Also in this playlist...
This transcript is automatically generated
So that's that's great battle in this world would likely take place on your computer.
President Obama signing executive orders that lay out just how far military commanders can go.
And using cyber attacks against enemies.
But -- Packers don't have rules today why should wait -- -- CO whether -- and online Internet security form and that firm rather Ken good morning to you.
-- the fans -- -- topic here why should we have rules.
You know I find it very curious that in no particular situation like this in an area that really has no rules and and really any type of process -- thought being put to it.
There I I find it hard believe that there is rules of engagement to really put in place for the -- can -- give me an idea of what a rule would be what what the guidelines that at.
You know -- I mean it's it to me it's kind of counterproductive if you're if you're interested in doing some type of cyber attack I think part of it would be to -- to you're not not announce it it gives somebody time to to prepare for much later that any type of our foreign military strike what about these are.
Easy to do if if you've got the right technology right and they're very difficult to Trace.
Absolutely I think the interest in point that I thought about when this is all on the -- is.
The feast of warfare if you will is really change from the iconic images you saw outdoor World War II in Vietnam.
Potentially in someone in a dark room with with just sitting next to them typing with their computer so -- really changed just the mindset and and maybe the mentality.
Of what really it's going to take place moving forward nobody even knew I mean as an expert in this field you you you can't even define.
What the rules would -- be for war what we could or could not do.
And with other countries or other hackers because a lot of times what happens frankly were not told right we don't know about me.
Now absolutely I mean this is the big concern that's gone on here in the United States for some time.
With the notion that China is actually infiltrated a lot of our systems.
Bugs if you will to kind of track what's going on with those systems moving forward so -- had -- announced they were coming.
We would have found measures to prevent them from what I think you made a great -- our producers earlier today this is not so much -- -- that spot that takes human lives.
What it can -- bring absolute havoc to our system now.
Absolutely I mean imagine if all of the the actual the stock exchange was brought down imagine if all of did the different things were so reliant on computers at this point.
While it might actually not be a situation that we're -- -- Did the casualties that a terrorist attack would result in because it's not -- But the impact that it could have could be actually even for greater now I think about the Iran in nuclear situation where that that that's steps that worm that was crafted.
The software gets together and it it went in and did the job.
-- -- -- -- later nuclear program by at least six months if not longer.
Absolutely it's facts you to like the old movie war games.
Where you know you're you're talking about the opportunity so much is run by the computers now it's so much reliance is placed on them.
If that is infiltrated -- -- put in a situation where it can be corrupted and attack.
It can make a huge difference beyond just stop people stealing your credit score -- great point.
Thanks Ken Ken when -- in -- that -- it and you thank you very much at that let's talk a little politics.
Filter by section