Also in this playlist...
This transcript is automatically generated
Another big story today -- report out of the American cyber security firm may -- it looks sit down nearly a 150 cyber attacks linking many of them.
To targets in the United States and linking those attacks to one build.
One building just on the outskirts of Shanghai China.
That is run by the Chinese military subpoena Brooks joins us Peterson senior fellow for national security affairs and Heritage Foundation -- Chevy Troy was saying that.
We shouldn't be may be surprised about some of this health -- talk may be the same applies here but the question -- what do we do about it.
Well of course this is just the latest story Connell on these cities cyber operations against the United States and they don't just come from they don't just come from China and -- a threat.
Russia North Korea there's maybe over a hundred countries involved in offensive cyber operations and of course this is the -- latest wake up call our latest -- thing to do something about it.
Critical thing here is obviously.
Private public information sharing.
The government has access they have tools they have information that can help protect the private sector recourse the private sector.
Have to do what they have to do for their own security right gotta keep the bad guys out of their systems we've had we have hundreds of billions of dollars.
Intellectual property that is whisked away.
Via the Internet every year in fact we don't even really know this how big.
This problem is we know it's big but we're not sure exactly terms of dollars so you gotta you gotta she got work together on this but of course there are concerns about that what.
-- had I was gonna say does it change the dynamic it all even though she said it's out there with.
Iran and even -- our own government being linked to the back and forth with Iran and cyber attacks the past few years.
-- -- change the dynamic at all that this report directly links the attacks to the Chinese military build ports is -- make.
Incumbent upon our government and our military to respond kind of creating the new Cold War if you will -- something like that.
Well you know this this is not new news in my view guide -- we've known that -- that China is involved in.
Government sponsored cyber operations offensive operations.
It did Chinese military is that right hand of the Chinese -- -- Chinese Government the Chinese Government knows it's going on despite the protest stations of denials.
By the Chinese ministry of foreign affairs we did the US government whether you're Republican or democratic administration has been bringing -- up with the Chinese for a long time but of course this gets down to the basics on cyber warfare cyber espionage and cyber crime.
You know it's low risk its low cost its high return and difficult to track.
You know down even getting a geo location on these side -- the servers that are -- -- you did this is still little -- guesswork involved there so there are real challenges there but now that's a bigger question -- me how do we respond.
Exactly give me -- maybe a letter grade on both of you can't say if we -- in school and yet -- give -- grade to the American government also the American business community.
And a threat how ready what's our level of readiness well how would we be -- right now.
Well there's so many elements -- -- you -- peel back -- on January talk about intellectual property talk about cyber crime you talk about national security -- you talk about you know things like guy yelled at that -- electrical grid and things -- -- I'd say we're we're at a sea level right now we need to do much better this is -- -- -- information we're hemorrhaging our cyber security and we need to do something about it before you know god forbid it could come to we -- conflict where the Chinese could shut out the lights -- us -- shut off the power shut off the the the you know bid to air traffic control system so many things we need to worry about here there are and -- if you're right Peter Brookes thanks then we have more work to do.
Filter by section