Also in this playlist...
This transcript is automatically generated
Journey right now is -- news -- O'Neal.
Pollard -- in George -- university he is a senior fellow for cyber policy at the Federation of American Scientists.
Former government official currently at PR TM management.
But more importantly he says cyber guy and I and I want to get an expert on cyber terrorism cyber workers cyber everything -- start by asking you you know we get we get nervous about -- -- terrorism.
-- your dirty words put together but what is secretary.
-- -- -- is a pretty frightening term and it does not represented most the malicious activity we see going on cyberspace.
Most of what we see in cyberspace is -- it's stealing information can be monetized it's -- financial information credit card information that's the majority activity.
We talk about cyber terrorism -- -- criminal okay that's -- another grim and getting that sometimes I don't exactly and as we five or six people sometimes can be organized criminal gains as a lot of money to be had in some of these databases that have.
And personal information credit card information.
Banking and finance sector.
We -- about.
Somebody's hacked into Sony PlayStation.
That's probably -- the Chinese writers probably not al-Qaeda it's probably somebody looking for credit card information.
-- it's either somebody looking for money that can be sold resold or otherwise monetize or sometimes it's just somebody out there to vandalized.
-- system or network or corporation because of some social issue that they're that they don't agree with okay so let's -- the criminal stuff aside.
What's left is he mentioned cyber terrorism so far there doesn't seem to be left because we haven't seen many terrorist groups tried to use.
-- -- logic bomb to try to attack infrastructure.
Terrorists have traditionally use cyberspace for coordinating their attacks communications but not -- out -- camera so far the intent and capability if you will that is hasn't -- yet.
But we see a lot of sophisticated attacks out there we see a lot of defense contractors being active -- penetrated.
For their information now that information is hard to sell on the black market.
But you can see where is certain defense contractors had information that might offer a competitive advantage to other states.
And if your defense hook and company and you have that kind of information then it stands to reason that another state might target you to steal information and get a technological edge -- Percent of the Chinese hacked into Lockheed.
And but lo and behold this is several years ago and lo and behold the Chinese all of a sudden have a stealth bomber that looks very much like the F 22 -- -- -- So they presumably -- could have -- a lot of the technology that we spend billions of dollars developing awfully they we have no free.
And there they go so that -- competitive advantage that -- We're only down at an economic victory over us -- precisely.
That that's interest for -- state hacking into defense contractors is that the amount of time and the amount of money that we spend maintain your technological agent -- may get more than a signal.
They have to spend the time they have to spend the money they take as much -- it takes to hack into his system and get the results of those years and billions of dollars of research.
OK so then let's talk about that we had general Hayden Michael Hayden will head of the CIA and the -- and he said.
That the next Pearl Harbor is gonna come in cyberspace.
So tell me about -- kind of aside from -- Well that's something has been concern of the US government for a long time since the Clinton administration this has been a concern is.
What are vulnerabilities for societal attacker systematic you know what kind of vulnerabilities do we.
Do we have exposing our critical infrastructures to to cyber attack and they bring down the power grid can they bring down.
Our electricity or phone lines and worst case scenario -- they do a cyber attack that we'll have fiscal results for example airplanes going -- this guy.
We haven't seen that yet.
What are we developing ourselves I mean we've got a got a question here.
From -- Sacramento he says that we -- that Mercury and and to chatter we should be able to take out their infrastructure their site.
Well at at that point you're talking about what general Hayden was talking I believe which is combat warfare.
And we owe it to ourselves to maintain every capability that we need to defend the country.
And we have a presidential strategy the president's the US strategy for.
The international strategy for cyberspace.
Which says in there that when it comes to cyber attacks the United States will respond to cyber attacks as though it I'm paraphrasing but as it will take any other attack on the national security -- as a last resort but still an option the military conventional military is a viable response to any attack -- the United States.
Filter by section