Also in this playlist...
This transcript is automatically generated
Rare glimpse now into how the government would respond to a major cyber attack the Senate Armed Services Committee holding a hearing today that looks into the impact.
Of a computer generated attack targeting critical infrastructure.
In our country this is a huge issue -- We saw this play out in Iran and when a virus crippled one of the country's nuclear sites -- intelligence plus plus.
Staff and parents live in Washington on this a -- This is a compelling topic what are we learning about this today.
Well thank you -- good morning according to the -- testimony the head of US cyber command Keith Alexander.
We'll testify that the US intends to use cyber not only to defend US networks but for offensive capabilities as well quote.
Any actor threatening a crippling cyber attack against the United -- we'll be taking a grave risk.
Our goal is to ensure that a commander with the mission to execute has a full suite of cyber -- options from which to choose now this testimony.
Is consistent with the station statements of the nation's top intelligence official James clapper.
Who warned congress recently during the annual worldwide threat hearing considered the most significant in terms of setting budget priorities.
That cyber attacks are growing in number and sophistication.
We -- -- -- cyber environment in which emerging technologies are developed and implemented before security responses can be put in place.
Among state actors were particularly concerned about -- -- entities within China and Russia conducting intrusions in the US computer networks and stealing US.
-- these offensive capabilities are classified but we what we may get today are the proud at lines.
Of this in the open session -- -- -- or are we entering a phase of all this -- where cyber threats start to outweigh terrorist threats perhaps.
Well I think we I had are clear signal at that worldwide threat hearing in January from the FBI director Robert Mueller.
Who testified that right now.
Terrorism counter terrorism remains the number one priority of the bureau.
But he predicted that it would quickly be clips in the next few years I cyber attacks and the issue with cyber.
Always comes down to authorship you can't always identified the origin.
Of the attack in what we see is not only attacks that are designed to cripple networks this is what we saw in Iran and that really sort of let the genie out of the bottle in terms of what was possible with cyber but also these advanced persistent threats were eight PT's.
These are out viruses or malware that get your system and are under the radar and are constantly they say -- trading is the word the basically stealing your data.
For some purpose in the future.
Pardon scenarios happen thank you very much you're welcome -- -- deal with for very long.
Filter by section