83
83
Mar 27, 2012
03/12
by
CSPAN2
tv
eye 83
favorite 0
quote 0
budget tear authority to compel adoption of a robust cybersecurity standards. i believe, and i've advocated and the csi commissioned that i co-chaired as one of the four national co-chairs of the commission, called for a position to be established with the white house with the robust policy and budgetary authority. that being said, the lieberman-collins legislation gives dhs more authority than what they have now, and it does begin the process of close collaboration between government and the private sector. it really will require a public-private partnership working together to get cybersecurity done right, and that's one of the highlights of the bill and something that i do support. >> host: now, conkman, how do -- congressman, how do you raise the privacy concerns raised by the aclu, electronic privacy information center, and other groups with cybersecurity and the definition of threats? >> guest: right. very good point to raise, privacy and civil liberty concerns, something to be sensitive to, and we have to work with the groups to instill confidence that w
budget tear authority to compel adoption of a robust cybersecurity standards. i believe, and i've advocated and the csi commissioned that i co-chaired as one of the four national co-chairs of the commission, called for a position to be established with the white house with the robust policy and budgetary authority. that being said, the lieberman-collins legislation gives dhs more authority than what they have now, and it does begin the process of close collaboration between government and the...
118
118
Mar 26, 2012
03/12
by
CSPAN2
tv
eye 118
favorite 0
quote 0
he is also the co-founder of the house cybersecurity caucus. he's been our guest on "the communicators." thank you, congressman. >> guest: thank you. >> "the communicators" also airs each monday night. if you missed my of this program with representative jim langevin and lee terry, you can see "the communicators" again tonight and each monday night at 8 p.m. eastern here on c-span2. you can also watch "the communicators" anytime online. go to our web site, c-span.org, and click the series tab. from there you can select "the communicators" or any of our other regularly-scheduled programs. c-span.org, your online resource for public affairs programming. >>> starting april 1st, see the winners in this year's c-span's student cam video document program on the theme, "the constitution and you," as middle and high school students from across the country showed which part of the constitution was important to them and why. mornings at 6:50 eastern on c-span, meet the students who created them during "washington journal" each day. cob congratulatelation
he is also the co-founder of the house cybersecurity caucus. he's been our guest on "the communicators." thank you, congressman. >> guest: thank you. >> "the communicators" also airs each monday night. if you missed my of this program with representative jim langevin and lee terry, you can see "the communicators" again tonight and each monday night at 8 p.m. eastern here on c-span2. you can also watch "the communicators" anytime online. go to...
154
154
Mar 13, 2012
03/12
by
CSPAN2
tv
eye 154
favorite 0
quote 0
what is the status of cybersecurity legislation and the senate? >> weld right now the lieberman collins bill is on a fast track to the floor. the interested a couple of weeks ago. harry reid has already said he's putting that on the floor without any markups in the committee which is fairly unusual. >> why is he doing that? >> he says they've been working on cibber security legislation for a long time and the bill incorporates elements from other proposals. i think part of the reason is they don't want to have there are a lot of committees that have jurisdiction and the big issue is the homeland security committee, the intelligence, there are a lot of committees that could get their hands and changes in the way that lieberman and collins probably don't like and they feel the wheel they have no strikes the right balance in their opinion. >> is this bill being brought to the senate floor is it in its infancy as senator rockefeller vehicle from a couple of years ago? >> i think it incorporates elements from a lot of different bills that have been put
what is the status of cybersecurity legislation and the senate? >> weld right now the lieberman collins bill is on a fast track to the floor. the interested a couple of weeks ago. harry reid has already said he's putting that on the floor without any markups in the committee which is fairly unusual. >> why is he doing that? >> he says they've been working on cibber security legislation for a long time and the bill incorporates elements from other proposals. i think part of the...
123
123
Mar 12, 2012
03/12
by
CSPAN2
tv
eye 123
favorite 0
quote 0
what is the status of cybersecurity legislation in the senate? >> well, right now the lieberman-collins bill is on a fast track to the senate floor. they just introduced it a couple weeks ago, but harry reid has already said he's putting that straight to the floor without markups in committee which is fairly unusual. >> host: why is he doing that? >> guest: well, they say they've been working on cybersecurity legislation for a long time, and it's true, and their bill incorporates other proposals. they don't want to have -- there are a lot of different committees that have jurisdiction, it's a big issue. whether it's the homeland security committee, intelligence, there are a lot of committees that could get their hands on it and will change it in a way lieberman and collins probably don't like, and they feel like the bill they have now strikes the right balance. >> host: is this bill in its, in its infancy was it a senator rockefeller vehicle from a couple years ago? >> guest: i think it incorporates from a lot of different bills, senator rockefel
what is the status of cybersecurity legislation in the senate? >> well, right now the lieberman-collins bill is on a fast track to the senate floor. they just introduced it a couple weeks ago, but harry reid has already said he's putting that straight to the floor without markups in committee which is fairly unusual. >> host: why is he doing that? >> guest: well, they say they've been working on cybersecurity legislation for a long time, and it's true, and their bill...
104
104
Mar 5, 2012
03/12
by
CSPAN2
tv
eye 104
favorite 0
quote 0
and i think cybersecurity and all of us have to kind of learn this is good for us. it can be a brand differentiator, and the total cost of not being secure is for those that are now breached as an individual or small business or a company, you quickly understand the cost of not being. i mean, as you heard today from the question of congressman rogers, i mean, there's companies even in security that are out of business today because they were breached. so i think that's the message that we've got to keep focused on is what -- it's not going to go away overnight. what are the things we can do and take that and, hopefully, up the pace a bit. >> host: we have time for one more question, gautham nagesh. >> host: i think you did just touch opinion one of the roots -- upon one of the roots of debate. critical infrastructure providers are saying it costs too much to take necessary precautions. how do you as a security expert evaluate their argument begin, as you said -- given, as you said, the potential for catastrophic damage? >> guest: i think it's how you define costs. e
and i think cybersecurity and all of us have to kind of learn this is good for us. it can be a brand differentiator, and the total cost of not being secure is for those that are now breached as an individual or small business or a company, you quickly understand the cost of not being. i mean, as you heard today from the question of congressman rogers, i mean, there's companies even in security that are out of business today because they were breached. so i think that's the message that we've...
105
105
Mar 20, 2012
03/12
by
CSPAN2
tv
eye 105
favorite 0
quote 0
warfare, cybersecurity is being waged and we are losing. and it's you know, 3000 people died in 9/11. if they unleashed dams or water since -- poisoned water systems were shut down hospitals, just shut down air traffic control on one of those days when airplanes are just running into each other up in the sky. that could kill so many people so easily and the miracle to me is they haven't done it so far and it's not to our credit. just the fact that it just hasn't happened. but it will. >> host: are you finding that these attacks are organized by nation-states or rogue agents? >> guest: nation-states would be the first priority obviously, but a 15-year-old kid living in indonesia or living in spokane washington or oregon, wherever, could be doing this. it just takes brains, a facility and a malicious intent. >> host: what are you hearing from the so-called critical infrastructure emphasis, the electric companies etc. about the regulation? senator mccain as you know called saying regulatory leviathan. >> guest: i just have a hard time with tha
warfare, cybersecurity is being waged and we are losing. and it's you know, 3000 people died in 9/11. if they unleashed dams or water since -- poisoned water systems were shut down hospitals, just shut down air traffic control on one of those days when airplanes are just running into each other up in the sky. that could kill so many people so easily and the miracle to me is they haven't done it so far and it's not to our credit. just the fact that it just hasn't happened. but it will. >>...
153
153
Mar 13, 2012
03/12
by
CSPAN3
tv
eye 153
favorite 0
quote 0
the committees of jurisdiction review cybersecurity issues. this subcommittee has embarked on a series of hearings to heed that call and to get a complete picture of the cybersecurity challenges that our nation faces. in our february 8th hearing, we examined threats to communications networks and the concerns of the private sector security firms helping to secure those communications networks. that hearing provided us with valuable information and even some potential solutions. this hearing continues our subcommittee's review of cybersecurity issues with the focus on the steps that network operators have taken to secure their networks and any recommendations that you all might have on how congress can help, actually help in those efforts. as we heard in the february 8th hearing, threats to communications networks have come a long way in a very short period of time. before coming to congress, i spent 22 years as a radio broadcaster and as a small business person, i had to worry about securing our own communications network. those were simpler t
the committees of jurisdiction review cybersecurity issues. this subcommittee has embarked on a series of hearings to heed that call and to get a complete picture of the cybersecurity challenges that our nation faces. in our february 8th hearing, we examined threats to communications networks and the concerns of the private sector security firms helping to secure those communications networks. that hearing provided us with valuable information and even some potential solutions. this hearing...
168
168
Mar 17, 2012
03/12
by
CSPAN
tv
eye 168
favorite 0
quote 0
we started this cybersecurity bill. i am impatient about it. we started this thing really the day before obama was inaugurated. when he was elected, i knew he was going to be interested in this. we got to work and put out a bill. then joe leash and -- lieberman and susan collins have come in, and it has progressed. it is virtually pottable. we have to get some republicans on board, but i think we can do that. >> senator rockefeller, how current is -- how similar is the bill that you brought to committee three years ago? >> very similar. our bill was accepted by the leader, accepted by the white house. we did it with both melissa hathaway and howard schmidt after that. we have had thousands of meetings either directly or through telecommunications with all kind of people. we have made adjustments. we meet with so many people, and we have made so many tweaks just to get it so that it could pass. it has got to have critical infrastructure, which is what the republican bill doesn't have now, but i think that will change. we have to protect our fede
we started this cybersecurity bill. i am impatient about it. we started this thing really the day before obama was inaugurated. when he was elected, i knew he was going to be interested in this. we got to work and put out a bill. then joe leash and -- lieberman and susan collins have come in, and it has progressed. it is virtually pottable. we have to get some republicans on board, but i think we can do that. >> senator rockefeller, how current is -- how similar is the bill that you...
228
228
Mar 29, 2012
03/12
by
CSPAN3
tv
eye 228
favorite 0
quote 0
very well.ka this -- this is tenth hearing our cybersecurity. and i hope it is the last before the comprehensive cybersecurity into law. the fact is that t our side. to melsike september 10th, 20and the question is whe will act to preventcyber9/11 before it happens instead of reacting after it the reason for this legislation is based in y, rival nations, terrorist groups, criminal syndicates and individual hackers probe the our most critical computer networks seeking to steal government and industrial secrets, plant cyber-agents. in the cyber systems that control our infrastructure. and what enable an enemy, for example, to seize control of a city's electric grid, water supplyti's financial or mass transit away.s with the touch of a key. the enng and growing cyberthreat, not only threatens our hers right now having a -- a very damaging impact on ouric prosperity. because extremely valuable intellectual property is being stolen regularly by cyberexploitation by people and individuals and groups and countries abroad that is then being replicated w
very well.ka this -- this is tenth hearing our cybersecurity. and i hope it is the last before the comprehensive cybersecurity into law. the fact is that t our side. to melsike september 10th, 20and the question is whe will act to preventcyber9/11 before it happens instead of reacting after it the reason for this legislation is based in y, rival nations, terrorist groups, criminal syndicates and individual hackers probe the our most critical computer networks seeking to steal government and...
63
63
Mar 7, 2012
03/12
by
CSPAN2
tv
eye 63
favorite 0
quote 0
of these people are focused on full-time cybersecurity. looking for threats having hundreds if not thousands of customers feeding them real-time threats. it could hit one company they are aware before we would see that. that information sharing is critical. it is something that the values. >> you may have already answered this question. >> the embedded security elements are part of that also the security for customers to dictate what level into the platform. also consumers and enterprisers have remote backup, remote restore calm the ability to wipe a device so as the mobile device that could be lost or stolen or left in the taxicabs a we give you the ability to deal with that eventuality. >> the last 47 seconds go to edward amoroso. should the ideas the providers have a system to detect viruses before they go into your network? >> if we could do that reliably i would try to sell that. it is very difficult to detect viruses and know where. i call between 100 and 1,000 people every week. friday knew exactly how to fix the pc i would call eve
of these people are focused on full-time cybersecurity. looking for threats having hundreds if not thousands of customers feeding them real-time threats. it could hit one company they are aware before we would see that. that information sharing is critical. it is something that the values. >> you may have already answered this question. >> the embedded security elements are part of that also the security for customers to dictate what level into the platform. also consumers and...
150
150
Mar 8, 2012
03/12
by
CSPAN2
tv
eye 150
favorite 0
quote 1
these are people that are focused and their full-time job is cybersecurity. they are looking for threats all the time and they have hundreds if not thousands of customers that are feeding them information and they are seeing real-time threads go through many companies. a threat that might hit one company they are aware of before many of us would see that. so that information sharing and that cybersecurity industry is really critical in something that we value. >> you may have answered that question. >> yes maam is certainly the embedded security elements are part of that but beyond that we have users ministry or control security that lets our users dictate what level of profession they want in a platform and we do have services available to consumers and enterprises that allow for on device encryption data remote backup, remote restore and to lock the device or you can deal with the mobile device that will be lost or stolen or lost in a taxicab. we give you the capability out of the box to deal with it. >> i appreciate that. i guess the last 47 seconds i'm go
these are people that are focused and their full-time job is cybersecurity. they are looking for threats all the time and they have hundreds if not thousands of customers that are feeding them information and they are seeing real-time threads go through many companies. a threat that might hit one company they are aware of before many of us would see that. so that information sharing and that cybersecurity industry is really critical in something that we value. >> you may have answered...
28
28
tv
eye 28
favorite 0
quote 0
and a lot of people love to go in through the revolving door to go into the cybersecurity business and they're some of the chief spokespeople arguing that this is the biggest thing since nuclear terror it's not what they do stand to make a lot of money it's worth watching who's talking about these things sometimes the mainstream press won't tell you but michael mcconnell works for a government contractor that stands to make millions tens of billions perhaps under eighty dollars on cyber security expert right that's right he knows if you think there's no two ways about that he has a point of view but he's selling and maybe he's literally selling. and you talked about sort of the money involved here i know the u.s. government is expected to spend ten and a half billion dollars a year on this by twenty fifteen analysts have estimated that the worldwide market is as much as one hundred forty billion a year the defense department says it's taking more than three point two billion in funding just for this year what's sort of the story behind these numbers there will there is there is somethi
and a lot of people love to go in through the revolving door to go into the cybersecurity business and they're some of the chief spokespeople arguing that this is the biggest thing since nuclear terror it's not what they do stand to make a lot of money it's worth watching who's talking about these things sometimes the mainstream press won't tell you but michael mcconnell works for a government contractor that stands to make millions tens of billions perhaps under eighty dollars on cyber...
102
102
Mar 8, 2012
03/12
by
CSPAN2
tv
eye 102
favorite 0
quote 0
does that process create any new cybersecurity issues, and will transitioning alone solve any cybersecurity issues that currently exist? does the process of transitioning present opportunities to resolve existing cybersecurity issues? we'll start with mr. liven food and just go right -- >> we've been a leader on ipv6. i think that all of those issues that exist in the current internet and ipv4 simply carry over to ip have 6, it's just a new form of addressing. that being said, because it's a new form of addressing and new technology, you're introducing new things into the ecosystem to dr. amoroso's point earlier, when you change something, it can have unintended consequences. so it's something you have to keep an eye on and make sure you're not introducing any new vulnerabilities. but i think if there were any, it's simply because some security tool that worked great in 4 might not have all the same features. >> dr. amoroso? is. >> every device on the planet running v6 would be route bl, and that's a pretty dangerous situation. so for all of us we've got to figure out how to architect secur
does that process create any new cybersecurity issues, and will transitioning alone solve any cybersecurity issues that currently exist? does the process of transitioning present opportunities to resolve existing cybersecurity issues? we'll start with mr. liven food and just go right -- >> we've been a leader on ipv6. i think that all of those issues that exist in the current internet and ipv4 simply carry over to ip have 6, it's just a new form of addressing. that being said, because...
139
139
Mar 9, 2012
03/12
by
CSPAN3
tv
eye 139
favorite 0
quote 0
does that process create any new cybersecurity issues, and will transitioning alone solve any cybersecurity issues that currently exist? does the process of transitioning present opportunities to resolve existing cybersecurity issues? we'll start with mr. livingood and go right through. >> sure. we've been a leader on ipv-6. all of those issues that exist in the current internet and ipv-4 simply carry over to ipv-6. it's just a new form of addressing. that being said, because it's a new form of dressing and a new technology, you're introducing new things into the ecosystem. to the point earlier, it's a complex ecosystem. when you change something, it can have unintended consequences. it's something you have to keep an eye on and make sure you're not introducing any new vulnerabilities. is there were any, it's because some security tool that worked great in ipv-4. >> would be routable. and that's a pretty dangerous situation. so for all of us, we've got to figure out how to architect security protections around that. so i do -- i do have some concerns about the v-6 transition. >> mr. mullen?
does that process create any new cybersecurity issues, and will transitioning alone solve any cybersecurity issues that currently exist? does the process of transitioning present opportunities to resolve existing cybersecurity issues? we'll start with mr. livingood and go right through. >> sure. we've been a leader on ipv-6. all of those issues that exist in the current internet and ipv-4 simply carry over to ipv-6. it's just a new form of addressing. that being said, because it's a new...
162
162
Mar 13, 2012
03/12
by
CSPAN3
tv
eye 162
favorite 0
quote 0
interested to learn, general, how northcom and norad might contribute to the emerging domain of cybersecurity in the homeland. as part of the mission of providing defense support to civil authorities, northern command must work closely and cooperatively with other federal agencies. particularly the department of homeland security and with all the states on plans and coordination for emergency response to domestic disasters. this requires close coordination with the state governors and the national guard forces to improve their combined federal and state response capabilities to a wide variety of emergencies. we made significant progress on this front last year with several initiatives including the new dual status command capability. which is intended to allow state and federal military forces to work together to support a governor's needs for disaster assistance. as part of this effort, congress authorized legislation to permit the call-up of federal military reserve forces to support gov governors responding to a natural disaster. we would be interested to hear general jacoby's views on how
interested to learn, general, how northcom and norad might contribute to the emerging domain of cybersecurity in the homeland. as part of the mission of providing defense support to civil authorities, northern command must work closely and cooperatively with other federal agencies. particularly the department of homeland security and with all the states on plans and coordination for emergency response to domestic disasters. this requires close coordination with the state governors and the...
166
166
Mar 1, 2012
03/12
by
CSPAN3
tv
eye 166
favorite 0
quote 0
in this regard, cybersecurity bill was recently introduced by senators lieberman, colin, rockefeller and feinstein and addresses the core homeland security requirement that approves cybersecurity for the american people, nation's critical infrastructure and the federal government's own networks and computers. intelligence committee considers such legislative steps essential to addressing our nation's critical infrastructural vulnerabilities which pose serious national and economic security risk. briefly looking geographically around the world and in afghanistan and general burgess will have more to say about this coming during the past or the taliban and lots of god, because mainly mainly a place to the international security forces or isaf were concentrated. the leaders begin to enjoy safe haven in pakistan. the efforts to partner with afghan national security forces are encouraging the corruption and governance continued the afghan forces effectiveness. most provinces have established basic governance structures but struggled to provide services. the international security force in
in this regard, cybersecurity bill was recently introduced by senators lieberman, colin, rockefeller and feinstein and addresses the core homeland security requirement that approves cybersecurity for the american people, nation's critical infrastructure and the federal government's own networks and computers. intelligence committee considers such legislative steps essential to addressing our nation's critical infrastructural vulnerabilities which pose serious national and economic security...
28
28
tv
eye 28
favorite 0
quote 0
the cybersecurity after two thousand and twelve legislation is the first attempt by capitol hill the crackdown on cybersecurity but it's the latest one thought of the support of much of congress and the backing of the government of homeland security so it was introduced by joe lieberman and susan collins before going into the details of the bill let me just remind you how cybersecurity is one of lieberman's issues just think back to when we were going proposed the internet kill switch here's how he explained a cyber security threat to c.n.n. and he crowley. this is a matter of national security a cyber attack on america can do as much or more damage to. sure our communications or our. transportation as a conventional war. that's the leverage of the loves of fear monger about cyber security issues and it's not too surprising that he's behind this year's cyber security act see this bill would prefer part of homeland security in charge of creating requirements and guidelines for some government and many private websites both government and private companies would be subject to these req
the cybersecurity after two thousand and twelve legislation is the first attempt by capitol hill the crackdown on cybersecurity but it's the latest one thought of the support of much of congress and the backing of the government of homeland security so it was introduced by joe lieberman and susan collins before going into the details of the bill let me just remind you how cybersecurity is one of lieberman's issues just think back to when we were going proposed the internet kill switch here's...
133
133
Mar 27, 2012
03/12
by
CSPAN3
tv
eye 133
favorite 0
quote 0
dhs has to lead for coordinating overall national effort to enhance cybersecurity of the u.s. critical infrastructure. they lead in resilience and preparing the defense. fbi has lead for detection investigation prevention and mitigation response within domestic arena under their authorities for law enforcement, domestic intelligence, counterintelligence, and counterterrorism. and of course d.o.d. and nsa and cybercommand lead for detection, prevention and defense in foreign space. defense of the nation comes under if the nation comes under attack. i'd line to go into a few, if i could, a little bit on what i see we need in cyberspace. the requirements to defend the nation from attack, because there's been a lot of discussion on this and i think it's important to put this up front. i think this is the heart of some of the discussion that's going on with the legislation today. first, we need to see the attack. what do i mean by that? that was a quote that we made up at the fordham university. if we can't see the attack, we can't stop it. what we're not talking about is putting n
dhs has to lead for coordinating overall national effort to enhance cybersecurity of the u.s. critical infrastructure. they lead in resilience and preparing the defense. fbi has lead for detection investigation prevention and mitigation response within domestic arena under their authorities for law enforcement, domestic intelligence, counterintelligence, and counterterrorism. and of course d.o.d. and nsa and cybercommand lead for detection, prevention and defense in foreign space. defense of...
32
32
tv
eye 32
favorite 0
quote 0
hype even in these tense fiscal times the pentagon has found ways to shell out more money and cybersecurity is the one portion of defense spending that's actually increasing and a lot of bush era folks who led the war on terror now these security firms that deal with cyber threats the cyber security industrial complex if you will but a new bill in congress introduced last week by senator john mccain has some folks raising the alarm bells it's called the secure i.d. act and it requires private companies to share information voluntarily about cyber threats in the u.s. government would be overseen by the national security agency now critics say that it's an n.s.a. cyber power grab one that could bring the u.s. closer one step closer to a twenty four seven military surveillance of our online lives so should you be concerned well let's ask someone who knows a thing too about that declan mccullagh is a correspondent with c. net news and. ns us live from san francisco declan welcome back to the program. before we get to the actual bills i want to look at the cyber threat itself because you know we
hype even in these tense fiscal times the pentagon has found ways to shell out more money and cybersecurity is the one portion of defense spending that's actually increasing and a lot of bush era folks who led the war on terror now these security firms that deal with cyber threats the cyber security industrial complex if you will but a new bill in congress introduced last week by senator john mccain has some folks raising the alarm bells it's called the secure i.d. act and it requires private...
87
87
Mar 30, 2012
03/12
by
CSPAN3
tv
eye 87
favorite 0
quote 0
i think it's definitely post-millner and probably cybersecurity together, possibly separately. i would add another caveat, there may be another way how to address millner and doing changes to exemptions, too. another area where congress may explore looking at los angeles that deals with legislative exemptions in foia and figuring out i way to carefully craft that so as we're getting new exemptions there's some built-in protections for access to health and safety information. >> let me close with three observations. first, a point of personal privilege. we've talked a lot about oversight in congress, congressional staff. i was not here this morning, for which i apologize, but i did want to say, back in the early '70s, when i was a young staffer, fully facial hair, hair on my head a wonderful sight to behold, we had oversight hearings and worked on legislation and one of our witnesses from the great northwest, young sue long, a statistician, in a battle with the internal revenue service came in and testified, and was really inspiring for the senate judiciary committee, and i thin
i think it's definitely post-millner and probably cybersecurity together, possibly separately. i would add another caveat, there may be another way how to address millner and doing changes to exemptions, too. another area where congress may explore looking at los angeles that deals with legislative exemptions in foia and figuring out i way to carefully craft that so as we're getting new exemptions there's some built-in protections for access to health and safety information. >> let me...
158
158
Mar 5, 2012
03/12
by
CSPAN3
tv
eye 158
favorite 0
quote 0
cybersecurity with bill connor and robert dix on how to handle the threat of business networks.nicators tonight on 8:00 eastern on cspan-2. >> this crazy world of ours, we have atom bombs. the question is not how to use them, the question is how do you restrain yourself from using them? that's particularly when you're commander in chief, any fool can get this country into trouble. it takes a wiseman to get it out. >> as candidates campaign for back at 14 men who ran for the office and lost. go to our web site cspan.org/contenders to see a video of the contenders who had a lasting impact. >> should your president have widely ethical standards and be an example to children in this country? ask yourself that question, please. shouldn't his life make him a role model for your future children? should anyone you elect to this office always keep his promise? >> cspan doi.org/contenders. >>> with politics and public affairs programming throughout the week and on the weekend, people and events telling the story on american history tv. get our schedules and see past programs on our web si
cybersecurity with bill connor and robert dix on how to handle the threat of business networks.nicators tonight on 8:00 eastern on cspan-2. >> this crazy world of ours, we have atom bombs. the question is not how to use them, the question is how do you restrain yourself from using them? that's particularly when you're commander in chief, any fool can get this country into trouble. it takes a wiseman to get it out. >> as candidates campaign for back at 14 men who ran for the office...
83
83
Mar 1, 2012
03/12
by
CSPAN2
tv
eye 83
favorite 0
quote 0
i come to speak about cybersecurity legislation that we hope will be before the senate soon. there is no question, no question at all that this is a critical issue that should be addressed by this congress, and i'm certain that every member of this body is concerned that our nation may be vulnerable to cyberattacks that could have a very severe economic and truly security ramifications. we see stories about cyberattacks daily, whether they are attacks on individuals, on companies, on government. and i believe that it's time for us to take steps to protect ourselves against this emerging threat. in the coming weeks the senate is expected to take up legislation to address this very real problem, and i'm hopeful that this effort will result in legislation that we can all agree is worthy of sending to the president. but right now it appears that we are on track to follow an all or nothing approach. the problem i see with the bill expected to come to the floor featuring text released by the homeland security committee is it has not gone through regular order and i fear amounts to
i come to speak about cybersecurity legislation that we hope will be before the senate soon. there is no question, no question at all that this is a critical issue that should be addressed by this congress, and i'm certain that every member of this body is concerned that our nation may be vulnerable to cyberattacks that could have a very severe economic and truly security ramifications. we see stories about cyberattacks daily, whether they are attacks on individuals, on companies, on...
144
144
Mar 29, 2012
03/12
by
CSPAN3
tv
eye 144
favorite 0
quote 0
this legislation new establish procedures nt for the government to share classified cybersecurity threat companies that can effectively use and protect that believe iy to take advantage of information that the intelligence mm puttin sources and methods at risk or turning private cybersecurity over to our intelligence i would look ike to raise one i of somethinging th, that is not included in the bill. data breach notification. this is an issue i worked on over eight years since california had a huge data breach that we only inadvertently found out about re of thousands of data breaches. it is an urgent d. -- called tha breach notification act. it has come out of the judiciary committee. and it accomplishes what in my view are the key goals of any data breach notification legislation. one, notice to individual whose will better be able to protect themselves from identity theft. two, notice to law enforcement, which can connect the dots between breaches and cyberattacks. and three, pre, this is different state and territorial standards on this issue. this is a real problem. we have 47 diff
this legislation new establish procedures nt for the government to share classified cybersecurity threat companies that can effectively use and protect that believe iy to take advantage of information that the intelligence mm puttin sources and methods at risk or turning private cybersecurity over to our intelligence i would look ike to raise one i of somethinging th, that is not included in the bill. data breach notification. this is an issue i worked on over eight years since california had a...
105
105
Mar 14, 2012
03/12
by
CSPAN3
tv
eye 105
favorite 0
quote 0
left to do, and i am optimistic that we will work on the floor of the senate to put in place the cybersecurity policy and you know that you'll play a key role in advising us, given us perspective and responsibilities in the area. >> yes, sir. >> general fraser, i would like to turn to the reports, if i could, that islamist groups are recruiting in your aor. what are the conditions that are facilitating islamist routecruig and fund raising and what can we do as well as our partners to address the conditions? >> there are groups, violent extremist groups that are recruiting in largely muslim communities within latin america. the muslim community is small in the region, makes up about 4% of the region, they are deliberately advocating though. in the situations and the conditions that enable that are ones that you see in many of the countries in the region and that is poverty rates, it's income inequality, it's the corruption that is there and it's in the -- in some of those cases, it's an anti-u.s. perspective. >> it bears watching and hopefully the lessons we have learned in other part s of the
left to do, and i am optimistic that we will work on the floor of the senate to put in place the cybersecurity policy and you know that you'll play a key role in advising us, given us perspective and responsibilities in the area. >> yes, sir. >> general fraser, i would like to turn to the reports, if i could, that islamist groups are recruiting in your aor. what are the conditions that are facilitating islamist routecruig and fund raising and what can we do as well as our partners...
145
145
Mar 27, 2012
03/12
by
CSPAN2
tv
eye 145
favorite 0
quote 0
sector, in the cybersecurity sector that understand how important this issue really is. the other thing that we're also, i want to focus attention on, is although this is also a national security threat, it poses a challenge and opportunity for us in creating jobs because we don't nearly have enough people in the field of cybersecurity that with the right skills to protect the nation in cyberspace. the director of the cia center for information technology basically said we only have about a thousand people that can offer that world class level in cyberspace when what we need is between 20,000 and 30,000 people. i've been looking for efforts involved in trying to get our young people engaged in this problem and get them interested in the field of cybersecurity. we launched a cyberchallenge at the high school level putting kids interested in cyber issues through a series of challenges and tests to test their cybersecurity skills and award them with prizes and it's the idea of getting interested in a field that they just do, but to also get them thinking about this as a car
sector, in the cybersecurity sector that understand how important this issue really is. the other thing that we're also, i want to focus attention on, is although this is also a national security threat, it poses a challenge and opportunity for us in creating jobs because we don't nearly have enough people in the field of cybersecurity that with the right skills to protect the nation in cyberspace. the director of the cia center for information technology basically said we only have about a...
96
96
Mar 28, 2012
03/12
by
CSPAN2
tv
eye 96
favorite 0
quote 0
i was wondering -- i know we are talking about cybersecurity. there are many proposals, the administration, military is working on a host of things. how are the rules of engagement actually working for being implemented or coming along with regard to the cybercommand operation? >> right now -- >> i meant that too. >> thank you. right now we are updating the rules of engagement that the chairman has put out were dated 2005. given where we are today the joint staff has taken on to update those. right now all our measures are internal to are networks what dod is authorized to do. we're looking at within the inner agency, what are the next steps we should have and how do we take those steps? over the next month or two the joint staff will complete those rules of engagement and move those to the interagency and -- >> what role do you see or what segments of the private sector should fall into dod's responsibility if any? >> this is where the discussion comes in. >> if attacked what entities would be considered an extension of u.s. government faciliti
i was wondering -- i know we are talking about cybersecurity. there are many proposals, the administration, military is working on a host of things. how are the rules of engagement actually working for being implemented or coming along with regard to the cybercommand operation? >> right now -- >> i meant that too. >> thank you. right now we are updating the rules of engagement that the chairman has put out were dated 2005. given where we are today the joint staff has taken on...
108
108
Mar 1, 2012
03/12
by
CSPAN2
tv
eye 108
favorite 0
quote 0
each and every one of success in charge of our own cybersecurity. i know some people will scoff at this answer because it is too simple police fsimplistic or tht us to act in our own best interests. i think they're wrong on both accounts. and if we, all of us who use and rely on computer networks, whether individuals, groups, organizations, corporations, or government agencies, are in charge of our own cybersecurity, the real question then is, what should be done to reduce the threat of malicious cyber activity? i believe the answer to that question is contained in the bill called "the security i.t. act," that we have filed today. the secure i.t. act consists of four key areas of common ground identified in various efforts. first, information-sharing, second, federal information security management act reform; third, enhanced criminal penalties; and four, cybersecurity research and development. we have seen firsthand the positive impact better information-sharing can have on our national security. since the 9/11 terrorist attack, improved informatio
each and every one of success in charge of our own cybersecurity. i know some people will scoff at this answer because it is too simple police fsimplistic or tht us to act in our own best interests. i think they're wrong on both accounts. and if we, all of us who use and rely on computer networks, whether individuals, groups, organizations, corporations, or government agencies, are in charge of our own cybersecurity, the real question then is, what should be done to reduce the threat of...
118
118
Mar 13, 2012
03/12
by
CSPAN3
tv
eye 118
favorite 0
quote 0
course we have a lot of work left to do and i'm optimistic we're going to work to put in place a cybersecurity policy. you know you will play a key role in advising us, given your perspective and your responsibilities in this area. >> yes, senator. >> general fraser, if i could, i would like to turn to the report that islamic groups are recruiting in your aor. what are the conditions that are facilitating islamist recruiting and fund-raising in the most troubling areas and what can we do as well as our partners to address these conditions? >> senator, there are groups, violent extremist groups, who are advocating and proselytized in largely muslim communities in latin america. the community is fairly small within the region, about 1% of the total inhabitants of the region but they are still very deliberately advocating. the situations and the conditions that enable that are ones that you see in many of the countries in the region and that's poverty rates, it's income inequality, it's the corruption that's there and it is in some of those cases, it is an anti-u.s. perspective. >> it bears watch
course we have a lot of work left to do and i'm optimistic we're going to work to put in place a cybersecurity policy. you know you will play a key role in advising us, given your perspective and your responsibilities in this area. >> yes, senator. >> general fraser, if i could, i would like to turn to the report that islamic groups are recruiting in your aor. what are the conditions that are facilitating islamist recruiting and fund-raising in the most troubling areas and what can...
125
125
Mar 5, 2012
03/12
by
CSPAN3
tv
eye 125
favorite 0
quote 0
cybersecurity executives bill connor and robert dicks on how to handle the threats to government and business communications networks. "the communicators" tonight at 8:00 eastern on c-span2. >>> this is c-span3. with politics and public affairs programming throughout the week and every weekend 48 hours of people and events telling the american story on "american history tv." get our schedules and see past programs at our websites. and you can join in the conversation on social media sites. >>> the national governors association recently held its annual winter meeting in washington. and this session focused on how states can create an entrepreneurial environment for small businesses and economic growth. the group's economic development and commerce committee conducted this session. it's chaired by kansas governor sam brownback, runs about an hour and 20 minutes. >> welcome, everybody. my name is sam brownback. i'm chairing the economic development committee on commit growth for the nga. delighted to have all the governors here and the other participants as well. this is going to be i
cybersecurity executives bill connor and robert dicks on how to handle the threats to government and business communications networks. "the communicators" tonight at 8:00 eastern on c-span2. >>> this is c-span3. with politics and public affairs programming throughout the week and every weekend 48 hours of people and events telling the american story on "american history tv." get our schedules and see past programs at our websites. and you can join in the...
191
191
Mar 30, 2012
03/12
by
MSNBCW
tv
eye 191
favorite 0
quote 0
understand that the department of homeland security is already performing major functions in the cybersecurity arena. what we're talking about now, however, is having the congress help d.o.d., dhs, the department of homeland security, all of us better protect the cybersecurity networks of the united states. >> there are competing bills in congress right now. senator mccain believes it should be voluntary. other legislation, the administration's legislation would be a requirement. there are concerns that have been raised about just the intrusive quality of those requirements on corporations. and also the privacy issues. >> i this i there's been a lot of misinformation about that. >> please clarify. >> the lieberman-collins bill is a bipartisan bill that the celebration support. if you in the kind of infrastructure everybody has to rely upon, you need to work with us to raise and vin certain base level performance standards. you could figure out how you meet them. that's left to the market to determine. but when you are in that core critical infrastructure arena, there are certain responsibiliti
understand that the department of homeland security is already performing major functions in the cybersecurity arena. what we're talking about now, however, is having the congress help d.o.d., dhs, the department of homeland security, all of us better protect the cybersecurity networks of the united states. >> there are competing bills in congress right now. senator mccain believes it should be voluntary. other legislation, the administration's legislation would be a requirement. there...
121
121
Mar 28, 2012
03/12
by
CSPAN2
tv
eye 121
favorite 0
quote 0
i was wondering, i know we're talking about cybersecurity. i know there's many proposals, we have one in government regs, administration, you and the military's working on a whole host of things. how are the rules of engagement actually working or being implemented or coming along with regard to the cybercommand operation? >> right now we're upgrading -- >> i meant that to you general alexander. thank you. >> right now, we're updating, if you will -- the rules of engagement that the chairman has put out were dated in 2005. given where we are today, what the joint staff has taken on is to update those. right now, all our measures are internal to our networks, what d.o.d. is authorized to do. what we're looking at within d.o.d. and within the inner agency, what are the next steps that we should have and how do we take those steps. i think over the next month or two, the joint staff will complete those standing rules of engagement and then move those to the inner agency and share those. >> what role do you see, what segments of the private secto
i was wondering, i know we're talking about cybersecurity. i know there's many proposals, we have one in government regs, administration, you and the military's working on a whole host of things. how are the rules of engagement actually working or being implemented or coming along with regard to the cybercommand operation? >> right now we're upgrading -- >> i meant that to you general alexander. thank you. >> right now, we're updating, if you will -- the rules of engagement...
225
225
tv
eye 225
favorite 0
quote 0
mueller says that cybersecurity will likely surpass terrorism as america's number one concern in the future. >>> nasa has done a successful test drop of this that will bring astronauts back to earth in the next generation space vehicles. from 25,000 feet, a parachute safely carried the capsule back to earth. >>> now here is an "early" look at one of your top health headlines on msnbc.com. a government study says that hiv infection has fallen by 50% the past decade. the report found that 9% of iv drug users were infected by the virus that causes aids compared to a rate of 18% in the 1990s. the decline may be related in a growth to needle exchange program. for more information on this and other health stories, check out the health page at msnbc.com. >>> now here is an early look at how wall street will kick off the day. the dow opens at 12,980 after adding 28 points. the s&p was up eight points. the nasdaq gained 22. taking a look at overseas trading this morning. in tokyo, the nikkei nudged up 69 points. while in hong kong, the hang seng gained 174. >>> on thursday, investors welcome
mueller says that cybersecurity will likely surpass terrorism as america's number one concern in the future. >>> nasa has done a successful test drop of this that will bring astronauts back to earth in the next generation space vehicles. from 25,000 feet, a parachute safely carried the capsule back to earth. >>> now here is an "early" look at one of your top health headlines on msnbc.com. a government study says that hiv infection has fallen by 50% the past decade....
74
74
Mar 13, 2012
03/12
by
CSPAN2
tv
eye 74
favorite 0
quote 0
we've got cybersecurity and we're having long briefings on that because of the threat.and the majority and minority leaders, as i said, are working to bring the appropriations bills to the floor. we've only done that twice since the year 2000, all 12 of them. so this is a little disagreement that we have here between the majority leader and the republican leader on the scheduling of votes on district judges. it's not a high constitutional matter. it's not even a high principle. it's not even a big disagreement. it's a little disagreement, because what's always happened is the back and forth of scheduling, they work it out. and they have been working it out. i took a look at the last three years. in the first two years of president obama's administration, he nominated 78 district judges and 76 of those judges were confirmed. they were confirmed. 76 of 78 in the first two years. he withdrew two. then last year 61 more district judges were confirmed. what about this year? what about about 2012? the president's made a few nominations, but they haven't been considered yet by
we've got cybersecurity and we're having long briefings on that because of the threat.and the majority and minority leaders, as i said, are working to bring the appropriations bills to the floor. we've only done that twice since the year 2000, all 12 of them. so this is a little disagreement that we have here between the majority leader and the republican leader on the scheduling of votes on district judges. it's not a high constitutional matter. it's not even a high principle. it's not even a...
65
65
Mar 12, 2012
03/12
by
CSPAN
tv
eye 65
favorite 0
quote 0
. >> senators lieberman and collins detail how their cybersecurity bill differs from other senate bills. the communicators, tonight at 8:00 p.m. eastern on c-span2. >> here's a look at the prime- time schedule. hillary clinton condemns the killing of innocent afghan villagers. the remarks from energy -- interior secretary salazar on gas prices. and the debate on the constitutionality of the health care mall's karmic that individuals carry health insurance. the you think the health care what is constitution? we're asking that question on our facebook page. blog on to post your comments. this morning, we learn more about the shooting this weekend of afghan villagers. reuters. century pentagon correspondent, what are you hearing as reaction to the shooting in afghanistan yesterday? a soldier reportedly went into two villages and shot civilians. guest: it is a tragic incident, the worst of its kind in over a decade. we have been told the soldier was a staff sergeant. it was his first tour in afghanistan. he had toured several times in a rock. he walked off the base and literally entered hom
. >> senators lieberman and collins detail how their cybersecurity bill differs from other senate bills. the communicators, tonight at 8:00 p.m. eastern on c-span2. >> here's a look at the prime- time schedule. hillary clinton condemns the killing of innocent afghan villagers. the remarks from energy -- interior secretary salazar on gas prices. and the debate on the constitutionality of the health care mall's karmic that individuals carry health insurance. the you think the health...
135
135
Mar 12, 2012
03/12
by
CSPAN3
tv
eye 135
favorite 0
quote 0
and the staff issued guidance issuing company's obligations to risk cybersecurity and attacks, clearly a growing concern of investors. in reviewing the most recent waive of ipos, problem recognition practices were stopped. the risks were stopped before being able to take risk again. they acted swiftly when the right of the investors to have their day in court was threatened by objecting to a provision that was in the documents connect with the company's ipo, the results of these changes are not always eye catching but we are convinced that increased focus on these sectors is a necessary shift in a crisis world, we know that our effort says to provide guidance has proved helpful to many companies. and we believe based on our own review of disclosure statements that investors are getting information that is both more complete and more relevant than in the past. perhaps the areas in which changes and organization and approach have been most apparent are in our enforcement and examination units. in boerkts new leadership managed significant organizational changes and just as important, enc
and the staff issued guidance issuing company's obligations to risk cybersecurity and attacks, clearly a growing concern of investors. in reviewing the most recent waive of ipos, problem recognition practices were stopped. the risks were stopped before being able to take risk again. they acted swiftly when the right of the investors to have their day in court was threatened by objecting to a provision that was in the documents connect with the company's ipo, the results of these changes are not...
231
231
Mar 27, 2012
03/12
by
CSPAN3
tv
eye 231
favorite 0
quote 0
the department of defense is requesting nearly $3.4 billion for cybersecurity in fiscal 2013 and almost 17.5 billion over the future years' defense program. the cyber budget is one of the only areas of growth in the dod budget because of broad agreement that addressing the cyber threat must be among our highest priorities. ive thank the witnesses for appearing before the committee today and look forward to their testimony. >> thank you very much. senator kaymer -- i mean general kaler. excuse me. >> thank you, mr. chairman. if it's okay with you, i'd like to have my statement admitted to the record. >> it will be part of the record. >> sir, senator mccain and distinguished members of the committee, thanks for this tonight to present my views on the united states strategic commands missions and priorities. very pleased to be here today with general keith alexander, cyber commandes commander and of course as both of you have pointed out, cyber is a critical component of our global capabilities. without question, mr. chairman, we continue to face a very challenging global security environm
the department of defense is requesting nearly $3.4 billion for cybersecurity in fiscal 2013 and almost 17.5 billion over the future years' defense program. the cyber budget is one of the only areas of growth in the dod budget because of broad agreement that addressing the cyber threat must be among our highest priorities. ive thank the witnesses for appearing before the committee today and look forward to their testimony. >> thank you very much. senator kaymer -- i mean general kaler....
120
120
Mar 1, 2012
03/12
by
CSPAN3
tv
eye 120
favorite 0
quote 0
when i was in the director of national intelligence and took on the issue with mike mccollum of cybersecurity i think what you have put on the table, sir, is a great first step and as an american citizen, thank you for doing that. it is a good first step. it is progress. changes generally evolutionary as opposed to revolutionary, and i would say this is evolutionary in my humble opinion. if i have one thing that i would hope, as i think i understand, there is not a requirement to share some information. it's encouraged. i always tell people when i speak publicly we are a nation separated by a common language. we all define words a little differently, so in terms of economic attack and so forth, some entities may not want folks to know about what has been taken and they are not required to divulge it, so just to comment from the peanut gallery. >> a i take that seriously. it's a good comment. it's a thoughtful poke and thank you for your words. thank you is to chairman. >> thank you senator lieberman. senator inhofe. >> thank you mr. chairman. i really think this is a better hearing than we wo
when i was in the director of national intelligence and took on the issue with mike mccollum of cybersecurity i think what you have put on the table, sir, is a great first step and as an american citizen, thank you for doing that. it is a good first step. it is progress. changes generally evolutionary as opposed to revolutionary, and i would say this is evolutionary in my humble opinion. if i have one thing that i would hope, as i think i understand, there is not a requirement to share some...
131
131
Mar 28, 2012
03/12
by
CSPAN2
tv
eye 131
favorite 0
quote 0
the department of defense is requesting nearly $3.4 billion for cybersecurity in fiscal 2013 and almost 17.5 billion over the future years' defense program. the cyber budget is one of the only areas of growth in the dod budget because of broad agreement that addressing the cyber threat must be among our highest priorities. ive thank the witnesses for appearing before the committee today and look forward to their testimony. >> thank you very much. senator kaymer -- i mean general kaler. excuse me. >> thank you, mr. chairman. if it's okay with you, i'd like to have my statement admitted to the record. >> it will be part of the record. >> sir, senator mccain and distinguished members of the committee, thanks for this tonight to present my views on the united states strategic commands missions and priorities. very pleased to be here today with general keith alexander, cyber commandes commander and of course as both of you have pointed out, cyber is a critical component of our global capabilities. without question, mr. chairman, we continue to face a very challenging global security environm
the department of defense is requesting nearly $3.4 billion for cybersecurity in fiscal 2013 and almost 17.5 billion over the future years' defense program. the cyber budget is one of the only areas of growth in the dod budget because of broad agreement that addressing the cyber threat must be among our highest priorities. ive thank the witnesses for appearing before the committee today and look forward to their testimony. >> thank you very much. senator kaymer -- i mean general kaler....
105
105
Mar 26, 2012
03/12
by
CSPAN3
tv
eye 105
favorite 0
quote 0
so everything from cybersecurity and privacy to domain name administration to engineering, which is currently administered by the internet engineering task force, a nongovernmental group and other aspects of, technical aspects of internet governance through the internet society, again another nongovernmental group, as well as the arrangements of the long haul internet backbone where there are private lit negotiated swapping agreements between backbone providers all of that. all of that to be subsumed through the itu and to give it jurisdiction over that. among many others. so, it's a real concern. the obama administration and i and others are all in agreement on this. there seems to be bipartisan support in this country but it's becoming a bit of an issue of the developed world versus the developing world, and actually, the irony is that should a treaty go the distance and actually become effective, it would actually undermine economic and political progress in the developing world, the developed nations hopefully our own would opt out of such a treaty but in the rest of the world, that might
so everything from cybersecurity and privacy to domain name administration to engineering, which is currently administered by the internet engineering task force, a nongovernmental group and other aspects of, technical aspects of internet governance through the internet society, again another nongovernmental group, as well as the arrangements of the long haul internet backbone where there are private lit negotiated swapping agreements between backbone providers all of that. all of that to be...
131
131
Mar 13, 2012
03/12
by
CSPAN3
tv
eye 131
favorite 0
quote 0
. >> general, i want to go back to this issue of cybersecurity and your comments in response to senator, you note in your written statement that the systems -- risks our ability to complete our mission. we know that russia and china are leveraging cyber information to steal government from the united stat united states. our technologies are at the greatest risk of cyber spying. what do we need to do to mitigate risks to our system s? >> we are focused on the networks that we need tore mission accomplishments. they are security right now, so there's great capability in the hacking world to put at risk points of vulnerability, especially where we have inter connectedness, so we watch it closely. it's a great area of concern, working closing with cyber com. coming up with unique solutions is part of what we are doing. including receiving some information and reinforcement in our cyber warriors in command. >> are you seeing increase in the area of cyber attacks? >> not against u.s. northern comm
. >> general, i want to go back to this issue of cybersecurity and your comments in response to senator, you note in your written statement that the systems -- risks our ability to complete our mission. we know that russia and china are leveraging cyber information to steal government from the united stat united states. our technologies are at the greatest risk of cyber spying. what do we need to do to mitigate risks to our system s? >> we are focused on the networks that we need...