Also in this playlist...
This transcript is automatically generated
Joining us -- to assess the latest threats to this country general Jack -- retired four star army general.
Former army vice chief of staff also Fox News military analyst general good to have you here -- -- do but let's begin if we may -- -- this new report on program.
That's as highly specific.
Projection and estimates and ICBM.
Off for a ran by 2015.
So that must mean they've come a long way in a very court order.
And secondly the threat that it would reach United States.
No seriously I'm glad I don't doubt you do assessment I'm not familiar with the details of the to be sure so classified.
But the fact is your onions have one of the most aggressive offensive.
-- missile technology programs in the world they have right now short medium long range ballistic missiles.
-- reach the gulf states reach Israel reach Southern Europe that's in their possession the next step is the one that your discussing.
Tennis that it's the logical step for them and that's the development Intercontinental.
Capable of reaching their number one strategic enemy in a world which they declared in 1980.
The number one country that will keep them from dominating and controlling the Muslim countries of the world and that is the United States of America.
So the fact that -- in pursuit of -- there's got to be real we've got to take the threats very seriously.
And if they had they further intelligence.
That that Saudi Arabia has two missiles.
I -- -- I'm sure appointed.
Missiles I should say that I see the -- You ready to strike from within its borders against Iran and and Israel.
My first question is why are we learning this that this has been obviously -- closely guarded secret.
This seems to be point an inflection point of some kind.
In which suddenly we are being and immersed in previously classified top secret information.
And won the suspects that's not an access.
-- none of that so that's the Charlotte we have got people releasing that information.
Look at the saudis doing.
All of the regional opponent to Iran's objectives and dominating.
The Middle East and that that has been true since 1980.
So the saudis have -- missile defense system that they're developing the counter and actually have offensive missile technology and we can make an assumption -- That the saudis.
At least have people in terms of consultants helping them.
Develop nuclear technology in the event.
The deal -- and have a nuclear weapon because if -- running -- get a nuclear weapon there will be nuclear proliferation.
In the Middle East beyond Israel and Iran and Saudi Arabia will be right in the middle.
And and part of what is happening here is that a change in the in the in the national dialogue.
And the administration's focus which had been.
Leading up to the summit.
In California who with president -- of China.
Have been about the cyber attacks that that China is carrying out of against the United States.
Along comes -- Snowden.
They have the leaks the summit is literally blown -- front pages.
All across the world.
And suddenly it's about US surveillance.
What we continue at this point you're -- As we move toward the middle of July.
-- still there is very little public focus on the cyber attacks of China which continue unabated.
And and the focus remains.
If you will US surveillance.
Hate -- when are we going to see a shift here because surely the administration has the capacity.
To say we're going to restore.
Of the dialogue that we embarked upon a month ago.
Bulletin the administration of course Clinton defensive mode -- with this issue a minute left it up to general Keith Alexander director.
But the national security agencies.
To be the spokesperson.
For the administration on it but these are really policy issues and he's an -- group policy.
And administration should be discussing our policy and why it's important why it's necessary.
Why it's necessary and in the people's interest is such threatened reminding them in that dialogue.
Of the threat to we have had from China which has been prolific.
An inch ordinary in terms of its reach inside this country.
We do not collect on China's technology we collect on intelligence from China that's of value to us.
They steal our technology they still are intellectual property.
And they also are all over financial industry in terms of what deals -- being made -- -- acquisitions and mergers so they can invest.
In those deals with advantage to them obviously.
I think one of the questions -- to -- for the American people why is there's so little attention to what.
General Alexander himself has referred to.
In those Chinese cyber attacks against the United States are involved in the private sector and against the government.
He he phrased it -- that they're being the greatest wealth transfer in history.
And it continues.
That we don't hear from the business roundtable we do not hear from the chamber of commerce we do not hear from the National Association of Manufacturers.
We do not hear from think tanks.
This is a peculiar silence.
It it and considering that we are confronting this massive transfer of our wealth to the Chinese that wish they are -- Well it is actually -- we've been discussed on this issue for ten years are critical infrastructure -- military networks the government itself.
Utilities infrastructure to financial and banking system and -- transportation system other than the military network.
Everything else is vulnerable.
To attack that's number one on the two.
The Chinese and what they're stealing from us is absolutely -- ordinary military technology.
And huge intellectual property to benefit donation.
I know for a fact there have been gonna have a commercial industry that -- -- and in terms of aviation has -- look.
When it comes out as are some of their their fighter aircraft there it's -- precedent.
What they're stealing from us on a regular basis and the frankly.
So Lieberman who led the effort to try to get some legislation.
Voluntary legislation to provide better protection for all cells that failed I think were on a course Lou.
That we will have some kind of event here.
That'll be somewhat it's catastrophic in terms of cyber attack.
That will lead us to the kind of legislation we have to impose on ourselves.
To provide the kind of protection and absolute fire walls that we truly me.
General Jack -- thanks for being here that's always good talking.
Filter by section