85
85
Feb 22, 2016
02/16
by
CSPAN3
tv
eye 85
favorite 0
quote 0
finally, i thank congress for passing the cybersecurity act of 2015.this new law is a huge assist to dhs and our cybersecurity mission and we're in the process of implementing this new law now. turning to immigration and border security, as i explained it to both democrats and republicans, immigration policy must be two sides of the same coin. the resources we have to enforce immigration laws are finite and they must be used wisely. this is true of every aspect of law enforcement. it's referred to as prosecutorial discretion. with the immigration enforcement resources we have, isis focused more sharply on public safety and border security. those who are convicted of serious crimes or who are apprehended at the border are top priorities for removal and we will enforce the law in accordance with these priorities. accordingly, over the last several years, deportations by i.c.e. have gone down, but an increasing percentage of those deported are convicted criminals and an increased percentage of those in immigration detention around 85% are in the top prior
finally, i thank congress for passing the cybersecurity act of 2015.this new law is a huge assist to dhs and our cybersecurity mission and we're in the process of implementing this new law now. turning to immigration and border security, as i explained it to both democrats and republicans, immigration policy must be two sides of the same coin. the resources we have to enforce immigration laws are finite and they must be used wisely. this is true of every aspect of law enforcement. it's referred...
87
87
Feb 15, 2016
02/16
by
CSPAN
tv
eye 87
favorite 0
quote 0
there's a new emphasis on cybersecurity in the budget. is there evidence that the stolen data is being used to access government systems with the intend of destroying or manipulating that data so that the government can no longer rely upon its integrity? oneou get the prize for question. is i'm not sure i can comment publicly. vigilant.ys extremely metrics. metrics in terms of scanning, cvp is pretty sophisticated scanning,we go about cargo, and there's the legal mandate which i think you refer i've had conversations with a number of members of congress about. we have a pretty sophisticated for identifying high risk cargo and applying extra at ports ando that in imported.hey're in terms of border security, as i mention in my remarks, i want place in howetter we measure border security. an initiative which i hope to finish before we leave office. slightly over time. the subject is fascinating to many of us. wilson center we have something we call cyber boot camp. that's a class that we run for congressional staff. bipartisan, bicameral to
there's a new emphasis on cybersecurity in the budget. is there evidence that the stolen data is being used to access government systems with the intend of destroying or manipulating that data so that the government can no longer rely upon its integrity? oneou get the prize for question. is i'm not sure i can comment publicly. vigilant.ys extremely metrics. metrics in terms of scanning, cvp is pretty sophisticated scanning,we go about cargo, and there's the legal mandate which i think you refer...
83
83
Feb 12, 2016
02/16
by
CSPAN
tv
eye 83
favorite 0
quote 0
there's a new emphasis on cybersecurity in the budget. is there evidence that the stolen data is being used to access government systems with the intend of destroying or manipulating that data so that the government can no longer rely upon its integrity? oneou get the prize for question. is i'm not sure i can comment publicly. vigilant.ys extremely metrics. metrics in terms of scanning, cvp is pretty sophisticated scanning,we go about cargo, and there's the legal mandate which i think you refer i've had conversations with a number of members of congress about. we have a pretty sophisticated for identifying high risk cargo and applying extra at ports ando that in imported.hey're in terms of border security, as i mention in my remarks, i want place in howetter we measure border security. an initiative which i hope to finish before we leave office. slightly over time. the subject is fascinating to many of us. wilson center we have something we call cyber boot camp. that's a class that we run for congressional staff. bipartisan, bicameral to
there's a new emphasis on cybersecurity in the budget. is there evidence that the stolen data is being used to access government systems with the intend of destroying or manipulating that data so that the government can no longer rely upon its integrity? oneou get the prize for question. is i'm not sure i can comment publicly. vigilant.ys extremely metrics. metrics in terms of scanning, cvp is pretty sophisticated scanning,we go about cargo, and there's the legal mandate which i think you refer...
36
36
Feb 8, 2016
02/16
by
CSPAN2
tv
eye 36
favorite 0
quote 0
backers of the cybersecurity act of 2015, most people know it as the cybersecurity information sharing act, but that was signed into law late december passed through as part of the omnibus budget bill, the $1.5 trillion budget bill. and the idea behind that is it is a first step in allowing people to understand more about the hacking threats that the country faces. backers of the bill which, you know, the white house was onboard, had broad bipartisan support. many industry groups were onboard. they said we want to be able to share more information with the government and have the government share more information with us. the idea being if they are able to more quickly see the hacking threats that are out there, perhaps one company -- say home depot -- gets hacked as they have in the past, we could mitigate the fallout because we could more quickly tap the government for a solution to that problem. we can also tell other companies to look out for that specific hack. whereas in the past companies feel they've been hindered from sharing that information because of legal concerns. so the
backers of the cybersecurity act of 2015, most people know it as the cybersecurity information sharing act, but that was signed into law late december passed through as part of the omnibus budget bill, the $1.5 trillion budget bill. and the idea behind that is it is a first step in allowing people to understand more about the hacking threats that the country faces. backers of the bill which, you know, the white house was onboard, had broad bipartisan support. many industry groups were onboard....
65
65
Feb 9, 2016
02/16
by
CSPAN2
tv
eye 65
favorite 0
quote 0
we have seen the ejection of bill to repeal the cybersecurity act. people are not only matter to not only met at the bill they say this information sharing their main problem is that it's going to lead to unfettered sharing of people's personal information with the government and that information because of the bill automatic sharing provisions of the bill would be widely disseminated throughout the federal government including health agencies and given the snowden leaks in the ongoing distrust of the nsa is that's very concerning to privacy advocates. >> host: kate tummarello it's an election year. any of this going to happen? >> guest: seems like people are preparing for the slowdown but comes with an election year but i think they're still a lot to get done in lawmakers and cfpb, they're not going to stop anytime soon. privacy is actually big issue that comes up in the elections but there's a list of 6% of bullet point items that congress is they are going to get done the year before they return for the elections and surveillance is one of the thi
we have seen the ejection of bill to repeal the cybersecurity act. people are not only matter to not only met at the bill they say this information sharing their main problem is that it's going to lead to unfettered sharing of people's personal information with the government and that information because of the bill automatic sharing provisions of the bill would be widely disseminated throughout the federal government including health agencies and given the snowden leaks in the ongoing distrust...
122
122
Feb 19, 2016
02/16
by
WAVY
tv
eye 122
favorite 0
quote 1
welcome to hampton. 5025 senator mark warner was in hampton friday to talk cybersecurity. he started with a tour of hampton based company - zel technologies. along with, virginia's secretary of technology karen jackson, warner led a roundtable discussion with representatives from the military, local the state with highest number of unfilled cyber jobs. c0043 - sen. mark warner (d) virginia 927 our opportunity is to make sure that every university is cyber certified in terms of a work force 936 our opportunity is to make sure that those military members who leave the military with cyber training can get jobs right here in hampton roads. 945 warner says the threats facing us -- keep him awake at night. c0043 - sen. mark warner (d) virginia 1102 what i'm really afraid of, that we could have an event, almost a cyber 9/11, where we shut down water systems, power systems, in a way that could be catastrophic 1114 before we really fully recognize how dramatic this threat is 1119 c0044 - scott arnott - zel technologies 2040 the first thing to understand about cybersecurity is a lot
welcome to hampton. 5025 senator mark warner was in hampton friday to talk cybersecurity. he started with a tour of hampton based company - zel technologies. along with, virginia's secretary of technology karen jackson, warner led a roundtable discussion with representatives from the military, local the state with highest number of unfilled cyber jobs. c0043 - sen. mark warner (d) virginia 927 our opportunity is to make sure that every university is cyber certified in terms of a work force 936...
51
51
Feb 6, 2016
02/16
by
CSPAN
tv
eye 51
favorite 0
quote 0
there.rs cybersecurity kate tummarello works for politico and covers technology. beyoud is with bloomberg b.n.a. where she telecommunications. one of the biggest coming up are march.ctrum in >> march 29 is the official tokoff date for broadcasts relinquish some of their spectrum. they'll be looking to either go out of business or possibly into channel sharing agreements with their colleagues. and a few months after that, potentially, that will wrap up sidee'll see the wireless start. we're looking at other potential bidders as well, such as comcast announced today that they might also be bidding for some of that broadcast spectrum. months of be several close attention on the f.c.c. and its auction. months.ou say several so most of 2016 we'll be talking orut the spectrum auctions looking at it? >> f.c.c. officials have said they're looking at the auction closing sometime in the third of this year. >> closing in the third quarter. kate tummarello, is there interest on the hill in the auctions? >> tons of interest. seen a lot of lawmakers kind of ramp up their activi
there.rs cybersecurity kate tummarello works for politico and covers technology. beyoud is with bloomberg b.n.a. where she telecommunications. one of the biggest coming up are march.ctrum in >> march 29 is the official tokoff date for broadcasts relinquish some of their spectrum. they'll be looking to either go out of business or possibly into channel sharing agreements with their colleagues. and a few months after that, potentially, that will wrap up sidee'll see the wireless start....
49
49
Feb 26, 2016
02/16
by
CSPAN2
tv
eye 49
favorite 0
quote 0
the cybersecurity bill that passed last year i think it's a terrific bill. i am very pleased with the bipartisan support we got from congress, on a very complex issue which gives us additional authorities and gives the private sector the communities they say they need to share with us cyberthreat indicators. that was a really, really big thing that for a long time we heard from the private sector to had that before they would be sharing cyberthreat indicators with us. we now have that in place. i think we are moving in the right direction and i think that by the time this administration leaves office him when i leave office we will have made tangible improvements in cybersecurity. >> that leads right to this whole issue of getting assistance from the private sector come apple, the encrypted phones and so forth. give us your take on how that should be approached and what can and can't be done. >> i think we need to be in a different place than where we are now. i think in response to the demands of the marketplace, a lot of tech companies have driven deeper a
the cybersecurity bill that passed last year i think it's a terrific bill. i am very pleased with the bipartisan support we got from congress, on a very complex issue which gives us additional authorities and gives the private sector the communities they say they need to share with us cyberthreat indicators. that was a really, really big thing that for a long time we heard from the private sector to had that before they would be sharing cyberthreat indicators with us. we now have that in place....
69
69
Feb 11, 2016
02/16
by
CSPAN2
tv
eye 69
favorite 0
quote 0
in regarding cybersecurity it is also a unique feature. with those cyberviolators something we could take as a model to perpetrate cyberattacks with the income to build the weapons program in the views its own people. in the largest trading partner that united states will use every economic to lead its disposal and finally to'' the editorial board with a strategic patients it is mostly consisted of ignoring north korea to pressure the regime. both china and north korea must pay the price with the steps to the nuclear arsenal. it is no longer a viable option. >> this begins that process that we need to stop the forgotten. we can make a difference with south korea and japan to lift the threat of a nuclear korea. i yield the floor. >> mr. president i know we have the number of speakers actually most all the time to speak to that to fill in gaps to meet the senator stakes for their efforts as a very meaningful piece of legislation and if the key is okay with me sharing the fact that this and it does play of rolled to project a restraint that w
in regarding cybersecurity it is also a unique feature. with those cyberviolators something we could take as a model to perpetrate cyberattacks with the income to build the weapons program in the views its own people. in the largest trading partner that united states will use every economic to lead its disposal and finally to'' the editorial board with a strategic patients it is mostly consisted of ignoring north korea to pressure the regime. both china and north korea must pay the price with...
118
118
Feb 11, 2016
02/16
by
CSPAN2
tv
eye 118
favorite 0
quote 0
it codifies existing cybersecurity sanctions including as we know the attack on sony. this is an important step in building and enforcing international norms when it comes to cyber space. so mr. president one of the areas that we have stressed in the house bill is to make it clear our concerns about north korea goes well beyond the nuclear weapons test but also their cyber attack activities. the vast majority of north koreans endure systematic violations of their most basic human rights and many of these violations constitute crimes against humanity. a fact that is well documented by the unitt nation. widespread malnutrition, torture and fear have made north korea the worst. i would ask unanimous consent we place in the congressional report the report of human rights in the democratic people's republic of korea by the united nations human counsel to serve as a representation of these crimes. these crimes by the north korean regime should shock the conscious of humanity. building on the important work, the united nation human right commission and general assembly adopte
it codifies existing cybersecurity sanctions including as we know the attack on sony. this is an important step in building and enforcing international norms when it comes to cyber space. so mr. president one of the areas that we have stressed in the house bill is to make it clear our concerns about north korea goes well beyond the nuclear weapons test but also their cyber attack activities. the vast majority of north koreans endure systematic violations of their most basic human rights and...
50
50
Feb 24, 2016
02/16
by
CSPAN3
tv
eye 50
favorite 0
quote 0
the cybersecurity bill that passed last year i think is a terrific bill. i'm very pleased with the bipartisan support we got from congress on a very complex issue, which gives us additional authorities and gives the private sector the immunities that they say they need to share with us cyberthreat indicators. that was a really, really big thing that for a long time we heard from the private sector they had to have before they would be sharing cyberthreat indicators with us. we now have that in place. so, i think we're moving in the right direction. and i think that by the time this administration leaves office and i leave office, we will have made tangible improvements in cybersecurity. >> well, and that leads to this whole issue of getting assistance from the private sector, apple, the encrypted phones and so forth. give us your take on how to -- that should be approached and what can and can't be done. >> i think we need to be in a different place from where we are now. i think in response to the demands of the market players a lot of tech companies have
the cybersecurity bill that passed last year i think is a terrific bill. i'm very pleased with the bipartisan support we got from congress on a very complex issue, which gives us additional authorities and gives the private sector the immunities that they say they need to share with us cyberthreat indicators. that was a really, really big thing that for a long time we heard from the private sector they had to have before they would be sharing cyberthreat indicators with us. we now have that in...
67
67
Feb 13, 2016
02/16
by
CSPAN
tv
eye 67
favorite 0
quote 0
josh talked about cybersecurity.ut to name a few others, there's a significant bipartisan interest in investing in cancer research, ensuring that everyone struggling with opioid addiction can get treatment, and expanding tax credits that support work and reduce poverty to workers without kids. in other cases, we may not get bipartisan support. but the president isn't going to shy away from proposing solutions that are both good for our economy and address major challenges that we face. those proposals may not be enacted this year, but they lay the groundwork for reaching solutions in the long run. the bottom line is that in the final year, in a season full of political distractions, the president and the administration remain focused on meeting our greatest challenges and delivering for the american people. we will spend every day of this last year doing just that, with this budget as our road map. with that i'll turn it over to jason who's going to discuss the economic outlook and budget assumptions. >> thank you. a
josh talked about cybersecurity.ut to name a few others, there's a significant bipartisan interest in investing in cancer research, ensuring that everyone struggling with opioid addiction can get treatment, and expanding tax credits that support work and reduce poverty to workers without kids. in other cases, we may not get bipartisan support. but the president isn't going to shy away from proposing solutions that are both good for our economy and address major challenges that we face. those...
62
62
Feb 11, 2016
02/16
by
CSPAN2
tv
eye 62
favorite 0
quote 0
attention it deserved during today's debate, the gardner and menendez bill assessed the threat of cybersecurity with robust sanctions against those who control the cyber warfare apparatus. this creates a new policy framework that xcombines effective sanctions and counter military actions that can stop the nuclear ambition, address cybersecurity and bring some sanity back to the political calculus. a new policy framework that shows urdesire to neutralize any threat that north korea may represent. this bipartisan bill proved unanimously in january expands and tightens sanctions for north korea nuclear and ballistic missile development and other e destructive measures of the kim jong-un. it requires the president to look into weapons of mass destruction, arms related materials, luxury goods, humanitarian violations, the provision of industrial materials like coal or metal used in activities including weapons of mass destruction, proliferation activities or use in prison or labor camps. the president is mandated to sanctions any person found to have materially contributed or engaged in or facilitat
attention it deserved during today's debate, the gardner and menendez bill assessed the threat of cybersecurity with robust sanctions against those who control the cyber warfare apparatus. this creates a new policy framework that xcombines effective sanctions and counter military actions that can stop the nuclear ambition, address cybersecurity and bring some sanity back to the political calculus. a new policy framework that shows urdesire to neutralize any threat that north korea may...
61
61
Feb 19, 2016
02/16
by
WAVY
tv
eye 61
favorite 0
quote 0
increasing cybersecurity in hampton roads. what senator mark warner pet moments are beautiful, unless you have allergies. only flonase is approved to relieve both itchy, watery eyes and congestion. no other nasal allergy spray can say that. when we breathe in allergens our bodies react by over producing six key inflammatory substances that cause our symptoms. most allergy pills only control one substance. flonase controls six. and six is greater than one. complete allergy relief or incomplete. . let your eyes decide. norfolk police say a serial burglar is at it again. investigators say he's now responsible for three more burglaries, bringing the grand total to eight. take a good look at this man. officers say he's hit several local restaurants, including the golden china on east little creek road on valentine's day. they say last month, he broke into united refrigeration on progress road, and golden city on azalea garden road. this is video of when he attempted to break-in to ole bay seafood. if you recognize the man in this v
increasing cybersecurity in hampton roads. what senator mark warner pet moments are beautiful, unless you have allergies. only flonase is approved to relieve both itchy, watery eyes and congestion. no other nasal allergy spray can say that. when we breathe in allergens our bodies react by over producing six key inflammatory substances that cause our symptoms. most allergy pills only control one substance. flonase controls six. and six is greater than one. complete allergy relief or incomplete....
73
73
Feb 10, 2016
02/16
by
CSPAN2
tv
eye 73
favorite 0
quote 0
cybersecurity. north korea's cyber attack on the sony corporation of america in 2014, which leaked private communication and destroyed the company's data systems, cost sony, an american company, more than $35 million. this is sony corporation of america. it costs them $35 million. why this company? because the company produced a movie that mocked north korea's leadership. last summer north korea pledged to follow up on its attack on sony with more cyber attacks, promising to wage a cyber war against the u.s. to hasten its ruin. and that is an exact quote. america is not north korea's only target for cyber attacks. in 2013, north korea launched a cyber attack on three major south korean banks and two of south korea's largest broadcasters were temporarily shut down after a cyber attack. these cyber attacks cost south korea an estimated $720 million. this is real money, real jobs in our own country and in our allies'. we must take strong action to curb north korea's nuclear program and address the othe
cybersecurity. north korea's cyber attack on the sony corporation of america in 2014, which leaked private communication and destroyed the company's data systems, cost sony, an american company, more than $35 million. this is sony corporation of america. it costs them $35 million. why this company? because the company produced a movie that mocked north korea's leadership. last summer north korea pledged to follow up on its attack on sony with more cyber attacks, promising to wage a cyber war...
48
48
Feb 22, 2016
02/16
by
KTNV
tv
eye 48
favorite 0
quote 0
and now one of america's foremost experts on cybersecurity is stepping up to the plate. here's abc's eva pilgrim. >> reporter: a proposal to break the stalemate between the fbi and apple over the government's demand the tech giant hack into the iphone of the san bernardino shooter. cybersecurity pioneer john mcafee offering to do it himself for free in three weeks. >> i guarantee, you give me the phone, i'll give you the data. >> reporter: mcafee defending apple saying the fbi's request to create a so-called backdoor system puts hundreds of millions of iphone users at risk. his plan involves physically taking apart this phone and only this phone eliminating any risk to others. >> using social engineering plus the hardware and the software, we would perform our magic with the wands and it comes out. this is how it works. there are 10,000 hackers in the world who could easily do what i'm suggesting myself. >> reporter: but the government has said it needs apple's help to get into syed farook's phone. no word if the fbi is considering his offer, but mcafee is so confident i
and now one of america's foremost experts on cybersecurity is stepping up to the plate. here's abc's eva pilgrim. >> reporter: a proposal to break the stalemate between the fbi and apple over the government's demand the tech giant hack into the iphone of the san bernardino shooter. cybersecurity pioneer john mcafee offering to do it himself for free in three weeks. >> i guarantee, you give me the phone, i'll give you the data. >> reporter: mcafee defending apple saying the...
128
128
Feb 25, 2016
02/16
by
CNBC
tv
eye 128
favorite 0
quote 0
and we are already 20 years behind the chinese and russians in cybersecurity. off with 21 million records from the office of personnel management. >> this is -- that's a different issue, john. i was going to ask you about it. i think you brought up a very important point. we're talking about apple and the fbi and compelling story and important story and all these implications, both ways. probably going to be an important legal precedent i'm guessing when this is all said and done. in the meantime, every day hundreds of millions are probably being stolen from around the world, credit cards are being hacked. is there a risk this is going to distract our attention from the real problem? all the other stuff going on every freaking day? >> i will say this, if we get back doors in our smartphones, which we all have, all of our credit cards are going to be hacked. all of our bank accounts will disappear because everybody carries one. it is a computer that we carry with us. a spy device. but, yes, it is drawing attention away from the bigger issue. and the much larger
and we are already 20 years behind the chinese and russians in cybersecurity. off with 21 million records from the office of personnel management. >> this is -- that's a different issue, john. i was going to ask you about it. i think you brought up a very important point. we're talking about apple and the fbi and compelling story and important story and all these implications, both ways. probably going to be an important legal precedent i'm guessing when this is all said and done. in the...
69
69
Feb 29, 2016
02/16
by
CSPAN
tv
eye 69
favorite 0
quote 0
the language was too broad and cybersecurity tools and fundamental research. the plan to renegotiate is a month-long process and 124 of my coal etion in this chairman we are. i appreciate the work of the bureau of industry and the national security scounl for pushing for its resolution. we still have work to do. but today is our ability to come together, the government and industry to address difficult challenges in cybersecurity challenges. and i yield back. the speaker pro tempore: the gentleman yields back the balance of his time. for what purpose does the gentleman from pennsylvania seek recognition? without objection the gentleman is recognized for one minute. >> i rise to tell the story of one of tens of thundershowers of women. because of these, she has lived in pain. she has lived in anxiety and she lived in sadness missing on school place because she was too sick and too tired. she lived in anger finding out that the coil was migrating and now
the language was too broad and cybersecurity tools and fundamental research. the plan to renegotiate is a month-long process and 124 of my coal etion in this chairman we are. i appreciate the work of the bureau of industry and the national security scounl for pushing for its resolution. we still have work to do. but today is our ability to come together, the government and industry to address difficult challenges in cybersecurity challenges. and i yield back. the speaker pro tempore: the...
69
69
Feb 21, 2016
02/16
by
KTNV
tv
eye 69
favorite 0
quote 0
one of america's foremost experts on cybersecurity claims he can crack the phone... abc's eva pilgrim reports.. all he needs is three weeks. script: tonight a proposal to break the stalemate between the fbi and apple over the government's demand the tech giant hack into the iphone of the san bernardino shooter. cyber security pioneer, john mcafee offering to do it himself for free in 3 weeks. sot john mcafee cybersecurity expert i guarantee you give me the phone, i will give you the data. mcafee defending apple? saying the fbi's request to create a so-called back door into the phone's operating system puts hundreds of millions of iphone users at risk. his plan involves physically taking apart this phone and only there phone? eliminating any risk to others. sot john mcafee cybersecurity expert using social engineering plus the hardware and the software, we perform our magic with the wands, and it comes out, this is how it works. in the world that can easily do what i am suggesting myself but the government has said it rescue. a woman floating down an icy river is resc
one of america's foremost experts on cybersecurity claims he can crack the phone... abc's eva pilgrim reports.. all he needs is three weeks. script: tonight a proposal to break the stalemate between the fbi and apple over the government's demand the tech giant hack into the iphone of the san bernardino shooter. cyber security pioneer, john mcafee offering to do it himself for free in 3 weeks. sot john mcafee cybersecurity expert i guarantee you give me the phone, i will give you the data....
66
66
Feb 9, 2016
02/16
by
CSPAN2
tv
eye 66
favorite 0
quote 0
one good example of that is cybersecurity.here is a robust proposal in here that many of you have already reported on that includes a step up investment in protecting the country, protecting government systems from cyber attacks and cyber intrusions. that's an important piece of business. it's critical to our national security, critical to our economy. that's all the more reason it's unfortunate that republicans and the budget committee will not have a conversation with us about it. here's the thing i guarantee. i guarantee that some point over the next year we are all going to file into the briefing room and i walked in and find many of you on the edge of your seats eager to ask the white house about the latest cyberintrusion. it may be a government agency. it may be at a private sector company that is well known. it may even be a media organization. and when you do i will discuss the efforts that we've made over the first seven years of the presidency to strengthen our cyber defenses. i will certainly make detailed notes of
one good example of that is cybersecurity.here is a robust proposal in here that many of you have already reported on that includes a step up investment in protecting the country, protecting government systems from cyber attacks and cyber intrusions. that's an important piece of business. it's critical to our national security, critical to our economy. that's all the more reason it's unfortunate that republicans and the budget committee will not have a conversation with us about it. here's the...
249
249
Feb 10, 2016
02/16
by
WDBJ
tv
eye 249
favorite 0
quote 0
president barack obama has signed help upgrade cybersecurity in the u-s. this after several data breaches hit agencies including the department of justice. the president wants to increase cybersecurity spending by more than 35-percent from last year. a republican- dominated congress will need to sign off on the proposal. the president says he's hopeful that the cybersecurity initiative will pass. the court martial of sergeant bowe bergdahl is officially on hold. the judge is waiting for an appeals court to make a decision about whether classified evidence should be shared with bergdahl's defense team. bergdahl is accused of desertion, after his capture outside a us military base in afghanistan in 2009. his captors released him in exchange for five taliban detainees. a follow up tonight on the water crisis in flint, michigan. flint's mayor has proposed a 55- million dollar plan to replace lead pipes in the city's water system. she announced the proposal as a way to fix the water crisis as quickly as possible. first priority would be given to the most meanwh
president barack obama has signed help upgrade cybersecurity in the u-s. this after several data breaches hit agencies including the department of justice. the president wants to increase cybersecurity spending by more than 35-percent from last year. a republican- dominated congress will need to sign off on the proposal. the president says he's hopeful that the cybersecurity initiative will pass. the court martial of sergeant bowe bergdahl is officially on hold. the judge is waiting for an...
185
185
Feb 21, 2016
02/16
by
KTNV
tv
eye 185
favorite 0
quote 4
one of america's foremost experts on cybersecurity claims he can crack the phone... abc's eva pilgrim reports.. script: a proposal to break te stalemate between the fbn to the iphone of the san bernardino shooter. cyber security pioneer, john mcafee offering to do it himself for free in 3 weeks. sot john mcafee cybersecurity expert i guarantee you give me the phone, i will give you the data. mcafee defending apple? saying the fbi's request to create a puts hundreds of millions of iphone users at risk. taking apart this phone and only there phone? eliminating any risk to others. sot john mcafee cybersecurity expert using social engineering plus the hardware and the software, we perform our magic with the wands, and it comes out, this is how it works. there are ten thousand hackers in the world that can easily do what i am suggesting myself but the government has said it needs apple's help to get into this phone right now.. south carolina police are looking several shots inside a shopping mall. there was some kind of fight happening.... ....and two people reportedly fi
one of america's foremost experts on cybersecurity claims he can crack the phone... abc's eva pilgrim reports.. script: a proposal to break te stalemate between the fbn to the iphone of the san bernardino shooter. cyber security pioneer, john mcafee offering to do it himself for free in 3 weeks. sot john mcafee cybersecurity expert i guarantee you give me the phone, i will give you the data. mcafee defending apple? saying the fbi's request to create a puts hundreds of millions of iphone users...
48
48
Feb 2, 2016
02/16
by
WFTS
tv
eye 48
favorite 0
quote 0
if you make it that far cybersecurity experts say you're making a big mistake. >> anything you come across on social media, any links you come across can be potentially infected. >> reporter: in fact one asks for your iq number to get your store -- phone number to get your score. and the scams go after everything from getting your information to dropping in computer viruses. >> i think they are suspicious. >> reporter: experts say use common sense when deciding what to click on, watch for key phrases and most of all don't take the bait >> you need to be careful, if you have not heard of, ignore it. it's best practice even if from somebody you know. >> you can avoid the scams along with their story, all on abcactionnews.com. in -- >>> in california, powerful winds brought down massive trees. that storm also bringing snow to the california mountains. tree landed on a car killing its driver. firefighters say they were overwhelmed with cars -- with calls, that is caused by winds which topped 100 miles per hour. >>> we are wishing a speedy recovery from a crew from our sister station in san die
if you make it that far cybersecurity experts say you're making a big mistake. >> anything you come across on social media, any links you come across can be potentially infected. >> reporter: in fact one asks for your iq number to get your store -- phone number to get your score. and the scams go after everything from getting your information to dropping in computer viruses. >> i think they are suspicious. >> reporter: experts say use common sense when deciding what to...
32
32
Feb 25, 2016
02/16
by
CSPAN3
tv
eye 32
favorite 0
quote 0
the cybersecurity bill that passed last year, i think is a terrific bill. i'm very pleased with the bipartisan support we got from congress on a very complex issue which gives us additional authorities and gives us the private sector the immunitieimm. that was a really, really big thing for a long time we heard from the private sector they had to have before they would share with us. we have that in place. so i think we're moving in the right direction and i think that by the time this administration leaves office and i leave office, we will have made tangible improvements in cybersecurity. >> that leads right to the issue of getting assistance from the private sector apple, encrypted phones and so forth. give us your take on how to -- that should be approached and -- >> i think -- >> what can and can't be done. >> i think we need to be in a different place in response to the demands of the marketplace, a lot of tech companies have driven deeper and deeper toward encryption and that hampered to protect plots and crime and not just talking about federal crim
the cybersecurity bill that passed last year, i think is a terrific bill. i'm very pleased with the bipartisan support we got from congress on a very complex issue which gives us additional authorities and gives us the private sector the immunitieimm. that was a really, really big thing for a long time we heard from the private sector they had to have before they would share with us. we have that in place. so i think we're moving in the right direction and i think that by the time this...
128
128
Feb 10, 2016
02/16
by
CSPAN2
tv
eye 128
favorite 0
quote 0
the gardner-menendez substitute amendment makes mandatory important cybersecurity sanctions on north korea that were enacted as executive orders in the wake of the sony pictures hacking incident. the amendment also requires the president to target pyongyang's trade and key and industrial commode dis -- in key industrial commodities that are used to fund its weapons program. the bill requires a strategy to promote improved implementation and enforcement of multilateral sanctions, a strategy to combat north korea's cyber activities and a strategy to promote and encourage international engag engagement on north korea human rights-related issues including forced labor and repatriation. while passing this is a critical part of the u.s. response, we also must work with our allies, as imansed before, to stand -- as i mentioned before, to stand as a united international community. today our allies -- japan and south korea -- took additional measures against pyongyang. japan declared all north korean ships, including those for humanitarian purposes, would be banned from entering or coming to
the gardner-menendez substitute amendment makes mandatory important cybersecurity sanctions on north korea that were enacted as executive orders in the wake of the sony pictures hacking incident. the amendment also requires the president to target pyongyang's trade and key and industrial commode dis -- in key industrial commodities that are used to fund its weapons program. the bill requires a strategy to promote improved implementation and enforcement of multilateral sanctions, a strategy to...
44
44
Feb 9, 2016
02/16
by
KCCI
tv
eye 44
favorite 0
quote 0
civilian, agencies, increasing cybersecurity spending by $19 billion. the $4 trillion plan also includes $7.5 billion to escalate the fight against isis. turning to world headlines. at least 8 people are dead after two trains collided in germany. the trains crashed head-on just as the morning rush was getting underway. don champion has the very latest. don: hundreds of emergency responders carefully sifted through the mangled scene where two trains collided in southern germany. here, one of the train cars is barely recognizable. investigators say the trains crashed head-on just as the morning rush was getting underway. the impact derailed several cars. at least 150 people were hurt. a steady stream of ambulances were seen rushing to the scene. some of the more severely injured were flown to hospitals. rail line is used by commuters who work in munich. the accident happened on a single line that runs along a river, which officials said complicated the rescue effort. no word yet what led to the collision. don champion, cbs news. mollie: german news agenci
civilian, agencies, increasing cybersecurity spending by $19 billion. the $4 trillion plan also includes $7.5 billion to escalate the fight against isis. turning to world headlines. at least 8 people are dead after two trains collided in germany. the trains crashed head-on just as the morning rush was getting underway. don champion has the very latest. don: hundreds of emergency responders carefully sifted through the mangled scene where two trains collided in southern germany. here, one of the...
169
169
Feb 24, 2016
02/16
by
WLTX
tv
eye 169
favorite 0
quote 5
. >> we want our own students to have more coursework in cybersecurity. more internships to work in the private sector and in the government sector. how great would it be to receive your bachelors degree from a south carolina university and say that i studied cybersecurity. in 2012, the revenue department was hit by a massive hack involving millions of adult's information stolen. >>> the sheriffs department says they need your help looking for armed robbery suspects. this happened just after 8:00 monday night at the great china wall restaurant on broad river road. the suspects entered the back door and stole the cash register. they had faces -- their faces from surveillance cameras. the sheriff hopes someone is recognizing them from their clothing. if you have any information, call crime stoppers. >>> we are three days away from the democratic primary. the candidates making stops in the palmetto state. hillary clinton is expected to be in columbia this afternoon for a luncheon. last night, clinton spoke out against gun violence at a forum along with mothe
. >> we want our own students to have more coursework in cybersecurity. more internships to work in the private sector and in the government sector. how great would it be to receive your bachelors degree from a south carolina university and say that i studied cybersecurity. in 2012, the revenue department was hit by a massive hack involving millions of adult's information stolen. >>> the sheriffs department says they need your help looking for armed robbery suspects. this...
45
45
Feb 21, 2016
02/16
by
KTNV
tv
eye 45
favorite 0
quote 0
one of america's foremost experts on cybersecurity claims he can crack the phone... abc's eva pilgrim reports.. all he needs is three weeks. script: a proposal to break the stalemate between the fbi and apple over the government's demand the tech giant hack into the iphone of the san bernardino shooter. cyber security pioneer, john mcafee offering to do it himself for free in 3 weeks. sot john mcafee cybersecurity expert i guarantee you give me the phone, i will give you the data. mcafee defending apple? saying the fbi's request to create a so-called back door into the phone's operating system puts hundreds of millions of iphone users at risk. his plan involves physically taking apart this phone and only there phone? eliminating any risk to others. sot john mcafee cybersecurity expert using social engineering plus the hardware and the software, we perform it comes out, this is how it works. there are ten thousand hackers in the world that can easily do what i am suggesting myself but the government has said it needs apple's help to get into this phone moving now to a
one of america's foremost experts on cybersecurity claims he can crack the phone... abc's eva pilgrim reports.. all he needs is three weeks. script: a proposal to break the stalemate between the fbi and apple over the government's demand the tech giant hack into the iphone of the san bernardino shooter. cyber security pioneer, john mcafee offering to do it himself for free in 3 weeks. sot john mcafee cybersecurity expert i guarantee you give me the phone, i will give you the data. mcafee...
70
70
Feb 13, 2016
02/16
by
WEWS
tv
eye 70
favorite 0
quote 0
company that specializes in protecting us from cyberattacks.ook for in future professionals in the cybersecurity business isn, communication. in action, they're demonstrating all of those skills.of the cyberpatriot competition is to inspire more teens to become interested in stem -- science, technology, along with cybersecurity, these are all considered vital to our nation's future. for "teen kids news," i'm eric. attacks on 9/11 may have happened before some of us were born, but they are still a very powerful andy. after years of controversy, one world trade center was finally completed. it now soars aboveine, towering a symbolic 1776 feet. two world trade center has also had a rocky start.began in 2010, it was halted. the building has now been redesigned. slightly shorter than number two features a stair-like exterior, grassy rooftop terraces, and large glass interiors. d by of the 9/11 attacks. >> this important message isnational road safety foundation. [ bell rings ] >> all right, guys! >> so, guess what!rday! >> are you going? >> yes. let's all go together. >> oh, that sounds awesome! [ en
company that specializes in protecting us from cyberattacks.ook for in future professionals in the cybersecurity business isn, communication. in action, they're demonstrating all of those skills.of the cyberpatriot competition is to inspire more teens to become interested in stem -- science, technology, along with cybersecurity, these are all considered vital to our nation's future. for "teen kids news," i'm eric. attacks on 9/11 may have happened before some of us were born, but they...
103
103
Feb 10, 2016
02/16
by
WDBJ
tv
eye 103
favorite 0
quote 0
the president says cybersecurity initiative will pass. president obama also sent congress his eighth and final budget yesterday. the four point one trillion dollar budget combines a number of initatives including fighting cancer, combating global warming and the war against isis. the proposed budget is already facing heavy fire from the gop controlled congress. the court martial of on hold. the judge is waiting for an appeals court to make a decision about whether classified evidence should be shared with bergdahl's defense team. bergdahl is accused of desertion, after his capture outside a us military base in afghanistan in 2009. his captors released him in exchange for five taliban detainees. the colorado springs planned parenthood where three people were killed in november will reopen next week with increased security. the clinic has been closed since black friday, when suspect robert lewis dear opened fire. the shooting spree lasted several hours, causing hospitals and schools to be locked down. a judge ordered a mental competency who
the president says cybersecurity initiative will pass. president obama also sent congress his eighth and final budget yesterday. the four point one trillion dollar budget combines a number of initatives including fighting cancer, combating global warming and the war against isis. the proposed budget is already facing heavy fire from the gop controlled congress. the court martial of on hold. the judge is waiting for an appeals court to make a decision about whether classified evidence should be...
22
22
Feb 5, 2016
02/16
by
WAVY
tv
eye 22
favorite 0
quote 0
the cybersecurity firm serves nearly 30,000 companies worldwide. as the digital dominance grows, will palo alto follow? coming up on "mad money's" "invest in america: countdown to kickoff." here in the city, parking is hard to find. seems like everyone drives. and those who do should switch to geico because you could save hundreds on car insurance. ah, perfect. valet parking. here's the keys. and, uh, go easy on my ride, mate. hm, wouldn't mind some of that beef wellington... to see how much you could save on car insurance, go to geico.com. ah! (car alarm sounds) dry spray? that's fun. it's already dry! no wait time. this is great. it's very soft. can i keep it? (laughs) all the care of dove... ...now in a dry antiperspirant spray. janet? cough if you can hear me. don't even think about it. i took mucinex dm for my phlegmy cough. yeah...but what about mike? it works on his cough too. cough! it works on his cough too. mucinex dm relieves wet and dry coughs for 12 hours. my son and i used to watch the red carpet shows on tv now, i'm walking them. lif
the cybersecurity firm serves nearly 30,000 companies worldwide. as the digital dominance grows, will palo alto follow? coming up on "mad money's" "invest in america: countdown to kickoff." here in the city, parking is hard to find. seems like everyone drives. and those who do should switch to geico because you could save hundreds on car insurance. ah, perfect. valet parking. here's the keys. and, uh, go easy on my ride, mate. hm, wouldn't mind some of that beef...
83
83
Feb 11, 2016
02/16
by
CSPAN2
tv
eye 83
favorite 0
quote 0
cybersecurity. north korea's cyber attack on the sony corporation of america in 2014, which leaked private communication and destroyed the company's data systems, cost sony, an american company, more than $35 million. this is sony corporation of america. it costs them $35 million. why this company? because the company produced a movie that mocked north korea's leadership. last summer north korea pledged to follow up on its attack on sony with more cyber attacks, promising to wage a cyber war against the u.s. to hasten its ruin. and that is an exact quote. america is not north korea's only target for cyber attacks. in 2013, north korea launched a cyber attack on three major south korean banks and two of south korea's largest broadcasters were temporarily shut down after a cyber attack. these cyber attacks cost south korea an estimated $720 million. this is real money, real jobs in our own country and in our allies'. we must take strong action to curb north korea's nuclear program and address the othe
cybersecurity. north korea's cyber attack on the sony corporation of america in 2014, which leaked private communication and destroyed the company's data systems, cost sony, an american company, more than $35 million. this is sony corporation of america. it costs them $35 million. why this company? because the company produced a movie that mocked north korea's leadership. last summer north korea pledged to follow up on its attack on sony with more cyber attacks, promising to wage a cyber war...
57
57
Feb 9, 2016
02/16
by
CSPAN
tv
eye 57
favorite 0
quote 0
and we often talk about cybersecurity. that's actually a boish compromise that was achieved at the end of last year that i failed to mention. there was legislation this administration put forward at the beginning of last year and urged congress to pass. took them the whole year to do it but they did it. they did it not because we talked them into it but because we put forward a good proposal that would strengthen the country's cyberdefenses. so i think the experience of last year certainly informs our relatively optimistic view about this year. and the fact that we have some legitimately bipartisan proposals that both democrats and republicans acknowledge to be good for the country that we can put forward and hopefully ork on together. >> let me pile on a little bit. it would be interesting to go back and look at the press releases they put out last year that the president's budget came out. i think the words dead on arrival were heard quite a bit. mr. donovan: relevance was questioned and to josh's point, not only did we
and we often talk about cybersecurity. that's actually a boish compromise that was achieved at the end of last year that i failed to mention. there was legislation this administration put forward at the beginning of last year and urged congress to pass. took them the whole year to do it but they did it. they did it not because we talked them into it but because we put forward a good proposal that would strengthen the country's cyberdefenses. so i think the experience of last year certainly...
114
114
Feb 14, 2016
02/16
by
KTIV
tv
eye 114
favorite 0
quote 0
along with cybersecurity, these are all considered vital to our nation's future. for "teen kids news," i'm eric. >> the terrorist attacks on 9/11 may have happened before some of us were born, but they are still a very powerful and painful national memory. after years of controversy, one worlrltrade center was fifilly completed. it now soars above the new york city skyline, towering a symbolic 1776 feet. two world trade center has also had a rocky start. 2010, it was halted. the building has now been redesigned. slightly shorter than ononworld trade center, numb two features a stair-like exterior, grassy rooftop terraces, and large glass interiors. it's expected to be completed by around the 20th anniversary of the 9/11 attacks. >> this important message is brought toou by the national road safety foundation. [ bell rings ] >> all right, guys! >> so, guess what! the dance is this saturday! >> are you going? >> yes. let's all go together. >> oh, that sounds awesome! [ engine starts ] >> okay. so, you know the theme tonight is all school spirit., everything spirit..
along with cybersecurity, these are all considered vital to our nation's future. for "teen kids news," i'm eric. >> the terrorist attacks on 9/11 may have happened before some of us were born, but they are still a very powerful and painful national memory. after years of controversy, one worlrltrade center was fifilly completed. it now soars above the new york city skyline, towering a symbolic 1776 feet. two world trade center has also had a rocky start. 2010, it was halted. the...
103
103
Feb 26, 2016
02/16
by
KOLO
tv
eye 103
favorite 0
quote 1
and, an effort is underway to make it easier for nations to share cybersecurity. for news while you're on the go, listen to our newscast partner, news-talk 780, koh. trying to break down barriers to sharing cyber information. republican will hurd says an agreement among nations is hindering the ability of businesses and governments to keep their information secure. kolo 8 news now washington correspondent peter zampa spoke with hurd about efforts to fix the problem. congressman will hurd says a 2013 agreement put harmful controls on the sharing of cyber technology. he says the agreement needs to be thrown out. what was originally intended for the purpose of arms control, the wassenaar arrangement expanded to the cyber space. last may, the united states decided to implement these export controls on cyber technologies, which, hurd says, received nearly unanimous opposition from technology and cybersecurity industries. the controls make it so someone that wants to share a piece of technology or code has to go through an application process to acquire a license to sha
and, an effort is underway to make it easier for nations to share cybersecurity. for news while you're on the go, listen to our newscast partner, news-talk 780, koh. trying to break down barriers to sharing cyber information. republican will hurd says an agreement among nations is hindering the ability of businesses and governments to keep their information secure. kolo 8 news now washington correspondent peter zampa spoke with hurd about efforts to fix the problem. congressman will hurd says a...
95
95
Feb 4, 2016
02/16
by
CNBC
tv
eye 95
favorite 0
quote 0
the cybersecurity firm serves nearly 30,000 companies worldwide.s the digital dominance grows, will palo alto follow? coming up on "mad money's" "invest in america: countdown to kickoff." olay regenerist renews from within... plumping surface cells for a dramatic transformation without the need for fillers. your concert tee might show your age...your skin never will. olay regenerist. olay. ageless. and try regenerist micro-sculpting eyeswirl. it instantly hydrates to plump and lift. watching tvs get sharper, you've had it tough. bigger, smugger. and you? rubbery buttons. enter the x1 voice remote. now when someone says... show me funny movies. watch discovery. record this. voila. remotes, come out from the cushions, you are back. the x1 voice remote is here. >>> this has been a brutal market for formerly beloved high-flying growth stocks like cybersecurity plays. take palo alto networks, panw, which have long been considered best of breed in the group pf last year the stock went 40% higher but after peaking in early december palo alto's been plumme
the cybersecurity firm serves nearly 30,000 companies worldwide.s the digital dominance grows, will palo alto follow? coming up on "mad money's" "invest in america: countdown to kickoff." olay regenerist renews from within... plumping surface cells for a dramatic transformation without the need for fillers. your concert tee might show your age...your skin never will. olay regenerist. olay. ageless. and try regenerist micro-sculpting eyeswirl. it instantly hydrates to plump...