108
108
Apr 23, 2015
04/15
by
CSPAN
tv
eye 108
favorite 0
quote 1
chairman to the issue of cybersecurity and national cybersecurity protection. the amendment that i'm offering now states that the secretary of homeland security may consult with sector specific agencies, businesses, and stakeholders to produce and submit to the committee on homeland security of the house of representatives and the committee on homeland security and government affairs of the senate a report on how best to align federally funded cybersecurity research and development activities with private sector efforts to protect privacy and civil liberties while assuring security and resilience of the nation's critical infrastructure. again i can recount the incidences that have brought this issue to the attention of the american people. certainly one of the moats striking -- most striking wases the actions of mr. snoweden. it's important we develop research that blocks those who would intend to do ill to the american people. it includes a development objective to enable the secure and resilient design and construction of critical infrastructure and more comp
chairman to the issue of cybersecurity and national cybersecurity protection. the amendment that i'm offering now states that the secretary of homeland security may consult with sector specific agencies, businesses, and stakeholders to produce and submit to the committee on homeland security of the house of representatives and the committee on homeland security and government affairs of the senate a report on how best to align federally funded cybersecurity research and development activities...
97
97
Apr 22, 2015
04/15
by
CSPAN
tv
eye 97
favorite 0
quote 0
a cybersecurity bill. in fact, it can remove the -- reduces the focus of our efforts on combating cybersecurity when you open it up to everything under the sun. by including a vast array of other reasons, the government can invoke, to store and share personal information. the authors of the bill essentially transform the information sharing initiative into a broad new surveillance program. yes, rather than a cybersecurity measure effectively these bills are a stalking horse for broad new surveillance authority by multiple agencies of the federal government. without warrants. without oversight. h.r. 1560 empowers federal entities to hold on to any information about an individual that may be related to any of the many law enforcement purposes lumped into the bill. that gives the federal government enormous incentives to retain and scrutinize personal information, even if it's unrelated to a cybersecurity threat. the scope of the use authorizations also undermine due process protections that exist to protecti
a cybersecurity bill. in fact, it can remove the -- reduces the focus of our efforts on combating cybersecurity when you open it up to everything under the sun. by including a vast array of other reasons, the government can invoke, to store and share personal information. the authors of the bill essentially transform the information sharing initiative into a broad new surveillance program. yes, rather than a cybersecurity measure effectively these bills are a stalking horse for broad new...
53
53
Apr 5, 2015
04/15
by
CSPAN
tv
eye 53
favorite 0
quote 0
he talks about the growing threats to cybersecurity. president obama: this week together with our allies and partners, we reached an historic understanding with iran, which if fully implemented, will prevent it from obtaining a nuclear weapon and make our country, our allies, and our world safer. this framework is the result of tough, principled diplomacy. it's a good deal -- a deal that meets our core objectives, including strict limitations on iran's program and cutting off every pathway that iran could take to develop a nuclear weapon. this deal denies iran the plutonium necessary to build a bomb. it shuts down iran's path to a bomb using enriched uranium. iran has agreed that it will not stockpile the materials needed to build a weapon. moreover, international inspectors will have unprecedented access to iran's nuclear program because iran will face more inspections than any other country in the world. if iran cheats, the world will know it. if we see something suspicious we will inspect it. so this deal is not based on trust, it's
he talks about the growing threats to cybersecurity. president obama: this week together with our allies and partners, we reached an historic understanding with iran, which if fully implemented, will prevent it from obtaining a nuclear weapon and make our country, our allies, and our world safer. this framework is the result of tough, principled diplomacy. it's a good deal -- a deal that meets our core objectives, including strict limitations on iran's program and cutting off every pathway that...
44
44
Apr 5, 2015
04/15
by
CSPAN
tv
eye 44
favorite 0
quote 0
the bipartisan cybersecurity information sharing act of 2015 is sponsored with me by dianne feinstein and senator john mccain. it creates a cybersecurity information sharing environment that works much like a "neighborhood watch" program -- allowing all participants to get a better understanding of the current cybersecurity threats that may be used against them. and while we're ultimately trying to keep your information private, let's also talk about how this bill is going to ensure that's the case on the government's end as well. information sharing's covered by the bill and its 100-percent voluntary. no one is forced to share information in any way. the bill requires that a company removes private data before sharing anything with the government. no company is allowed to share data unless it is directly related to the cyber-attack itself. after hundreds of calls with the government, business community and civil liberties groups, i am confident that senator feinstein, senator mccain, and i have put together a balanced approach that will help your private information stay just that wa
the bipartisan cybersecurity information sharing act of 2015 is sponsored with me by dianne feinstein and senator john mccain. it creates a cybersecurity information sharing environment that works much like a "neighborhood watch" program -- allowing all participants to get a better understanding of the current cybersecurity threats that may be used against them. and while we're ultimately trying to keep your information private, let's also talk about how this bill is going to ensure...
116
116
Apr 23, 2015
04/15
by
CSPAN
quote
eye 116
favorite 0
quote 1
amend homeland security act of 2002 to enhance multidirectional sharing of information related to cybersecurity risk and strengthen privacy and civil liberties protections, and for other purposes. the chair: pursuant to the rule the bill is considered as read the first time. the gentleman from texas, will control 30 minutes. the chair recognizes the gentleman from texas. mr. mccaul: thank you mr. speaker. i yield myself such time as i may consume. the chair: the gentleman is recognized. mr. mccaul: i'm pleased to bring to the floor h.r. 1731, the national cybersecurity protection act -- advancement act, a pro-privacy, pro-security bill that we desperately need to safeguard our digital networks. the i'd like to commend subcommittee chairman, mr. ratcliffe, for his work on this bill. as well as our minority counterparts, including ranking member thompson and subcommittee
amend homeland security act of 2002 to enhance multidirectional sharing of information related to cybersecurity risk and strengthen privacy and civil liberties protections, and for other purposes. the chair: pursuant to the rule the bill is considered as read the first time. the gentleman from texas, will control 30 minutes. the chair recognizes the gentleman from texas. mr. mccaul: thank you mr. speaker. i yield myself such time as i may consume. the chair: the gentleman is recognized. mr....
47
47
Apr 6, 2015
04/15
by
CSPAN2
tv
eye 47
favorite 0
quote 0
is cybersecurity. so that is always going to be a challenge. i will tell you over the last five years that n kiick has really stood up with -- ncic has stood up with we'll credentialed individuals. anybody watching this podcast i would encourage them to working with the department of homeland security. it is going to evolve. we'll have several portals. i'm sure that question will come up. this will be the primary civilian interface to the private sector. the future of the ncic and dhs and legislatively too because it already has been authorized, it is a bright future i think for the department of homeland security. >> actually the fourth question on my list but we'll take, we have three more, four more in the audience. we'll take them in sequence. >> thank you for your brief congressman. my question is, as you, your team drafts this bill, and in consideration that if it becomes, it will be legislated, that is hard to say what consideration has been given include other countries who are probably considering, you know, legislation to support info
is cybersecurity. so that is always going to be a challenge. i will tell you over the last five years that n kiick has really stood up with -- ncic has stood up with we'll credentialed individuals. anybody watching this podcast i would encourage them to working with the department of homeland security. it is going to evolve. we'll have several portals. i'm sure that question will come up. this will be the primary civilian interface to the private sector. the future of the ncic and dhs and...
113
113
Apr 26, 2015
04/15
by
MSNBCW
tv
eye 113
favorite 0
quote 0
. >> let's switch to cybersecurity if it's okay.al alexander said it's the largest transfer of wealth in history. it's about $4 billion a year just in cyber-crime. you had an announce thmt weekend in san francisco, what is the department of homeland security doing to combat cybersecurity, what needs to be done across the country? >> the essential mission of the department of homeland security is to work with the private sector, share information with the private sector to promote the cybersecurity in the private sector. we also are responsible for the cybersecurity of the federal civilian dot-gov world. so i was in san francisco earlier it week to give a talk to the rsa conference the largest cybersecurity conference out there. something like 20,000 people. it was a great opportunity for me to talk about our cybersecurity mission. i announced a couple of things including the opening of an office of the department in silicon valley so that we can better build our partnerships out there. i'm pleased that congress is moving on cybersec
. >> let's switch to cybersecurity if it's okay.al alexander said it's the largest transfer of wealth in history. it's about $4 billion a year just in cyber-crime. you had an announce thmt weekend in san francisco, what is the department of homeland security doing to combat cybersecurity, what needs to be done across the country? >> the essential mission of the department of homeland security is to work with the private sector, share information with the private sector to promote...
45
45
Apr 27, 2015
04/15
by
CSPAN
tv
eye 45
favorite 0
quote 0
i want to thank him for his leadership over the many years on this important issue of cybersecurity. this legislation comes at a critical time of rising cyberthreats and attacks on our digital networks. cyber breaches and attacks are affecting americans' privacy, security and prosperity. individuals are having their most private information compromised. businesses are seeking their intellectual -- getting their intellectual property stolen and their networks damaged. the country's critical infrastructure is being probed by foreign enemies. detecting and defending against these digital assaults requires timely and robust information sharing between the public and private secondors. this exchange of data is crucial to connecting the dots. identifying cyberattacks and -- shutting them down. protecting cybernetworks act will enable private companies to share cyberthreat information on a voluntary basis with the federal government. this bill provides simple liability protection for sharing cyberattack indicators through trusted civilian agency portals. again, i commend chairman nunes for
i want to thank him for his leadership over the many years on this important issue of cybersecurity. this legislation comes at a critical time of rising cyberthreats and attacks on our digital networks. cyber breaches and attacks are affecting americans' privacy, security and prosperity. individuals are having their most private information compromised. businesses are seeking their intellectual -- getting their intellectual property stolen and their networks damaged. the country's critical...
465
465
Apr 22, 2015
04/15
by
CSPAN
tv
eye 465
favorite 0
quote 0
about cybersecurity threats and for other purposes. the speaker pro tempore: the house will be in order. the house will be in order. members are asked to take their seats. the house will be in order. for what purpose does the gentlewoman from new york seek recognition? >> mr. speaker, i have a motion to recommit at the desk. the speaker pro tempore: is the gentlewoman opposed to the bill? >> i'm opposed to it in its current form. the speaker pro tempore: the gentlewoman qualifies. the clerk will report the motion. the clerk: miss rice of new york moves to recommit the bill h.r. 1560 to the select committee on intelligence permanent select with the instructions to report the same back to the house forthwith well the following amendment. page 22 line 14, strike and. page 22 line 16, strike the period and insert a semicolon. page 22, after line 16, insert the following. the speaker pro tempore: the gentleman from california is recognized. >> consent to dispense with the reading. the speaker pro tempore: is there objection to dispense with
about cybersecurity threats and for other purposes. the speaker pro tempore: the house will be in order. the house will be in order. members are asked to take their seats. the house will be in order. for what purpose does the gentlewoman from new york seek recognition? >> mr. speaker, i have a motion to recommit at the desk. the speaker pro tempore: is the gentlewoman opposed to the bill? >> i'm opposed to it in its current form. the speaker pro tempore: the gentlewoman qualifies....
45
45
Apr 6, 2015
04/15
by
CSPAN2
tv
eye 45
favorite 0
quote 0
he also outlines new cybersecurity ledge shun which
he also outlines new cybersecurity ledge shun which
68
68
Apr 9, 2015
04/15
by
CSPAN3
tv
eye 68
favorite 0
quote 0
and this whole idea of cybersecurity and cyber defense.so what brings mike rogers to spend some time with you today? as the commander of the united states cyber command, three primary missions. like many of you responsibility for defending networks. in this case responsibility for defending the networks of the department of defense. pretty large organization multiple millions of people, spreading around the globe, operating from fixed loexz, multiple locations at multiple levels of security. second issue for united states cyber command is to generate the dedicated cyber workforce, if you will, that the department is creating. that workforce will work from the defensive side of the cyber mission to the offensive side. that's about 6200 people. we're about halfway through the process of creating that workforce. >> the third mission set for u.s. cyber command is when directed by the president or the secretary of defense to defend critical u.s. infrastructure. as some of you are aware, the federal government has designated 16 different segment
and this whole idea of cybersecurity and cyber defense.so what brings mike rogers to spend some time with you today? as the commander of the united states cyber command, three primary missions. like many of you responsibility for defending networks. in this case responsibility for defending the networks of the department of defense. pretty large organization multiple millions of people, spreading around the globe, operating from fixed loexz, multiple locations at multiple levels of security....
104
104
Apr 22, 2015
04/15
by
KGO
tv
eye 104
favorite 0
quote 0
the proposed new office will help tech companies provide and improve cybersecurity. the government also hopes to improve its strained relationship with the technology industry. speaking in san francisco today, the director of homeland security, the secretary said that cybersecurity must be a partnership between government and private sector. we need each other and we must work together. >>> disturbing new video today out of southern california shows a confrontation between a woman and a deputy u.s. marshall. 34-year-old beatrice paez says she was out for a walk sunday afternoon in southgate when she stumbled on a large federal operation. the marshals were in the process of arresting several bikers and they did not appreciate paez recording the operation and you can see one slammed it to the ground and kicked it. a neighbor recorded that from across the street. the marshalls say they are reviewing that footage. >> one san francisco county jail will soon be equipped with body cameras. ross mirkarimi announced the deputies are expected to start using those cameras this
the proposed new office will help tech companies provide and improve cybersecurity. the government also hopes to improve its strained relationship with the technology industry. speaking in san francisco today, the director of homeland security, the secretary said that cybersecurity must be a partnership between government and private sector. we need each other and we must work together. >>> disturbing new video today out of southern california shows a confrontation between a woman and...
145
145
Apr 14, 2015
04/15
by
CNNW
tv
eye 145
favorite 0
quote 0
the report goes on to say this is all based on interviews with cybersecurity experts, as well as aviation then outline a couple of theories. they say someone with a laptop could, "a," common deer the aircraft and could put a virus into the flight control computers, they could also jeopardize the safety of the flight by taking control of the computers and, lastly they say, a hacker could take over the warning systems or the navigational systems of the aircraft and we know those are all critical components here. again, this is just coming out but the headline one of the headlines is that they found a vulnerability with these highly automated aircraft and they are saying that the faa needs to address it at this point, brooke. >> this is not something any of us want to hear when we hop on planes in the wake of all those questions and the plane going down in the french alps. there have to be if they're realizing this this potential or hacking there has to be fixes or recommendations in the report. what do they recommend? >> well we do know that the congressman, peter defast so the ranking memb
the report goes on to say this is all based on interviews with cybersecurity experts, as well as aviation then outline a couple of theories. they say someone with a laptop could, "a," common deer the aircraft and could put a virus into the flight control computers, they could also jeopardize the safety of the flight by taking control of the computers and, lastly they say, a hacker could take over the warning systems or the navigational systems of the aircraft and we know those are all...
99
99
Apr 29, 2015
04/15
by
FBC
tv
eye 99
favorite 0
quote 0
earlier attorney general loretta lynch outlined cybersecurity as a top priority for the nation. listen. >> i firmly believe that cybersecurity must be among the highest priorities for the department of justice. and that is why as attorney general, i will seek to build on the already outstanding work of the women and men of the department. liz: akamai ceo and co-founder tom leighton joins us now. perfect timing, tom. loretta lynch clearly understands this is an issue. some might say late to the party, you've been aware for a long time. >> this is a big deal, pretty much every enterprise has to worry about cybersecurity. there's a lot of malicious entities trying to bring down websites. steal confidential information like credit cards and to corrupt content from news sites to put their story on your site. and akamai's job is to prevent that. liz: how are you guys doing that as the let's build a better mousetrap people out there, meaning the hackers get smarter and smarter? >> our approach is different. we defend websites by intercepting the traffic close to the origin of the malic
earlier attorney general loretta lynch outlined cybersecurity as a top priority for the nation. listen. >> i firmly believe that cybersecurity must be among the highest priorities for the department of justice. and that is why as attorney general, i will seek to build on the already outstanding work of the women and men of the department. liz: akamai ceo and co-founder tom leighton joins us now. perfect timing, tom. loretta lynch clearly understands this is an issue. some might say late...
124
124
Apr 3, 2015
04/15
by
CSPAN
tv
eye 124
favorite 0
quote 0
cybersecurity. that will always be a challenge. i will tell you of the last five years, they really have well credentialed individuals. anybody watching this podcast, i would encourage them to look at -- look into working with the department of homeland security. we have several portals, and this is going to be the primary civilian interface with the private sector. the future of the ncic and dhs and legislatively, too, because it has been authorized, it's a bright future for the department of homeland security. host: that is actually the fourth question all my list. -- on my list. we have four more in the audience we will take in sequence. >> my question is, as your team drafted this bill, consideration that it will be legislated, what consideration has been given to include other countries who are probably considering legislation to support information sharing? and if you could talk about that in the context of u.s. multinationals that also have footprints in those countries and is there any consideration for reciprocity if count
cybersecurity. that will always be a challenge. i will tell you of the last five years, they really have well credentialed individuals. anybody watching this podcast, i would encourage them to look at -- look into working with the department of homeland security. we have several portals, and this is going to be the primary civilian interface with the private sector. the future of the ncic and dhs and legislatively, too, because it has been authorized, it's a bright future for the department of...
56
56
Apr 28, 2015
04/15
by
CSPAN
tv
eye 56
favorite 0
quote 0
i would like to talk to you about cybersecurity. the majority leader has announced that he's going to try to have cyberweek here on the senate floor at some point. there's a lot of activity in the house. we have bipartisan bills that are pending on information sharing between federal agencies and the big communications providers. on agency public reporting of the cyberthreat to increase public awareness, of coordinating national notification when companies have data breaches. and only updating some of the criminal penalties. when we first were working on comprehensive cybersecurity legislation, another main piece of this effort was on the critical infrastructure piece. now what i hear quite widely is that the d.h.s.-led framework process that has pulled together a great number of critical infrastructure industry sectors is going very well and that as a result of that there is no immediate pressure for legislation in that area. now, there may not be an immediate need for legislation in that area, but of all the different areas that i
i would like to talk to you about cybersecurity. the majority leader has announced that he's going to try to have cyberweek here on the senate floor at some point. there's a lot of activity in the house. we have bipartisan bills that are pending on information sharing between federal agencies and the big communications providers. on agency public reporting of the cyberthreat to increase public awareness, of coordinating national notification when companies have data breaches. and only updating...
397
397
Apr 27, 2015
04/15
by
CSPAN
tv
eye 397
favorite 0
quote 0
trott: i rise to speak about the need for a stronger cybersecurity efforts in our country. personal data flows through the internet with great speed and data about people is gathered in an instant. the use of social media has opened up our lives and this is the same world where hackers steal millions of personal records from people in our distributes. most members of congress have been affected by hackers. internet criminals pose a dire threat to our government on the local state and federal level. the federal government has the resources but our local municipalities do not. five southeast michigan counties, living ton monroe oakland, washington, wayne in the state of michigan came together to build the cybersecurity assessment for everyone. it provides a strong point for governments to begin assessing their cybersecurity needs and taking steps to respond. the assessment is an excel download. i commend these local michigan governments for committing the resources to develop such a tool and encourage my colleagues to work together to find the right solutions to fight cybercr
trott: i rise to speak about the need for a stronger cybersecurity efforts in our country. personal data flows through the internet with great speed and data about people is gathered in an instant. the use of social media has opened up our lives and this is the same world where hackers steal millions of personal records from people in our distributes. most members of congress have been affected by hackers. internet criminals pose a dire threat to our government on the local state and federal...
169
169
Apr 14, 2015
04/15
by
CNNW
tv
eye 169
favorite 0
quote 0
> well again, they are saying that they are talking to -- they're talking to aviation experts, cybersecurityxperts, however, they made very clear that they haven't done any actual testing or mock-ups of these scenarios but here's what these experts say could essentially happen. using a laptop someone could take control of the aircraft put a virus onto the airplane's computer systems or take control of the plane's computers and lastly they say they could take over the warning systems and the navigational systems and we all know those are extremely critical. >> renee, appreciate it. >>> the money lead if that scared you this one might infuriate you. watch what happens to some checked luggage in this must-see hidden camera video from miami international airport. you can see baggage hammers going through suitcase after suitcase stealing valuable items. it is a problem in airports nationwide. senior investigative correspondent drew griffin shows us how they pull it off and which airports are the riskiest for your valuables. >> these are airport baggage handlers. thieves. inside the belly of a pla
> well again, they are saying that they are talking to -- they're talking to aviation experts, cybersecurityxperts, however, they made very clear that they haven't done any actual testing or mock-ups of these scenarios but here's what these experts say could essentially happen. using a laptop someone could take control of the aircraft put a virus onto the airplane's computer systems or take control of the plane's computers and lastly they say they could take over the warning systems and the...
439
439
Apr 26, 2015
04/15
by
KYW
tv
eye 439
favorite 0
quote 0
here high school students can take cybersecurity the way other kids might anyway geometry and englishthey have no problem being called nerds. >> i am definitely a nerd. >> nerds have jobs. >> he's not kidding. these kids already have after school jobs and it's not flipping burgers. >> some of us work at the local engineering firm. sometimes they forget we're in high school. >> they're calling us at like 1:30 i'm in the middle of my fifth period. >> just listening to these kids talk is easy to forget they're only in high school. >> cyberwarfare is really attractive to other countries, it's affordable and allows them to strike at other countries and whatever political interest they don't like with relative impunity and takes damage. >> it's unique to attack but very difficult to defend. >> all the experts agree, america needs lot more kids like the ones in huntsville. hacker attacks aren't just occasional headlines any more they have become routine. >> secret service is investigating one of the largest threats of credit card and debit card information ever. >> reports say hackers may ha
here high school students can take cybersecurity the way other kids might anyway geometry and englishthey have no problem being called nerds. >> i am definitely a nerd. >> nerds have jobs. >> he's not kidding. these kids already have after school jobs and it's not flipping burgers. >> some of us work at the local engineering firm. sometimes they forget we're in high school. >> they're calling us at like 1:30 i'm in the middle of my fifth period. >> just...
41
41
Apr 14, 2015
04/15
by
CSPAN3
tv
eye 41
favorite 0
quote 0
. >> cybersecurity given the emphasis in 3.0, when will cybersecurity become a source selection criteria along with cost schedule forum ans? >> i hadn't thought about it in those perm sterms, but it should be a requirement period on our program. i can see it being inculcated into risk assessments and so on. and compliance with basic security requirements already is a requirement. it is a contractual requirement. the reason we made the change last year was to put a contractual requirement on all of our contracts that people had to protect data to a certain standard. that's an enforceable requirement. so -- through review about the government, the same way dcmo would enforce any other contract requirement. dcma, excuse me. >> you're not mulling a criteria in source selection to -- >> it is more of a pass/fail tony. you got to be good enough on cybersecurity to get to do the job is really what we're after. last one? one more. >> south korean newspaper. it is not directly related to -- you're in charge of the acquisition. recently because of the controversy over that system more koreans came
. >> cybersecurity given the emphasis in 3.0, when will cybersecurity become a source selection criteria along with cost schedule forum ans? >> i hadn't thought about it in those perm sterms, but it should be a requirement period on our program. i can see it being inculcated into risk assessments and so on. and compliance with basic security requirements already is a requirement. it is a contractual requirement. the reason we made the change last year was to put a contractual...
99
99
tv
eye 99
favorite 0
quote 0
the issue is you're going against the world's second best cybersecurity offense team in the russians that. it's ridiculous that we can say, okay, the secretary of state is allowed to run her own e-mail server from her home in upstate new york. this is -- and part of the reason for that understanding is they new the state department network was not secure. charles: is that suggesting hillary's home made network at home is more secure? >> no no, no absolutely not. i understand why they may have used that as a decision-maker, but she cannot compete with the monitoring resources, i'm sorry, ms. clinton cannot compete with the monitoring resources that the state department can provide. and she's in the perfect position of authority to say, or was at the time, to say we need to fix this we need a strong cybersecurity policy for one of the most important agencies we have in the government the state department. makes no sense. so i don't think it's a lack of sophistication, i think it's a lack of understanding that we can't make exceptions for people who are high enough up to say you know wh
the issue is you're going against the world's second best cybersecurity offense team in the russians that. it's ridiculous that we can say, okay, the secretary of state is allowed to run her own e-mail server from her home in upstate new york. this is -- and part of the reason for that understanding is they new the state department network was not secure. charles: is that suggesting hillary's home made network at home is more secure? >> no no, no absolutely not. i understand why they may...
83
83
tv
eye 83
favorite 0
quote 0
. >> right now i support the defense industry and we cannot find enough cybersecurity professionals.o said one of the greatest risks to our national security right now is cybersecurity and if you don't have coding capabilities, you're not going to be able to protect your airways, transportation, electronic grid, all of these things are susceptible to hacking. a homeland security professional give a briefing and they said their greatest concern is not having enough u.s. citizens to fill jobs because you have to be able to be eligible. so we are adding great risk. >> if your kids want to take one of or the other, what would it be? >> i would actually go for coding. but my high school math teacher would say that she would be sad that certain things didn't make the list. [laughter] but listen, language skills are wonderful, but they don't come close to technical expertise. and every wealthy person in america but their kid needed to learn japanese, they are going to possibly compete in the global economy, thankfully dearborn speaking english are incredibly lucky because it is the language
. >> right now i support the defense industry and we cannot find enough cybersecurity professionals.o said one of the greatest risks to our national security right now is cybersecurity and if you don't have coding capabilities, you're not going to be able to protect your airways, transportation, electronic grid, all of these things are susceptible to hacking. a homeland security professional give a briefing and they said their greatest concern is not having enough u.s. citizens to fill...
111
111
Apr 29, 2015
04/15
by
CSPAN
tv
eye 111
favorite 0
quote 0
i would like to talk to you about cybersecurity. the majority leader has announced that he's going to try to have cyberweek here on the senate floor at some point. there's a lot of activity in the house. we have bipartisan bills that are pending on information sharing between federal agencies and the big communications providers. on agency public reporting of the cyberthreat to increase public awareness, of coordinating national notification when companies have data breaches. and updating some of the criminal penalties. when we first were working on comprehensive cybersecurity legislation, another main piece of this effort was on the critical infrastructure piece. now what i hear quite widely is that the d.h.s.led framework process that has pulled together a great number of critical infrastructure industry sectors is going very well and that as a result of that there is no immediate pressure for legislation in that area. now, there may not be an immediate need for legislation in that area, but of all the different areas that i menti
i would like to talk to you about cybersecurity. the majority leader has announced that he's going to try to have cyberweek here on the senate floor at some point. there's a lot of activity in the house. we have bipartisan bills that are pending on information sharing between federal agencies and the big communications providers. on agency public reporting of the cyberthreat to increase public awareness, of coordinating national notification when companies have data breaches. and updating some...
266
266
Apr 8, 2015
04/15
by
FOXNEWSW
tv
eye 266
favorite 0
quote 0
the administration and government says we'll fine companies for weak cybersecurity.hy not fine yourself? fine yourself for weak cyber security? >> i am saying something that might surprise a lot of people. remember mitt romney last year, two years ago, russia was biggest political threat in the world he was right. >> he was right. >> no, he was right. i will say that out loud. he was right. because they will stop at nothing. andrea, you are so right. risch shuns, i'm russian. my grandparents went through world war ii. they would have told you they will take any amount of pain, you're absolutely right. we can impose sanctions. all it will do is strengthen putin. putin would love nothing more to put more sanctions on them. it defines the narrative of west against russia. he is don't like being humiliated by the west. >> russia is in there and china is in there as well. >> basically what the blockbusters movies are made of. we go to bed at night with a sense of security we're all secure. we're safe, on our banks are safe. our military is safe. when we're really not. i m
the administration and government says we'll fine companies for weak cybersecurity.hy not fine yourself? fine yourself for weak cyber security? >> i am saying something that might surprise a lot of people. remember mitt romney last year, two years ago, russia was biggest political threat in the world he was right. >> he was right. >> no, he was right. i will say that out loud. he was right. because they will stop at nothing. andrea, you are so right. risch shuns, i'm russian....
154
154
Apr 8, 2015
04/15
by
WUSA
tv
eye 154
favorite 0
quote 0
cybersecurity remains a concern.discernible] new survey by the organization of american states found that 40% of those polled have fought off attempts to shut down their computer networks. another 54% dealt with hackers trying to manipulate their equipment through a control system. >>> ban lifted. d.c. government workers can travel to indiana for official business. the mayor tweeted she lifted the district's travel ban. >>> having trouble tracking down your ex? try facebook. manhattan supreme court justice matthew cooper has ruled a brooklyn nurse can serve her divorce papers over facebook's private messaging system. she said they tried every other route to get a hold of her estranged husband and was finally forced to resort to social media. unfortunately her ex has yet to respond. >>> new data from expense management company certify shows business travelers are moving away from traditional taxis towards ride hailing apps. the report shows 47% of travelers use services like upper and lyft instead of standing in the t
cybersecurity remains a concern.discernible] new survey by the organization of american states found that 40% of those polled have fought off attempts to shut down their computer networks. another 54% dealt with hackers trying to manipulate their equipment through a control system. >>> ban lifted. d.c. government workers can travel to indiana for official business. the mayor tweeted she lifted the district's travel ban. >>> having trouble tracking down your ex? try facebook....
165
165
Apr 18, 2015
04/15
by
WCAU
tv
eye 165
favorite 0
quote 0
chemical heritage foundation where women were able to participate in dozens of workshops like cybersecurityday, talking about realizing your dreams. the conference was sponsored by comcast, the parent company of nbc 10. >>> financial help is on the way for the former rebel casino hotel in atlantic city. wells fargo has offered $300,000 to get the electricity turned back on. the company is offering to pay for two weeks of electrical service from proceeds of the $82 million sale to prevent a possible catastrophe if the building catches fire. florida developer glen straub bought the building back on april 7th. >>> on your mark get set and get running. today was a gorgeous day at william pen charter school for the special olympics annual spring games competition. and more than 250 athletes competed in track and field events, basketball and tennis. a family friendly olympic town also provided entertainment for spectators and families. hundreds of volunteers and dozens of coaches helped make today's event possible. >>> and a first of its kind conference in center city today for young adult cancer
chemical heritage foundation where women were able to participate in dozens of workshops like cybersecurityday, talking about realizing your dreams. the conference was sponsored by comcast, the parent company of nbc 10. >>> financial help is on the way for the former rebel casino hotel in atlantic city. wells fargo has offered $300,000 to get the electricity turned back on. the company is offering to pay for two weeks of electrical service from proceeds of the $82 million sale to...
257
257
Apr 14, 2015
04/15
by
CNNW
tv
eye 257
favorite 0
quote 0
now, this is all based on interviews with cybersecurity experts aviation experts.ially all agree that using a laptop someone in theory, as you mentioned, could commandeer an aircraft, put a virus into the flight control computers. jeopardize the safety of the flight by taking control of the plane's computers, or they could even take over warning systems or even navigational systems. the report also explains that you know as the air traffic control system is upgraded to use more internet based technology both on the ground and in planes the avionics of these aircraft can be compromised. we do know that older planes they're not as highly connected to the internet so the risk is a lot less for aircraft 20 years and older. i do want to bring up one thing. one of lawmakers who requested this study, this is congressman defazio. he essentially says this to cnn. what needs to happen now is that the faa has to focus on aircraft certification standards that would essentially prevent a terrorist group from using a laptop either onboard or on the ground and take control of the
now, this is all based on interviews with cybersecurity experts aviation experts.ially all agree that using a laptop someone in theory, as you mentioned, could commandeer an aircraft, put a virus into the flight control computers. jeopardize the safety of the flight by taking control of the plane's computers, or they could even take over warning systems or even navigational systems. the report also explains that you know as the air traffic control system is upgraded to use more internet based...
294
294
Apr 8, 2015
04/15
by
FOXNEWSW
tv
eye 294
favorite 0
quote 1
they don't really care that much about security and cybersecurity. had the white house intruder. you have benghazi, open borders down there in mexico, the secret service is running wild. i don't know what's going on. the chinese, the russians are hacking us. there's really just no priority there. >> you know what i love about that? i love like, you can take anything and connect it right back. >> i connect the dots. >> that is amazing. >> i share, you're amazing. but let me just say in response to, that president obama did sign, i believe it was just last week, an order that said there are will be sanctions againsted users. >> ooh sanctions. i'm sure russia is quaking in their boots. it worked in crimea. >> i think these cyber attacks are a daily occurrence, an attempt to get in, that is happening on a daily basis. we assume that veshd have that and the state department, make sure that we have more protections. >> and we could hire some russians. >> it does show how reckless hillary clinton's decision was to have a private e-mail server at her home. i
they don't really care that much about security and cybersecurity. had the white house intruder. you have benghazi, open borders down there in mexico, the secret service is running wild. i don't know what's going on. the chinese, the russians are hacking us. there's really just no priority there. >> you know what i love about that? i love like, you can take anything and connect it right back. >> i connect the dots. >> that is amazing. >> i share, you're amazing. but let...
122
122
Apr 24, 2015
04/15
by
CSPAN3
tv
eye 122
favorite 0
quote 0
i'm all for cybersecurity. i think there's a flaw in current law that doesn't allow companies to share what they ought to be able to share. they ought to share, but that the legislation is going way overboard in terms of describing and permitting the sharing of that information. from. >> that's very helpful and let's get the panel's thought on the categories of debates you've talked at. first, bulling collection, then the warrant for contact an then some of those cybersecurity issues. counsel for chelsea manning, is the bulk collection ban by congress necessary or do you believe that bulk collection as practiced by the nsa violated the fourth amendment as at least one court has held? >> i think a ban is necessary. because i'm on the fence as to whether dock trinly there's an issue and there may not be an issue, so that's why i think, a ban is is necessary for normative reasons. however, the examples that we give as to the harm, natural privacy, harm that derives from bulk collection, especially to 15 bulk colle
i'm all for cybersecurity. i think there's a flaw in current law that doesn't allow companies to share what they ought to be able to share. they ought to share, but that the legislation is going way overboard in terms of describing and permitting the sharing of that information. from. >> that's very helpful and let's get the panel's thought on the categories of debates you've talked at. first, bulling collection, then the warrant for contact an then some of those cybersecurity issues....
94
94
Apr 8, 2015
04/15
by
FOXNEWSW
tv
eye 94
favorite 0
quote 0
this morning at a forum, the new york fed president said cybersecurity risks keep me awake at night.the newest member of the fox family. blake, welcome aboard. nice to see you. >>> phillip mudd is here. former deputy director of the cia counter intelligence center and author of the new book "the head game." great to see you. >> thank you. >> i just wonder, how many people are doing this to how many people? because if we won't say the russians are doing it that problems means what? >> everybody. let's start down the list. russians, chinese, north koreans iranians, if we were talking about this 50 yeerts ago, that's the 007 world and you said the kgb has a human being in the west wing stealing stuff, you would have said that's disturbing but that's what the spy business is. the second oldest profession on the planet. spy services are using a form of -- of the spy business that's less intrusive. no surprise here. >> if you found that the russians had copies of all your stuff, you'd take them out and might make threatening noises, right? >> i think you would. >> unless you were over ther
this morning at a forum, the new york fed president said cybersecurity risks keep me awake at night.the newest member of the fox family. blake, welcome aboard. nice to see you. >>> phillip mudd is here. former deputy director of the cia counter intelligence center and author of the new book "the head game." great to see you. >> thank you. >> i just wonder, how many people are doing this to how many people? because if we won't say the russians are doing it that...
391
391
Apr 27, 2015
04/15
by
KNTV
tv
eye 391
favorite 0
quote 0
. >> reporter: cybersecurity is the new frontier in national security. and now we're learning that a recent cyberattack was more extensive than originally thought and that is raising questions about the government's ability to protect the president's correspondence. it's a case of digital spying that went all the way to the top. according to "the new york times," russia yn hackers who breached the white house's computer systems last october were also able to access some of president obama's e-mails. the white house wouldn't comment today but the "times" says hackers received access to the e-mail archives of people within the white house with whom president obama regularly accumulated. the hackers only got unclassified e-mail, still even those files can contain sensitive information, like the president's schedule. >> they're going to find out who is the president talking to, what kind of diplomatic sanctions they may be coming up with through its allies and other countries that it cares about. >> reporter: nbc news first reported on the hack last october.
. >> reporter: cybersecurity is the new frontier in national security. and now we're learning that a recent cyberattack was more extensive than originally thought and that is raising questions about the government's ability to protect the president's correspondence. it's a case of digital spying that went all the way to the top. according to "the new york times," russia yn hackers who breached the white house's computer systems last october were also able to access some of...
163
163
Apr 26, 2015
04/15
by
WCAU
tv
eye 163
favorite 0
quote 0
. >> reporte cybersecurity is the new front tear in national security. and now we're learning that a recent cyber attack was more e t originally thought and that is raising questions about the government's ability to protect the president's correspondence. it's a case of digit spying that went all the way to the top. russian hackers who breached the white house's computer sy last year were able to access the president's e-mail. the times says they received the access to the e-mail archives of people within the white house with w accumulated. the hackers only got unclassified e-mail still even those files can contain sensitive information, like the president's schedule. they're going to find out who is the president talking to what kind of deposit ma sanctions they may be coming up with through its allies and other countries that it cares about. >> nbc news fist reported on the hack october. it occurres u.s. was in a bitter stand off with vladimir putin over u krain.y stressed urgency in preventing such an attack. >> the first is protecting our systems. p
. >> reporte cybersecurity is the new front tear in national security. and now we're learning that a recent cyber attack was more e t originally thought and that is raising questions about the government's ability to protect the president's correspondence. it's a case of digit spying that went all the way to the top. russian hackers who breached the white house's computer sy last year were able to access the president's e-mail. the times says they received the access to the e-mail...
90
90
Apr 22, 2015
04/15
by
KGO
tv
eye 90
favorite 0
quote 0
security secretary johnson said cybersecurity must be a partnership between government and the private sector. we need each other and we must work together. >> a tennessee father found a high together way to watch his daughter after he decided to let her walk to school open her own. >> chris is a techie and own as video production company. when it came time for his 8-year-old to walk to school on her own he got out the drone and used to keep an eye on her. some say he is being over protective he said it was for fun and she did not mine. he has happy knowing she is safe. >> new at 5:00 law enforcement crisis in the east bay the contra costa sheriff said that you are seeing fewer deputy on patrol. >> new lure of southern california dangling to convince the raiders to move south. >>> we will take a short break but leave you with a check of traffic on i-80 through berkeley . >>> live from the kgo-tv broadcast center this is abc7 news. >> good wednesday morning. it is 5:00 a.m. we thank you for waking up early and joining us. >>> i am eric thomas. >> i am kristen sze. >> happy wednesday, ha
security secretary johnson said cybersecurity must be a partnership between government and the private sector. we need each other and we must work together. >> a tennessee father found a high together way to watch his daughter after he decided to let her walk to school open her own. >> chris is a techie and own as video production company. when it came time for his 8-year-old to walk to school on her own he got out the drone and used to keep an eye on her. some say he is being over...
61
61
Apr 8, 2015
04/15
by
CSPAN2
tv
eye 61
favorite 0
quote 0
i formed the cybersecurity caucus to educate them on their issue i want to thank jim and denise for your latest report on cyber threats information sharing that you released. good job well-done as always. i don't normally do text but in this case it's been recommended that i do that and then i will move to the q-and-a dialogue. we are finally beginning to grasp the magnitude of the challenges that we face as they start to hit home for millions of americans. just last month the largest insurance provider and some announced that it was the victim of unprecedented cyber intrusion. they gained access to the database holding the sensitive records of 80 million individuals including the names birth dates and social security numbers. in total, the personal information of one in four americans have been compromised by the cyber attack. it is a wake-up call to cyber adversaries have the upper hand and the consequences will get worse if we fail to reverse the tide. and today i want to discuss three issues with you including the scope of the cyber threat the nation faces the cyber defense will part
i formed the cybersecurity caucus to educate them on their issue i want to thank jim and denise for your latest report on cyber threats information sharing that you released. good job well-done as always. i don't normally do text but in this case it's been recommended that i do that and then i will move to the q-and-a dialogue. we are finally beginning to grasp the magnitude of the challenges that we face as they start to hit home for millions of americans. just last month the largest insurance...
58
58
Apr 23, 2015
04/15
by
CSPAN2
tv
eye 58
favorite 0
quote 0
senator graham raised the issue of cybersecurity. he has been an extraordinarily helpful member of the senate and protect in our country of cyberattacks. on behalf of chinese industries or the really dangerous that of laymen to cybersabotage traps that can be detonated later on in the event of a conflict. i am concerned about the structure within the department for handling cybersecurity. i'm investigative level is spread across program of the fbi, secondarily secret service. it falls under the rubric of the criminal division of the national security division i hope with the assistance of the office of management and budget, uni in the office of management budget and other senators can continue a conversation about what the deployment of resources and structure should look like against the cybersecurity threat future. what you agree to participate in such a process? >> certainly, senator. you have outlined an important issue. i look forward to working with you and relevant partners on this committee and congress making sure the depar
senator graham raised the issue of cybersecurity. he has been an extraordinarily helpful member of the senate and protect in our country of cyberattacks. on behalf of chinese industries or the really dangerous that of laymen to cybersabotage traps that can be detonated later on in the event of a conflict. i am concerned about the structure within the department for handling cybersecurity. i'm investigative level is spread across program of the fbi, secondarily secret service. it falls under the...
60
60
Apr 22, 2015
04/15
by
CSPAN
tv
eye 60
favorite 0
quote 0
. >> on the first of two cybersecurity bills. this one today would encourage private companies to share cyberthreat information with the government by providing lawsuit protections if they do so. it would create a cyberintelligence sharing center. the house will finish work on a bill that will establish advisory boards for the consumer financial protection bureau. they debated the bill yesterday. and as we wait for the house to come back at noon we'll show you yesterday's debate here on c-span. uer: thank you, mr. chairman. mr. chairman, today the house considers h.r. 1195, the bureau of consumer financial protection advisory boards act. this bill is essential to provide small businesses a voice in the regulatory process and to help ensure community banks and credit unions continue to have a voice in the cfpb going forward. small businesses are the backbone of our economy, yet our regulatory system silences these hardworking americans. regulations mean -- meant for large corporations trickle down and have disproportion impacts on
. >> on the first of two cybersecurity bills. this one today would encourage private companies to share cyberthreat information with the government by providing lawsuit protections if they do so. it would create a cyberintelligence sharing center. the house will finish work on a bill that will establish advisory boards for the consumer financial protection bureau. they debated the bill yesterday. and as we wait for the house to come back at noon we'll show you yesterday's debate here on...
126
126
Apr 12, 2015
04/15
by
CNBC
tv
eye 126
favorite 0
quote 0
becky will be back with one men who runs cybersecurity fire-eye and he has some scary answers. each week keep it here. we are "on the money." have a great weekend, everybody. boy: once upon a time, there was a nice house that lived with a family. one day, it started to rain and rain. water got inside and ruined everybody's everythings. the house thought she let the family down. but the family just didn't think a flood could ever happen. the reality is, floods do happen. protect what matters. get flood insurance. visit floodsmart.gov/flood to learn more. [ engine revving ] >> this is a big business, taking away from you and me. >> they're more sophisticated. they're not the old, traditional peel-and-steal thefts. >> today's auto thieves are experts, and gone in 60 seconds or less. >> they will get a request for a car today, and they'll steal it tomorrow. >> the auto-theft industry today is responsible for more than $4 billion in losses just in the united states, and this global crime shows no signs of stopping. >> if it was a legal business, it would be one of the fortune 500 co
becky will be back with one men who runs cybersecurity fire-eye and he has some scary answers. each week keep it here. we are "on the money." have a great weekend, everybody. boy: once upon a time, there was a nice house that lived with a family. one day, it started to rain and rain. water got inside and ruined everybody's everythings. the house thought she let the family down. but the family just didn't think a flood could ever happen. the reality is, floods do happen. protect what...
117
117
Apr 20, 2015
04/15
by
CSPAN2
tv
eye 117
favorite 0
quote 0
. >> the house is looking at cybersecurity legislation to build boats on the off the floor the house and senate negotiators are meeting today on the 2016 budget. what are they looking at right now and how long is this process likely to take? >> that's a good question. at this point they've already missed the april 15 deadline. the budget document is more of the recommendation and the chance for the republican party now that both chambers layout of this is our fiscal position and for the party believes it should be doing in which direction we should be headed in. because of that, they do have a little bit. the house budget document is not that different at this point. one of the big arguments that we are seeing is what they will end up doing in the reconciliation. we saw this done towards the house and left that much more open-ended and gave a lot of the committees of jurisdiction so we will see who prevails in that argument. >> so they want to choose the budget to deal with obamacare of the reconciliation process to try to repeal it and republicans in the house are from different cam
. >> the house is looking at cybersecurity legislation to build boats on the off the floor the house and senate negotiators are meeting today on the 2016 budget. what are they looking at right now and how long is this process likely to take? >> that's a good question. at this point they've already missed the april 15 deadline. the budget document is more of the recommendation and the chance for the republican party now that both chambers layout of this is our fiscal position and for...
80
80
Apr 16, 2015
04/15
by
CSPAN
tv
eye 80
favorite 0
quote 0
the cybersecurity bill, as the gentleman mentioned will we consider the two cybersecurity bills together or separately? we've heard some information over here about whether they may be joined together or whether let's consider them discreetly each one of them. i think they're relatively noncontroversial in some respects, but will the gentleman tell us how they might be considered? mr. mccarthy: i thank the gentleman for yielding. as the gentleman knows, i usually don't like to get ahead of the rules committee but we will consider these bills separate but then joined together and sent to the senate. mr. hoyer: i thank the gentleman for that information. the gentleman also has brought up the issue of -- well, i don't think you brought it up but let me talk about it. as we know april 15 occurred yesterday. the budget was supposed to be adopted as of yesterday. as the gentleman and i both know when my party was in charge, as when your party was in charge, we haven't met that april 15 deadline, but i know the gentleman has talked about reconciliation instructions. the senate bill, of course,
the cybersecurity bill, as the gentleman mentioned will we consider the two cybersecurity bills together or separately? we've heard some information over here about whether they may be joined together or whether let's consider them discreetly each one of them. i think they're relatively noncontroversial in some respects, but will the gentleman tell us how they might be considered? mr. mccarthy: i thank the gentleman for yielding. as the gentleman knows, i usually don't like to get ahead of the...
55
55
Apr 23, 2015
04/15
by
KRON
tv
eye 55
favorite 0
quote 0
>>mark:a new pentagon cybersecurity strategy lays out for the first time publicly that the u-s militaryning to use cyber-warfare as an option in conflicts with enemies. >>mark:the 33-page strategy says the defense department should be able to use cyber operations to interrupt an enemy's command and control networks military infrastructure, and weapons capabilities. >>mark:the strategy will be released today. >>mark:the previous strategy was released in 2011, and didn't mention much about the pentagon's offensive cyber capabilities. >>darya:happening today. >>darya:retired four-star general david petraeus will be sentenced for providing classified information to a civilian. >>darya:petraeus admitted he shared top secret documents with his biographer and mistress. including information about war strategies and other national defense information. >>darya:petraeus pleaded guilty to a single charge of unauthorized removal and retention of classified material. >>darya:the government is expected to ask for two years probation and a 40-thousand dollar fine. >>mark:also happening today. >>mark:l
>>mark:a new pentagon cybersecurity strategy lays out for the first time publicly that the u-s militaryning to use cyber-warfare as an option in conflicts with enemies. >>mark:the 33-page strategy says the defense department should be able to use cyber operations to interrupt an enemy's command and control networks military infrastructure, and weapons capabilities. >>mark:the strategy will be released today. >>mark:the previous strategy was released in 2011, and didn't...
112
112
Apr 21, 2015
04/15
by
CSPAN
tv
eye 112
favorite 0
quote 0
the clerk: to improve cybersecurity through sharing about cybersecurity threats and for other purposes and providing for consideration of the bill h.r. 731 to amend the homeland security act of 2002 to enhance multidirectional sharing of information related to cybersecurity risks and strengthen privacy and civil liberties protections and for other purposes. the speaker pro tempore: referred to the house calendar and ordered printed. the chair lays before the house the following personal request. the clerk: leave of absence requested for ms. jackson lee of texas for today. the speaker pro tempore: without objection, the request is granted. under the speaker's announced policy of january 6 2015 the gentleman from california, mr. honda is recognized for 60 minutes as the designee of the minority leader. mr. honda: mr. speaker i ask unanimous consent that all members have five legislative days to rhett rith their racks and -- to revise and extend their remarks and include extraneous material on my special order. the speaker pro tempore: without objection. mr. honda: thank you, mr. speaker.
the clerk: to improve cybersecurity through sharing about cybersecurity threats and for other purposes and providing for consideration of the bill h.r. 731 to amend the homeland security act of 2002 to enhance multidirectional sharing of information related to cybersecurity risks and strengthen privacy and civil liberties protections and for other purposes. the speaker pro tempore: referred to the house calendar and ordered printed. the chair lays before the house the following personal...
158
158
Apr 15, 2015
04/15
by
FOXNEWSW
tv
eye 158
favorite 0
quote 0
pregnancy and she's now a 24-year-old very successful young woman who is contributing greatly on cybersecurityuntry. there are personal stories now that are feeding into this and that's changing. but let me tell you something else that happened big time last night. if you think back to the george stephanopoulos interview where he asked romney about contraception, nobody has asked the democrats about this position and it's always republicans who seem to be unable to get out of any sort of debate without having to talk about some sort of right to life issue or pro choice issue. for the first time you saw debbie wasserman schultz grilled by megyn kelly. it's about the protection of the innocent, one that is -- it's important for us. it's bigger than social security reform or tax reform or even national security, protection of the innocent should be a platform that we talked about in 2016? i agree. i hope they are listening. >>> next, something that can make it harder for america's unemployed to get a job. personality tests and julie explains when "the five" returns. when it comes to good nutritio
pregnancy and she's now a 24-year-old very successful young woman who is contributing greatly on cybersecurityuntry. there are personal stories now that are feeding into this and that's changing. but let me tell you something else that happened big time last night. if you think back to the george stephanopoulos interview where he asked romney about contraception, nobody has asked the democrats about this position and it's always republicans who seem to be unable to get out of any sort of debate...
91
91
Apr 27, 2015
04/15
by
KNTV
tv
eye 91
favorite 0
quote 0
cybersecurity experts say they need to act preemtively. >> always act as if the hackers are in it. details and efd. >> the future of gay marriage in america could be decided soon. there will be arguments ton tuesday. justices may decide on whether gay couples have a constitutional right to marry nationwide. that's despite rulings of individual states. they could also decide if states that don't allow gay marriage must recognize couples that marry and states that does. this affects those in kentucky, michigan ohio tennessee. that's in a place where federal appeals of course upheld the gay marriage ban. >>> a powerful storm off the coast of alabama has killed two people and caused several boats to capsize. tonight's search efforts are under way for a group of boaters that went missing who were participating in a sailing competition. erica little has that story. >> reporter: violent rain and wind in excess of 70 miles an hour. cap sizing 10 vessels off the coast of mobile, alabama. more than 100 sail boats and as many as 200 sailors forced to battle rough waters while participating in
cybersecurity experts say they need to act preemtively. >> always act as if the hackers are in it. details and efd. >> the future of gay marriage in america could be decided soon. there will be arguments ton tuesday. justices may decide on whether gay couples have a constitutional right to marry nationwide. that's despite rulings of individual states. they could also decide if states that don't allow gay marriage must recognize couples that marry and states that does. this affects...
93
93
Apr 11, 2015
04/15
by
FOXNEWSW
tv
eye 93
favorite 0
quote 0
how the latest compromise of our government cybersecurity is a textbook example of the any threat wee facing from global rivals. moderate to severe crohn's disease is tough but i've managed. except that managing my symptoms was all i was doing. and when i finally told my doctor, he said humira is for adults like me who have tried other medications but still experience the symptoms of moderate to severe crohn's disease. and that in clinical studies the majority of patients on humira saw significant symptom relief. and many achieved remission. humira can lower your ability to fight infections, including tuberculosis. serious, sometimes fatal infections and cancers including lymphoma, have happened; as have blood, liver, and nervous system problems, serious allergic reactions, and new or worsening heart failure. before treatment, get tested for tb. tell your doctor if you've been to areas where certain fungal infections are common and if you've had tb hepatitis b, are prone to infections or have flu-like symptoms or sores. don't start humira if you have an infection. ask your gastroente
how the latest compromise of our government cybersecurity is a textbook example of the any threat wee facing from global rivals. moderate to severe crohn's disease is tough but i've managed. except that managing my symptoms was all i was doing. and when i finally told my doctor, he said humira is for adults like me who have tried other medications but still experience the symptoms of moderate to severe crohn's disease. and that in clinical studies the majority of patients on humira saw...
130
130
Apr 20, 2015
04/15
by
FOXNEWSW
tv
eye 130
favorite 0
quote 0
. >>> cybersecurity expert says united airlines has banned him from all of its flights because of somethingd. here's the back story. the researcher says his company finds security flaws in software before criminals can exploit hem. he says he was on his way to a conference in san francisco but security agent ford united stopped him at the gate in denver and would not let him on the plane. not the first time he had issues with the airlines. last week he said fbi agents pulled him from a united flight in new york. that happened after he sent this tweet in essence suggesting he could hack into the jet's communication system to deploy the oxygen masks. he says the fbi seized his laptop and other electronics without showing him a search warrant. lea gabrielle has this. i understand you spoke with this guy and he says he should have toned it down? >> chris roberts tells me he was on the flight reading a government report about how wireless networks could expose commercial airlines to threats when he tweeted. he said he was frustrated because hi company tried to alert the airlines to the problem.
. >>> cybersecurity expert says united airlines has banned him from all of its flights because of somethingd. here's the back story. the researcher says his company finds security flaws in software before criminals can exploit hem. he says he was on his way to a conference in san francisco but security agent ford united stopped him at the gate in denver and would not let him on the plane. not the first time he had issues with the airlines. last week he said fbi agents pulled him from a...
89
89
tv
eye 89
favorite 0
quote 0
there is not enough attention being paid to cybersecurity issues in this country. we are slowly now getting legislation out of congress that's like pulling teeth. the president does executive orders and so if you're going to put sanctions on cyberterrorists. what good is that going to do for you if you're dealing beyond the reach of the u.s. >> good point but but, corporate america needs to sit down and make the investment. you are know it's all well and good to tell washington to write legislation, but corporate america needs to take the responsibility, take the ball in their teeth and do what needs to be done here. >> and it hasn't. and that is the problem and we don't know when people are going to finally get the memo. if they continue not to get the memo, what's the ultimate situation here? our personal identifying information, our pie, as it were is out there. and the pie is the limit when it comes to breaches. we are all exposed, social security numbers are out there. just since january almost 100 million social security numbers have now been exposed to peopl
there is not enough attention being paid to cybersecurity issues in this country. we are slowly now getting legislation out of congress that's like pulling teeth. the president does executive orders and so if you're going to put sanctions on cyberterrorists. what good is that going to do for you if you're dealing beyond the reach of the u.s. >> good point but but, corporate america needs to sit down and make the investment. you are know it's all well and good to tell washington to write...
52
52
Apr 23, 2015
04/15
by
WUSA
tv
eye 52
favorite 0
quote 0
today pentagon officials will release a 33-page report detailing the defense department's new cybersecurity strategy. >> it lays out for the first time publicly that the u.s. military plans to use cyberwarfare as an option in conflicts with enemies. a previous strategy releed in 2011 made -- released in 2011 made little reference to the capabilities. they say the world needs to know that the u.s. will protect and defend itself against any cyberthreat. >>> this afternoon former c.i.a. director david petraeus is scheduled to be sentenced for sharing military secrets with his biographer. this comes two months after he agreed to plead guilty to a misdemeanor in the case. he faces up to a year in prison, probation and possible fines. >>> there are new details this morning on how postal worker doug hughes was able to land his gyrocopter at the capitol building last week. lawmakers say he was being tracked by the nation's top security agencies as he flew into restricted air space. they had him in their sights but they chose not to shoot him down. >> he is lucky to be alive because he should have b
today pentagon officials will release a 33-page report detailing the defense department's new cybersecurity strategy. >> it lays out for the first time publicly that the u.s. military plans to use cyberwarfare as an option in conflicts with enemies. a previous strategy releed in 2011 made -- released in 2011 made little reference to the capabilities. they say the world needs to know that the u.s. will protect and defend itself against any cyberthreat. >>> this afternoon former...