Also in this playlist...
This transcript is automatically generated
Earnings on computer security our national security as federal officials say cyber attacks aimed at US companies are on the rise but not just any attacks.
Apparently the goal of these attacks is not just spying were stealing our intellectual property.
But instead it's -- ties.
Sabotage of our vital computer networks tied to our most critical infrastructure.
And it gets his vast experience in cyber security major general dale -- rose.
I had the air force is the former chief information officer for the US intelligence community I now the president my arrows at the Meyer rose groups so.
General this is a big report in the New York Times and the New York Times putting two unnamed senior officials say that the targets and these latest happenings.
Had been some major energy companies but they don't know.
Who's behind the -- at the hacking who who do you think who who would you look at first in this situation.
Well I think the usual cast of characters are of the same.
Whether you're talking about hacking you're talking about.
Other elements of working against the United States.
And and it's fairly certain it's coming from the Middle East but you can just about bet that where it appears to come from is not exactly words originally coming from.
What does that mean.
That means that they usually try and hide.
So that it buys them more more time.
Because once you figure -- attribution that may not help you deal with the immediate.
Cyber element but it will help you deal with future cyber elements and they want to remain effective for as long as they -- What exactly should we fear and the scenarios that are being mapped out major corporations energy companies.
What what could be a worst case scenario is it.
Is it rolling blackouts throughout the country that can't be -- for weeks and months and actually have a full scramble -- that -- shows -- of our.
Our infrastructure when it comes to our electric infrastructure in the country you can just -- -- get an idea for the most activity is.
General would you talk us through what exactly.
-- hacker could do if they do attack.
One or two or more of these private companies that supplier electricity.
Well it depends upon what part in the -- they get where they they get the control system.
And -- took the control system which then sends false positives or.
Were false negatives.
To folks and and gives indications that that aren't really true about what's going on.
And that appears to be what these particular attacks are aimed at.
But much of the of the infrastructure trust United States -- in sectors and so.
So it while it may affect what many sectors.
They have to go after each sector.
Each series of could have control systems and now.
So that I think the important thing to realize in this particular instance is the warnings are the first ones have come out.
Since the administration's.
New executive order about how to deal with cyber attacks.
Of our critical infrastructure.
Is through private companies.
How should we protect -- -- How should we retaliate.
And who takes responsibility for that if these are private companies being attacked but with national security implications.
Now those are all very good questions and we have this this issue in many of our our of our public discussions about many subjects what should be the role of government.
With relationship to protect -- now.
Either private citizens or or private corporations.
And in fact our legislative capability or laws to include our treaties have have not kept up with the ability.
To deal with these things in a very forthright and and direct manner.
And and that vaccine.
Between private ownership and and public good is what is being exploited in this particular case.
-- that doesn't give -- lot of comfort.
Ever hear hear about these reports now and I was just reading an article in the -- new Yorker about cyber security saying that.
-- most hacking incidents are really not discovered for a 10200 days after they actually took place so.
In the meantime what do we do.
Well we we we need to there there -- a lot of common sense things and and a lot of times these folks that are attacking systems.
It's like a burglar going down going down a street.
An -- house is is is heavily locked even though he could break into that he'll pick -- a house it's not blocked just because it's an easier target.
Same thing happens in cyberspace.
And so I think the key is is that things are most important.
You invest -- most matter resources.
-- and an -- Forced the hacker to go to an easier target.
It you know -- -- -- a new Yorker article describe the scenario as -- mentos candy that a lot of corporations have a hard outer shell but when you get in the hand side it's often hackers have a lot access.
So let me just take this a more personal level up I could general what do you -- south of me knowing what you do about the intelligence community in about cyber security.
What are you preparing for and -- worst case scenario are you preparing for a loss is an electricity for several weeks -- preparing for a major city not having its water supply.
-- what are some of the scenarios that are really realistic that the average American family should consider prepare for in the worst case.
Well I don't think we're near the the worst case particularly in this instance it's a matter of we could tell we found them.
And and they didn't get didn't get very far in into the process.
But we've already experienced some of these.
Because a lot of times the power outage is the same thing as as as a cyber daddy 2002.
The the blackouts in in the northeast United States were caused because.
Since because some equipment some control equipment in Canada went down.
And lo and behold we found out a lot of -- of our energy sources actually you know work work in the United States.
So so we've had instances and in these we've had instances where satellite -- and have dropped the ability to process credit card transactions.
But we've had instances earlier this year were were the banking industry.
Had a lot of denial of service attacks which slowed them down cause cause them to spend several days dealing with.
With that with emergencies.
Protecting times and in those kinds of things.
So we have already had several instances in the course of the last couple years that is a snapshot of what could happen.
-- -- thank you very much always nice have your expertise necessary we're gonna continue to follow it has a lot of the themes that we're talking about today the intersection between.
Public and private -- and and had we best protect ourselves thank you so much for the time.
Thank you --
Filter by section