175
175
Jul 5, 2011
07/11
by
CSPAN2
tv
eye 175
favorite 0
quote 0
. >> guest: i'm interested in the study that the national cybersecurity alliance.arlier this month and it is an effort that microsoft and you personally have worked with recently. is not a series of statistics that kind of gets a bit of understanding as to what students and parents think about tough issues and privacy and security and they are very knowledgeable about them. won his second out to me was this one figure that was 6% homages 6% have based understanding of geolocation and educational a school and we are talking about the k-12 group. considering this week's hearing, where senator al franken had that hearing on geolocation talk to folks from apple and google specifically about the way they're smart phones in their devices track the location of the users themselves from nearby cell towers. i guess my question to you is where should washington, and on all this? on one hand there seems to be a knowledge deficit as the report itself points out and on the other hand there seems to be this action on capitol hill so what is your perspective? where does congress
. >> guest: i'm interested in the study that the national cybersecurity alliance.arlier this month and it is an effort that microsoft and you personally have worked with recently. is not a series of statistics that kind of gets a bit of understanding as to what students and parents think about tough issues and privacy and security and they are very knowledgeable about them. won his second out to me was this one figure that was 6% homages 6% have based understanding of geolocation and...
225
225
Jul 4, 2011
07/11
by
CSPAN2
tv
eye 225
favorite 0
quote 0
, cybersecurity, cyber safety, cyber ethics.that message is stop, think, connect. i hope you've heard of it, and if you haven't, i'm sure you'll be hearing more about it in the months to come. it's a virtual who's who around the table participating in this convention, and it's that one message that will galvanize people and bring them together so we don't have all these disparate messages out there and people talking about whatever their pet project or initiative might be. instead, we're coming together with one voice. it's google, it's facebook, it's verizon, at&t verifying, costco, walmart, you name it. all these folks are involved in that effort. and i think that's something the cyberbullying effort can model itself after, one message as opposed to a whole host of efforts where a little bit of attention is garnered, but nothing at a high level. >> host: jacqueline beauchere of microsoft, i want to read a quote by steve balmer and get your reaction. >> host: who i say it to, where i go, what's important to me. given the recent
, cybersecurity, cyber safety, cyber ethics.that message is stop, think, connect. i hope you've heard of it, and if you haven't, i'm sure you'll be hearing more about it in the months to come. it's a virtual who's who around the table participating in this convention, and it's that one message that will galvanize people and bring them together so we don't have all these disparate messages out there and people talking about whatever their pet project or initiative might be. instead, we're coming...
126
126
Jul 15, 2011
07/11
by
CSPAN
tv
eye 126
favorite 0
quote 2
cybersecurity affects clearly our national defense, all of our businesses, our schools, our seniors, in effect all of us. indeed while the internet has become one of our strongest capabilities it has also emerged as a stunning vulnerability. we need only to look at recent cyberattacks on sony, lock heed martin and other enterprises to witness the combrord damage that can be caused from anywhere in the world. at relatively little cost to those that care he out these actions. hackers become more sophisticated by the hour. an attack could cripple fort drum, could cripple our national security, could cripple the electric grid, cripple health care, cripple our ability to pay our bills and to raise money. in effect, destroy our economy. we all know that if the electric grid were crippled that we would be unable to get to work, we would be unable to keep people warm, to keep people cool, all things that we recognize as necessities. i offer this final amendment to increase cybersecurity in defense of the electric grid by $7 million. this modest increase keeps an eye towards our need to reduc
cybersecurity affects clearly our national defense, all of our businesses, our schools, our seniors, in effect all of us. indeed while the internet has become one of our strongest capabilities it has also emerged as a stunning vulnerability. we need only to look at recent cyberattacks on sony, lock heed martin and other enterprises to witness the combrord damage that can be caused from anywhere in the world. at relatively little cost to those that care he out these actions. hackers become more...
154
154
Jul 9, 2011
07/11
by
CSPAN2
tv
eye 154
favorite 0
quote 0
on, the challenges are hugely different and i would hate to move cybersecurity which is a fast-paced type of operation into space policy which by nature is very slow changing dynamic. the cyberspace thing takes a more dynamic 85% of critical infrastructure is owned and operated by the private sector. it requires interesting partnerships between the government and the private sector to solve in outer space even though there's a lot of linkages. if you combine the two structures and had it run by one it would slow both efforts. >> if i could follow on but there's also a maturity level. you have folks here, also missing the eisenhower -- we have been doing this for 50 plus years. we have a good idea what the space world looks like. it will still involved dynamics but to try to get those two to mary up, the national security portion of the national space policy, it was informed by the guys on the cyberside. they were going through these steps to have some cohesion, we would have cohesion but the cyber side just isn't there yet. from a personal standpoint it was tough being the space guy
on, the challenges are hugely different and i would hate to move cybersecurity which is a fast-paced type of operation into space policy which by nature is very slow changing dynamic. the cyberspace thing takes a more dynamic 85% of critical infrastructure is owned and operated by the private sector. it requires interesting partnerships between the government and the private sector to solve in outer space even though there's a lot of linkages. if you combine the two structures and had it run by...
38
38
tv
eye 38
favorite 0
quote 0
going security and privacy researcher and graduate fellow indiana university center for applied cybersecurity research chris thanks so much for coming back on the show nice to be here first starters can you tell us a little bit about how this technology works what's so special about it this isn't your typical g.p.s. tracking the true position makes equipment that sits on every cell tower that a mobile has and it allows them to triangulate a phone very accurately based on timing information very complex but the short version is they will to figure out where users are inside buildings which is something that yes doesn't do whenever you turn on one call is made or more importantly and for people who care about privacy whenever the government asks the position provide this technology they don't sell it to the government in this country they say they just provide it the phone companies and then the phone companies are free to do with it as they please and of course we know that many phone companies in this country are in bed with the government and so of course this technology on the day that come
going security and privacy researcher and graduate fellow indiana university center for applied cybersecurity research chris thanks so much for coming back on the show nice to be here first starters can you tell us a little bit about how this technology works what's so special about it this isn't your typical g.p.s. tracking the true position makes equipment that sits on every cell tower that a mobile has and it allows them to triangulate a phone very accurately based on timing information very...
39
39
tv
eye 39
favorite 0
quote 0
and build a bird reportedly also at bohemian grove to cut a fine and cybersecurity takeover of the lab the pentagon admits they've got fake bots out propagandizing americans with fake comments that they want to be able to have an internet kill switch and that now they're going to government announcements forcing their way on your mobile phones and portable computers it's a technical problem there but you can watch the whole interview on our web site with the voice and a picture to think i was a radio host alex jones and speaking of influence over politics thousands of christians have filled the washington d.c. convention center to show their support for the state of israel and to lobby congress now calling for lays out why you as a taxpayer should know about what goes on in the questions united for israel senate . for these christians it's the holy land zion the home of god's chosen people christians tonight youth for israel israel israel and israel thousands gathered here in washington to show their support for the nation of israel god says i will bless those who places where. i am pe
and build a bird reportedly also at bohemian grove to cut a fine and cybersecurity takeover of the lab the pentagon admits they've got fake bots out propagandizing americans with fake comments that they want to be able to have an internet kill switch and that now they're going to government announcements forcing their way on your mobile phones and portable computers it's a technical problem there but you can watch the whole interview on our web site with the voice and a picture to think i was a...
33
33
tv
eye 33
favorite 0
quote 0
that the work of law and anonymous could have had anything to do with what you know drove this cybersecurity guy out to resign. no i don't think so i think what you have is just a basic kind of bureaucratic mess i mean that position has been a revolving door we've had something like five or six people in the position for the last six or seven years and i think it's a position without any power and i think like the last person who held the position he just figured this isn't worth the headaches i'm just getting out and i'm going to make a lot of money in the private sector ok so if that's the case if this is a bureaucratic mess and nobody can succeed in this position what does that say about u.s. policy in this area because cyber call and cyber security and the threat of cyber warfare has built a whole industry and a whole growth area for the u.s. government recently. yeah well it's a problem but it's also a problem where every different part of the security bureaucracy has their own way of managing these problems this position is supposed to be the position that has oversight over everything
that the work of law and anonymous could have had anything to do with what you know drove this cybersecurity guy out to resign. no i don't think so i think what you have is just a basic kind of bureaucratic mess i mean that position has been a revolving door we've had something like five or six people in the position for the last six or seven years and i think it's a position without any power and i think like the last person who held the position he just figured this isn't worth the headaches...
160
160
Jul 14, 2011
07/11
by
CNNW
tv
eye 160
favorite 0
quote 1
>> wolf, indeed today, the first news of a massive breach of military cybersecurity.even as troops are getting to use their smart phones and i pads in the middle of the next fight. >> but modern communications are risky. the phone hacking scandal in britain, just the latest example of today's vulnerabilities. top officials revealed one of the worst breaches ever. indeed in a single intrusion this past march, 24,000 files were taken. it was done rewe think by a foreign intelligence service. a nation state was behind it. >> reporter: cyberspace is now a potential war zone spp. >> cyberattacks will be a significant component of any future conflict. whether it involves major nations, rogue states, or terrorist groups. >> reporter: in 2008, an infected flash drive was inserted into a lab top on a u.s. military base. a foreign spy agency had placed a malicious code on the drooive transferring secret data to foreign control. for the first time a foreign government had a cyberbeachhead. the new pentagon strategy focuses on defending many ill tear systems from theft and denial
>> wolf, indeed today, the first news of a massive breach of military cybersecurity.even as troops are getting to use their smart phones and i pads in the middle of the next fight. >> but modern communications are risky. the phone hacking scandal in britain, just the latest example of today's vulnerabilities. top officials revealed one of the worst breaches ever. indeed in a single intrusion this past march, 24,000 files were taken. it was done rewe think by a foreign intelligence...
242
242
Jul 2, 2011
07/11
by
CSPAN
tv
eye 242
favorite 0
quote 0
cybersecurity and cross flow -- across the boa -- cybersecurity and cross the border data flow standard. >> one of the key tenets of what we are trying to do is establish global interoperability so that companies can trade, so that data can reside transparently in different locations in the file. we try to bring the global privacy standards closer together, an important part of our support of comprehensive legislation. >> thank you. we are now on this rather quickened pace. i thank all three of you very much. i want to introduce senator begich. i will explain this to you on the way to a vote -- [laughter] how you have been abused. the second panel, mr. scott taylor, vice president of hewlett-packard, stuart pratt, presidency of consumer data industry association, ms. ioana rusu, consumers union, mr. tim schaaff, president of sony network entertainment international, and mr. thomas lenard, president and senior fellow of the technology policy institute. at's say it is 20 minutes the maximum. our purpose here will be with the time remaining to us, which is not yet determined. 20 minutes ma
cybersecurity and cross flow -- across the boa -- cybersecurity and cross the border data flow standard. >> one of the key tenets of what we are trying to do is establish global interoperability so that companies can trade, so that data can reside transparently in different locations in the file. we try to bring the global privacy standards closer together, an important part of our support of comprehensive legislation. >> thank you. we are now on this rather quickened pace. i thank...
170
170
Jul 15, 2011
07/11
by
KOFY
tv
eye 170
favorite 0
quote 0
revealed that breach just today calling it significant and that it did compromise information f.new cybersecurity rules have since been devised. >>> bay area soldier came home for the final time today. staff sergeant nick amber the fourth one of the latest casualty of the war in after establish. if corina has his story. the. >>reporter: this is one of those painful images you see with your eyes but feel with your heart. today somber emotional homecoming is for staff sergeant if nichblingt as a man he loved life. as a man he if first loved his wife. and his kids and family. >> that family stood in salute at the man they love and soldier that has given everything to his country. the 36-year-old san jose native was killed july 5th when his unit came under enemy fire in afghanistan. he had served 10 years in the marines and 6 in the army. >> that shows very selfless person. very cranial us person and for that we are just forever grateful. >> patriots guard writers on hand at moffitt field to pay tribute. among a gold star mom whose own son killed in iraq three years ago. this is her first patriot gua
revealed that breach just today calling it significant and that it did compromise information f.new cybersecurity rules have since been devised. >>> bay area soldier came home for the final time today. staff sergeant nick amber the fourth one of the latest casualty of the war in after establish. if corina has his story. the. >>reporter: this is one of those painful images you see with your eyes but feel with your heart. today somber emotional homecoming is for staff sergeant if...
211
211
Jul 19, 2011
07/11
by
KOFY
tv
eye 211
favorite 0
quote 0
even be asked to change the password you are now using if it is not considered strong enough for cybersecurityas the news at at 9 continues here it's over for another famous couple. that story. >> plus even at 93 nelson mandela still inspires a natio >> plus even at 93 nelson mandela still inspires a natio nation.i'll be back verizon claims its 4g lte is twice as fast as at&t. we're putting them to the test against the speed of a rescue unit. go ! they're downloading a music album. the first network to finish gets rescued. does your phone know that we're racing ? done ! verizon's done ! i've got seven left ! the fastest network in america. verizon. built so you can rule the air. now powering the lg revolution. it's not too well done? nope. but it is a job well done. what are you reading, sweetie? her diary. when you're done, i'd love some feedback. sure. your mom and i read that thing cover-to-cover. loved it. thanks. would you mind if i cut the lawn this weekend? only if you let me talk to your mother on the phone for hours on end. done. [ male announcer ] u-v
even be asked to change the password you are now using if it is not considered strong enough for cybersecurityas the news at at 9 continues here it's over for another famous couple. that story. >> plus even at 93 nelson mandela still inspires a natio >> plus even at 93 nelson mandela still inspires a natio nation.i'll be back verizon claims its 4g lte is twice as fast as at&t. we're putting them to the test against the speed of a rescue unit. go...
260
260
Jul 15, 2011
07/11
by
KQED
tv
eye 260
favorite 0
quote 0
>> sreenivasan: read the text of the pentagon's cybersecurity policy and find analysis on the rundown blog. ray previews his upcoming series on indonesia and its health challenges, but you won't have all that and more is on our web site, newshour.pbs.org. ray? >> woodruff: and again to our >> suarez: and that's the "newshour" for tonight. i'm ray suarez. >> woodruff: and i'm judy woodruff. we'll see you online and again here tomorrow evening with mark shields and david brooks, among others. thank you and good night. major funding for the pbs newshour has been provided by: and by the alfred p. sloan foundation. supporting science, technology, and improved economic performance and financial literacy in the 21st century. and with the ongoing support of these institutions and foundations. and... this program was made possible by the corporation for public broadcasting. and by contributions to your pbs station from viewers like you. thank you. captioning sponsored by macneil/lehrer productions captioned by media access group at wgbh access.wgbh.org
>> sreenivasan: read the text of the pentagon's cybersecurity policy and find analysis on the rundown blog. ray previews his upcoming series on indonesia and its health challenges, but you won't have all that and more is on our web site, newshour.pbs.org. ray? >> woodruff: and again to our >> suarez: and that's the "newshour" for tonight. i'm ray suarez. >> woodruff: and i'm judy woodruff. we'll see you online and again here tomorrow evening with mark shields...
64
64
Jul 15, 2011
07/11
by
CSPAN2
tv
eye 64
favorite 0
quote 0
we held a cybersecurity to cheat to help small businesses understand basic precautions to secure their networks and data with which we partnered with the chamber of commerce, national urban league and others to distribute. to make sure consumers are getting consistent and clear information and guidance we partnered with the federal trade commission and commerce department and small business administration on a number of education efforts like on guard on line which has advised how to protect children's personal information and guard against identity theft. these efforts are part of an established track record with effective coordination between the fcc and other agencies. the technology can and must be part of the solution. i continue to encourage industry to take this very seriously. to use its expertise to empower consumers, and protect the data. as the government expert agency on broadband communication networks with a long history of taking common-sense steps to protect consumer privacy the fcc has an important role going forward. our network focused privacy rules are settled and l
we held a cybersecurity to cheat to help small businesses understand basic precautions to secure their networks and data with which we partnered with the chamber of commerce, national urban league and others to distribute. to make sure consumers are getting consistent and clear information and guidance we partnered with the federal trade commission and commerce department and small business administration on a number of education efforts like on guard on line which has advised how to protect...
150
150
Jul 22, 2011
07/11
by
CSPAN2
tv
eye 150
favorite 0
quote 0
significant challenge related to the vice chairman of acquisition responsibility is in the area of cybersecurity. all of the systems equipment support intelligentsia and almost everything else the department of defense does relies on efforts, making sure the networks can support the operations reliably would be a large part of admiral winnefeld's responsibility. there also is used such as windows a cyberattack of entities require or justify u.s. defensive reaction, cyberor otherwise. the vice chairman will surely be involved in addressing that issue as well. if confirmed, admiral winnefeld will serve as a member of the nuclear weapons council, producing and maintaining nuclear weapons as expenses and technically challenging. today the nuclear weapons council is participating in the design of the nuclear deterrent for the next generation. if confirmed, one of the challenges with the two keep both the cost and scope of the maintenance and modernization within reason. and of course, the central part of the vice chairman's role will be to act as chairman of the joint chiefs and the chairman's absent
significant challenge related to the vice chairman of acquisition responsibility is in the area of cybersecurity. all of the systems equipment support intelligentsia and almost everything else the department of defense does relies on efforts, making sure the networks can support the operations reliably would be a large part of admiral winnefeld's responsibility. there also is used such as windows a cyberattack of entities require or justify u.s. defensive reaction, cyberor otherwise. the vice...
341
341
Jul 12, 2011
07/11
by
CNNW
tv
eye 341
favorite 0
quote 0
. >> in speaking with telecom and cybersecurity experts picked up three techniques hackers can get intooice mail. keep trying default pass codes like enter 111. >> enter password and log is incorrect. try again. >> reporter: many cell phone providers give providers default pass codes and many to retrieved many never bother to use them or change them to things like their birthdays. a founder of a cyber security company. >> a second method tore hacking into voicemail, spoof to make it think it's their own phone accessing the voicemail. to do that you sometimes can go to a website that let's you get a spoof phone number, and we're going to do that. >> reporter: we buy a spoof account on spoofcard.com, a legitimate site for pranksters allowing us to call any number, make it seem it's coming from any number we want. from another phone we call his cell phone disguised as his own number. >> i'm going to ignore this phone call. >> ignore the call. >> okay. >> please leave a message. >> you hit star. >> you have one unheard message. >> so we were able to hear your voicemails just now, a very suf
. >> in speaking with telecom and cybersecurity experts picked up three techniques hackers can get intooice mail. keep trying default pass codes like enter 111. >> enter password and log is incorrect. try again. >> reporter: many cell phone providers give providers default pass codes and many to retrieved many never bother to use them or change them to things like their birthdays. a founder of a cyber security company. >> a second method tore hacking into voicemail,...
965
965
Jul 11, 2011
07/11
by
CNNW
tv
eye 965
favorite 0
quote 0
. >> reporter: in speaking with telecom and cybersecurity experts we picked up three basic techniquese to get into your voice mail. first, they can dial into your voice mail network, keep trying default pass codes like 1111. >> enter pass code and pound sign. >> 1111. >> log-in incorrect. >> many users are given default pass codes and many users don't change them or change them to bad pass codes and change them to their birthday, information obtained from facebook. a secretary method for hacking into somebody's voice mail is spoof your phone number to make somebody's voice mail think it's their own phone accessing the voice mail. to do that you can go to a website that lets you get a spoof number. and we're going to do that. we buy a spoof account on spoofcard.com, a legitimate website for pranksters an allows us to call any number we want, making it seem like it's coming from any number we want and from another phone we call a new cell phone disguised as his own number. >> i'm going to ignore this call. >> okay. >> please leave a message. >> hit star. >> you have one unheard message.
. >> reporter: in speaking with telecom and cybersecurity experts we picked up three basic techniquese to get into your voice mail. first, they can dial into your voice mail network, keep trying default pass codes like 1111. >> enter pass code and pound sign. >> 1111. >> log-in incorrect. >> many users are given default pass codes and many users don't change them or change them to bad pass codes and change them to their birthday, information obtained from facebook....
137
137
Jul 15, 2011
07/11
by
CSPAN
tv
eye 137
favorite 0
quote 0
and "washington post" reporter, ellen nakashima will take your questions about the pentagon's cybersecurity program. "washington journal" is on every day at 7:00 eastern. >> several live events to tell you about tomorrow morning. a house energy and commerce subcommittee is looking into pipeline safety. that is on c-span 3 at 9:30 eastern. witnesses are scheduled to include a representative of exxonmobil to answer questions about the recent pipeline spill in the yellowstone river. and president obama will hold a news conference on the debt and deficit negotiations. you can see that live on use at 11:00 a.m. eastern. >> this weekend on american tv on c-span 3, american artifacts visits the exhibit of civil war photographs at the library of congress. arthur christopher moran and his new book. and we look at civil rights in the early 1990's. you can see the complete
and "washington post" reporter, ellen nakashima will take your questions about the pentagon's cybersecurity program. "washington journal" is on every day at 7:00 eastern. >> several live events to tell you about tomorrow morning. a house energy and commerce subcommittee is looking into pipeline safety. that is on c-span 3 at 9:30 eastern. witnesses are scheduled to include a representative of exxonmobil to answer questions about the recent pipeline spill in the...
68
68
Jul 15, 2011
07/11
by
CSPAN2
tv
eye 68
favorite 0
quote 0
the areas of suspicious activity reporting, terrorism analyst, general security awareness and cybersecurity. the information provided by this can be used by railroads to augment channing awareness briefing for employees and shared with local federal authorities and partnerships. the top priority working closely with tsa and evans to the effectiveness and security and i would like to highlight this year the tenth anniversary of the 9/11 attacks the time is right for a thorough review of the security strategy programs how can we be more effective in a sustainable way? the object is agreed they set the framework for how we measure the effectiveness of our policies, programs and initiatives. tsa freed real division was credit to me for this purpose next month. second, the information sharing between the railroad and the government agencies we work with the provide a wealth of security information every day to the various government entities but we give to bill bac that helps perform the security mission effectively. we have submitted to the tsa and the dhs intelligence requirements to close the
the areas of suspicious activity reporting, terrorism analyst, general security awareness and cybersecurity. the information provided by this can be used by railroads to augment channing awareness briefing for employees and shared with local federal authorities and partnerships. the top priority working closely with tsa and evans to the effectiveness and security and i would like to highlight this year the tenth anniversary of the 9/11 attacks the time is right for a thorough review of the...
142
142
Jul 7, 2011
07/11
by
CSPAN
tv
eye 142
favorite 0
quote 1
i know the gentleman is also concerned about cybersecurity. i yield back. the chair: for what purpose does the gentleman rise? >> i have an amendment at the desk designated as number three. the chair: the clerk will report the title. the clerk: amendment number three offered by mr. flake of arizona. by reducing the amount made available for research, doment, tests and evaluation, navy, by reducing the amount made available for research, development, tests and evaluation, defense-wide and by reducing the amount made available for operational tests and evaluation defense by $93,811,660. $177,989,500, $263,132 -- mr. flake: i ask unanimous consent that the amendment be considered read. the chair: is there objection? without objection. the gentleman is recognized for five minutes. mr. flake: this would increase -- decrease accounts roughly $171 billion below the appropriatings -- appropriation prvided in this measure. during one of these debates the chairman of the defense subcommittee made the point, quote, if we're going to reduce the defense budget, there ou
i know the gentleman is also concerned about cybersecurity. i yield back. the chair: for what purpose does the gentleman rise? >> i have an amendment at the desk designated as number three. the chair: the clerk will report the title. the clerk: amendment number three offered by mr. flake of arizona. by reducing the amount made available for research, doment, tests and evaluation, navy, by reducing the amount made available for research, development, tests and evaluation, defense-wide and...
108
108
Jul 13, 2011
07/11
by
CSPAN2
tv
eye 108
favorite 0
quote 0
the areas of suspicious activity reporting, terrorism analyst, general security awareness and cybersecurity. the information provided by this can be used by railroads to augment channing awareness briefing for employees and shared with local federal authorities and partnerships. the top priority working closely with tsa and evans to the effectiveness and security and i would like to highlight this year the tenth anniversary of the 9/11 attacks the time is right for a thorough review of the security strategy programs how can we be more effective in a sustainable way? the object is agreed they set the framework for how we measure the effectiveness of our policies, programs and initiatives. tsa freed real division was credit to me for this purpose next month. second, the information sharing between the railroad and the government agencies we work with the provide a wealth of security information every day to the various government entities but we give to bill bac that helps perform the security mission effectively. we have submitted to the tsa and the dhs intelligence requirements to close the
the areas of suspicious activity reporting, terrorism analyst, general security awareness and cybersecurity. the information provided by this can be used by railroads to augment channing awareness briefing for employees and shared with local federal authorities and partnerships. the top priority working closely with tsa and evans to the effectiveness and security and i would like to highlight this year the tenth anniversary of the 9/11 attacks the time is right for a thorough review of the...
160
160
Jul 15, 2011
07/11
by
CSPAN
tv
eye 160
favorite 0
quote 0
chris strohm, national security reporter for the national journal, will look at the pentagon's new cybersecurity plan. "washington journal," taking your phone calls, emails, and tweets, live every morning starting at 7:00 eastern on c-span. host: good morning. it's friday, july 15, 2011. you're looking at a live picture of the u.s. capitol. it's a beautiful day here in washington, d.c., but tempers still seem high in the discussions over raising the debt limit. republican house conference has an 8:00 a.m. meeting. the president has called a press conference for 11:00 a.m. eastern time. it does not look like any breakthroughs have yet emerged in these discussions. so our question for you on this friday morning is, if you had a seat at the table, what would your strategy be? 202-624-111 for democrats in the audience. for republicans, our phone number is 202-624-1115. for you i understand penalties, here's your phone line, 202-624-0760. you can also send us a message by twitter or email us. the u.s. debt limit talks, what would your strategy be? and we're going to begin on this friday morning by ta
chris strohm, national security reporter for the national journal, will look at the pentagon's new cybersecurity plan. "washington journal," taking your phone calls, emails, and tweets, live every morning starting at 7:00 eastern on c-span. host: good morning. it's friday, july 15, 2011. you're looking at a live picture of the u.s. capitol. it's a beautiful day here in washington, d.c., but tempers still seem high in the discussions over raising the debt limit. republican house...
158
158
Jul 9, 2011
07/11
by
CSPAN2
tv
eye 158
favorite 0
quote 0
also spent a lot of time on, the challenges that are hugely differing and i would hate to have cybersecurity, which is a very fast pace type of operation into space policy, which by nature is very slow changing dynamic. i think cyberspace than takes a more dynamic, 85% of the infrastructure is owned and operated by the private sector and it requires interesting partnerships between the government and private sector to deal to solve another space, even though there's a lot of linkages. i think if you combine the two structures and have it run by one, to boot both effort. >> invited follow-on as well. there's also a maturity level issue. steve kraft folks here from carter on a, also isenhour imad samarra, we've been doing this for 50 plus years we have a good idea to at the space where it looks like. we still have to involve the dynamics, but to try to get those two to marry if have to do that will tell you the national security portions for obama was informed by the guys on the sabre site. espinola of time so we would have cohesion and we would have cohesion. the sabre site just isn't there y
also spent a lot of time on, the challenges that are hugely differing and i would hate to have cybersecurity, which is a very fast pace type of operation into space policy, which by nature is very slow changing dynamic. i think cyberspace than takes a more dynamic, 85% of the infrastructure is owned and operated by the private sector and it requires interesting partnerships between the government and private sector to deal to solve another space, even though there's a lot of linkages. i think...
170
170
Jul 13, 2011
07/11
by
CSPAN2
tv
eye 170
favorite 0
quote 0
the areas of suspicious activity reporting, terrorism analyst, general security awareness and cybersecurityhorities and partnerships. the top priority working closely with tsa and evans to the effectiveness and security and i would like to highlight this year the tenth anniversary of the 9/11 attacks the time is right for a thorough review of the security strategy programs how can we be more effective in a sustainable way? the object is agreed they set the framework for how we measure the effectiveness of our policies, programs and initiatives. tsa freed real division was credit to me for this purpose next month. second, the information sharing between the railroad and the government agencies we work with the provide a wealth of security information every day to the various government entities but we give to bill bac that helps perform the security mission effectively. we have submitted to the tsa and the dhs intelligence requirements to close the gap. one that is focused on, looking for in-depth analysis of the prepared reactions terrorists take and successful attacks they tried and failed
the areas of suspicious activity reporting, terrorism analyst, general security awareness and cybersecurityhorities and partnerships. the top priority working closely with tsa and evans to the effectiveness and security and i would like to highlight this year the tenth anniversary of the 9/11 attacks the time is right for a thorough review of the security strategy programs how can we be more effective in a sustainable way? the object is agreed they set the framework for how we measure the...
88
88
Jul 27, 2011
07/11
by
CSPAN2
tv
eye 88
favorite 0
quote 0
transformation than while under his leadership, adding counterterrorism, counterintelligence and cybersecurity to the bureau's traditional crime-fighting mission. in the ten years while mr. mueller has been director of the f.b.i., he has worked tirelessly to ensure no international terrorist attacks have occurred on u.s. soil since 9/11, and there have been several plots that have been uncovered and kept from occurring. director mueller has ensured that the f.b.i. is a full member of the u.s. intelligence community and serves as a critical and singular link between the intelligence and law enforcement communities in texas. -- in the united states, excuse me. he has served our nation with valor and integrity as a marine in vietnam and as a federal prosecutor. he answered the call to service from president bush to be f.b.i. director and is once again answering the call by agreeing to serve two more years under president obama. he is an admirable public servant, and i urge his swift confirmation. mr. president, we are less than six days away from the date the department of treasury has signified
transformation than while under his leadership, adding counterterrorism, counterintelligence and cybersecurity to the bureau's traditional crime-fighting mission. in the ten years while mr. mueller has been director of the f.b.i., he has worked tirelessly to ensure no international terrorist attacks have occurred on u.s. soil since 9/11, and there have been several plots that have been uncovered and kept from occurring. director mueller has ensured that the f.b.i. is a full member of the u.s....
74
74
Jul 12, 2011
07/11
by
CSPAN2
tv
eye 74
favorite 0
quote 0
and i see small, innohave aive -- innovative companies developing ways to protect our nation in cybersecurity. i see them finding ways to deal with solving our energy problems and moving forward with health technology, all in innovation, all from the ability to use our creative genius to keep america in the lead economically. and the conrad budget allows us to continue our investments at n.i.h. in basic research. the ryan budget doesn't allow us to do that. significant cutbacks in all those areas. the conrad budget which the house democrats have brought forward allows to invest in our infrastructure, our roads, bridges, water systems, so we can create more jobs for the people of this nation. the budget also deals with our military spending. let kneel you one fact i think the people of this nation should understand. america spends as much in defense as almost the entire amount spent by all the other nations of the world. it's difficult to see how our nation can continue to grow the way we want to with so much of our budget tied up in the defense -- in national defense. we need to figure out a
and i see small, innohave aive -- innovative companies developing ways to protect our nation in cybersecurity. i see them finding ways to deal with solving our energy problems and moving forward with health technology, all in innovation, all from the ability to use our creative genius to keep america in the lead economically. and the conrad budget allows us to continue our investments at n.i.h. in basic research. the ryan budget doesn't allow us to do that. significant cutbacks in all those...
141
141
Jul 8, 2011
07/11
by
CSPAN2
tv
eye 141
favorite 0
quote 1
but i do think it's tough because in the -- at least in the cybersecurity space which i also spent alot of time on, the challenges are hugely different and i would hate to move cyber security which is a very fast-paced type of operation into space policy which by nature is very slow-changing dynamic. i think the cyberspace things takes a more dynamic -- you know, 85% of the critical infrastructure is owned and operated by the private sector. and it requires interesting partnerships between the government in the private sector to be able to solve in outer space even though there's a lot of linkages. i think if you combine the two structures and had it run by one, i think we would slow both efforts, frankly. >> yeah, if i could follow on as well. there's also maturity level issue, right? so you've got folks here from carter on up but, you know, we're also missing the eisenhower on up from there. we've been doing this for 50-plus years. we have a good idea as to what the space world looks like. we still have to evolve the dynamics but it's not there yet and to try to marry that up is to
but i do think it's tough because in the -- at least in the cybersecurity space which i also spent alot of time on, the challenges are hugely different and i would hate to move cyber security which is a very fast-paced type of operation into space policy which by nature is very slow-changing dynamic. i think the cyberspace things takes a more dynamic -- you know, 85% of the critical infrastructure is owned and operated by the private sector. and it requires interesting partnerships between the...