atab sa attacks it is not obvious it is north korea. there s nothing here that couldn t have been faked by somebody with a capability of carrying out this attack and it s also possible that somebody could have inadvertently looked like north korea. they set them up and fooled the fbi in the process? the fbi doesn t have any magic tools for doing cyber forensics that the rest of us don t have. in fact they learned the fbi learns how to do this sort of analysis from organizations like mine. so really and, by the way there was enormous pressure on the fbi to blame north korea. but it didn t come from anybody who knew anything about cybersecurity. it came from hollywood celebrities, it came from george clooney, it came from people on talk shows doing political commentary. gordon i know you re not a cyber terrorism expert. i don t want to put you in an awkward spot. you know the north koreans better than most.
jon: what a strange story. it is strange. not related to fan rivalry at all, they say. jon: thanks. jenna: right now the white house claiming your next visit to the obamacare website will be a better one but serious questions remain about security. two months after the website launched. here is the chairman of the house intelligence committee, republican mike rogers. the security of this site and the private information does not meet even the minimal standards of the private sector and that concerns me. i don t care if you re for it, against it, republican or democrat, we should not tolerate the sheer level of incompetence securing this site. jenna: our next guest continues to see problems with the obamacare site. he s cyber terrorism expert, former adviser to the state department s anti-terrorism assistance program and also recently testified before congress about the health care website and security. so you re the one to talk to about this, morgan. when we watched the sunday
while we have built systems, protections and a framework to identify attacks and intrusions, share information with the private sector and across the government and develop plans and capabilities to mitigate the damage, more must be done and must be done quickly. jon: cyber terrorism expert and former adviser to the state department s anti-terrorism assistance program and also the c.e.o. of connected to the case, he joins us now. how worrisome is this attack on the times, morgan? you know, jon, what it has the effect of doing is creating distrust in the public. it s an economic issue for them, too. people pay to get content. they go there. what s happening, it s not so much an tack on the site as it is an attack on the service that translates the name of the new york times .com into the i.p. address that gets it there. if you take out that piece of it, pretty much that site becomes unavailable even though i ve never actually physically touched the new york times site.
using there and then this. this is very sensitive stuff. we shouldn t be exposing our intelligence sources and methods. it opens us up to attribution, people will say, well, if america can do it, why can t we do it? also i m really worried about retaliation. you can t forget that iran is no slouch when it comes to cyber operations. and we have to be very careful that iran doesn t try to do something, attack an american nuclear plant, for instance. jenna: that s why we have morgan here, by the way, because you re the cyber terrorism expert, and we were talking earlier this week about flame, this new, this new worm that s gone into computers in the middle east, and everyone was wondering who was behind it. if the code is out there now, and the new york times has reported that it is, for stuxnet how easy is it to copy, and how much is the information that s out there today help someone achieve that? stuxnet is easy to copy if you copy the program. what s more difficult is to decode ev