This website is no longer actively maintained
Some material and features may be unavailable

February 22, 2010
Cyber-security risks test U.S. government preparedness

We take a look beyond the headlines at increasing concerns over cyber-security, a problem that was recently highlighted by an online assault on Google from China.

This event added to fears of a digital attack that could cripple the information superhighway. In Washington, former security officials have met to role-play how the government would cope with such an attack.

For more, Martin Savidge interviews James Lewis, director of the Technology and Public Policy Program at the Center for Strategic and International Studies.

Lewis discusses the readiness of the government to deal with an attack and the likelihood of one taking place. He also talks about how this issue could impact U.S.-China relations.

bookmark    print

Comments

3 comments

#3

Let’s just announce to the world the best ways to attack us. After all, attacks sell news.

#2

It is not hard to program a motherboard. A chip the size of a dot could called home. If you have an Apple Computer it calls home ever time you go on line, usually looking for a virus to kill it. All Apple Computers are program to do that. Since you have the major part of computers in America made in China it is little problem to put in a chip that calls home. Look at the Logo that comes up when you turn on your computer. Even you can replace that Logo with you own. Then you have the software, CD-ROM/DVD drivs, hard drives, and a host of add ons. Anyone of them can be program to call home, better another site in America which in turn relays that info.
Cyber warfare has been going onsince before you were born. Since the computer first hit the market with Apple II. As soon as they were put on phone lines.
The bad part of cyber warfare is that a child of a half wit could in theory break into a nuclear power plant computer system. Over ride its computer system and crash it. Think about the unthinkable. Do this in France and good bye Europe.
Everyone spies on everyone else. In America you can go online any place around. You could in simple theory as a student play with your school records. Think about changeing your high school records, possible attending a school, college, grad school setting up course work,taking courses, giving yourself good grades, and even creating an grad paper for a degree all while sitting in a warm climite drinking a cool drink.
A large university like Sanford with its thousands of students and those faceless students you would be another faceless student, except that you were not there.
Worst yet Peter is that you life can be alter without you even knowing it. Your grades could be alter, your lifestyle could be alter, you could have your credit change just so slightly that your credit card fees go up. You could have a police record in a State even tho you were not nor ever been in that State.
You might find yourself on a watch list with a name similar to that of a terrorist from the British Isle.
There is also counter cyber warfare where false info is given out or a computer that will be breach to give out false info. Create projects that are worthless, that your enemy will not know until it does not work in their country.
By all of those “Which” as a good nerd it would not be to hard for you to grather that info, be warn that what you seek could be tainted to fill your hard drive with ones and zeros.

#1

An article in The New York Times Jan. 26th noted that America’s NSA “spies on the computer systems of foreign governments (as well as terrorist groups).” Can your program please explore if the NSA retrieves data from foreign government systems; imbeds foreign government systems with spyware of one sort or another; imbeds foreign government systems with bugs which, when/if activated, distort or destroy foreign government systems? Which governments? Which embassies? And do we also spy on foreign businesses, foreign academics, foreign civilian organizations?

To say nothing of still another program explaining how Duke and the Shanghai University collaborate on cyber programs, and American IT companies establish cyber labs in China with Chinese cyber experts; and if, when & how American companies, institutions and just plain cyber nerds break into competitors’ systems at home and abroad.

Produced by Creative News Group LLC     ©2018 WNET.ORG     All rights reserved

Distributed by American Public Television