字幕表 動画を再生する
FORMER NSA HACKER DAVID KENNEDY TO DISCUSS THE POSSIBILITY OF A
TO DISCUSS THE POSSIBILITY OF A CYBERATTACK FROM TEHRAN.
CYBERATTACK FROM TEHRAN. >> Reporter: WHAT IS THE
>> Reporter: WHAT IS THE LIKELIHOOD THAT AN ALL-OUT CYBER
LIKELIHOOD THAT AN ALL-OUT CYBER WAR COULD OCCUR BETWEEN IRAN AND
WAR COULD OCCUR BETWEEN IRAN AND THE UNITED STATES?
THE UNITED STATES? >> YOU KNOW, THERE ARE ALREADY
>> YOU KNOW, THERE ARE ALREADY SOME THAT WILL SAY WE'RE ALREADY
SOME THAT WILL SAY WE'RE ALREADY IN A CYBER WAR WITH IRAN.
IN A CYBER WAR WITH IRAN. IRAN IS A VERY OVERT, AGGRESSIVE
IRAN IS A VERY OVERT, AGGRESSIVE TYPE OF REGIME WHERE THEY USE
TYPE OF REGIME WHERE THEY USE CYBER CAPABILITIES TO BENEFIT
CYBER CAPABILITIES TO BENEFIT THEIR OWN REGIME, WHETHER IT IS
THEIR OWN REGIME, WHETHER IT IS MONETARY GAIN OR MILITARY
MONETARY GAIN OR MILITARY PREPAREDNESS.
PREPAREDNESS. IRAN SPENT A LOT OF MONEY ON
IRAN SPENT A LOT OF MONEY ON THEIR CYBER CAPABILITIES.
THEIR CYBER CAPABILITIES. THEY'VE BEEN TRACED BACK TO THE
THEY'VE BEEN TRACED BACK TO THE SAUDI BREACH.
SAUDI BREACH. THEY'VE BEEN CAPABLE OF CAUSING
THEY'VE BEEN CAPABLE OF CAUSING A LOT OF DEVASTATION AND THINGS
A LOT OF DEVASTATION AND THINGS LIKE THAT THAT COULD HAPPEN HERE
LIKE THAT THAT COULD HAPPEN HERE ON THE HOME FRONT, WHETHER IT IS
ON THE HOME FRONT, WHETHER IT IS THE ELECTRIC GRID, WHETHER IT IS
THE ELECTRIC GRID, WHETHER IT IS OUR WATER TREATMENT FACILITIES,
OUR WATER TREATMENT FACILITIES, THINGS THAT ARE OCCURRING BACK
THINGS THAT ARE OCCURRING BACK IN 2011 TO 2013 IN OUR FINANCIAL
IN 2011 TO 2013 IN OUR FINANCIAL SECTOR, ALL OF THOSE ARE ON THE
SECTOR, ALL OF THOSE ARE ON THE TABLE FOR IRAN.
TABLE FOR IRAN. >> WHEN PEOPLE THINK ABOUT A
>> WHEN PEOPLE THINK ABOUT A RETALIATION ON IRAN'S PART,
RETALIATION ON IRAN'S PART, PEOPLE MIGHT THINK ABOUT
PEOPLE MIGHT THINK ABOUT BOMBINGS OR A PHYSICAL
BOMBINGS OR A PHYSICAL RETALIATION, BUT THERE IS ALSO
RETALIATION, BUT THERE IS ALSO THIS CYBER OPTION.
THIS CYBER OPTION. SO HOW WOULD A CYBER OPTION PLAY
SO HOW WOULD A CYBER OPTION PLAY OUT?
OUT? >> YOU KNOW, WHEN YOU LOOK AT
>> YOU KNOW, WHEN YOU LOOK AT MILITARY CAPABILITIES WITH THE
MILITARY CAPABILITIES WITH THE UNITED STATES, WE CREATED WHAT
UNITED STATES, WE CREATED WHAT WAS CALLED CYBER COMMAND WHICH
WAS CALLED CYBER COMMAND WHICH WAS SUPPOSED TO BE A DIRECT
WAS SUPPOSED TO BE A DIRECT KINETIC EXTENSION ON TOP OF WHAT
KINETIC EXTENSION ON TOP OF WHAT WE CAN DO FROM A MILITARY
WE CAN DO FROM A MILITARY BOOTS-ON-GROUND CAPABILITIES.
BOOTS-ON-GROUND CAPABILITIES. OTHER COUNTRIES INCLUDING IRAN
OTHER COUNTRIES INCLUDING IRAN HAS A VAST CYBER CAPABILITY THAT
HAS A VAST CYBER CAPABILITY THAT THEY USE DIRECTLY FOR MILITARY
THEY USE DIRECTLY FOR MILITARY OPERATION.
OPERATION. WHEN IRAN LOOKS AT THESE
WHEN IRAN LOOKS AT THESE CAPABILITIES THEY SAY HOW CAN WE
CAPABILITIES THEY SAY HOW CAN WE RETALIATE IN A WAY THAT DOESN'T
RETALIATE IN A WAY THAT DOESN'T TRIGGER A FULL-OUT SCALE WAR BUT
TRIGGER A FULL-OUT SCALE WAR BUT CAUSES DAMAGE IN THE UNITED
CAUSES DAMAGE IN THE UNITED STATES.
STATES. CAN THEY CAUSE A POWER OUTAGE IN
CAN THEY CAUSE A POWER OUTAGE IN CERTAIN LOCATIONS OR CITIES?
CERTAIN LOCATIONS OR CITIES? CAN THEY HAVE AN IMPACT ON OUR
CAN THEY HAVE AN IMPACT ON OUR FINANCIAL SECTOR WHERE WE CAN'T
FINANCIAL SECTOR WHERE WE CAN'T MAKE TRANSACTIONS.
MAKE TRANSACTIONS. >> Reporter: TYPICALLY WHEN WE
>> Reporter: TYPICALLY WHEN WE THINK ABOUT MILITARY
THINK ABOUT MILITARY CAPABILITIES, THE MEASUREMENT
CAPABILITIES, THE MEASUREMENT FOR THE STRENGTH OF THE MILITARY
FOR THE STRENGTH OF THE MILITARY CAPABILITIES IS THE PHYSICAL
CAPABILITIES IS THE PHYSICAL EQUIPMENT, HOW MUCH A COUNTRY
EQUIPMENT, HOW MUCH A COUNTRY SPENDS ON THE MILITARY BUDGET
SPENDS ON THE MILITARY BUDGET EVERY YEAR.
EVERY YEAR. HOW DO YOU ASSESS A COUNTRY'S
HOW DO YOU ASSESS A COUNTRY'S CYBER CAPABILITIES?
CYBER CAPABILITIES? >> I MEAN WE HAVE THE
>> I MEAN WE HAVE THE CAPABILITIES OF SHUTTING DOWN
CAPABILITIES OF SHUTTING DOWN ENTIRE COUNTRIES, SHUTTING DOWN
ENTIRE COUNTRIES, SHUTTING DOWN THEIR COMMUNICATIONS.
THEIR COMMUNICATIONS. WHEN YOU LOOK AT IRAN
WHEN YOU LOOK AT IRAN SPECIFICALLY, THEY RECOGNIZE
SPECIFICALLY, THEY RECOGNIZE THAT THEY CANNOT FIGHT US
THAT THEY CANNOT FIGHT US ONE-ON-ONE WHEN IT COMES TO A
ONE-ON-ONE WHEN IT COMES TO A MILITARY CAMPAIGN.
MILITARY CAMPAIGN. WE WILL WIN, SO IRAN HAS SPENT A
WE WILL WIN, SO IRAN HAS SPENT A SUBSTANTIAL AMOUNT OF MONEY
SUBSTANTIAL AMOUNT OF MONEY BEEFING UP THEIR ENTIRE CYBER
BEEFING UP THEIR ENTIRE CYBER WARFARE CAPABILITIES AND HAVE
WARFARE CAPABILITIES AND HAVE THE ABILITY TO INFLICT IT BACK
THE ABILITY TO INFLICT IT BACK ON THE UNITED STATES AS A WAY OF
ON THE UNITED STATES AS A WAY OF TRYING TO RETALIATE BACK WITHOUT
TRYING TO RETALIATE BACK WITHOUT A FULL-BLOWN WARFARE TYPE OF
A FULL-BLOWN WARFARE TYPE OF SITUATION.
SITUATION. >> Reporter: IS THE U.S. ABLE TO
>> Reporter: IS THE U.S. ABLE TO DEFLECT AND PREVENT AN IRANIAN
DEFLECT AND PREVENT AN IRANIAN CYBERATTACK?
CYBERATTACK? >> UNFORTUNATELY, THE WORLD THAT
>> UNFORTUNATELY, THE WORLD THAT WE LIVE IN TODAY WITH TECHNOLOGY
WE LIVE IN TODAY WITH TECHNOLOGY AND HOW WE DO BUSINESS, EVERY
AND HOW WE DO BUSINESS, EVERY COMPANY, EVERY MILITARY
COMPANY, EVERY MILITARY INSTALLATION, THEY'RE ALL HOOKED
INSTALLATION, THEY'RE ALL HOOKED UP TO THE INTERNET IN SOME WAY,
UP TO THE INTERNET IN SOME WAY, SHAPE OR FORM.
SHAPE OR FORM. IF YOU LOOK AT IRAN'S
IF YOU LOOK AT IRAN'S CAPABILITIES, WHILE THEY MAY NOT
CAPABILITIES, WHILE THEY MAY NOT HAVE THE SOPHISTICATION TO
HAVE THE SOPHISTICATION TO TARGET A LOT OF OUR CLASSIFIED
TARGET A LOT OF OUR CLASSIFIED SYSTEMS OR CORE INFRASTRUCTURE
SYSTEMS OR CORE INFRASTRUCTURE NETWORK FOR THE MILITARY, THEY
NETWORK FOR THE MILITARY, THEY HAVE THOSE CAPABILITIES TO
HAVE THOSE CAPABILITIES TO INFLICT DAMAGE UPON US HERE IN
INFLICT DAMAGE UPON US HERE IN THE UNITED STATES.
THE UNITED STATES. WE DON'T HAVE A GOOD DETERRENT
WE DON'T HAVE A GOOD DETERRENT TO STOP THAT.
TO STOP THAT. COMPANIES REALLY NEED TO BE
COMPANIES REALLY NEED TO BE CAUTIOUS RIGHT NOW, ESPECIALLY
CAUTIOUS RIGHT NOW, ESPECIALLY WITH THE TURMOIL WE ARE SEEING.
WITH THE TURMOIL WE ARE SEEING. WE DO EXPECT CYBERATTACKS TO
WE DO EXPECT CYBERATTACKS TO REALLY COME FORWARD.
REALLY COME FORWARD. COMPANIES NEED TO BE VIGILANT.
COMPANIES NEED TO BE VIGILANT. THEY NEED TO MONITOR THEIR
THEY NEED TO MONITOR THEIR SYSTEMS.
SYSTEMS. THEY HAVE TO, YOU KNOW, BOLSTER
THEY HAVE TO, YOU KNOW, BOLSTER THE SECURITY SYSTEMS AS MUCH AS
THE SECURITY SYSTEMS AS MUCH AS THEY POSSIBLY CAN DURING THESE
THEY POSSIBLY CAN DURING THESE HEIGHTENED PERIOD OF TIME
HEIGHTENED PERIOD OF TIME BECAUSE THEY WILL SEE
BECAUSE THEY WILL SEE RETALIATION FROM THE IRANIAN
RETALIATION FROM THE IRANIAN REGIME.
REGIME. ONE THING TO NOTE IS
ONE THING TO NOTE IS CATASTROPHIC LOSS OF LIFE I
CATASTROPHIC LOSS OF LIFE I DON'T THINK IS GOING TO BE IN
DON'T THINK IS GOING TO BE IN THE PLANS FOR IRAN.
THE PLANS FOR IRAN. WHAT WE DO EXPECT THOUGH IS
WHAT WE DO EXPECT THOUGH IS THINGS THAT CAN CAUSE PAIN BACK
THINGS THAT CAN CAUSE PAIN BACK HERE IN THE UNITED STATES, THAT
HERE IN THE UNITED STATES, THAT CAUSE FEAR, FEAR IN THE UNITED
CAUSE FEAR, FEAR IN THE UNITED STATES TO CHANGE POLICY, OR
STATES TO CHANGE POLICY, OR MAYBE LIFT THE SANCTIONS OR TALK
MAYBE LIFT THE SANCTIONS OR TALK OF PEACE OR THINGS LIKE THAT TO
OF PEACE OR THINGS LIKE THAT TO OCCUR.
OCCUR. IT IS REALLY A BACK AND FORTH WE
IT IS REALLY A BACK AND FORTH WE ARE EXPERIENCING RIGHT NOW.
ARE EXPERIENCING RIGHT NOW. >> Reporter: IS THERE A WORLD IN
>> Reporter: IS THERE A WORLD IN WHICH A CYBERATTACK ON THE U.S.
WHICH A CYBERATTACK ON THE U.S. INVOLVES MORE COUNTRIES THAN
INVOLVES MORE COUNTRIES THAN JUST TWO?
JUST TWO? >> YOU HAVE THE UNITED STATES
>> YOU HAVE THE UNITED STATES HACKING CHINA, CHINA IS HACKING
HACKING CHINA, CHINA IS HACKING THE UNITED STATES, UNITED STATES
THE UNITED STATES, UNITED STATES THE HACKING RUSSIA, RUSSIA IS
THE HACKING RUSSIA, RUSSIA IS HACKING THE UNITED STATES.
HACKING THE UNITED STATES. EVERYBODY IS HACKING ONE
EVERYBODY IS HACKING ONE ANOTHER, BUT THERE ARE
ANOTHER, BUT THERE ARE DEFINITELY ALLIES IN THIS FIELD.
DEFINITELY ALLIES IN THIS FIELD. YOU LOOK AT GREAT BRITAIN, FOR
YOU LOOK AT GREAT BRITAIN, FOR EXAMPLE, IN THE UK WHAT WE HAVE
EXAMPLE, IN THE UK WHAT WE HAVE WITH THEM AND WHAT WE CALL
WITH THEM AND WHAT WE CALL OURFULLY OUR
OURFULLY OUR FLY BYES, YOU KNOW, IRAN IS
FLY BYES, YOU KNOW, IRAN IS SUPPORTED BY RUSSIA AS WELL AS
SUPPORTED BY RUSSIA AS WELL AS LOOSE TIES TO CHINA AS WELL.
LOOSE TIES TO CHINA AS WELL. CAN WE SEE OTHER PEOPLE HELPING
CAN WE SEE OTHER PEOPLE HELPING OR AUGMENTING THEM WITH
OR AUGMENTING THEM WITH ADDITIONAL CAPABILITIES, THAT'S
ADDITIONAL CAPABILITIES, THAT'S SOMETHING THAT'S POSSIBLE.
SOMETHING THAT'S POSSIBLE. >> Reporter: WHEN WE TALK ABOUT
>> Reporter: WHEN WE TALK ABOUT A STRIKE, THERE'S A CONFIRMATION
A STRIKE, THERE'S A CONFIRMATION ABOUT THE AUTHORIZATION THAT THE
ABOUT THE AUTHORIZATION THAT THE TRUMP ADMINISTRATION HAD TO
TRUMP ADMINISTRATION HAD TO CONDUCT THAT STRIKE.
CONDUCT THAT STRIKE. WHAT ARE THE AUTHORIZATIONS THAT
WHAT ARE THE AUTHORIZATIONS THAT GOVERN CYBER SPACE?
GOVERN CYBER SPACE? >> THIS IS A LOOSELY DEFINED
>> THIS IS A LOOSELY DEFINED AREA OF WARFARE.
AREA OF WARFARE. WE IN THE UNITED STATES HAVE
WE IN THE UNITED STATES HAVE SPECK LAWS TO
SPECK LAWS TO SPECIFIC LAWS WE HAVE TO FOLLOW,
SPECIFIC LAWS WE HAVE TO FOLLOW, BUT OTHER COUNTRIES DON'T HAVE
BUT OTHER COUNTRIES DON'T HAVE THE SAME RESTRICTIONS.
THE SAME RESTRICTIONS. YOU HAVE A LOT OF GROUPS WORKING
YOU HAVE A LOT OF GROUPS WORKING ON BEHALF OF THE IRANIAN REGIME,
ON BEHALF OF THE IRANIAN REGIME, WORKING FOR THE IRANIAN REGIME,
WORKING FOR THE IRANIAN REGIME, OR, YOU KNOW, ON BEHALF OF
OR, YOU KNOW, ON BEHALF OF RUSSIA, ALL OF THESE DIFFERENT
RUSSIA, ALL OF THESE DIFFERENT ORGANIZATIONS AND GROUPS TRYING
ORGANIZATIONS AND GROUPS TRYING TO FIND OUT EXACTLY WHO IT IS
TO FIND OUT EXACTLY WHO IT IS BECOMES CHALLENGING.
BECOMES CHALLENGING. SO THE FIELD IS REALLY DIFFICULT
SO THE FIELD IS REALLY DIFFICULT TO UNDERSTAND ATTRIBUTION AND
TO UNDERSTAND ATTRIBUTION AND WHO IS ACTUALLY HACKING AS WELL
WHO IS ACTUALLY HACKING AS WELL AS WHAT THE RULES OF ENGAGEMENT