SFGTV: San Francisco Government Television
28
28
Dec 21, 2015
12/15
by
SFGTV
tv
eye 28
favorite 0
quote 0
also encryption data for privacy reason, all jurisdictions have a privacy policy and encrypt their dataand those policies also extend to the vendor. so you'll see a couple of tables in this presentation that are also in our report. i just wanted to mention just a couple of things of note on this slide. and that is that most jurisdictions use a mix of fixed and mobile cameras. again the mobile cameras allow for a bit more flexibility. so if there are areas of chronic speeding and speed cameras goes into that area and then the speeding decreases, that camera will be moved to a different area that may have a speeding problem. and also, the ase enforcement area school zones is included in the majority of jurisdictions. and most jurisdictions alert the drivers to the camera location. >> through the chair kim, ms. phillips did you look at any other cities outside of the u.s.? i think when we did our budget analyst report in february of this year, we looked at 33 cities in the united kingdom, including london, where there is a 20-year study that really validates a number of points in the slide
also encryption data for privacy reason, all jurisdictions have a privacy policy and encrypt their dataand those policies also extend to the vendor. so you'll see a couple of tables in this presentation that are also in our report. i just wanted to mention just a couple of things of note on this slide. and that is that most jurisdictions use a mix of fixed and mobile cameras. again the mobile cameras allow for a bit more flexibility. so if there are areas of chronic speeding and speed cameras...
116
116
Dec 19, 2015
12/15
by
CNNW
tv
eye 116
favorite 0
quote 1
little bit different. >> but they cannot be forced at this point in time to hand over the other encrypted data at this point, it's part of their package and their compact with the consumer that they won't hand over the data. but they also put in a design such that they can't access a lot of this data. so that's been their defense. and congress, some in congress, would like them to rewrite the code to put in that back door that you talked about. >> all right, laurie, i'm assuming they're not likely to rewrite this code. you just did a special last week, speaking of the biggest names in this. >> i spoke with a guy named maxi, a hacker, a security researcher. everyone from edward snowden to government officials have said look out for whatever he's building. so what is he building? he's building encryption technology now being used by what's app. this goes out to hundreds of millions of users. i asked him, i said, moxie, i asked him about the debate, and i said, why build this technology, what's at stake? listen to what he said. >> what we're trying to do is make mass surveillance impossible. and,
little bit different. >> but they cannot be forced at this point in time to hand over the other encrypted data at this point, it's part of their package and their compact with the consumer that they won't hand over the data. but they also put in a design such that they can't access a lot of this data. so that's been their defense. and congress, some in congress, would like them to rewrite the code to put in that back door that you talked about. >> all right, laurie, i'm assuming...
116
116
Dec 13, 2015
12/15
by
KTVU
tv
eye 116
favorite 0
quote 0
. >> encrypted data, tech companies are concerned about protecting their customers from pack -- hackers >>> it maybe a top selling gift this holiday season, but there are dangers involved. what you need know to protect yourself after several fires caused by a popular item. >>> and we're looking at a rainy sunday. he's tracking the next round of rain helping -- headed to the bay area. to save big during sleep train's you'retriple choice sale. for a limited time, you can choose up to 48 months interest-free financing on a huge selection of tempur-pedic models, or choose to save $300 on beautyrest and posturepedic mattress sets. you can even choose $300 in free gifts with sleep train's most popular stearns & foster mattresses. the triple choice sale, ends soon at sleep train. ♪ sleep train [train horn] ♪ your ticket to a better night's sleep ♪ 0 >>> hover boards are on top of many people's holiday wish lists this season. sales are expected to jump in the coming weeks. but there's an unexpected issue that could put users in danger. fires are being looked into on some hover board brands. >>
. >> encrypted data, tech companies are concerned about protecting their customers from pack -- hackers >>> it maybe a top selling gift this holiday season, but there are dangers involved. what you need know to protect yourself after several fires caused by a popular item. >>> and we're looking at a rainy sunday. he's tracking the next round of rain helping -- headed to the bay area. to save big during sleep train's you'retriple choice sale. for a limited time, you can...
SFGTV: San Francisco Government Television
51
51
Dec 22, 2015
12/15
by
SFGTV
tv
eye 51
favorite 0
quote 0
also encryption data for privacy reason, all jurisdictions have a privacy policy and encrypt their dataand those policies also extend to the vendor. so you'll see a couple of tables in this presentation that are also in our report. i just wanted to mention just a couple of things of note on this slide. and that is that most jurisdictions use a mix of fixed and mobile cameras. again the mobile cameras allow for a bit more flexibility. so if there are areas of chronic speeding and speed cameras goes into that area and then the speeding decreases, that camera will be moved to a different area that may have a speeding problem. and also, the ase enforcement area school zones is included in the majority of jurisdictions. and most jurisdictions alert the drivers to the camera location. >> through the chair kim, ms. phillips did you look at any other cities outside of the u.s.? i think when we did our budget analyst report in february of this year, we looked at 33 cities in the united kingdom, including london, where there is a 20-year study that really validates a number of points in the slide
also encryption data for privacy reason, all jurisdictions have a privacy policy and encrypt their dataand those policies also extend to the vendor. so you'll see a couple of tables in this presentation that are also in our report. i just wanted to mention just a couple of things of note on this slide. and that is that most jurisdictions use a mix of fixed and mobile cameras. again the mobile cameras allow for a bit more flexibility. so if there are areas of chronic speeding and speed cameras...
46
46
Dec 22, 2015
12/15
by
CSPAN2
tv
eye 46
favorite 0
quote 0
some people say there's not alternative and away for enforcement to get that encrypted data? is there an alternative? >> guest: there are a lot of alternatives out there but when it comes to certain kinds of encryption. when you talk about and to and committee qishan there are less choices and that is where a lot of the debate is, wiretapping information to transit. when you're talking about information, being on the cell phone there are ways to store that information and in the san bernardino case information on a cell phone and they try to destroy their cell phone as though they're still getting information off of the cell phones. the same would be true, i don't know can cell phones they were but it would be true with if it was encrypted or not and that was the case in the french and sit-in as well where someone was using a cell phone that had some encryption on it in terms of transit but law enforcement had access to that immediately. it was being backed up and where they could get access to the device itself when they have the device itself that you get information from it
some people say there's not alternative and away for enforcement to get that encrypted data? is there an alternative? >> guest: there are a lot of alternatives out there but when it comes to certain kinds of encryption. when you talk about and to and committee qishan there are less choices and that is where a lot of the debate is, wiretapping information to transit. when you're talking about information, being on the cell phone there are ways to store that information and in the san...
223
223
Dec 11, 2015
12/15
by
WUSA
tv
eye 223
favorite 0
quote 0
considering legislation that would compel tech giants like apple, google and facebook to hand over encrypted data >> even simple commercial products that you can buy encrypt the conversation. and some of them encrypted in a way that even with a court order, you can't break into it. >> reporter: tech companies say their products are designed that way for a reason, to protect personal information like bank account and credit card data. sometimes even the tech companies themselves can't crack them. industry representative michael beckerman. >> when you're asking for a back door encryption, you're asking to have an engineered vulnerability in the system that can be used by law enforcement or the governments but also that same vulnerability can be exploited by hackers or state-sponsored terrorists. >> reporter: after the san bernardino shooters posted their allegiance to isis on facebook, lawmakers introduced a bill that would require tech companies to alert law enforcement when users post terrorist activity, such as attack planning or recruitment on their sites. lorenzo is an expert on extremism at g
considering legislation that would compel tech giants like apple, google and facebook to hand over encrypted data >> even simple commercial products that you can buy encrypt the conversation. and some of them encrypted in a way that even with a court order, you can't break into it. >> reporter: tech companies say their products are designed that way for a reason, to protect personal information like bank account and credit card data. sometimes even the tech companies themselves...
134
134
Dec 11, 2015
12/15
by
KGAN
tv
eye 134
favorite 0
quote 0
considering legislation that would compel tech giants like apple, google and facebook to hand over encrypted data to law enforcement. along with tools to crack the code. >> even simple commercial products that you can buy encrypt the conversation. and some of them encrypted ia way that even with a court order, you can't break into it. >> reporter: tech companies say their products are designed that way for a reason, to protect personal information like bank account and credit card data. sometimes even the tech h companies themselves can't crack them. industry representative michael beckerman. >> when you're asking for a back door eryption or special key, you're asking to have an engineered vulnerability in the enforcement or governments,ut also that can be exploited by hackers or state-sponsored terrorists. >> reporter: after the san bernardino shooters posted their allegiance to isis on facebook, lawmakers introduced a bill that would require tech companies to alert laenforcement when users post terrorist activity, s sh as attack planning or recruitment on their sites. lorenzo is an expert on ex
considering legislation that would compel tech giants like apple, google and facebook to hand over encrypted data to law enforcement. along with tools to crack the code. >> even simple commercial products that you can buy encrypt the conversation. and some of them encrypted ia way that even with a court order, you can't break into it. >> reporter: tech companies say their products are designed that way for a reason, to protect personal information like bank account and credit card...
59
59
Dec 21, 2015
12/15
by
CSPAN2
tv
eye 59
favorite 0
quote 0
there aren't, there is not an alternative, there is not a way for law enforcement to get at that encrypted data. is there an alternative? how do we get there? how do we find it? >> guest: well, i think there are a lot of alternatives out there, but when it comes to certain kinds of encryption, right? when you're talking about end-to-end, there's less choices there, and that's where a lot of the debate is over kind of picking off wiretapping information in transit. but when you're talking about information actually being on a cell phone, you know, there are ways to store that information and get it even in this case the san bernardino case, the information was on a cell phone. they tried to destroy their cell phones, it seems as though they're still from what i'm hear anything the press stories, seems as though they're still getting information off these cell phones even though the folks tried to destroy it. the same would be true -- i don't know what kinds of cell phones they were, but the same would be true depending on what type of, if it was encrypted or not, and actually that was the case i
there aren't, there is not an alternative, there is not a way for law enforcement to get at that encrypted data. is there an alternative? how do we get there? how do we find it? >> guest: well, i think there are a lot of alternatives out there, but when it comes to certain kinds of encryption, right? when you're talking about end-to-end, there's less choices there, and that's where a lot of the debate is over kind of picking off wiretapping information in transit. but when you're talking...
112
112
Dec 10, 2015
12/15
by
WOI
tv
eye 112
favorite 0
quote 5
yet -having difficulty because the couple encrypted the data on garrett designed that we can't break it? there is no known decryption of these encryptions? and so as a result they are able to talk in the dark.. tag- that kind of encryption software is easily accessible and free... the fbi director saying- it is a major issue because its now commonly used by terror groups - especially isis. mg abc news ny " stephanie: candidates continue to offer up plans to crack down on terrorism both at home and abroad following the san bernardino attacks. donald trump's proposal to ban all muslims from entering the u-s remains the hot topic on the campaign trail. jack: speaking of donald trump... he has one less plane ride to worry about this month. the republican front runner said earlier today that he has cancelled a trip to israel - though he didn't give a specific reason. trump was scheduled to meet president benjamin netanyahu, but after he announced his proposal to ban all muslims from entering the state, netanyahu criticized trump's plan. trump says he's not backing down from his ideas, and
yet -having difficulty because the couple encrypted the data on garrett designed that we can't break it? there is no known decryption of these encryptions? and so as a result they are able to talk in the dark.. tag- that kind of encryption software is easily accessible and free... the fbi director saying- it is a major issue because its now commonly used by terror groups - especially isis. mg abc news ny " stephanie: candidates continue to offer up plans to crack down on terrorism both at...
SFGTV: San Francisco Government Television
48
48
Dec 15, 2015
12/15
by
SFGTV
tv
eye 48
favorite 0
quote 0
also encryption data for privacy reason, all jurisdictions have a privacy policy and encrypt their datad those policies also extend to the vendor. so you'll see a couple of tables in this presentation that are also in our report. i just wanted to mention just a couple of things of note on this slide. and that is that most jurisdictions use a mix of fixed and mobile cameras. again the mobile cameras allow for a bit more flexibility. so if there are areas of chronic speeding and speed cameras goes into that area and then the speeding decreases, that camera will be moved to a different area that may have a speeding problem. and also, the ase enforcement area school zones is included in the majority of jurisdictions. and most jurisdictions alert the drivers to the camera location. >> through the chair kim, ms. phillips did you look at any other cities outside of the u.s.? i think when we did our budget analyst report in february of this year, we looked at 33 cities in the united kingdom, including london, where there is a 20-year study that really validates a number of points in the slides.
also encryption data for privacy reason, all jurisdictions have a privacy policy and encrypt their datad those policies also extend to the vendor. so you'll see a couple of tables in this presentation that are also in our report. i just wanted to mention just a couple of things of note on this slide. and that is that most jurisdictions use a mix of fixed and mobile cameras. again the mobile cameras allow for a bit more flexibility. so if there are areas of chronic speeding and speed cameras...
116
116
Dec 17, 2015
12/15
by
CNNW
tv
eye 116
favorite 0
quote 0
you heard about -- you heard them say carpet bombing, encrypting data, closing down the internet. were you concerned about any of that? some people say it impedes on the rights of americans if you are thinking of doing this and others say we need to do this in this terrorism age that's just a reality right now. >> you know, what we heard last night again and again was violations of basic liberties which is really against what certain parts of the republican party stand for. and we also heard an awful lot of blaming the other, blaming the immigrants, blaming muslims, et cetera. that is a real problem. >> you work in international circles. as you watch this what were you thinking about? >> i kept thinking about what van jones said which was the biggest recruitment tool for isis is donald trump. but you know, as somebody who works in international circles, it's really very, very dangerous and bad for the united states to have the republican party keep saying all these things. you know, the u.s. was at our very lowest point internationally when george bush invaded iraq and when abu gh
you heard about -- you heard them say carpet bombing, encrypting data, closing down the internet. were you concerned about any of that? some people say it impedes on the rights of americans if you are thinking of doing this and others say we need to do this in this terrorism age that's just a reality right now. >> you know, what we heard last night again and again was violations of basic liberties which is really against what certain parts of the republican party stand for. and we also...
59
59
Dec 10, 2015
12/15
by
WCVB
tv
eye 59
favorite 0
quote 0
san bernardino high school were on farook' s p hone, but having difficulty because the couple encrypted the data on their digital devices. >> unfortunately, it is designed to so we can break it. there is no mean decryption. rhondella: that kind of encryption software is easily accessible and free. this is a common procedure for terror groups, especially isis. liam: -- ed: an elementary school evacuated after a pressure cooker was found outside a building. it was found under a tree near the kindergarten classrooms. the bomb squad checked it out and determined it was not a threat. the bombs that exploded at the boston marathon were made from jc: a tribute to the youngest victim of the boston marathon attacks. a new park will be named for martin richard. it is expected to open sometime in 2017. ed: as you know and we have talked about, a wonderful day here, but powerful storms in the northwest. jc: next on newscenter 5, the powerful impact of the storms and the recovery efforts right now. ed: police say she drove the wrong way for 16 miles. the new hampshire woman facing charges tonight. jc: it' s
san bernardino high school were on farook' s p hone, but having difficulty because the couple encrypted the data on their digital devices. >> unfortunately, it is designed to so we can break it. there is no mean decryption. rhondella: that kind of encryption software is easily accessible and free. this is a common procedure for terror groups, especially isis. liam: -- ed: an elementary school evacuated after a pressure cooker was found outside a building. it was found under a tree near...
88
88
Dec 7, 2015
12/15
by
CNBC
tv
eye 88
favorite 0
quote 0
and it might be one small piece of information, whether it's open source or encrypted data that adds piece of puzzle. >> if it's clear the u.s. companies that have encrypted products are cooperating with the government, probably would be clear, i guess, if the encryption back door were discovered, wouldn't the sophisticated terrorist just use something that was created overseas anyway? would this only catch the sloppy terrorist and expose the rest of the u.s. population? >> that's a good point. we need to have available to us every opportunity we can. people make mistakes. linkages between people, communications, i'll call you, you'll call john. you might be encrypted between you and i but you might be open, i might be able to find that. yes, we need to work with foreign partners to do the same thing. quite candidly in many countries aaron the world, which is where technologies are being deployed, those countries have ubiquitous access to that data. we're making it more difficult on our own law enforcement. we need to put our folks on the same level platform. >> a lot of discussion t
and it might be one small piece of information, whether it's open source or encrypted data that adds piece of puzzle. >> if it's clear the u.s. companies that have encrypted products are cooperating with the government, probably would be clear, i guess, if the encryption back door were discovered, wouldn't the sophisticated terrorist just use something that was created overseas anyway? would this only catch the sloppy terrorist and expose the rest of the u.s. population? >> that's a...
46
46
Dec 24, 2015
12/15
by
CSPAN
tv
eye 46
favorite 0
quote 0
snowden revelations, the use of something called -- which is partly funded by the navy, which encrypts data, has grown exponentially as a result of the snowden revelations. because it was revealed that largely unencrypted data was brought up including e-mail exchanges. in addition, our connectivity, our communications, are global. they may be local in terms of viewpoint, opinion, and a package of information of some of who sits next to you, but that information could be transmitted around the world. the internet takes the shortest possible route from one destination to another. so, while you think local, think at the same time global. the data that is harvested, and analyzed by the nsa and other various agencies, can produce extremely highly accurate pictures of individuals, as well as social, economic, and political trends. this is called analytics. it is one of the most remarkable things you will ever see. if you want to look on google, and do your own version of analytics, you can. your friends, family, associations, that is phenomenal. particularly, when smart technologies really are wo
snowden revelations, the use of something called -- which is partly funded by the navy, which encrypts data, has grown exponentially as a result of the snowden revelations. because it was revealed that largely unencrypted data was brought up including e-mail exchanges. in addition, our connectivity, our communications, are global. they may be local in terms of viewpoint, opinion, and a package of information of some of who sits next to you, but that information could be transmitted around the...
125
125
tv
eye 125
favorite 0
quote 1
great point because technology's moving at a great pace what the technology companies can do in encrypting datat very hard for law enforcement and intelligence community to get after it. i think what everybody is calling for is a discussion between the technology companies and our government on what and should we do. and, you know, liz, i think this is something that should be not only a u.s., but an international approach. it's got to be. liz: do we leave it up to anonymous, the hacker group? they are in just a few days going to do a whole day of let's attack isis through the web and through all of these social media sites. i mean, whoever thought we would be linking with anonymous to get these guys, but maybe they have more power x that's a sad state of affairs, is it not? >> well, it is in that one statement, but note that attacking isis just on the web is not going to be sufficient. we've got to attack it across all these fronts. what's it take to defeat isis? is and, you know, it's more than attacking on the web. it's the physical attack, it's shutting them down, it's multiple countries wo
great point because technology's moving at a great pace what the technology companies can do in encrypting datat very hard for law enforcement and intelligence community to get after it. i think what everybody is calling for is a discussion between the technology companies and our government on what and should we do. and, you know, liz, i think this is something that should be not only a u.s., but an international approach. it's got to be. liz: do we leave it up to anonymous, the hacker group?...
39
39
Dec 9, 2015
12/15
by
CSPAN3
tv
eye 39
favorite 0
quote 0
first, with respect to control of encrypted data, u.s. tech companies do not want to be the middle man between law enforcement and technology customers. how do you reconcile this concern with the needs of law enforcement, and have you considered alternatives that would meet the needs of law enforcement but not put the united states tech companies in the awkward position of middleman? >> i'm not sure i know exactly what they mean by middleman. i don't want anybody to be the middleman for law enforcement. but everybody in the united states has, i believe, an obligation to endeavor to comply with judicial orders in criminal investigations. you're you're a bank, you run a sandwich shop, you run a technology company. i don't want anybody to be a middleman but i want everybody to comply with judges' orders. >> u.s. tech companies are the no the only businesses that offer encryption to customers. other countries offer it as well. if we require u.s. tech companies to provide decryption keys, won't users simply look to technologies from other non-
first, with respect to control of encrypted data, u.s. tech companies do not want to be the middle man between law enforcement and technology customers. how do you reconcile this concern with the needs of law enforcement, and have you considered alternatives that would meet the needs of law enforcement but not put the united states tech companies in the awkward position of middleman? >> i'm not sure i know exactly what they mean by middleman. i don't want anybody to be the middleman for...
164
164
Dec 16, 2015
12/15
by
KPIX
tv
eye 164
favorite 0
quote 0
in last month's siberiata, encrypted data, photos and names all released from 11.6 million v-tech accounts including some here in the u.s. the chinese toy company specializes in electronic learning tools for children including tablets and apps. >>> health advocates say california is discriminating against low income latino patients. they filed a complaint yesterday with federal health and human services. the complaint says reimbursement rates from medi- cal are so low that doctors refuse to see patients nearly two-thirds of whom are latino. it says the state is not meeting its responsibility to provide equal access to healthcare. >>> "covered california" has extended its deadline to 8 p.m. tomorrow for people to enroll for health insurance. the deadline for coverage that would start january 1, open enrollment is available through january 31 for coverage that begins on february or march to be done online or in person at an enrollment location. >>> all right. gianna has a traffic alert. >> that's right. we have a lane completely shut down for a big rig accident as you work your way through a
in last month's siberiata, encrypted data, photos and names all released from 11.6 million v-tech accounts including some here in the u.s. the chinese toy company specializes in electronic learning tools for children including tablets and apps. >>> health advocates say california is discriminating against low income latino patients. they filed a complaint yesterday with federal health and human services. the complaint says reimbursement rates from medi- cal are so low that doctors...
109
109
Dec 10, 2015
12/15
by
KGAN
tv
eye 109
favorite 0
quote 3
considering legislation that would compel tech giants like apple, google, and facebook to hand over encrypted data to law enforcement, along with tools to crack the code. >> e en faithful commercial products that you can buy encrypt the conversation, and some of them encrypted in a way that even with a court order, you can't break into it. >> reporter: techh companies say their prododts are designed that to protect personal information like bank account and credit card data. sometimes even the tech companies themselves can't crack them. industry representative michaell beckerman. >> they are asking for a special key or a back door encryption, you're asking to have an engineered vulnerability to a system that can be used by law enforcement or government, but also that same vulnerability can be exploited by hackers or sponsored terrorists. >> reporter: after the san bernardino shooters posted their a allegianan to isiss on facebook,, lawmakers introduced a bill this week that would require tech companies to alert law enforcement when users post terrorist activity, such attack planning or recruitment
considering legislation that would compel tech giants like apple, google, and facebook to hand over encrypted data to law enforcement, along with tools to crack the code. >> e en faithful commercial products that you can buy encrypt the conversation, and some of them encrypted in a way that even with a court order, you can't break into it. >> reporter: techh companies say their prododts are designed that to protect personal information like bank account and credit card data....
376
376
Dec 29, 2015
12/15
by
CSPAN2
tv
eye 376
favorite 0
quote 0
there is encryption malware the said hey we are going to encrypt your data. if you pay me a thousand dollars i will send you the encryption key so you can use your data. so one is destruction one is locking it up. the most common is covert malware that maintains persistent environment so is constantly under system why campy do to the end is trying to gain access to files and information and things of value from an information perspective to expo. up from your entity. >> host: with the advent of wireless, has that made security even more difficult? >> guest: i think it's made it more difficult. when you think of trying to maintain the protective layer with al qaeda threat. you are not saying that the threat of an at 11 take against those? you to look at the world through that lens. you say i've got all these things to protect another protect them so you think of all that the assets of the global companies now they access points. the internet of things and all the devices in connectivity and the vendors and connectivity channel partners. you are so connected and
there is encryption malware the said hey we are going to encrypt your data. if you pay me a thousand dollars i will send you the encryption key so you can use your data. so one is destruction one is locking it up. the most common is covert malware that maintains persistent environment so is constantly under system why campy do to the end is trying to gain access to files and information and things of value from an information perspective to expo. up from your entity. >> host: with the...
94
94
Dec 7, 2015
12/15
by
BLOOMBERG
tv
eye 94
favorite 0
quote 0
. >> that is different than technology companies that have encryption data like apple that makes it impossiblem to police things like messages or face time. there is a station between policing things and not making it for people to actually see what is in the content. >> on the question of encryption which we had in debating for 20 years, scientists say if you weaken the encryption, you open up the back door for all kinds of criminal activity and the fairlydustry has been aligned and vigorous in arguing they do not want to weaken encryption. the obama administration has sided with them and we will see of the pressure increases. scarlet: thank you for joining us today. alix: still ahead, a concrete bed and a rat infested cell? they let -- a look at the life behind bars for andre estevez. >> from world headquarters in new york, welcome back to the markets, i am alix steel. scarlet: i am scarlet fu. mark crumpton is at our news desk. mark: the department of homeland security is announcing a new terror alert system. saystary jeh johnson details will be released soon. this will be the third of terr
. >> that is different than technology companies that have encryption data like apple that makes it impossiblem to police things like messages or face time. there is a station between policing things and not making it for people to actually see what is in the content. >> on the question of encryption which we had in debating for 20 years, scientists say if you weaken the encryption, you open up the back door for all kinds of criminal activity and the fairlydustry has been aligned...
99
99
Dec 10, 2015
12/15
by
WJLA
tv
eye 99
favorite 0
quote 0
they are having difficulty because they incurred to the data on the digital devices. -- encrypted the data. >> we can't break it. there is no no decryption -- known decryption. iforter: they are looking they were massive online specifically to start a sleeper cell in the west and whether that could be a new tactic used by terror groups. marcy gonzales, abc news. donald trump continues to widen the gap in gain support among republican voters in the latest poll but there is a catch. a lot of the most recent surveys taken was before his controversial plan to ban muslim some traveling in the united states. the attacks keep coming and his support seemingly grows. joining us now scott thuman. patty make sense of this politically speaking? other campaigns will be going down in flames and he continues to gain support. reporter: he has a phenomenon in a lot of ways. he talks about poll numbers so often. the only poll that really matters is the one on election day and there is a lot of truth of that, but we are getting a debt keeping a close eye on his particular numbers because we are seeing t
they are having difficulty because they incurred to the data on the digital devices. -- encrypted the data. >> we can't break it. there is no no decryption -- known decryption. iforter: they are looking they were massive online specifically to start a sleeper cell in the west and whether that could be a new tactic used by terror groups. marcy gonzales, abc news. donald trump continues to widen the gap in gain support among republican voters in the latest poll but there is a catch. a lot...
133
133
Dec 12, 2015
12/15
by
CNNW
tv
eye 133
favorite 0
quote 0
were using basic encryption techniques, federal investigators should have a fairly easy time to overcome that. and the third piece would be if they're using standard what we call data-wiping tools, things like d-band, et cetera. and those, again, federal investigators should have a pretty easy time overcoming that. but, again, in combination of water submersion, encryption, and if they did use data-wiping technology, i think it would elongate the process, but chances are, again, just being submerged underwater, that will be the least of the issues the investigators face. >> interesting. so is it just a matter of days to say, give the item time to dry out. try to discover if it's encrypted or, you know, if it has been wiped. is this something that takes -- the sequence of events takes course over many days or is it even weeks? >> well, initially, they only go through three phases. one is an assessment phase. and then they're going to do -- it's acquisition, assessment, and then reporting. and the acquisition of the information, really taking a look at it, drying it out, things like that. that's just really, i mean, once they get it out and get it dried out, it's rea
were using basic encryption techniques, federal investigators should have a fairly easy time to overcome that. and the third piece would be if they're using standard what we call data-wiping tools, things like d-band, et cetera. and those, again, federal investigators should have a pretty easy time overcoming that. but, again, in combination of water submersion, encryption, and if they did use data-wiping technology, i think it would elongate the process, but chances are, again, just being...
58
58
Dec 23, 2015
12/15
by
CSPAN
tv
eye 58
favorite 0
quote 0
the narrative of radical islam, and the debate over whether to allow law enforcement access to encrypted data. michaelia director hayden and former customs and border control commissioner robert bonner all take part. the council on foreign relations is the host of this event. thank you very much. hi there. thanks for coming today. we have a full house here in new york and i hope you have a full house in d.c. temple-rastonna and i'm the counterterrorism correspondent for national public radio, so i've been busy, and i have today's panelists watching what has been going on in paris, brussels, and san bernadino. what i would like to do is , andly introduce the panel we will talk for a little while, and then at 1:00 -- no caps on, no, sorry, 1:30, we will go for questions from the audience. here sitting with me in new york is robert bonner, a senior principal at sentinel strategy and policy consulting. he is a former official of the -- commissioner of the u.s. customs. so we will have lots of questions for him about visas and waivers and things like that. in d.c., we had jamie gorelick, who is a
the narrative of radical islam, and the debate over whether to allow law enforcement access to encrypted data. michaelia director hayden and former customs and border control commissioner robert bonner all take part. the council on foreign relations is the host of this event. thank you very much. hi there. thanks for coming today. we have a full house here in new york and i hope you have a full house in d.c. temple-rastonna and i'm the counterterrorism correspondent for national public radio,...
77
77
Dec 1, 2015
12/15
by
KMEG
tv
eye 77
favorite 0
quote 0
data.motherboard consulted with a cybersecurity expert on the breached data, and it appears that vtech did not do enough to encrypt customer data or passwords to guard it from hackers. vtech sells tons of kid's learning toys, like tablets, phones and even smartwatches. when you have a company as big as vtech not dointhe basics when it comes to security and protecting your data, it should show you we have a huge cybersecurity problem on our hands. companies need to care to invest in security before they get hacked, not after.""*** so -- what's more worrysome than your kid's toys getting hacked? how about flying delivery drones swarming the skys. (video from amazon: 1:46- 2:36)it's a future amazon believesesstrongly in, and the company has released a video showing off a a w design for drones that t can get a package to youroor in 30 minutes or less. this prototype drone for ime air will load a shoebox-sized package from underneath the craft, lifted into it's belly, and is then sent flying off to your home. what you're seeing here is actual footage from a working are sensors on board the drone to prevent the craft fr
data.motherboard consulted with a cybersecurity expert on the breached data, and it appears that vtech did not do enough to encrypt customer data or passwords to guard it from hackers. vtech sells tons of kid's learning toys, like tablets, phones and even smartwatches. when you have a company as big as vtech not dointhe basics when it comes to security and protecting your data, it should show you we have a huge cybersecurity problem on our hands. companies need to care to invest in security...
183
183
Dec 13, 2015
12/15
by
CSPAN
tv
eye 183
favorite 0
quote 0
at the request of other senators, we are collecting data concerning the ways in which encryption is affecting our ability to implement court orders for data in motion, which is, emails and phone calls, and data at rest. i don't know when i am going to get that to you, but it is in progress. it will show a significant impact for both terrorism and criminal cases. with respect to our -- withtions with the its respect to the rolling cases, i don't want to talk about san bernardino because we are doing a lot of work with respect to that now. there is no doubt that the use of encryption is a part of terrorist tradecraft. they understand the problems we have getting court orders to be effective when they are using these mobile messaging apps. we see them talking about that all over the world. it is a feature, especially of 's tradecraft.il they had made clear to me that we are not at war with each other. we care about the same things. it is not a technological problem. we are not going to bring the internet or be exposed to tremendous threats. -- it isood companies a business model weston -- busine
at the request of other senators, we are collecting data concerning the ways in which encryption is affecting our ability to implement court orders for data in motion, which is, emails and phone calls, and data at rest. i don't know when i am going to get that to you, but it is in progress. it will show a significant impact for both terrorism and criminal cases. with respect to our -- withtions with the its respect to the rolling cases, i don't want to talk about san bernardino because we are...
65
65
Dec 10, 2015
12/15
by
WJLA
tv
eye 65
favorite 0
quote 0
salvage other details after the couple not only try to destroy the digital devices, but encrypted much of the data as well. >> there is no doubt that the use of encryption is part of terrorist tradecraft now. >> the fbi believes they may have been radicalized by 2012. by the next year, they were chatting online about jihad and martyrdom. united states government does not normally ask the intelligence community to look at the e-mails of somebody just because they apply for a visa. >> today, officials is still trying to determine if others were involved in last week massacre in san bernardino. the memories of which are still hunting first responders. >> it was horrific. i remember cries and moans and the smell of gunpowder. >> investigators are looking suspect may the have been messed up online specifically to start a sleeper cell in the u.s. and whether that could be a new tactic used by terry gou. -- terror groups. >> campus police in boston will soon have a firepower typically reserved larger departments. the school of 20,000 students plans to deploy semi automatic rifles for emergencies. boston
salvage other details after the couple not only try to destroy the digital devices, but encrypted much of the data as well. >> there is no doubt that the use of encryption is part of terrorist tradecraft now. >> the fbi believes they may have been radicalized by 2012. by the next year, they were chatting online about jihad and martyrdom. united states government does not normally ask the intelligence community to look at the e-mails of somebody just because they apply for a visa....
91
91
Dec 11, 2015
12/15
by
CSPAN3
tv
eye 91
favorite 0
quote 0
at your request and the request of other senators, we are collecting data concerning the ways in which encryption is affecting our ability to implement court orders for data in motion, that is e-mails or phone calls, and data at rest that is sitting on devices. i don't know exactly when i'm going to get that to you. that is in progress. it will show it's a significant impact and growing across our work, terrorism and criminal cases. with respect to our conversations with the -- first of all, the second piece, with respect to its role in cases, i don't want to talk about paris yet or san bernardino, because we're doing a lot of work with respect to those now. there's noeáñ doubt that the usf encryption is part of terrorist trade craft now, because they understand the problems we have getting court orders to be effective when they are using these mobile messaging apps especially that are end to encrypted. it's a feature of isil's trade craft. the conversations with the companies have been good. like i said, they have made clear to me that we're not at war with each other. we care about the same thi
at your request and the request of other senators, we are collecting data concerning the ways in which encryption is affecting our ability to implement court orders for data in motion, that is e-mails or phone calls, and data at rest that is sitting on devices. i don't know exactly when i'm going to get that to you. that is in progress. it will show it's a significant impact and growing across our work, terrorism and criminal cases. with respect to our conversations with the -- first of all,...
133
133
Dec 9, 2015
12/15
by
KNTV
tv
eye 133
favorite 0
quote 0
the gunmen took special care to destroy cell phones with some data encrypted. the recovery process complicated and slow but may prove critically. authorities were seen coming and going from farook's garage, a bomb factory, where others may have seen his plan of terror. >>> oregon and washington state are getting slammed by heavy rains and flooding. several rivers overflowed and a mud slide was reported. now for a look at the weather here is bill karins. good morning. >> another repeat of yesterday and another storm coming in to the west tomorrow. that effect more of california. you can see our parade of storms. one huge one in the gulf of alaska. and another one in southern british columbia, dragging the cold front down to the northwest. and behind that another storm. you can see that out there in the pacific. storm one today. two tomorrow and then all that mess will be inland through friday and maybe even another saturday into sunday. the heavier rains have stopped on the coast. just in the cascades we're getting the steadier rainfall. further south portland i
the gunmen took special care to destroy cell phones with some data encrypted. the recovery process complicated and slow but may prove critically. authorities were seen coming and going from farook's garage, a bomb factory, where others may have seen his plan of terror. >>> oregon and washington state are getting slammed by heavy rains and flooding. several rivers overflowed and a mud slide was reported. now for a look at the weather here is bill karins. good morning. >> another...
560
560
Dec 29, 2015
12/15
by
KQED
tv
eye 560
favorite 0
quote 0
data. it -- it requires encrypting our data and taking new measurements in the government. so many offices were hacked this year, we need to review their security practices if they hold more citizen data. >> brown: that could be right, this is an evolving threat both to the private sector and the government. >> that's right and this bill doesn't address that. this bill is information gathering for d.h.s. and doesn't actually support what we need for improving the security of our companies and government agencies. >> brown: what kind of system would you like to see in place? >> we need to actually improve the security of how we're storing and managing data, who has access to that data. more threat intelligence will help us because we already know what the threats look like. >> brown: james lewis, is there still a lot to work out? a still a lot to know about how this will be implemented. >> yeah, the bill has a lot of reporting dates and actions for implementation. i think that -- you know, the debate between the privacy community and the agencies with where does the informat
data. it -- it requires encrypting our data and taking new measurements in the government. so many offices were hacked this year, we need to review their security practices if they hold more citizen data. >> brown: that could be right, this is an evolving threat both to the private sector and the government. >> that's right and this bill doesn't address that. this bill is information gathering for d.h.s. and doesn't actually support what we need for improving the security of our...