Also in this playlist...
This transcript is automatically generated
Okay sure -- now is colonel -- Clayton.
Out a member of the joint staff under admirals.
Small her mom and -- -- and general pace and says someone who's.
The guy it kinda guy who understands the big picture issues have a job that you had at the Pentagon.
Was your part of a think tank for the Joint Chiefs of Staff -- you prepare memorize for them about what are the crisis issues we're facing an eloquent possibly do about them right.
-- -- crisis issues acquisition problems the whole nine yards anything that the military touched basically came through us on the joint staff and especially anything related to unified commanders.
Such a cent com.
Right Central Command right -- I'm not sure audience understands that's where it's but what I ask you about today because you've got a real background in cipher.
And the cyber threats and I was -- last night at the Republican debates -- each of the candidates were asked what do you think of the big crises problems coming up.
That -- you'd have to deal with free the president and Herman Cain said on the Melissa I was a ballistic missile analysts and I think cyber war.
Is the coming problem now this is something you're an expert in.
Tell me about it because -- world -- McConnell Mike McConnell and former director national tells us he says the cyber war is already begun we're losing.
Well I think he's right unfortunately and that part of the problem is -- complacency that we see not -- we've been certain public sector elements of the US government.
But also within the private sector in US corporations.
The way in which they have these corporations deal with cyber issues really depends a lot on how familiar the and what we're finding nowadays is that to really anything can be targeted anything can be hacked.
Some things are overblown obviously but there are a lot of situations -- -- some -- key elements of our infrastructure -- -- subject to attack.
Ended there is ample evidence that they have been attacked some of this is public knowledge haven't -- just hacked into.
Well it depends in how you define -- -- -- fine actor but today generally speaking most of it is hacking activity.
-- -- would mean an active pursuit to actually put them all -- in -- -- something like that stocks and that.
Type scenario as far as I know has not happened yet in the United States however there's always the possibility that -- could.
And that's something -- that we have to be very careful and hacking -- -- -- looking at your computer and mine well if it really depends but there are certain certain areas where we're pretty certain that they're looking at that.
Targeting the United States China is suspect number one followed very closely by Russia.
There are other countries out there to include France.
Germany that have cyber capabilities not necessarily that they're attacking us or hacking into -- we've been looking at our networks.
But they have the capability to do so and -- plenty of other nations out there that have -- to cyber capabilities.
So there looking at us they're looking at our.
Military our government they're looking at our corporations are looking at Bank of America they're looking.
All over the critical infrastructure civilian and economic.
Are -- doing the same thing.
Well we are doing part of that we don't do as much economic intelligence as other nations do.
For example the French and the Chinese and the Russians had to be very -- your program within their intelligence services that benefits.
The economic aspects.
They are not only -- governmental sector but also of their so called.
Privacy to the prices are so proud -- -- exactly as no surprise that budget and there's not as much of the distinction between state elements.
And deprive it elements in in many of these countries and other countries.
It's a matter of public policy to provide economic guidance from the government to even if they're not only capitalist countries like for example Germany or France and they have been very active capability.
Within the cyber world where they take a look at different networks they also provide information.
That from an industrial espionage standpoint would be very very useful that includes how -- network is set up.
What kind of structures are in that network.
How many people use that network what types of data flow through that network all of those things kind of the journalistic who what where when why and how.
Love -- going after a particular target.
But the primary folks that are going after us who have -- visit -- -- and the Russians.
Filter by section