comparemela.com

using there and then this. this is very sensitive stuff. we shouldn't be exposing our intelligence sources and methods. it opens us up to attribution, people will say, well, if america can do it, why can't we do it? also i'm really worried about retaliation. you can't forget that iran is no slouch when it comes to cyber operations. and we have to be very careful that iran doesn't try to do something, attack an american nuclear plant, for instance. jenna: that's why we have morgan here, by the way, because you're the cyber terrorism expert, and we were talking earlier this week about flame, this new, this new worm that's gone into computers in the middle east, and everyone was wondering who was behind it. if the code is out there now, and "the new york times" has reported that it is, for stuxnet how easy is it to copy, and how much is the information that's out there today help someone achieve that? >> stuxnet is easy to copy if you copy the program. what's more difficult is to decode everything that's a lot

Related Keywords

People ,It ,Us ,Stuff ,Intelligence ,Sources ,We Shouldn T ,Methods ,Attribution ,Something ,The Way ,Im Jenna Lee ,Plant ,Doesn T ,Instance ,Iranian ,Cyber Terrorism Expert ,Cyber Operations ,Retaliation ,Everyone ,Computers ,Code ,The New York Times ,Worm ,Flame ,Middle East ,Stuxnet Worm ,Strategy ,Call 911 ,Program ,Everything ,Someone ,Difficult ,Help ,Copy ,

© 2025 Vimarsana

comparemela.com © 2020. All Rights Reserved.