Also in this playlist...
This transcript is automatically generated
The US under cyber attack yet again government financial website at risk today it's anonymously attackers in the Middle East and North Africa threatened to strike.
This comes after the Pentagon issued its sharpest criticism yet of that.
Chinese role in cyber espionage and hacking.
Joining me now the latest -- Jonathan -- founder of red -- security which works to protect America's critical infrastructure systems.
Thank you so much for joining us here let me first get your take on how fears that we should take its latest threat from these anonymous hackers.
Always so that we should never underestimate your throat and you don't have to go poking on a loss mast unless you have a little cannot -- very ready right.
So -- anything could happen we think there's a lot of -- a lot of commotion in and I would not because a lot can happen but he never who could join the fray you know they could bring in some.
Friends with heavy artillery.
It seems like these threats are coming from every which -- these days.
We were just talking about this one coming from North Africa the Middle East the Pentagon just the other day -- as we said strongest accusation so far against China.
Blaming -- cyber intrusions directly on the Chinese Government and its military trying to get.
American business data business secrets I mean it will these threats will these warnings his finger point from the Pentagon actually get China to back up how effective is it is a strategy.
I don't really think it's gonna change anything I mean I think we certainly have to confront down.
But you know they're making money off this you know there -- no cleaning -- -- So so I probably was gonna do much you know about -- -- spot on the report was spot on.
OK so tell you where you have this expertise and understanding what the Chinese hackers have been able to get.
From hacking into our industrial companies some of these.
Oil services industries are actually getting a leg up on winning contracts.
Over American companies so tell -- more about your understanding about the actual.
Information they're getting and how they're using it against us eat up our economy.
Yes -- so they're coming into the corporate network.
You know people are clicking on things they shouldn't click on their computers -- acting a little bit slow.
Where they're actually doing is putting some code on the desktops allows -- to remotely control their computers.
From there that from the corporate network they can -- kind of creeped out into the process control systems that monitor control these plants.
And from what we can see they're taking blueprints operational manuals females.
Us competitive information that allows them to learn how to operate and -- inefficient operations.
Some of this information -- stealing is actually bid contracts.
And what we saw as several contracts -- in Venezuela also overseas in China were lost to Chinese companies' -- so certainly it's making impact.
Okay and anyone in China would be the first to point out how much money American business is already making with its interest in China but his son.
I know you went away and -- it chamber of commerce of American businesses in doing business in China you know did this survey and found that -- like 46%.
Of American businesses there are seeing more incidences -- cyber -- and stealing critical information.
So how much of an economic impact how much money address as he touched on this earlier conversation -- can quantify it for me.
I don't really got to qualify that I mean our our business focuses on industrial control systems in critical infrastructure.
And what's alarming to us is that yes -- they're stealing competitor information they're getting into the business systems.
That's been happening for years now what's alarming to us is that some of the root kits and now -- make it into their control systems that are monitoring and controlling our critical infrastructure.
So what happens if -- motivation changes play let's say they want to snoop in on how our power plants were for power refineries were.
And then let's say we get some office sometime and is that okay hop from our key strokes with just go ahead Emeka visited Houston blank.
You know blocked out so that's what we're worried about -- you know they're they're profiling our control systems and our state assistance.
Catalog in the types of technology we use that could definitely use against us if their motivations changed in future.
I really have no time Jonathan if you can quickly -- price had the US is doing and preventing future attacks.
Well what we're doing -- -- the US actually putting a lot of information to critical infrastructure owners.
-- pushing -- briefings they're passing legislation.
There's requirements and regulations out there right now they're all part company should have firewalls intrusion detection systems in place to protect themselves.
But that's only one industry that's -- power.
So I think Mick -- -- for oil and gas the other industries as well all right we're gonna check back you for more on -- story Jonathan Polly thank you so much.
Filter by section