them. it was explained to me that someone had been it was explained to me that someone had been getting information. i liked had been getting information. i liked him had been getting information. i liked him enormously, he was very sympathetic, little bit of a rug but i like sympathetic, little bit of a rug but i like people like that. what i was puzzled i like people like that. what i was puzzled was, some of the stuff that he was puzzled was, some of the stuff that he was having was things like social security he was having was things like social security numbers and national health numbers security numbers and national health numbers i security numbers and national health numbers. i said, that s hardly fatal to my numbers. i said, that s hardly fatal to my career! he said, no, you don t understand, to my career! he said, no, you don t understand, once they have that, it s very understand, once they have that, it s very easy to persuade people that vou re it s
and intelligence activities. wars and conflicts were you seem to have a strong national interest you are giving away part of the keys to the kingdom. i think that is what has happened. it s not that he used a mercenary force. but it s the way that it was embedded with the russian army in the kremlin government. seeing. that is what w it allowed this unique and deep relationship. allowed prigozhin to grow stronger and to take more chances. right now we are seeing the fruits of it. arthel: i m not sure if this is the right question would go for anywhere. our paramilitary forces or private military companies like waggoner gaining power? and if so does that go beyond russia? and why?
security or our nation s networks. that s the statement, however, we had a group of lawmakers, went down to north carolina for a field hearing early this week, as well worried about vulnerability of power grids. i ask you, how vulnerable are we? well, there are two different things, our power grids are something to obviously pay attention to and there are very old vulnerabilities that we need to fix, but this particular tact is focused on accessing data. unless there is there could be a bunch of data that can give you then the keys to the kingdom or help you learn more about a specific system, so that you could perform an attack later, that would be something to worry about, but this particular hack does not involve access to actual i.t. systems where then you could shut something down or manipulate something. it s mostly focused on exfiltrating and looking at data you shouldn t be able to