The Cycle | February 19, 2013
>>> the collective result of these kinds of attacks could be a cyber- pearl harbor .
>> we cannot look back years from now and wonder why we did nothing if the face of real threats to our security and our economy.
>> today, u.s. security firm report is putting a face on the growing cybersecurity threat. the chinese military . according tie report since 2006 , hackers tied to the military and based on this office building in shanghai have stolen information from 450 companies. 115 of them in the united states . including contracts and major businesses. today, china fired back at the foreign ministry , dismissing the claims as groundless and pointing out they've been cyberattacked too. this afternoon spokesman jay carney said the white house has repeatedly discussed cyberhackings with chinese officials. the white house keeps urging congress to pass legislation to protect us, but how do you fight a nameless, faceless enemy in a cubicle world away? let's spin. i think the message i take out of this, guys, is that technology is moving so fast. it's really hard to keep up with it. in terms of foreign policy and national security . whether it's cyberthreats or drones. when you have these kind of covert attacks, i think it's even more important to increase accountability measures and get some legislation codified. look, stutsman is a perfect example. i love the fact that we may or may not have, but probably did, crash iran's nuclear program computer. i like that. i like drone technology, for the most part, for going after terrorist threats in al qaeda . but it's really hard when other people get the same kind of technology that we have. it's really hard for us to wag a finger and say, can't do something like that. when we're kind of doing a lot of the same things without much accountability.
>> well, i'm not sure it's sort of like writing down our program is going to change what other people use their sort of cybertechnology. and there's a lot of countries, russia, singapore, north korea , using the same cyber.
>> china engages in massive amounts of cyber espionage. we know in that the way is government is structured, the national government is controlling that there. there's no way of this happening without it coming from the chinese government . this company, mandiant, that released this report, they generally pointed to china for every problem they've come across. i'm urging a tiny bit of caution, china has become this boogieman saying they did something wrong, be it the company, be it it cyber warfare , and everybody is going for it. part of the problem for the anti- china xenophobia, needs china to be prosperous for them to be prosperous, right? in foreign affairs even after china 's prosperity will remain independent on the rivals, including the united states . china will not get ahead if its rivals do not also prosper.
>> i don't know about the xenophobes. i think that's a little unfair.
>> i think they're a principal offender, though, and they are a particular threat that we should absolutely be concerned about. but, you know, the question is, why hasn't action been taken on this already. congress has been working on this for over three years to come up with some sort of legislation to combat cyberattacks. unfortunately, it actually ends up coming down to pro-government, anti-government no regulation argument. businesses are pushing against what would be government regulations. things like telling them if they have been hacked. having specific layers of security to protect their customers and their systems. and there's also questions about whether customers should be, for example, able to skew businesses if their data is compromised and the business has been negligent. also, it's familiar to anybody falling to domestic policy in united states .
>> i'm not waiting for congress. i'm buying gold . i'm getting rid of the phone.
>> i'm getting rid of the computer. cash is going into shoe boxes. tomorrow, i will not be on the show, but i'll be sending in my comments via carrier pigeon .
>> you have any eyebolt companies you'd like to suggest to the viewers?
>> there are certain guests. i'm going to sleep on a piefl gold and when the marauders come, i'm going to fight them off.
>> now, we know where your gold is going to be. under your bed.
>> we've reached the end. that's what i got from this segment. we've reached the bed.
>> debbie downer .
>>> i have an exciting announcement to share with you guys in the "the cycle" at home. you know i get the sweetest tweets sent to me because my political views make me by far the darling of the network. i've been working on the best of the best tweets i get or the worst of the worst. we're calling it s.e.'s tweet bag. that's right. the first episode features bravo's andy cohen . we had a ton of fun when i crashed his "watch what happens" set. and the links on the facebook page, so you have no excuses. while you're there, let me know what you think about it.
>> and like us.
>>> up next, 50 years ago today, "the feminine mystique " hit bookshelves and rocketed women out of that. how far have we come from "mad men."
>> why is it every time a man takes you out for lunch around here, you're the dessert.
>> that's terrible.
>> it's constant for every corner.