Also in this playlist...
This transcript is automatically generated
America must also praised the rapidly growing threat from cyber attacks.
We know hackers steal people's identities.
And infiltrate probably -- We know foreign countries and companies swipe our corporate secrets.
Now our enemies are also seeking the ability to sabotage our power -- Our financial institutions.
Our air traffic control systems.
We cannot look back years from now and wonder why we did nothing in the face of real threats to our security -- our com.
All right there you have the president talking about cyber security in his State of the Union Address and I want to bring in.
Representative Bill Johnson Republican out of Ohio to talk about this.
And congressman the first thing I want to ask you -- the president is doing this once again by executive order what do you think about this prolific use of the executive.
You know a one size fits all approach to cyber security is is simply not -- to work might and I appreciate the opportunity that your given me to speak out on that.
A cyber security is is very very complex it has intelligence implications it has commercial and ended -- industrial implications.
And it has very real national security implications.
And the the energy and commerce committee.
As well as the intelligence committee is concerned about cyber security.
And but going about this through executive order.
Rather than through.
The normal process of working with the -- of the American people through the legislative process.
To come out what they -- solid solution make a comprehensive solution.
That's not the right way to go off spent.
Thirty years of my professional careers -- IT executive I've been -- the chief information officer.
Of a global manufacturing company so I I don't understand this issue.
Executive orders not the right way to go.
-- seems that this is brought on largely by the Chinese hacking that just came to light.
Did the Chinese hacking incident show us where we are vulnerable -- -- -- really outlined where the US system is is vulnerable.
-- this is not new.
-- we've known that the Chinese have been have been stealing our trade secrets through this kind of technology trying to break into our networks we've known that for a long time.
Why this is a new revelation.
Is is is a little bit concerning to me because we have known this for a while.
And what we're trying to do now is to craft legislation that's going to give our.
Commercial and industrial.
Areas the the same kind of access to technologies.
That our defense and intelligence communities have.
To identify these threats and to protect against them.
Could you gotta have a proactive approach Mikey can't wait until somebody breaks into your network to decide to slam to the war.
Well and it sounds like what the Chinese are doing is they've got some of the best and brightest in the Chinese military.
Really who who waging the war of the new millennium of the next generation.
Trying to hack into everything from our power grid to it to our defenses and am -- wrong.
No no you're not wrong at all because you know America is unique.
If you look at the last 236.
Years that most of the modern conveniences known to mankind they were birth right here in America.
It's not surprising and it should not be surprising at all.
That countries like China.
We were trying to exert.
Themselves militarily economically politically.
In their region it should not be a surprise that they are trying.
Through what ever means they can.
To steal our trade secrets.
To get inside and and understand our strategies because America is the is the leader.
In innovation around the world.
It would they have the ability.
To see if they partnered with the -- and there were airstrikes in the Iranian nuclear program.
To start shutting down power grids snarl the infrastructure the United States just as a means -- of deterrence means to be destructive.
Well you know that's one area where I think the president made a very good point and I'm certainly glad that the president understands the practicality of this issue -- -- Absolutely that is a possibility if we don't address it.
With a comprehensive approach right now.
You know at the same time that computing networks Mike are.
And and it -- a special.
Education and experience to be able to do to understand and deal with down.
They're very very simple at their -- -- ones and zeros.
And as long as computers which I don't see that changing.
Operates off of a string of ones and zeros.
You're -- have bad guys like the Chinese and the Iranians and other bad actors.
That are going to probe our networks you know what happens.
Millions of times a second.
That we get these probing.
Activities from the bad guys.
And what you what I get from your earlier comments your concern about the use of the executive order.
Is not that it usurped the system of checks and balances but -- eight usurped discovery.
And more information could go into the process.
Iran while I'm concerned I'm concerned about -- you know I I think it's I think it's -- out wrong.
For the president to sidestep congress you heard what he said end the state of the union speech you said -- if congress doesn't act.
Then I will and other words he doesn't need.
The congress that's not the way our system works so I'm concerned about.
The abuse of the executive order and sidestepping congress but I'm also concerned.
About the discovery aspect of it because this simply -- a cookie cutter approach here will simply not work it's a different kind of security requirements for.
A you say a power grid had -- from a medical system or a financial system it's different.
Okay reps and Johnson thank you very much for your time president Johnson from the Russell rotunda in the US capitol -- on that subject.
Filter by section