This transcript is automatically generated
China -- -- cyber Rampage anonymous hackers on the attack at a White House is not ready to act.
-- -- reports that the president will issue an order Wednesday calling for certain infrastructure companies.
To beef up cyber security and -- following attacks on media outlets the Department of Energy that Federal Reserve.
Even the bush Hamlet.
And former White House cyber czar Howard Schmidt says this threat is a very dangerous and costly one very good have you mr.
I think it hit home for from these are one -- a former.
Presidents multiple president's family we're words -- in this I figure my guys are they gonna happen to them again nab and any of us what's.
Well I think there's a number of things one when you start looking at the incident did you -- referred to.
Is we use they shared infrastructure or email our ability to watch television book flights on line.
We all share -- -- so anybody to get access to any of that.
But through the Internet worldwide then gets access to any of us that are on there the second thing we start looking at the bigger picture and that sort of the the theft of intellectual property which by all counts is the largest child that we deal way.
We do a lot of innovation the innovation takes place.
On the Internet or companies do this our militaries do this and as a consequence.
With the vulnerabilities we have world.
Easy targets and people take advantage of a pretty quickly.
What I worry about never in our history -- we had diseases such a case where all our assets are -- On the web you know I mean -- our access to them is via the Internet.
We assume that the account we see mention on online statement is in that online account.
Easy to just and they disappear I don't want to sound overly alarmist but.
-- -- If they can hack.
You know former president's email accounts it's not a -- -- start going its average folks bank accounts and make of this appears.
Well that's correct and that's one end of the spectrum that we deal with -- we've seen what used to be traditional in that sense of of crimes that we see for fraud and identity theft which took place in the physical world.
Doing dumpster diving into -- papers out of the attraction stuff now it's being done on line and the bottom line is.
We really don't understand as the end users of citizens -- vulnerable we are.
We build a system to get just great kept great capabilities we ever rich -- robust technology out there.
But he's just fraught with vulnerabilities somehow gonna be less vulnerable power like -- -- -- -- -- -- -- you want because at least you couldn't.
Steer -- things we could do.
Suits it's -- -- that are cut down on that when -- and -- got think one of the biggest things that reduces to make sure that the software we're using whether it's -- Mac operating system Windows Mobile device.
Even our televisions now have operating system built -- -- -- make sure there were updating those on a regular basis so sign up with our vendors to get the updates.
The second thing is those of us that it in the business world -- -- specifically.
We can then go out of the people supplying -- to technology is say now wait a minute.
You give us great capabilities how about giving us and -- it security and it goes when it.
If that's the part we need to continue to convey but you know what we're raising our good in this visited there the better mousetrap -- we tend to constant dollar we do -- a -- They come I was smarter rats you know -- rule.
It did -- -- leaving room right now.
Well that's an and that's that the cat and mouse chase using that bad example that were on all the time.
As we get better about protecting against Phishing emails for example a cubic commit identity that while they -- -- to way to get around that by doing source engineering -- -- they'll call you on the foam or send an email that appears to be you know your pace statement so -- -- -- so much smarter Howard I guess what worries me now -- frequency of the severity in the widespread nature.
Of these attacks it's like.
There almost like testing out systems were big debt.
Well I don't know that there much smarter is just the week build a system that allows them to get away with stuff.
We wouldn't be able to get -- get away with -- in the physical world and that goes back of the hold issue of the world we're moving into.
Pretty much embedded -- but actually moving into where for example the televisions become a senator -- Our world and our homes our mobile devices.
Which once again we know -- examples in the past about how criminals and activist and nation states have taken advantage of this stuff.
We're not really building that in this infrastructure building going forward.
Plus we're not educating the people we're not getting the workforce.
-- wrapped -- to deal in this environment.
The end users you know unless it you do a show like this many people don't even hear about this and you read about them and thank you for guiding us.
Howard I'd love to get you back again Howard Schmidt.
Obama and and -- 43 cyber czar he knows of what -- these warnings.
Well time we --