143
143
Mar 2, 2014
03/14
by
CSPAN2
tv
eye 143
favorite 0
quote 0
they can carry out some form of a cyberattack that the states are still the big dogs. this event is the first part. the second is is this openly a triumph or a tragedy. and i just think it's a revolutionary technology. and the reality throughout history is that it's a revolutionary game changer that is different before and after, so much so that the people were not for whatever hard time imagining the world after. every single time there has been one of those technologies going on and has been used for both good and bad. the first tool, some human at some point picked up a stone. they use it to build or to bash someone in the head or not were probably the best parallel to the internet would be the printing press on one hand. it led to literacy, democracy, sports illustrated swimsuit model edition. and at the same time it led to the reformation. if you're protestant coming into great thing, but the pope, not so much. if you look at the casualties among approximately one third of europe is killed in the wars that follow. so the internet has been, again, one of the most i
they can carry out some form of a cyberattack that the states are still the big dogs. this event is the first part. the second is is this openly a triumph or a tragedy. and i just think it's a revolutionary technology. and the reality throughout history is that it's a revolutionary game changer that is different before and after, so much so that the people were not for whatever hard time imagining the world after. every single time there has been one of those technologies going on and has been...
75
75
Mar 20, 2014
03/14
by
CSPAN2
tv
eye 75
favorite 0
quote 0
yes nazi actors can carry out forms of cyberattacks but the states are still the big dogs. that is the first part of it. the second was your question about ultimately is this a triumph or a tragedy? i just think it's a revolutionary technology and the reality throughout history is that and ice a revolutionary the game-changer eight disruption and the world was fundamentally different before and after so much so that the people before would have have a hard time imagining the world after. every time there has been a technology it has been used good and bad. the first tool some human at some point picked up a stone and did they use it to build or to bash someone in the head? or probably the best parallel for the internet would be the printing press. the printing press on one hand led to mass literacy, new models of citizenship, democracy. sports illustrated some should model edition. at the same time it led to reformation. if you are protestant you think it's a great thing. if it's the pope not so much. if you're looking at casualty flows approximately one third of europe is
yes nazi actors can carry out forms of cyberattacks but the states are still the big dogs. that is the first part of it. the second was your question about ultimately is this a triumph or a tragedy? i just think it's a revolutionary technology and the reality throughout history is that and ice a revolutionary the game-changer eight disruption and the world was fundamentally different before and after so much so that the people before would have have a hard time imagining the world after. every...
123
123
Mar 20, 2014
03/14
by
BLOOMBERG
tv
eye 123
favorite 0
quote 0
-- cyberattacks.ded with the russian troops moving in. armed conflict will include a cyber conflict. >> what about this? how is it that two weeks after a 777 disappears, we have no idea what happened to it? >> i am more preoccupied with the ukrainian situation. take a long planes time to find. two weeks later and we're still looking. i hope just really is find it. there are bigger issues in the world. >> what about flight data? >> that is what i was about to say. the reason we have not found it is because of a lack of technology. it is lack of technology in the cockpit. permission to use and i had -- ipad by a pilot. should be wrapped in sensors. claims should not be allowed to disappear from radar. airplanes should not be allowed to disappear from radar. why do i not have very high speed internet connection to a huge number of satellites that are sitting closer to the plane? the fact that we do not have connectivity on these flying fortresses is a problem. i have you solved that problem? >> start exa
-- cyberattacks.ded with the russian troops moving in. armed conflict will include a cyber conflict. >> what about this? how is it that two weeks after a 777 disappears, we have no idea what happened to it? >> i am more preoccupied with the ukrainian situation. take a long planes time to find. two weeks later and we're still looking. i hope just really is find it. there are bigger issues in the world. >> what about flight data? >> that is what i was about to say. the...
136
136
Mar 1, 2014
03/14
by
ALJAZAM
tv
eye 136
favorite 0
quote 0
management and cyber security company in dallas watches for trends in cyberattacks.e said its likely hackers will find another way perhaps online. >> but if you're just shifting it from the physical card fraud, lowering that over to online fraud. then we've spent billions of dollars and shifted liability for potentially no real benefit. >> reporter: but retailers are aware of the online fraud potential and looking to step up online transaction as well. it will be a game of leapfrog between hackers and retailers that won't end soon. >> thanks for watching, i'm morgan radford in new york city. we leave now with pictures from ukraine. >> hello and welcome. i am here to talk about innovations that can change lives. we are going to explore the intersection of hardware and humanity and doing it in a unique way. this is a show about science by scientists. let's check out our team of hardcore nerds. lindsey miran is a cia operative and analyst. tonight, high tech crime stoppers. shots fired in the night. cops pinpoint the crime scene. how do they do it? the new science of so
management and cyber security company in dallas watches for trends in cyberattacks.e said its likely hackers will find another way perhaps online. >> but if you're just shifting it from the physical card fraud, lowering that over to online fraud. then we've spent billions of dollars and shifted liability for potentially no real benefit. >> reporter: but retailers are aware of the online fraud potential and looking to step up online transaction as well. it will be a game of leapfrog...
121
121
Mar 2, 2014
03/14
by
CSPAN2
tv
eye 121
favorite 0
quote 0
he testified to congress that everyday america's armed forces face millions of cyberattacks.but to get those numbers he was combining everything from unmotivated stands who never even tried to enter network or an attempt to carry out pranks or political protest and tends to carry out espionage and diplomatic espionage and national security espionage. all together. but none of those millions of attacks in the wider body of politics saw this when they said it erred the so-called digital pearl harbor were cyber9/11. and they have not only been excused in major government speeches i've been reported over a half lean times. so essentially what happens when people are talking about cyberattacks as they are bundling together all of these various things simply because they involve the internet and its related technology. the parallel would be a lot like saying that a group of teenagers with firecrackers and political protesters in the street with a smoke bomb, terrorist with roadside bombs, james bond with his pistol and a russian cruise missile, these are all one in the name because
he testified to congress that everyday america's armed forces face millions of cyberattacks.but to get those numbers he was combining everything from unmotivated stands who never even tried to enter network or an attempt to carry out pranks or political protest and tends to carry out espionage and diplomatic espionage and national security espionage. all together. but none of those millions of attacks in the wider body of politics saw this when they said it erred the so-called digital pearl...
54
54
Mar 25, 2014
03/14
by
CSPAN
tv
eye 54
favorite 0
quote 0
but there's still lots of cyberattacks that occur, as i said early errier, not only from -- earlier, not only from china but a number of places around the world. those number of attacks, as the cyberworld becomes more complicated, are on the rise. >> and general scaparrotti, what is your estimate of north korea's efforts in cyberattacks? >> senator, north korea is, along with their other means, are investing in cybercapability. presently at this time they've been known to use their cybercapability here a year ago. they had, we believe it was north korea that had the impact in south korea's median banking institutions. presently it is a disruption of services, disruption of website capability, but they're focused on it and their capabilities are gaining. >> general, again on another issue, can you provide us with just a current status of the relocation of forces to camp humphries? >> yes, sir. our relocation has begun, as you know. we are moving forces according to the alliant partnership plan from the north, which we call area one, north of seoul. yongsong area he predominantly. pres
but there's still lots of cyberattacks that occur, as i said early errier, not only from -- earlier, not only from china but a number of places around the world. those number of attacks, as the cyberworld becomes more complicated, are on the rise. >> and general scaparrotti, what is your estimate of north korea's efforts in cyberattacks? >> senator, north korea is, along with their other means, are investing in cybercapability. presently at this time they've been known to use their...
68
68
Mar 20, 2014
03/14
by
CSPAN2
tv
eye 68
favorite 0
quote 0
essentially what happens when people are talking about cyberattacks as they are bundling together these various things simply because they involve the internet. and its related technology. the parallel with a lot like say a group of teenagers with firecrackers political protesters in the street with the smoke bomb,
essentially what happens when people are talking about cyberattacks as they are bundling together these various things simply because they involve the internet. and its related technology. the parallel with a lot like say a group of teenagers with firecrackers political protesters in the street with the smoke bomb,
55
55
Mar 31, 2014
03/14
by
CSPAN
tv
eye 55
favorite 0
quote 0
see the pace of chinese cyberattacks this year coming up 2014. the first quarter so far, the rest of the year. we saw an extraordinary amount in 2013. how would you compare the volume and the quality or the targets involved? >> i think after we made it fairly public that there was knowledge of what was happening from some of the factions in china, for some. of time there was a decrease, i understand. are still lots of cyberattacks that occur, as i said earlier, not only from china but other places in the world heard those numbers of world becomesyber more complicated, are on the rise. general, what is your estimate of north korea's efforts in cyberattacks? korea is,, north along with other asymmetric means, investing in cyber capability. presently, at this time, they have been known to use their cyber capability. they had the impact and south korea's media and banking institutions. presently, it is disruption of services, disruption of website capability, but they are focused on it and the capabilities are gaining. general, on another issue, can
see the pace of chinese cyberattacks this year coming up 2014. the first quarter so far, the rest of the year. we saw an extraordinary amount in 2013. how would you compare the volume and the quality or the targets involved? >> i think after we made it fairly public that there was knowledge of what was happening from some of the factions in china, for some. of time there was a decrease, i understand. are still lots of cyberattacks that occur, as i said earlier, not only from china but...
39
39
Mar 29, 2014
03/14
by
CSPAN
tv
eye 39
favorite 0
quote 0
security in 2012, but is not immune to cyberattacks and data breaches. at federal agencies reported 22,008 a breach incidents, more than double the amount reported in 29. additionally, the government accountability office identified >> incidents where they failed to notify individuals in times of breaches or personal harm. in an affect consumers variety ways. is a risk of real harm stemming from a breach, we need to make sure the consumers have the information they need to protect themselves. that is why i support a uniform federal breach information thedard to the place pathways for laws in 44 states and the district of columbia. consumersnsure that are treated the same way. it would also remove uncertainty regarding timely notification benefits, which consumers and businesses. i also want to ensure that businesses are not burdened by outdated or ill-suited security requirements but are rather divided the flexibility to develop tools to protect the information they are in trusted to protect. for these reasons, i cosponsored 93 with senator to me and a n
security in 2012, but is not immune to cyberattacks and data breaches. at federal agencies reported 22,008 a breach incidents, more than double the amount reported in 29. additionally, the government accountability office identified >> incidents where they failed to notify individuals in times of breaches or personal harm. in an affect consumers variety ways. is a risk of real harm stemming from a breach, we need to make sure the consumers have the information they need to protect...
89
89
Mar 14, 2014
03/14
by
CSPAN2
tv
eye 89
favorite 0
quote 0
cyberattacks or otherwise. i wanted to ask you about the department of defense a bullet of the overall to a cyber attack. in january 2013 that defense science board issued a task force report entitled resilient military systems in advance of cyber threats. the report concluded that the united states cannot be confident that our critical information technology systems will work under attack from a sophisticated and well resourced upon it. utilizing cyber capabilities in common is with all of the military and intelligence capabilities. in other words, we are not confident many of our military systems would work if we are attacked. by high and peer-to-peer adversary. do you share that assessment? how can we make sure that dod is more resilient to cyber attacks? >> i certainly share that concern which is one reason why i believe creating a defensible architecture has got to be one of the most important things we do. the network structure of today reflects a different time and place. i have explained that firsthand
cyberattacks or otherwise. i wanted to ask you about the department of defense a bullet of the overall to a cyber attack. in january 2013 that defense science board issued a task force report entitled resilient military systems in advance of cyber threats. the report concluded that the united states cannot be confident that our critical information technology systems will work under attack from a sophisticated and well resourced upon it. utilizing cyber capabilities in common is with all of the...
60
60
Mar 31, 2014
03/14
by
ALJAZAM
tv
eye 60
favorite 0
quote 0
. >>> cyberattack, group called anonymous taking credit for crashing the albuquerque site, warning theyill retaliate after the police shot a homeless man. >>> this is thed the line to sign up for health insurance under the affordable care act. 1.2 million visiting the website this weekend alone. >>> president obama and his ahighs organizing for action -- allies organizing for action. the hashtag, #getcoverednow. texas senator ted cruz trying to get the #fullrepeal. >>> statistician following a suit by australia, australia accusing japan of violating a moratorium on full whaling. andrew thomas reports. >> thousands of dead whales, it all boils down to a verdict that had two hours to explain. japan's whaling program is not for scientific research and should end immediately. >> little attention was given to using nonlethal messed -- methods, played a role in the program's design. >> an internationally agreed moratorium bans whaling but there is an exception for scientific research. japan claimed its whaling program was just that. the scientific effort was merely offer for an object, whales
. >>> cyberattack, group called anonymous taking credit for crashing the albuquerque site, warning theyill retaliate after the police shot a homeless man. >>> this is thed the line to sign up for health insurance under the affordable care act. 1.2 million visiting the website this weekend alone. >>> president obama and his ahighs organizing for action -- allies organizing for action. the hashtag, #getcoverednow. texas senator ted cruz trying to get the #fullrepeal....
142
142
Mar 20, 2014
03/14
by
BLOOMBERG
tv
eye 142
favorite 0
quote 0
looks at us and it looks like boots on the ground are still very decisive. >> there was also a cyberattackscided with the russian troops moving in. >> absolutely, we live in a world where every armed conflict will include a cyber component. that is irrevocable. >> what about this place? how is it that two weeks after a gigantic jets as appears, we have no idea what happened to it? >> i don't know. to be honest, i'm more preoccupied with the ukrainian situation. disappearing planes usually take three days to fall out of popular consciousness. two weeks later and we are still looking for the plane. i hope they find it because i think there are bigger issues in the world. >> what about flight data? >> the reason we have not found that is not lack of technology. it's a lack of technology in the cockpit. the permission to use an ipad for a pilot that united airlines gave a few months ago -- that was great. that should be wrapped in sensors. the plane should never be allowed to disappear from radar. radar does not reach to the ground. all these statements seem ridiculous. why do i not have very h
looks at us and it looks like boots on the ground are still very decisive. >> there was also a cyberattackscided with the russian troops moving in. >> absolutely, we live in a world where every armed conflict will include a cyber component. that is irrevocable. >> what about this place? how is it that two weeks after a gigantic jets as appears, we have no idea what happened to it? >> i don't know. to be honest, i'm more preoccupied with the ukrainian situation....
147
147
Mar 13, 2014
03/14
by
FBC
tv
eye 147
favorite 0
quote 0
>> we spent a lot of times worried about cyberattack because it is controlled through the internet now reminds us it is not just cyberattack by coordinated on as few as nine power stations could knock out the grid. the power companies have already began to spend money on security. neil: but some just have tall fences. >> as we saw with san jose spinet that is what they we're doing. >> do you think that's right combination of a tax. >> that is the worst worst case scenario parted it is it is hard to replace those transformers because there is only a couple of people that make them. this would knock us out for a while. the power companies today probably already but are scampering to protect these power station is not only with the consequences but expose with the enormous liability to bankrupt them. when you think about it this report points out these power stations that millions of people rely with high fences a unblocks it is not so hard to break through if you are e. enough of an enemy to do that. there are people like that out there. neil: your thoughts on the 2016 race? we have at l
>> we spent a lot of times worried about cyberattack because it is controlled through the internet now reminds us it is not just cyberattack by coordinated on as few as nine power stations could knock out the grid. the power companies have already began to spend money on security. neil: but some just have tall fences. >> as we saw with san jose spinet that is what they we're doing. >> do you think that's right combination of a tax. >> that is the worst worst case...
77
77
Mar 27, 2014
03/14
by
CSPAN
tv
eye 77
favorite 0
quote 0
cyberattacker can overcome even strong mope defenses. strategies to strengthen the defenses inside the perimeter. ood information security governance is vital. and industry regulations like and frameworks like sands, nd iso are available to help build the architectures. you might be asking how did the breeches oh can you are? stronger t accounts than using a pass word? why wasn't the network segmented sensitive data? why weren't alerts responded to monitoring equipment capturing the unauthorized traffic patterns. nothing in the breeches was new. if we created the culture that understand thend risk, how do we create regulations that evolve and if we with technology, haven't, then no regulation or no security tool will solve our problem. thes and credit unions bear cost of car reissuance and they suffer the pain of cards and accounts. risk assessments where sensitive must consider the data. cybercrime poses a greater individuals than ever before. the challenge is balancing, balancing the importance of the cting data with benefits of emergi
cyberattacker can overcome even strong mope defenses. strategies to strengthen the defenses inside the perimeter. ood information security governance is vital. and industry regulations like and frameworks like sands, nd iso are available to help build the architectures. you might be asking how did the breeches oh can you are? stronger t accounts than using a pass word? why wasn't the network segmented sensitive data? why weren't alerts responded to monitoring equipment capturing the...
162
162
Mar 2, 2014
03/14
by
FOXNEWSW
tv
eye 162
favorite 0
quote 0
we can't do this just dealing with cyberattacks and technology. we need to build up our military, not deplete it. >> we know our forces are the best, the brightest and bravest. >> and i agree with that. >> what do you think of the president's foreign policy and the critics? quickly. >> a few things, especially as we're talking about this issue. this is being talked about about our forces and what to do with them since donald rumsfeld, who has also said -- then on to secretary gates. i think we have a president that doesn't saber rattle. i think we have a president that got us out of two wars, and i was listening to fox news this morning and some of the hawks and what they were saying about president obama. i think he's done a great job at lating our military and our foreign policy. >> he is the commander in chief. got to leave it there. fair and balanced, we report, our audience always decided. thanks to both of you. eric? >>> jailie, it is now mar. it's now countdown for obamacare. now new polls show what americans they about the law as the deadl
we can't do this just dealing with cyberattacks and technology. we need to build up our military, not deplete it. >> we know our forces are the best, the brightest and bravest. >> and i agree with that. >> what do you think of the president's foreign policy and the critics? quickly. >> a few things, especially as we're talking about this issue. this is being talked about about our forces and what to do with them since donald rumsfeld, who has also said -- then on to...
210
210
Mar 24, 2014
03/14
by
CNBC
tv
eye 210
favorite 0
quote 0
senator mark warner, he's attempting to prevent cyberattacks from the ukraine into this country.ntly at whether markets are now underpricing geopolitical risk. are we reaching a tipping point? that on hour two of "squawk on the street." for hearburn? yea. try alka seltzer fruit chews. they work fast on heart burn and taste awesome. these are good. told ya! i'm feeling better already. alka-seltzer fruit chews. enjoy the relief! humans -- we are beautifully imperfect creatures, living in an imperfect world. that's why liberty mutual insurance has your back, offering exclusive products like optional better car replacement, where, if your car is totaled, we give you the money to buy one a model year newer. call... and ask an insurance expert about all our benefits today, like our 24/7 support and service, because at liberty mutual insurance, we believe our customers do their best out there in the world, so we do everything we can to be there for them when they need us. plus, you could save hundreds when you switch -- up to $423. call... today. liberty mutual insurance. responsibility
senator mark warner, he's attempting to prevent cyberattacks from the ukraine into this country.ntly at whether markets are now underpricing geopolitical risk. are we reaching a tipping point? that on hour two of "squawk on the street." for hearburn? yea. try alka seltzer fruit chews. they work fast on heart burn and taste awesome. these are good. told ya! i'm feeling better already. alka-seltzer fruit chews. enjoy the relief! humans -- we are beautifully imperfect creatures, living...
144
144
Mar 13, 2014
03/14
by
FBC
tv
eye 144
favorite 0
quote 0
melissa: seems like, ian, you can speak to this but we're really vulnerable to cyberattack. i know from covering the middle east and energy there, that is where the attacks come. when you're talking about saudi arabia, i mean this is what you do. you hack in and you take over energy supplies. >> absolutely. absolutely. the cyber front is really, has a lot of impact on the general notion of power plants and power grids. again, you have to remember that cyber doesn't carry buy itself. melissa: yes. >> you can do so much just using a cyberattack but what really concerns us is a combined attack. melissa: what would very to do and what would the cost right now. >> that a good question. i don't know about this but does law enforcement get this. >> they get it but usually after the fact. up to private companies. 90% of our infrastructure is privately owned in this country. >> federal law enforcement can't say anything? >> department of homeland security may make recommendations and there are certain regulation that go obviously too with this power grid. however, the responsibility
melissa: seems like, ian, you can speak to this but we're really vulnerable to cyberattack. i know from covering the middle east and energy there, that is where the attacks come. when you're talking about saudi arabia, i mean this is what you do. you hack in and you take over energy supplies. >> absolutely. absolutely. the cyber front is really, has a lot of impact on the general notion of power plants and power grids. again, you have to remember that cyber doesn't carry buy itself....
279
279
Mar 17, 2014
03/14
by
KQED
tv
eye 279
favorite 0
quote 0
. >>> nato says a cyberattack apparently linked to the conflict in ukraine brought down several of itseb sites last night. a pro-russian group claiming respond set it targeted nato because of the what it called the western alliances' interference. nato said it did not bead its ability to command and the classified networks were not affected. >>> elsewhere in western europe, paris and other cities in northern france are suffering through severe smog. in response, parisian officials have made all travels on subway and buses free. starting tomorrow they will place travel restrictions on drivers and motorcycles to stop, with odd-numbered license plates being a laed to drive one day, and those with even-numbered license plates the next. they issued a health advisory for the elderly, small children and those with respiratory conditions. >>> north korea today launched 25 short-range rockets into the sea off its east coast. this in apparent retaliation for ongoing military exercises between the united states and south korea. the north says the military drills are a pretext for an invasion. the
. >>> nato says a cyberattack apparently linked to the conflict in ukraine brought down several of itseb sites last night. a pro-russian group claiming respond set it targeted nato because of the what it called the western alliances' interference. nato said it did not bead its ability to command and the classified networks were not affected. >>> elsewhere in western europe, paris and other cities in northern france are suffering through severe smog. in response, parisian...
68
68
Mar 31, 2014
03/14
by
CSPAN
tv
eye 68
favorite 0
quote 0
before the senate armed services on tuesday eared the hearing covered china's growing power and the cyberattacks. this is about two hours and 10 minutes. >> good morning, everybody. we have received testimony on the posture of u.s. forces in the asia-pacific region. on behalf of the committee, i would like to welcome admiral locklear, the commander of u.s. as if the command and general scaparrotti, commander of the u.s. forces of korea and the united forces command and combined forces command in korea. the committee appreciates is your long years of faithful service and the many sacrifices you and your families have made for our nation will start we greatly appreciate your service who have served with you and your commands. ourse convey to them admiration and appreciation for their selfless sacrifice and dedication. , a general was unable to testify because of the heightened testimony. general scaparrotti we're are glad you're able to make it this year. today's hearing is timely as inth korea is again engaged dangerous rocket and missile launches, including the one a few weeks ago. to joh jong-u
before the senate armed services on tuesday eared the hearing covered china's growing power and the cyberattacks. this is about two hours and 10 minutes. >> good morning, everybody. we have received testimony on the posture of u.s. forces in the asia-pacific region. on behalf of the committee, i would like to welcome admiral locklear, the commander of u.s. as if the command and general scaparrotti, commander of the u.s. forces of korea and the united forces command and combined forces...
213
213
Mar 14, 2014
03/14
by
FOXNEWSW
tv
eye 213
favorite 0
quote 0
of course that christmas cyberattack that has affected millions of target customers, we actually knowand target is admitting to this, their security systems told them about a hack attack, as early as november the 30th. that is, the saturday of black friday weekend. but it wasn't until weeks later, december 12th, that target actually started the investigation. so why didn't they take that warning from their security system seriously? well they get hundreds of them a day. they didn't think it warranted further action at that time. if only, you know, if only hindsight were foresight, jenna, right? a lot of people would trust target at this point. if you look at their january traffic numbers, shoppers are not shopping at target like they used to. the lowest january numbers in three years. jenna: interesting. now some lawmakers are talking about whether or not there needs to be laws when you do know about a massive cyberattack you actually tell your customers. seems like it would be logical. sometimes it is not. lauren, thank you. >> good to see you, jenna. bye. gregg: president obama is s
of course that christmas cyberattack that has affected millions of target customers, we actually knowand target is admitting to this, their security systems told them about a hack attack, as early as november the 30th. that is, the saturday of black friday weekend. but it wasn't until weeks later, december 12th, that target actually started the investigation. so why didn't they take that warning from their security system seriously? well they get hundreds of them a day. they didn't think it...
82
82
Mar 15, 2014
03/14
by
CSPAN2
tv
eye 82
favorite 0
quote 0
i then got a series of phone calls from journalists calling for my opinion on this cyberattack. it is a daughter who -- a double layer thing. the last question about hysteria and psychological approaches, 600,000 people in pennsylvania without power, wall street journal has a news story about an attack by rifles that didn't leave anyone without power but you also have a bunch of people interpreting that as a cyberattack. this is a problem set. >> maybe one more question. question here? may be another professor of computers? >> [inaudible] >> there is no global mechanism to unfolds another three. information and something like that. in that case -- [inaudible] >> and people in the country. that is the moment. >> great question. i was flashing my head to indicate washington as well. what can we do about this anonymous group. one is to better understand it and picture their lives differently and particularly because it is iconic use of waste portrayed in the media. one to understand the group and understand it is not centralized, understand the group and understand the motivation,
i then got a series of phone calls from journalists calling for my opinion on this cyberattack. it is a daughter who -- a double layer thing. the last question about hysteria and psychological approaches, 600,000 people in pennsylvania without power, wall street journal has a news story about an attack by rifles that didn't leave anyone without power but you also have a bunch of people interpreting that as a cyberattack. this is a problem set. >> maybe one more question. question here?...
264
264
Mar 16, 2014
03/14
by
KPIX
tv
eye 264
favorite 0
quote 0
i find it interesting that that happens, you have some low level cyberattacks happening which we've seen russians use in the past. then this notion, we'll have discussion about constitutional reform in kiev about the crimea peninsula. >> schieffer: you said couple of weeks ago that russian president putin was playing chess and we're playing marbles. do you think he's won this round? >> clearly he has set the table to his advantage in any negotiation going forward. clearly that's happened. the fact that we've had a little bit of fraying in our european relationships diplomatically has caused us real difficulty. so if you're asking me do i think he was -- had the advantage going in to this, yes, i do. which worries me about what was offered up in that phone call, what kind of concessions did the united states offer. did we have a relationship with the eu that would allow us to make those concessions and what are the next few steps. we'll have to learn in that the next few days. but if you look at how this has played out clearly putin has had the upper hand even though he risks huge economi
i find it interesting that that happens, you have some low level cyberattacks happening which we've seen russians use in the past. then this notion, we'll have discussion about constitutional reform in kiev about the crimea peninsula. >> schieffer: you said couple of weeks ago that russian president putin was playing chess and we're playing marbles. do you think he's won this round? >> clearly he has set the table to his advantage in any negotiation going forward. clearly that's...
181
181
Mar 27, 2014
03/14
by
CSPAN2
tv
eye 181
favorite 0
quote 0
spent more than $1,426,000,000,000 in it security in this clear 2012, but it is not immune to cyberattacks and data breaches. in 2012 federal agencies reported more than 22000 data breach incidents, a number that is more than doubled what was reported in 2009. in addition a recent report by the government accounting office, the government watchdog might invite some incidents where a decent to notify individuals able in the breach was determined to have a high risk. ranging from a convinced that i credit card replaced to the home of identity theft were a criminal run up large debts or commits crimes in the victims names. when there's a risk of real harm stemming from a bridge we need to make sure consumers have the information they need to protect themselves. that's why i support a uniform federal breach notification standard to replace the patchwork of laws in 46 states and the district of columbia. a single federal standard would ensure that all consumers are treated same way with regard to notification of data breaches that might cause them or. such a standard would provide consistency a
spent more than $1,426,000,000,000 in it security in this clear 2012, but it is not immune to cyberattacks and data breaches. in 2012 federal agencies reported more than 22000 data breach incidents, a number that is more than doubled what was reported in 2009. in addition a recent report by the government accounting office, the government watchdog might invite some incidents where a decent to notify individuals able in the breach was determined to have a high risk. ranging from a convinced that...
96
96
Mar 15, 2014
03/14
by
CSPAN2
tv
eye 96
favorite 0
quote 0
he testified to congress, quote, everyday america's armed forces face millions of cyberattacks. but to get those numbers he was combining everything from unmotivated probes that never tried to enter networks to attempts to carry out pranks to attempts to carry out political protests to attempts to carry out economic espionage, diplomatic espionage, national security espionage, all together. bent none of those millions of attacks were what his audience in that congressional briefing room and in the water body of politics thought when he said it, attempt at digital pearl harbor or cyber9/11. digital pearl harbor and cyber9/11 have not only been used to make government speeches but been reported in the media over a half-million times so essentials what happens when people are talking about cyberattacks is they are bundling together all these various things simply because they involve the internet and its related technology. the parallel would be a lot like saying a group of teenagers with firecrackers, political protesters in the street with the smoke bomb, a terrorist with a roads
he testified to congress, quote, everyday america's armed forces face millions of cyberattacks. but to get those numbers he was combining everything from unmotivated probes that never tried to enter networks to attempts to carry out pranks to attempts to carry out political protests to attempts to carry out economic espionage, diplomatic espionage, national security espionage, all together. bent none of those millions of attacks were what his audience in that congressional briefing room and in...
336
336
Mar 17, 2014
03/14
by
BLOOMBERG
tv
eye 336
favorite 0
quote 0
what's -- >> a recognition of the cyberattacks defending yourself against.t at the moment, the most dangerous and you see out there currently? tools have the tolls -- for companies to equip themselves? >> of the most dangerous thing its advanced threats. what that means is a threat that has not been seen before. an unknown attack. the trick is to make it a known as soon as you can and that is he on the way to detect it and prevent that and that is what the platform we provide the companies does. it knows all of the known attacks and more importantly, it can see the unknown attacks and very readily convert into known attacks. it was a chance to prevent them. up with a coating to prevent these attacks? how does your are in the works -- r&d work? on people.sed smart people. researchers. we have many people in the head records in silicon valley. a lot other people have been and the safety network business for a long time. many have played offense here when they are really working ifide of the hackers' minds the rent how they've -- and figure out how that will wo
what's -- >> a recognition of the cyberattacks defending yourself against.t at the moment, the most dangerous and you see out there currently? tools have the tolls -- for companies to equip themselves? >> of the most dangerous thing its advanced threats. what that means is a threat that has not been seen before. an unknown attack. the trick is to make it a known as soon as you can and that is he on the way to detect it and prevent that and that is what the platform we provide the...
147
147
Mar 12, 2014
03/14
by
CSPAN2
tv
eye 147
favorite 0
quote 0
to what extent do you believe russia is conducting cyberattacks against ukraine and what could the u.s. do to help the ukraine better defend itself against attacks from russia? >> ma'am, in an open and classified forum, i'm not prepared to speak on a nation state's behavior. cybersecurity has been an independent the past, in ukraine, syria, georgia, a norm. as we work to partner with others to develop norms of behavior and expectations for what is acceptable and what is not, examples like this highlight to us, i think, what is not acceptable. as we work with the ukrainians and other nations to attempt to figure out what is the best way too address them, whether at the ukrainians ask for specific technical assistance. we have to work through everything on a case-by-case basis. >> do you believe we should help our allies if they're receiving cyber attacks and work with them to combat the attacks. >> yes, ma'am. >> that's personality particularly with what is happening in the ukraine that we're active in this area in countering any type of actions by the russias itch wanted to ask you abo
to what extent do you believe russia is conducting cyberattacks against ukraine and what could the u.s. do to help the ukraine better defend itself against attacks from russia? >> ma'am, in an open and classified forum, i'm not prepared to speak on a nation state's behavior. cybersecurity has been an independent the past, in ukraine, syria, georgia, a norm. as we work to partner with others to develop norms of behavior and expectations for what is acceptable and what is not, examples like...
91
91
Mar 11, 2014
03/14
by
FBC
tv
eye 91
favorite 0
quote 0
liz: take out the argentinian peso and look at your beer points, the cyberattacks, exchange controls,ow do you compare it to a commodity? doesn't take commodity have to remind or farmed? >> it fits nicely in that definition if you think of virtual currencies. they are processed, steward, resold in the market and also have great scarcity and bitcoin itself is awarded so it is a virtual commodity. liz: let's bring in the guy who lives and breathes currency, stephen england, global head of gee 10 and fax. what do you say? is the right? is it a currency or a commodity? >> i agree mostly with mark, it is nowhere near being a currency. if it was meant to be a commodity when it was installed to have the properties of bowls, it's is not as if you take gold chips to the coffee stored in order to have a cup of coffee with a gold cit. liz: you can use it to pay for things like lamborghinis at this point. >> what it does have is a possibility of making transactions easier. the idea that if you are a filipino worker in dubai and want to ship money back home you can do it much less than you do curr
liz: take out the argentinian peso and look at your beer points, the cyberattacks, exchange controls,ow do you compare it to a commodity? doesn't take commodity have to remind or farmed? >> it fits nicely in that definition if you think of virtual currencies. they are processed, steward, resold in the market and also have great scarcity and bitcoin itself is awarded so it is a virtual commodity. liz: let's bring in the guy who lives and breathes currency, stephen england, global head of...
104
104
Mar 17, 2014
03/14
by
CSPAN2
tv
eye 104
favorite 0
quote 0
it is time for the largest cyberattack of its kind and stayed that way until the heartland payment systems came along at 2009 with a good portion to work on that case at the council as well. we advise and represent privacy matters, including the criminal intrusion, at nationwide, where a motion to dismiss the class-action litigation was followed by lack of injury, which i'll talk about later on probably as well. we work for it -- we assisted for my colleague doug miele is challenging the authority claimed by these again from the pact and by the ftc and the staffers to claim the ability to enforce reasonable stability standards in the hotel franchise context. we now work on issues that target as well. i'm not able to talk about any of the particular client matters in detail, but it is a very interesting time to be here and be able to talk in general about the thing better in the news and the last few years. so my kids, my general perspective is that i do look at big data issues from the perspective of someone in the trenches as a litigator dealing with the cyberattacks against company data,
it is time for the largest cyberattack of its kind and stayed that way until the heartland payment systems came along at 2009 with a good portion to work on that case at the council as well. we advise and represent privacy matters, including the criminal intrusion, at nationwide, where a motion to dismiss the class-action litigation was followed by lack of injury, which i'll talk about later on probably as well. we work for it -- we assisted for my colleague doug miele is challenging the...
137
137
tv
eye 137
favorite 0
quote 0
connection between the cyberattack and fiscal attack.t out the lights and bring the attack to the streets of america. neil: but what could, help me here. what is considered cyber? what is cyber area? >> anything that that uses computerize system. refer to scata, supervisory control and data access. we control all the big things from power plants to dams, illways, through the use of a computer. we send out a radio signal and tell them what to do. the concern of course you get into these operating systems and you manipulate them in a way thaw either mask what's going on, so in other words, a take s up supposed to let out bad material before it get as certai lel. you have a gauge, the gauge gets taken off-line. neil: don't we, starting to -- you always talk about malware type of devices some wear. don't we have the equivalent of that to ward off this. >> believe it or not the, what we say, benjamin netanyahu, the former israeli prime minister, and davos, switzerland, at economic conference called cybeecurity the arms race without end. that
connection between the cyberattack and fiscal attack.t out the lights and bring the attack to the streets of america. neil: but what could, help me here. what is considered cyber? what is cyber area? >> anything that that uses computerize system. refer to scata, supervisory control and data access. we control all the big things from power plants to dams, illways, through the use of a computer. we send out a radio signal and tell them what to do. the concern of course you get into these...
84
84
Mar 26, 2014
03/14
by
FBC
tv
eye 84
favorite 0
quote 0
industrial control systems, if you will, to try to simulate what might happen in the form of a cyberattackr research of these particular honey pots if you will or simulated production environments of these ics systems we've seen attacks even on u.s. soil as well as globally coming from russia net blocks. russian ips that are trying to overall manipulate the system, probe the systems, batter intelligence about how they operate and potentially use that later on in the event of a critical infrastructure attack. we've seen that in our research and certainly between russia and china we've seen those as the two largest groups. i'm sure the same activity is going on in eastern europe. adam: okay, jd. >> certainly within the ukraine. adam: got it. >> around their industrial control system as possible vectors, yes. adam: thank you very much, jd sherry. cheryl: we want to put your attention to the markets with breaking news. show you what is happening in the markets. stock really have reversed course. this is happening in the last few moments as you can see. we're well off session lows, down 33 poin
industrial control systems, if you will, to try to simulate what might happen in the form of a cyberattackr research of these particular honey pots if you will or simulated production environments of these ics systems we've seen attacks even on u.s. soil as well as globally coming from russia net blocks. russian ips that are trying to overall manipulate the system, probe the systems, batter intelligence about how they operate and potentially use that later on in the event of a critical...
97
97
Mar 20, 2014
03/14
by
CSPAN2
tv
eye 97
favorite 0
quote 0
2014 took a survey of americans about what they have feared most and it found that they feared cyberattacks more than iranian nuclear weapons, north korea and nuclear weapons, the rise of china, russia or climate change. what this means is the spheres of coalesced into a booming industry. one of the fastest growing bureaucracies where they were talking about the national level, the state level or the local level is constantly seen growth in the cybersecurity bureaucracies. they also mean for all the hope and promise of the digital age we also have to admit we are living through an air of what i would call cyber insecurity. it's at this point of the talk i try to do something conference today that maybe it will help us make that point. the challenge kindly introduced before of how do you write on the seemingly technical topic and make it accessible and interesting? you also do the same when you're giving a speech. what kinds of visuals can you do when you're talking about the space of zeros and ones of software so what i have done is put together what i believe is a fundamental collection th
2014 took a survey of americans about what they have feared most and it found that they feared cyberattacks more than iranian nuclear weapons, north korea and nuclear weapons, the rise of china, russia or climate change. what this means is the spheres of coalesced into a booming industry. one of the fastest growing bureaucracies where they were talking about the national level, the state level or the local level is constantly seen growth in the cybersecurity bureaucracies. they also mean for...
184
184
Mar 26, 2014
03/14
by
WUSA
tv
eye 184
favorite 0
quote 0
. >>> wallace lowe is scheduled to testify at a senate hearing on cyberattacks today.cks in the last month have compromised the personal information of hundreds of thousands of people affiliated with the university. >>> good news for music lovers. the kennedy center extended the music director's contract of the national symphony. he'll continue to lead music programs for the performing arts center. the german conductor joined the national symphony in 2010. he came here after leading the philadelphia orchestra. harpe. gratulations to nate is he our facebook fan of the day and can enjoy a papa johns pizza dinner. nate says i watch wusa9 every morning. it keeps me grounded. >> that may be one of the coolest facebook pictures we've put on tv yet. we'd like you to be our next facebook fan of the day. go to our fan page. click on the fan of the day button and fill out the form. you could win a papa johns dinner including a large pizza, chocolate chip cookie, bread sticks and a 2 liter bottle of sow today. make >>> welcome back. bundle up out there. it's cold. with the windch
. >>> wallace lowe is scheduled to testify at a senate hearing on cyberattacks today.cks in the last month have compromised the personal information of hundreds of thousands of people affiliated with the university. >>> good news for music lovers. the kennedy center extended the music director's contract of the national symphony. he'll continue to lead music programs for the performing arts center. the german conductor joined the national symphony in 2010. he came here after...
45
45
Mar 23, 2014
03/14
by
CSPAN2
tv
eye 45
favorite 0
quote 0
cyberattacks on the infrastructure ruined in the currency. so i'm not a limit to what happened in 2008, 2009, but i looked forward to what could have been. what i found was the next type of war will face is not going to be shooting more. it's not going to be guns and aircraft carriers. it will be cybereconomic in nature. this is what all of our enemies essay because they don't want to take the enemy head-to-head now. they said will crash the american economy if we get into a war. that's vladimir putin said just recently when he invaded the ukraine and several slaps sanctions on you, his response was you don't want to do that because i can crash or stop market. i can hack your financial system. the very things i read about in 2008 and covered in "game plan," "game plan" then says that that is that they intend to do, what would you as an individual american, how should you protect yourself? word you save, invest? what do you do with your money? that is the game plan. >> money-management today, are you in the stock market? >> i am. the stock mar
cyberattacks on the infrastructure ruined in the currency. so i'm not a limit to what happened in 2008, 2009, but i looked forward to what could have been. what i found was the next type of war will face is not going to be shooting more. it's not going to be guns and aircraft carriers. it will be cybereconomic in nature. this is what all of our enemies essay because they don't want to take the enemy head-to-head now. they said will crash the american economy if we get into a war. that's...
67
67
Mar 26, 2014
03/14
by
KNTV
tv
eye 67
favorite 0
quote 0
before a senate committee whether the company ignored early warning signs about the holiday season's cyberattack. the company says 40 million payment card records stolen with 70 million other records. a report released by the senate committee yesterday says target ignored automated warnings that malwar was being installed on target systems. the cfo is one of six who will testify. ellen richie will testify, the chief enterprise risk officer of foster city-based visa. >>> california lawmakers reconsidering a new law that will require all chefs and bartenders to wear gloves when they touch food. the committee voted roo-to-repeal and revisit that regulation. this requires workers wear gloves when handling ready to eat food. some say the bill needs to be more specific. >>> the berkeley city council fighting back against big oil companies after reports more shipments coming into the bay area by rail. council directed the city attorney to join any lawsuits over the transportation of oil from canada and north dakota to bay area refineries. the city will oppose permits or environmental impact reports fro
before a senate committee whether the company ignored early warning signs about the holiday season's cyberattack. the company says 40 million payment card records stolen with 70 million other records. a report released by the senate committee yesterday says target ignored automated warnings that malwar was being installed on target systems. the cfo is one of six who will testify. ellen richie will testify, the chief enterprise risk officer of foster city-based visa. >>> california...
160
160
Mar 14, 2014
03/14
by
FBC
tv
eye 160
favorite 0
quote 1
upward 100 million people had personal information stolen during the weeks long cyberattack. you used to have to be a real estate inend to get your hands on mls listings. one startup is look tock change all that. new habitat is looking to give you the inside scoop on homes. we're joined by the founder, jeff burke. thank you for being here you're trying to give trulia and cillo a run for their money. what makes your app so different than what they're offering to consumers? >> well, first, thanks for having me. what makes new habitat different is that we plugged directly into the mls. we are actually a real estate brokerage and we do help homebuyers and sellers connect with the agents that know the most about a property they might be interested in but more importantly we're about creating new levels of transparency in the real estate market by providing 100% accurate real time information including prices. >> let me stop you there. are you saying that zillow and trulia are giving us inaccurate information or old information? i mean what's the difference? >> well, in fact, in ce
upward 100 million people had personal information stolen during the weeks long cyberattack. you used to have to be a real estate inend to get your hands on mls listings. one startup is look tock change all that. new habitat is looking to give you the inside scoop on homes. we're joined by the founder, jeff burke. thank you for being here you're trying to give trulia and cillo a run for their money. what makes your app so different than what they're offering to consumers? >> well, first,...
201
201
Mar 26, 2014
03/14
by
WUSA
tv
eye 201
favorite 0
quote 0
the university of maryland president wallace loeh is scheduled to testify at a senate hearing on cyberattacks today. two attacks in the last month have compromised the personal information of hundreds of thousands of people affiliated with the university. >>> wal-mart is recalling dolls because after circuit board in their chest can overheat and burn children. >>> ocean city, maryland is adding some new signs to the boardwalk this summer. they are going to ask people to watch their language, please. city leaders say they can't outlaw profanity in public places because it's everyone's right to free speech so there won't be any fines for cursing or custing but you could -- cussing but cue face charges of disorderly conduct. >> people have been using some language about this winter we're experiencing. nothing like beach weather today but howard has some hope ahead in his seven-day forecast. >> beach shoes have nothing on these sneakers. what is setting them apart coming up [ kelly ] my days start early. and so do mouth germs. but now i have the protection of colgate total® mouthwash. it works ju
the university of maryland president wallace loeh is scheduled to testify at a senate hearing on cyberattacks today. two attacks in the last month have compromised the personal information of hundreds of thousands of people affiliated with the university. >>> wal-mart is recalling dolls because after circuit board in their chest can overheat and burn children. >>> ocean city, maryland is adding some new signs to the boardwalk this summer. they are going to ask people to watch...
150
150
Mar 31, 2014
03/14
by
MSNBCW
tv
eye 150
favorite 0
quote 0
breached on sunday, days after a youtube video featuring logo of hacking group anonymous warned of a cyberattack police shooting of a mentally ill homeless man this month. march 16th, six police officers in the foothills fired beanbags, stun guns and six live rounds of ammunition, killing 38-year-old james boyd. the shooting followed a three-hour stand-off during which boyd threatened officers with a knife. but the video the encounter showed boyd gathering his things and agreeing to descend to meet officers right before the officers fired on him. it was not an isolated event. since 2010, albuquerque police have taken part in 37 shootings, 23 of them deadly. according to a "new york times" report from 2012, the city's police officers receive payments of up to 1,000 each per shooting as part of an officially sanctioned bounty system. since 2012, the department of justice has been investigating the police department over complaints of civil rights violations and allegations of excessive use of force. on friday, the fbi opened its own investigation into this month's fatal shooting. joining me now, r
breached on sunday, days after a youtube video featuring logo of hacking group anonymous warned of a cyberattack police shooting of a mentally ill homeless man this month. march 16th, six police officers in the foothills fired beanbags, stun guns and six live rounds of ammunition, killing 38-year-old james boyd. the shooting followed a three-hour stand-off during which boyd threatened officers with a knife. but the video the encounter showed boyd gathering his things and agreeing to descend to...
284
284
Mar 21, 2014
03/14
by
FOXNEWSW
tv
eye 284
favorite 0
quote 0
. >> the federal aviation administration reports it's taking steps to prevent cyberattacks on the 777oeing say they don't think hackers attacked the missing plane because its systems are older, but faa officials say they're trying to fix a security loophole that could let passengers access critical flight data through cabin computers. >>> well, if the objects in -- now in the frame mouse satellite photos are in fact part of the missing jet, and the debris is still floating, how will searchers be able to find it? especially considering the satellite pictures are so many days old and the objects could have drifted hundreds of miles. >> some answer a "shepard smith reporting" continues live from oxford, mississippi, right after this. ...and a choice. take 4 advil in a day which is 2 aleve... ...for all day relief. "start your engines" are your joints ready for action? take osteo bi-flex®. osteo bi-flex® nurtures and helps defend your joints° because it's specially formulated with joint shield (tm)... so now you can keep doing... and doing... and doing what you love. hi mom, dad... what'd
. >> the federal aviation administration reports it's taking steps to prevent cyberattacks on the 777oeing say they don't think hackers attacked the missing plane because its systems are older, but faa officials say they're trying to fix a security loophole that could let passengers access critical flight data through cabin computers. >>> well, if the objects in -- now in the frame mouse satellite photos are in fact part of the missing jet, and the debris is still floating, how...
50
50
Mar 30, 2014
03/14
by
CSPAN2
tv
eye 50
favorite 0
quote 0
they are trying, organizing to cyberattacks at western targets. are they serious target? is there some digital strategy? i don't know, but that needs to be in the conversation. >> foreign fighters across the globe to fight in the civil war is the area on one side or the other. by the way, a third of those are coming from europe benefit of those from europe and it really is a global problem. what had never seen until series of missions are not coming to fight the physical work. they literally send software engineers to fight on behalf of the army and sometimes physically, sometimes fighting -- >> presumably with iran. >> what's new for the military focus to the economy? one of the things that happens at the advent of the technology and so much progress and efficiency as it's a real crisis all over the world, particularly for the youth. how do you think about both of you, and eric particularly because from my time at google you care deeply not just about google as a company, but the impact google has on the world. you've done an amazing job. we all want to pass that. how do
they are trying, organizing to cyberattacks at western targets. are they serious target? is there some digital strategy? i don't know, but that needs to be in the conversation. >> foreign fighters across the globe to fight in the civil war is the area on one side or the other. by the way, a third of those are coming from europe benefit of those from europe and it really is a global problem. what had never seen until series of missions are not coming to fight the physical work. they...