26
26
Oct 23, 2018
10/18
by
CSPAN3
tv
eye 26
favorite 0
quote 0
now we have space, now we have cyberspace. what should we do? let's think about it for a second. how about we build the most powerful space capability in the world so we can always transit through space freely and then work with the international community to find what the norms of behavior are so we know what they are and understand. and cyberspace, how about we build the most powerful cyber capability in the world and then work with the international community to develop? it's not that hard, ladies and gentlemen, but oh, my gosh, because it's space and cyber, somehow we label it. it's a global common. we have to do something special because it's special. no, it's not. they're just places. they're places where we go. they're places where we do things. they're places where we operate. one of them happens to be manmade, but it's still a place we go, and we go there every day. we just have to treat it correctly. if we treat it correctly, then we'll know exactly what to do and we'll understand how to do that, and the united states will be in a good place. it's really that simple, an
now we have space, now we have cyberspace. what should we do? let's think about it for a second. how about we build the most powerful space capability in the world so we can always transit through space freely and then work with the international community to find what the norms of behavior are so we know what they are and understand. and cyberspace, how about we build the most powerful cyber capability in the world and then work with the international community to develop? it's not that hard,...
46
46
Oct 5, 2018
10/18
by
CSPAN3
tv
eye 46
favorite 0
quote 0
i certainly don't have to tell anyone in this room, though, that threats against our nation in cyberspace are many, and they are multiplying quickly. i know you talked a lot about this the last couple days. our adversaries are weaponizing the technology that has made our world faster, the same technology that makes us more innovative, the same technology that makes us more interconnected than ever before. in the past 18 months alone, we have witnessed north korea spread to more than 51 countries which held people hostage and brought factories to a halt. we also saw it compromise our energy grid and infiltrating petroware which became one of the most affected cyber threats in history and how we can prepare in that fashion for such attacks. the headlines seem never-ending, and i don't think they're going to stop. i think we'll see more and more top front page news, unfortunately, with respect to cyberattacks. as we speak, hostile groups are probing political systems worldwide searching for vulnerabilities. without aggressive action on our part to secure our networks, it's only a matter of t
i certainly don't have to tell anyone in this room, though, that threats against our nation in cyberspace are many, and they are multiplying quickly. i know you talked a lot about this the last couple days. our adversaries are weaponizing the technology that has made our world faster, the same technology that makes us more innovative, the same technology that makes us more interconnected than ever before. in the past 18 months alone, we have witnessed north korea spread to more than 51...
41
41
tv
eye 41
favorite 0
quote 0
north korea credible it's a whole new morning to mine in cyberspace screaming. love sick and these things just in sexual frustration true. i still have to get used to these robots exploring new frontier sex and love three point zero in forty five minutes on d w. w w come to learn from bonnie let's go right to our correspondent he is in central istanbul and we have our political correspondent here jim studio you're watching t w news why from berlin. it's all about the perspective closer d.w. . good. i'm not laughing at the germans because sometimes i am but most and nothing with the time and i haven't been deep into the german culture . new to take this grandmother down to you know. it's all that. enough time rachel join me for me to get funky gulf coast. to. coast. as you can see i'm in munich but why well yes it's all.
north korea credible it's a whole new morning to mine in cyberspace screaming. love sick and these things just in sexual frustration true. i still have to get used to these robots exploring new frontier sex and love three point zero in forty five minutes on d w. w w come to learn from bonnie let's go right to our correspondent he is in central istanbul and we have our political correspondent here jim studio you're watching t w news why from berlin. it's all about the perspective closer d.w. ....
47
47
Oct 21, 2018
10/18
by
ALJAZ
tv
eye 47
favorite 0
quote 0
have ordinarily been or or may have been fifty years ago an actual armed conflict we're seeing cyberspace being used as a proxy for that jake williams good to to achieve thank you very much indeed thank you the u.s. president donald trump says he'll pull out of a nuclear weapons treaty with russia he accuses moscow of violating the decades old pact which bans the two countries from having a wide range of new clear and conventional weapons. we're not going to let them violate a nuclear agreement and go out and do weapons and we're not allowed to we're the ones that have stayed in the agreement and we've managed to grab it but russia is not one fortunately under the remit so we're going to terminate their bravery we're going to pull out and well the u.s. decision to unilaterally withdraw has triggered fiz of a new arms race let's take a closer look at what president trump is actually leaving the intermediate range nuclear forces treaty grew out of us president ronald reagan's historic meeting with the then soviet leader mikhail gorbachev that was in one thousand nine hundred six it prohibit
have ordinarily been or or may have been fifty years ago an actual armed conflict we're seeing cyberspace being used as a proxy for that jake williams good to to achieve thank you very much indeed thank you the u.s. president donald trump says he'll pull out of a nuclear weapons treaty with russia he accuses moscow of violating the decades old pact which bans the two countries from having a wide range of new clear and conventional weapons. we're not going to let them violate a nuclear agreement...
57
57
Oct 5, 2018
10/18
by
BLOOMBERG
tv
eye 57
favorite 0
quote 0
manipulation of supermicro servers, issuing a statement reading in part "supply chain , safety in cyberspaces an issue of common concern. china is also a victim." jordan, what is your response to these companies pushing back so hard? jordan: the story speaks for itself. the constellation of sources that we gathered from the story, again, it encompasses senior-level officials across the government and senior individuals inside both the named affected companies. i cannot speculate, that is not my position, on why they might deny these allegations but i want to clarify where i did speculate on the why the companies would deny this. that's not really my place. i can say the sourcing is brought in robust. multiple levels of corroboration between individuals and companies and the government. and the story included the companies' denials in full, which is our typical policy for transparency purposes. emily: the extent of the data collected is unclear. steve, talk about how difficult would it be to determine that , given that this is a hardware hack, not a software hack. steve: one of the challenges
manipulation of supermicro servers, issuing a statement reading in part "supply chain , safety in cyberspaces an issue of common concern. china is also a victim." jordan, what is your response to these companies pushing back so hard? jordan: the story speaks for itself. the constellation of sources that we gathered from the story, again, it encompasses senior-level officials across the government and senior individuals inside both the named affected companies. i cannot speculate, that...
82
82
Oct 31, 2018
10/18
by
CSPAN
tv
eye 82
favorite 0
quote 0
, no pain or no cost, they have no incentive to stop attacking us in cyberspace. is not toive here have unrestricted cyber warfare the objective is to create structures of the terms, to make our adversaries understand that if they engage in offense of cyber activities themselves, aey will bear disproportionate cost. so they will think harder before they watch a cyber operation to begin with. two, i think we need to think about it in asymmetric terms. a look at us in asymmetric terms. here's the cyber battle space over here and here's everything else. responded to a cyber attack with a non-cyber retaliation and they need to understand that, too. so the point i can make publicly is that we are prepared to undertake -- we are right now operations inber terms of defending the integrity of our electoral process and the overall integrity of our information technology systems and our adversaries had better understand that. mr. blumenthal: do you see any adversary reaction so far? think it is too soon to tell. i think part of it is getting the word out that this is not th
, no pain or no cost, they have no incentive to stop attacking us in cyberspace. is not toive here have unrestricted cyber warfare the objective is to create structures of the terms, to make our adversaries understand that if they engage in offense of cyber activities themselves, aey will bear disproportionate cost. so they will think harder before they watch a cyber operation to begin with. two, i think we need to think about it in asymmetric terms. a look at us in asymmetric terms. here's the...
88
88
Oct 18, 2018
10/18
by
CSPAN3
tv
eye 88
favorite 0
quote 0
how are we deterring malicious actors in cyberspace? how are we working with our international partners? because this is not something we can do alone. it's not something anyone can do alone. we've got to find partners who can work with us, who are like minded, and we need to do capacity building. we need to reach out to other nations to help them develop tools and capabilities and help them be a part of this fight. so that's a pretty quick overview of the national cyber strategy. i would encourage you to read it. it's really not that long. it's pretty assessable. we really view it as a call to action. you know, to pay attention today and walk away with a couple of things that are going to inspire you to do great things when you get back to your office. i would ask you to, you know, be aware we have a national cyber strategy, continue to be ambassadors, continue to spread the word. this is national cybersecurity awareness month. it's an opportunity for us but cybersecurity awareness is not something we need, you know, one month a year.
how are we deterring malicious actors in cyberspace? how are we working with our international partners? because this is not something we can do alone. it's not something anyone can do alone. we've got to find partners who can work with us, who are like minded, and we need to do capacity building. we need to reach out to other nations to help them develop tools and capabilities and help them be a part of this fight. so that's a pretty quick overview of the national cyber strategy. i would...
104
104
tv
eye 104
favorite 0
quote 0
to tell me the toilet incredible it's a whole new morning the mine in cyberspace street i. will not sing these things and sexual frustration too. i still have to get used to these robot noises exploring new frontier sex and love three point zero. zero more. we make up for what we watch as a whole i feel better and better we are the sum of seven percent. the want to shape the continents future. part of it enjoys numbered in youngsters as they share their stories their dreams and their challenges. the seventy seven percent. platform for africa charge. a news analyst message gets once a day. gold is a call to shake up the buddhist concept boost side by the slogan. any play put big dreams on the big story. maybe magazine on t w. a contentious figure at home. he wrote in germany. from the fall of the early. german reunification. and the end of the cold. war charles was one of the great heroes of the twentieth century. because the gorbachev of the last leader of the soviet union was an agent of change. quickly miss downfall. i have decided to resign my duties as president of the
to tell me the toilet incredible it's a whole new morning the mine in cyberspace street i. will not sing these things and sexual frustration too. i still have to get used to these robot noises exploring new frontier sex and love three point zero. zero more. we make up for what we watch as a whole i feel better and better we are the sum of seven percent. the want to shape the continents future. part of it enjoys numbered in youngsters as they share their stories their dreams and their...
112
112
Oct 4, 2018
10/18
by
CSPAN
tv
eye 112
favorite 0
quote 0
the threats against our nation in cyberspace are many and they are multiplying quickly. our adversaries are weaponizing the technology that has made our world faster, that same technology that makes us more innovative, the same technology that makes us more interconnected than ever before. in the past 18 months alone, we have witnessed north korean wanna cry ransomware spread to more than 100 50 countries which held health care systems hostage and brought factories to a halt. we also saw russia probing our energy grip, unleashing malware that resulted in one of the costliest cyber incidents in history. q asap -- -- cue a separate discussion about insurance. the headlines truly seem never ending, and to be frank, i don't think they are going to stop. i think we will see more front page news, unfortunately, with respect to cyber attacks. as we speak, rogue regimes are searching systems worldwide for vulnerabilities. without aggressive action on our part to protect our networks it , is only a matter of time before i believe we get hit and hit hard in the homeland. what worr
the threats against our nation in cyberspace are many and they are multiplying quickly. our adversaries are weaponizing the technology that has made our world faster, that same technology that makes us more innovative, the same technology that makes us more interconnected than ever before. in the past 18 months alone, we have witnessed north korean wanna cry ransomware spread to more than 100 50 countries which held health care systems hostage and brought factories to a halt. we also saw russia...
92
92
Oct 20, 2018
10/18
by
KQED
tv
eye 92
favorite 0
quote 0
bases in cyberspace."dawn of the code war" argues not enough is being donegh to against the threats online. it is written by the former assistant attorney general for national security. recently, i spoke to him aboutnd the gs and the book title. >> the u.s. generation after the end of what we call the cold war really does find itself today i. this code facing four major nationstate adversaries online -- china, north korea, iran, and russia. well as adversaries tha could involve activists, terrorists, criminals, or individuals seeking profit or destruction. rajini: we talked about russia and election hacng. we are weeks away from the midterm. how much of a concern should we have about that? tiplehuge concern on m levels. both the information operations level. the disinformation, misinformation that we saw play out in the 2016 election, as well as the core infrastructure of the voting system remains relatively insecure. rajini: how much is the u.s. t doing to actually protself from these foreign players and
bases in cyberspace."dawn of the code war" argues not enough is being donegh to against the threats online. it is written by the former assistant attorney general for national security. recently, i spoke to him aboutnd the gs and the book title. >> the u.s. generation after the end of what we call the cold war really does find itself today i. this code facing four major nationstate adversaries online -- china, north korea, iran, and russia. well as adversaries tha could involve...
54
54
Oct 31, 2018
10/18
by
BBCNEWS
tv
eye 54
favorite 0
quote 0
the trolls working in cyberspace being impostors, pretending they were us citizens managed to have ato mobilise, demobilise and shift and did so in a manner that had lots of sharing. we don't know whether they targeted the right people in the right states. substantially disrupted the clinton campaign and we saw effects inside those weeks in which the hacking was most actively covered by our media on clinton's qualification for president, that is perception and it dropped. in two presidential debates in which hacked content presidential debates in which hacked co nte nt was presidential debates in which hacked content was used, people were less likely to think that she was forthright. in both cases, in those debates, that predicted a reduced likelihood to vote. hacking mattered strong. finally, this information may have affected the decisions of james, and if it did, and if that was because of the announcement that was because of the announcement that was made public about the reopening of the anthony wiener server on 0ctober of the anthony wiener server on october 28 with the change
the trolls working in cyberspace being impostors, pretending they were us citizens managed to have ato mobilise, demobilise and shift and did so in a manner that had lots of sharing. we don't know whether they targeted the right people in the right states. substantially disrupted the clinton campaign and we saw effects inside those weeks in which the hacking was most actively covered by our media on clinton's qualification for president, that is perception and it dropped. in two presidential...
56
56
Oct 6, 2018
10/18
by
CSPAN
tv
eye 56
favorite 0
quote 0
calling out actors, irresponsible behavior in cyberspace is very important for this administration and one our secretary has been very strong proud to be a part of that, we're in ay -- when position to be able to say, look, russia did this, this is irresponsible. other're going to impose deterrents, whatever tools we to us.ailable that's what i meant by "since sony," it's become very much in the front minds of every policymaker. host: we are in an election year. more evidence of attacks on election systems or knocking on the door of election systems? jeanette: if you'll indulge me because i think it's really important -- one of the things i learned for myself for athink it's the same lot of people, you have to understand election order to beon in fully able to understand the threats. so when we talk about election infrastructure, we mean voterhing from the registration systems, the voting electionthemselves, management systems that support the election officials, all the way to unofficial tallying of votes to the final tallying of right? so if -- there's a lot of sort about the voting
calling out actors, irresponsible behavior in cyberspace is very important for this administration and one our secretary has been very strong proud to be a part of that, we're in ay -- when position to be able to say, look, russia did this, this is irresponsible. other're going to impose deterrents, whatever tools we to us.ailable that's what i meant by "since sony," it's become very much in the front minds of every policymaker. host: we are in an election year. more evidence of...
59
59
Oct 7, 2018
10/18
by
CSPAN2
tv
eye 59
favorite 0
quote 0
the same thing has to happen in cyberspace and overhead and anytime you don't see it but it's real. it slows everything down. it's going to have to get ten times faster yet. security costs everything. the reason we don't have it is because it is so hard. you pay no attention to securi security. the reason they don't is because it is hard. things that are supposed to come fast become slow and difficult. anybody would tell you if would make the current system into doctor authentication. i try to log into my account online and the robot on the other side says to me i'm going to text you at this phone number and that is the second channel outside of the cell phone channel. i could say of all of my transactions you can do this today no amount of money can be over picking up a thousand dollars unless i am taught the third factor authentication. that can be done today. george is writing about his new book life after google. he's absolutely right. it's not because it has to happen but because it can happen. it's to say i want more security that's easy. >> host: mark mills, this is your fift
the same thing has to happen in cyberspace and overhead and anytime you don't see it but it's real. it slows everything down. it's going to have to get ten times faster yet. security costs everything. the reason we don't have it is because it is so hard. you pay no attention to securi security. the reason they don't is because it is hard. things that are supposed to come fast become slow and difficult. anybody would tell you if would make the current system into doctor authentication. i try to...
25
25
tv
eye 25
favorite 0
quote 0
i am in cyberspace or on the street i. will not think it means do you think the first and sexual frustration to. still have to get used to these robot noises exploring new frontier sex and love three point zero in forty five minutes on w. . being armed forces are under pressure they're battling recruiting problems outdated and broken down equipment and limited budgets. challenges a huge missing person of tanks we have ten divisions that don't have talent so zero sourcing and privatisation are the border of the day in all areas but that goes dangers every day i don't want goes on private sector businesses make money money with everything from reconnaissance drones to laundry facilities firms are infiltrating the armed forces scheme france against the german military industrial complex on t.w. . cut to new. plan a very well welcome indeed to quadriga art and to bowl ice here in germany or on the big prosperous and influential somethin states have but that area where people go to the polls this weekend into the election that
i am in cyberspace or on the street i. will not think it means do you think the first and sexual frustration to. still have to get used to these robot noises exploring new frontier sex and love three point zero in forty five minutes on w. . being armed forces are under pressure they're battling recruiting problems outdated and broken down equipment and limited budgets. challenges a huge missing person of tanks we have ten divisions that don't have talent so zero sourcing and privatisation are...
60
60
Oct 8, 2018
10/18
by
CSPAN2
tv
eye 60
favorite 0
quote 0
formulating these policies and these approaches, calling out actors, irresponsible behavior in cyberspace is very important for this administration and one that our secretary has been very strong and very proud to be a part of that. you know, consistently, when were in a position to be able to say look, russia did this, this is a responsible and were going to impose other deterrence, whatever tools we have available to us. that's what i meant by since sony, i think it's become very much in the front lines of every kind of policymakers. >> host: and we are in an election year. are you seeing more evidence of attacks on election systems or knocking on the door of election systems? >> guest: if you'll indulge me for a moment because i think it's really important. one of the things i learned for myself, and i think it's the same for a lot of people, is you have to understand election administration in order to be fully able to understand the threats. so when we talk about election infrastructure, we mean everything from the voter registration systems, the voting machines themselves, election
formulating these policies and these approaches, calling out actors, irresponsible behavior in cyberspace is very important for this administration and one that our secretary has been very strong and very proud to be a part of that. you know, consistently, when were in a position to be able to say look, russia did this, this is a responsible and were going to impose other deterrence, whatever tools we have available to us. that's what i meant by since sony, i think it's become very much in the...
48
48
Oct 5, 2018
10/18
by
BLOOMBERG
tv
eye 48
favorite 0
quote 0
>> in a lot of respects these are -- respects, these are early cyberspace has been developing a strategyt comes to things like we are muchwarfare, less sophisticated and we have to get smart on that. china, wes not just heard from the vice president yesterday, comparing it to russia he said that china is much worse. take a listen. >> beijing has mobilized covert actors, and propaganda outlets to shift american perceptions of chinese policy. as a senior career member of our intelligence community told me this morning, what the russians are doing pales in comparison to what china is doing. david: is the vice president right? severalconflating elements. the chinese are involved in espionage, their efforts are widespread and sophisticated. however they are not weaponizing that information. they are working on long-term influence efforts that quite frankly pose far less of a danger in the short to medium-term to our democracy, the business community, then what russia, iran, and other groups of been engaged in. that is where we need to keep our focus. david: what do we need to do and what do w
>> in a lot of respects these are -- respects, these are early cyberspace has been developing a strategyt comes to things like we are muchwarfare, less sophisticated and we have to get smart on that. china, wes not just heard from the vice president yesterday, comparing it to russia he said that china is much worse. take a listen. >> beijing has mobilized covert actors, and propaganda outlets to shift american perceptions of chinese policy. as a senior career member of our...
110
110
Oct 24, 2018
10/18
by
MSNBCW
tv
eye 110
favorite 0
quote 0
let's focus on what china is doing in cyberspace, meaning hacking is on a much grander scale. >> and they bought a section on the des moines register. >> that's right. the only part of their influence is they've both. >> who are the candidates they're pushing in 2018? that's election interference. what are these boats that they're hacking? and what are the covert personas that look and talk like americans, connecting with voters on the ground trying to push them to vote a certain way. >> what has happened is chinese hacking has picked up. during the obama administration, we went essentially to knock it off. there were actually dagger's hacking. in the iran nuke deal behind the scenes, that picks up depending how we work with those negotiations. it's a symmetric drill. we're going to push on china in terms of trade. they are now cyberattacking the medal. so this sort of warfare for the chinese. they're going to defeat us in the economic battlefield. >> julia, i'm coming to you with the subject of nationalism. before we do that, i'm going to have to run. the president in his office and
let's focus on what china is doing in cyberspace, meaning hacking is on a much grander scale. >> and they bought a section on the des moines register. >> that's right. the only part of their influence is they've both. >> who are the candidates they're pushing in 2018? that's election interference. what are these boats that they're hacking? and what are the covert personas that look and talk like americans, connecting with voters on the ground trying to push them to vote a...
57
57
Oct 5, 2018
10/18
by
BLOOMBERG
tv
eye 57
favorite 0
quote 0
in cyberspace, we do not know who is doing things. we cannot threaten to retaliate and we cannot.here are so many players. this is a world with billions of polls. this is far more difficult intellectually. this is more difficult than the challenge we faced with nuclear weapons. david: you went to northern ireland, which is difficult. how do we climb back down off of this #-- this? richard: we have got to. able to deal with climate, trade, cyber issues. it is in both country's interest. can we work it out? it will not be easy. a good sign that the secretary of state to be in china. we have got to deem it -- deep in this dialogue. have got to institutionalize talks about how the united states and china are going to deal with domestic issues, with the relationship, with regional issues. this has got to be foreign-policy priority number one. david: let us turn to one other issue, iran. oil exports are going down. how is this going to be resolved? this is going to start hurting the economy. richard: it is hurting iran. set the oil price at $55 per barrel. prices because of smaller outp
in cyberspace, we do not know who is doing things. we cannot threaten to retaliate and we cannot.here are so many players. this is a world with billions of polls. this is far more difficult intellectually. this is more difficult than the challenge we faced with nuclear weapons. david: you went to northern ireland, which is difficult. how do we climb back down off of this #-- this? richard: we have got to. able to deal with climate, trade, cyber issues. it is in both country's interest. can we...
50
50
Oct 23, 2018
10/18
by
CSPAN3
tv
eye 50
favorite 0
quote 0
where he led 43,000 people and prevented one of the biggest banks in the world from being robbed in cyberspace. not an easy feat. as we know, those hackers are relentless, almost as relentless as they are against us. now he's our chief information officer and we're benefiting enormously from his deep experience with cyber security and artificial intelligence, and having the knowledge and experience operating at massive scale against committed adversaries. it's really fun to watch him perform. how are we doing? are we on track for 20 minutes? yeah. how about space? think we should cover space? there we go. all right. space has been in the news lately, so i thought it would be useful to offer my perspective. over the last year i worked with secretary wilson, general goldstein, dr. heighten, general raymond, generals thompson east coast and west coast, and so many others with tremendous talent and expertise, together we're working to create a space force which, as you might imagine, is a complicated process. while there's plenty of debate about the how, we are united by the why -- protecting our
where he led 43,000 people and prevented one of the biggest banks in the world from being robbed in cyberspace. not an easy feat. as we know, those hackers are relentless, almost as relentless as they are against us. now he's our chief information officer and we're benefiting enormously from his deep experience with cyber security and artificial intelligence, and having the knowledge and experience operating at massive scale against committed adversaries. it's really fun to watch him perform....
62
62
Oct 6, 2018
10/18
by
BLOOMBERG
tv
eye 62
favorite 0
quote 0
way that we had vice president penses's speech, in which she says we are in a technology and a cyberspaceonflict that is only getting deeper. is just one peace of a deepening conflict we will see across multiple fronts. when we talk about these avenues of attack, they all go back to china? if china could have accomplished this god hardware hack, why would they need to do these other things? >> good question. according to our sources, the same group responsible for the added chips and components to the motherboard was also responsible for the compromise of supermicro's customer software portal. it is a good question. if you can modify hardware at the factory, the thing we reported, why would you need to do anything else? is that these hackers want every avenue they can possibly get. and if the hardware implants are discovered, a customer portal is a great way to impact a number of other users. the added chips are very hard to put into computer servers, so they want easier ways, and these other vectors accomplish that. emily: is any one of these were said the other? -- worse than the other?
way that we had vice president penses's speech, in which she says we are in a technology and a cyberspaceonflict that is only getting deeper. is just one peace of a deepening conflict we will see across multiple fronts. when we talk about these avenues of attack, they all go back to china? if china could have accomplished this god hardware hack, why would they need to do these other things? >> good question. according to our sources, the same group responsible for the added chips and...
101
101
Oct 6, 2018
10/18
by
BLOOMBERG
tv
eye 101
favorite 0
quote 1
addressing questions of manipulation issuing a statement reading in part "supply chain safety in cyberspaces an issue of common concern. china is also a victim." jordan, what is your response to these companies pushing back so hard? jordan: the story speaks for itself. the constellation of sources that we gathered from the story, again, it encompasses senior-level officials across the government and senior individuals inside both the named affected companies. i cannot speculate, that is not my position, on why they might deny these allegations but i want to clarify where i did speculate on the why the companies would deny this. i can say the sourcing is broad and robust. multiple levels of corroboration between individuals and companies and the government. the story included the companies denials in full. which is our typical policy for transparency purposes. emily: the extent of the data collected is unclear. steve, how difficult would it be to determine that given this is a hardware hack and not a software hack? steve: one of the challenges with hardware is they are black boxes meaning th
addressing questions of manipulation issuing a statement reading in part "supply chain safety in cyberspaces an issue of common concern. china is also a victim." jordan, what is your response to these companies pushing back so hard? jordan: the story speaks for itself. the constellation of sources that we gathered from the story, again, it encompasses senior-level officials across the government and senior individuals inside both the named affected companies. i cannot speculate, that...
107
107
Oct 4, 2018
10/18
by
CNNW
tv
eye 107
favorite 0
quote 0
tries to strike a diplomatic deal with kim, new evidence the dictator is acting aggressively in cyberspacee cyber security firm fireeye has a new report saying a shadowy network of hackers tried to steel over a billion dplars bank from banks around the world.oll from from banks around the world. fireeye says it's likely kim's hackers have successfully stolen over $100 million over the past four years. experts say this is likely the work of an elite hacking unit called bureau 121 from north korea's top intelligence agency. >> they attack banks and financial institutions, infrastructure, nuclear power plants in south korea as an example. they are very very, very good. >> reporter: analysts say kim jong-un will likely have his hackers move aggressively against banks and the u.s. and its allies and they'll probably target cryptocurrencies like bitcoin. not just because it's a quick source of much-needed cash for kim but because it's tough to trace these cyber attacks back to kim. experts point out, it took four years for the u.s. to criminally charge a north korean hacker for the devastating 2
tries to strike a diplomatic deal with kim, new evidence the dictator is acting aggressively in cyberspacee cyber security firm fireeye has a new report saying a shadowy network of hackers tried to steel over a billion dplars bank from banks around the world.oll from from banks around the world. fireeye says it's likely kim's hackers have successfully stolen over $100 million over the past four years. experts say this is likely the work of an elite hacking unit called bureau 121 from north...
70
70
Oct 11, 2018
10/18
by
CSPAN2
tv
eye 70
favorite 0
quote 0
exceeds the rate of physical attacks that continue to threaten the security of our people that cyberspace extends into almost every i american home that spread has reach that pandemic stage of a worldwide outbreak of cybervulnerabilities we saw that last year with untold billions in damage and in response with that cyberstrategy to outline we are changing the way we do business the first ever cybersecurity summit by the national risk-management center with private sector partners to share information to better secure the ecosystem together. also with business supply chains with those extreme consequences and perhaps working with partners throughout the administration to hold cyberattackers accountable. the united states has a full options and we are already using them to call out cyberadversaries and punishal them and to authorize the cybersecurity and infrastructure agency we hope to pass this vital legislation next month as a cornerstone with those emerging threats to outpace our defenses unmanned aerial systems often referred to as a prime example there already using drugs to destroy a
exceeds the rate of physical attacks that continue to threaten the security of our people that cyberspace extends into almost every i american home that spread has reach that pandemic stage of a worldwide outbreak of cybervulnerabilities we saw that last year with untold billions in damage and in response with that cyberstrategy to outline we are changing the way we do business the first ever cybersecurity summit by the national risk-management center with private sector partners to share...
47
47
Oct 11, 2018
10/18
by
CSPAN2
tv
eye 47
favorite 0
quote 0
the terrorists, criminals and adversaries continue to threaten the security of our people that cyberspace is the more active battlefield and it extends into almost every american home, for instance the viral spread of malware has reached a pandemic stage in a worldwide outbreak of cyber attacks and cyber vulnerabilities. we saw this last year when russia and north korea released a code that spread across the world spreading damage. the white house and the dhs released new cyber strategies to outline how we are changing the way we do business. in july we hosted the first cyber security summit where i announced the launch of the national risk center. this will serve as a government and private sector partner to share information and to better secure the digital ecosystem together. we are also driving the supply-chain security efforts to identify upstream weaknesses before we have downstream consequences and perhaps most importantly dhs is working with partners throughout the administration to hold cyber attackers accountable. the united states and the full spectrum of options and we are alr
the terrorists, criminals and adversaries continue to threaten the security of our people that cyberspace is the more active battlefield and it extends into almost every american home, for instance the viral spread of malware has reached a pandemic stage in a worldwide outbreak of cyber attacks and cyber vulnerabilities. we saw this last year when russia and north korea released a code that spread across the world spreading damage. the white house and the dhs released new cyber strategies to...
114
114
Oct 26, 2018
10/18
by
CSPAN
tv
eye 114
favorite 0
quote 0
the order of the house of january 3, 2017, the following member on the part of the house to the cyberspace commission. the clerk: mr. gallagher of wisconsin and from private life, ms. samantha ravage of alexandria, virginia. mr. frank sal u.f.o. of oakton, virginia -- salu.f.o. of oakton, virginia. the speaker: pursuant to 20 u.s.c. 2062 and the order of the house of january 3, 2017, of the following member and additional individuals to the advisory board for the house of representatives child care center. the clerk: mr. hudson of north carolina. ms. christine blake of washington, d.c. ms. parker polling of washington, d.c. ms. la net fraga of alexandria, virginia, ms. jessica mcfall of washington, d.c. the speaker pro tempore: pursuant to section 4-b of house resolution 1084, the house stands adjourned until 1:00 p.m. on tuesday, october 30, 2018. house meets next for a pro forma session on tuesday, october 30. they resume legislative work on october 31. now we take you back live to milwaukee, the democratic rally tammy baldwinor running for reelection and coming up shortly, former presid
the order of the house of january 3, 2017, the following member on the part of the house to the cyberspace commission. the clerk: mr. gallagher of wisconsin and from private life, ms. samantha ravage of alexandria, virginia. mr. frank sal u.f.o. of oakton, virginia -- salu.f.o. of oakton, virginia. the speaker: pursuant to 20 u.s.c. 2062 and the order of the house of january 3, 2017, of the following member and additional individuals to the advisory board for the house of representatives child...
869
869
Oct 29, 2018
10/18
by
CNBC
tv
eye 869
favorite 0
quote 0
theft and global security and who is going to control the internet and who is going to control cyberspaceor the next century i don't think we will give a lot of ground on that. i'm not sure we should therefore i think this was something that gets uglier meanwhile, i point to the macro data around the rest of the world that we are seeing an impact from trade and not really in our data yet. that's the big concern >> we had the story where they scoured through the conference calls and mind% mentioned tariffs negatively on the conference call. if you said a fifth of companies reporting had a conference call in earnings season said that tariffs were negative, that's a big number >> the president may be correct. we have been getting ripped off blindly and it might be true there are ramifications for that maybe with the market going lower and i'm not suggesting this is what she meant, but if president trump wants to make a deal, there is a deal to be made why would the chinese make a deal now our market is going down as well the mid-term election is coming up listen, we know they are the same as
theft and global security and who is going to control the internet and who is going to control cyberspaceor the next century i don't think we will give a lot of ground on that. i'm not sure we should therefore i think this was something that gets uglier meanwhile, i point to the macro data around the rest of the world that we are seeing an impact from trade and not really in our data yet. that's the big concern >> we had the story where they scoured through the conference calls and mind%...
74
74
Oct 5, 2018
10/18
by
BLOOMBERG
tv
eye 74
favorite 0
quote 0
remember, you have to think about the treasury market and bond market on a hedged cyberspace. you get better value in the bond market than treasury market and that's what we're paying attention to. 30.o dollar, 1. vonnie: the unemployment rate fell to 3.7%, the lowest since 1969. wage gains eased slightly. illustrating the impact of hurricane florence. joining us, julia coronado, founder and president of macropolicy perspective. welcome, julia. those comparisons to the late 1960's, are they meaningful? julia: not terribly. the 1960 earks the labor market was a very different labor market. we think we have the fact we have an older labor market and educated work force means the natural rate of unemployment, that is the unemployment rate that will create inflation is a lot lower than in the past. 3.9%, 3.7% today isn't the same as 3.7% in 1969. vonnie: are we in danger of running hot on the economy? julia: no. if anything hurricane should put pressure on wage growth. it ticked lower on anual basis. there really isn't signs of hiring constraints. you take out the hurricane effect
remember, you have to think about the treasury market and bond market on a hedged cyberspace. you get better value in the bond market than treasury market and that's what we're paying attention to. 30.o dollar, 1. vonnie: the unemployment rate fell to 3.7%, the lowest since 1969. wage gains eased slightly. illustrating the impact of hurricane florence. joining us, julia coronado, founder and president of macropolicy perspective. welcome, julia. those comparisons to the late 1960's, are they...
108
108
Oct 4, 2018
10/18
by
BBCNEWS
tv
eye 108
favorite 0
quote 0
in their mind, and now, later this month, russia is planning to submit to draft resolutions on cyberspaceeir previous behaviour, i doubt they want to have... they want to negotiate from a position of power. they want to show off and have a strong voice on the negotiating table. it's about their international bargaining position? yes. amongst other things. you know, showing that they have the capacity, to target specific countries, we've seen what happened in the ukraine. in terms of foreign policy agenda, we have a bargaining and negotiating position at international level. thank you very much for your time. just to recount on those lines coming from the news conference in the hague this morning. we are hearing that the dutch have expelled for russians, they say over an operation targeting the chemical weapons watchdog. this operation, we are told, the expulsions, i beg your pardon, happened earlier this year. in april, we are told by dutch officials. they halted a russian operation in april, april the 13th. i think those are the key lines that are coming out of that hague news conference
in their mind, and now, later this month, russia is planning to submit to draft resolutions on cyberspaceeir previous behaviour, i doubt they want to have... they want to negotiate from a position of power. they want to show off and have a strong voice on the negotiating table. it's about their international bargaining position? yes. amongst other things. you know, showing that they have the capacity, to target specific countries, we've seen what happened in the ukraine. in terms of foreign...
93
93
Oct 9, 2018
10/18
by
BBCNEWS
tv
eye 93
favorite 0
quote 0
this is more than a pity, this is a disaster that we seem to have got to a situation where, in cyberspacerect confrontation with russia. and the russians are expecting this to go on for yea rs russians are expecting this to go on for years from here on in. it will be very expensive, very dangerous, andi be very expensive, very dangerous, and i still think we should be trying to find a way back from it. what the skripal operation and the hague operation demonstrate is that the russians will not help us in this. they are all out to prove to us this. they are all out to prove to us in every way that they are top and not to be trifled with. and a final question, do you think that britain and other allies are taking the necessary steps to counteract the necessary steps to counteract the sort of operations you are talking about from russia, and when you talk about finding a way back from it, what exactly are you thinking of? ministers have said that we are strengthening our capacities and building up our defences against espionage and propaganda, developing cyber capacities, both offensive and
this is more than a pity, this is a disaster that we seem to have got to a situation where, in cyberspacerect confrontation with russia. and the russians are expecting this to go on for yea rs russians are expecting this to go on for years from here on in. it will be very expensive, very dangerous, andi be very expensive, very dangerous, and i still think we should be trying to find a way back from it. what the skripal operation and the hague operation demonstrate is that the russians will not...
132
132
Oct 24, 2018
10/18
by
MSNBCW
tv
eye 132
favorite 0
quote 0
the problem is the senior intelligence officer probably said what china is doing in cyberspace, meaning in terms of hacking, is on a much grander scale. or has been historically. >> they bolt a section in the "des moines register." >> that's right. the only part of their influence is they bought an ad in a new york newspaper. which they've done for many years. i've read them in new york newspapers before. if you're looking for influence in the elections i would like to ask john bolton and anyone else in the administration, who are the candidates they are pushing then in 2018? that's election interference. what are the voting machines and the data bases that they are hacking? what are the state-sponsored news outlets that are in english coming from china that have won audience share in the united states? and what are the covert personas that look and talk like americans, connecting with voters on the ground trying to push them to vote a certain way. that is a disinformation effort. what has happened is chinese hacking has picked up. during the obama administration, we went into essential
the problem is the senior intelligence officer probably said what china is doing in cyberspace, meaning in terms of hacking, is on a much grander scale. or has been historically. >> they bolt a section in the "des moines register." >> that's right. the only part of their influence is they bought an ad in a new york newspaper. which they've done for many years. i've read them in new york newspapers before. if you're looking for influence in the elections i would like to ask...
75
75
Oct 21, 2018
10/18
by
ALJAZ
tv
eye 75
favorite 0
quote 0
was in his muscles on the opposition and on the on on the people inside the country and using the cyberspace and using his army. of intelligence working on twitter to to to mobilize them against us it's. to it brings jubilation for us to see him being humiliated by his on last who is using him for or for the sake of fighting us but it has nothing to do with our view regarding this incident the only way to deal with the incident is to remove not only one hundred missile month but the whole establishment which has created the circumstances which resulted in this action and by the way general hundred yards died in the consulate and that's why the world has become aware of his death and this. harsh gruesome manner. in the same time there are thousands of people being been tortured and die under torture in the saudi princes . but the senior very important members of the community being humiliated and sank from their jobs and that is to. their money their their their accounts frozen turns their brains let me bring you in the you've heard what the not even a saying in your head what dr saad has bee
was in his muscles on the opposition and on the on on the people inside the country and using the cyberspace and using his army. of intelligence working on twitter to to to mobilize them against us it's. to it brings jubilation for us to see him being humiliated by his on last who is using him for or for the sake of fighting us but it has nothing to do with our view regarding this incident the only way to deal with the incident is to remove not only one hundred missile month but the whole...
55
55
Oct 1, 2018
10/18
by
CSPAN3
tv
eye 55
favorite 0
quote 0
is can -- how does this definition of bullying apply in cyb cyberspace? when really, it's based on perceptions. a perception of power imbalance, of aggression, and what is the actual definition of repetition in the cyber world where one message is broadcasted, it could be proliferated, friend to friend to friend. it stays on for some period of time. i mean, how long have you been able -- have folks been able to find messages that go back five years? absolutely. so, this led to the research questions today that our research team is approaching. number one, what are the contents of cyber-bullying? two, how are offline and online bullying experiences related? and three, because of my social networks guy, how is cyber-bullying embedded in peer groups? and for the purposes of this presentation today, i will focus on the first one, which is the content of cyber-bullying. i think a lot of common findings with the work that dr. underwood has presented. so, just to get a little data nerdy here, we'll talk about the data collection procedures. so, i was over at the
is can -- how does this definition of bullying apply in cyb cyberspace? when really, it's based on perceptions. a perception of power imbalance, of aggression, and what is the actual definition of repetition in the cyber world where one message is broadcasted, it could be proliferated, friend to friend to friend. it stays on for some period of time. i mean, how long have you been able -- have folks been able to find messages that go back five years? absolutely. so, this led to the research...
172
172
Oct 4, 2018
10/18
by
BBCNEWS
tv
eye 172
favorite 0
quote 0
it is not a limited, specific campaign, it is an overall campaign of dominance in the cyberspace to tryw their organisations are undergoing these attacks every day and there's ongoing conflict. the organisations of note are probably infrastructure companies, the energy sector, providers of so—called critical services and these companies always work closely with ncses. it's not news to them. the announcement in march with a joint statement from gchq and the department said these go a long way towards keeping awareness and getting budgets available and making decision makers realise their private sector but they are and implicated in a geopoliticalflick and they can't separate their businesses on operations from these nationstate activities. when you talk about the energy sector, when does this become a problem that is bigger than companies being affected, companies are somewhat removed from us in our everyday life, when does it affect us and become dangerous to us? to individuals? exactly. there's two ways in which it can, individuals can be indirectly swept up in the attacks. rasher or
it is not a limited, specific campaign, it is an overall campaign of dominance in the cyberspace to tryw their organisations are undergoing these attacks every day and there's ongoing conflict. the organisations of note are probably infrastructure companies, the energy sector, providers of so—called critical services and these companies always work closely with ncses. it's not news to them. the announcement in march with a joint statement from gchq and the department said these go a long way...
75
75
Oct 15, 2018
10/18
by
MSNBCW
tv
eye 75
favorite 0
quote 0
and, it wasn't just cyberspace keeping cops busy.od admirers, including jerry caspell, who'd met her years earlier. >> we met at toastmasters. >> which is a speaking club? >> it's for public speaking and leadership, and she was working on her english, of course. and, i kinda tried to help her. >> it sounds as if there was very quickly a connection between the two of you? >> yeah we got to be pretty close friends. she asked me for example to help her with her resume. >> you said keep writing dont forget. >> reporter: jerry, who is married and works for a medical equipment company, is also a poet and songwriter. he says anna encouraged his writing and eventually helped edit a collection of his poems. >> she always raved about poetry. and she said, "i can be your muse." and that's what struck me. i said, "yeah, you can be my muse." what guy wouldn't want a muse, particularly an attractive russian one? >> so i called her my muse. she thought that was great. >> maybe i'm very cynical here, but i do work for "dateline." >> yeah. >> general
and, it wasn't just cyberspace keeping cops busy.od admirers, including jerry caspell, who'd met her years earlier. >> we met at toastmasters. >> which is a speaking club? >> it's for public speaking and leadership, and she was working on her english, of course. and, i kinda tried to help her. >> it sounds as if there was very quickly a connection between the two of you? >> yeah we got to be pretty close friends. she asked me for example to help her with her...
41
41
Oct 2, 2018
10/18
by
CSPAN3
tv
eye 41
favorite 0
quote 0
computers in their pockets and fewer people can imagine the amount of personal information flowing in cyberspace. to apple, privacy means more than having the right to not share your personal information. privacy is putting the user in control. that means users can decide whether to share personal information and with him. it means they understand how that information will be used. ultimately, privacy is about living in a world where you can trust that your decisions about how your personal information is being shared and used are being respected. we believe privacy is a fundamental human right which is being supported by social norms and the law. this approach comes naturally to apple. we got our start by putting the user in the driver seat of their own computer. when they increased the skids on information flow, it seemed important by putting users in control of their personal information. great experiences don't have to come into the expense of privacy and security. at apple, this is a fundamental effect on how we develop our product. we minimize the information we collect and any information
computers in their pockets and fewer people can imagine the amount of personal information flowing in cyberspace. to apple, privacy means more than having the right to not share your personal information. privacy is putting the user in control. that means users can decide whether to share personal information and with him. it means they understand how that information will be used. ultimately, privacy is about living in a world where you can trust that your decisions about how your personal...
66
66
Oct 1, 2018
10/18
by
CSPAN3
tv
eye 66
favorite 0
quote 0
they would have a computer in their pocket and fewer people imagine the information flowing in cyberspace. for apple it means more than having the right not to share your personal information. it is about putting the user in control when it comes to that information. the users can decide whether to share personal information and with whom. and how that is used. ultimately privacy is about living in a world how your personal information is shared and used. it is a fundamental human right to be supported by social norms and the law. this approach comes naturally to apple we got her start by ushering in the computer revolution putting users in the driver seat of their own computer and then to grease the skids on information flow it seemed natural and important to extend that to put them in control of personal information. . . . . specific and transparent about how it will be used and we do not combine it into a single large customer profile across all of our services. we strive to give meaningful choice and control over what information is collected and used. and we spent a lot of time desig
they would have a computer in their pocket and fewer people imagine the information flowing in cyberspace. for apple it means more than having the right not to share your personal information. it is about putting the user in control when it comes to that information. the users can decide whether to share personal information and with whom. and how that is used. ultimately privacy is about living in a world how your personal information is shared and used. it is a fundamental human right to be...
96
96
Oct 14, 2018
10/18
by
CSPAN
tv
eye 96
favorite 0
quote 0
cyberspace is the most active battlefield. it extends into every home. whereral spread of mall -- malware has reached the pandemic stage. year when russia and north korea unleashed destructive code that spread across the world, causing untold billions in damage. the white house and dhs have released a new cyber strategies to outline how we are changing how we do business. in july, we hosted the first cyber security summit. this will serve as the central hub for government and private sector partners to share information and secure the digital ecosystem. we are jiving ambitious supply chain security efforts to identify weaknesses before they have consequences. dhs is working with partners throughout the ministration to hold cyber attackers accountable. united states has a spectrum of options. call outing them to cyber adversaries, to punish them, and to deter future bad behavior. i want to thank this committee for it's hard work to authorize the agency. at dhs, we hope the house will pass the legislation next month, as the agency is the cornerstone to pro
cyberspace is the most active battlefield. it extends into every home. whereral spread of mall -- malware has reached the pandemic stage. year when russia and north korea unleashed destructive code that spread across the world, causing untold billions in damage. the white house and dhs have released a new cyber strategies to outline how we are changing how we do business. in july, we hosted the first cyber security summit. this will serve as the central hub for government and private sector...
115
115
Oct 4, 2018
10/18
by
CSPAN
tv
eye 115
favorite 0
quote 0
attack that might happen that would cause us to respond in a serious and retaliatory way, either in cyberspacein physical space. here's a list of critical industries where that is the case. election systems weren't on that list in november 2016. they were added by former homeland security secretary james johnston in december 2016. the broader administration has been if this happens again, this is very serious and on the list that would prompt retaliation from the united states. host: in new york, independent line. leanne. caller: hello. couldd like to ask if you help clarify some information about the presidential alert that went out to some 200 something million phones yesterday. does this mean the president could potentially use this for campaign announcements or use it in some way that would questionably influence people? guest: this is not my field. i believe not. i believe the goal is to use this in actual emergency situations. this was a test. i'm not quite sure how successful it was because i did not get one. host: when it comes to the federal government itself, they group of money for
attack that might happen that would cause us to respond in a serious and retaliatory way, either in cyberspacein physical space. here's a list of critical industries where that is the case. election systems weren't on that list in november 2016. they were added by former homeland security secretary james johnston in december 2016. the broader administration has been if this happens again, this is very serious and on the list that would prompt retaliation from the united states. host: in new...
73
73
Oct 16, 2018
10/18
by
CSPAN2
tv
eye 73
favorite 0
quote 0
we see them very active in the cyberspace so we take that intel from the intel community and appropriately share it with the private sector to make sure the two speed on the threat indicators at letter that might apply. >> direct array, you have a voluntary cooperation to help check for insider threats. our airports working with the fbi? are they actively engaging with the fbi? are the vast majority of airports and we don't want to do that. tsa very aggressive, but there's lots of other employees there. majority of airports cooperating with you or not? >> in general? >> and general senator, do your points have been partners with us. obviously we work closely with the various dhs agencies in dealing with airport security, but i would say for the most part we have had pretty good cooperation. >> airports have chosen not to and there are several that instead will do our room. what would be the council you would provide to them? >> i think this is a shared fight, a shared threat and requires a shared response. >> thank you. secretary nielsen, let me go back to immigration. it's been interestin
we see them very active in the cyberspace so we take that intel from the intel community and appropriately share it with the private sector to make sure the two speed on the threat indicators at letter that might apply. >> direct array, you have a voluntary cooperation to help check for insider threats. our airports working with the fbi? are they actively engaging with the fbi? are the vast majority of airports and we don't want to do that. tsa very aggressive, but there's lots of other...
128
128
Oct 12, 2018
10/18
by
CSPAN
tv
eye 128
favorite 0
quote 0
appointment, cyberspace, slare yum commission, dwight d. eisenhower commission. signed sincerely, karen l. haas. the speaker pro tempore: the chair lays before the house a communication. the clerk: the honorable the speaker, house of representatives, sir, pursuant to the permission granted in clause 2-h of rule 2 of the rules of the u.s. house of representatives, the clerk received the following message from the secretary of the senate on october 11, 2018, at 9:15 a.m. that the senate agrees to the house amendments to the bill senate 3021. signed sincerely, karen l. haas of the the speaker pro tempore: the chair lays before the house a communication. the clerk: the honorable the speaker, house of representatives, sir, pursuant to the permission granted in clause 2-h of rule 2 of the rules of the u.s. house of representatives, the clerk received the following message from the secretary of the senate on october 11, 2018, at 2:41 p.m. that the senate passed senate 1305, appointment, board of trustees of the institute of american indian and alaskan native culture and
appointment, cyberspace, slare yum commission, dwight d. eisenhower commission. signed sincerely, karen l. haas. the speaker pro tempore: the chair lays before the house a communication. the clerk: the honorable the speaker, house of representatives, sir, pursuant to the permission granted in clause 2-h of rule 2 of the rules of the u.s. house of representatives, the clerk received the following message from the secretary of the senate on october 11, 2018, at 9:15 a.m. that the senate agrees to...