32
32
Nov 12, 2014
11/14
by
CSPAN2
tv
eye 32
favorite 0
quote 0
as a society to protect ourselves in cyberspace. in the physical world that we have assigned border security to the federal government. but if everyone lives right at the border in cyberspace, it's not possible to assign border security to just one group or element of our society. as a result it means that protecting cyberspace by its very fundamental nature is a mission that has to be shared by all and that makes organizing for cybersecurity incredibly complex because it requires us to do this across boundaries that we have in the physical world made by demand difficult to bridge inside the government and within government agencies and among government agencies and also between the government and the private sector and within the private sector. so these are the problems, economics, politics, what are we doing to address this? and at one level we have to address the technical issues such as cybersecurity that requires a strong technical know-how. one of the things we've been trying to do is something that howard mention, it's the n
as a society to protect ourselves in cyberspace. in the physical world that we have assigned border security to the federal government. but if everyone lives right at the border in cyberspace, it's not possible to assign border security to just one group or element of our society. as a result it means that protecting cyberspace by its very fundamental nature is a mission that has to be shared by all and that makes organizing for cybersecurity incredibly complex because it requires us to do this...
42
42
Nov 4, 2014
11/14
by
CSPAN2
tv
eye 42
favorite 0
quote 0
it's far more than that because of what cyberspace has become to us. cybersecurity has strong aspects but it's more than that and it is an economic and business problem and it's a human psychology and behavioral problem created a political problem and it is a physics problem all rolled into one. so when you combine all those factors together that's why cybersecurity is a hard problem and so difficult for us to solve and difficult for us to tackle. and i want to draw out what those problems are and talk about what we are doing to address them. the first problem i will talk about is the business and economic aspect of cybersecurity i don't think that we understand the economics of cybersecurity very well. and i come to that conclusion because of what i said. we have solutions that we know are out there. the technical solutions that exist if we can't get people to actually implement them. we have been talking about cyber hygiene information sharing, identity management, literally for decades now. and she worthy adversary tactic involved in cyberspace and
it's far more than that because of what cyberspace has become to us. cybersecurity has strong aspects but it's more than that and it is an economic and business problem and it's a human psychology and behavioral problem created a political problem and it is a physics problem all rolled into one. so when you combine all those factors together that's why cybersecurity is a hard problem and so difficult for us to solve and difficult for us to tackle. and i want to draw out what those problems are...
84
84
Nov 19, 2014
11/14
by
KQED
tv
eye 84
favorite 0
quote 0
challenge to american dominance of cyberspace. built by everyone. no mention of a free internet. world sends its best. superhighway, it is the internet. different.t was they monitor it from hong kong. >> how successful is china at it doesn'te material want people to see? filter -- [indiscernible] >> the machine has adapted to the intermittent age more successfully than many others. those who value internet freedom should be concerned about china's attempt to influence global cyberspace. a graduate of hunter college also honored this week as two of american literature's top five talents under 35. recently, michael went to meet driving their students to write the next epic novel. >> the words on the page start to sing to you. i don't know if you can teach creative writing. writers, anfiction opportunity to work alongside. >> so when they finally get the table. >> it's a huge vote of confidence to have these writers that are such incredible writers giving us permission to write and helping us. even an honest man just pushed too far. my job is what they are trying to do. it is really
challenge to american dominance of cyberspace. built by everyone. no mention of a free internet. world sends its best. superhighway, it is the internet. different.t was they monitor it from hong kong. >> how successful is china at it doesn'te material want people to see? filter -- [indiscernible] >> the machine has adapted to the intermittent age more successfully than many others. those who value internet freedom should be concerned about china's attempt to influence global...
59
59
Nov 1, 2014
11/14
by
CSPAN
tv
eye 59
favorite 0
quote 0
as we face ever more threats in cyberspace which incorporate the public-private cooperation into the toolkit the threats are not but threats are not letting up and neither should we. thank you very much for inviting me. questions for mr. carlin? >> lefty rely on you. >> i had. >> i had a radio show at the national press club on climate change. in my radio show i deal with a lot of ngos that don't trust the government and when they see the government partnering in the private sector, they get really nervous. ideally there was a chamber of commerce that hired a number of offensive cyber firms to engage in the cyber attacks against some of these ngos. i don't know that the department of justice or anyone else in the federal investigated or prosecuted that. i'm not sure on the liability repercussions. and it is really thick among the community working on the climate change into a lot of other things when we consider the full weight of the government and the private sector standing on our backs. what i would like to know if have you considered that the federal government might reassure al
as we face ever more threats in cyberspace which incorporate the public-private cooperation into the toolkit the threats are not but threats are not letting up and neither should we. thank you very much for inviting me. questions for mr. carlin? >> lefty rely on you. >> i had. >> i had a radio show at the national press club on climate change. in my radio show i deal with a lot of ngos that don't trust the government and when they see the government partnering in the private...
41
41
Nov 12, 2014
11/14
by
CSPAN2
tv
eye 41
favorite 0
quote 0
as we face ever more threats in cyberspace which incorporate the public-private cooperation into the toolkit the threats are not but threats are not letting up and neither should we. thank you very much for inviting me. questions for mr. carlin? >> lefty rely on you. >> i had. >> i had a radio show at the national press club on climate change. in my radio show i deal with a lot of ngos that don't trust the government and when they see the government partnering in the private sector, they get really nervous. ideally there was a chamber of commerce that hired a number of offensive cyber firms to engage in the cyber attacks against some of these ngos. i don't know that the department of justice or anyone else in the federal investigated or prosecuted that. i'm not sure on the liability repercussions. and it is really thick among the community working on the climate change into a lot of other things when we consider the full weight of the government and the private sector standing on our backs. what i would like to know if have you considered that the federal government might reassure al
as we face ever more threats in cyberspace which incorporate the public-private cooperation into the toolkit the threats are not but threats are not letting up and neither should we. thank you very much for inviting me. questions for mr. carlin? >> lefty rely on you. >> i had. >> i had a radio show at the national press club on climate change. in my radio show i deal with a lot of ngos that don't trust the government and when they see the government partnering in the private...
34
34
Nov 12, 2014
11/14
by
CSPAN2
tv
eye 34
favorite 0
quote 0
and does that constitute the use of force in cyberspace and will that be the same for activities in cyberspace and other nations as well? >> okay, we have a legal definition under the law of this armed conflict and that's what is a military act, if you will. we are working our way through a broader policy debate about the extension of those rules to the cyberarena area and we have definitions for what is a defensive responsive action and we have definitions for all of that. and this is a society that we are trying to come to reps with. please you all of this directed against corporate networks, governmental networks, private individuals. what is the right response and the broader issue is what is the right response to this. and what i hope we can conclude is a set of rules where we have a much better deterrence. and if you are a group or an individual, must come to the conclusion that this is incredibly low risk and there's little price to pay for the actions that they are taking. and i believe that most look at but it could be pretty aggressive and that is not in our best interest in the long
and does that constitute the use of force in cyberspace and will that be the same for activities in cyberspace and other nations as well? >> okay, we have a legal definition under the law of this armed conflict and that's what is a military act, if you will. we are working our way through a broader policy debate about the extension of those rules to the cyberarena area and we have definitions for what is a defensive responsive action and we have definitions for all of that. and this is a...
84
84
Nov 4, 2014
11/14
by
ALJAZAM
tv
eye 84
favorite 0
quote 0
virus spinning in cyberspace. >> so we want to design >> so we want to design a protein. a protein. >'s a game called "foldit". >> it's a game called "foldit". zoran papovic who developed it zoran papovic who developed it calls it a 3d jigsaw puzzle. calls it a 3d jigsaw puzzle. >> and if it fits in that spot, >> and if it fits in that spot, all of a sudden the virus all of a sudden the virus wouldn't be able to do stuff wouldn't be able to do stuff that it was doing before. that it was doing before. >> so it would inhibit that >> so it would inhibit that virus? >> that's right. virus? >> that's right. >> players all over the world >> players all over the world participate. participate. the whole point for the 700 the whole point for the 700 gamers who have tackled the gamers who have tackled the ebola puzzles is to have a real ebola puzzles is to have a real world impact. world impact. dr. david baker runs the dr. david baker runs the university of washington's university of washington's institute for protein design institute for protein design where the ebola foldit effort where the
virus spinning in cyberspace. >> so we want to design >> so we want to design a protein. a protein. >'s a game called "foldit". >> it's a game called "foldit". zoran papovic who developed it zoran papovic who developed it calls it a 3d jigsaw puzzle. calls it a 3d jigsaw puzzle. >> and if it fits in that spot, >> and if it fits in that spot, all of a sudden the virus all of a sudden the virus wouldn't be able to do stuff wouldn't be able to...
31
31
Nov 12, 2014
11/14
by
CSPAN2
tv
eye 31
favorite 0
quote 0
state department as a relatively new office at the same time the white house penelope strategy for cyberspace it was created to have a course cyberfocus that would help to execute the priorities and strategies with the full range of cyberissues and economic development with international security growing from a core group of five -- by the at the 20 focusing on a wide range but typically on helping to spread the message to create a culture around the world and this was highlighted in the international strategies it states the critical of the structure that is used a lot of things i could come back to later but there is a robust diplomatic effort that the u.s. state department needs in cooperation with civil society to create the right kind of environment with a key products we try to help the rest of the world see the benefit to adopted corporate. >> the queue for the wonderful work on severs security bet with that policy and a few other issues i focus not just on the u.s. but the international markets for simple reasons everybody knows how global severs security is but with the company like
state department as a relatively new office at the same time the white house penelope strategy for cyberspace it was created to have a course cyberfocus that would help to execute the priorities and strategies with the full range of cyberissues and economic development with international security growing from a core group of five -- by the at the 20 focusing on a wide range but typically on helping to spread the message to create a culture around the world and this was highlighted in the...
51
51
Nov 10, 2014
11/14
by
ALJAZAM
tv
eye 51
favorite 0
quote 0
nation's highest military >> you are inside a protein molecule attached to the ebola virus spinning in cyberspace>> so we want to design a protein. >> it's a game called "foldit". zoran papovic who developed it calls it a 3d jigsaw puzzle. >> and if it fits in that spot, all of a sudden the virus wouldn't be able to do stuff that it was doing before. >> so it would inhibit that virus? >> that's right. >> players all over the world participate. the whole point for the 700 gamers who have tackled the ebola puzzles is to have a real world impact. dr. david baker runs the university of washington's institute for protein design where the ebola foldit effort has already given scientists new leads. >> we can design stuff on the computer that has never existed and then in the lab be working with it in real life. >> translating that into vaccines or treatments could take years. >>> finally from us, the long road that leads to death with honour, leads us to the back story of the latest medal honour ceremony. we told you about lieutenant alonzo cushing a few weeks ago. days after our report, the white house
nation's highest military >> you are inside a protein molecule attached to the ebola virus spinning in cyberspace>> so we want to design a protein. >> it's a game called "foldit". zoran papovic who developed it calls it a 3d jigsaw puzzle. >> and if it fits in that spot, all of a sudden the virus wouldn't be able to do stuff that it was doing before. >> so it would inhibit that virus? >> that's right. >> players all over the world participate....
109
109
Nov 12, 2014
11/14
by
MSNBCW
tv
eye 109
favorite 0
quote 0
they sort of see cyberspace as another battlefield, an extension of where the military has always been fight, achieve that dominance. the thing that worried me the most though, as nsa has sought to prepare the cyber domain as a battlefield, to do that it's fundamentally weakening a lot of technologies like encryption we rely on to keep our financial transactions safe, communications safe. it has to weaken those it knows how to get in and exploit a system or try to hack in and steal information. there's a residual effect of that, though. it makes us all potentially less security and we could be collateral damage, if you like in a cyber war if that were to break out in the future. >> so you talked to as you're alluding to a lot of these super hackers housed at nsa, part of the tailored access operations group. tell us how they function and what they actually do on sort of a daily basis. >> tao is sort of like the ultrahack he recalls the elite sort of brigades inside nsa where the highly, highly skilled folks are working. there's they're they're stationed in different places around the c
they sort of see cyberspace as another battlefield, an extension of where the military has always been fight, achieve that dominance. the thing that worried me the most though, as nsa has sought to prepare the cyber domain as a battlefield, to do that it's fundamentally weakening a lot of technologies like encryption we rely on to keep our financial transactions safe, communications safe. it has to weaken those it knows how to get in and exploit a system or try to hack in and steal information....
76
76
Nov 1, 2014
11/14
by
CSPAN
tv
eye 76
favorite 0
quote 0
and will that definition be the same for activities in cyberspace and those for other nations as well? >> we have a legal definition under the law of armed conflict and the law of warfare as to what is a military act if you will. we are working our way through a policy debate about what is the extension of those rules to the cyber arena. we have definitions for what is offensive versus what is defensive response actions. the broader issue is as a society where try to come to grips with we feel this activity directed against corporate networks, governmental networks, private individuals. what is the right response? i think the broader issue is what is the right response to this? what i hope we can develop over time is a set of norms and rules that get us into an area where we have a much better definition of what is acceptable and not and even the idea of deterrence. right now, if you are a nationstate, a group, an individual, my assessment is that most come to the conclusion that it is incredibly low risk that there is little price to pay for the actions they are taking. i am not sayi
and will that definition be the same for activities in cyberspace and those for other nations as well? >> we have a legal definition under the law of armed conflict and the law of warfare as to what is a military act if you will. we are working our way through a policy debate about what is the extension of those rules to the cyber arena. we have definitions for what is offensive versus what is defensive response actions. the broader issue is as a society where try to come to grips with we...
66
66
Nov 5, 2014
11/14
by
ALJAZAM
tv
eye 66
favorite 0
quote 0
. >> you are inside a protein molecule attached to the ebola virus spinning in cyberspace. >> so we want to design a protein. >> it's a game called "foldit". zoran papovic who developed it calls it a 3d jigsaw puzzle. >> and if it fits in that spot, all of a sudden the virus wouldn't be able to do stuff that it was doing before. >> so it would inhibit that virus? >> that's right. >> players all over the world participate. the whole point for the 700 gamers who have tackled the ebola puzzles is to have a real world impact. dr. david baker runs the university of washington's institute for protein design where the ebola foldit effort has already given scientists new leads. >> we can design stuff on the computer that has never existed and then in the lab be working with it in real life. >> translating that into vaccines or treatments could take years. you. >> andra gillispie when you look at the incomes two years and you look at the just fought elections are the republicans going to be positioning themselves in a different way? dialing back on social issues, for example? >> i'm assuming that
. >> you are inside a protein molecule attached to the ebola virus spinning in cyberspace. >> so we want to design a protein. >> it's a game called "foldit". zoran papovic who developed it calls it a 3d jigsaw puzzle. >> and if it fits in that spot, all of a sudden the virus wouldn't be able to do stuff that it was doing before. >> so it would inhibit that virus? >> that's right. >> players all over the world participate. the whole point for...
34
34
Nov 3, 2014
11/14
by
ALJAZAM
tv
eye 34
favorite 0
quote 0
. >> you are inside a protein molecule attached to the ebola virus spinning in cyberspace. >> so we want to design a protein. >> it's a game called "foldit". zoran papovic who developed it calls it a 3d jigsaw puzzle. >> and if it fits in that spot, all of a sudden the virus wouldn't be able to do stuff that it was doing before. >> so it would inhibit that virus? >> that's right. >> players all over the world participate. the whole point for the 700 gamers who have tackled the ebola puzzles is to have a real world impact. dr. david baker runs the university of washington's institute for protein design where the ebola foldit effort has already given scientists new leads. >> we can design stuff on the computer that has never existed and then in the lab be working with it in real life. >> translating that into vaccines or treatments could take years. >> human beings have always imagined different possibilities, different futures. >> a huge part of science-fiction, which is sometimes called space opera, is about what will humans do in space, what kinds of civilizations we will create, how wi
. >> you are inside a protein molecule attached to the ebola virus spinning in cyberspace. >> so we want to design a protein. >> it's a game called "foldit". zoran papovic who developed it calls it a 3d jigsaw puzzle. >> and if it fits in that spot, all of a sudden the virus wouldn't be able to do stuff that it was doing before. >> so it would inhibit that virus? >> that's right. >> players all over the world participate. the whole point for...
297
297
Nov 2, 2014
11/14
by
ALJAZAM
tv
eye 297
favorite 0
quote 0
it uses layers and layers of encryption, a kind of cloaking device built for cyberspace. with more on how journalists are securing their communications and covering their tracks on the web, here is the listening post's will young. >> for the security conscious journalist, these two freely available tools really are essential. one can converts contents into uncrackable code and the other keeps the online activities under radar. first pgp. i am using the extension for google chrome called mail velope to get my personal key. this is a private key only i have access to the and a public key i can make available to the people i want to communicate with. now that my key is ready, i am going to send the public part of it to my colleague, paolo. he has sent me his public key. when i want to send an e-mail, i am going to en crypt it. i will en crypt this message for paolo's eyes only. pgp uses my private key and paolo's public key to turn my message into encrypted text. it's not quite security at the click of a mouse, but you have to take the step to keep your communications safe.
it uses layers and layers of encryption, a kind of cloaking device built for cyberspace. with more on how journalists are securing their communications and covering their tracks on the web, here is the listening post's will young. >> for the security conscious journalist, these two freely available tools really are essential. one can converts contents into uncrackable code and the other keeps the online activities under radar. first pgp. i am using the extension for google chrome called...
95
95
Nov 13, 2014
11/14
by
WJLA
tv
eye 95
favorite 0
quote 0
. >> growing number of therapists are taking their practices into cyberspace.e'll splaexplain coming up. yeah, we were nervous to try it. there's an amazing sensation for her. amazing. this one feels fantastic for me. and combined... ohh, it's a completely new sensation for us both. it's opened a whole new door for us. i've come to clean your pool. but we don't have a pool. i'll come in anyway. next week i'm going to be a maid. [ female announcer ] k-y yours & mine. his excites. hers delights. together feel them ignite. keep life sexy. together feel them ignite. he found it cleans everything... whefrom stove tops...d writing a book about his magic eraser ...to scuffed shoes, and more. and when ran out of pages, he made a website instead. share your tips at mycleanbook.com she loves to shop online with her debit card. and so does bill, an identity thief who stole mary's identity, took over her bank accounts, and stole her hard earned money. unfortunately, millions of americans just like you learn all it may take is a little misplaced information to wreak havoc o
. >> growing number of therapists are taking their practices into cyberspace.e'll splaexplain coming up. yeah, we were nervous to try it. there's an amazing sensation for her. amazing. this one feels fantastic for me. and combined... ohh, it's a completely new sensation for us both. it's opened a whole new door for us. i've come to clean your pool. but we don't have a pool. i'll come in anyway. next week i'm going to be a maid. [ female announcer ] k-y yours & mine. his excites. hers...
101
101
Nov 4, 2014
11/14
by
ALJAZAM
tv
eye 101
favorite 0
quote 0
. >> you are inside a protein molecule attached to the ebola virus spinning in cyberspace. >> so we wantdesign a protein. >> it's a game called "foldit". zoran papovic who developed it calls it a 3d jigsaw puzzle. >> and if it fits in that spot, all of a sudden the virus wouldn't be able to do stuff that it was doing before. >> so it would inhibit that virus? >> that's right. >> players all over the world participate. the whole point for the 700 gamers who have tackled the ebola puzzles is to have a real world impact. dr. david baker runs the university of washington's institute for protein design where the ebola foldit effort has already given scientists new leads. >> we can design stuff on the computer that has never existed and then in the lab be working with it in real life. >> translating that into vaccines or treatments could take years. >>> north carolina is a moderate state. it was president obama's victory in 2008. and mitt romney's in 2012. >> north carolina is a closely contested state. how it goes, the senate will go the same direction, i think. >> someone talked about the pr
. >> you are inside a protein molecule attached to the ebola virus spinning in cyberspace. >> so we wantdesign a protein. >> it's a game called "foldit". zoran papovic who developed it calls it a 3d jigsaw puzzle. >> and if it fits in that spot, all of a sudden the virus wouldn't be able to do stuff that it was doing before. >> so it would inhibit that virus? >> that's right. >> players all over the world participate. the whole point for the...
35
35
Nov 5, 2014
11/14
by
CSPAN2
tv
eye 35
favorite 0
quote 0
whoever sold it to them sold it to someone else and to this day heard dash it is floating around in cyberspace and someone else will buy it and try to collect. somehow that more than anything else speaks to the chaos and this functionality of this industry. >> host: to give one message to fix this one is the take away? >> give skeptical who was calling you on the phone and you cannot assume blindly they have a legitimate claim that what they're asking for is accurate that there is no legal obligation and to pay the debt. and would ensure financial reaction to these calls but thirties' to be better enforcement with the projection of zero and the banks have to be more careful on what they pass along that there is a documentation there is supposed to be. and their needs to be a change of the support network said 90 percent no-shows' rate creates these garnishments and problems are there is a fair amount that needs to be done simic 84 writing this book. and other regulatory basis this is in the? setting i could not stop so thank you for writing the book. >> guest: thanks so much spin again calling
whoever sold it to them sold it to someone else and to this day heard dash it is floating around in cyberspace and someone else will buy it and try to collect. somehow that more than anything else speaks to the chaos and this functionality of this industry. >> host: to give one message to fix this one is the take away? >> give skeptical who was calling you on the phone and you cannot assume blindly they have a legitimate claim that what they're asking for is accurate that there is...
40
40
Nov 28, 2014
11/14
by
CSPAN2
tv
eye 40
favorite 0
quote 0
must have stolen it from someone else as well and to this day, but that is just floating around in cyberspace and someone else will buy it and try to collect on it. and somehow that more than anything else just kind of seemed to speak to the chaos and the dysfunctionality of this industry. >> host: you actually give one message to consumers and regulators to fix this; what is the take away? >> guest: you have to be skeptical who is calling you on the phone can and can't assume blindly that they have a legitimate claim or that the amount that they are asking for is accurate and you have to do your homework and make sure that there's a legal obligation to pay the debts and the equivalent of fighting defensively, which your financial reaction to the calls. on the larger level there's a few things that need to happen. one is there needs to be better enforcement and resources in places like the consumer financial protection bureau. there were two things have to be careful about what they pass along and make sure the information is correct and that the information is where it's supposed to be. and
must have stolen it from someone else as well and to this day, but that is just floating around in cyberspace and someone else will buy it and try to collect on it. and somehow that more than anything else just kind of seemed to speak to the chaos and the dysfunctionality of this industry. >> host: you actually give one message to consumers and regulators to fix this; what is the take away? >> guest: you have to be skeptical who is calling you on the phone can and can't assume...
62
62
Nov 13, 2014
11/14
by
BLOOMBERG
tv
eye 62
favorite 0
quote 0
that is almost be will during how widespread it is, and i believe we are getting sucker punched in cyberspaceight now in the united states because basically, the save -- the safe harbors. there are no risks or repercussions if you hack out of china make now. >> in the last 30 seconds, should some of this stuff be mandatory or voluntary? should the federal government take the lead? >> it is complex, because one company, what he needs to do in one industry, it is different than other companies. they will have different risk profiles and different requirements. the bottom line is what people are doing is they are starting to address cyber security. about a decade ago, we worried about, how to protect our networks and then we went into, how to detect when something bad happens. we are finally at the stage where we evolved cyber security too, if something bad does happen, how do we quash it? >> achieve operating officer joining us from washington. thank you for your time. we appreciate it. stay with us. "bottom line" continues in a moment. ♪ >> bloomberg television is on the markets. less take a l
that is almost be will during how widespread it is, and i believe we are getting sucker punched in cyberspaceight now in the united states because basically, the save -- the safe harbors. there are no risks or repercussions if you hack out of china make now. >> in the last 30 seconds, should some of this stuff be mandatory or voluntary? should the federal government take the lead? >> it is complex, because one company, what he needs to do in one industry, it is different than other...
110
110
Nov 21, 2014
11/14
by
FOXNEWSW
tv
eye 110
favorite 0
quote 0
if somebody does you a kindness, pan a few lines on paper, not cyberspace.y classy thing to do. recently barnes & noble selected killing patton as one of the top holiday books. and the website goodreads.com has nominated patton for best history and biography book of the year. since i can't write a thank you note to a corporation or a website, i wrote this "the factor" tip of the day. thanks, guys. that is it for us tonight. please check out the fox news factor website which is different from billoreilly.com. also, we would like you to spout off about "the factor." plenty to talk about tonight. o'reilly@foxnews.com. name and town if you wish to opine. word of the day, no zabernism. a great word. no zabernism when writing to "the factor." >>> tomorrow, grand jury meets in st. louis, missouri about the ferguson situation. fox news on the scene. we will get a heads up on it. you will know, "the factor" will be on tomorrow night. we're ready for anything. it's going to be a very interesting day. more reaction of course as the president's immigration order tonight
if somebody does you a kindness, pan a few lines on paper, not cyberspace.y classy thing to do. recently barnes & noble selected killing patton as one of the top holiday books. and the website goodreads.com has nominated patton for best history and biography book of the year. since i can't write a thank you note to a corporation or a website, i wrote this "the factor" tip of the day. thanks, guys. that is it for us tonight. please check out the fox news factor website which is...
62
62
Nov 10, 2014
11/14
by
MSNBCW
tv
eye 62
favorite 0
quote 0
. >> our investigations are on the street, on the phone, in cyberspace. >> special prosecutor jack blakey's message -- if you're selling women in chicago, beware. >> wiretapping changes the game. it allows us to hear the traffickers and find out who's in charge and work our way up the chain of command. >> blakey helped write the illinois safe children's act, a law that gives local police the ability to track pimps and gang members using wiretaps normally reserved for federal drug cases. >> and that particular act is the reason that we're here today. >> the new law resulted in the prosecution of the largest human trafficking case in illinois history. >> what we have seen in recent cases, in one particular case, all the young girls were branded. >> they are literally slaves. >> prosecutor lou longhutano says with the help of wiretaps ten defendants now face up to 30 years in prison. >> we've got telephone conversations of the guys trying to sweet-talk the girls, giving them orders, telling them where to go, girls reporting back. we've even got audiotape of a call where one of the pimps was be
. >> our investigations are on the street, on the phone, in cyberspace. >> special prosecutor jack blakey's message -- if you're selling women in chicago, beware. >> wiretapping changes the game. it allows us to hear the traffickers and find out who's in charge and work our way up the chain of command. >> blakey helped write the illinois safe children's act, a law that gives local police the ability to track pimps and gang members using wiretaps normally reserved for...
121
121
Nov 3, 2014
11/14
by
ALJAZAM
tv
eye 121
favorite 0
quote 0
. >> you are inside a protein molecule attached to the ebola virus spinning in cyberspace. >> so we want to design a protein. >> it's a game called "foldit". zoran papovic who developed it calls it a 3d jigsaw puzzle. >> and if it fits in that spot, all of a sudden the virus wouldn't be able to do stuff that it was doing before. >> so it would inhibit that virus? >> that's right. >> players all over the world participate. the whole point for the 700 gamers who have tackled the ebola puzzles is to have a real world impact. dr. david baker runs the university of washington's institute for protein design where the ebola foldit effort has already given scientists new leads. >> we can design stuff on the computer that has never existed and then in the lab be working with it in real life. >> translating that into vaccines or treatments could take years. >>> if you think journalism today is too biased, you should have seen it in the days of abraham lincoln, filled with more opinion and fact, newspapers at the time advocated for and against candidates and issues. editors sought office and papers
. >> you are inside a protein molecule attached to the ebola virus spinning in cyberspace. >> so we want to design a protein. >> it's a game called "foldit". zoran papovic who developed it calls it a 3d jigsaw puzzle. >> and if it fits in that spot, all of a sudden the virus wouldn't be able to do stuff that it was doing before. >> so it would inhibit that virus? >> that's right. >> players all over the world participate. the whole point for...
111
111
Nov 20, 2014
11/14
by
FOXNEWSW
tv
eye 111
favorite 0
quote 0
that is time now for an international agreement on the laws of war for cyberspace. we've been tracking it. hi, catherine. >> well, thank you shannon. this morning before the house intelligence committee, the new head of the nsa for the first time publicly confirmed that other countries already have the ability to get inside the nation's infrastructure and take down major systems, including power and water. >> there shouldn't be any doubt in our mind there is nation states and groups that have the capable to do that. there are systems to enter those industrial control systems and to shut down, forestall our ability to operate our basic infrastructure. >> there any other nation state that you believe has been successful in getting on those systems? >> i would say there is more than one nation out there that we believe has these capabilities that we watch. >> well, not publicly identifying the chinese, it's well documented that cyberintrusionses and cyberespionage are a mandate of the special unit of the people's liberate army in a skyscraper known as the pla under 613
that is time now for an international agreement on the laws of war for cyberspace. we've been tracking it. hi, catherine. >> well, thank you shannon. this morning before the house intelligence committee, the new head of the nsa for the first time publicly confirmed that other countries already have the ability to get inside the nation's infrastructure and take down major systems, including power and water. >> there shouldn't be any doubt in our mind there is nation states and groups...
28
28
Nov 12, 2014
11/14
by
CSPAN2
tv
eye 28
favorite 0
quote 0
michael daniel talks about cyberspace. this is 20 minutes. good morning it is the pleasure to be here at the chamber i tried to throw in a few new things into my speech so it is not boring for you so thanks for the introduction. i want to talk today about why cybersecurity is such a hard problem well be stalled -- still talk about it and how we think about that and design policies to shift or address the hard problems. when you take a step back from a purely technical standpoint at its root most of the time they get into the vulnerability that we know about so the enemy is on than networks that we are well aware of the end we have a patch but we don't do it. what is the deal? from my a point of view cybersecurity is not just a technical problem. it is far more than that in fact, cybersecurity does have technical aspects but it is more than that it is an economics problem vanda business problem and is ecology and behavior problems and if this six problem rolled into one. when you combine those factors that is why it is hard for us to solve or
michael daniel talks about cyberspace. this is 20 minutes. good morning it is the pleasure to be here at the chamber i tried to throw in a few new things into my speech so it is not boring for you so thanks for the introduction. i want to talk today about why cybersecurity is such a hard problem well be stalled -- still talk about it and how we think about that and design policies to shift or address the hard problems. when you take a step back from a purely technical standpoint at its root...
59
59
Nov 18, 2014
11/14
by
ALJAZAM
tv
eye 59
favorite 0
quote 0
be making sense ♪ >> you are inside a protein molecule attached to the ebola virus spinning in cyberspacee a proteine. molecule attached to the ebola molecule. spinning in space. it's a game called fold it. zorin popovich who developed it calls it a 3d puzzle. players all in favor all over the world participate the whole point for the 700 gamers who have tackled the ebola puzzles is to have a real world impact. dr. david baker runs the university of washington's institute for design. literacy given scientists new leads. >> we can design stuff on the computer that has never existed then in the lab be working on it in real life. >> translating that to vaccines could take years. >> coming up on "consider this," the fbi warns law enforcement around the country that the upcoming grand jury decision in the ferguson, missouri case could lead to violence. >>> also will success in afghanistan require teaming up with the taliban? plus americans are more concerned with alzheimer's compared to any other disease. why doesn't it get its fair share of research funding. nfl under heavy pressure from the
be making sense ♪ >> you are inside a protein molecule attached to the ebola virus spinning in cyberspacee a proteine. molecule attached to the ebola molecule. spinning in space. it's a game called fold it. zorin popovich who developed it calls it a 3d puzzle. players all in favor all over the world participate the whole point for the 700 gamers who have tackled the ebola puzzles is to have a real world impact. dr. david baker runs the university of washington's institute for design....
59
59
Nov 7, 2014
11/14
by
ALJAZAM
tv
eye 59
favorite 0
quote 0
. >> you are inside a protein molecule attached to the ebola virus spinning in cyberspace. >> so we wantdesign a protein. >> it's a game called "foldit". zoran papovic who developed it calls it a 3d jigsaw puzzle. >> and if it fits in that spot, all of a sudden the virus wouldn't be able to do stuff that it was doing before. >> so it would inhibit that virus? >> that's right. >> players all over the world participate. the whole point for the 700 gamers who have tackled the ebola puzzles is to have a real world impact. dr. david baker runs the university of washington's institute for protein design where the ebola foldit effort has already given scientists new leads. >> we can design stuff on the computer that has never existed and then in the lab be working with it in real life. >> translating that into vaccines or treatments could take years. >> on the next "talk to al jazeera", legendary tv host dick cavett. >> steve jobs said, "how does it feel to be dick cavett"? about the only question that's ever floored me, you know? >> "talk to al jazeera". only on al jazeera america. >>> today w
. >> you are inside a protein molecule attached to the ebola virus spinning in cyberspace. >> so we wantdesign a protein. >> it's a game called "foldit". zoran papovic who developed it calls it a 3d jigsaw puzzle. >> and if it fits in that spot, all of a sudden the virus wouldn't be able to do stuff that it was doing before. >> so it would inhibit that virus? >> that's right. >> players all over the world participate. the whole point for the...
145
145
Nov 27, 2014
11/14
by
CSPAN3
tv
eye 145
favorite 0
quote 0
tribes in addition teaching and writing about tribal law, american indian history, federal court, cyberspace law, copyright and civil procedure. his pub stations include articles on policy and federal juris sdikz. professor clinton, welcome. >> i want to thank kevin and susan for involving me in this project and the wonderful star for all of the want itity and help on both of the essay in the book and it's a little difficult in the book to follow this morning, but i will try and what i'm going to do with you is to do a 400 year plus survey about indians and indian treaties. and to try to put them in some perspective, some of which they averted to. treaties are an interesting phenomenon, particularly of north america. attempting to think that somehow europeans brought treaties to north america, but that's not true. we know if you think about it, that at the time of first contact, there was a rich tribal alliance and negotiations and intertribal relations between the original occupants. a great wall of peace, i won't try to pronounce it since i'm not that kind of speaker and do not want to mur
tribes in addition teaching and writing about tribal law, american indian history, federal court, cyberspace law, copyright and civil procedure. his pub stations include articles on policy and federal juris sdikz. professor clinton, welcome. >> i want to thank kevin and susan for involving me in this project and the wonderful star for all of the want itity and help on both of the essay in the book and it's a little difficult in the book to follow this morning, but i will try and what i'm...
144
144
tv
eye 144
favorite 0
quote 0
>> look, cyberspace is just a virtual expression of reality, meaning we need to make our intentions known. there need to be a speechh either by the president, the secretary of defense that this is a penetration of our national security. and there should be sanctions oo measures. what is happening right now, the other side is making all the steps and nothing in response. lou: colonel, that speech has been given. the pentagon, the white house served notice, and yet again a red line and there is no response from this white house. >> this is deja vu cold war again, lou, the reaaity is we stood up a cybercommand. the russians using cyberaggressively against our assets like the chinese. this is war as far as i'm concerned. the reality is that if these malware, the trojan horse were executed on command which are embedded in infrastructure, it could lead to an economic catastrophe in this countryy o we know that. that's why the cybercommand is working overtime trying prevent that, trying to iscover it like the homeland security situation. this is going to become far more complex in the near futur
>> look, cyberspace is just a virtual expression of reality, meaning we need to make our intentions known. there need to be a speechh either by the president, the secretary of defense that this is a penetration of our national security. and there should be sanctions oo measures. what is happening right now, the other side is making all the steps and nothing in response. lou: colonel, that speech has been given. the pentagon, the white house served notice, and yet again a red line and...
113
113
Nov 13, 2014
11/14
by
FOXNEWSW
tv
eye 113
favorite 0
quote 0
lost in cyberspace creating phony worlds in which they can escape responsibility.not underestimate how these machines are changing the way americans participate in the political process. 2 00 years from now, 800% of population will control the other 80%. the machine addiction is just going to get worse. george orwell was right on. these days politicians are play fog a very narrow audience. unless you have a breakout political guy like barack obama who is african-american's status caught everybody's attention, election day is becoming passe. however, i do expect heavy interest in a 2016 presidential race because of hillary clinton. she is a polarizing figure and could become the first woman to win the presidency. everyone will know that's in play. but as far as the off year elections, forget about it. americans have checked out. and that's the memo. now for the top story tonight. are we being conned again by the obama administration? in china, president obama has announced that the u.s.a. and the chinese will work together work toke to cut carbon emission thought by
lost in cyberspace creating phony worlds in which they can escape responsibility.not underestimate how these machines are changing the way americans participate in the political process. 2 00 years from now, 800% of population will control the other 80%. the machine addiction is just going to get worse. george orwell was right on. these days politicians are play fog a very narrow audience. unless you have a breakout political guy like barack obama who is african-american's status caught...
168
168
Nov 12, 2014
11/14
by
KOFY
tv
eye 168
favorite 0
quote 0
project put on by the contra costa county library and the gallery is cyberspace. >> accessible to themany as possible. not everybody can drive or go to the museum or to gallery or would for that matter. >> the goal to break down invisible wall that often come with returning from war. >> i getal fine with people. i don't know how to open up new relationship or sustain them once open. >> john spent 4 straight years with the same 20 people soon all of them have this tattoo on the right leg. >> hardship to go through it just creates t that is unbreakable. >> i have a lot of friends that just say people don't get it. haven't been over there i can't talk to them. >> but dark at times the tattoo can speak volume and war ink creators hope they form the beginning of dialogue between veteran and civilians. >> probably the most powerful and significant act could you do this veterans day is just to listen. >> in san francisco i don't know thon bloom abc 7 news. >> just listen. we is a lawsuit all of our veterans. see the war ink project for yourself link at abc 7 news.co news.com. check it out wh
project put on by the contra costa county library and the gallery is cyberspace. >> accessible to themany as possible. not everybody can drive or go to the museum or to gallery or would for that matter. >> the goal to break down invisible wall that often come with returning from war. >> i getal fine with people. i don't know how to open up new relationship or sustain them once open. >> john spent 4 straight years with the same 20 people soon all of them have this tattoo...
93
93
Nov 13, 2014
11/14
by
KNTV
tv
eye 93
favorite 0
quote 0
. >> as reported by a fresh communique, 16% of the american populous don't retain entry into cyberspaced chronology warner clientele. thank you so much. thank you. [ cheers and applause ] >> seth: no, no, no. no, that wasn't better. you changed time warner into chronology warner. >> yes. that is a grand improvement. >> seth: no, no, no. it's not. if change the name of the company it ruins the joke about the company. >> well, you know what they say, seth -- i guess we acquiesce to contradict. >> seth: you mean agree to disagree? >> affirmative. >> seth: yeah, but no one says it like that. >> well, to each his possess. [ laughter ] >> seth: to each his own? >> ugh, own, so pedestrian. >> seth: all right, you know what? let's just do another one. >> yeah, let's. go ahead. >> seth: the "new york post" said recently that oscar wilde is responsible for kim kardashian's rise to a fame because he was the first person to be famous for being famous. when asked what she thought, kim said, "is oscar the one who lives in a trash can?" [ laughter ] >> seth, seth, seth, seth, seth. [ applause ] now --
. >> as reported by a fresh communique, 16% of the american populous don't retain entry into cyberspaced chronology warner clientele. thank you so much. thank you. [ cheers and applause ] >> seth: no, no, no. no, that wasn't better. you changed time warner into chronology warner. >> yes. that is a grand improvement. >> seth: no, no, no. it's not. if change the name of the company it ruins the joke about the company. >> well, you know what they say, seth -- i guess...
146
146
Nov 24, 2014
11/14
by
CNBC
tv
eye 146
favorite 0
quote 0
been discovered and is being called one of the most sophisticated pieces of malware ever seen in cyberspace. in fact, it's been used to spy on corporations and governments for more than five years. amin jabbers is in d.c. it's incredible it took so long to uncover it. >> yes, symantec says they found this malware that's been out there for years. very stealthy computer code designed to sit in the systems and send back information to the original hackers whoever they might be for years and years. symantec calls this regin and compare it to the famous -- there is potentially a nation state behind it. a couple clues as to which state on white paper that was released today. there's english language, words inside computer code to make you think that it was an english language entity. that produced this but no indication really except who it is targeting. the majority of the attacks are in russia and saudi arabia. and specifically focused on telecommunications systems to intercept communications and track the whereabouts of people. but a lot we don't know here coming from the symantec. eamon jaber
been discovered and is being called one of the most sophisticated pieces of malware ever seen in cyberspace. in fact, it's been used to spy on corporations and governments for more than five years. amin jabbers is in d.c. it's incredible it took so long to uncover it. >> yes, symantec says they found this malware that's been out there for years. very stealthy computer code designed to sit in the systems and send back information to the original hackers whoever they might be for years and...
37
37
Nov 4, 2014
11/14
by
CSPAN2
tv
eye 37
favorite 0
quote 0
and while that definition be the same for the activities in cyberspace and other nations as well? >> under the rule of the law as to what is in a literary activity well we are working our way through a broad policy debate of what is the extension of the rule to the cyber arena area we have definition for what is offensive or pursues what we call the defensive responsive action and we have definitions for all of that. the broad issue you i think as a society that we are trying to come to grips with is we see all of this activity directed in the corporate networks, governmental networks, private individuals and what is the right response. i think the broad issue is what is the right response to this. what we can develop over time is a set of norms and rules that get us into an area that we have a much better definition of what is acceptable and what is not acceptable and even in the idea of deterrence. because right now if you were a nationstate, if you were a group or an individual, most come to the conclusion that there is an incredibly low risk and there is little price to pay so
and while that definition be the same for the activities in cyberspace and other nations as well? >> under the rule of the law as to what is in a literary activity well we are working our way through a broad policy debate of what is the extension of the rule to the cyber arena area we have definition for what is offensive or pursues what we call the defensive responsive action and we have definitions for all of that. the broad issue you i think as a society that we are trying to come to...
56
56
Nov 12, 2014
11/14
by
CSPAN2
tv
eye 56
favorite 0
quote 0
as we face ever more threats in cyberspace which incorporate the public-private cooperation into the toolkit the threats are not but threats are not letting up and neither should we. thank you very much for inviting me. questions for mr. carlin? >> lefty rely on you. >> i had. >> i had a radio show at the national press club on climate change. in my radio show i deal with a lot of ngos that don't trust the government and when they see the government partnering in the private sector, they get really nervous. ideally there was a chamber of commerce that hired a number of offensive cyber firms to engage in the cyber attacks against some of these ngos. i don't know that the department of justice or anyone else in the federal investigated or prosecuted that. i'm not sure on the liability repercussions. and it is really thick among the community working on the climate change into a lot of other things when we consider the full weight of the government and the private sector standing on our backs. what i would like to know if have you considered that the federal government might reassure al
as we face ever more threats in cyberspace which incorporate the public-private cooperation into the toolkit the threats are not but threats are not letting up and neither should we. thank you very much for inviting me. questions for mr. carlin? >> lefty rely on you. >> i had. >> i had a radio show at the national press club on climate change. in my radio show i deal with a lot of ngos that don't trust the government and when they see the government partnering in the private...
86
86
Nov 21, 2014
11/14
by
ALJAZAM
tv
eye 86
favorite 0
quote 0
. >> why does china feel it's able to claim a stake in governing international cyberspace?whether china stake as claim or united states stakes a claim certainly it is a governance issue that has to be debated by all parties and not one single party determined it all, china has played an increasingly important role in terms of medicines online, the growth of chinese internet certainly cannot big , ignored and now we have some of the largest in the world that are all coming out of china, in fact. >> but beijing's internet model is of sense ship and oppression and not just human rights saying this china is not the only country in the world that is so wide and tightly controlled. it if is such a good thing, if china is doing so well why do that bother to send to the internet? >> china, yes, the great firewall cuts off a lot of international sites and a lot of global social media sites but internally has grown a tremendous echo system that is china focused and china centric. >> what came out of the conference? i mean was anything achieved? >> as with any conference what is ever
. >> why does china feel it's able to claim a stake in governing international cyberspace?whether china stake as claim or united states stakes a claim certainly it is a governance issue that has to be debated by all parties and not one single party determined it all, china has played an increasingly important role in terms of medicines online, the growth of chinese internet certainly cannot big , ignored and now we have some of the largest in the world that are all coming out of china, in...
116
116
Nov 10, 2014
11/14
by
MSNBCW
tv
eye 116
favorite 0
quote 0
. >> our investigations are on the street, on the phone, in cyberspace. >> special prosecutor jack blakey'sselling women in chicago, beware. >> wiretapping changes the game. it allows us to hear the traffickers and find out who's in charge and work our way up the chain of command. >> blakey helped write the illinois safe children's act, a law that gives local police the ability to track pimps and gang members using wiretaps normally reserved for federal drug cases. >> and that particular act is the reason that we're here today. >> the new law resulted in the prosecution of the largest human trafficking case in illinois history. >> what we have seen in recent cases, in one particular case, all the young girls were branded. >> they are literally slaves. >> prosecutor lou longhutano says with the help of wiretaps ten defendants now face up to 30 years in prison. >> we've got telephone conversations of the guys trying to sweet-talk the girls, giving them orders, telling them where to go, girls reporting back. we've even got audiotape of a call where one of the pimps was beating one of the girls
. >> our investigations are on the street, on the phone, in cyberspace. >> special prosecutor jack blakey'sselling women in chicago, beware. >> wiretapping changes the game. it allows us to hear the traffickers and find out who's in charge and work our way up the chain of command. >> blakey helped write the illinois safe children's act, a law that gives local police the ability to track pimps and gang members using wiretaps normally reserved for federal drug cases....