Also in this playlist...
This transcript is automatically generated
Battle on Capitol Hill over cyber security is whenever big stories today lawmakers are worried about threats to our nation's critical infrastructure.
And there's a few bills ahead of congress right now the -- taken up in the house today has bipartisan support.
But the president came -- yesterday's isn't gonna veto it if it passes the author of that bill -- Michigan congressman Mike Rogers.
He's chairman by the way the House Intelligence Committee congressman -- -- back with us.
-- great to see against piracy and you have said in the past that a catastrophic.
Is headed for this country what exactly do you mean by that.
Well if you think about it we're right now we're under incredible.
Fast from from Chinese espionage Russian espionage for -- electro property.
But nation states have also been developing the capability.
To shut down hole networks and I'm not talking just denial of service where you reboot it and plug it back again.
They can actually destroy your machine so imagine if you went to the bank today and stuck in your card and not only did it.
Read all -- or maybe not read anything at all -- the bank could also not tell you.
What was in your bank account and you multiply that over thousands and thousands of times it's could shut down critical infrastructure like our electric grid.
Which would cause chaos and harm to the economy clearly.
And non nation state actors are trying to get this capability and unfortunately.
Irrational nation state actors North Korea.
Iran are also getting this capability.
And the good news is we we can do -- that about it and it's very simple.
So let's talk a little bit about your bill the administration.
I is critical of your bill one of the things they said -- you mentioned the infrastructure part of it that.
That are a cyber attack could take down senator very bring infrastructure the administration says that your bill fails to provide authorities.
To ensure that our -- critical infrastructure is protected with your response -- that.
Well I mean I don't have the Buffett rule in my bill either I don't know that's Vito threatened again this is just a threat.
Which makes no sense this is a very narrow bill there's only -- thing that this bill says.
Is that the government and on and where the intelligence committee now so we go overseas and we watch these folks take really bad malicious source code they find it.
And they apply to the government systems today and that's how we protect our government systems or at least one way -- -- would it be great if we could take that same information and give it to the private sector sought protection your personal information on your computer.
I think it's a good idea very narrow.
The president wanted this big complicated regulatory scheme that had mandates and standards and all of the other things.
That it about a way his bill got zero co -- -- -- need to get some of the sponsor is bill.
So I thought it was amateurish and misguided the good news is that hasn't -- the bill down our coalition is getting bigger.
We have everybody from FaceBook to Microsoft to prison for credit card companies and everybody in between who is being -- Every day by somebody trying to get in and steal.
Our stuff -- -- lacking that.
The congress in -- just the other day and he said that.
Government agencies have their web sites hacked every single day -- it was it really a kind of an eye opener for -- one of the topics meeting gets you with him and I'd like to talk about with -- is.
It's -- privacy concerns because.
A lot of our viewers are concerned that sent how their private information we'll get out your bill is advocating sharing as you mentioned between the private sector in the government when it -- -- these attacks.
And what to do to prevent them.
Or to anticipate them but the concern is -- is that this was raised by the administration as well as that somehow our private information is also -- -- be shared between the government and companies.
And there's no -- to oversee that -- provide.
Proper oversight of some of these.
These new things that could be put in place.
Now absolutely wrong.
-- very narrow it's it can only be cyber security information as it relates to protection of a network or a system.
So this is zeros and ones and it's malicious source code.
All voluntary no mandate so private sector doesn't have to give the government anything the government can just give them this malicious source code.
So we -- the reason the private sector may want to give the government does something as they may get a vicious attack.
A malware attack that they don't understand very sophisticated.
They can give that to the government and say hey can help me work through this what does this mean how to weigh -- handled us and by the way did you know -- out is out there on the net.
And the source codes are incredibly.
Incredibly complicated and sophisticated.
And so this is a real time sharing of zeros and ones has nothing to -- not can't send.
We -- IG audit every year that has to report back to congress to say what did you get what did it look like how did you handle it.
We built them all lots of protections we have spent months negotiating with civil liberties groups and I am I -- I get a.
Laporte yes it will continue to what I support.
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- tomorrow as we get past the rule in the house today I would look for -- -- thank you very much great thanks --
Filter by section