Also in this playlist...
This transcript is automatically generated
-- -- five -- do because we still wallow and they still hack and outside is officially out of control because don't look now.
But -- today are sugar daddy is up these Virginia based medical operation out with a report today that -- no less in the Chinese military.
With stealing vital secrets -- months.
Hacking or military contractors -- energy companies and scores of other industries and doing -- so brazenly so consistently and so often.
But that it borders on the joke but it's Iowa -- it's no joke.
And given the fact that it -- China our biggest creditor.
And a nation that owns more than one point three trillion dollars of our debt.
He creates a serious dilemma for us which could explain the White House is cautious if not tepid response -- -- list.
But just because we -- Does that mean we don't -- China a response and an angry response at that my next guest says you damn well that -- -- have an angry response.
To -- -- security expert Aaron Cohen well Aaron I'm waiting I'm not hearing it but he and I got to.
Well I think that obviously this situation has to be.
Dealt with carefully and that's what this administration and is doing but the fact is is that.
This report that was released.
States -- very scary fact that dad that over that hundreds of terabytes of information.
Has been stolen from from over a 170 companies.
Here in this country and just to give you -- a scale of that size.
It would be equivalent to a 170 billion tweets -- all the information not store over a period of of let's say five years.
And it's a lot of information that information can be used against this and the fact that we all this country.
Whatever amount of money we -- it's a little disturbing in terms of national security.
The one in -- bothers me decides it's you know the egregious nature of this in the far flung.
Nature of this is how they could do -- would military contractors.
Of whom you would think that there are better safety and security measures installed but the Chinese -- come in and Willy Nilly it seemed to get what they what they want and whatever they want however often.
He had the -- did the military the actual unity in China the -- corporation has as pinpointed this the small twelve story building just in the suburbs.
Outside of Shanghai's a unit that's call 61398.
It is their cyber warfare unit it's been known for some time that this unit has had a very strong capability in terms of its.
Ability to be able to get large amounts of intelligence how -- -- the private contractors.
I wouldn't worry just yet how ever the fact that they have been able to hack into those systems.
Means that they have the ability to at least get past the initial -- -- I know at the security.
Systems in place for private military contractors is very strict -- -- -- go through a very serious safeguard process so I wouldn't.
Worry immediately about what information could have gotten into the people's republic army however.
It it is somebody's to be looked at a lot of close service and this unit is dedicated.
In Shanghai that's what they do when this could be look at.
As probably one of the largest cyber espionage.
They sleep tonight aren't you know it's they're denying it and we say they're doing -- days and they're not doing it -- -- We kind of let sleeping dogs lie and don't do much about it and I'm wondering.
Obviously to our own Karl why why is that happening and is it because.
We're beholden to the Chinese and we don't want to rock the boat or we just don't have enough evidence when I suspect.
Too well I I think it's more of oh we don't wanna rock the boat and I think that that that unfortunately it doesn't favor very well when it comes to security issues.
When it comes to information.
It's very hard -- pinpoint.
Where this this attack is coming from a clearly we've got a report that's been released.
And and we're starting to rock the boat and and the reason why we're starting to is because.
All our security people realize that by putting this information out there that it's gonna force these that this hacking unit to change his tactics and so.
I think it's the first.
One that you mentioned it's all right we'll watch -- thank you very much for joining us.
Filter by section