121
121
Aug 16, 2011
08/11
by
CSPAN2
tv
eye 121
favorite 0
quote 0
and executive cybersecurity authorities act would basically create a cybersecurity office within the white house that has both policy and budgetary authority and would be a senate confirmed director who would be able to reach across government to really compel compliance with the things that need to be done to protect the network. we are not doing a very good job right now protecting the.gov network terkel also that person needs to work more collaboratively with the private sector. general alexander is the head of cybercommand and nsa and they do a very good job that can be done at protecting the .mil network on military networks. we don't have that same robust authority and coordination in protecting the.gov network and there is a lot of work to be down there. >> host: where most of these attacks coming from? >> guest: from a variety of sources and it is not only about attacks. i look at it in terms of looking at cyber intrusions, disruptions that are the worst that could happen. most of us are familiar with cyberintrusions and people think of things like going in and hacking into o
and executive cybersecurity authorities act would basically create a cybersecurity office within the white house that has both policy and budgetary authority and would be a senate confirmed director who would be able to reach across government to really compel compliance with the things that need to be done to protect the network. we are not doing a very good job right now protecting the.gov network terkel also that person needs to work more collaboratively with the private sector. general...
89
89
Aug 15, 2011
08/11
by
CSPAN2
tv
eye 89
favorite 0
quote 0
and the executive cybersecurity authorities act would, basically, create in a cybersecurity office within the white house that has both policy and budgetary authority. it would be a senate-confirmed directer and, again, would be able to reach across government to really compel compliance where the things that need to be done to protect the network. we're not doing a very good job right now in protecting the.gov network. that person needs to work more closely with the private sector. general alexander is head of cyber command in nsa, and they do a very good job as can be done on protecting the dot.mil networks. but we don't have that same robust arrangement in protecting the dot.gov network. >> host: where are most of these attacks coming fromming? >> a variety of sources. it's not only attacks, attacks being the worst that could happen. most of us are familiar with cyber intrusions, and people think of things like going in and hacking into our e-mail or spamming the e-mail. but intrusions can also be much more serious; espionage, criminal activity. certainly in the banking system where th
and the executive cybersecurity authorities act would, basically, create in a cybersecurity office within the white house that has both policy and budgetary authority. it would be a senate-confirmed directer and, again, would be able to reach across government to really compel compliance where the things that need to be done to protect the network. we're not doing a very good job right now in protecting the.gov network. that person needs to work more closely with the private sector. general...
95
95
Aug 23, 2011
08/11
by
CSPAN2
tv
eye 95
favorite 0
quote 0
series on cybersecurity. this week, we're talking with interest groups who have a stake in cybersecurity issues. first up, marc rotenberg of the electronic privacy information center. he's the executive director there, and we want to talk to him about the privacy concerns from the white house cybersecurity proposals. when you look at what the white house has released over the past few months earlier this summer, where do your concerns lie when it comes to privacy? >> guest: a lot of what the white house has done with proposals is actually pretty good. it's a complicated topic, a lot of different agencies that need to be consulted, and i think the white house has done a good job of coordinating across several agencies. the key issue for many americans, how to security in cyberspace. there's civil liberty issues here because the white house is also claiming some new authority for the government to collect information on how people use the internet as well as some new authority to intercept private communication
series on cybersecurity. this week, we're talking with interest groups who have a stake in cybersecurity issues. first up, marc rotenberg of the electronic privacy information center. he's the executive director there, and we want to talk to him about the privacy concerns from the white house cybersecurity proposals. when you look at what the white house has released over the past few months earlier this summer, where do your concerns lie when it comes to privacy? >> guest: a lot of what...
81
81
Aug 6, 2011
08/11
by
CSPAN
tv
eye 81
favorite 0
quote 0
cybersecurity. white house cybersecurity coordinator howard schmidt is this week's guest. he is interviewed about the administration's effort to protect the u.s. against cyber attacks. host: this is week one in "the communicators" four week series on cybersecurity and legislative proposals to address those threats. we're pleased to be joined by howard schmidt, assistant to the president and white house cybersecurity coordinator. chivonne, intelligence correspondent for "the wall street journal". is there a working definition cybersecurity definition is across governments and across the different stakeholders' of what it is and what it will entail? guest: the term we use used to be called computer security, that it was information security and information assurance. we have coalesced around cybersecurity because it encompasses everything from end user devices such as smart phones all the way up until defense systems. internationally, we see other governments that take different terms. they use information security. they look issues around computer security. locally, we have
cybersecurity. white house cybersecurity coordinator howard schmidt is this week's guest. he is interviewed about the administration's effort to protect the u.s. against cyber attacks. host: this is week one in "the communicators" four week series on cybersecurity and legislative proposals to address those threats. we're pleased to be joined by howard schmidt, assistant to the president and white house cybersecurity coordinator. chivonne, intelligence correspondent for "the wall...
313
313
Aug 8, 2011
08/11
by
CSPAN2
tv
eye 313
favorite 0
quote 0
cybersecurity. white house cybersecurity coordinator howard schmidt is interviewed about the obama administration's efforts to protect the u.s. against cyber attacks. >> host: well, this is week one in "the communicators" four-week series on cybersecurity, cyber threats and legislative proposals to address those cyber threats. we're pleased to be joined on our first week by howard schmidt, assistant to the president, and also white house cybersecurity coordinator. be guest reporter from the "wall street journal." mr. schmidt, if we could start before we dive into the proposals that the obama administration has put forward on cybersecurity, is there a working definition of what cybersecurity is across governments and across the different stakeholders of what it is and what it will entail? >> guest: i think the term that we use and approach in what we now call cybersecurity has evolved over the years. used to be called computer security, then informs information security, then it was information insur
cybersecurity. white house cybersecurity coordinator howard schmidt is interviewed about the obama administration's efforts to protect the u.s. against cyber attacks. >> host: well, this is week one in "the communicators" four-week series on cybersecurity, cyber threats and legislative proposals to address those cyber threats. we're pleased to be joined on our first week by howard schmidt, assistant to the president, and also white house cybersecurity coordinator. be guest...
92
92
Aug 30, 2011
08/11
by
CSPAN2
tv
eye 92
favorite 0
quote 0
that touch on cybersecurity. i think a subcommittee of energy and commerce is already reported out a data breach bill. we have a couple in science and services, a bill related to cybersecurity. things are moving. and again i think the hope is that with the framework, over the next year and a half, we can make substantial progress in a variety of areas. but not put all -- my preference personally would be not to put all of our eggs into a single 2,000 page bill that you have to ram through and nobody knows what's in it. i don't think there's a good history of that sort of approach. >> jennifer martinez? >> and then the budget crisis has consumed washington for months as you know. how do you think that's going to impact the types of bills coming through the house and also the house gop freshman have made it very clear that they are against anything that's going to increase spending. do you see that as a possible issue going forward as the various committees are looking at cyber legislation? >> you know, i think you
that touch on cybersecurity. i think a subcommittee of energy and commerce is already reported out a data breach bill. we have a couple in science and services, a bill related to cybersecurity. things are moving. and again i think the hope is that with the framework, over the next year and a half, we can make substantial progress in a variety of areas. but not put all -- my preference personally would be not to put all of our eggs into a single 2,000 page bill that you have to ram through and...
135
135
Aug 29, 2011
08/11
by
CSPAN2
tv
eye 135
favorite 0
quote 0
he also worked on the president's recent cybersecurity report. also joining us is catherine lotrionte, she is is director of the cybersecurity project at georgetown university. she served in the general counsel office at the cia and also worked on the president's foreign intelligence advisory board during the george w. bush administration. alan paller is the founder and research director of the sands institute, and he was also an adviser to both president clinton and president bush administrations at different levels. thank you all for being here today, we sure appreciate it. if i could start with a question for all three of you and, mr. paller, we'll start with you. how would you assess the cybersecurity threats currently facing the u.s., and are we doing enough to confront them? >> they're explosive, they're expansive, they're getting larger, and they're getting more sophisticated. and although we're doing a lot, we're falling further and further behind every week. >> host: why? >> guest: because the technology of the attackers is accelerating,
he also worked on the president's recent cybersecurity report. also joining us is catherine lotrionte, she is is director of the cybersecurity project at georgetown university. she served in the general counsel office at the cia and also worked on the president's foreign intelligence advisory board during the george w. bush administration. alan paller is the founder and research director of the sands institute, and he was also an adviser to both president clinton and president bush...
138
138
Aug 16, 2011
08/11
by
CSPAN2
tv
eye 138
favorite 0
quote 0
it encourages young people to think about a security field and cybersecurity. we have looked at the different challenges and a program that lasted a couple of months but is not only about taking something that is a hobby and using it for fun or for school work but harnesses these talents and skills that may lead to a successful career for our students. >> host: congressman langevin jennifer raised with congressman thornberry the issue of the budget. with everything going on in washington right now with the cuts being made in the budget omb estimates about $12 billion to spend is spent government lied on cybersecurity prevention efforts. do you see this as a problem in the future, getting enough money to protect from cybersecurity and treasons, tax ephedra? >> as we know in tight budget times we have to be smart about where we spend our dollars and that is why that strong collaboration and coordination is so important. i believe if we had a director in the white house security office that is that -- senate confirmed that has budget authority we can compel compli
it encourages young people to think about a security field and cybersecurity. we have looked at the different challenges and a program that lasted a couple of months but is not only about taking something that is a hobby and using it for fun or for school work but harnesses these talents and skills that may lead to a successful career for our students. >> host: congressman langevin jennifer raised with congressman thornberry the issue of the budget. with everything going on in washington...
84
84
Aug 31, 2011
08/11
by
CSPAN2
tv
eye 84
favorite 0
quote 0
once again as we evolve in cybersecurity, one of the things we look at was cybersecurity cost. that would be anti-virus or firewall these sort of things. no longer are they viewed as strictly security type of things. they are part of the infrastructure. it's like when we buy a car, we don't say i want to have brakes or not have brakes. it's part of the safety. that's why we look at the it, the security has to be built into it. >> in looking at your office, one the things that is -- one the proposals that still circulating on the hill is to create more structure around your position. i'm wondering now that you've had some time to spend in that position, who is your take in terms of proposal that is would give it more control over the pursestrings or just sort of establish your office more kind of grounded in statute. >> first, having control doesn't make you more secure. we've seen that with the evolution and most recently some of the changes that we've made to make it work. the structure that we have now is a good structure. we have the ability to bring all of the leadership an
once again as we evolve in cybersecurity, one of the things we look at was cybersecurity cost. that would be anti-virus or firewall these sort of things. no longer are they viewed as strictly security type of things. they are part of the infrastructure. it's like when we buy a car, we don't say i want to have brakes or not have brakes. it's part of the safety. that's why we look at the it, the security has to be built into it. >> in looking at your office, one the things that is -- one...
61
61
Aug 18, 2011
08/11
by
CSPAN2
tv
eye 61
favorite 0
quote 0
and another $80 million for cybersecurity, and research. when you combine that with the budget for the fbi, is their redundancy going on? why are there two different agencies looking at this issue? guest: the department of homeland security is really in protect mode and consequence management. their role is really looking at protecting government networks. the fbi possible is different. it is in threat mitigation. there is absolutely opportunity to share information and intelligence so those two organizations make each other stronger. there is information in the course of our daily investigation about developing vulnerability, about areas that may be exploited. the department of homeland security might not have visibility on. because we have an exchange of personnel in each of our agencies, we are able to share that information so they can distribute to others in critical infrastructure and raise their defenses. it is not one or the other or redundant, if it is the sharing of intelligence across programs. host: is there a cyber command cent
and another $80 million for cybersecurity, and research. when you combine that with the budget for the fbi, is their redundancy going on? why are there two different agencies looking at this issue? guest: the department of homeland security is really in protect mode and consequence management. their role is really looking at protecting government networks. the fbi possible is different. it is in threat mitigation. there is absolutely opportunity to share information and intelligence so those...
94
94
Aug 15, 2011
08/11
by
CSPAN2
tv
eye 94
favorite 0
quote 0
but it encourages young people to think about a field in this, in cybersecurity. we put them through the paces, different challenges, um, and a program that lasts about a couple of months. but it's not only about taking something that's just a hobby and using it for fun or, you know, for school work but harnesses these talents and skills that may eventually lead to a successful career for students. >> host: now, congressman langevin, jennifer raised with congressman thornberry the issue of the budget issue. with everything going on in washington right now, omb estimates that about $12 billion is spent government wide on cybersecurity, prevention efforts. do you see this as a problem in the future, getting enough money to protect from cybersecurity, substance abuses, attacks -- intrusions, attacks, etc. .. >> guest: most of it's been kind of encouraging and collaboration across the departments and agencies. but he doesn't really have the authority for the sake of going to olympians same this isn't doing what it needs to. we need to take some measures to make sure t
but it encourages young people to think about a field in this, in cybersecurity. we put them through the paces, different challenges, um, and a program that lasts about a couple of months. but it's not only about taking something that's just a hobby and using it for fun or, you know, for school work but harnesses these talents and skills that may eventually lead to a successful career for students. >> host: now, congressman langevin, jennifer raised with congressman thornberry the issue...
125
125
Aug 18, 2011
08/11
by
CSPAN
tv
eye 125
favorite 0
quote 0
and another $80 million for cybersecurity, and research. when you combine that with the budget for the fbi, is their redundancy going on? why are there two different agencies looking at this issue? guest: the department of homeland security is really in protect mode and consequence management. their role is really looking at protecting government networks. the fbi possible is different. it is in threat mitigation. there is absolutely opportunity to share information and intelligence so those two organizations make each other stronger. there is information in the course of our daily investigation about developing vulnerability, about areas that may be exploited. the department of homeland security might not have visibility on. because we have an exchange of personnel in each of our agencies, we are able to share that information so they can distribute to others in critical infrastructure and raise their defenses. it is not one or the other or redundant, if it is the sharing of intelligence across programs. host: is there a cyber command cent
and another $80 million for cybersecurity, and research. when you combine that with the budget for the fbi, is their redundancy going on? why are there two different agencies looking at this issue? guest: the department of homeland security is really in protect mode and consequence management. their role is really looking at protecting government networks. the fbi possible is different. it is in threat mitigation. there is absolutely opportunity to share information and intelligence so those...
190
190
Aug 4, 2011
08/11
by
CNNW
tv
eye 190
favorite 0
quote 0
. >> we spoke with this man from the cybersecurity firm mcafee incorporated who discovered the attacks calls operation shady rat whonchs were the targets of this attack? >> every single industry you can imagine, from i.t. industries, energy industries, governments, nonprofits, the united nations, the international olympic committee, the world anti-doping agency, the association of southeast asian states. >> reporter: he says six u.s. government agencies, a dozen defense contractors are among those that have had data stolen over the past ve years, data like information on summits, military secrets, other sensitive projects. a common method used, spear phishing. what's that? i spoke to president of the firm ec council, the trained cybersecurity personnel from the defense personnel and other personnel. >> he's spearphishi me, what does he do. >> he sends me an e-mail. i'm getting it. it looks like it's from someone i know. >> it's a harmless e-mail asking you to click a link. >> reporter: hackers sometimes use your personal e-mail to get in. what the hackers are counting on is me as an em
. >> we spoke with this man from the cybersecurity firm mcafee incorporated who discovered the attacks calls operation shady rat whonchs were the targets of this attack? >> every single industry you can imagine, from i.t. industries, energy industries, governments, nonprofits, the united nations, the international olympic committee, the world anti-doping agency, the association of southeast asian states. >> reporter: he says six u.s. government agencies, a dozen defense...
56
56
Aug 17, 2011
08/11
by
CSPAN2
tv
eye 56
favorite 0
quote 0
he led that department in strategic direction and oversaw the international cybersecurity as well as the national security system. then we'll have major general tim lohanberg. he was appointed addent. and he has done so since 9/11. he's the longest-serving homeland security advisor in the country. in addition he serves as the chair of homeland defense and security as the general's association. he chairs the national governors association homeland security advisory council and chairs the governor's domestic security subcabinet in washington state. then we'll hear from randy mullet. randi is the vice president of government affairs at conway oink a 4.3 billion freight logistics company head in california as the policy manager and representative executive in dc randy is responsible for all government and affairs for conway and its subsidiary. randy is a well respected voice within the homeland security community, freight transportation and supply chain management as well. and then we'll hear from laura reese, laura joins csc as its director of immigration reform strategy in october of 2
he led that department in strategic direction and oversaw the international cybersecurity as well as the national security system. then we'll have major general tim lohanberg. he was appointed addent. and he has done so since 9/11. he's the longest-serving homeland security advisor in the country. in addition he serves as the chair of homeland defense and security as the general's association. he chairs the national governors association homeland security advisory council and chairs the...
212
212
Aug 3, 2011
08/11
by
KNTV
tv
eye 212
favorite 0
quote 0
one cybersecurity expert says china is the like lly candidate. >>> one texas driver received quite a scare when he couldn't take his car out of cruise control. with his brakes lock and unable to stop, the driver barreled down the road at 60 miles an hour. the horrifying ordeal came to an end when a manufacture managed to get in front of the out of control vehicle and slow it down. >>> the u.s. coast guard's discovery of a drug smuggling submarine netted a whale of a narcotics bust. 200 bales of cocaine. the street value of the bust is estimated to be worth $180 million. >>> a severe drought has uncovered a major find in lake nacogdoches. nasa confirms the global-shaped structure found in the dried-up lake is part of the ill-fated space shuttle "columbia" mission. it is part of 18 fuel tanks that fell to earth when the shuttle disintegrated on re-entry. efforts are being made to return the piece to nasa. >>> finally in chicago, a symbol of hollywood royalty in america's pastime is scheduled to hit the auction block. a baseball kissed by marilyn monroe and signed by yankee ledge ends l
one cybersecurity expert says china is the like lly candidate. >>> one texas driver received quite a scare when he couldn't take his car out of cruise control. with his brakes lock and unable to stop, the driver barreled down the road at 60 miles an hour. the horrifying ordeal came to an end when a manufacture managed to get in front of the out of control vehicle and slow it down. >>> the u.s. coast guard's discovery of a drug smuggling submarine netted a whale of a narcotics...
109
109
Aug 19, 2011
08/11
by
CSPAN2
tv
eye 109
favorite 0
quote 0
now, there's -- the best example i think right now is the whole cybersecurity legislation.to the partner's credit, randy's credit, talking to the chairman before, the resources available in the infrastructure necessary to protect and frankly, the government's infrastructure is only by the private sector, so if you want to secure the country's cyber assets, you better involve the private sector at the front end, not in an ad hoc way. i think that message, and i think the continued message of outreach. you need the private sector involved. everybody eluded to the employees which i think, al, you talked about with the impact of some of the psychology, a lot of folks talks about psychology of people in the mind set, see something say something. it's more than that. we want people to have a ready kit. remember the duct tape? i wanted color coded duct tape, but i just count get it in. [laughter] there's certainly responsibilities everybody has to share, and the panel certainly projected that notion very well. going forward everybody talkinged about concerns, but they said they ar
now, there's -- the best example i think right now is the whole cybersecurity legislation.to the partner's credit, randy's credit, talking to the chairman before, the resources available in the infrastructure necessary to protect and frankly, the government's infrastructure is only by the private sector, so if you want to secure the country's cyber assets, you better involve the private sector at the front end, not in an ad hoc way. i think that message, and i think the continued message of...
267
267
Aug 3, 2011
08/11
by
MSNBCW
tv
eye 267
favorite 0
quote 1
one cybersecurity expert says china is the likely candidate. >>> here's your "first look" at some other news going on around america today. one texas driver received quite a scare when he couldn't take his car out of cruise control. with his brakes lock and unable to stock, he barrelled down the road at 60 miles per hour. the ordeal came to an end when a police officer got in front of the out of control vehicle to slow it down. >>> the u.s. coast guard's discovery of a drug smuggling submarine netted a whale of a narcotics bust. crews unloaded over 200 bails of cocaine in south florida following the arrest of drug traffickers in the caribbean sea. the value of the bust is expected to be $180 million. >>> a severe drought uncovered a major find in a lake in florida. a globe-like figure found in the lake is part of the ill-fated "columbia" space shuttle mission. efforts are being made to return the piece to nasa. >>> in chicago, a symbol of hollywood royalty and america's past time is scheduled to hit the auction block. a baseball kissed by marilyn monroe and signed by yankees legends by
one cybersecurity expert says china is the likely candidate. >>> here's your "first look" at some other news going on around america today. one texas driver received quite a scare when he couldn't take his car out of cruise control. with his brakes lock and unable to stock, he barrelled down the road at 60 miles per hour. the ordeal came to an end when a police officer got in front of the out of control vehicle to slow it down. >>> the u.s. coast guard's discovery of...
222
222
Aug 8, 2011
08/11
by
KNTV
tv
eye 222
favorite 0
quote 0
and the new report from the cybersecurity firm mcafee offers a dramatic example.tected sophisticated sustained attacks on 72 public and private targets in the past five years, all from a single source widely thought to be china. >> the government's concern is state-sponsored espionage on an unprecedented scale. foreign governments targeting our nation's networks and the private sector network. that's why the government is hiring so many new cyberspecialists. >> reporter: and giving hackers the chance to work for the good guys. pete williams at the national security agency in maryland. >>> all right. so now we're going to check in with nick o'kelly. what is up with the guy with the mask? >> and the name too. dark shadow? >> dark phoenix. >> even better. i need a nickname. well, it would be nick, right? >> there you go. >> temperatures this hour in the 50s to low 60s. a little cool out there today. a little cooler than average. hard to complain. it's very mild around the bay. but the strong onshore flow wind flow has been the story for, well, it seems like weeks, ha
and the new report from the cybersecurity firm mcafee offers a dramatic example.tected sophisticated sustained attacks on 72 public and private targets in the past five years, all from a single source widely thought to be china. >> the government's concern is state-sponsored espionage on an unprecedented scale. foreign governments targeting our nation's networks and the private sector network. that's why the government is hiring so many new cyberspecialists. >> reporter: and giving...
107
107
Aug 15, 2011
08/11
by
CSPAN2
tv
eye 107
favorite 0
quote 0
and rhode island democratic congressman, jim langevin who cofound the first-ever cybersecurity caucus in 2008. "the communicators" airs monday nights at 8:00 eastern on c-span2. >>> all this month watch "booktv" in prime time on c-span2 2. tonight politics and the american novelist. at 8:30 p.m., robert hurst, the autobiography of mark twain, volume i. at 9:50, david reynolds discusses of the mightier than the sword and "uncle tom's cabin" and the battle for america. after that at 11:15, hair rid rise, al cot the woman behind, "little women." "booktv" all this month on c-span2. >>> next we'll hear about u.s. military operations in afghanistan from the commander of nato's training mission in the country as well as the president of the national defense university. in june president obama announced plans to with draw 10,000 troops by the end of this year and 23 thousand more by september 2012. amounting to about one-third of the 100,000 troops in the country. this discussion hosted by the u.s. institute of peace is just over an hour. >> it is my great pleasure to welcome you to today's m
and rhode island democratic congressman, jim langevin who cofound the first-ever cybersecurity caucus in 2008. "the communicators" airs monday nights at 8:00 eastern on c-span2. >>> all this month watch "booktv" in prime time on c-span2 2. tonight politics and the american novelist. at 8:30 p.m., robert hurst, the autobiography of mark twain, volume i. at 9:50, david reynolds discusses of the mightier than the sword and "uncle tom's cabin" and the battle...
257
257
Aug 15, 2011
08/11
by
KNTV
tv
eye 257
favorite 0
quote 0
a recent report by a cybersecurity firm detected 72 attacks on private and public targets in the last five years, all from one source, mostly believed to be from china. live in oakland, elise kirschner, nbc bay area news. >> thank you, elise. >>> indianapolis, that is. investigators tonight are trying to figure out how a massive stage at the state fair fell over in the wind, killing five people last night. dozens of others were injured. nbc's ron mott has the story, including some cell phone video of the collapse that may be considered disturbing to some. >> reporter: minutes after announcer told the crowd severe weather was possible, it was reality. a wind gust estimated between 60 and 70 miles per hour hit the stage, sending overhead rigging crashes down on concertgoers. >> i was scared. chris brenneman lost sight of his wife this the chaos. >> the winds and a big gust of wind came. stakes flew over and i took off down there to see what i could do to help. >> reporter: ominous-looking clouds hovered in the sky as people raced to lift the twisted wreckage of metal, cables, and lighti
a recent report by a cybersecurity firm detected 72 attacks on private and public targets in the last five years, all from one source, mostly believed to be from china. live in oakland, elise kirschner, nbc bay area news. >> thank you, elise. >>> indianapolis, that is. investigators tonight are trying to figure out how a massive stage at the state fair fell over in the wind, killing five people last night. dozens of others were injured. nbc's ron mott has the story, including...
274
274
Aug 23, 2011
08/11
by
CSPAN2
tv
eye 274
favorite 0
quote 0
next week the conclusion of the series on cybersecurity. we have three cybersecurity experts talking about the threats the u.s. faces. the defense institute, katherine of georgetown university and jim lewis of csis. we will see you next week. ♪ >> notice the color of the one bourbon. the color that you see is coming from the char on the inside of the barrel. this is where bouron gets all of its color and a lot of its flavor. currently they've discovered over 200 flavors just in the barrell. >> this weekend we highlight frankfurt kentucky on book tv and american history tv. throughout the weekend looked for the history and literary life of the state capital. on book tv on c-span2 device, violence corruption and urban renewal douglas boyd on frankfort and kent masterson brown but kentucky with calvary soldier. next from the harlem book fair a four dimond manning marable's biography of malcolm x. this is a little more than anbig hour. >> good afternoon, everyone and welcome again to the 2011 harlel book fair. i am the assistant professor ofo h
next week the conclusion of the series on cybersecurity. we have three cybersecurity experts talking about the threats the u.s. faces. the defense institute, katherine of georgetown university and jim lewis of csis. we will see you next week. ♪ >> notice the color of the one bourbon. the color that you see is coming from the char on the inside of the barrel. this is where bouron gets all of its color and a lot of its flavor. currently they've discovered over 200 flavors just in the...
36
36
tv
eye 36
favorite 0
quote 0
trojan horse attack i think interesting point that you made i want to get to that point about cybersecurity and how crash rate and play in the united states have ramped at significantly with our government but i want to touch on this actual report because you do that and you and what i was reading you didn't seem to think that this was necessarily the massive a large you know attack that this is being played out today on the media to me well you know when i read the report i kept thinking all this is going to be interesting because i'm really juicy in here were found about secret weapon plans were found out about patents which had been stolen but actually there was nothing new in what we heard was that companies get hacked well we know about that already and and and there wasn't even any indication as to how many computers that these companies type or even whose computer inside the organization so if it's rose on reception who has a computer hacked mcafee would have picked that up and said look all this company they got infected they've been hacked that's very different than if the c.e.o. o
trojan horse attack i think interesting point that you made i want to get to that point about cybersecurity and how crash rate and play in the united states have ramped at significantly with our government but i want to touch on this actual report because you do that and you and what i was reading you didn't seem to think that this was necessarily the massive a large you know attack that this is being played out today on the media to me well you know when i read the report i kept thinking all...
36
36
tv
eye 36
favorite 0
quote 0
the cybersecurity apps said it's our policy we do not say who we think might get involved but they do think that it probably is a country or a nation state because they're saying that you can't get any economic gain this is all really information that might be interesting to a nation state but immediately we've seen the media and other security experts all point the finger at china and say it's them and i've seen a million headlines today i'll put china in you know into the headline even though they haven't been directly referenced right i think i think that a lot of the targets of interest are parts that would interest innovation like china they might also interest other nations i think that additional investigation would be required to say definitively this is china or this is what i think about the fact that everybody immediately jumps on china as the threat well there have been in recent months and in recent years there have been a lot of investigations that have definitively traced invasions back to the chinese mainland now that's not to say the chinese government is to say so in
the cybersecurity apps said it's our policy we do not say who we think might get involved but they do think that it probably is a country or a nation state because they're saying that you can't get any economic gain this is all really information that might be interesting to a nation state but immediately we've seen the media and other security experts all point the finger at china and say it's them and i've seen a million headlines today i'll put china in you know into the headline even though...
90
90
Aug 18, 2011
08/11
by
CSPAN2
tv
eye 90
favorite 0
quote 0
border security, cybersecurity and infrastructure protection. wherever you go you find yourself in need of the critical partnership with public sector and private sector. remember right after 9/11 president bush called me in. we met in the oval office. he asked me to stay later and mentioned to me we had to do something different at our borders with our friends in canada and mexico because we enhanced security and ratcheted it up big time but slowdown congress. i remember going to a general motors facility in michigan, assembly plant. they ordered their seats on the front end of the assembly line. the seats were made in canada. put a computer chip on the seats and load it in the track and cross the bridge through the tunnel. one of the last things in the assembly to be inserted into the seats, everything else was done. a eight hour process. what happens if the trucks with those seats on the bridge are stuck in the tunnel for half a day because we grab the security? nothing happens in that facility. it doesn't have to be zero some game. you can e
border security, cybersecurity and infrastructure protection. wherever you go you find yourself in need of the critical partnership with public sector and private sector. remember right after 9/11 president bush called me in. we met in the oval office. he asked me to stay later and mentioned to me we had to do something different at our borders with our friends in canada and mexico because we enhanced security and ratcheted it up big time but slowdown congress. i remember going to a general...
61
61
Aug 22, 2011
08/11
by
CSPAN2
tv
eye 61
favorite 0
quote 0
the best example right now was the cybersecurity legislation and to the department's credit. the resources available in the infrastructure necessary to protect frankly the government's infrastructure is owned by the private sector. so if you want to secure the country's cyber and digital assets you better involve the private sector of the front end rather than the ad in not in an ad hoc way. so i think that message and i appreciate fema and sector napolitano. the other thing i felt was important was the employees i think you talked about the impact of some of this and this ecology to read a lot of folks talk about the psychology on of the "see something, say something" but it's something more than that. i'm reminded we wanted people to have a ready kit. i wanted a color-coded the duct tape and i just couldn't get it in. there are certain responsibilities of ravee has to share and i think depending on certainly the projected that notion very well to read and in going forward i think everyone has their concerns but they are all manageable. i had a budget cicatrix it when you wa
the best example right now was the cybersecurity legislation and to the department's credit. the resources available in the infrastructure necessary to protect frankly the government's infrastructure is owned by the private sector. so if you want to secure the country's cyber and digital assets you better involve the private sector of the front end rather than the ad in not in an ad hoc way. so i think that message and i appreciate fema and sector napolitano. the other thing i felt was...
156
156
Aug 22, 2011
08/11
by
CSPAN2
tv
eye 156
favorite 0
quote 0
the big problem in cybersecurity with regard to information sharing is trust. um, and the reason we don't have the trust now is that the intelligence community doesn't want to give up source data because they're afraid that it will get out to bad guys and, frankly, that's a pretty reasonable thing. and the private sector doesn't want to give up proprietary data because they're afraid it's going to get out to competitors. the model i just described circumvents both of those problems. we're not talking about anymore giving up source data. most companies don't care who is giving the attack. government cares because they want to catch them. most companies just want the attacks stopped. so simply by changing the model of the sort of information we are sharing, we can stop this without getting much more involvement from the intelligence community, etc. and i'm offering this just as an example. what i'm saying is when we are dealing with the basic attacks, there's lots we already know, and we need to be incentivizing that. we want these companies to want to do it. if
the big problem in cybersecurity with regard to information sharing is trust. um, and the reason we don't have the trust now is that the intelligence community doesn't want to give up source data because they're afraid that it will get out to bad guys and, frankly, that's a pretty reasonable thing. and the private sector doesn't want to give up proprietary data because they're afraid it's going to get out to competitors. the model i just described circumvents both of those problems. we're not...
225
225
Aug 29, 2011
08/11
by
CSPAN
tv
eye 225
favorite 0
quote 0
. >> monday night on the communicators, a look at cybersecurity and the u.s.'s ability to prevent attacks on private and public computer systems. a wall street journal correspondent joins three other guests as we wrap up the final in up for part series looking at the dangers of cyber security. see it monday on c-span2 at 8:00 p.m. eastern. >> on tonight's "road to the white house, an interview with republican presidential candidate jon huntsman, the former governor and u.s. ambassador to china talked about his strategy for winning the republican nomination and the state of the u.s. economy and relations with china. this is close to an hour. >> when did you first thing about running for president? >> as we were departing china, just this year. there is always talk about higher office when you are a governor. i would dismiss that as nonsense, and never really focused on the presidency until we return home from china, and there were some folks who actively had organized for another candidate who brought a real world problem-solving approach to our challenges as a
. >> monday night on the communicators, a look at cybersecurity and the u.s.'s ability to prevent attacks on private and public computer systems. a wall street journal correspondent joins three other guests as we wrap up the final in up for part series looking at the dangers of cyber security. see it monday on c-span2 at 8:00 p.m. eastern. >> on tonight's "road to the white house, an interview with republican presidential candidate jon huntsman, the former governor and u.s....
130
130
Aug 13, 2011
08/11
by
CSPAN2
tv
eye 130
favorite 0
quote 0
union more often post privacy policies. , the day support from the cyberwarfare to the areas of cybersecurity now putting up in the european states. if you actually want to look at the volunteers say bernie during peak times. so they have a bunch of geeks who call themselves an official entity, a say bernie and cyberattacks come to the defense, which may not be a bad idea. but i don't think the europeans are any less, you know, aggressive when it comes to cyberspace than americans. >> the next congress action is the cyberreserve forwards. more questions, please. >> the cyberpeace corps. >> probably not that one. yes, sir. >> yeah, now the most important issue in the contribution i would like you to suggest what will be the stretches to utilize the internet to their own advantage. and also now, the internet has become the national solvency issue. but that name each country focuses their own information and this is going to be very harmful to the international relation. thank you. >> well, the initial question was about the way in which opponents, you know, opponents of climate change can use t
union more often post privacy policies. , the day support from the cyberwarfare to the areas of cybersecurity now putting up in the european states. if you actually want to look at the volunteers say bernie during peak times. so they have a bunch of geeks who call themselves an official entity, a say bernie and cyberattacks come to the defense, which may not be a bad idea. but i don't think the europeans are any less, you know, aggressive when it comes to cyberspace than americans. >> the...
143
143
Aug 30, 2011
08/11
by
CSPAN2
tv
eye 143
favorite 0
quote 0
also joining us today was catherine lotrionte, who is director of the cybersecurity project at georgetown university, ph.d. from georgetown university, law degree from new york university and alan paller founder and research director of the sans institute, degrees from cornell and m.i.t.. mr. paller very quickly what is the sans institute in how did you get involved in this type of work? >> guest: sans is the main training organization. we have trained 20,000 people year in the techniques that they are used to -- computers and exploit computers. i got involved because the software companies sold to another company in the security area and learned it that way. >> host: do you train a lot of government folks? >> guest: more commercial and defense industrial base of a small number of government folks in law enforcement particular and the intelligence community. >> host: catherine lotrionte how did you get involved in working in the general counsel office of the cia and cybersecurity? >> guest: so my background in cyber started actually at cia when i was given the information warfare account
also joining us today was catherine lotrionte, who is director of the cybersecurity project at georgetown university, ph.d. from georgetown university, law degree from new york university and alan paller founder and research director of the sans institute, degrees from cornell and m.i.t.. mr. paller very quickly what is the sans institute in how did you get involved in this type of work? >> guest: sans is the main training organization. we have trained 20,000 people year in the techniques...
83
83
Aug 8, 2011
08/11
by
CSPAN2
tv
eye 83
favorite 0
quote 0
this week and throughout the month, a look at cybersecurity and it's effect on national and military security and consumer protection. this week, white house cybersecurity coordinator howard schmidt discusses the obama administration's effort to produce cyber threats and to protect the u.s. against cyberattack. the communicators errors 8 p.m., right here on c-span2. with the senate adjourned for the august recess, watch booktv all this month in primetime on c-span2. tonight secrets and myths revealed. annie looks for aliens in her book "area 51" and top military base. >> more from the news media and jeffrey toobin. here's a look at the morning's panel from the newseum. >> credibility, our own survey, we do one every year. we ask certain questions every year since 1997. one of those is -- concerned bias. we've been consistenting getting the last few years about 2/3 of the more american public sees bn news report. now at the same time, almost the same number sees a role for the press' watchdog. if you just ask is a free press important, you get 95%. though sometimes they seem at odds.
this week and throughout the month, a look at cybersecurity and it's effect on national and military security and consumer protection. this week, white house cybersecurity coordinator howard schmidt discusses the obama administration's effort to produce cyber threats and to protect the u.s. against cyberattack. the communicators errors 8 p.m., right here on c-span2. with the senate adjourned for the august recess, watch booktv all this month in primetime on c-span2. tonight secrets and myths...
93
93
Aug 15, 2011
08/11
by
CSPAN
tv
eye 93
favorite 0
quote 0
of the house cybersecurity caucus -- mac thornberry. former treasury secretary henry's talked about the wall street bailouts of 2008. today's current financial climate and the u.s. economic relationship with china. he spoke at his all modern dartmouth college in hanover, new hampshire, begins with a question posed by his classmates labor secretary robert reich. this is money -- moderated by youth of this senator judd gregg. clsme robert reich at the following questions. >> there is one last question, the question you get to pose to our next speaker. i looked up to our next speaker would be. maybe this question is a set with your question. but our next beaker is your dartmouth classmate and former treasury secretary hank paulson. [laughter] so, when he is sitting in that chair, what would you like him to have to answer? >> hank, two related questions. number one, why in the wall street bailout did you not condition those funds on wall street doing several things that it needed to do -- particularly with regard to mortgage and mitigation
of the house cybersecurity caucus -- mac thornberry. former treasury secretary henry's talked about the wall street bailouts of 2008. today's current financial climate and the u.s. economic relationship with china. he spoke at his all modern dartmouth college in hanover, new hampshire, begins with a question posed by his classmates labor secretary robert reich. this is money -- moderated by youth of this senator judd gregg. clsme robert reich at the following questions. >> there is one...
156
156
Aug 30, 2011
08/11
by
CSPAN
tv
eye 156
favorite 0
quote 0
technology aspects of running our day to day life coming into jeopardy from loss of power, but cybersecurityern in terms of terrorists attacking our cyber networks. these are the kinds of things that we are focused on. dams is also a big consideration. assessments are made at all levels of government about what is critical infrastructure and how it will be protected during an emergency. another preparation that is done at the behest of state, local, federal government, is so-called continuity of operations. our center had been involved in advising state and local governments on continuity of operations. what does that mean? for example, in new orleans, the police headquarters got flooded out they called us up and said, do you have a plan that we can use? well, you cannot do it after the event. the preferred way to deal with things is for governmental institutions -- schools, hospitals, critical infrastructure -- to spend time in advance deciding if your infrastructure is debilitated, whether for a terror attack, hurricane, tornado, that you have a plan in place to move out of your facility a
technology aspects of running our day to day life coming into jeopardy from loss of power, but cybersecurityern in terms of terrorists attacking our cyber networks. these are the kinds of things that we are focused on. dams is also a big consideration. assessments are made at all levels of government about what is critical infrastructure and how it will be protected during an emergency. another preparation that is done at the behest of state, local, federal government, is so-called continuity...
67
67
Aug 18, 2011
08/11
by
CSPAN2
tv
eye 67
favorite 0
quote 0
today it's the fbi and cybersecurity. "wall street journal" editorial, obama on the farm, prepare to be insulted. if he wished to express a point of view not shared by president obama. agree with him and he won't even hold it against you that you're a billionaire who owns a credit rating agency. mr. obama's unique brand of political discernment was captured on film yesterday during a town hall event atkinson, illinois and after welcoming the president to down he said drought conditions had made it an especially tough year in the midwest. then he said, please don't challenge us with more rules and regulations from washington, d.c. he added that farmers like to rise in the morning and start tending their fields not their paperwork. mr. obama asked which rules the farmer had in mind the man spending rules on noise pollution, dust pollution and water runoff was concerns. was this a valuable opportunity for the president to discover more of those unnecessary rules that he claimed to be hunting down and eliminating last winter,
today it's the fbi and cybersecurity. "wall street journal" editorial, obama on the farm, prepare to be insulted. if he wished to express a point of view not shared by president obama. agree with him and he won't even hold it against you that you're a billionaire who owns a credit rating agency. mr. obama's unique brand of political discernment was captured on film yesterday during a town hall event atkinson, illinois and after welcoming the president to down he said drought...
74
74
Aug 8, 2011
08/11
by
CSPAN2
tv
eye 74
favorite 0
quote 0
this has been week one in our four-week series on cybersecurity. next week two members of congress on the legislative proposals, mac thorn berry, republican of texas, jim lang min, democrat of rhode island. >> next on c-span2, british journalists talk about political unrest in syria. then misperceptions about miranda rights a topic at the annual convention of the american psychological association. and later cnn legal analyst jeffrey toobin is among the participants in a discussion in how technology is changing media coverage in the courts. >> history of america's top secret military base. then jennet conant talks about julia child in her book "a covert affair: julia child and paul child in the oss." after that edward lengel discusses the story behind the chopping down of the cherry tree in "inventing george washington: america's founder in myth and memory." booktv in prime time all this month on c-span2. ful. >>> next, british journalists and middle east analysts discuss the anti-government protests in syria. this program, which includes a questio
this has been week one in our four-week series on cybersecurity. next week two members of congress on the legislative proposals, mac thorn berry, republican of texas, jim lang min, democrat of rhode island. >> next on c-span2, british journalists talk about political unrest in syria. then misperceptions about miranda rights a topic at the annual convention of the american psychological association. and later cnn legal analyst jeffrey toobin is among the participants in a discussion in how...
100
100
Aug 29, 2011
08/11
by
CSPAN2
tv
eye 100
favorite 0
quote 0
also joining us today was catherine lotrionte who is director of the cybersecurity project at georgetown university, ph.d. from georgetown university, law degree from new york university. and is alan paller, founder and research director of the sands institute. degrees from cornell and mit. mr. paller, very quickly, what is the sands institute and how did you get involved in this type of work? >> guest: sands is the main training organization which trains 20,000 people a year in the very advanced techniques that will be used to defend and exploit computers. i got involved because i started one of the first software companies and sold it to another company that was in the security area and learned it that way. >> host: do you train a lot of government folks? >> guest: yeah, more commercial and defense industrial-based a small number of the government folks in law enforcement, particularly in the intelligence community. >> host: catherine, how'd you get involved in working at the general counsel office at the cia and in cybersecurity? >> guest: so my background in cyber started actually at
also joining us today was catherine lotrionte who is director of the cybersecurity project at georgetown university, ph.d. from georgetown university, law degree from new york university. and is alan paller, founder and research director of the sands institute. degrees from cornell and mit. mr. paller, very quickly, what is the sands institute and how did you get involved in this type of work? >> guest: sands is the main training organization which trains 20,000 people a year in the very...
151
151
Aug 18, 2011
08/11
by
CSPAN
tv
eye 151
favorite 0
quote 0
now the best example i think right now is home cybersecurity legislation. to the department's credit, randy's credit, who came up here and talked before, the resources available in the infrastructure necessary to protect and frappingly, the government's infrastructure is owned by the private sector, so if you want to secure the country's cyberand digital assets, you had better involve the private sector not in an ad hoc way. i appreciate fema's and secretary napolitano's continued message of outreach. you need the private sector involved. everybody alluded to the employees. you talked about the impact of some of these -- the psychology. a lot of folks talked about the psychology of getting people in the mind-set. see something, say something. it is a bit more than that. i reminded that we wanted people to have ready kit. reab that duct tape? i remember those stories well. i wanted color-coded duct tape but i just coulden get it in. going forward, i think everyone hallucinated their concerns. but you heard what they said. they are all manageable. i had a bud
now the best example i think right now is home cybersecurity legislation. to the department's credit, randy's credit, who came up here and talked before, the resources available in the infrastructure necessary to protect and frappingly, the government's infrastructure is owned by the private sector, so if you want to secure the country's cyberand digital assets, you had better involve the private sector not in an ad hoc way. i appreciate fema's and secretary napolitano's continued message of...
199
199
tv
eye 199
favorite 0
quote 0
closed network so people like themselves, these people who are trying to find loophole notice cybersecurityinformation some if there's any worry, any concern, protect your information, they say, by using closed secured networks, and that is the only way to stay safe. randy? >> sandra endo in los angeles. thank you. >>> coming up, how a spanking led to a shooting on a public bus in philadelphia. you have got see this video on the other side of the break. vietnam, 1967. i got mine in iraq, 2003. u.s.a.a. auto insurance is often handed down from generation to generation, because it offers a superior level of protection and because u.s.a.a.'s commitment to serve the military, veterans, and their families is without equal. begin your legacy. get an auto insurance quote. u.s.a.a. we know what it means to serve. personal pricing now on brakes. tell us what you want to pay. we do our best to make that work. deal! my money. my choice. my meineke. >>> about half past the hour, let's check out some of the news and the other headlines that you may have missed. better-than-expected news on the jobless f
closed network so people like themselves, these people who are trying to find loophole notice cybersecurityinformation some if there's any worry, any concern, protect your information, they say, by using closed secured networks, and that is the only way to stay safe. randy? >> sandra endo in los angeles. thank you. >>> coming up, how a spanking led to a shooting on a public bus in philadelphia. you have got see this video on the other side of the break. vietnam, 1967. i got mine...
238
238
Aug 9, 2011
08/11
by
CSPAN2
tv
eye 238
favorite 0
quote 0
this has been week one in our four week series on cybersecurity. next week, two members of congress on the legislative proposal. republican of texas, jim lavegin, democrat of rhode island. >> in a few moments our specialbooktv and prime time schedule begins. >> next, investigative reporter on her book "area 51: uncensored history of america's top military base". she spoke for an hour. >> good evening, everyone, and i wanted to thank the commonwealth club for having me and everyone for being here. it's a real author's dream to have a full house for a book speaking event, and thank you, gill, for having me on the show and moderating tonight. we'll get to questions because people love to ask questions. i certainly do, and i wouldn't be here without that sense of curiosity so what i'm going to start with is actually read you two photographs from my book, but i'm going to set the stage so to speak a little bit first and let you know where area 51 is other than in people's imaginations because it really does exist. it's located in southern nevada about 7
this has been week one in our four week series on cybersecurity. next week, two members of congress on the legislative proposal. republican of texas, jim lavegin, democrat of rhode island. >> in a few moments our specialbooktv and prime time schedule begins. >> next, investigative reporter on her book "area 51: uncensored history of america's top military base". she spoke for an hour. >> good evening, everyone, and i wanted to thank the commonwealth club for having...
136
136
Aug 9, 2011
08/11
by
CSPAN
tv
eye 136
favorite 0
quote 0
there are still critical shortages, but people do not get three and four job offers for orders of cybersecuritytwork security, fields like that. guest: how does a community college like yours differ from the traditional four-year college as far as job placement, getting those students the graduate jobs? guest: our students usually have some form of on- the-job experience prior to graduate, and that creates a connection between the student and employer. it often results in employment immediately upon graduation. host: let me show our viewers this latest statistic. job gains among viewers 25 and older, if you are a high-school dropout, you can see the numbers right there. for unemployment. job gains, excuse me. it is less if you have a -- if you are a high-school dropout. some college or associates to become a little bit of an uptick there. bachelor's degree or higher, you see even more of an uptick. so if you are about to graduate from high school, thinking about community college vs. four-year education, why pick committee college -- community college when you see the numbers. guest: you can ge
there are still critical shortages, but people do not get three and four job offers for orders of cybersecuritytwork security, fields like that. guest: how does a community college like yours differ from the traditional four-year college as far as job placement, getting those students the graduate jobs? guest: our students usually have some form of on- the-job experience prior to graduate, and that creates a connection between the student and employer. it often results in employment immediately...
213
213
Aug 13, 2011
08/11
by
CSPAN2
tv
eye 213
favorite 0
quote 0
union more often post privacy policies. , the day support from the cyberwarfare to the areas of cybersecurity now putting up in the european states. if you actually want to look at the volunteers say bernie during peak times. so they have a bunch of geeks who call themselves an official entity, a say bernie and cyberattacks come to the defense, which may not be a bad idea. but i don't think the europeans are any less, you know, aggressive when it comes to cyberspace than americans. >> the next congress action is the cyberreserve forwards. more questions, please. >> the cyberpeace corps. >> probably not that one. yes, sir. >> yeah, now the most important issue in the contribution i would like you to suggest what will be the stretches to utilize the internet to their own advantage. and also now, the internet has become the national solvency issue. but that name each country focuses their own information and this is going to be very harmful to the international relation. thank you. >> well, the initial question was about the way in which opponents, you know, opponents of climate change can use t
union more often post privacy policies. , the day support from the cyberwarfare to the areas of cybersecurity now putting up in the european states. if you actually want to look at the volunteers say bernie during peak times. so they have a bunch of geeks who call themselves an official entity, a say bernie and cyberattacks come to the defense, which may not be a bad idea. but i don't think the europeans are any less, you know, aggressive when it comes to cyberspace than americans. >> the...
91
91
Aug 17, 2011
08/11
by
CSPAN2
tv
eye 91
favorite 0
quote 0
on tuesday, the fbi role in counterterrorism, and tomorrow we'll turn our attention to cybersecurity threats and fraud, and on friday wrap up with crime lab and forensics. today a discussion on the fbi budget and key program. following the money with david schlendorf, he's the assistance director for resource planning. let's just begin with your title and what you do. what does it mean? >> sure, the resource planning office is essentially the corporate office for the director and senior executive team. we help with everything from thinking about his strategy, he sets the strategy, but we have the team that personnel to help him track the data to assess how are we doing? people don't think of the fbi as a business. obviously our mission is not to make money. we're here to protect the country. $9 billion budget. we have all of the challenges that a large business has, financial challenges, human resources, training, strategic challenges, and so our job is to help the director get the most. we have groups to help find efficiency, internal consultants that help look, and get the data, di
on tuesday, the fbi role in counterterrorism, and tomorrow we'll turn our attention to cybersecurity threats and fraud, and on friday wrap up with crime lab and forensics. today a discussion on the fbi budget and key program. following the money with david schlendorf, he's the assistance director for resource planning. let's just begin with your title and what you do. what does it mean? >> sure, the resource planning office is essentially the corporate office for the director and senior...
78
78
Aug 8, 2011
08/11
by
CSPAN2
tv
eye 78
favorite 0
quote 0
. >> this week and throughout august on "the communicators" a look at cybersecurity. tonight white house coordinator howard schmidt dismisses the obama administration's effort to protect against threats and attacks. "the communicators" tonight on c-span2. with the senate adjourned, watch booktv at night. area five, uncensored history of secret top military base. : [applause] >> thank you very much and good afternoon. thank you ar for the kind introductions and thank you for showing that very nice little clip regarding the sanitation workers into the hall of fame at the upper and of labor. i also want to recognize one of my good friends and heroes this year among us and that is none other than president johansson representing the u.s. c.w.. thank you for everything you do. [applause] give him a round. [applause] i didn't see another colleague who is here or i believe will be, larry cohen for also having the foresight to begin this great organization almost a quarter-century ago. [applause] thank you for everything you do. and also to each and every one of you for comin
. >> this week and throughout august on "the communicators" a look at cybersecurity. tonight white house coordinator howard schmidt dismisses the obama administration's effort to protect against threats and attacks. "the communicators" tonight on c-span2. with the senate adjourned, watch booktv at night. area five, uncensored history of secret top military base. : [applause] >> thank you very much and good afternoon. thank you ar for the kind introductions and...
52
52
Aug 3, 2011
08/11
by
CSPAN
tv
eye 52
favorite 0
quote 0
security challenges for the united states and our partners, which is why the president has made cybersecurity one of his top priorities. as with all intrusions, we employ a quote, all of government approach with the appropriate agency in the lead. we refer to d.h.s. and f.b.i. on more information. on which agencies were affected, we are working to deploy defensive tools such as the einstein prevention and intrusion systems. refer to d.h.s. >> when did you become aware? >> i can only tell you we were aware of it. i don't have a date for you. >> the president has repeatedly pivoted back to jobs. why is this time any different? why should americans have confidence? >> let's be clear. the president has been focusing on jobs and the economy since the day he was sworn into office during a month that saw the loss of 800,000 american jobs in just one month. and that was the situation that he encountered when he took the oath. and that has been his focus since he became president. there is no question that as president, you have to deal with other problems and in this case, the debt ceiling crisis, if
security challenges for the united states and our partners, which is why the president has made cybersecurity one of his top priorities. as with all intrusions, we employ a quote, all of government approach with the appropriate agency in the lead. we refer to d.h.s. and f.b.i. on more information. on which agencies were affected, we are working to deploy defensive tools such as the einstein prevention and intrusion systems. refer to d.h.s. >> when did you become aware? >> i can only...
90
90
Aug 25, 2011
08/11
by
CSPAN2
tv
eye 90
favorite 0
quote 0
we spend a lot of time in the report talking about cybersecurity and combating terrorism online. we spend a lot of time in the report naming enemy and response of talking about islamist ideology and how islamist ideology is different from religion of islam and combating islamist ideology is vital and important as come patting terrorist operations themselves. we talk a lot in the report about the issue of domestic radicalization and extremism. the administration came out with a strategy not long ago about countering violent extremist. there is actually, there is actually some very valuable information in the document and there are some valuable tools but that document unfortunately is not a strategy. the administration hasn't revealed a plan how they're actually going to operationalize that. and use the federal government to give local communities the tools they need to combat terrorist activities and to maintain and construct healthy civil societieses in their own communities the final point we make in the strategy a robust strategy is completely affordable. i keep getting under
we spend a lot of time in the report talking about cybersecurity and combating terrorism online. we spend a lot of time in the report naming enemy and response of talking about islamist ideology and how islamist ideology is different from religion of islam and combating islamist ideology is vital and important as come patting terrorist operations themselves. we talk a lot in the report about the issue of domestic radicalization and extremism. the administration came out with a strategy not long...
100
100
Aug 19, 2011
08/11
by
CSPAN2
tv
eye 100
favorite 0
quote 0
and electronic warfare, electronic protection, you've all heard about cybersecurity. there's a cyber science and technology piece that has to be founded. counter weapons of mass destruction as well, i have a few things to say about that. in the area force multiplicati multiplication, there were four crosscuts that we looked at and infected these include how do we handle very large datasets but this is the data, going from data, information, data to information, to understanding to decisions. and doing that anytime critical way. this is a challenge not only in the military status, but it's very much a challenge in the private sector if we look at the amount of information that is being promulgated on our commercial networks. human systems and autonomy. autonomy is center in the focus of your interest. and this is one that was pervasive across each of the missionaries of the department. and by autonomy this isn't just operation. they can interoperate with the user biggies are building systems that can, in fact, collaborate with the user and do and uncertain environment.
and electronic warfare, electronic protection, you've all heard about cybersecurity. there's a cyber science and technology piece that has to be founded. counter weapons of mass destruction as well, i have a few things to say about that. in the area force multiplicati multiplication, there were four crosscuts that we looked at and infected these include how do we handle very large datasets but this is the data, going from data, information, data to information, to understanding to decisions....
104
104
Aug 31, 2011
08/11
by
CSPAN2
tv
eye 104
favorite 0
quote 0
public affairs office, internal facing is evolved, our chief information officer is involved, our cybersecurity office is all because we are afraid of attacks. our privacy office, and our legal office. and deadly of all, i call it we identify all the issues, tell you what's wrong with it and didn't tell you how to fix it. so that's kind of our procedural policy at looking at how we use each tool, and then coming up with specific solutions for the tool itself. >> and i guess what i'd like to add is when you're looking at the policies that you put in social media, one of the things that's probably not a good idea to do is try to define each and every social media application that is out there. it's more to be specifically general, and the way that you cover policy as how it's created to the sharing of information, the use of photographs and said it. i will say the department element scared is also develop documents a practice website for public safety to go into and actually see a number of examples of social media from other places. i'm also on the social media working group which also provides
public affairs office, internal facing is evolved, our chief information officer is involved, our cybersecurity office is all because we are afraid of attacks. our privacy office, and our legal office. and deadly of all, i call it we identify all the issues, tell you what's wrong with it and didn't tell you how to fix it. so that's kind of our procedural policy at looking at how we use each tool, and then coming up with specific solutions for the tool itself. >> and i guess what i'd like...
210
210
Aug 23, 2011
08/11
by
CSPAN2
tv
eye 210
favorite 0
quote 0
they will talk about the need for new technologies to curb the growing cybersecurity threats and the future of homeland security 10 years after 9/11. this is just getting underway. >> -- for house majority leader dick armey of texas and prior to that heritage's director of congressional relations. he also served in the office of national drug control policy and legislative council for former representative william danemeyer of california. join me in welcoming my colleague, mike frank. >> welcome, everybody, on this nice august day. as you all know on september 11th, 2001, america experienced the single-worst terrorist attack any country suffered in modern times. well it is about 10 years later and the nation has undergone tremendous changes in terms how we safeguard the american homeland. there have been a number of successes that should be acknowledged and celebrated and chief among them since 9/11, no fewer than 40 terrorist plots have been thwarted. some of these successes can be attributed to the quick and courageous actions of citizens and others were diligent law enforcement in
they will talk about the need for new technologies to curb the growing cybersecurity threats and the future of homeland security 10 years after 9/11. this is just getting underway. >> -- for house majority leader dick armey of texas and prior to that heritage's director of congressional relations. he also served in the office of national drug control policy and legislative council for former representative william danemeyer of california. join me in welcoming my colleague, mike frank....