38
38
Aug 3, 2015
08/15
by
CSPAN2
tv
eye 38
favorite 0
quote 0
opm was asleep at the switch. i was outraged when it happened both because of the federal employees' data that was compromised, but also you get to these sf86 forms that were hacked, that were stolen with all the security clearance information of individuals and their contacts, family members, past associates, all of that puts national security at risk. and as you know i called for the resignation of the director of opm at the time because opm had been warned for years through ig investigations that they were materially deficient one of the worst grades you can get for doing enough on cyber and they should have been doing more. now, granted one of the problems is that nobody's in charge os ostensibly on cyber. compelling department agency toss comply with cybersecurity measures but that's not excuse for the director not speaking up and demanding more spanx assistance. not like -- more assistance. not like the director was coming to the hill saying we need more help, more resources and they just weren't getting it.
opm was asleep at the switch. i was outraged when it happened both because of the federal employees' data that was compromised, but also you get to these sf86 forms that were hacked, that were stolen with all the security clearance information of individuals and their contacts, family members, past associates, all of that puts national security at risk. and as you know i called for the resignation of the director of opm at the time because opm had been warned for years through ig investigations...
79
79
Aug 4, 2015
08/15
by
CSPAN2
tv
eye 79
favorite 0
quote 1
the director of opm at the time because opm had been warned for years investigations material deficient. they should have been doing more. granted one of the problems is nobody's in charge with policy and budgetary authority. it's not like the director or any director was coming to the table and saying we need help and we need more resources. that never happened. >> host: assisted dhs issue or cover out why? who is in charge when it comes to the government? who can you turn to when you want information? >> the answer is you have to coordinate her michael daniel in the white house. he's the special assistant to the president and cyber and i give michael high marks. i've had the opportunity to speak with him several times and i have a lot of respect for him. he is the coordinator and he doesn't have policy vegetarian authority to reach across government and step it up into one cyber the department of homeland security is the agency that is ostensibly charged with carrying out cybersecurity for the agency for the dot.gov domain but even secretary of common security does not have budgetary
the director of opm at the time because opm had been warned for years investigations material deficient. they should have been doing more. granted one of the problems is nobody's in charge with policy and budgetary authority. it's not like the director or any director was coming to the table and saying we need help and we need more resources. that never happened. >> host: assisted dhs issue or cover out why? who is in charge when it comes to the government? who can you turn to when you...
44
44
Aug 1, 2015
08/15
by
CSPAN
tv
eye 44
favorite 0
quote 0
is that fair approach that opm allows this to happen in a way? rep. degette: i'm not so concerned about who is paying the bill, i'm concerned we give protection to folks. there was massive amount of data that was stolen. much of this data was highly confidential data, social security numbers and other kinds of data that hackers could use to get private information about people. i'm not so concerned about who is paying for it as to make sure people get robust protection. doesn't there is support on both sides, one know if flying companies to notify customers after a breach. we haven't seen that legislation go very far. is that a breach legislation something we could still see happen in this congress? rep. degette: given the events of this summer with opm added reach as we saw last year with so many large corporations, i really think the urgency is increasing. and perhaps do they see more of an relation -- more of an inclination to bring this legislation to committee. many of these bills are ready common sense. it seems it would be easy to pass. host: y
is that fair approach that opm allows this to happen in a way? rep. degette: i'm not so concerned about who is paying the bill, i'm concerned we give protection to folks. there was massive amount of data that was stolen. much of this data was highly confidential data, social security numbers and other kinds of data that hackers could use to get private information about people. i'm not so concerned about who is paying for it as to make sure people get robust protection. doesn't there is support...
81
81
Aug 23, 2015
08/15
by
WJLA
tv
eye 81
favorite 0
quote 0
opm has new people on this, but top-notchch are procurement people. what they have really done zynga h the private sector as opposed to not talking to them -- what they have really donone is engad the private sector as opposed to not talking to them. i think this will be a success story. morris:: to an outsider, it sees strange that the officef personnel managent needs to outsource training and developing. why are they not equipped to train their own people? a policy and more oversight orgaganization, and ty should not duplicate what is readily available in the private sector. a lot of companies do a great job in this area of providing customized training, providing human capital strarategies and organizational performance improvement strategies. morris: t that makes sense. i want to talk about this attempt to streamlinene category management. what happened to strategic sourcing? isis gsa rebranding, or is category management entirely different? jim: to me, it's just another name for strategic sourcing, but hasink category management taken hold. it's
opm has new people on this, but top-notchch are procurement people. what they have really done zynga h the private sector as opposed to not talking to them -- what they have really donone is engad the private sector as opposed to not talking to them. i think this will be a success story. morris:: to an outsider, it sees strange that the officef personnel managent needs to outsource training and developing. why are they not equipped to train their own people? a policy and more oversight...
156
156
Aug 2, 2015
08/15
by
CSPAN
tv
eye 156
favorite 0
quote 0
what is opm doing to make sure does not happen again? guest: the white house has launched what it calls a cyber sprint. very a breach of this we're going to bring in the resources of the federal government and we're going to try to identify vulnerabilities and fix those vulnerabilities in they have brought in super hackers to see if they can get into u.s. systems. if they can, what vulnerabilities are the using? the u.s. government is a very large thing to protect from a cyber point of view and there are lots of ways in. there is a lot of instructional fault all over the country. but the white house is saying we will slow fire intentions. our first call comes from larry and alabama. go ahead. caller: hello. i have a question is a covenant. chinast question, since is the biggest hacker in the country -- in the whole country, why is u.s. still giving him a chance. also, i would like to make my which is on president george w. bush junior. they shot down the cia plan. i collected a lot of data from , whenia when back in 2003 george junior wa
what is opm doing to make sure does not happen again? guest: the white house has launched what it calls a cyber sprint. very a breach of this we're going to bring in the resources of the federal government and we're going to try to identify vulnerabilities and fix those vulnerabilities in they have brought in super hackers to see if they can get into u.s. systems. if they can, what vulnerabilities are the using? the u.s. government is a very large thing to protect from a cyber point of view and...
58
58
Aug 18, 2015
08/15
by
BLOOMBERG
tv
eye 58
favorite 0
quote 0
opm was the juiciest targetable. -- target of all.nal information the results of the investigative reports and 1.1 million fingerprints for intelligence operatives around the world. we real issue here is that are dealing with a situation where government just has not -- we cannot get the senate to pass a cyber security law. they can't even agree on what privacy should be. this is the real crux of the problem. there have been so many breaches, over one million -- one billion files. know.t: that we adam: that we know about. that have already been breached or exposed. the data is there. in the case of this database, they did not do some heavily sophisticated thing that caused them to crawl into systems. they walked through the front door using data that had been collected from all the other breaches. anthem,r alone, we had premier, carefirst, opm come over 100 million social security numbers. add to that all the information on social networking sites. scarlet: one domino falling on another -- companies and governments are behind in trek
opm was the juiciest targetable. -- target of all.nal information the results of the investigative reports and 1.1 million fingerprints for intelligence operatives around the world. we real issue here is that are dealing with a situation where government just has not -- we cannot get the senate to pass a cyber security law. they can't even agree on what privacy should be. this is the real crux of the problem. there have been so many breaches, over one million -- one billion files. know.t: that...
286
286
Aug 11, 2015
08/15
by
KSTS
tv
eye 286
favorite 0
quote 0
. --- y s c opm e co mu nica ba con se Ñas >>> hay ar re sto s y v iol enc ias y t ras u n ti roe o teo seguian la lucha por encontrar a los desaparecidos.ard >>> arden las redes por una foto y el ch"chapo" guzmÁn en l r carca carelcÁrcel de maxima segurid e segÚn documentos que telemundo o obotuvo en esclusixclusival o convirtiÓ el altiplano en su centro de oepraciperaciones. >> detvamos con los detalles. >> todos los detalles se desp n desprenden de estos dctoocumenty compartiÓ unicamÚnicamente co o nosotrosos dctocumentos y u aunque llevamos ocho dÍas pi e pidiendo las respuestas y que o nos digan si son autentiÉnticoso se han negado a hacerlos. >> mÁs que un preso joaquÍn el "chapo" guzmÁn eera un huesped de la carÁrcel del altiplano, de al compartir con nosotros el p expediente de su fuga . >> pareciera que no era mÁs que un hotel. >> en su testimonmiio josÉ dani uno de los dos guardias desti destinados a observar sus movi i movimiento y cada dos horas r o reportaba lo que hacÍa y desde el momento que se levantaba e atendÍa visitas y recibÍa cl clases de pintura, clases de i sicol
. --- y s c opm e co mu nica ba con se Ñas >>> hay ar re sto s y v iol enc ias y t ras u n ti roe o teo seguian la lucha por encontrar a los desaparecidos.ard >>> arden las redes por una foto y el ch"chapo" guzmÁn en l r carca carelcÁrcel de maxima segurid e segÚn documentos que telemundo o obotuvo en esclusixclusival o convirtiÓ el altiplano en su centro de oepraciperaciones. >> detvamos con los detalles. >> todos los detalles se desp n desprenden...
89
89
Aug 4, 2015
08/15
by
CSPAN3
tv
eye 89
favorite 0
quote 0
i don't know what we will do against chinese because of opm. no idea. i don't hear in the rhetoric of the president a commitment to actually win. i think we need to send a message, we're the united states of america and whether you hit us us with cannon balls or miss missiles or cyber attacks our goal is to win the in cyber war as we 1 i think in missiles and won in cannon balls. it's a commitment at that level before we get into exactly how we do it on a technical level and how we reorient the u.s. government on an institutional level in order to do so. >> mark. >> i also think there's measurable goalposts along the way. for example when we hit this turning point in the 20 year trend ticks down what is going to actually happen? if we say what will happen on the pla side or china side, unit 61398, all of a sudden, all the millions of agents they're watch watching on their screens and monitoring, go dark. that's actionable. when that happens you know what we will see? we will see that unit freak out. we will see them go back in the drawing board and work
i don't know what we will do against chinese because of opm. no idea. i don't hear in the rhetoric of the president a commitment to actually win. i think we need to send a message, we're the united states of america and whether you hit us us with cannon balls or miss missiles or cyber attacks our goal is to win the in cyber war as we 1 i think in missiles and won in cannon balls. it's a commitment at that level before we get into exactly how we do it on a technical level and how we reorient the...
56
56
Aug 13, 2015
08/15
by
CSPAN2
tv
eye 56
favorite 0
quote 0
who set up opm and what are we going to do about it? >> post sony, now an executive order in place that allows the use of sanctions for a broader set of actors. we've also talked about the idea designating certain entities under the commerce department regulation who can do business inside the united states. we need to continue to look across the full range of legal authorities to see what we can do to increase the cost when we have high confidence of who did a specific intrusion. while i'm not going to talk about opm, what i will say is i strongly believe in this approach and that we need to continue when we can do were to hold specific consequences and tell the actors here is why we are doing what we do because you did ask why you're seeing there will be a consequence. there will be pain induced as a result. >> we are talking about the office of personnel management, records and security clearance data was hacked and is described as one of the worst counterintelligence in american history. incredibly sensitive information for people w
who set up opm and what are we going to do about it? >> post sony, now an executive order in place that allows the use of sanctions for a broader set of actors. we've also talked about the idea designating certain entities under the commerce department regulation who can do business inside the united states. we need to continue to look across the full range of legal authorities to see what we can do to increase the cost when we have high confidence of who did a specific intrusion. while...
100
100
Aug 18, 2015
08/15
by
CSPAN2
tv
eye 100
favorite 0
quote 0
. >> so who did opm and what are they going to do about it? >> so going post sony cannot an executive order in place that allows the use of sanctions for a broader set of actors, and we talked about the idea of designating certain entities under the commerce department regulations we can do business inside the united states. we need to continue to look across the full range as lawyers of our legal authorities to see what can we do, increase the cost, when we have high confidence that they did a specific intrusion. while i'm not going to talk about opm specifically, what i will say is i strongly believe in this approach and that we need to continue when we can to work to hold specific consequences and tell the actors here's where we are doing what we're doing it is because you did x, y or z and will be a consequence, there will be pain induced as a result. >> we are taught about the office of personnel management, millions of records and security clearance of data that was hacked and is being described as one of the worst counterintelligence la
. >> so who did opm and what are they going to do about it? >> so going post sony cannot an executive order in place that allows the use of sanctions for a broader set of actors, and we talked about the idea of designating certain entities under the commerce department regulations we can do business inside the united states. we need to continue to look across the full range as lawyers of our legal authorities to see what can we do, increase the cost, when we have high confidence...
249
249
Aug 26, 2015
08/15
by
FOXNEWSW
tv
eye 249
favorite 0
quote 0
let ftc hammer the opm first. the ftc tells the grapevine under current law it does not have the authority to regulate government departments. >>> school is back or soon will be. and healthy lunches are creating unhealthy school finances, according to one study. the study from the nonprofit school nutritional association finds 58% of districts have lost lunch participants because of the new healthy standards championed by the first lady. and seven in ten say the standards have hurt the financial situation of the local meals programs with almost half choosing to reduce staffing. many district leaders applaud the program's goals butter from us but are frustrated in goals "we have the healthiest garbage." finally speaking of food, the chicken sandwich is fair use. at least in the legal sense. a u.s. court of appeals has rejected a copyright claim on the intellectual property rights for a fast food chicken sandwich. after a former employee try to claim royalties on his particular version of it. the judge was not buyin
let ftc hammer the opm first. the ftc tells the grapevine under current law it does not have the authority to regulate government departments. >>> school is back or soon will be. and healthy lunches are creating unhealthy school finances, according to one study. the study from the nonprofit school nutritional association finds 58% of districts have lost lunch participants because of the new healthy standards championed by the first lady. and seven in ten say the standards have hurt the...
61
61
Aug 4, 2015
08/15
by
CSPAN2
tv
eye 61
favorite 0
quote 0
i decided administration says they're going to tried to pay for the consequences of the opm act. i can't wait. i cannot wait to see what the heck that thing is. scantily i'm not too excited about what is going to be. we have not crossed the threshold everybody in a room to try to work through this problem. long answer to your question but i don't believe they have the right to go extraterritorial to protect what they perceive would be a threat at that point. >> that's fantastic. .. [inaudible conversations] [inaudible conversations] [inaudible conversations] >> we want to get you out in a relatively timely fashion so they can ask you all to reclaim your seat or somebody else's. so while we are getting our seats up, before he turned it over to the panelists for this discussion, i want to read a sharp aircraft. as an intellectual no man's land for military and political problems made. we have no tradition a systematic study in this area. the military profession has traditionally depreciated the importance of strategy where politics are important as compared to taxes. now we are fac
i decided administration says they're going to tried to pay for the consequences of the opm act. i can't wait. i cannot wait to see what the heck that thing is. scantily i'm not too excited about what is going to be. we have not crossed the threshold everybody in a room to try to work through this problem. long answer to your question but i don't believe they have the right to go extraterritorial to protect what they perceive would be a threat at that point. >> that's fantastic. .....
73
73
Aug 26, 2015
08/15
by
CSPAN2
tv
eye 73
favorite 0
quote 0
, i will put in a plug for next slideshow into which we talked about the opm stuff and trying to pull some lessons learned, not beat people up to take some lessons learned so to make these mistakes again. says the rebels want to comment on the cyber stuff? go ahead. >> the example of cars being hacked remotely, that's important remotely. that with any kind of break-ins. that's a pretty scary stuff the you look like it like so within a family room and do something with a mobile device and drive your car. really it comes down to a fundamental concept of design. so from a technical perspective, a lot of people, i hear a lot of people say we have experience of 40 years of cybersecurity. why can't we apply that to our cyber physical system? my responses you're absolutely right, you can apply that knowledge to cyber part of it, physical part is completely different ballgame. most importantly the interface between cyber and cisco has to be really fun. at the end of the day when i talk to my cybersecurity friends and say talk about the car thing, they should just put up better firewall. if yo
, i will put in a plug for next slideshow into which we talked about the opm stuff and trying to pull some lessons learned, not beat people up to take some lessons learned so to make these mistakes again. says the rebels want to comment on the cyber stuff? go ahead. >> the example of cars being hacked remotely, that's important remotely. that with any kind of break-ins. that's a pretty scary stuff the you look like it like so within a family room and do something with a mobile device and...
57
57
Aug 28, 2015
08/15
by
CSPAN2
tv
eye 57
favorite 0
quote 0
and we know from opm testimony that the hacker in opm stole passwords from a contractor and then they were allowed to have brute access to the system meaning they immediately got in and took over the entire network. well that is an unacceptable security practice that should never have been alloweded to happen. >> i would say is they asked specific technology questions and that should be an answer on the spot you answer. but the reality is an individual at the company is not specific and not raising the awareness bar you have to look back and see this isn't a technology problem. with you talk about fishing, not complicat complicated. but company's approach to fishing training is click the box do you have fishing training, yes. or they say we have behavior changing training. did you go through an actual fishing exercise with all of the employees? did they click on the link? learn from it? that is important. this isn't just a straight away specific granular with the secret sauce. it is that risk management approach. i think what is important is when based with questions like what would h
and we know from opm testimony that the hacker in opm stole passwords from a contractor and then they were allowed to have brute access to the system meaning they immediately got in and took over the entire network. well that is an unacceptable security practice that should never have been alloweded to happen. >> i would say is they asked specific technology questions and that should be an answer on the spot you answer. but the reality is an individual at the company is not specific and...
122
122
Aug 30, 2015
08/15
by
WJLA
tv
eye 122
favorite 0
quote 0
the army put together what is called opms 21. this is the right thing to do and we are going to implement it across our service. some of the changes should be done systemically and quickly. it is an ecosystem in the personnel world. to change one small part of it means you leave a lot undone. there are some areas of pilot programs and where tests, experiments should be done too. it's going to be a mix of those things. vago: there are some who are saying this kind of major reform you're proposing, which threatens s to break a lot of -- it is sort of a once in a decades evolution you are looking at. year of thest administration, your seven years into this now, there's a mood for change, pushing on an open door. on the other hand there are also challenges ahead. how much of this will you have to get relief -- legislative relief and how much of this can you do under your own existing authorities? do unders a lot we can our existing authorities, the department of defense regulations. we are changing the cultural practices in the servi
the army put together what is called opms 21. this is the right thing to do and we are going to implement it across our service. some of the changes should be done systemically and quickly. it is an ecosystem in the personnel world. to change one small part of it means you leave a lot undone. there are some areas of pilot programs and where tests, experiments should be done too. it's going to be a mix of those things. vago: there are some who are saying this kind of major reform you're...
86
86
Aug 25, 2015
08/15
by
CSPAN2
tv
eye 86
favorite 0
quote 0
managementspirit it just seems like different agencies like opm, they knew what data was important and it does feel like it was protected to the degree that at least from everything, i'm sort not going to put you in the position of commenting on opm. i will put in a plug for my next live show in two weeks were talking about the opm had, trying to pull some lessons learned. take some lessons learned that we to make these mistakes again. does anyone else want to comment on the cyberthreat? go ahead. >> the example of cars, hacked remotely, not with any kind of stronghold, not any kind of breaking. that's scary could sell. if you look at it like someone can sit in the family room into something with a mobile device, drive your car. really it comes down to fundamental concept of design. i will toggle the only tactical perspective. i hear a lot of people say we have experience of 40 years of cybersecurity. why can we apply that to our fiscal system? my responses you are absolutely right. applied this knowledge is to cyber part, but physical part is completely different ballgame. and most im
managementspirit it just seems like different agencies like opm, they knew what data was important and it does feel like it was protected to the degree that at least from everything, i'm sort not going to put you in the position of commenting on opm. i will put in a plug for my next live show in two weeks were talking about the opm had, trying to pull some lessons learned. take some lessons learned that we to make these mistakes again. does anyone else want to comment on the cyberthreat? go...
62
62
Aug 27, 2015
08/15
by
CSPAN2
tv
eye 62
favorite 0
quote 0
as is the background as a witness protection program all with the opm files that were hacked and as was confirmed mrs. clinton was from the chinese asking them to find out of those 20,000 emails. [laughter] [applause] but that creeping concern is what powers rand paul with his deep ethnic of creches service he goes on medical mission is to give free eye surgery he walks the walk and is the real deal. verizon the islamic state has eclipsed sun with his anti-interventionist talk. governor kerry was my guest today the most underestimated with rick santorum for scott walker said to be the past come up with a name for the future. watch out he has been around the track and has done this before he made mistakes and can improve the is not running after back surgery he does shoot coyotes and he is a texan and if not for them we would have negative job growth over the last six and a half years he will remind you of that into the key is really good. he has glasses just like mine. [laughter] marco rubio was described the hottest commodity the flavor of the month. hot white? f never seen a more gift
as is the background as a witness protection program all with the opm files that were hacked and as was confirmed mrs. clinton was from the chinese asking them to find out of those 20,000 emails. [laughter] [applause] but that creeping concern is what powers rand paul with his deep ethnic of creches service he goes on medical mission is to give free eye surgery he walks the walk and is the real deal. verizon the islamic state has eclipsed sun with his anti-interventionist talk. governor kerry...
151
151
tv
eye 151
favorite 0
quote 0
the job of fixing cybersecurity at the office of personnel management, opm. after chinese hackers stole the files of more than 22 million federal employees. >> this is a company that has a bad record, that has engaged in gross improprieties in the workplace. is this really the kind of corporate entity we want to turn to in a moment of crisis? >> reporter: apparently, the answer is yes. the company, once called jorge scientific, located in this office building in virginia, changed its name to imperatis after our abc news report and now continues to get huge government contracts. its new president, former marine major general mastin robeson, one of several former generals and admirals on the board, refused to see us. and we were turned away when we showed up at the office. is there anybody here who can talk to us? >> not at this time, no. >> you can change your name. you can change some personnel. but conduct is what matters here. >> reporter: the company says it agrees the behavior caught on tape was inappropriate and the employees have been fired, and says it
the job of fixing cybersecurity at the office of personnel management, opm. after chinese hackers stole the files of more than 22 million federal employees. >> this is a company that has a bad record, that has engaged in gross improprieties in the workplace. is this really the kind of corporate entity we want to turn to in a moment of crisis? >> reporter: apparently, the answer is yes. the company, once called jorge scientific, located in this office building in virginia, changed...
64
64
Aug 3, 2015
08/15
by
CSPAN2
tv
eye 64
favorite 0
quote 0
with the opm situation, for example, did they really need to take social security numbers for people who were just applying for jobs? and don't you really want to element -- to limit that to information that you really, really need? so that's one thing is we need to really think about minimizing the amount of personal
with the opm situation, for example, did they really need to take social security numbers for people who were just applying for jobs? and don't you really want to element -- to limit that to information that you really, really need? so that's one thing is we need to really think about minimizing the amount of personal
201
201
tv
eye 201
favorite 0
quote 0
these vulnerabilities for a long time, we have repeated assaults and repeated pep -- penetrations, opm, millions of file, two attacks that have been publicized now about russia. this is our problem to solve, congress has legislation it will not act on and ash carter defense secretary is frustrated because he cannot marshall cooperations from the pr private sector. tom: i would love to pick on government, butonestly it is -- honest 3 it is private corporation as well, does not seem like we're up to defending ourselveses in tech area. >> well, th government's responsibility to figure that out, i hope people hit hillary on this more. she is sending classify e-mail from her personal e-mail that does not help with security. it important think about it these are couple times we found it there have been quite a few. think about all of the times we have not found it. if you find something it probably happened more. tom: jessica we barely have this story, and alreadier with relating it to hill re' to -- hs e-mail. >> one of us is. tom: how does she know. >> what hillary clinton did in so far as
these vulnerabilities for a long time, we have repeated assaults and repeated pep -- penetrations, opm, millions of file, two attacks that have been publicized now about russia. this is our problem to solve, congress has legislation it will not act on and ash carter defense secretary is frustrated because he cannot marshall cooperations from the pr private sector. tom: i would love to pick on government, butonestly it is -- honest 3 it is private corporation as well, does not seem like we're up...
351
351
Aug 17, 2015
08/15
by
FOXNEWSW
tv
eye 351
favorite 0
quote 0
saul the office of personnel management or the opm hacked where background checks and clearances wereen. irs, time and time again, we're seeing a lot of these large scale breaches and the federal government is way behind. even the commercial sector which is also being prepared right now. >> these attackers used an application provided by the irs. that's unnerving because before we heard they make sure you have a secure password, but any business out there is going have tontr)Ñhiy offers to -- apps, de things to invite people into their site so they can acouple late data but becomes a two-way street. >> it does and that's what;xv>j9 happened here with the irs. they can use personal information from individual they're able to get from i'm places. your first pet's name? or birth debts, things that are readily available, to get that information. the problem is if you look at every 600,000 accounts. they were successful in half of those. that's a very alarming statistic, which means they were easily guessable, little to know security and able to brute force their way into these systems to
saul the office of personnel management or the opm hacked where background checks and clearances wereen. irs, time and time again, we're seeing a lot of these large scale breaches and the federal government is way behind. even the commercial sector which is also being prepared right now. >> these attackers used an application provided by the irs. that's unnerving because before we heard they make sure you have a secure password, but any business out there is going have tontr)Ñhiy offers...
109
109
Aug 22, 2015
08/15
by
CNNW
tv
eye 109
favorite 0
quote 0
so with the opm hacks and the other ones, t difficult to go through them because they're coming from lot of the times it's difficult to find the folks let alone go after them from a legal stand standpoint. it's just the waive of the future. >> okay. so is this the end of the website business, joey? >> well, it maybe and here is why i say that. now you know the lawsuits are coming and there are two critical questions. will the lawsuits come and how many. >> there's a certain admission that comes with that. >> you can file under seal. that's number one. you can ask the government to say that you're ano, ma'amo-- ae of lutds there's a problem that you have the website that's operating and has customers in 46 different countries sochlt the secure volume could bankrupt it, and then when you get to the defending of the claims and merits, you don't have to talk about the damages that this can have on people. will it survive, that's the open question and there are many legal problems in the future. >> so david is it in your view just a given that the information that was retrieved they're go
so with the opm hacks and the other ones, t difficult to go through them because they're coming from lot of the times it's difficult to find the folks let alone go after them from a legal stand standpoint. it's just the waive of the future. >> okay. so is this the end of the website business, joey? >> well, it maybe and here is why i say that. now you know the lawsuits are coming and there are two critical questions. will the lawsuits come and how many. >> there's a certain...
257
257
Aug 10, 2015
08/15
by
FOXNEWSW
tv
eye 257
favorite 0
quote 0
nothing better than opm. >> other people's. >> yep. >> hand me the checkbook. i'm going to write donald trump a $200 check. stop drinking. >> you don't ask. you don't ask. you don't even ask for the checkbook. when no one is minding the checkbook, you just tear a couple out, fold them over, that's it. >> i'm mailing donald trump money? he just told me how rich he is. >> marco rubio did really well. he also has a lot of money already. >> remember, he was the first to get into the race, so he's been at it for a while. i think the thing that also helped him is that the consensus at the end of the debate was that he had probably done the best out of everybody, and that kind of word of mouth really helps with your established fundraisers. okay, so he's working at it. this is a good return on my investment. maybe i'll give him some more, so we can call him back. >> i wonder why he didn't get a bigger bump in the polls. >> i just think there's too many of them. >> i have a feeling this is not a good composite. >> nbc? >> yes. >> it was online. it was friday night. >>
nothing better than opm. >> other people's. >> yep. >> hand me the checkbook. i'm going to write donald trump a $200 check. stop drinking. >> you don't ask. you don't ask. you don't even ask for the checkbook. when no one is minding the checkbook, you just tear a couple out, fold them over, that's it. >> i'm mailing donald trump money? he just told me how rich he is. >> marco rubio did really well. he also has a lot of money already. >> remember, he was...
126
126
Aug 1, 2015
08/15
by
FOXNEWSW
tv
eye 126
favorite 0
quote 0
item number two, the latest on the opm data breach.he administration has not budged on the 22 million people affected by the breach. there's something new that's come to light. millions of fingerprints have been obtained. that's troubling. >> i just heard i was a member of the breach which i didn't know because i haven't worked there for 35 years but i was a referee. so the net here is extremely wide and i'm waiting to be hacked or blackmailed. >> kerstin? >> well you know think i one of the things, there's a lost criticism now that the obama administration isn't going after china on this basically blaming china, even though they know it was china. i think that the reason they can't do that is because we're doing the same thing to china. are sort of speculating this is weakness on the part of the obama administration. edward snowden in his leaked documents, you know, leaked that we were doing the exact sang them. we were actually getting personal information or chinese people. >> kerstin makes a good point. hold your cyber fire until i
item number two, the latest on the opm data breach.he administration has not budged on the 22 million people affected by the breach. there's something new that's come to light. millions of fingerprints have been obtained. that's troubling. >> i just heard i was a member of the breach which i didn't know because i haven't worked there for 35 years but i was a referee. so the net here is extremely wide and i'm waiting to be hacked or blackmailed. >> kerstin? >> well you know...
112
112
Aug 3, 2015
08/15
by
FOXNEWSW
tv
eye 112
favorite 0
quote 0
the first thing i wouldn't have done is we are going to have a retalitory, over the opm in the new york times and not source it. what this points to is a lafk policy on the cyber security issue and also, strikes me that the administration may be testing the water by floating. this it is not the way to go. >> what is the way to go? >> look, the administration has 3 or 4 options and there is diplomatic and expelling a spy or diplomat. and there is judicial prosecutions which is really a show boat way through it. and the final way is escalating the cyber security battle with china and i don't know if the administration wants to go down that path given how vulnerable our infrainstruction is proven. i think our viewers, i can see it going both ways. retaliation against someone that harmed you. retaliate. and on the other side. i am not sure, i want more hack attacks to come and i don't want my credit card to stop working and everything else. what is the smart way forward. do we need to call them out or do something? >> that's the 21.5 million person question here, jenna. and what the united
the first thing i wouldn't have done is we are going to have a retalitory, over the opm in the new york times and not source it. what this points to is a lafk policy on the cyber security issue and also, strikes me that the administration may be testing the water by floating. this it is not the way to go. >> what is the way to go? >> look, the administration has 3 or 4 options and there is diplomatic and expelling a spy or diplomat. and there is judicial prosecutions which is really...
52
52
Aug 11, 2015
08/15
by
FBC
tv
eye 52
favorite 0
quote 0
. >> that gets back to the incompetence issue too, you can look at the opm breaches, the national security interests damaged then. >> that's not congress' responsibility. >> it's going to be hard for democrats to talk themselves out of this. no matter which way they turn -- >> big, big news, two of the e-mails from hillary clinton have been deemed top secret, and more to come. this is certainly damning information, damning news, we'll talk more about it. at home, say thanks a lot and don't miss our show. tomorrow night we have a special guest, republican candidate dr. ben carson who actually said he didn't think she would be the nominee. who knew? lou dobbs next. lou: good evening, everybody. i'm lou dobbs. ferguson, missouri racked by heightened tensions between law enforcement and demonstrators and activists and racial unrest in the community. more protests and more demonstrations and more violence overnight. at least 23 people were arrested. protesters threw rocks and frozen water bottles in police in the latest round of clashes and attacks against law enforcement. >>> president obama h
. >> that gets back to the incompetence issue too, you can look at the opm breaches, the national security interests damaged then. >> that's not congress' responsibility. >> it's going to be hard for democrats to talk themselves out of this. no matter which way they turn -- >> big, big news, two of the e-mails from hillary clinton have been deemed top secret, and more to come. this is certainly damning information, damning news, we'll talk more about it. at home, say...
75
75
Aug 31, 2015
08/15
by
FBC
tv
eye 75
favorite 0
quote 0
story is that dick cheney, for example, is now saying -- he was asked, well, china has, you know, the opm, meaning per personnel records. so they must have hillary's e-mails. i think the backdrops for the voter is should they care right now about this hillary clinton e-mail saga or is it a hit to her credibility? >> of course. it's the first word that they're embedding getting in these polls when you identify hillary clinton. it's liar. that's not a good word to be associated with when you're running for the united states presidency. you have a situation right now where there are and have been two different types of rules, standards for the clintons. one for them and one for everybody else. and as a former senator or someone who served 35 years in the military, the last four at the pentagon, i can tell you that we get daily briefings on safety and security, whether it's cyber security, physical security or knowing where we are and the things that we do publicly and privately. so they knew, she knew, she's the head of the state department, folks, she knows. she knew this stuff and for her
story is that dick cheney, for example, is now saying -- he was asked, well, china has, you know, the opm, meaning per personnel records. so they must have hillary's e-mails. i think the backdrops for the voter is should they care right now about this hillary clinton e-mail saga or is it a hit to her credibility? >> of course. it's the first word that they're embedding getting in these polls when you identify hillary clinton. it's liar. that's not a good word to be associated with when...
67
67
Aug 7, 2015
08/15
by
CSPAN3
tv
eye 67
favorite 0
quote 0
government, and i'm not talking about the opm hack. this is highly classified, but it was our cyber watch standers that were able to kill that spear phishing attempt before it even reached our recipients. had those recipients opened it, we would have had to take them off the net, and it's no coincidence that many of the targeted recipients were very senior officers in the coast guard. fortunately, they can't spell zukunft, so they couldn't get my e-mail. i said there's some advantage to having a name you can't spell or pronounce. but we're very active in the cyber domain as well. i released a cyber strategy and we pushed it out last fall and industry is now coming to us. we regulate the maritime industry and post-9/11 probably one of the most sweeping pieces of legislation was the maritime transportation security act of 2002. and it required vessels and it required our maritime facilities recognizing that 90% of our global trade moves by sea, that they needed to implement safeguards, physical security at their facilities, so they've do
government, and i'm not talking about the opm hack. this is highly classified, but it was our cyber watch standers that were able to kill that spear phishing attempt before it even reached our recipients. had those recipients opened it, we would have had to take them off the net, and it's no coincidence that many of the targeted recipients were very senior officers in the coast guard. fortunately, they can't spell zukunft, so they couldn't get my e-mail. i said there's some advantage to having...
32
32
Aug 27, 2015
08/15
by
CSPAN2
tv
eye 32
favorite 0
quote 0
that's things like a census, the postal service, gsa, real property, opm, omb, and the list goes on. a lot of these overarching government activities, federal i.t. but on homeland see the space we had about 20 hearings, and almost half of those have been on the border security immigration well. my boss you here i am talk about force multiplier's. that's basically the technology, equipment, the types of assets that help our men and women on the ground to their job more effectively things like arrows that, surveillance equipment, mobile surveillance powers, biometric devices. all those types of devices that just multiply the efforts of our folks on the ground. but beyond that, my boss will talk a lot about not only addressing symptoms of problems but the root causes. so we think about immigration and border security, incident issues we're dealing with, the root causes are you can trace back to most cases of central america with the miner mine is r coming over and a lot of adults as well. it gets the issues of lack of security and economic opportunity and overall just hope for this coun
that's things like a census, the postal service, gsa, real property, opm, omb, and the list goes on. a lot of these overarching government activities, federal i.t. but on homeland see the space we had about 20 hearings, and almost half of those have been on the border security immigration well. my boss you here i am talk about force multiplier's. that's basically the technology, equipment, the types of assets that help our men and women on the ground to their job more effectively things like...
118
118
Aug 10, 2015
08/15
by
FBC
tv
eye 118
favorite 0
quote 0
worrying about the chinese, indicated in the opm, the office of personnel management hack, we will see russians doing similar things. we expect that activity to increase in the next year or two. deirdre: makes all the sense in the world. thank you so much, colonel cedric layton, joining us there. >>> when we come back, harvard even hard irto get into than ever. the acceptance rate at a record low, 5.3%. one startup cracked the language code for your kid's essays. we'll give you the short list of words to use, if your son or daughter wants to go there. >>> first, former presidential candidate known pot stirrer, ralph nader says billionaire mogul donald trump is more progressive than most conservatives. hear in what context and why he said it next. ♪ we live in a world of mobile technology, but it is not the device that is mobile, it is you. to breathe with copd?ow hard it can be it can feel like this. copd includes chronic bronchitis and emphysema. spiriva is a once-daily inhaled copd maintenance treatment that helps open my airways for a full 24 hours. spiriva helps me breathe easier.
worrying about the chinese, indicated in the opm, the office of personnel management hack, we will see russians doing similar things. we expect that activity to increase in the next year or two. deirdre: makes all the sense in the world. thank you so much, colonel cedric layton, joining us there. >>> when we come back, harvard even hard irto get into than ever. the acceptance rate at a record low, 5.3%. one startup cracked the language code for your kid's essays. we'll give you the...
503
503
Aug 11, 2015
08/15
by
KSTS
tv
eye 503
favorite 0
quote 0
. --- y s c opm e co mu nica ba con se Ñas >>>
. --- y s c opm e co mu nica ba con se Ñas >>>
56
56
Aug 4, 2015
08/15
by
CSPAN3
tv
eye 56
favorite 0
quote 0
certainly opm. lots of really detailed personal information. why would they do that? >> 85% of all the success rate of a chinese penetration of your network comes from a fishing e-mail. imagine the e-mail i can create if i know everything about you for the last 10 years. and i mean everything. and i also know the last time you went to the doctor and exactly what you had done at the doctor and what your billing status is. imagine that e-mail that says last week you had your knee looked at. i think i screwed up on the billing cycle. would you verify this was your x-ray and not that guy. yeah. i was there. the e-mail came from my doctor. at least it looks like it came from my doctor. i click on it. they're in. 85% of the chinese success rate. they just increased their target by 53%. i'm not the smartest guy in the room. but in the fbi we would call that a clue. we've got problems approximate brewing. i appreciate the discussion and thanks for including me. >> that's fantastic. we have about 15 minutes or so to really open up for questions focusing on the evolving threat.
certainly opm. lots of really detailed personal information. why would they do that? >> 85% of all the success rate of a chinese penetration of your network comes from a fishing e-mail. imagine the e-mail i can create if i know everything about you for the last 10 years. and i mean everything. and i also know the last time you went to the doctor and exactly what you had done at the doctor and what your billing status is. imagine that e-mail that says last week you had your knee looked at....
40
40
Aug 6, 2015
08/15
by
CSPAN2
tv
eye 40
favorite 0
quote 0
. >> let me speak to the opm situation. is there a technical solution down the road?if we secure our own data we secure from ourselves don't we? >> absolutely. this is where, for example, we are inventing heavily at the intel level and analytics capabilities in silicon so you can actually process larger and larger amounts of information faster. like, for example, a little over a year or so ago intel did a big partnership with pashtun made a huge investment which is a distribution provider. we are literally working close with companies in order to be able to accelerate all the analytics, capabilities they want to make available in the data center. that's a big area of focus is enabling ourselves to process large amounts of data more quickly so you can say i want to overlay encryption on that data can still shoot at getting the same on the same day the i do it at a lower cost. that is something that into a most of our partners are investing heavily in. >> suzanne, what do you do to prevent opm kind of situations with the information? we have at this 86 ashton kutcher pr
. >> let me speak to the opm situation. is there a technical solution down the road?if we secure our own data we secure from ourselves don't we? >> absolutely. this is where, for example, we are inventing heavily at the intel level and analytics capabilities in silicon so you can actually process larger and larger amounts of information faster. like, for example, a little over a year or so ago intel did a big partnership with pashtun made a huge investment which is a distribution...
86
86
Aug 6, 2015
08/15
by
CSPAN3
tv
eye 86
favorite 0
quote 1
i just saw that the administration says they're going to make china pay for the consequence of the opm hack. i can't wait. i cannot wait to see what the heck that thing is. and candidly i'm not too excited about what it's going to be. we haven't crossed that threshold to bring everybody in a room and try to work through this problem. i would -- long answer to your question, but i don't believe they have the right to go extraterritorial to protect what they perceive to be a threat at that point. >> that's fantastic. thank you, thank you so much. we can get a hand for the speakers. that's just great. you can see how we can make many hours speaking about that. but we'll roll into the next panel. capabilities needs to protect and defend in a cyber enabled economics world. so this played perfectly into that. thank you, thank you. >>> we want to get you out in a relatively timely fashion. if we can ask you all to reclaim your seat or somebody else's. so while we're getting our seats, before i turn it over to the panelists for this discussion, i want to read a very short paragraph. there's an
i just saw that the administration says they're going to make china pay for the consequence of the opm hack. i can't wait. i cannot wait to see what the heck that thing is. and candidly i'm not too excited about what it's going to be. we haven't crossed that threshold to bring everybody in a room and try to work through this problem. i would -- long answer to your question, but i don't believe they have the right to go extraterritorial to protect what they perceive to be a threat at that point....
114
114
Aug 10, 2015
08/15
by
CSPAN3
tv
eye 114
favorite 0
quote 0
. >> to speak to the opm situation, one of the problems with encrypting your data, you can't search it. is there a technical solution down the road to that, chris? if we secure our own data, we secure it from ourselves, don't we? >> absolutely. this is where, for example, we're investing heavily, for example, at the intel level in anl lit ticks capabilities in silicon. you can process larger and larger amounts of information faster. for example, just stay little built over a year or so ago, year and a half ago, intel did a big partnership with cloud arrow, one of the distribution providers out there. we're literally working closely with companies like cloud arrow to accelerate all of the analytics they want to make available in the data center. to enable ourselves to process large amounts of data more quakelquake quickly, you can still shoot at getting the same performance on the same amount of data but do it at a lower cost. that is something that intel and most of our partners are investing very heavily in. >> suzanne, short of that, what do you do positive prevent opm situations --
. >> to speak to the opm situation, one of the problems with encrypting your data, you can't search it. is there a technical solution down the road to that, chris? if we secure our own data, we secure it from ourselves, don't we? >> absolutely. this is where, for example, we're investing heavily, for example, at the intel level in anl lit ticks capabilities in silicon. you can process larger and larger amounts of information faster. for example, just stay little built over a year or...
51
51
Aug 4, 2015
08/15
by
CSPAN3
tv
eye 51
favorite 0
quote 0
i don't know what we will do against chinese because of opm. no idea. i don't hear in the rhetoric of the president a commitment to actually win. i think we need to send a message, we're the united states of america and whether you hit us us with cannon balls or missiles or cyber attacks, our retaliation is fearsome and our goal is to win in the cyber world as we won i think, in missiles, and we won in cannonballs. it's a commitment at that level before we get into exactly how we do it on a technical level and how we reorient the u.s. government on an institutional and a doctrinal level in order to do so. >> mark. >> i also think there's measurable goalposts along the way. for example when we hit this turning point in the 20 year trend ticks down, what is going to actually happen? if we say what will happen on the pla side or china side, unit 61398, all of a sudden, all the millions of agents they're watching on their screens and monitoring, go dark. that's actionable. when that happens you know what we will see? we will see that unit freak out. we will
i don't know what we will do against chinese because of opm. no idea. i don't hear in the rhetoric of the president a commitment to actually win. i think we need to send a message, we're the united states of america and whether you hit us us with cannon balls or missiles or cyber attacks, our retaliation is fearsome and our goal is to win in the cyber world as we won i think, in missiles, and we won in cannonballs. it's a commitment at that level before we get into exactly how we do it on a...
85
85
Aug 15, 2015
08/15
by
CNNW
tv
eye 85
favorite 0
quote 0
server that was established by the secret service first for president clinton is less secure than the opmce that was hack and the white house server that was hack and anybody who watches who beliefs that the white house server is more secure than the clinton's, and not many people out there who agree with that, j joe. >> and thank you, gentlemen. >> thank you. >> you're welcome. >> and up next, after a short break, jesse "the body" ventura, and he took on the american sniper and won big. it is a fascinating story, and i will tell you why some of america's biggest news outlets are now lining up against him. while every business is unique, everyone is looking for ways to cut expenses. and that's where pg&e's online business energy checkup tool can really help. you can use it to track your actual energy use. find rebates that make equipment upgrades more affordable. even develop a customized energy plan for your company. think of it as a way to take more control over your operating costs. and yet another energy saving opportunity from pg&e. find new ways to save energy and money with pg&e's
server that was established by the secret service first for president clinton is less secure than the opmce that was hack and the white house server that was hack and anybody who watches who beliefs that the white house server is more secure than the clinton's, and not many people out there who agree with that, j joe. >> and thank you, gentlemen. >> thank you. >> you're welcome. >> and up next, after a short break, jesse "the body" ventura, and he took on the...
111
111
Aug 15, 2015
08/15
by
CNNW
tv
eye 111
favorite 0
quote 0
server that was established by the secret service first for president clinton is less secure than the opmervice that was hacked, the white house server that was hacked. anybody who watches who beliefs that the white house server is more secure than the clinton's, and not many people out there who agree with that, joe. >> thank you, gentlemen. >> thank you. >> you're welcome. >>> and up next, after a short break, jesse "the body" ventura, the governor took on the "american sniper" in court and won big. it is a fascinating story, and i will tell you why some of america's biggest news outlets are now lining up against him. ♪ hp instant ink can save you up to 50% on ink delivered to your door, so print all you want and never run out. plans start at $2.99 a month. right now, buy an eligible printer, and get three months of free ink with hp instant ink. available at participating retailers. the most affordable way to print. hp instant ink. the uncertainties i don't wantof hep c.with or wonder... ...whether i should seek treatment. i am ready. because today there's harvoni. a revolutionary treat
server that was established by the secret service first for president clinton is less secure than the opmervice that was hacked, the white house server that was hacked. anybody who watches who beliefs that the white house server is more secure than the clinton's, and not many people out there who agree with that, joe. >> thank you, gentlemen. >> thank you. >> you're welcome. >>> and up next, after a short break, jesse "the body" ventura, the governor took on...
190
190
Aug 2, 2015
08/15
by
CSPAN
tv
eye 190
favorite 0
quote 0
not long ago, the united states discovered that we had had a data breach at opm. simple. data personnel records had been tapped into. so, that's just laying the groundwork of where i'm going next. secretary carter and secretary moniz, i am very concerned regarding the government's ability to did tech and prevent -- detect and prevent cyber attacks on our government. with regards to james clapper around has conducted cyber attacks on u.s. officials hacking which compromised the marine corps internet, sans las vegas casino, and attacks against u.s. banks. these attacks along with recent successful attacks against opm leads me to have less than full confidence of our own super -- cyber capabilities, let alone the cyber capabilities at the iaea. it is vital iaea has a lock tied ability to protected's equipment and technology, vital to ensuring effective monitoring of iranian facilities under this agreement against cyber attacks. simple yes or no, secretary carter. are you concerned regarding iran's ability to impact the effectiveness of iaea monitoring equipment through cyber
not long ago, the united states discovered that we had had a data breach at opm. simple. data personnel records had been tapped into. so, that's just laying the groundwork of where i'm going next. secretary carter and secretary moniz, i am very concerned regarding the government's ability to did tech and prevent -- detect and prevent cyber attacks on our government. with regards to james clapper around has conducted cyber attacks on u.s. officials hacking which compromised the marine corps...
115
115
Aug 7, 2015
08/15
by
CNBC
tv
eye 115
favorite 0
quote 0
i think it's becoming clear that whether it is ashley madison, the pentagon, opm, credit card breachesving more than a breach a day and it is mainstream news. one of the ways we like to put this is, with cyber security, attacking is really, really easy. defending is really, really hard. over the last few years we tried to tell the government that while we might take solace that the same is true for our enemies, we forget that we have much, much more to lose. we like to phrase it that our dependence on technology is growing much faster than our security. i'm here in vegas for the largest hackers conference in the world. in the last few days alone we've seen hacks of several automobiles that could risk life and limb. we've seen hacks of medical devices. an entirely industrial controls village. these are the wake-up calls that we need to realize we are way behind. we have a public health issue with really terrible cyber hygiene. >> you get to talk to hackers, josh. take us inside their minds. is this -- are these people that maybe just want to go in and poke around a little bit to see if,
i think it's becoming clear that whether it is ashley madison, the pentagon, opm, credit card breachesving more than a breach a day and it is mainstream news. one of the ways we like to put this is, with cyber security, attacking is really, really easy. defending is really, really hard. over the last few years we tried to tell the government that while we might take solace that the same is true for our enemies, we forget that we have much, much more to lose. we like to phrase it that our...
41
41
Aug 4, 2015
08/15
by
CSPAN3
tv
eye 41
favorite 0
quote 0
whether it's at opm or in other systems around the world where small or relatively weak actors can gain access to prized you have seen d dot attacks. you have seen malware begin to evolve in pretty dramatic and important ways. in particular, attacking the sector. and trojan horse attacks which may pore tend malware attacks. these are not just hypotheticals. we have begun to see them. the jpmorgan attack last summer. a good example of the potential for vulnerability as well as destruction. the dark seoul attack. the denial of service attacks led by the iranians and syrians against western banks, which continue to this day. the gaos attack in 2012. nasdaq hack, which has not been fully determined or figured out in october 2010. >> matched with significant infrastructure attacks like ramco and other. portend a real series of attacks on a financial system in a way that is systemic and important. now, let me just move very quickly to discuss why the financial system, and in particular banks, have become such an interesting and important part of this landscape. as i have often said, in many w
whether it's at opm or in other systems around the world where small or relatively weak actors can gain access to prized you have seen d dot attacks. you have seen malware begin to evolve in pretty dramatic and important ways. in particular, attacking the sector. and trojan horse attacks which may pore tend malware attacks. these are not just hypotheticals. we have begun to see them. the jpmorgan attack last summer. a good example of the potential for vulnerability as well as destruction. the...
54
54
Aug 6, 2015
08/15
by
CSPAN3
tv
eye 54
favorite 0
quote 0
and there's weak defenses globally, whether it's at opm, or in other systems around the world where small or relatively weak actors can gain access to prized information. and so you have a spectrum of actors with a spectrum of capabilities that provides a low barrier to entry. and begins to challenge the u.s. system and dependencies. now, the tools of disruption, and potentially even destruction are many fold. you have spear phishing techniques and attacks, which are common in the cybersecurity space. you've seen d-dos attacks, increase in sophistication and frequency. you've seen malware evolve into some pretty dramatic and important ways, in particular, attacking the financial sector. you've seen trojan horse attacks, which may portend potential destructive malware attacks. these aren't imagining or hypotheticals, we've begun to see them. the jpmorgan attack last summer. a good example of the potential for vulnerability as well as destruction. the dark seoul attack led by the north koreans affecting south korean banks and operations. the denial of service attacks led by the iranians and
and there's weak defenses globally, whether it's at opm, or in other systems around the world where small or relatively weak actors can gain access to prized information. and so you have a spectrum of actors with a spectrum of capabilities that provides a low barrier to entry. and begins to challenge the u.s. system and dependencies. now, the tools of disruption, and potentially even destruction are many fold. you have spear phishing techniques and attacks, which are common in the cybersecurity...
67
67
Aug 4, 2015
08/15
by
CSPAN
tv
eye 67
favorite 0
quote 0
they don't opm as a result of it. i am not support any additional intoxicants be legalized. for this loan purposes, if a vendor went through the process and it was designed to be used as medicine, that would be something that i would be four. senator rubio: what would your policy be for undocumented aliens? an issueubio: this is that everyone agrees that we have to fix. in one piecefixed of legislation. they want to see more euros. this over 40% of the people in this country illegally entered legally. that's why we need an electronic revocation system that employers must comply with or they will be buying the that or they will be fined. that is the key that unless the ability to make progress on anything else when it comes to immigration. once we have done that, the -- we do so on the basis of whether or not they had a relative you. we cannot afford to do it that way anymore. in the 21st situation, legal immigration must be based on as opposed to living in america. once we had those things, there is a reasonable way to address the fact that 12 million people living in this c
they don't opm as a result of it. i am not support any additional intoxicants be legalized. for this loan purposes, if a vendor went through the process and it was designed to be used as medicine, that would be something that i would be four. senator rubio: what would your policy be for undocumented aliens? an issueubio: this is that everyone agrees that we have to fix. in one piecefixed of legislation. they want to see more euros. this over 40% of the people in this country illegally entered...
1,027
1.0K
Aug 31, 2015
08/15
by
KQED
tv
eye 1,027
favorite 0
quote 0
well now because chain that was behind the opm data breach that was able to dig in to the security clearancees, they now know and can cross index information on people's travel records, people's health care records and whether they have security clearance. >> and compromised in this case means do we know how it was the information given to these scientists or presented to them? >> intelligence officials say that they have evidence that china has this information is using it, we don't know exactly how they are using it. and in the espionage world spy agencies try to hide their tracks, so they won't necessarily detain or hold on to an individual. one warning was given out to government officials, for example, was if you're at an airport someone approaches you they seem to have a lot in common with you, be very weary of that sort of these soft at advances is what the intelligence community is talking about. >> authorities telling you that suspect this is happening in other cases, that there are other compromises? >> yes. they're very concerned about that. particularly concerned about the russia
well now because chain that was behind the opm data breach that was able to dig in to the security clearancees, they now know and can cross index information on people's travel records, people's health care records and whether they have security clearance. >> and compromised in this case means do we know how it was the information given to these scientists or presented to them? >> intelligence officials say that they have evidence that china has this information is using it, we...
41
41
Aug 7, 2015
08/15
by
CSPAN3
tv
eye 41
favorite 0
quote 0
and there's weak defenses globally, whether it's at opm, or in other systems around the world where small or relatively weak actors can gain access to prized information. and so you have a spectrum of actors with a spectrum of capabilities that provides a low barrier to entry. and begins to challenge the u.s. system and dependencies. now, the tools of disruption, and potentially even destruction are many fold. you have spear phishing techniques and attacks, which are common in the cybersecurity space. you've seen d-dos attacks, increase in sophistication and frequency. you've seen malware evolve into some pretty dramatic and important ways, in particular, attacking the financial sector. you've seen trojan horse attacks, which may portend potential destructive malware attacks. these aren't imagining or hypotheticals, we've begun to see them. the jpmorgan attack last summer. a good example of the potential for vulnerability as well as destruction. the dark seoul attack led by the north koreans affecting south korean banks and operations. the denial of service attacks led by the iranians and
and there's weak defenses globally, whether it's at opm, or in other systems around the world where small or relatively weak actors can gain access to prized information. and so you have a spectrum of actors with a spectrum of capabilities that provides a low barrier to entry. and begins to challenge the u.s. system and dependencies. now, the tools of disruption, and potentially even destruction are many fold. you have spear phishing techniques and attacks, which are common in the cybersecurity...
55
55
Aug 11, 2015
08/15
by
CSPAN2
tv
eye 55
favorite 0
quote 0
i'm not talking about the opm act. this is highly classified. it was our cyber watch standards that were able to kill that spear phishing attempt before it even reached our recipients. had those recipients opened it we would have had to take them off the net. it's no coincidence many of the targeted recipients were very senior officers in the coast guard. fortunately, they can't spell zukunft. we are very active in the cyber domain as well. i released a cyber strategy to push that out last fall. industry is coming to us. we regulate the industry. post-9/11 one of the most sweeping piece of legislation was at the maritime transportation security act of 2002. it required vessels and our maritime facilities recognize that 90% of our global trade moves by sea, that they need to implement safeguards, physical security at their facilities. so done a great job of that. i happened to be down at a facility that still being built out in louisiana. i won't get made because it would be an insider trade secret but this fo facility when it is fully up and run
i'm not talking about the opm act. this is highly classified. it was our cyber watch standards that were able to kill that spear phishing attempt before it even reached our recipients. had those recipients opened it we would have had to take them off the net. it's no coincidence many of the targeted recipients were very senior officers in the coast guard. fortunately, they can't spell zukunft. we are very active in the cyber domain as well. i released a cyber strategy to push that out last...
140
140
Aug 4, 2015
08/15
by
BLOOMBERG
tv
eye 140
favorite 0
quote 0
unprecedented partnership between three key opm's that have kept it within the automotive industry.e looking for is a way to link to the consumer in the vehicle. if they maintain that relationship, no one else can have it, that is why it is a smart deal. readyne: u.s. consumer is to spend 20 comes to cars? seeing a record sales volume globally. the u.s. is on track to be 17 million of that. brands, fiate chrysler, they are all doing well. looking at the consumers, it is interesting. berlin wasue in talking about suvs. the growth there is massive. it is partly driven by consumer confidence and lower oil prices. we are seeing generation y and buying more cars. america is leading the trend. challenges for the electric car market -- in my mind it is still the ability to recharge. it is the infrastructure that must be the greatest challenge. are we ready to adapt? oliva: it is definitely consumer confidence. and you think car about what a nightmare it would be if you ran out of charge. are great, the themology works, uber runs and you can experience them. the cars comfortable and does no
unprecedented partnership between three key opm's that have kept it within the automotive industry.e looking for is a way to link to the consumer in the vehicle. if they maintain that relationship, no one else can have it, that is why it is a smart deal. readyne: u.s. consumer is to spend 20 comes to cars? seeing a record sales volume globally. the u.s. is on track to be 17 million of that. brands, fiate chrysler, they are all doing well. looking at the consumers, it is interesting. berlin...
34
34
Aug 1, 2015
08/15
by
CSPAN2
tv
eye 34
favorite 0
quote 0
every opm report that we read lists dhs at the bottom and more specifically tsa. how do you plan to get us off the bottom? >> i read the federal employee survey that tsa did, and you're right, it doesn't ring near the top of organizations -- rank. i go back to what is my opening statement. first of all starts with a clear understanding of mission. i started with the fact that everyone of them raised their hand and took the oath of office support and defend the constitution of the country. think about it how many people in this country do that? they put their job i'm sure the eyes are open. they knew it wasn't the most popular job in the country but they said i want to be the face of security for the traveling public. that's were the route starts. where does morale fail after that? if there's a disconnect between what they signed up for and what they think your position nothing to do. i go right back to the nation and my three decades in the coast guard tony it starts with mission. didn't have to come here to talk about that mission and train to the nation and meas
every opm report that we read lists dhs at the bottom and more specifically tsa. how do you plan to get us off the bottom? >> i read the federal employee survey that tsa did, and you're right, it doesn't ring near the top of organizations -- rank. i go back to what is my opening statement. first of all starts with a clear understanding of mission. i started with the fact that everyone of them raised their hand and took the oath of office support and defend the constitution of the country....
58
58
Aug 27, 2015
08/15
by
CSPAN2
tv
eye 58
favorite 0
quote 0
as is the background as a witness protection program all with the opm files that were hacked and as was confirmed mrs. clinton was from the chinese asking them to find out of those 20,000 emails. [laughter] [applause] but that creeping concern is what powers rand paul with his deep ethnic of creches service he goes on medical mission is to give free eye surgery he walks the walk and is the real deal. verizon the islamic state has eclipsed sun with his anti-interventionist talk. governor kerry was my guest today the most underestimated with rick santorum for scott walker said to be the past come up with a name for the future. watch out he has been around the track and has done this before he made mistakes and can improve the is not running after back surgery he does shoot coyotes and he is a texan and if not for them we would have negative job growth over the last six and a half years he will remind you of that into the key is really good. he has glasses just like mine. [laughter] marco rubio was described the hottest commodity the flavor of the month. hot white? f never seen a more gift
as is the background as a witness protection program all with the opm files that were hacked and as was confirmed mrs. clinton was from the chinese asking them to find out of those 20,000 emails. [laughter] [applause] but that creeping concern is what powers rand paul with his deep ethnic of creches service he goes on medical mission is to give free eye surgery he walks the walk and is the real deal. verizon the islamic state has eclipsed sun with his anti-interventionist talk. governor kerry...