55
55
Feb 8, 2015
02/15
by
CSPAN2
tv
eye 55
favorite 0
quote 0
stuxnet was released. we are playing catchup nikon forget what are the rules of engagement for how and when literally something like this. i think i slow down the use of at least attack weapons. there've been people who've told stuxnet was the first that was unleashed precise because of the legal issues around it and also the concerns of collateral damage. and it was kind of the proof of concept to show something like this is possible but i don't know that for sure. i'm assuming there are other weapons that have either been unleashed or have been developed. >> host: would you consider this a stuxnet attack a form of cyberwar for? >> guest: this is the first assembly of up cyberwar for. i know people use the term a law. the user for the ddos the tax in georgia against estonia. and those don't really reach the level of august and cyber warfare to be. or war for in general. -- warfare in general. stuxnet would often as the first digital weapon and an excel of cyber warfare attack. >> host: we often hear from
stuxnet was released. we are playing catchup nikon forget what are the rules of engagement for how and when literally something like this. i think i slow down the use of at least attack weapons. there've been people who've told stuxnet was the first that was unleashed precise because of the legal issues around it and also the concerns of collateral damage. and it was kind of the proof of concept to show something like this is possible but i don't know that for sure. i'm assuming there are other...
40
40
Feb 8, 2015
02/15
by
CSPAN2
tv
eye 40
favorite 0
quote 0
might've been some insiders who helped and assisted in planting it your there are two versions of stuxnet. the first version like i said doesn't have zero days so it seems to indicate that there was some kind of more intimate connection with computers were infected meaning that they didn't need to work from outside to get into. maybe the first version of stuxnet was planted there and maybe they lost that access in subsequent versions and the maven the reason why they had to add zero days to spread. >> host: kim zetter has been with "wired" magazine since 2003. prior to that, pc world. ms. zetter, are you a techy? >> guest: no. know i get into tech journalism journalism, not by choice. and then found i really loved it. i don't particularly like gadgets in particular or computers in the sense of taking them apart and programming things like that i love the issues around computers. issues around cybersecurity and privacy issues and civil liberties, those are the things that attracted. >> host: what was it about stuxnet the passage enough to write about? >> guest: it was multifaceted. it wasn
might've been some insiders who helped and assisted in planting it your there are two versions of stuxnet. the first version like i said doesn't have zero days so it seems to indicate that there was some kind of more intimate connection with computers were infected meaning that they didn't need to work from outside to get into. maybe the first version of stuxnet was planted there and maybe they lost that access in subsequent versions and the maven the reason why they had to add zero days to...
53
53
Feb 25, 2015
02/15
by
ALJAZAM
tv
eye 53
favorite 0
quote 0
they hand a letter saying they had worked on the stuxnet that sabotaged iran's nuclear program. they told the minister to end government support of the pro-palestine campaign and prosecute its leaders. if it didn't happen within 30 dates, south africa would face a cyber attack that would crich cripple its banking and finance sectors. >> cyber-terrorism cyber-warfare is on the increase finance. >> seems like the government never did find out who was behind the threat. but it fears the worst is yet to come. strong possibility that israeli businesses linked to mossad could increase espionage against south africa. phil reese, al jazeera. >> you can read the original spy cables. tell us what you think on twitter as well with the hashtag, spy cables. >>> killed 200 boko haram members, nigerian military released this video which it says is an operation against boko haram. the offensive was in the northern regions of baga sambesa and bama. >>> two teenage suicide bombers debt natalled their explosives at crowded bus stations. >>> in ga ghana people who don't have a generator are in the
they hand a letter saying they had worked on the stuxnet that sabotaged iran's nuclear program. they told the minister to end government support of the pro-palestine campaign and prosecute its leaders. if it didn't happen within 30 dates, south africa would face a cyber attack that would crich cripple its banking and finance sectors. >> cyber-terrorism cyber-warfare is on the increase finance. >> seems like the government never did find out who was behind the threat. but it fears...
55
55
Feb 25, 2015
02/15
by
ALJAZAM
tv
eye 55
favorite 0
quote 0
they hand delivered a letter, saying they had worked on the stuxnet that sanched savaged iran's system. if it didn't happen within 30 days south africa would face a cyber-attack that would cripple its banking and finance sectors. >> hacking espionage we are literally seeing the spectrum of cyber-threats in south africa. cyber-terrorism, cyber-warfare is on the increase. there are a lot of international wars where we could be dragged into. >> it seems the government never did find out who was behind the threat but it fears the worst is yet to come. the secret briefing says there's a strong possibility that straily businesses linked to mossad could link offensive espionage against south africa. phil reese, al jazeera. >> the man who shot and killed an unarmed black teenager in 2012 will not face federal hate crime charges. george zimmerman shot and killed trayvon martin as he was walking home. zimmerman has's said it was an act of self defense. charging him with violating federal civil rights laws. >>> the controversial oil pipeline is under rm extreme issue now. >> the pipeline has been
they hand delivered a letter, saying they had worked on the stuxnet that sanched savaged iran's system. if it didn't happen within 30 days south africa would face a cyber-attack that would cripple its banking and finance sectors. >> hacking espionage we are literally seeing the spectrum of cyber-threats in south africa. cyber-terrorism, cyber-warfare is on the increase. there are a lot of international wars where we could be dragged into. >> it seems the government never did find...
141
141
Feb 17, 2015
02/15
by
KNTV
tv
eye 141
favorite 0
quote 0
it says it's similar to stuxnet used to destroy iran's nuclear centrifuges. nobody is claiming responsibility for that, but i think you can do the math to figure out who it may have been. >> some world superpower possibly. >> with three letters. >> thank you very much, scott. 6:57. >>> a final check of the day's top stories. the justice department will appeal a federal judge's ruling blocking president obama's executive order on immigration. the ruling means the first part of the president's order set to begin this week cannot go into effect. >>> bay area nurses are going to rally in sacramento today to save six hospitals operated by daughters of charity health system. they're slated to be sold to prime health care. >>> crews pulled a car out of a pond on remington drive in su y sunnyvale this morning. one person was pulled from the car. no word on their condition. >>> 6:58 right now. as you get ready to start off your day another beautiful one, christina, in the bay area. >> it's going to be a little foggy out there, commuters will likely notice that this mo
it says it's similar to stuxnet used to destroy iran's nuclear centrifuges. nobody is claiming responsibility for that, but i think you can do the math to figure out who it may have been. >> some world superpower possibly. >> with three letters. >> thank you very much, scott. 6:57. >>> a final check of the day's top stories. the justice department will appeal a federal judge's ruling blocking president obama's executive order on immigration. the ruling means the first...
55
55
Feb 10, 2015
02/15
by
CSPAN3
tv
eye 55
favorite 0
quote 0
if you look at the joint effort of the united states and israel to create the stuxnet worm that went after the iranian nuclear capabilities that's another major area. there might be some terrorist organizations interested in developing that. but those are the big players on the international scenes, the nation states to have any kind of real severe ability to conduct attacks. the nsa with north korea a lot of countries would probably have that capability. it's easier to attack the private sector than it is to attack the u.s. government. >> what are the current rules of engagement? and are there any? and does the united states follow them and do other countries have rules of engagement? >> so, if there are any rules the united states adheres to it is hard to discern them. you know, some of the -- delving into the class society sector so it can be difficult for anyone to us is out what they might be. but when i talk to people what they tell me is that there aren't any obvious rules. it is a very, very turkey area. it is something that the defense department has been working toward deve
if you look at the joint effort of the united states and israel to create the stuxnet worm that went after the iranian nuclear capabilities that's another major area. there might be some terrorist organizations interested in developing that. but those are the big players on the international scenes, the nation states to have any kind of real severe ability to conduct attacks. the nsa with north korea a lot of countries would probably have that capability. it's easier to attack the private...
50
50
Feb 23, 2015
02/15
by
CSPAN2
tv
eye 50
favorite 0
quote 0
followed the stuxnet virus a couple usually to infiltrate computer networks. and it in part in response to the u.s. effort did iran then carry out its own wave of retaliatory attacks in three ways of attacks beginning in august 2012 including attacks that targeted the u.s. banking system the first question, does that sound accurate to you? >> again, i don't want to, if i haven't seen -- in broad terms though, if want of a broader discussion about so did the actions that nation nation-states taken severely to responses in others question certainly understand that. you know the united states like many nations around the world, clearly with capabilities and cyber. the key for us is to ensure their employed in very local, very formulated, very resonated many. i think you saw that in the president's direction to us in terms of presidential poll is directed 28 in which he laid out about a year ago sort the signal intelligence come here's the framework i want to make sure you choose, the principals i want you to be mindful of. this is the legal kind of basis. speed a
followed the stuxnet virus a couple usually to infiltrate computer networks. and it in part in response to the u.s. effort did iran then carry out its own wave of retaliatory attacks in three ways of attacks beginning in august 2012 including attacks that targeted the u.s. banking system the first question, does that sound accurate to you? >> again, i don't want to, if i haven't seen -- in broad terms though, if want of a broader discussion about so did the actions that nation...