191
191
Jun 18, 2012
06/12
by
CSPAN2
tv
eye 191
favorite 0
quote 0
and where does cybersecurity and cybersecurity legislation play a role in the cloud computing industry? >> guest: well, um, cloud computing is the biggest new be innovation in the computing industry in over two decades. it's estimated to be $73 billion value in just the next couple of years. and really cloud computing, what it means -- we all aeroa lot about it -- hear a lot about it, but it just means software can be delivered as a service, and it can be delivered efficiently and in some cases less expensively in ways that enables individual consumers, small businesses and others to really gain the advantages of that software. um, it is a huge growth of interest in economic activity in the u.s. software industry. it's critical for that to be successful, that we have the type of security protections that when data is stored not on one's personal computer, but when data is stored in the cloud -- hence the name -- you have to make sure it's secure. but you also have to make sure that data can flow between borders because in this seamless world of the internet as a means of distribution,
and where does cybersecurity and cybersecurity legislation play a role in the cloud computing industry? >> guest: well, um, cloud computing is the biggest new be innovation in the computing industry in over two decades. it's estimated to be $73 billion value in just the next couple of years. and really cloud computing, what it means -- we all aeroa lot about it -- hear a lot about it, but it just means software can be delivered as a service, and it can be delivered efficiently and in some...
120
120
Jun 8, 2012
06/12
by
CSPAN3
tv
eye 120
favorite 0
quote 0
the industry recognizes the importance of cybersecurity education. consumers and businesses play a key role in cybersecurity and have a responsibility to protect themselves though the industry and others have recognized that they often lack the skills and awareness to do so. as a result, institutions and associations have nad significant institutional investments. a key collaborative area of particular note is threat information sharing. financial institutions share information, broader and public/private share opportunities remain. because of the key infrastructures such as capitol markets, it's needed to improve the responsiveness and response of all sectors. protecting confidently is a concern. organizations are concerned that revelations of information will impact the reputation and their customer's confidence. that is why the financial services industry was supportive of the passage of hr 3523 which if inacted offers additional protection. we recognize that as hr 3523 was debated, legitimate concerns about protecting individuals' information and
the industry recognizes the importance of cybersecurity education. consumers and businesses play a key role in cybersecurity and have a responsibility to protect themselves though the industry and others have recognized that they often lack the skills and awareness to do so. as a result, institutions and associations have nad significant institutional investments. a key collaborative area of particular note is threat information sharing. financial institutions share information, broader and...
90
90
Jun 1, 2012
06/12
by
CSPAN2
tv
eye 90
favorite 0
quote 0
first we must maintain and improve our existing cybersecurity infrastructure and identify all cybersecurity breaches. second, we must share all relevant cyber threat information to facilitate a fast and effective response. and we must do this in a way that does not unduly infringe upon privacy rights, consumer rights or the integrity ofs about contracts. third, the private sector and the public sector must work together in leveraging existing upstutions to evolve with the increasing cyberattack complexity. finally, the private sector must be able to work confidently with law enforcement agency to protect the existing systems while insuring that sensitive information is handled securely and is used appropriately. clearly to maintain the public trust the financial sector and government agencies must remain committed to protecting personal data and intellectual property. i want to thank you again for being here. mr. chairman, i want to thank our witnesses for sharing their time, testimony and experience with us today. thank you so much. i yield back. >> the gentleman yields back. and i echo th
first we must maintain and improve our existing cybersecurity infrastructure and identify all cybersecurity breaches. second, we must share all relevant cyber threat information to facilitate a fast and effective response. and we must do this in a way that does not unduly infringe upon privacy rights, consumer rights or the integrity ofs about contracts. third, the private sector and the public sector must work together in leveraging existing upstutions to evolve with the increasing cyberattack...
109
109
Jun 2, 2012
06/12
by
CSPAN2
tv
eye 109
favorite 0
quote 0
it is part of treasury and fall under cybersecurity standards, that is the macro picture. we have got to work out ways to send information that protect the information in transit. the methods being used today are somewhat at hawk because of the new nests -- newness of the function and the need to look at risk performance perspective including other nations getting into that data and defending that level of aggression. >> thank you, mr. graff. you put your finger on a central problem which is how do we share that information security and there are fairly sound methods i could talk about to protect in transit as a challenge but the technology issue there. the more intense concern might be protecting it once it arrived in federal networks to say to themselves very strong target. that is a concern of ours. always want to work with federal agencies to make sure the information we give them is sufficient but no more than they need and no more specific than they need and we like assurances about the way they protect those internal systems as well. that is an important problem. it
it is part of treasury and fall under cybersecurity standards, that is the macro picture. we have got to work out ways to send information that protect the information in transit. the methods being used today are somewhat at hawk because of the new nests -- newness of the function and the need to look at risk performance perspective including other nations getting into that data and defending that level of aggression. >> thank you, mr. graff. you put your finger on a central problem which...
100
100
Jun 8, 2012
06/12
by
CSPAN3
tv
eye 100
favorite 0
quote 0
i have, which is substantial, there was no cybersecurity element in that ipo. >> okay. thank you, as additional questions, but my time has expired i'll now yield to the gentlelady from new york. >> thank you, i would like to ask anybody on the panel, when there's a cyber attack, how do you find out about it? do your customers tell you about it? does your internal division tell you? does government tell you? how do you find out about it and then what do you do? do you report it to government so we are coordinating? do you report it to other companies? how does it work now, we are hearing that half of the small and large companies are being attacked, how do you find out about it and then what do you do about it? >> the short answer to your question is yes, all those sources. the realty is that financial institutions are constantly monitoring their environment for indication of attack, so, as arel would tell you at citi and i'll defer to him in a second, but there are significant investments in monitoring tools to look at the environment to determine if there are attacks u
i have, which is substantial, there was no cybersecurity element in that ipo. >> okay. thank you, as additional questions, but my time has expired i'll now yield to the gentlelady from new york. >> thank you, i would like to ask anybody on the panel, when there's a cyber attack, how do you find out about it? do your customers tell you about it? does your internal division tell you? does government tell you? how do you find out about it and then what do you do? do you report it to...
45
45
tv
eye 45
favorite 0
quote 0
congress to pass new cybersecurity legislation that would make for clear standards but nobody really knows whom to believe here because the threat of cyber security is and has been a boon to industry analysts so they they may be exaggerating the problem their members of congress. who want to pass cyber security legislation who like to take up this idea that there's a massive threat out there so they can push this legislation through so so the lines of what's legal what's not have yet to be clearly drawn it's it's as you say it's a growth industry where where we don't really know how to apply proper legal standards that's him there have been a series of high profile hacktivists attacks you know from anonymous various other hackers now there's this recent flame virus that attacked the government on broad so does this all show the need for companies and the government to step up their protections against these attacks. well i mean nobody really knows the precise cost of the cyber attacks some dollar estimates put it at a couple billion dollars others put it in the hundreds of billions o
congress to pass new cybersecurity legislation that would make for clear standards but nobody really knows whom to believe here because the threat of cyber security is and has been a boon to industry analysts so they they may be exaggerating the problem their members of congress. who want to pass cyber security legislation who like to take up this idea that there's a massive threat out there so they can push this legislation through so so the lines of what's legal what's not have yet to be...
81
81
Jun 7, 2012
06/12
by
CSPAN
tv
eye 81
favorite 0
quote 1
davis of ill regarding cybersecurity, an amendment by mr. ellison regarding civil rights act of 1964, an amendment by mr. engel regarding light duty vehicles, an amendment by mr. flores regarding section 526 of the energy independence and security act of 2007. an amendment by mr. fortenberry limiting funds to restrict airline passengers from regarding. an amendment by mr. garrett limiting funds for vipertien servings. an amendment by mr. graves regarding professional unlawful presence, waivers, inadmissible for certain immediate relatives. an amendment by mr. ms. hochul regarding unclaimed clothing. an amendment by mr. holt limiting funds for aerial vehicles. an amendment by mr. holt regarding scanning systems. an amendment by mr. king of iowa regarding department of homeland security policy documents. an amendment by mr. king of iowa regarding executive order 13166. an amendment by mr. landry regarding aerial vehicles. an amendment by mr. -- by mr. loebsack limiting funds to ignite assistance obligated by fema. an amendment by mr. meehan re
davis of ill regarding cybersecurity, an amendment by mr. ellison regarding civil rights act of 1964, an amendment by mr. engel regarding light duty vehicles, an amendment by mr. flores regarding section 526 of the energy independence and security act of 2007. an amendment by mr. fortenberry limiting funds to restrict airline passengers from regarding. an amendment by mr. garrett limiting funds for vipertien servings. an amendment by mr. graves regarding professional unlawful presence, waivers,...
167
167
Jun 19, 2012
06/12
by
CSPAN2
tv
eye 167
favorite 0
quote 0
and cybersecurity legislation play a role in the cloud computing industry? estimates innovation in the computing industry an estimated to be 73 billion-dollar fell you and really cloud computing what it means if you hear a lot about simply put it just means that software can be delivered as a service, and it can be delivered efficiently and in some cases less expensively in ways that enables individual consumers, small businesses and others to gain the advantages of that software. as a huge growth of interest and economic activity in the u.s. software industry. it's critical for that to be successful, yet we have the type of security protections when the data is stored not among the personal computer but when it is stored in a cloud hence the name. you have to make sure it is secure but you also have to make sure that it can flow between borders because in the seamless world of the internet as a means of distribution, the economic efficiency occurs not just in a city or state or country, but when you bring all of this together to have that kind of confidence
and cybersecurity legislation play a role in the cloud computing industry? estimates innovation in the computing industry an estimated to be 73 billion-dollar fell you and really cloud computing what it means if you hear a lot about simply put it just means that software can be delivered as a service, and it can be delivered efficiently and in some cases less expensively in ways that enables individual consumers, small businesses and others to gain the advantages of that software. as a huge...
23
23
tv
eye 23
favorite 0
quote 0
cybersecurity or fighting copyright infringement or national security or whatever that's good for people to be aware that there is a constituency is going to press back on that in terms of the specifics you know you know himself actually sad when he introduced this at the personal luckily for him the trouble is these better very general things like well i believe in freedom of the internet you have arrived here on the internet and you know that all the people who support sopa would have told you that they believe all those things they just say oh well this so wasn't censorship we're just blocking websites that are about copyright infringement and that's even though we're taking down these websites or blocking these websites we don't think of that is censorship but you know in all of these debates it's always sort of the details of how to balance these different interests or how to balance some of those interested in that sense i mean is this is a good thing if they're doing this you know on one hand i think that it's great that they're trying to get people involved crowdsourcing they're
cybersecurity or fighting copyright infringement or national security or whatever that's good for people to be aware that there is a constituency is going to press back on that in terms of the specifics you know you know himself actually sad when he introduced this at the personal luckily for him the trouble is these better very general things like well i believe in freedom of the internet you have arrived here on the internet and you know that all the people who support sopa would have told...
62
62
Jun 27, 2012
06/12
by
CSPAN2
tv
eye 62
favorite 0
quote 0
and fourth, to prioritize cybersecurity research and development so that our nation will continue to lead the world in this area. so let me start with number one. facilitate sharing of cyberthreat information. secure i.t. helps the private sector combat cyberattacks by breaking down barriers to sharing information about threats and vulnerabilities. currently antitrust laws and liability concerns inhibit private companies from exchanging information that we believe is necessary to defend against and respond to cyberthreats. i was talking to someone last night who is in the very high-tech internet field, and there are great concerns about their company calling a competitor and saying we're seeing signs of a possible threat here, and we wanted to share what the type of red flag we're seeing is so that you would be able to check your networks to see if you're getting the same thing. thaoers -- these are two competitors, but this is not an anticompetitive situation. it's not something that would be, we believe, subject to antitrust. they're still competitors, but everybody wants security
and fourth, to prioritize cybersecurity research and development so that our nation will continue to lead the world in this area. so let me start with number one. facilitate sharing of cyberthreat information. secure i.t. helps the private sector combat cyberattacks by breaking down barriers to sharing information about threats and vulnerabilities. currently antitrust laws and liability concerns inhibit private companies from exchanging information that we believe is necessary to defend against...
71
71
Jun 8, 2012
06/12
by
CSPAN3
tv
eye 71
favorite 0
quote 0
so now there is a connection between piracy on the other hand and cybersecurity on the other hand. can you just talk to us about the real threats that we have in that area, both on the piracy side of this issue and on the cybersecurity and their connections just a little bit so we'll have some background that at least informs the american people how serious the problem is. >> i mean, the piracy issue has a number of dimensions to it. it is an economic issue. it is a jobs issue. when the theft of our intellectual property, the methods that we use to produce things is stolen by other organizations or by other countries, it has a direct impact on our economy. there is also a safety factor, a health items, medicines that are produced in a way that are inconsistent with the great standards we have in the united states, and then sold back to the united states or sold in other countries can put people at risk. the whole question of various parts that can be used in airplanes, other things that are not done in a way consistent with the way in which our intellectual property standards are d
so now there is a connection between piracy on the other hand and cybersecurity on the other hand. can you just talk to us about the real threats that we have in that area, both on the piracy side of this issue and on the cybersecurity and their connections just a little bit so we'll have some background that at least informs the american people how serious the problem is. >> i mean, the piracy issue has a number of dimensions to it. it is an economic issue. it is a jobs issue. when the...
97
97
Jun 1, 2012
06/12
by
CSPAN2
tv
eye 97
favorite 0
quote 0
or similar bodies or as you know, enormously significant issues surrounding cybersecurity. there is a great deal of engagement that we in the united states have with other countries about how to improve the cybersecurity environment. but we don't think that apart from potentially a very high level kind of statement about the desirability about cybersecurity that it has any place at all in term of the itr. >> my concern overall that such international mandates could be used as attar sword and shield by aregimes tate. keep in mind that cyber security is discussed in many diplomatic foray not wicc or i.t.u. but other places as well. a general matter we should be concerned that before entering any kind of enteral agreements on this, we put at the disadvantage. >> i don't know if congresswoman mentioned this. we were talking before. i had to leave the room. the but the process would be consensus agreement would then have to go back to the national governments for a treaty ratification. as we see in other treaties like kyoto, not to pick on it. some countries picked it up. some c
or similar bodies or as you know, enormously significant issues surrounding cybersecurity. there is a great deal of engagement that we in the united states have with other countries about how to improve the cybersecurity environment. but we don't think that apart from potentially a very high level kind of statement about the desirability about cybersecurity that it has any place at all in term of the itr. >> my concern overall that such international mandates could be used as attar sword...
102
102
Jun 13, 2012
06/12
by
CSPAN2
tv
eye 102
favorite 0
quote 0
i want to speak about the really urgent need for the senate to adopt cybersecurity legislation, and i beginning by recalling a recent story in "the washington post" that detailed how a young man living an owetio an ocean as was able to use his computer to hack into the cyber control system of the local -- of a local water utility here in the united states. it took him just 10 minutes and required no special tools or no special training. while the hacker could have taken over the water company's operations and caused real damage, instead, he posted screen shots of his hack on the internet to show that he had been there and prove his point that our nation's internet security is woefully lax, and it took very little in the way of resources or skill to penetrate it. mr. president, this kind of story is but one piece of what i would call an avalanche of evidence, showing that there is an urgent need to pass comprehensive cybersecurity legislation that will safeguard our critical cyber infrastructure. the fact is, as this 22-year-old's activities showed and as authorities in the area such a
i want to speak about the really urgent need for the senate to adopt cybersecurity legislation, and i beginning by recalling a recent story in "the washington post" that detailed how a young man living an owetio an ocean as was able to use his computer to hack into the cyber control system of the local -- of a local water utility here in the united states. it took him just 10 minutes and required no special tools or no special training. while the hacker could have taken over the water...
207
207
Jun 8, 2012
06/12
by
CSPAN
tv
eye 207
favorite 0
quote 0
this bill is already robust on cybersecurity. it provides a substantial increase in every cybersecurity program across the department. furthermore this bill already does more for grants to high-risk areas than any previous d.h.s. appropriations bill and we increase grants for more than $400 million. let he repeat that, by more than $600 million we increase grants. in short, this motion is not needed. this bill cuts spending overall but it also fully sustains all frontline and high-risk operations. it is bald bill, it is a disciplined bill. it is a bill worthy of support. mr. speaker, it's time to vote. it's time to meet our nation's needs for security and fiscal restraint. i urge my colleagues to reject this unnecessary motion and to enthusiastically support this bill. i yield back the balance of my time. the speaker pro tempore: the gentleman yields back the balance of his time. without objection, the previous question is ordered on the motion to recommit. the question is on the motion to recommit. those in favor say aye. those
this bill is already robust on cybersecurity. it provides a substantial increase in every cybersecurity program across the department. furthermore this bill already does more for grants to high-risk areas than any previous d.h.s. appropriations bill and we increase grants for more than $400 million. let he repeat that, by more than $600 million we increase grants. in short, this motion is not needed. this bill cuts spending overall but it also fully sustains all frontline and high-risk...
WHUT (Howard University Television)
137
137
Jun 1, 2012
06/12
by
WHUT
tv
eye 137
favorite 0
quote 0
. >>> computer wizards from around the globe are competing to find out who is best at cybersecurity. they are headed to moscow for an annual contest called capture the flag. it may appear like fun and games but the goal of the competition is to get participants to make the best use of their knowledge to help prevent cyberattacks. 12 teams pitted their skills against each other in the preliminary round on wednesday and thursday. a team of college students from japan took part for the first time. they had to race against the clock to access their opponent's data. >> translator: social infrastructure could be damaged if information security is lax. i want to become an engineer and help make information security more reliable. >> the team failed to advance to the finals. the students finished in the ninth place. >>> the dragon shuttle may have launched a new era in the private sector exploration of outer space. it's the world's first privately owned craft to dock with the international space station and return to earth. u.s. firm spacex developed the unmanned craft. it left cape canavera
. >>> computer wizards from around the globe are competing to find out who is best at cybersecurity. they are headed to moscow for an annual contest called capture the flag. it may appear like fun and games but the goal of the competition is to get participants to make the best use of their knowledge to help prevent cyberattacks. 12 teams pitted their skills against each other in the preliminary round on wednesday and thursday. a team of college students from japan took part for the...
120
120
Jun 6, 2012
06/12
by
CSPAN
tv
eye 120
favorite 0
quote 0
even though cybersecurity is as important to our common life now as economics or public health, it's still ok in washington, it's still ok in congress for members not to know about these things in the same way they know about economics and public health. the handful of congressmen who do know about this are pushing for their piers to let the hackers in -- peers to let the hackers in. so far it hasn't really happened. and there is one thing, one line that i wish people could remember from this interview, it's for washington to let the hackers in. host: if you'd like to talk with michael gross about his stories in "vanity fair" here are the numbers to call. republican 202-737-30002. democrats, 202-737-0001. michael gross, let the hackers in. what would that achieve? and does that -- do you feel, you talked to members of congress, people in washington, about the -- that's scary concept for people in authority to allow happen. guest: it's a scary concept because the net is something that, especially on a technical level, most of washington knows very little about. and most of washington
even though cybersecurity is as important to our common life now as economics or public health, it's still ok in washington, it's still ok in congress for members not to know about these things in the same way they know about economics and public health. the handful of congressmen who do know about this are pushing for their piers to let the hackers in -- peers to let the hackers in. so far it hasn't really happened. and there is one thing, one line that i wish people could remember from this...
248
248
Jun 7, 2012
06/12
by
MSNBCW
tv
eye 248
favorite 0
quote 0
cybersecurity experts advise that users are both websites should change their passwords immediately, especially if they use the same code to access other online accounts. >>> tax cuts for the wealthy passed under president george bush and they expire at the end of this year. and republicans are arguing they should be made permanent. well, last night on "politics nation," robert reich talked to host al sharpton about repeated gop claims tax breaks for the rich help the economy. >> republicans have learned a very important lesson over the years, al. that is if you tell the same big lie over and over and over again and you have enough money behind the big lies, eventually people start believing them. they've been saying that the bush tax cuts need to be extended because they worked so well in 2001, 2003 and in the years after that. well, the fact of the matter is, they poked a huge hole in the budget deficit and instead of creating a lot of jobs and creating -- instead of improving wages and economic growth, even before the great recession, the bush tax cuts were a complete dud. we had
cybersecurity experts advise that users are both websites should change their passwords immediately, especially if they use the same code to access other online accounts. >>> tax cuts for the wealthy passed under president george bush and they expire at the end of this year. and republicans are arguing they should be made permanent. well, last night on "politics nation," robert reich talked to host al sharpton about repeated gop claims tax breaks for the rich help the...
155
155
Jun 12, 2012
06/12
by
CSPAN2
tv
eye 155
favorite 0
quote 0
. >> to telecommunications issue moved the cybersecurity? do people care? >> yes. look at the ron paul campaign. she hasn't proven that. but when you show up at the rallies all those young people show up because they want to legalize marijuana. maybe some of them do to keep the government out of this, no question. there's no question and that is a generational divide i think largely because younger people i have two teenagers. they've been doing this all their life. they have something in their hand with there is a video game module or their phone, however they are communicating that in matters to them because it's been their life. absolutely. have they reached a critical mass? the government role is going to decide the big brother is it the concern, you bet it is. >> we've been talking here on the communicators of chief political correspondent thank you. >> now on the communicators we want to introduce you to the senior vice president at cox communications and that he's the senior vice president of business. what is it that you do that cox communication? >> i have
. >> to telecommunications issue moved the cybersecurity? do people care? >> yes. look at the ron paul campaign. she hasn't proven that. but when you show up at the rallies all those young people show up because they want to legalize marijuana. maybe some of them do to keep the government out of this, no question. there's no question and that is a generational divide i think largely because younger people i have two teenagers. they've been doing this all their life. they have...
123
123
Jun 8, 2012
06/12
by
CSPAN3
tv
eye 123
favorite 0
quote 0
now cybersecurity threats to financial industry. the importance of information sharing between the public and private financial sectors this hearing is two hours. >>> my goodness. formality, please sit. so, today's hearing, called to order, today's hearing entitled, cyber threats to capitol markets and corporate accounts and i appreciate the entire panel being with us today, look forward to a interesting, allbeit at times somewhat technical hearing. so, i look forward to the entire testimony of the witnesses and the questions that will follow. at this time, we will move to opening statements. and i yield myself three minutes or four minutes. >> you and again, we are talking about cyber attacks today and the threat of cyber attacks against our economic interest as we learn from the panel and those that visited our office in the media, issued as a growing concern from here on the committee. a better understanding of the potential dangers that cyber criminaling will pose to us will help improve the chances to avoid disruption in the fi
now cybersecurity threats to financial industry. the importance of information sharing between the public and private financial sectors this hearing is two hours. >>> my goodness. formality, please sit. so, today's hearing, called to order, today's hearing entitled, cyber threats to capitol markets and corporate accounts and i appreciate the entire panel being with us today, look forward to a interesting, allbeit at times somewhat technical hearing. so, i look forward to the entire...
118
118
Jun 13, 2012
06/12
by
CSPAN3
tv
eye 118
favorite 0
quote 0
first, let me thank my colleague from maryland for bringing up the very important issue of cybersecurity. she along with senator feinstein, senator lieberman, senator rockefeller and i have been working very hard and agree that it's absolutely critical that we set standards for critical infrastructure and that that has such important consequences. and i very much appreciate the endorsement of our efforts that i heard this morning. i also appreciate, mr. secretary, your urging us to act sooner rather than later to avert what would be the disasterous consequences if sequestration were allowed to go into effect. i think it would be a huge mistake for us to wait until the lame-duck that's too late, and we do need to tackle that issue now. we really do. and i think it would help if you provide us with even more detail, and i know the armed services committee has asked for that. let me turn to another issue that refers to our priorities. as i review the department of defense's budget, i am very concerned that the ship building account is significantly undervalued. ship building represents a me
first, let me thank my colleague from maryland for bringing up the very important issue of cybersecurity. she along with senator feinstein, senator lieberman, senator rockefeller and i have been working very hard and agree that it's absolutely critical that we set standards for critical infrastructure and that that has such important consequences. and i very much appreciate the endorsement of our efforts that i heard this morning. i also appreciate, mr. secretary, your urging us to act sooner...
241
241
Jun 1, 2012
06/12
by
CSPAN
tv
eye 241
favorite 0
quote 0
s, and most likely the cybersecurity stuff. i don't understand how the mainstream media isn't reporting on this, because alternative media, they're all over it, and they're talking about the cybersecurity right now in chantilly, virginia. host: thanks, dorothy. she mentions the flame, which is another cyberweapon that's in the news right now. david sanger writes about it in his piece this morning. he writes -- host: this was an initiative of the bush administration. mr. sanger writes -- host: it became known to the world as the stuxnet worm as it escaped iran's computers. oklahoma city, oklahoma, up next. gordon is a democrat there. you're on. host: hi. i believe that we should use any weapons that are available, including cyberattacks. i'm really against this idea of trying to fight a clean war. the world is a pretty nasty place, and some of the people that are in it are pretty bad, and whatever it takes to get the job done, i'm all for it. host: next up is baltimore, sid, an independent. good morning. you're on the air. calle
s, and most likely the cybersecurity stuff. i don't understand how the mainstream media isn't reporting on this, because alternative media, they're all over it, and they're talking about the cybersecurity right now in chantilly, virginia. host: thanks, dorothy. she mentions the flame, which is another cyberweapon that's in the news right now. david sanger writes about it in his piece this morning. he writes -- host: this was an initiative of the bush administration. mr. sanger writes -- host:...
116
116
Jun 6, 2012
06/12
by
CSPAN
tv
eye 116
favorite 0
quote 0
it provides a substantial increase for cybersecurity protective efforts, to continuously monitor and detect intrusions to our federal networks from foreign espionage and cyberattacks. mr. chairman, the bill does contain some ill-advised immigration provisions. unnecessary and wasteful statutory floors are set for a variety of programs. such as an arbitrary minimum of 34,000 detention beds. a required level of spending for the seriously flawed 287-g program, and an inflexible amount for work site enforcement. including these type of spending flors and mandates in -- floors and mandates in floor language does not answer the decisive immigration challenges and is likely to waste taxpayer dollars for no good reason. i also object to the three abortion general provisions that were added in full committee. we all know, mr. chairman, abortion is a politically charged subject. numerous restrictions in law have already conditioned and qualified reproductive freedom in practice. among those are prohibition on the federal funds for abortion procedures which are specifically applied to immigrati
it provides a substantial increase for cybersecurity protective efforts, to continuously monitor and detect intrusions to our federal networks from foreign espionage and cyberattacks. mr. chairman, the bill does contain some ill-advised immigration provisions. unnecessary and wasteful statutory floors are set for a variety of programs. such as an arbitrary minimum of 34,000 detention beds. a required level of spending for the seriously flawed 287-g program, and an inflexible amount for work...
160
160
Jun 7, 2012
06/12
by
CSPAN2
tv
eye 160
favorite 0
quote 0
first, the labor department announced approach raises cybersecurity concerns. releasing this data to an online connection may allow an internet hacker to target the release and change key members as they leave the department. or a denial of service attack could delay release to some or all. second, the labor department's new approach would likely be less reliable than the current product is. currently at least two media organizations have built redundant system hardware. at this circuit fails come a second circularity installed in the network reroutes data traffic. if a secure line hills, duplicate dedicated cabling in place carries the traffic. even attempting to duplicate the secure system of government owned computers to be costly to taxpayers. last, the departments new approach remake errors more likely. without their own equipment, preloaded spreadsheets and custom software to digest the data, journalists will have to type the information relying on memory or handwritten notes. this dramatically increases the chance of errors. marcus to measure time in mic
first, the labor department announced approach raises cybersecurity concerns. releasing this data to an online connection may allow an internet hacker to target the release and change key members as they leave the department. or a denial of service attack could delay release to some or all. second, the labor department's new approach would likely be less reliable than the current product is. currently at least two media organizations have built redundant system hardware. at this circuit fails...
78
78
Jun 12, 2012
06/12
by
CSPAN2
tv
eye 78
favorite 0
quote 0
these vital networks must be required to meet minimum cybersecurity standards. that's what these prominent americans believe, and so do i. the letter was clear that securing this infrastructure should be made part of any cybersecurity legislation this congress considers. i believe that also. general keith alexander, director of the national security agency, said something very similar. this is what he wrote to senator mccain recently -- and i quote -- "critical infrastructure protection needs to be addressed in any cybersecurity legislation. the risk is simply too great considering the reality of our interconnected and interdependent world." end of quote. general alexander is one that, a voice among many, many. the president of the united states, president obama, two chairmen of the 9/11 commission, the director of national intelligence, general clapper sp-rbgs -- the director of the f.b.i., robert mueller. they have all requested a call to action. now. they believe an attack is imminent. mr. president, the attack may not be one that knocks down buildings and st
these vital networks must be required to meet minimum cybersecurity standards. that's what these prominent americans believe, and so do i. the letter was clear that securing this infrastructure should be made part of any cybersecurity legislation this congress considers. i believe that also. general keith alexander, director of the national security agency, said something very similar. this is what he wrote to senator mccain recently -- and i quote -- "critical infrastructure protection...
24
24
tv
eye 24
favorite 0
quote 0
possibly this month some big votes coming up in terms of sis but in terms of some of the other cybersecurity legislation that's out there and so what's the latest that you're hearing are we ever going to see some more revisions are we going to see more debate or what you know i mean something is probably. going to move sometime probably near the end of the month i've been hearing that some republicans who have been anxious about it in particular about some regulation that would set up standards. for so-called critical infrastructure are wavering they've been opposed because republicans don't like regulating business and burdening business with extra government rules on the privacy stuff you don't see the same kind of pushback you saw because for the most part this isn't burdening the big tech industries that were such a part of the pushback against so you've got in part some of the industries that we regulate if you don't like it very much you've got all the privacy people going what exactly is. this information flow going to look like but again it's a case where you really have a sense that
possibly this month some big votes coming up in terms of sis but in terms of some of the other cybersecurity legislation that's out there and so what's the latest that you're hearing are we ever going to see some more revisions are we going to see more debate or what you know i mean something is probably. going to move sometime probably near the end of the month i've been hearing that some republicans who have been anxious about it in particular about some regulation that would set up...
82
82
Jun 19, 2012
06/12
by
CSPAN3
tv
eye 82
favorite 0
quote 0
it allows you to invest huge sums of money in data centers, cybersecurity, some of the things you all want us to do. there are some negatives to size. greed, arrogance, hubris, lack of attention to detail. but if you do a good job, your clients are being served and you win their business. so if we weren't doing some of these things for the large global american companies, somebody else would. that's all. these are services they need. they buy them because they need them. they don't buy them because we want them to buy them. we provide huge credit lines to them. >> my last question. you believe that a highly complex institution is necessary and if you weren't doing what you were doing, other people in the world, some other place, would be. you also are unsure of whether dodd-frank has made our system any safer, especially at the top level. we're here quizzing you. if you were sitting on this side of the dias, what would you do to make our system safer than it is and still meet the needs of a global economy like we have? >> the biggest disappointment i've had is that we never actually s
it allows you to invest huge sums of money in data centers, cybersecurity, some of the things you all want us to do. there are some negatives to size. greed, arrogance, hubris, lack of attention to detail. but if you do a good job, your clients are being served and you win their business. so if we weren't doing some of these things for the large global american companies, somebody else would. that's all. these are services they need. they buy them because they need them. they don't buy them...
124
124
Jun 4, 2012
06/12
by
CSPAN
tv
eye 124
favorite 0
quote 0
cybersecurity is a vitally important issue. protecting companies, customers an and infrastructure that support our economy is crucial. we commend the subcommittee before recognizing the importance of this subject. >> thank you. welcome. -- my name greater thanerro my name is errol weiss. i'm testifying on behalf of this trees industry and financial markets association. i will focus this morning on cybersecurity in the cyber services sector and what we're doing to protect customers from the attacks. the increase in cyber intrusions in the past decade is cause for great concern. members firms are on the front lines defending against threats to the financial markets and we take this seriously. members comply with a number of stringent laws and the protection of personal data. these laws are reinforced by regular corrective review and audited by highly specialized regulators that are supported by and asia -- an agency. in addition, the financial- services sector and analysis center. i serve on the board of directors. we recognized
cybersecurity is a vitally important issue. protecting companies, customers an and infrastructure that support our economy is crucial. we commend the subcommittee before recognizing the importance of this subject. >> thank you. welcome. -- my name greater thanerro my name is errol weiss. i'm testifying on behalf of this trees industry and financial markets association. i will focus this morning on cybersecurity in the cyber services sector and what we're doing to protect customers from...
24
24
tv
eye 24
favorite 0
quote 0
gender released by the bill de burgh web site itself very vague talking about how to deal with cybersecurity threats how to deal with these global uprising how to just deal with the evolution of democratic societies across the world so very big agenda there is a list of attendees that people want to check it out and once again they're from all these industries across all boards interesting you know and some people say that the very nature of this con this conference happening the way it happens is illegal and i know that you spoke to a few of those folks let's take a listen to what they had to say. well right now we have the meeting of consortium if you will of the anglo-american empire you know some of these gentlemen have been here for the past twenty thirty forty years names like david rockefeller names like kissinger people on behalf of the rothschild banking dynasty they're inside right now and on top of those twenty to forty individuals that have been here in year after year they work through eighty to ninety to one hundred of the brightstar that they see out there in economic geo poli
gender released by the bill de burgh web site itself very vague talking about how to deal with cybersecurity threats how to deal with these global uprising how to just deal with the evolution of democratic societies across the world so very big agenda there is a list of attendees that people want to check it out and once again they're from all these industries across all boards interesting you know and some people say that the very nature of this con this conference happening the way it happens...
70
70
Jun 7, 2012
06/12
by
CSPAN2
tv
eye 70
favorite 0
quote 0
let me also add another one to the list -- cybersecurity. cybersecurity ... i saw a meeting, i guess it was about two months ago, that i've never seen in the united states senate. we had a negotiation to ask all of the senators to go to a classified setting, a secret setting, for a briefing on cybersecurity. there was a large turnout, democrats and republicans. and they spelled out to us the threat to the united states of america from china, russia, other countries, and individual actors who are trying to invade our information technology t
let me also add another one to the list -- cybersecurity. cybersecurity ... i saw a meeting, i guess it was about two months ago, that i've never seen in the united states senate. we had a negotiation to ask all of the senators to go to a classified setting, a secret setting, for a briefing on cybersecurity. there was a large turnout, democrats and republicans. and they spelled out to us the threat to the united states of america from china, russia, other countries, and individual actors who...
305
305
Jun 12, 2012
06/12
by
CURRENT
tv
eye 305
favorite 0
quote 0
cybersecurity plan? wait a minute, i thought that was classified. and then the book "bush at war," there were a thousand leaks. it was leaking like a sive. but that's okay. that's to their benefit. and then "against all enemies," richard clark's book. but when republicans do it, it's totally fine. when democrats do it, what! there are leaks in washington? i find it deeply offensive. now, at the same time, are the democrats being honest with you when they say, oh, well, leaks? here's the president, watch . >> obama: the notion that my white house would purposely release classified national security information is offensive. >> cenk: deeply offendsive. everybody is offended. come on, if they didn't get it from the obama administration, who did they get it from? of course they got it from the obama administration. "new york times" said one official after another, it's clearly their source. axelrod said no. >> someone in the room with the president was giving out some of this information or discussing classified information. >> i think the authors of al
cybersecurity plan? wait a minute, i thought that was classified. and then the book "bush at war," there were a thousand leaks. it was leaking like a sive. but that's okay. that's to their benefit. and then "against all enemies," richard clark's book. but when republicans do it, it's totally fine. when democrats do it, what! there are leaks in washington? i find it deeply offensive. now, at the same time, are the democrats being honest with you when they say, oh, well,...
168
168
Jun 7, 2012
06/12
by
CSPAN2
tv
eye 168
favorite 0
quote 0
first amendment, will not reduce transfers and accuracy of critical data, or create unacceptable cybersecurity risks. well no conclusive agreement has been reached, the movement that we have seen would not have been possible without engagement of members of this committee, and committees and members in both chambers of both parties. we are particularly thankful to senator blunt for his engagement. on april 10, without the notice and comment period dictated under the administrative procedures act, the dol announced a dramatic policy shift. a handful of reporters and editors would require to use only government -- government hardware, government lines, government notebooks from the use of modern news producing software with greater accuracy and context it provides would be prohibited. all transmissions would be via the internet, not through secure lunch to the department of labor would own and operate the line, control internet access and control internet connections creating a single point of failure. because all news organizations which share the same infrastructure. although the policy change
first amendment, will not reduce transfers and accuracy of critical data, or create unacceptable cybersecurity risks. well no conclusive agreement has been reached, the movement that we have seen would not have been possible without engagement of members of this committee, and committees and members in both chambers of both parties. we are particularly thankful to senator blunt for his engagement. on april 10, without the notice and comment period dictated under the administrative procedures...
68
68
Jun 21, 2012
06/12
by
CSPAN2
tv
eye 68
favorite 0
quote 0
how has your office created initiatives on the health of cybersecurity efforts and what has the ostp done to strengthen the national security? >> ostp has a number of responsibilities in the domain particularly of national security and you're to see prepared miscommunications and saber security there for intersect our responsibility in that domain. but more generally, on this labor security, we worked very closely of homeland security in an interagency process that is aimed at strengthening cybersecurity across the united states. we also have a variety of bodies and boards in which the government agencies set with the ceos of the major communications internet service providers and the like to build the cooperation leni between the public and private sector to better protect our electronic systems from attack and theft. as i think everybody in this room knows this is an enormous challenge and it's a high priority for the administration. >> moving on come i am very interested in the s.t.e.m. education initiatives. would he elaborate on how the s.t.e.m. initiative should be discussed an
how has your office created initiatives on the health of cybersecurity efforts and what has the ostp done to strengthen the national security? >> ostp has a number of responsibilities in the domain particularly of national security and you're to see prepared miscommunications and saber security there for intersect our responsibility in that domain. but more generally, on this labor security, we worked very closely of homeland security in an interagency process that is aimed at...
132
132
Jun 8, 2012
06/12
by
CSPAN2
tv
eye 132
favorite 0
quote 0
so now there's a connection between piracy on the one hand, and cybersecurity on the other hand. can you just talk to us about the real threats that we have in that area, both on the piracy side of this issue and on the cybersecurity, and their connections, just a little bit, so we will have some background, at least in forms the american people how serious the problem is? >> the piracy issue has a number of dimensions to it. it is an economic issue. it is a jobs issue. when the theft of our intellectual property our methods we use to produce is still my other organizations or by other countries, it has a direct impact on our economy. there's also a safety factor. healthful items, medicines that are produced in a way that are inconsistent with the great stance we have in the united states and so back to the united states are sold in other countries can put people at risk. the whole question, various parts that can be used in airplanes, other things that are not done in a way consistent with what our intellectual property, standards are done, can have a negative impact on safety i
so now there's a connection between piracy on the one hand, and cybersecurity on the other hand. can you just talk to us about the real threats that we have in that area, both on the piracy side of this issue and on the cybersecurity, and their connections, just a little bit, so we will have some background, at least in forms the american people how serious the problem is? >> the piracy issue has a number of dimensions to it. it is an economic issue. it is a jobs issue. when the theft of...
172
172
Jun 21, 2012
06/12
by
CNN
tv
eye 172
favorite 0
quote 0
the second question is, you know, cybersecurity experts, who examined the viruses that were being put independently arrived at the conclusion that this was the work of states and the two states with the motive and the technical know-how to do this were israel and the united states. i don't want to take away anything from david sanger's excellent reporting. he filled in a lot of this was well-known. >> it's well-known, but it's also seems to be this assumption that these so-called leaks from iran are coming straight from the white house, specifically. but information is coming from multiple sources around the world, is it not? >> yeah. david who broke most of this story in "new york times" by his own accounts spoke to american officials, european officials, israeli officials and cyber computer experts. so he built a mosaic from multiple, multiple sources. no one gave him the, you know -- there was no single source in my view who gave him all the details. it was building up a mosaic, a picture from multiple sources and putting together a very good piece. >> but then while all the henter
the second question is, you know, cybersecurity experts, who examined the viruses that were being put independently arrived at the conclusion that this was the work of states and the two states with the motive and the technical know-how to do this were israel and the united states. i don't want to take away anything from david sanger's excellent reporting. he filled in a lot of this was well-known. >> it's well-known, but it's also seems to be this assumption that these so-called leaks...
176
176
Jun 16, 2012
06/12
by
CSPAN2
tv
eye 176
favorite 0
quote 0
joseph lieberman is, you know, introducing all these cybersecurity provisions that actually could lead to, um, some problems with people being tha erroneously cut off of the internet. so there's a real question about would the government be better able to protect us, or would th internet service providers andae the googles of the world.ervi and many people think that the internet service providers, comcast, verizon, whoever, have more of an incentive and more of the people who actually have the technological wherewithal to doe so. and so some of the claims of the need for a government monitorinr to prevent, you know, malicious viruses as a form of warfare ise less than one would think.er >> anthony, do you have a final thought?e .. say. >> is a great question because i often look at the relationship at the cia has to do the rand has been very much apparel is the relationship the cia used to have but the soviet union. it took a long time for any of us in the civil set here to learn about the virus which was fascinating to me that it has happened to them and there is a delay and rumors t
joseph lieberman is, you know, introducing all these cybersecurity provisions that actually could lead to, um, some problems with people being tha erroneously cut off of the internet. so there's a real question about would the government be better able to protect us, or would th internet service providers andae the googles of the world.ervi and many people think that the internet service providers, comcast, verizon, whoever, have more of an incentive and more of the people who actually have the...
243
243
Jun 1, 2012
06/12
by
CSPAN
tv
eye 243
favorite 0
quote 0
that is privacy and cybersecurity by congress. yes or no? is on lies for us to get too far in front of the overall consensus. >> you find that to be rushing things, is that right? >> it should be a bad idea. >> i don't like to do that, but we have a lot of ground to cover. now, again, to both of our witnesses. i understand that some countries like russia and china believed that "policy authority for internet related public issues is the sovereign right of states and not multi stakeholders. is that correct? yes or no. >> i understand their position, yes, sir do >> do you agree with their position? >> no, we do not. >> in your opinion, is it wise to maintain international multi stakeholder regulatory process that more closely resembles the act model that was used in the united states, as opposed to what china and russia proposed? yes or no. if i understand the question correctly, i would not want a legal paradigm put in place of a multi stakeholder model. i want to make that point clear. >> it looks like we are in agreement then, at least on t
that is privacy and cybersecurity by congress. yes or no? is on lies for us to get too far in front of the overall consensus. >> you find that to be rushing things, is that right? >> it should be a bad idea. >> i don't like to do that, but we have a lot of ground to cover. now, again, to both of our witnesses. i understand that some countries like russia and china believed that "policy authority for internet related public issues is the sovereign right of states and not...
176
176
Jun 1, 2012
06/12
by
CSPAN2
tv
eye 176
favorite 0
quote 0
that is privacy and cybersecurity? yes or no? you find that to be a bit rushing things? >> i can't recall if it should be yes or no but it would be a bad idea. >> i don't like to do that but we have a lot of ground to cover. to again both of our witnesses are and stand some countries like russia and china believe that, quote, policy authority for internet related public issues this sovereign rights of states and not multi stakeholders. is that correct? yes or no? >> that is correct. >> that is their position? is that the question? as i understand their position yes. >> do you agree with that position? >> we don't. know. >> in your collective opinion, is it wise to maintain international -- international multi stakeholder regulatory process that more closely resembles the administrative procedure models that we use in the united states as opposed to what china and russia propose? yes or no? >> yes. >> if i understand the question correctly i would not one day legal paradigm put in place from the multi stakeholder model. there are
that is privacy and cybersecurity? yes or no? you find that to be a bit rushing things? >> i can't recall if it should be yes or no but it would be a bad idea. >> i don't like to do that but we have a lot of ground to cover. to again both of our witnesses are and stand some countries like russia and china believe that, quote, policy authority for internet related public issues this sovereign rights of states and not multi stakeholders. is that correct? yes or no? >> that is...
227
227
Jun 23, 2012
06/12
by
CSPAN2
tv
eye 227
favorite 0
quote 0
and we've seen organizations, cybersecurity has focused thus far on stealing secrets by criminals and governments and keeping the secrets secret and using the secrets to our advantage. but there are going to be organizations like anonymous and others that start stealing secrets from the government and in a manner akin to wikileaks, pulling them out rather than having them pushed out and exposing them. so i don't think, expect that the government will clean up its act in that regard. >> the business of secrecy is very interesting, and your account, every part of your account is accurate. i'm just, i just regret that we live in a world which has to be described this way, but it is so described. now, on secrecy it is the case that if everything is secret, nothing is secret. with the result that some things have been revealed which absolutely should not have been. and you tell a very good story about the whole swift thing which "the new york times" exposed. the government was doing nothing illegal, it was doing something very effective. and when exposed, the efficacy disappeared. disappea
and we've seen organizations, cybersecurity has focused thus far on stealing secrets by criminals and governments and keeping the secrets secret and using the secrets to our advantage. but there are going to be organizations like anonymous and others that start stealing secrets from the government and in a manner akin to wikileaks, pulling them out rather than having them pushed out and exposing them. so i don't think, expect that the government will clean up its act in that regard. >>...
75
75
Jun 14, 2012
06/12
by
CSPAN
tv
eye 75
favorite 0
quote 0
systems, medical -- smart grid, cybersecurity systems, medical devices and others. it is based on sharing cost and risk and collective intelligence. knowledge is power but knowledge shared is power multiplied. it is industry-led, a member driven. it allows for both collaborative programs and proprietary work with to protection. its broad representation of the industry's supply chain creates critical mass, drives road maps, and provides a collective voice. it is built on public-private partnerships that leverage both government and industry funding. in national government funding? as a catalyst while industrial funding increases -- initial government funding acts as a catalyst while industrial funding increases over time. they provide facilities for testing and prototyping at scale, which is critical, accelerating the creation of a dance production lines in the u.s. and commercialization of new material -- advance production lines and u.s. and commercialization of new materials and products. with collaboration in areas such as environmental safety, health standards a
systems, medical -- smart grid, cybersecurity systems, medical devices and others. it is based on sharing cost and risk and collective intelligence. knowledge is power but knowledge shared is power multiplied. it is industry-led, a member driven. it allows for both collaborative programs and proprietary work with to protection. its broad representation of the industry's supply chain creates critical mass, drives road maps, and provides a collective voice. it is built on public-private...
87
87
Jun 26, 2012
06/12
by
CSPAN
tv
eye 87
favorite 0
quote 0
one addressed the cybersecurity threat and was ordered reported in april. the other authorizes d.h.s.'s chemical facility security program is pending on the union calendar. mr. speaker, speaking of the union calendar, i would also note that this bill is receiving expedited consideration while four measures reported by the homeland security remain on the union calendar without action. with that, mr. speaker, i reserve the balance of my time. the speaker pro tempore: the gentleman reserves. the gentleman from new york. mr. king: mr. speaker, i am proud at this time to yield as much time as he may consume to the distinguished gentleman from california, mr. lungren, who is chairman of the subcommittee on cybersecurity, infrastructure protection and security technologies and during his time on the committee has contributed as much, if not more, of any other member. in fact, he returned to congress for doing all he could to enhance our homeland security. with that i yield the gentleman as much time as he may consume. the speaker pro tempore: the gentleman from ca
one addressed the cybersecurity threat and was ordered reported in april. the other authorizes d.h.s.'s chemical facility security program is pending on the union calendar. mr. speaker, speaking of the union calendar, i would also note that this bill is receiving expedited consideration while four measures reported by the homeland security remain on the union calendar without action. with that, mr. speaker, i reserve the balance of my time. the speaker pro tempore: the gentleman reserves. the...
96
96
Jun 7, 2012
06/12
by
CSPAN2
tv
eye 96
favorite 0
quote 0
so the administration has produced a cybersecurity bill to keep america safe from that kind of attack. well, unfortunately, it doesn't meet mr. cantor's test. he's told us we can't do anything the rest of the year. all we can do is campaign, politic, give speeches. we have a responsibility as members of the senate and the house to especially is the challenges facing this nation. number one, create the jobs, invigorate the economy, getting this country moving forward. second, keeping america safe. i might say to mr. cantor cantor from virginia, take some time during your next recess, which is next week, and go over to the central intelligence agency and sit down with them and talk about cybersecurity and the danger to the united states and ask them if we can wait six months or a year to get back to this issue? i know what they're going to say. they are geeing to remind him that he swore to defend and uphold this great united states of america. and if he's going to do it he ought to roll up his sleeves and go to work instead of coming up with an keeks four political ca. this really come
so the administration has produced a cybersecurity bill to keep america safe from that kind of attack. well, unfortunately, it doesn't meet mr. cantor's test. he's told us we can't do anything the rest of the year. all we can do is campaign, politic, give speeches. we have a responsibility as members of the senate and the house to especially is the challenges facing this nation. number one, create the jobs, invigorate the economy, getting this country moving forward. second, keeping america...
114
114
Jun 8, 2012
06/12
by
CSPAN2
tv
eye 114
favorite 0
quote 0
now there is a connection between cybersecurity and cyberthreats. can you talk about the real threats that we have in those areas, both on the policy side and on the cybersecurity side? that way we can have some background, and that elise informs the american people how serious the problem is. >> the piracy issue, it has a number of dimensions to it. it is an economic issue. it is a jobs issue. the method that they used to produce things is stolen. it has a direct impact on our economy. there is also a safety factor, health items, medicines that are produced in ways that are inconsistent with the great standards we have in the united states, it can put people at risk. the whole question -- there are parts that can be used in airplanes, other things that are not done in a way, consistent in which our intellectual property standards can have a negative impact on safety that way. the piracy question is one that has economic consequences, as well as safety consequences. as one looks at the whole cyberissue, again, these are national security issues. the
now there is a connection between cybersecurity and cyberthreats. can you talk about the real threats that we have in those areas, both on the policy side and on the cybersecurity side? that way we can have some background, and that elise informs the american people how serious the problem is. >> the piracy issue, it has a number of dimensions to it. it is an economic issue. it is a jobs issue. the method that they used to produce things is stolen. it has a direct impact on our economy....
221
221
Jun 5, 2012
06/12
by
FOXNEWS
tv
eye 221
favorite 0
quote 0
microsoft has released a software fix to fight the virus and cybersecurity experts say the hackers successght actually lead to something kind of good. on one hand other hackers might try to use similar techniques to break into other computer systems. now that the flame has been discovered experts say it might be easier to shut down similar types of viruses before they do any major damage. if you want to update your computer with the software fix microsoft put out there you have to click on a screen that looks almost exactly like the ones the hackers developed. there you go. jenna: we're talking about, strange things move above us in the studio here. i don't know if there is any connection, rick. >> reporter: i will look into it. jenna: no more talking about the flame virus. jon: someone hacked into our lighting grid. >>> it is being called the second biggest election in america this year. the high-stakes election recall of wisconsin's governor. the battle might hardly be over even after the results are announced tonight, not by a longshot . a little bird told me about a band... ♪ an old ma
microsoft has released a software fix to fight the virus and cybersecurity experts say the hackers successght actually lead to something kind of good. on one hand other hackers might try to use similar techniques to break into other computer systems. now that the flame has been discovered experts say it might be easier to shut down similar types of viruses before they do any major damage. if you want to update your computer with the software fix microsoft put out there you have to click on a...