SFGTV2: San Francisco Government Television
217
217
Sep 3, 2012
09/12
by
SFGTV2
tv
eye 217
favorite 0
quote 0
we try to stop, not only infiltration, but exfiltration, where sewage would actually leak out of the pipe. the head is larger, so it breaks away the old pipe and allows the new pipe to come in behind it. griffin: we are saving about 67% of the cost of actually digging old pipe up. clyne: it's less invasive than an open-cut process, where you would open the whole trench up and replace the pipe. it's called "trenchless" technology, so... that's as good as it gets. griffin: we don't have to dig up everyone's yard, and we refurbish that pipe at a much-reduced cost. another technique, the cured-in-place lining. it's equivalent to putting a large sock through the existing sewer. we form a new pipe inside the old pipe, and therefore we seal up all of the defects that allow rainwater to come in. hunter: we repair about 730 leaks a month in our system. griffin: the improvements that we've made will make the environment better. we had approximately 1,000 overflows occur in 1999. today, we've reduced overflows by 45% to 50%. and it's going to continue to improve as we go forward with the rehabi
we try to stop, not only infiltration, but exfiltration, where sewage would actually leak out of the pipe. the head is larger, so it breaks away the old pipe and allows the new pipe to come in behind it. griffin: we are saving about 67% of the cost of actually digging old pipe up. clyne: it's less invasive than an open-cut process, where you would open the whole trench up and replace the pipe. it's called "trenchless" technology, so... that's as good as it gets. griffin: we don't have...
283
283
Sep 28, 2012
09/12
by
CSPAN2
tv
eye 283
favorite 0
quote 0
what i come to find out is that not only are we focusing on the exfiltration of data or the removal of intellectual property which is one of the things we focused on in the cyber domain for quite sometime, it's the actual disruption of services. and in some cases the destruction of physical infrastructure that we are seeing as a capability that is being demonstrated in the cyber domain. >> you are seeing the destruction already? >> yes. what we've seen through different elements, different tools that have been released in the wild, the interruption of goods and services and not for the purpose of gaining monetary advantage or excellent rating property but to disrupt services. the ongoing campaign against the financial sector is not about exporting data from the financial sector but it's about preventing you from being able to do your online banking. so it's to disrupt your way of life and not to remove information. we are seeing that escalate in the cyber domain. what we do in verizon is focus on putting those risk mitigation strategies in place so that we can take those actionable ste
what i come to find out is that not only are we focusing on the exfiltration of data or the removal of intellectual property which is one of the things we focused on in the cyber domain for quite sometime, it's the actual disruption of services. and in some cases the destruction of physical infrastructure that we are seeing as a capability that is being demonstrated in the cyber domain. >> you are seeing the destruction already? >> yes. what we've seen through different elements,...
134
134
Sep 28, 2012
09/12
by
CSPAN2
tv
eye 134
favorite 0
quote 0
year and a half ago, three of the main operators of the botnet, one of the most botnets of the exfiltration standpoint, it was a joint effort between the fbi and the spanish authorities took a rest of those individuals, to find them, arrest them and prosecute them. that work is ongoing. for each one of those high profile actors, there's hundreds and hundreds of smaller actors using a variety of technology so that we can sit there and disguise where they are operating from. and then it goes back to john's point that we need to spend more time looking at the threat activity, the patterns associated with threat activity coming in how to identify that in an effort. because they don't come in and sign their name in a gas log and say i'm going to steal data today. but there are fingerprints, if you will, digital fingerprints that are left behind that enable us to be more successful in this area. but it's a growing size. cyber forensics is a growing and private. it's not something that we have like csi that you see on tv. unfortunately. >> that are human beings and all. this is not computers attac
year and a half ago, three of the main operators of the botnet, one of the most botnets of the exfiltration standpoint, it was a joint effort between the fbi and the spanish authorities took a rest of those individuals, to find them, arrest them and prosecute them. that work is ongoing. for each one of those high profile actors, there's hundreds and hundreds of smaller actors using a variety of technology so that we can sit there and disguise where they are operating from. and then it goes back...
150
150
Sep 23, 2012
09/12
by
CSPAN
tv
eye 150
favorite 0
quote 0
once inside they can exfiltrate government and military secrets as well as valuable intellectual property. information that can greatly improve the competitive advantage of state-owned companies. unlike state sponsored intruders, hackers for profit do not seek information for political power, rather they seek information for sale and trade to the highest bidder. in some cases these hackers have joined forces to create syndicates. organized crime in cyberspace offers a higher profit with lower probability of being identified and prosecuted. and actors such as anonymous, are pioneering their own forms of anarchy. with these diverse threats we anticipate that cybersecurity may well become our highest priority in years to come. that is why we are strengthening our cybercapabilities in the same way we enhanced our intelligence and national security capabilities in the wake of the september 11 attacks. we are focusing our cyberdivision on computer intrusions and network attacks. we are also hiring additional computer scientists to provide expert technical support to critical investigations ongo
once inside they can exfiltrate government and military secrets as well as valuable intellectual property. information that can greatly improve the competitive advantage of state-owned companies. unlike state sponsored intruders, hackers for profit do not seek information for political power, rather they seek information for sale and trade to the highest bidder. in some cases these hackers have joined forces to create syndicates. organized crime in cyberspace offers a higher profit with lower...
185
185
Sep 20, 2012
09/12
by
CSPAN
tv
eye 185
favorite 0
quote 1
once inside they can exfiltrate government and military secrets as well as valuable intellectual property. information that can greatly improve the competitive advantage of state-owned companies. unlike state sponsored intruders, hackers for profit do not seek information for political power, rather they seek information for sale and trade to the highest bidder. in some cases these hackers have joined forces to create syndicates. organized crime in cyberspace offers a higher profit with lower probability of being identified and prosecuted. and actors such as anonymous, are pioneering their own forms of anarchy. with these diverse threats we anticipate that cybersecurity may well become our highest priority in years to come. that is why we are strengthening our cybercapabilities in the same way we enhanced our intelligence and national security capabilities in the wake of the september 11 attacks. we are focusing our cyberdivision on computer intrusions and network attacks. we are also hiring additional computer scientists to provide expert technical support to critical investigations ongo
once inside they can exfiltrate government and military secrets as well as valuable intellectual property. information that can greatly improve the competitive advantage of state-owned companies. unlike state sponsored intruders, hackers for profit do not seek information for political power, rather they seek information for sale and trade to the highest bidder. in some cases these hackers have joined forces to create syndicates. organized crime in cyberspace offers a higher profit with lower...