Also in this playlist...
This transcript is automatically generated
A very sophisticated computer hacking network claiming to be Robin Hood after stealing thousands of credit card numbers.
But the group known as anonymous hacking need to -- US security firm that handles everyone from apple.
To believe it or not the air force -- stated goal stealing from accounts and giving the -- away as Christmas donations Peter Brookes former CI.
Officer now a senior fellow at The Heritage Foundation Peter could see it.
Let's good to see you know bit of a wake up call I suppose and you say there are three areas that we should be concerned about I wanna hit each one of them cyber activism.
Let's talk about that first.
Well that's when a group goes out and has a political statement it wants to make or.
Advance some sort of agenda.
And that's generally can be generally harmless of course it is intrusive and it messes with people's the cyber capabilities and their computers and networks and things like that but that's probably the least the damage all right what about cyber crime.
That's a big issue here I mean it's actually one of people all talk about it can be everything from identity theft.
Or does something like this act as well where they took people's credit card numbers and use them for for other purposes people have to be very careful when they're online with their identity and with their credit card numbers because there are people out there who want access to them and we'll use them what is cyber warfare.
We'll cyber warfare is where it that's military essentially where eight and -- an adversary a potential adversary or an enemy.
We'll get into your computer systems and shut them down.
Mean United States he's been very conscious of this because we are slavishly depended upon computers.
The Pentagon it gets attack on a regular basis and cyber security is critically important to maintaining that -- integrity and the capabilities of those networks and is also cyber espionage which is another thing if we can talk about all well and tell us about that.
-- cyber espionage where somebody comes in and watch -- -- -- government secrets or it could be it could be your intellectual property such as proprietary information.
That they would use for their own purposes stealing your you know addicted crown jewels of your intellectual property is very damaged damaging to a company's competitiveness if a formula or processes where BL people or be able to come upon those formulas -- processes and use them for their own purposes in competition with you -- Peter what do we do about it.
-- -- -- -- wake up call me as we move and it's one -- well cyber security is something that everybody have to take a look at whether you're talking about your own personal computer your office computer a government computers I mean this is very -- if you are -- -- are hooked up to the -- you are vulnerable -- somebody -- intruding into -- system for their own -- that may -- -- to your -- interest right.
A bit but should we sort of join one of these groups that protects us you pay a fee and so on and so what do you do.
What I don't wanna be an advocate for any particular way but I mean look at -- we go to -- we lock our doors you know companies put fences around their their businesses and the same thing is true for our -- for our cyber security we need to take the steps that are recommended by experts on the national security expert from not you know as -- -- -- -- the fact is is that we need to take steps to protect yourself from viruses from intrusions.
From people getting into -- into -- systems that that will be you know inimical to your your interest subject yourself your business -- or the or your government.
But we can do that on line right I mean it you know you don't wanna advocating any particular group but.
You can go online and find security firms.
That will protect you true.
Absolutely absolutely and and it all I think prosecuted cyber security experts.
Advocate that but it also has been done by -- businesses which have much more to protect -- they have networks and we have a laptop.
These guys have network that of course the government has networks upon networks that they have to take the efforts that are going out there mean the threat is out there we need to recognize it and we all need to take steps from from individuals to due to the government to protect ourselves from people who get incited these are computers and networks.
-- and the internet's a wonderful thing but it's also.
Criminal opportunities so you have to have bad.
Filter by section