214
214
Jun 4, 2010
06/10
by
CSPAN
tv
eye 214
favorite 0
quote 0
how do we do that in cyberspace?he answer i believe is working through a set of standard rules of engagement we will have and the forces will have, and that is something we have to take on. [inaudible] >> they may all be one set, but those of wartime will be different from peacetime. i had an opportunity in the hearing, and i say this with some level of humor, i was asked this specific question by senator levin when we came up with three different venues. one, how would cyber command act when we are at war and another country is at a combatant and you to be attacked your adversary. now you would say i am going to do these under one set of rules of engagement. now what happens, that was case 1. case 2, what happens with the adversary uses a neutral country to bounce their attack through? that is a different threat, and is not unlike were fair where you have a conflict going in one state and somebody attacks from a neutral state. there are laws of neutral land and we have to look at in cyberspace. the third is what hap
how do we do that in cyberspace?he answer i believe is working through a set of standard rules of engagement we will have and the forces will have, and that is something we have to take on. [inaudible] >> they may all be one set, but those of wartime will be different from peacetime. i had an opportunity in the hearing, and i say this with some level of humor, i was asked this specific question by senator levin when we came up with three different venues. one, how would cyber command act...
209
209
Jun 4, 2010
06/10
by
CSPAN
tv
eye 209
favorite 0
quote 0
government efforts in cyberspace. u.s. cyber command is a military command that falls under title ten, but its business relies on the success of net speed intelligence, which is why cloketting the command with n.s.a. was not only wise, but an imperative. i know that some have concerns about intelligence community involvement in securing the nation's cyber infrastructure. those concerns are valid, which is why the professionals at the national security agency have to minimize the effects of intelligence activities upon u.s. persons. n.s.a. also has an experience and energetic oversight both internally and from the department of justice, the fisa court, and from congress. this explains why collocation of cyber command with those same professionals is perhaps the best way to ensure the transparency of operation that's can affect u.s. person's data and the protection of privacy and civil liberties as our military operations in cyberspace. as of may 21, u.s. cyber command also gained service elements to be boots on the ground i
government efforts in cyberspace. u.s. cyber command is a military command that falls under title ten, but its business relies on the success of net speed intelligence, which is why cloketting the command with n.s.a. was not only wise, but an imperative. i know that some have concerns about intelligence community involvement in securing the nation's cyber infrastructure. those concerns are valid, which is why the professionals at the national security agency have to minimize the effects of...
236
236
Jun 6, 2010
06/10
by
CSPAN
tv
eye 236
favorite 0
quote 0
cyber command will centralized command of military cyberspace operations, strengthen dod cyberspace capabilities, and work on the cyber expertise. the deputy secretary of defense explained our mission last week. we will leave the day-to-day defense of all military networks, support military -- we will lead the day-to-day defense. and we will assist other government and civil authorities and industry partners. as the secretary put it, the key part of cyber koran is the linking of intelligence, offense, and defense -- the key part of cyber command is delinking. the linking. -- the key part of cyber command is the linking. we have an enormous challengee ahead of us as a nation, as a department, and as a command. if i may, i would like to sketch interrelated set of issues that we call a cyberspace and how we hope to sort those issues, i hope resolving some. cyberspace consists of complex systems that store and eventually vast amounts of data. by 2015, the number of network hosts is expected to exceed the human population. i am doing my part to compete against that with 12 grandchildren. but it will
cyber command will centralized command of military cyberspace operations, strengthen dod cyberspace capabilities, and work on the cyber expertise. the deputy secretary of defense explained our mission last week. we will leave the day-to-day defense of all military networks, support military -- we will lead the day-to-day defense. and we will assist other government and civil authorities and industry partners. as the secretary put it, the key part of cyber koran is the linking of intelligence,...
205
205
Jun 3, 2010
06/10
by
CSPAN
tv
eye 205
favorite 0
quote 0
if cyberspace is merely an extension of the traditional society and not a strange place where bad things happen to good people, it means that our policies that govern how we protect and engaged and empower the traditional set of stakeholders and it -- in the traditional run should be extended into cyberspace. that was a bold move. that had a tremendous impact in terms of allocating that is cheaper when the secretary of state delivers a major policy address, that means that is on the table. conversations about internet freedom with a variety of stakeholders which have taken place before are taking place. there is no way to hide the fact that he elevated the issue and did so very comfortably in an effective manner. before you can have a conversation lead to the kind of 60 miles per hour out comes, the conversations have to take place in the first place. her elevating this issue has brought out of the woodwork a variety of staplers that did not know if this was something that was important. many solutions will come from engineers that do not care about human rights, necessarily. they care a
if cyberspace is merely an extension of the traditional society and not a strange place where bad things happen to good people, it means that our policies that govern how we protect and engaged and empower the traditional set of stakeholders and it -- in the traditional run should be extended into cyberspace. that was a bold move. that had a tremendous impact in terms of allocating that is cheaper when the secretary of state delivers a major policy address, that means that is on the table....
294
294
Jun 12, 2010
06/10
by
CSPAN
tv
eye 294
favorite 0
quote 0
michael mylrea is the director of the cyberspace democracy council and was a research director -- or is -- at the u.s. cyber consequences unit. the panel is going to look at independent media wiihin iran, particularly how the green movement has utilize technology to their benefit. as i see it, there are too broad strains of thought to this. there arr skeptics who think nothing much has changed over the years. then there are people who think everything has changed. undoubtedly, there has been an explosion of the internet not just in iran but throughout the region. but the spread of technology is not the end all and be all. people in europe talk about the fact that twitter cannot build a democratic revolution for you. it is a tool. depending on how it is used, it can be very good or less effective. this tiie, we are going to look at technology and how the green povement has used it. mariam, please jump in. >> i am going to be talking about how the internet is being used in iran, particularly by the green movement, how the internet was instrumental to the substance of the green movement
michael mylrea is the director of the cyberspace democracy council and was a research director -- or is -- at the u.s. cyber consequences unit. the panel is going to look at independent media wiihin iran, particularly how the green movement has utilize technology to their benefit. as i see it, there are too broad strains of thought to this. there arr skeptics who think nothing much has changed over the years. then there are people who think everything has changed. undoubtedly, there has been an...
286
286
Jun 23, 2010
06/10
by
CNN
tv
eye 286
favorite 0
quote 1
from the battlespace to cyberspace.und the globe, the people of boeing are working together, to give our best for america's best. that's why we're here. ♪ on his car insurance. so, from now on, i'd like to be known as "the saver." you know, the esurance site gives out discounts every day. "saver." shouldn't we call the website "the saver"? the website already has a nickme, people. which is? "fred." so, you're "the saver," while the website, which gives out thousands of discounts everyday, is called "fred"? hey "saver." yeah that just happened. [ male announcer ] call today or go to esurance.com. >> larry: before we get back with john and melissa and john's doctor, let's check in with anderson cooper still in the gulf naturally. anderson, what's the lead tonight? >> well, breaking news tonight on "360," larry. the president's top man in afghanistan general stanley mcchrystal heading back to washington for a face to face meeting with president obama that could cost the four-star general the job. the stunning interview in
from the battlespace to cyberspace.und the globe, the people of boeing are working together, to give our best for america's best. that's why we're here. ♪ on his car insurance. so, from now on, i'd like to be known as "the saver." you know, the esurance site gives out discounts every day. "saver." shouldn't we call the website "the saver"? the website already has a nickme, people. which is? "fred." so, you're "the saver," while the website,...
631
631
Jun 7, 2010
06/10
by
WMPT
tv
eye 631
favorite 0
quote 0
. >> brown: explain a little bit more about what you see in cyberspace. i mean how does it work.these sites are all out there to be found. >> yes. they are all out there to be found. and one of the dilemmas is whether to try to shut down sites or whether it would actually be worse because they would spring up in new places. at the same time we have to be careful that we don't limit our own freedom when we want to limit theirs. the cyberwar that is going on, on the one front it's hundreds of thousands of attacks on places like the pentagon. but on the other front, there are many, many attacks in terms of cyberjihad. so that is the front we have to take more seriously. i think we're doing very well in that war. we don't want to overreact. >> brown: jessica stern, you've looked at this a lat-- a lot. the internet allows law enforcement to watch what's going on. what issues does it raise for law enforcement? >> well, there are pros and cons both for the terrorists and for law enforcement. it does enable law enforcement authorities and scholars to monitor how terrorists are thinking,
. >> brown: explain a little bit more about what you see in cyberspace. i mean how does it work.these sites are all out there to be found. >> yes. they are all out there to be found. and one of the dilemmas is whether to try to shut down sites or whether it would actually be worse because they would spring up in new places. at the same time we have to be careful that we don't limit our own freedom when we want to limit theirs. the cyberwar that is going on, on the one front it's...
193
193
Jun 4, 2010
06/10
by
CSPAN
tv
eye 193
favorite 0
quote 0
there is new growth of organized crime, they have emerged in cyberspace. that gives them 24 hours a day, seven days a week to committee, to engage in their financing, and to do all other kinds of activities. you get $500 and you can buy a pretty nice computer today and then you have the means to be part of it. it is a different kind of structure. they are less centralized, less focalized -- focus. the connection to violence or corruption is not always apparent and sometimes not there because they do not needed to achieve their activities. so we have identified a lot of problems. what are we doing about it? at the department of justice, they are committed to the criminal enforcement of intellectual property rights. the department of justice3 the task force which brings high level of attention to this issue and is focused on trying to enhance our capabilities. it creates public awareness and we have also reemphasized that we are among other parties have prioritized intellectual property crime that is linked to organized criminal networks and also to terroris
there is new growth of organized crime, they have emerged in cyberspace. that gives them 24 hours a day, seven days a week to committee, to engage in their financing, and to do all other kinds of activities. you get $500 and you can buy a pretty nice computer today and then you have the means to be part of it. it is a different kind of structure. they are less centralized, less focalized -- focus. the connection to violence or corruption is not always apparent and sometimes not there because...
263
263
Jun 4, 2010
06/10
by
CSPAN
tv
eye 263
favorite 0
quote 1
in addition to the growth of organized crime, they have emerged in cyberspace. if you think about it, that distant 24 hours a day, seven days a week to communicate, to engage in their financing, and be involved and other activities. you can buy a pretty nice computer today and doom. you are part of it. organized crime groups are less centralized. they are less ordered -- less worry about hierarchy. their connections to violence or corruption are not always apparent. they do not need it to achieve their activities. we have identified a lot of problems. what are we doing about it? i can tell you that the department of justice is incredibly committed to the criminal enforcement of intellectual property rights. there has been unprecedented levels of attention by high- level government officials in the administration. the department of justice reconstituted back in february the department of justice intellectual property task force. it brings high-level attention to this issue. it is focused on enhancing our operational capabilities. it is tried to create public awar
in addition to the growth of organized crime, they have emerged in cyberspace. if you think about it, that distant 24 hours a day, seven days a week to communicate, to engage in their financing, and be involved and other activities. you can buy a pretty nice computer today and doom. you are part of it. organized crime groups are less centralized. they are less ordered -- less worry about hierarchy. their connections to violence or corruption are not always apparent. they do not need it to...
225
225
Jun 6, 2010
06/10
by
CSPAN
tv
eye 225
favorite 0
quote 0
more needs to be done in terms of putting out not allowing al-awlaki to go unanswered out there in cyberspacebut to give young people an alternative view in the view of a guy like al-awlaki that they can put some kind of argument on the other side. >> i would say a little bit of the direct question but i did that it's relevant. you mentioned the five guys from northern virginia arrested in pakistan. i found thatfascinating for the reason that they had been active the local chapter in the islamic circles of north america. that is an organization in the u.s. since 1971 and was part of the longer activist tradition of islamic activists whcame to the u.s. in the early 60's and set up an champagne the illinois and for most of their history they were not concerned with preventing radicalization. we will say that. i think it is fair to say they were more concerned with pursuing atimuslim discrimination than worrying about their people becoming radicalized. after th happened that was the first time i can recall clearly they were going to take action they wanted to set up programs to intervene. they w
more needs to be done in terms of putting out not allowing al-awlaki to go unanswered out there in cyberspacebut to give young people an alternative view in the view of a guy like al-awlaki that they can put some kind of argument on the other side. >> i would say a little bit of the direct question but i did that it's relevant. you mentioned the five guys from northern virginia arrested in pakistan. i found thatfascinating for the reason that they had been active the local chapter in the...