >> there is a lack of expertise, and there's a lot of people clamoring for people who know the internet world, can work in this area. >> last year, the department of homeland security's cyberunit responded to more...
WHUT (Howard University Television)
243
243
Apr 24, 2012
04/12
by
WHUT
tv
eye 243
favorite 0
quote 0
for iran's government says the country's oil ministry and state-run oil company were the targ aft cyberattackthe spokesperson says the computer virus did not cause any major damage to important data. another computer virus hit iran's nuclear facilities two years ago. it reportedly disrupted some of the centrifuges for uranium enrichment. >>> and the world is getting its first look at the doping laboratory for this year's london olympics. organizers will use the state of the art equipment to test athletes for band substances during the olympic and paralympic games. it will operate 24 hours a day and can handle a record number of samples, more than 6,000. >>> it's a very warm day here in tokyo. time now to check the world weather forecast with rachel ferguson. >> hi there. yes, we're sbeeg 22 degrees outside the door here in tokyo. it's going to be improved even by a few more degrees, maybe even 25 in the next couple of hours for the daytime high. however, as we head on into wednesday, there will be a change in this clear weather which is dominating much of the country. rain showers are coming.
for iran's government says the country's oil ministry and state-run oil company were the targ aft cyberattackthe spokesperson says the computer virus did not cause any major damage to important data. another computer virus hit iran's nuclear facilities two years ago. it reportedly disrupted some of the centrifuges for uranium enrichment. >>> and the world is getting its first look at the doping laboratory for this year's london olympics. organizers will use the state of the art...
227
227
Apr 24, 2012
04/12
by
KCSMMHZ
tv
eye 227
favorite 0
quote 0
iran's government says the country's oil ministry and state run oil company were the target of a cyberattacke spokesperson says the computer virus didn't cause any major damage to important data. another computer virus hit iran's nuclear facilities two years ago. it reportedly disrupted some of the country's centrifuges for uranium enrichment. >>> the first look at doping laboratory for this year's london olympics. organizers will test athletes for banned substances during the olympic and paralympic games. the lab will operate 24 hours a day. it commandle a record number of samples, more than 6,000. >>> rain off and on in tokyo today. robert speta is in the studio with the weather forecast for here and elsewhere. robert? >> yes, for the most part across japan we have been seeing some dry weather throughout the area due to a high pressure dominating the entire country of japan. some pop-up thunderstorms did develop this evening, but those will continue to dissipate into the overnight hours in tokyo. but the fair weather will not be lasting for very long, because look at this, large cloud mass
iran's government says the country's oil ministry and state run oil company were the target of a cyberattacke spokesperson says the computer virus didn't cause any major damage to important data. another computer virus hit iran's nuclear facilities two years ago. it reportedly disrupted some of the country's centrifuges for uranium enrichment. >>> the first look at doping laboratory for this year's london olympics. organizers will test athletes for banned substances during the olympic...
123
123
Apr 2, 2012
04/12
by
CSPAN3
tv
eye 123
favorite 0
quote 0
. >> when we're warned in the next 12 to 18 months america will suffer a catastrophic cyberattack, they don't choose those words indiscriminately. we're already four or five months into that warning period, it tells me we have to move rapidly, but not in a way that either violates privacy or the basic tenets of privacy, and that encourages quick reaction, not sort of regulatory environment. >> tonight the chairman of the house subcommittee on communications and technology. congressman greg walden on cybersecurity and privacy at 8:00 eastern on the communicators on c-span 2. >>> the u.s. house passed its 2013 budget last week, written by republicans and passed without a democratic vote. the republican plan for international spending is a 7% cut in current funding, and would consolidate usaid's development assistance program. while the president would increase state department funds nearly 1 1/2%. the republican budget provides nearly $41 billion for international affairs, including the state department. compare that to the president's request of nearly $52 billion in discretionary spendi
. >> when we're warned in the next 12 to 18 months america will suffer a catastrophic cyberattack, they don't choose those words indiscriminately. we're already four or five months into that warning period, it tells me we have to move rapidly, but not in a way that either violates privacy or the basic tenets of privacy, and that encourages quick reaction, not sort of regulatory environment. >> tonight the chairman of the house subcommittee on communications and technology....
102
102
Apr 3, 2012
04/12
by
CSPAN3
tv
eye 102
favorite 0
quote 0
in the world's economy is affected by something in this realm of cyberattacks. and we need to be prepared for that in addition. it could be. >> i it all depends on floe and sufficient. we're vulnerable and we're also dependent on them for the asian oil markets as well. more attention needs to be paid to that. let me move to the question dealing with the computer network exploitation versus computer network attack, how do you exactly draw the line between those two and how does the government change legal authorities, finding personnel and infrastructure and moving from cne to cna. so that would go to the excellence community and fall under the executive order, 12333. while title ten is normally where we would conduct the computer network attack. you could also do it under foe investigator action. and in timines of war, it would be -- so the deacon flickations have to do. the good part about getting or portions operating together. it flows back to the defense, an that's why i think the good part of putting the defense -- puts it as two different teams, which is w
in the world's economy is affected by something in this realm of cyberattacks. and we need to be prepared for that in addition. it could be. >> i it all depends on floe and sufficient. we're vulnerable and we're also dependent on them for the asian oil markets as well. more attention needs to be paid to that. let me move to the question dealing with the computer network exploitation versus computer network attack, how do you exactly draw the line between those two and how does the...
114
114
Apr 2, 2012
04/12
by
CSPAN3
tv
eye 114
favorite 0
quote 0
. >> when we're warned in the next 12 to 18 months america will suffer a catastrophic cyberattack, they don't choose those words indiscriminately. it tells me we have to move rapidly but not in a way that either violates privacy or the basic tenets of privacy and that encourages quick reaction not sort of regulatory environment. >> tonight the chairman of the house sub xwhet on communications and technology, congressman greg walden on cybersecurity and privacy at 8:00 eastern on the communicators on c-span2. of economist lawyer lawyer d'andrea tyson says the u.s. should focus on three things that can positively affect a number of industries, the education gap, greater investments in research and development and infrastructure. she is a member of the president's council on jobs and competitiveness. she spoke at an economic summit hosted by "the atlantic magazine. this is about half an hour. >> laura tyson is the -- the way i really know her was when she was at the berkeley roundtable on international economy. we know her because she was president clinton's economic adviser, now on a key
. >> when we're warned in the next 12 to 18 months america will suffer a catastrophic cyberattack, they don't choose those words indiscriminately. it tells me we have to move rapidly but not in a way that either violates privacy or the basic tenets of privacy and that encourages quick reaction not sort of regulatory environment. >> tonight the chairman of the house sub xwhet on communications and technology, congressman greg walden on cybersecurity and privacy at 8:00 eastern on the...
117
117
Apr 5, 2012
04/12
by
CSPAN3
tv
eye 117
favorite 0
quote 0
time about the fact that we are going to wake up and we'll be subject to a crisis or an attack, a cyberattack, for example, that we have no idea where it came from and it virtually has crippled our country. taken down our power grid. taken down our financial systems. and i worry a great deal about that. there's a hell of a lot to worry about in the world we're in. i worry about, you know, what can happen with iran. i worry about north korea. i worry a great deal about what can happen in the middle east as a result of the turmoil there. syria. yemen. bahrain. other places. egypt. those are concerns. but first and foremost, i guess i worry about the unexpected attack that we're not prepared to deal with. >> general dempsey, do you have anything to add to that? >> keep it short for me. >> i will, sir. i do short. you heard my opening statement. >> i like your style. that's my style. >> well, i worry about the kids. if we don't -- that we put in uniform. if we don't ensure they are the best trained, best equipped and best led. i worry about that. the world needs america to be a stabilizing global
time about the fact that we are going to wake up and we'll be subject to a crisis or an attack, a cyberattack, for example, that we have no idea where it came from and it virtually has crippled our country. taken down our power grid. taken down our financial systems. and i worry a great deal about that. there's a hell of a lot to worry about in the world we're in. i worry about, you know, what can happen with iran. i worry about north korea. i worry a great deal about what can happen in the...
99
99
Apr 27, 2012
04/12
by
CSPAN
tv
eye 99
favorite 0
quote 0
of course we have heard and documented numerous issues of cyberattacks. thankfully nothing major yet in this country. as the director of the n.s.a. has outlined, these days perhaps are common. reneed to do all we can to avoid them. well-intentioned technology -- technological changes that create efficiencies through auto miization can leave us for vulnerable to cyberexploitation. clearly these efishenscies -- efficiencies have helped us to be much more efficient. as the test from idaho national labs, which sew showed how easily -- easy it would be to conduct a scare attack that penetrated systems that are government safety systems on pumps, val fls -- valves, and generators could cause the generator to blow itself up. these things can happen and we need to do all we can to avoid them. make sure that day never comes. obviously we have to tap into our creative and innovative spirit to address today's challenges. agile facing tomorrow's threats. i'm pleased this bill helps us to make this need a reality by strengthening the coordination and cooperation among
of course we have heard and documented numerous issues of cyberattacks. thankfully nothing major yet in this country. as the director of the n.s.a. has outlined, these days perhaps are common. reneed to do all we can to avoid them. well-intentioned technology -- technological changes that create efficiencies through auto miization can leave us for vulnerable to cyberexploitation. clearly these efishenscies -- efficiencies have helped us to be much more efficient. as the test from idaho national...
152
152
Apr 3, 2012
04/12
by
CSPAN2
tv
eye 152
favorite 0
quote 0
devastating and when we are warned in the next 12 to 18 months america will suffer a catastrophic cyberattack they don't choose those words indiscriminately. their four or five months into the warning period. it tells me that we have to move rapidly but not in a way that violates privacy or the basic tenets of privacy. and it encourages quick reaction, not sort of regulatory environment. >> chairman walden, just to take a different path on privacy, google has a new set of privacy by declines one. do you have concerns about those as you talk with google at all? >> we haven't had a lot of discussion. it is an mary bono max the five subcommittee more than nine. what we are looking at as it relates to the agency report. i think -- i guess i'm old-fashioned and a lot of ways i always sali phone call and the court order to listen in. i read the other day one of the groups is talking about being a will to listen into the background noise in your phone conversation and target on what they hear. i don't know what they are going to hear in the background but it could make for interesting ads to come fo
devastating and when we are warned in the next 12 to 18 months america will suffer a catastrophic cyberattack they don't choose those words indiscriminately. their four or five months into the warning period. it tells me that we have to move rapidly but not in a way that violates privacy or the basic tenets of privacy. and it encourages quick reaction, not sort of regulatory environment. >> chairman walden, just to take a different path on privacy, google has a new set of privacy by...
89
89
Apr 5, 2012
04/12
by
CSPAN3
tv
eye 89
favorite 0
quote 0
i share the worries about cyberattacks and domestic defense. i don't question what you are saying in terms of the role this country ought to perform. how the hell we are going to pay for it? do you remember those words, sir? >> yes, sir. >> they were yours in this same chamber 20 years ago. we're trying to do the same thing you accomplished in 1992. >> i'm with you on that. i think it has to be paid for. >> thank you. >> mr. honda. >> thank you, mr. chairman. and welcome. it's good to see a local boy. mr. secretary and general dempsey, i just want to thank you for appearing before us today and for your tremendous service. in recent history, you've seen some tremendous successes which should be credited to you and many others. the end of our presence in iraq, the s.e.a.l. team six mission, the expedited schedule for a drawdown on afghanistan will go down in history as much as the celebrated events. if some of us, these milestones could not come soon enough. with this now behind us, we have to take a hard look at the money we've been spending and
i share the worries about cyberattacks and domestic defense. i don't question what you are saying in terms of the role this country ought to perform. how the hell we are going to pay for it? do you remember those words, sir? >> yes, sir. >> they were yours in this same chamber 20 years ago. we're trying to do the same thing you accomplished in 1992. >> i'm with you on that. i think it has to be paid for. >> thank you. >> mr. honda. >> thank you, mr. chairman....
106
106
Apr 25, 2012
04/12
by
CSPAN
tv
eye 106
favorite 0
quote 0
one, what are the consequences of the actions of cyberattacks? and how do you plan on catching cyberattacker when he can do it anywhere in the world? guest: i think they have the ability not only the intellectual property theft to the tune of $1 trillion, espionage in terms of stealing our military secrets, cyberwarfare, bring down our power grids, financial institutions, f.a.a., you name it. we have very sophisticated techniques to determine whether an intrusion has taken place. for instance, the c.i.a. probably has 100,000 attempted hacks per week. the house of representatives, i think we have close to a million but we know about those and the members are notified. and very few are successful. that's the good news. they can sometimes intrude and get in, but when they have the beacon to get out of the system, there's a wall that stops the beacon from escaping and getting back to the perpetrator. attribution is very important here. any time we've had a cyberattack, being able to attribute that back to the source and to the computer and then find
one, what are the consequences of the actions of cyberattacks? and how do you plan on catching cyberattacker when he can do it anywhere in the world? guest: i think they have the ability not only the intellectual property theft to the tune of $1 trillion, espionage in terms of stealing our military secrets, cyberwarfare, bring down our power grids, financial institutions, f.a.a., you name it. we have very sophisticated techniques to determine whether an intrusion has taken place. for instance,...
305
305
Apr 26, 2012
04/12
by
FOXNEWS
tv
eye 305
favorite 0
quote 0
jenna: congressman, you said in the past a catastrophic cyberattack is headed for this country.t exactly do you mean by that? >> well, if you think about it, we're right now under incredible theft from the chinese espionage, russian espionage of our intellectual property but nation states have been also developing the capability to shut down whole networks. and i'm not just talking about denial of service where you reboot and plug it back in. they can actually destroy your machine. imagine if you went into the bank and stuck in your card and not only read all zeros or read not anything at all and bank couldn't tell you what is in your account and multiply that over thousands and thousands of times. it could shut down critical infrastructure like our electrical grid which would cause chaos and harm to the economy a and nonnation-state actors are trying to get this capability and unfortunately irrational nation-state actors, north korea and iran are getting this capability. the good news we can do something about it and it is very simple. jenna: talk about your bill and the admini
jenna: congressman, you said in the past a catastrophic cyberattack is headed for this country.t exactly do you mean by that? >> well, if you think about it, we're right now under incredible theft from the chinese espionage, russian espionage of our intellectual property but nation states have been also developing the capability to shut down whole networks. and i'm not just talking about denial of service where you reboot and plug it back in. they can actually destroy your machine....
154
154
Apr 19, 2012
04/12
by
WTTG
tv
eye 154
favorite 0
quote 0
government website, dc.gov, has been the target of a cyberattack. the attack affected several agencies, including mayor gray's home page and the e-mail of some employees. internet outages have been spottium on day -- spotty all day long. hackers are claiming responsibility for this saying the attacks are part of a protest against the government. the same group attacked government servers in new york city earlier this week. they say there will be more attacks to come against d.c..gov. >>> another big story we're following tonight. the fallout from the is essex scandal has cost three agency employees their jobs. late yesterday, the secret service office announced one supervisor was fired, another allowed to retire and a non- supervisory employee resigned. a key republican lawmaker said more heads may role. here's the latest from the white house. >> reporter: more firings -- firings could be on the horizon as the secret service continues to investigate the prostitution scandal in columbia. new york republican congressman peter king is the chairman of t
government website, dc.gov, has been the target of a cyberattack. the attack affected several agencies, including mayor gray's home page and the e-mail of some employees. internet outages have been spottium on day -- spotty all day long. hackers are claiming responsibility for this saying the attacks are part of a protest against the government. the same group attacked government servers in new york city earlier this week. they say there will be more attacks to come against d.c..gov....
222
222
Apr 14, 2012
04/12
by
CNNW
tv
eye 222
favorite 0
quote 0
. >>> finally, "anonymous" ask a group responsible for cyberattacks to organizations around the worldrious members was a hacker named wormer. he was able to hack into the we be sites of four u.s. law enforcement agencies and release information about dozens of police officers. he was anonymous and untouchable. he even taunted the police by posting this. that's right. this shot of a woman, taken from the neck down, and holding a sign mocking authorities was posted at the bottom of his website but it was taken with a iphone. why is that important? a lot of people don't realize including this master hacker embedded in every photo taken with an iphone are gps coordinates of where that photo was snapped so authorities use that information to figure out if this woman was in australia. they found other pictures of her on other sites. don't know what they were looking at. including a man's facebook page where he bragged he was his aussie girlfriend. all the clues clicked into place and the fbi followed them right to texas where they scooped up ochoa who is
. >>> finally, "anonymous" ask a group responsible for cyberattacks to organizations around the worldrious members was a hacker named wormer. he was able to hack into the we be sites of four u.s. law enforcement agencies and release information about dozens of police officers. he was anonymous and untouchable. he even taunted the police by posting this. that's right. this shot of a woman, taken from the neck down, and holding a sign mocking authorities was posted at the...
104
104
Apr 21, 2012
04/12
by
CNN
tv
eye 104
favorite 0
quote 0
. >>> and there is a critical shortage of people who can protect you from cyberattacks. will it leave america vulnerable to terror attacks? sarah... will you marry me? i think we should see other people. in fact, i'm already seeing your best friend, justin. ♪ i would've appreciated a proactive update on the status of our relationship. who do you think i am, tim? quicken loans? at quicken loans, we provide you with proactive updates on the status of your home loan. and our innovative online tools ensure that you're always in the loop. one more way quicken loans is engineered to amaze. got the mirrors all adjusted? you can see everything ok? just stay off the freeways, all right? i don't want you going out on those yet. mmm-hmm. and just leave your phone in your purse. i don't want you texting, all right? daddy...ok! ok, here you go. be careful. thanks dad. call me -- but not while you're driving. ♪ [ dad ] we knew this day was coming. that's why we bought a subaru. ♪ we asked total strangers to watch it for us. thank you so much, i appreciate it, i'll be right back. they
. >>> and there is a critical shortage of people who can protect you from cyberattacks. will it leave america vulnerable to terror attacks? sarah... will you marry me? i think we should see other people. in fact, i'm already seeing your best friend, justin. ♪ i would've appreciated a proactive update on the status of our relationship. who do you think i am, tim? quicken loans? at quicken loans, we provide you with proactive updates on the status of your home loan. and our innovative...
337
337
Apr 26, 2012
04/12
by
WMPT
tv
eye 337
favorite 0
quote 0
and what this means is our bodies are going to become increasingly vulnerable to cyberattack. >> reporter: a high-level consultant to the u.s. government and interpol, goodman advises on technology-based security threats worldwide. goodman is the faculty skeptic at singularity university, the futuristic california think tank, who rains on his colleagues utopian parade of to goodman, high octane high tech is a double edged sword. >> i think all of this technology will develop in really cool and interesting ways, and there'll be a lot of great things that happen. but i can tell you at the same time there will be some bad stuff as well. there are bad actors from both the crime and the terrorism perspective that are using these technologies for ill. >> reporter: now, there's already plenty of bad stuff says goodman like those two million computer viruses a month. but today's hackers are much more dangerous. >> the bad guys live inside your machine, they watch everything you do. anytime you type in your bank account or credit card information onto the machine they're capturing it, they're capt
and what this means is our bodies are going to become increasingly vulnerable to cyberattack. >> reporter: a high-level consultant to the u.s. government and interpol, goodman advises on technology-based security threats worldwide. goodman is the faculty skeptic at singularity university, the futuristic california think tank, who rains on his colleagues utopian parade of to goodman, high octane high tech is a double edged sword. >> i think all of this technology will develop in...
137
137
Apr 25, 2012
04/12
by
CSPAN
tv
eye 137
favorite 0
quote 0
speaker, the government accountability office says that cyberattack has grown. the cost is estimated to be $388 billion. allowing these trends to proliferate is bad for job creation, consumer protection and the future of the internet whose future success will greatly depend on improving user trust and security online. the u.s.-driven digital revolution has created countless opportunities, freedoms and economies of scale. we're the india of the world in that regard. this revolution is continuing to be driven by information and data. data is really the natural resource that will power our nation's future but only if we safeguard it appropriately. new online presence and digital diaries or what i like to refer to as the virtual you is consistently growing and expanding as individuals and businesses operate online. we need to have the certainty that we can continue our business online without virtual peeping toms and digital thiefs, enjoyable uncontrolled access on the online ecosystem. that's why i was troubled to read an article in "politico". we're being attacked
speaker, the government accountability office says that cyberattack has grown. the cost is estimated to be $388 billion. allowing these trends to proliferate is bad for job creation, consumer protection and the future of the internet whose future success will greatly depend on improving user trust and security online. the u.s.-driven digital revolution has created countless opportunities, freedoms and economies of scale. we're the india of the world in that regard. this revolution is continuing...
134
134
Apr 26, 2012
04/12
by
CSPAN2
tv
eye 134
favorite 0
quote 0
given the involvement of cyberattack risk towards our nation's critical infrastructure, given the debate provisions, if the word explains arrest the particular strain that dhs has regarding this capability and capacity to administer potential regulations and protect our infrastructure. are you confident that dhs has capacity as opposed to the nsa or dod required to handle this critical national thread. >> yes and that as you noted the budget increases has been requested. we've had a multiple additions in the same area over the last three years. we already are the department that deals primarily with the private sector and critical infrastructure. those mechanisms with which to do that are already in place. so on the civilian side and on the.com site is aware, dhs already has that systemic detection role. i think general alexander testify to that several times. dod has of course to the .mil environment. the resources that they are. the experiences they are coming meaning that dhs. we have lessons learned no doubt, but the lessons have been learned. those lessons learned give us greater co
given the involvement of cyberattack risk towards our nation's critical infrastructure, given the debate provisions, if the word explains arrest the particular strain that dhs has regarding this capability and capacity to administer potential regulations and protect our infrastructure. are you confident that dhs has capacity as opposed to the nsa or dod required to handle this critical national thread. >> yes and that as you noted the budget increases has been requested. we've had a...
132
132
Apr 23, 2012
04/12
by
CSPAN2
tv
eye 132
favorite 0
quote 0
does a bill make distinction between cyberattack and cyber activism. >> guest: they do not.protecting network. less focused on attack and more focused on process more broadly. >> host: russell from texas. independent. >> caller: hi, there. >> host: is this russell? >> caller: no, this is bonnie cameron. >> host: we're glad to have you, go ahead you. >> caller: yes. i want to make a comment on homeland security. i think they are spending too much money on that because they are infringing on us, the united states citizens. they came to my house, telling me that my husband couldn't write a letter to the president on the way he felt of what he was doing with his job. and refused to give us i.d. showed us his gun. i think that was very wrong. and nobody would listen to us about what they were doing. now, i don't think that's right for homeland security. >> host: thanks for calling. something you want to respond to? >> guest: unfortunately i'm not familiar with the circumstances. i don't think i could respond to that. >> host: phoenix, peg, democrat. >> caller: good morning. >> ho
does a bill make distinction between cyberattack and cyber activism. >> guest: they do not.protecting network. less focused on attack and more focused on process more broadly. >> host: russell from texas. independent. >> caller: hi, there. >> host: is this russell? >> caller: no, this is bonnie cameron. >> host: we're glad to have you, go ahead you. >> caller: yes. i want to make a comment on homeland security. i think they are spending too much money...
1,008
1.0K
tv
eye 1,008
favorite 0
quote 0
some believe they were taken down in a cyberattack but no one has claimed responsibility.ter. it shows the new york skyline and then the words al qaeda coming soon again in new york. it's been posted on several arabic language websites. new york police and fbi are investigating where it came from but they say there's no specific credible threat. >>> over the edge literally. incredible video of an 18 wheeler busting through a divider going over a snowy cliff and rolling down a hill. watch the tow truck. watch the tow truck. the tow truck goes down with it. this happened in norway. police say the driver went down with the rig. he survived. he has several broken bones. the tow truck driver thankfully bailed out in time. >>> mitt romney shut down a question about his mormon faith during a campaign event in wisconsin. a man began reading an old passage from a mormon text that describes people with black skin as cursed. romney cut him off. the man then asked the gop candidate whether he believes it's a sin for inter racial couples to have children. romney was visibly annoyed and
some believe they were taken down in a cyberattack but no one has claimed responsibility.ter. it shows the new york skyline and then the words al qaeda coming soon again in new york. it's been posted on several arabic language websites. new york police and fbi are investigating where it came from but they say there's no specific credible threat. >>> over the edge literally. incredible video of an 18 wheeler busting through a divider going over a snowy cliff and rolling down a hill....
255
255
Apr 27, 2012
04/12
by
CNNW
tv
eye 255
favorite 0
quote 0
sounds like a script out of hollywood this guy's name is kevin lu, he is accused on launching cyberattacks crossed him in his opinion. problem is he has gotten it wrong a lot. he is suspected in more than 90 burglaries. they say he would unleash cyberterror on anyone who accused him or did something wrong to him, like bosses who fired him. police officers who arrested him. he would make malicious allegations, accusing people of rape to prostitution, getting the enemies wrong. mistaken enemies and going after them like this online. allegedly costing a family their business and threatening their kids. this guy is in serious trouble. i said hollywood drama i wasn't kidding. >> he has issues. >> he accused a police officer of molesting a half dozen underage children. these are the officers charged with investigating him. >> don't cross mr. lu. >>> an adorable 80-year-old grandmother from staten island, josephine lamberti, she is better known as j dimples. all she wants for her birthday is 80,000 twitter followers. i will follow her now. she said she has old lady swag, says i'm school, stylish,
sounds like a script out of hollywood this guy's name is kevin lu, he is accused on launching cyberattacks crossed him in his opinion. problem is he has gotten it wrong a lot. he is suspected in more than 90 burglaries. they say he would unleash cyberterror on anyone who accused him or did something wrong to him, like bosses who fired him. police officers who arrested him. he would make malicious allegations, accusing people of rape to prostitution, getting the enemies wrong. mistaken enemies...
61
61
Apr 27, 2012
04/12
by
CSPAN2
tv
eye 61
favorite 0
quote 0
question on the same subject, but switching from the national security and public safety side of cyberattackto the intellectual property and economic competitiveness this side of ours cybervulnerability in, i set about two years ago that i thought we are on the losing end of the biggest transfer of wealth in the history of humankind through theft and piracy because of the attacks on our industrial base and our technological base from overseas for the purpose of industrial espionage and stealing intellectual property.
question on the same subject, but switching from the national security and public safety side of cyberattackto the intellectual property and economic competitiveness this side of ours cybervulnerability in, i set about two years ago that i thought we are on the losing end of the biggest transfer of wealth in the history of humankind through theft and piracy because of the attacks on our industrial base and our technological base from overseas for the purpose of industrial espionage and stealing...
561
561
Apr 27, 2012
04/12
by
KRCB
tv
eye 561
favorite 0
quote 0
and what this means is our bodies are going to become increasingly vulnerable to cyberattack. >> reporter: a high-level consultant to the u.s. government and interpol, goodman advises on technology-based security threats worldwide. goodman is the faculty skeptic at singularity university, the futuristic california think tank, who rains on his colleagues utopian parade of to goodman, high octane high tech is a double edged sword. >> i think all of this technology will develop in really cool and interesting ways, and there'll be a lot of great things that happen. but i can tell you at the same time there will be some bad stuff as well. there are bad actors from both the crime and the terrorism perspective that are using these technologies for ill. >> reporter: now, there's already plenty of bad stuff says goodman like those two million computer viruses a month. but today's hackers are much more dangerous. >> the bad guys live inside your machine, they watch everything you do. anytime you type in your bank account or credit card information onto the machine they're capturing it, they're capt
and what this means is our bodies are going to become increasingly vulnerable to cyberattack. >> reporter: a high-level consultant to the u.s. government and interpol, goodman advises on technology-based security threats worldwide. goodman is the faculty skeptic at singularity university, the futuristic california think tank, who rains on his colleagues utopian parade of to goodman, high octane high tech is a double edged sword. >> i think all of this technology will develop in...
95
95
Apr 5, 2012
04/12
by
CSPAN
tv
eye 95
favorite 0
quote 0
we must prepare to manage the consequences of cyberattack. we must minimize the potential for damage, whether that means in printing data are having redundant systems that can be reconstituted in the event of an attack. as we move further into an information-driven future in which our work, social, consumer, and so many other aspects of our lives offline intertwine with activities online, cyber challenges will continue to dominate. from the law enforcement perspective, we can expect there will be investigated the growing pains. along with the threat, the scope of our responsibility will continue to expand. this is to ensure the safety of our citizens, businesses, and government. we can expect that there will be cases in which minimizing the impact of the victims is the resolution and that legislators around the world, with additional time and encouragement to agree uniform laws, they clearly defined boundaries and penalties. despite these challenges, improved information sharing and strategic planning a month public, private industry, an inte
we must prepare to manage the consequences of cyberattack. we must minimize the potential for damage, whether that means in printing data are having redundant systems that can be reconstituted in the event of an attack. as we move further into an information-driven future in which our work, social, consumer, and so many other aspects of our lives offline intertwine with activities online, cyber challenges will continue to dominate. from the law enforcement perspective, we can expect there will...
76
76
Apr 2, 2012
04/12
by
CSPAN2
tv
eye 76
favorite 0
quote 0
conversations] >> we were warned in the next 12-18 months that america will suffer a catastrophic cyberattack. they don't choose those words indiscrime inaptly. we're five months into the warning period. tells me we have to move rapidly, but not in a way that violates privacy or the basic tenants of privacy and that encourages quick reaction, not sort of regulatory environment. >> tonight, the chairman of the house subcommittee on communications and technology, congressman greg waldon on cybersecurity and priefty at 8 eastern on "the communicators" on c-span2. >> the feminist majority foundation held a forum on the elections focusing on ballot measures around the country dealing with abortion, labor issues, and same-sex marriage. this is an hour. >> this next forum is called "coming to a state near year: round up of ballot initiatives and voter suppression efforts." you heard a little bit today already about some of the so-called personhood initiatives that are going to be on state ballots. we have some of the leading experts to tell you a little more about where those are happening and the i
conversations] >> we were warned in the next 12-18 months that america will suffer a catastrophic cyberattack. they don't choose those words indiscrime inaptly. we're five months into the warning period. tells me we have to move rapidly, but not in a way that violates privacy or the basic tenants of privacy and that encourages quick reaction, not sort of regulatory environment. >> tonight, the chairman of the house subcommittee on communications and technology, congressman greg...
169
169
Apr 7, 2012
04/12
by
CSPAN
tv
eye 169
favorite 0
quote 0
we must prepare to manage the consequences of cyberattack. we must minimize the potential for damage, whether that means in printing data are having redundant systems that can be reconstituted in the event of an attack. as we move further into an information-driven future in which our work, social, consumer, and so many other aspects of our lives offline intertwine with activities online, cyber challenges will continue to dominate. from the law enforcement perspective, we can expect there will be investigated the growing pains. along with the threat, the scope of our responsibility will continue to expand. this is to ensure the safety of our citizens, businesses, and government. we can expect that there will be cases in which minimizing the impact of the victims is the resolution and that legislators around the world, with additional time and encouragement to agree uniform laws, they clearly defined boundaries and penalties. despite these challenges, improved information sharing and strategic planning a month public, private industry, an inte
we must prepare to manage the consequences of cyberattack. we must minimize the potential for damage, whether that means in printing data are having redundant systems that can be reconstituted in the event of an attack. as we move further into an information-driven future in which our work, social, consumer, and so many other aspects of our lives offline intertwine with activities online, cyber challenges will continue to dominate. from the law enforcement perspective, we can expect there will...
139
139
Apr 2, 2012
04/12
by
CSPAN2
tv
eye 139
favorite 0
quote 0
. >> when we're warned in the next 12 to 18 months america will suffer a catastrophic cyberattack they don't choose those words indiscrimminantly. we're already four or five months into that warning period, it tells me we have to move rapidly but not in a way that either violates privacy or the basic tenants of privacy and that encourages quick reaction, not, not sort of regulatory environment. >> tonight the chairman of the house subcommittee on chairman and technology, congressman greg walden on privacy security and privacy at 8:00 eastern on "the communicators" on c-span2. >> ex-perlts on iran, nuclear weapons and national security met last week to debate the pros and cons of a u.s. strike on iran and the next round of nuclear talks expected in april. michael adler of the wilson center said the chance of a military conflict have lessened in the recent weeks. the cato institute in washington hosted this event. >> good. we're good. all right. thank you very much. welcome. welcome to the cato institute. my name is christopher premel. i'm the vice president of defense of foreign policy
. >> when we're warned in the next 12 to 18 months america will suffer a catastrophic cyberattack they don't choose those words indiscrimminantly. we're already four or five months into that warning period, it tells me we have to move rapidly but not in a way that either violates privacy or the basic tenants of privacy and that encourages quick reaction, not, not sort of regulatory environment. >> tonight the chairman of the house subcommittee on chairman and technology, congressman...