"You'll never be able to prevent all cyber intrusions..." -Michael Daniel. I'm glad we have someone in a position of power with the clarity to observe this fact.
Vice is essentially dead. They tried to grow too much. When that collapsed they tried to partner/merge/be acquired in recent months but had no takers. They're just releasing most of their content now possibly in a last gasp. Very unfortunate but there doesn't seem to be a market for this content on the budget it requires, we're down to mostly small independent creators now and are going to lose out on a lot of topics.
I would have loved a reporter that actually knew IT or cyber security in the slightest to be reporting on this. This guy had no idea what any of these people were talking about.
@brainwashedburgerworshipper it does matter because the person doing the interview needs to understand what the person is talking about to ask good questions in response to their answers to have an engaging conversation and to get more information about the topic.
@@ajmasters6546 I half agree but the reason it is "dumbed down" is because the average viewer has little grasp on technical terms related to what is being discussed. Asking easily digestible questions is a good way to help viewers easily understand the topic. Vice is a general "news network" so for a video like what your describing it would be more suitable for a tech news network.
Then you obviously fail to grasp the point of the series. It is not for experts to take to experts and thereby alienatiing the average viewer, it is for the experts to communicate in laymans terms so that anyone with any background can grasp the concepts. Cyber Security professionals are likely not watching this series because they know all about it anyway. Ben is representing the average viewer and his questions reflect that. He knows a lot about National Security because that is literally his job, but he also knows who is going to be watching this. Sometimes it is good to think rationally.
What worse is that they say there is a cyber security skill shortage but almost none of these companies actually wants to invest in training cyber workforce because there is no profit. They don’t realize it until they are impacted by an attack.
as a cybersecurity advisor this is so spot on. People don't want to pay for cybersecurity until they've already been breached. This is why I'm becoming a hacker instead lol
The reason why it wasn't infected via the net was because it targeted a specific computer control system called SCADA. That system was not connected to the Internet.
Stuxnet infected a control system called SCADA. It was not connected to the Internet. The virus was delivered by a USB drive. Anything and everything is hackable.
As a person who learn computer/basic cybersecurity for 15years and play on both legacy and new technology, I can say one thing that if anything is connected on network, you better have it secure with good encryption. It is not guarantee, but better be safe than sorry. Edit: learning network infrastructure is fun and get to see situations to building and finding vulnerability to prevent the real life situation.
Do you think computer science should be mandatory in school from elementary to high-school? Feel like it's not because to many people would try to be hackers
@@EBO47 : The only reason why everybody is at risk is because there are new actual satelites shot upwards into the world. And that is why everybody is at risk. "They have it, so why can't I?"..... "I want one too !"..... But with power, comes responsibilities. And not many people knows or accepts the responsibilities that comes with it....
Yeah, air gaps are cheap and effective, but they can be very inconvenient. Also air gaps aren't perfect, everything with a pin that can be controlled programmatically can emit detectable RF. You can probably speak LoRa over VGA, HDMI, LPT, etc. Also you can do what happened with Stuxnet and just infect computers via infected USB devices(nowadays probably smartphones). In reality everything can probably be hacked, it's just about making it more difficult. Unfortunately, we're often prioritizing low cost and convenience over security.
@@Maxjoker98 true though to my mind, remote attacks verses needing physical access to machine to deliver a payload via USB, for example is of a magnitude more difficult and would stop a lot of these random attacks. Reminds me of the early days of home wifi, when routers open authentication was on by default and you had to turn WEP on.
Air gapping costs money -- it means power company engineers/technicians cannot monitor/operate remotely, e.g. WFH, requiring night shift. Are you willing to pay extra on your power bill for air gap? Or are you going to pick the cheapest power company?
It's not hackers you have to worry about. You have to worry about an entity ( a person who isn't in the system but is in the system with a name) that knows how to monopolize people. A computer doesn't know how to monopolize people and psyche them out with Psychological Operations. I knew of a girl who did this and she had five counties wrapped around her little finger. The cool thing was that she was being herself. She passed away and her legacy is still thriving.
for those complaining that it's an 8 year old video, people who haven't watched back then has the chance to see it now. and as cybersecurity goes, it's still relevant
The answer to question is no. The biggest threat is knowledge. And having so many inexperienced computer users set up government and critical infrastructure with default passwords isn't going to solve anything.
@@GR4MPI Quantum computers are not a silver bullet. Post-quantum cryptography is well underway with cipher and digital signature algorithms already identified.
To help fight against lazy passwords they just have to add a biochip reader or fingerprint/retinal scanner. But a knowledgeable human can beat any security system unless you have an active human cyber security team.
We must fight against misuse of malicious AI, technology, the internet, social media, satellites and propaganda. That is what is taking place in our world and also in the spiritual realm. Stand up to save democracies against global supremacists, terrorists and dictators!
Cybersecurity is a vitally important field for national security, there’s so much exposed in the US that it’s hard to defend it all effectively. Hackers are just one of the problems.
Plants get hacked when companies are cheap AF. No password managers, no enforcement in Conditional Access, no passkeys, no Yubikeys etc. Refusing to upgrade and patch systems due to cost.
Microsoft, which the U.S. Military uses for azure cloud, core codes all it's products, including azure cloud, overseas in Israel. Intel, who backdoored all of their chips, on purpose, does R&D in israel and considers themselves "as much an israeli company as a US one".
Israel is so sketchy ugh so horrible. pretending to be a democracy while they export genocide and spyware to authoritarian regimes. truly heart breaking.
This seems like the worst period. Even the market are now very unpredictable. Started investing recently when the market prices were a bit high,today I am more than 60% down!
Don’t be confuse buying the dip in a bear market, with guaranteed future returns. Just because that company is down 60%+ from ATH does NOT make it a sound long-term investment. Make sure you’re investing in great companies. kudos to harriet alice ....
Her technical analysis is excellent and her interpretation/projections of the market are so accurate I sometimes ask myself is she is a human The point she is the perfect trader to follow for advice and guidance
I think poor administration of said password logins is the main area were lacking in, and it's not unknown - just unaddressed, but that's where my research has me guessing. Is it unaddressed still?
No, the biggest threat to American infrastructure are the people who refuse to fix and maintain. Greed is the real problem here with corner cutting. If a computer attack causes an infrastructure problem, either someone is stupid or it could have been prevented but security is skimped to save money.
One of SmythOS's standout features is its ability to integrate with a wide range of applications effortlessly. This is a significant advantage over other AI tools that often struggle with compatibility issues, making SmythOS a more user-friendly choice.
"Running on outdated software? You're the consequence of your own negligence. Making things proprietary? Expect consequences when the creators fade away." - SirCryptic
@@TeaMaster420 They could. But it isn't a matter of ability. Organizations love to pay support contract fees in order to shift liability to another entity. When some dam control system goes tits up because of a faulty update, the utility operating the dam doesn't want to be left holding the bag. This is the tao of corporate software purchasing agreements.
We must fight against misuse of malicious AI, technology, the internet, social media, satellites and propaganda. That is what is taking place in our world and also in the spiritual realm. Stand up to save democracies against global supremacists, terrorists and dictators!
Being in gov cybersec professionally, I can tell you that it is most certainly foreign adversary hackers that are often state sponsored (even if they’re doing it for fun, the foreign adversary isn’t going to stop them bc they’re interested in that data as well). While some American hackers most certainly do have malicious intent, they are not often going after US companies. In my management of enterprise networks, bots are constantly (and annoyingly) crawling our network from foreign IP addresses (yes, namely Chinese and Russian).
We must fight against misuse of malicious AI, technology, the internet, social media, satellites and propaganda. That is what is taking place in our world and also in the spiritual realm. Stand up to save democracies against global supremacists, terrorists and dictators!
I wish we can go back to the early and mid 90s one cell phones were only cell phones and Internet was only used for business purpose. Life was goooooood!
If you make a documentary with tense, suspenseful music in the background then whatever it is about is bound to feel like a threat. Humans, especially the kind that would tune in to tis documentary in TH-cam, are pretty dim and easily influenced - BECAUSE of the music that sets the tone.
5:00 and 5:45, so twice in the first 6 minutes of the video, our intrepid reporter keeps confusing system malfunction and system intrusion. starting to understand why vice filed for bankruptcy.
Car systems have very cheap electronics and software. These are even more vulnerable, especially since manufacturers implement black boxes and wireless connections via SIM cards! 😮😮
Don't feel too sorry about the longer video not turning out nicely, we fully understand. Sucks to hear that you have to leave your current shol. Good luck with finding a new one, hope you get sorted out soon!
Be sure to do an update to this and talk to a bunch of "experts" and government reps that either have no idea wtf they are talking about or are being intentionally vague and fear mongering while ignoring or not actually explaining the real issues for this subject out there. Or you could just reshare this video I suppose since you already did that.
"You'll never be able to prevent all cyber intrusions..." -Michael Daniel. I'm glad we have someone in a position of power with the clarity to observe this fact.
the government so full of old people that can't even open a PDF file lmao
lol 😂
the govt is filled with pdf files...
@@steven-el3swI see what you did there 😂
@@steven-el3sw only the ones with the (R) by their name!
Unless that PDF has a 0-day exploit ;-)
This is 8 years old - little outdated?
Vice wasnt allow to release it until they checked in with their new Saudi masters...
I think the core message still stands, however, I did think something similar when they were talking to President Obama’s security consultant.
The video might be outdated, the message is absolutely relevant.
Vice doesn't actually exist anymore, what do you expect? Nothing they've uploaded recently is new...
@@GrannyDrydenawww do you?
Cyberwar was one of the best shows on Vice when it aired on TV. Wished they kept this show going...
How come these only get posted 8 years after it's aired on TV?
Bankruptcy, lol.
Vice is essentially dead. They tried to grow too much. When that collapsed they tried to partner/merge/be acquired in recent months but had no takers. They're just releasing most of their content now possibly in a last gasp. Very unfortunate but there doesn't seem to be a market for this content on the budget it requires, we're down to mostly small independent creators now and are going to lose out on a lot of topics.
Cause they are money grubbers
Vice got greedy they saw the money and they took it.
Because there's an Internet TV delay do to the hackers 😂
Keep bullying nerds in highschool, this is what happens
I think nation state adversaries are the threat. Not “nerds” in school. Bullied people are still good people who take part in our society.
@@Melted-Etheragreed, good response
nerds are out for revenge
💀wall st still bullies lol
We aren't in 1990 anymore dude lmao
I would have loved a reporter that actually knew IT or cyber security in the slightest to be reporting on this. This guy had no idea what any of these people were talking about.
@brainwashedburgerworshipper it does matter because the person doing the interview needs to understand what the person is talking about to ask good questions in response to their answers to have an engaging conversation and to get more information about the topic.
@@ajmasters6546 I half agree but the reason it is "dumbed down" is because the average viewer has little grasp on technical terms related to what is being discussed. Asking easily digestible questions is a good way to help viewers easily understand the topic. Vice is a general "news network" so for a video like what your describing it would be more suitable for a tech news network.
Then you obviously fail to grasp the point of the series. It is not for experts to take to experts and thereby alienatiing the average viewer, it is for the experts to communicate in laymans terms so that anyone with any background can grasp the concepts. Cyber Security professionals are likely not watching this series because they know all about it anyway. Ben is representing the average viewer and his questions reflect that. He knows a lot about National Security because that is literally his job, but he also knows who is going to be watching this. Sometimes it is good to think rationally.
What worse is that they say there is a cyber security skill shortage but almost none of these companies actually wants to invest in training cyber workforce because there is no profit. They don’t realize it until they are impacted by an attack.
as a cybersecurity advisor this is so spot on. People don't want to pay for cybersecurity until they've already been breached. This is why I'm becoming a hacker instead lol
@@addieclark2026what are you learning to hack
12:59 the person on the bike in the background for sure fell off after that shot
Attention to fine detail nice. Been there swerving out of control, lol
😂
@4:50, she is being kind. There are bigger issues than that as well.
Neglect is a bigger threat than spooky hackers.
Stuxnet was brought into an Iranian facility via an external drive and wasn't even connected via the net.
The reason why it wasn't infected via the net was because it targeted a specific computer control system called SCADA. That system was not connected to the Internet.
me turning to control room operator: got any games?
Crazy idea: what if we didn't connect them to the internet
"But muh line won't go up!"
- hedge fund tech stock flippers.
As the comment above says, Stuxnet was brought in via a USB Drive to an otherwise isolated system.
Yes, ICS and other critical systems should be in an air-gapped network.
@@LoayMatar They have been air-gapped when air-gapped wasnt cool . They all look and act the same , what you see aint nuthing new .
Stuxnet infected a control system called SCADA. It was not connected to the Internet. The virus was delivered by a USB drive. Anything and everything is hackable.
As a person who learn computer/basic cybersecurity for 15years and play on both legacy and new technology, I can say one thing that if anything is connected on network, you better have it secure with good encryption. It is not guarantee, but better be safe than sorry.
Edit: learning network infrastructure is fun and get to see situations to building and finding vulnerability to prevent the real life situation.
Do you think computer science should be mandatory in school from elementary to high-school? Feel like it's not because to many people would try to be hackers
@@EBO47 : The only reason why everybody is at risk is because there are new actual satelites shot upwards into the world. And that is why everybody is at risk. "They have it, so why can't I?"..... "I want one too !"..... But with power, comes responsibilities. And not many people knows or accepts the responsibilities that comes with it....
So basically your saying I'm happy..but use at your own risk..just make sure your monthly payment is on time
I’m just surprised more of these critical infrastructure systems aren’t “air gapped”
A ton of them (chemical facilities) are. There is no way that person could control an NG plant in Houston.
Yeah, air gaps are cheap and effective, but they can be very inconvenient. Also air gaps aren't perfect, everything with a pin that can be controlled programmatically can emit detectable RF. You can probably speak LoRa over VGA, HDMI, LPT, etc.
Also you can do what happened with Stuxnet and just infect computers via infected USB devices(nowadays probably smartphones).
In reality everything can probably be hacked, it's just about making it more difficult. Unfortunately, we're often prioritizing low cost and convenience over security.
@@Maxjoker98 true though to my mind, remote attacks verses needing physical access to machine to deliver a payload via USB, for example is of a magnitude more difficult and would stop a lot of these random attacks. Reminds me of the early days of home wifi, when routers open authentication was on by default and you had to turn WEP on.
@@Maxjoker98 Best comment in this section. Well said
Air gapping costs money -- it means power company engineers/technicians cannot monitor/operate remotely, e.g. WFH, requiring night shift.
Are you willing to pay extra on your power bill for air gap? Or are you going to pick the cheapest power company?
It's not hackers you have to worry about. You have to worry about an entity ( a person who isn't in the system but is in the system with a name) that knows how to monopolize people. A computer doesn't know how to monopolize people and psyche them out with Psychological Operations. I knew of a girl who did this and she had five counties wrapped around her little finger. The cool thing was that she was being herself. She passed away and her legacy is still thriving.
❤
for those complaining that it's an 8 year old video, people who haven't watched back then has the chance to see it now.
and as cybersecurity goes, it's still relevant
The answer to question is no. The biggest threat is knowledge. And having so many inexperienced computer users set up government and critical infrastructure with default passwords isn't going to solve anything.
@@GR4MPI Quantum computers are not a silver bullet. Post-quantum cryptography is well underway with cipher and digital signature algorithms already identified.
To help fight against lazy passwords they just have to add a biochip reader or fingerprint/retinal scanner. But a knowledgeable human can beat any security system unless you have an active human cyber security team.
Wrong
We must fight against misuse of malicious AI, technology, the internet, social media, satellites and propaganda. That is what is taking place in our world and also in the spiritual realm. Stand up to save democracies against global supremacists, terrorists and dictators!
Cybersecurity is a vitally important field for national security, there’s so much exposed in the US that it’s hard to defend it all effectively. Hackers are just one of the problems.
We all didn't Pay enough attention in "MATH" classes.
Situation is grim.
we should cut or reduce use of the internet
I really enjoyed this series when it first aired. Even though this aired years ago , still very relevant in 2024.
Plants get hacked when companies are cheap AF. No password managers, no enforcement in Conditional Access, no passkeys, no Yubikeys etc. Refusing to upgrade and patch systems due to cost.
Microsoft, which the U.S. Military uses for azure cloud, core codes all it's products, including azure cloud, overseas in Israel. Intel, who backdoored all of their chips, on purpose, does R&D in israel and considers themselves "as much an israeli company as a US one".
"core codes"? lmfao
stop making up terminology 😂
@@waverley41 he means mirco-code within the cpu itself. which makes sense to call it "core" of all code as its at the core of the cpu.
Israel is so sketchy ugh so horrible. pretending to be a democracy while they export genocide and spyware to authoritarian regimes. truly heart breaking.
I love how he almost forgot and barely tacked on "health care"at the end 6:14 😂 lol because we don't have any health care.
Why is Vice just re-uploading all their old stuff?
Bankruptcy problem
This seems like the worst period.
Even the market are now very unpredictable. Started investing recently when the market prices were a bit high,today I am more than 60% down!
Don’t be confuse buying the dip in a bear market, with guaranteed future returns. Just because that company is down 60%+ from ATH does NOT make it a sound long-term investment. Make sure you’re investing in great companies. kudos to harriet alice
....
I agree just reached my goal of $500k yearly trade earnings. Setting realistic goals is an essential part of trading
Please educate me, i'm willing to make consultations to improve my situation,
Her technical analysis is excellent and her interpretation/projections of the market are so accurate I sometimes ask myself is she is a human The point she is the perfect trader to follow for advice and guidance
Please how do I find this financial counselor?
Yes
The fact that a bunch of boomers are in control of the cyber security of critical systems and departments gives little to no hope.
I think poor administration of said password logins is the main area were lacking in, and it's not unknown - just unaddressed, but that's where my research has me guessing. Is it unaddressed still?
Please bring more such Cyber attacks videos... It's so much interesting topic... 🙏🙏🙏🙏😊
I feel like refusing to repair and maintain infrastructure is probably a bigger risk lol.
Not that cyber warfare isn't a big risk
Why does everything need to be connected to the internet? Smh
Domestic threats are climbing but we have good people to find them.
No, the biggest threat to American infrastructure are the people who refuse to fix and maintain. Greed is the real problem here with corner cutting. If a computer attack causes an infrastructure problem, either someone is stupid or it could have been prevented but security is skimped to save money.
Finally, some sense down here.
This video is 8 years old… your killin me smalls.
Still relevant.
@ You think something in tech that’s 8 years old maybe 9 is relevant? Wow….
That’s why cybersecurity is a growing job. They need more ppl in that field
No, having all of our top technology R&D centers (Intel, Microsoft, AMD) in foreign countries is the greatest threat to US critical infrastructure.
0:29 _"wind up with a cyber war"_
Hackers: We're... in... like... 4?
That dude almost fell off the bike!
One of SmythOS's standout features is its ability to integrate with a wide range of applications effortlessly. This is a significant advantage over other AI tools that often struggle with compatibility issues, making SmythOS a more user-friendly choice.
is this a repost?
This is Vice level reporting, important topic, great pace and clear explanations, great video.
Thanks for this information.
SO YALL JUST GONNA GIVE THEM IDEAS 😂
17:31 “i dont fully unsee how it works “,then why are you advising anyone regarding it then??
"Running on outdated software? You're the consequence of your own negligence. Making things proprietary? Expect consequences when the creators fade away." - SirCryptic
Is it so hard to just have some computers within the infrastructure that are not connected to the internet or outside world in any way?
If you want remote support from the vendor or your operators - yes having completely air gapped systems is a problem.
@@AlexanderNecheff "Remote support from the vendor"???? The companies / the goverment running that stuff should be able to operate it by themselves.
@@TeaMaster420 They could. But it isn't a matter of ability. Organizations love to pay support contract fees in order to shift liability to another entity. When some dam control system goes tits up because of a faulty update, the utility operating the dam doesn't want to be left holding the bag. This is the tao of corporate software purchasing agreements.
Damn vice you laid off too many journalists.
What U.S. Infrastructure? Have you been living under a rock or something? Whether physical or Cyber, The U.S. doesn't have any infrastructure left...
We must fight against misuse of malicious AI, technology, the internet, social media, satellites and propaganda. That is what is taking place in our world and also in the spiritual realm. Stand up to save democracies against global supremacists, terrorists and dictators!
Is it just me or are we actually witnessing the reporter get smarter with each interview? 😂
Little actions with BIG consequences. Very frightening outcomes 😡
If there's a will there's a way. Especially when the hackable internet is involved. I didn't hear any new information in this doc
They talked to some real people on this episode.
ICS networks are gapped from internet access... no one is accessing ICS systems from the internet.
I still find the idea that there are 'rules' in war, completely absurd.
15:35 - the security threat was his laptop being completely soaked.
Peace and LOVE for ONE and ALL
Being in gov cybersec professionally, I can tell you that it is most certainly foreign adversary hackers that are often state sponsored (even if they’re doing it for fun, the foreign adversary isn’t going to stop them bc they’re interested in that data as well). While some American hackers most certainly do have malicious intent, they are not often going after US companies. In my management of enterprise networks, bots are constantly (and annoyingly) crawling our network from foreign IP addresses (yes, namely Chinese and Russian).
We must fight against misuse of malicious AI, technology, the internet, social media, satellites and propaganda. That is what is taking place in our world and also in the spiritual realm. Stand up to save democracies against global supremacists, terrorists and dictators!
Who leaves their plcs industrial network connected to net?
Laws have to tougher, and security updated. Hire Richard Krebs back too.
😮😮😮Cyber attacks were terrifying
Shout out to all the people working as contractors who paid for certifications
Talkin about SCADA systems I'm guessing - those are fun to mess with.
I AM IN POTOSI MO AND ,MY GPS SAID I WAS IN CUPERTINO FOR A WEK LAST YEAR
I wish we can go back to the early and mid 90s one cell phones were only cell phones and Internet was only used for business purpose. Life was goooooood!
you cant attack some thing that's not connected to the internet ,
You might want to look into NERC/CIP as there are already regulations that tell utilities how they need to protect their networks
Why does this video seem so old?
The more “ online “ the world goes, the easy is for the world to engage in cyber warfare/ cyber shenanigans.
If you make a documentary with tense, suspenseful music in the background then whatever it is about is bound to feel like a threat. Humans, especially the kind that would tune in to tis documentary in TH-cam, are pretty dim and easily influenced - BECAUSE of the music that sets the tone.
Unfortunately, the question of how to localize the attackers was not addressed.
If they stopped hooking everything up to the Internet this wouldn’t be a issue
Who started using stuxnet at another nation's critical infrastructure 1st?
Russian used on Ukraine
@@flashmedia8953 Russia used stuxnet 1st?
5:00 and 5:45, so twice in the first 6 minutes of the video, our intrepid reporter keeps confusing system malfunction and system intrusion. starting to understand why vice filed for bankruptcy.
The best hackers are the ones that never got caught ( kinda scary when you think about it ) basically walking super weapon
Dont be surprised to know how vulnerable the US industrial control system and SCADA system is ..
Car systems have very cheap electronics and software. These are even more vulnerable, especially since manufacturers implement black boxes and wireless connections via SIM cards! 😮😮
Idk how much do you know about the flaws in siemens 7 plc's
I don't believe for a second a Russian hacker would risk speaking to a random US journo from Vice magazine, there's no way that happened
Head of a cyber security consulting firm and sounded like he had no idea what he was talking about
Don't feel too sorry about the longer video not turning out nicely, we fully understand. Sucks to hear that you have to leave your current shol. Good luck with finding a new one, hope you get sorted out soon!
Seems I’ve taken the right decision enrolling to be a Certified Ethical Hacker here in Ghana
Let’s see where this journey leads us
Why even have those networks connected to the Internet?
15 years for this system in oil and gas facilities I think same as power plant infrastructure. Hacking can easy to actions
The problem is not the hackers, but the quality and maintenance of the software.
6:26 he almost forgot healthcare is critical but remembered finance without an issue, 'Merica!
Technically Stuxnet was not a virus 3:28. It was a *worm* that carried in its payload a kernel rootkit.
13:02 had a double take of the guy in the background lol xD
The answer to Michael Chertoff's question is in cyber war there are no rules.
16:40 I thought it was Doug Stamper from House of Cards lol
13:02 lol person wobbling on bike
YEAR:2900
me:“Oh no a pipe broke in our house”
dad:”ITS A CYBER ATTACK”
Meanwhile in a place far far away….
hampter:”hahah pipe go BOOM!!!!”
Be sure to do an update to this and talk to a bunch of "experts" and government reps that either have no idea wtf they are talking about or are being intentionally vague and fear mongering while ignoring or not actually explaining the real issues for this subject out there. Or you could just reshare this video I suppose since you already did that.
Found some outstandingly intelligent folks on this one!!
Id suggest rust currently is
no corporate greed is
I recall seeing this video before, today 04-12-2024, refresh.