220
220
Oct 18, 2013
10/13
by
CNN
tv
eye 220
favorite 0
quote 0
outward threats against foreign adversaries, particularly when most cybersecurity threats are about data exfiltration. it will really be fascinating to see how a former pentagon official at senior levels is able to negotiate this with the pentagon. >> fascinating stuff. thanks for coming in. we appreciate it. >>> coming up on "the lead," feeding your brain. a new study looks at the power of sleep in fighting off diseases like alzheimer's and dementia. we'll explain. >>> next, the future of drone technology is here. we're using one for this very shot. coming up next on "the lead." t: help the gulf recover and learn from what happened so we could be a better, safer energy company. i can tell you - safety is at the heart of everything we do. we've added cutting-edge technology, like a new deepwater well cap and a state-of-the-art monitoring center, where experts watch over all drilling activity twenty-four-seven. and we're sharing what we've learned, so we can all produce energy more safely. our commitment has never been stronger. was a truly amazing day.ey, without angie's list, i don't know if we coul
outward threats against foreign adversaries, particularly when most cybersecurity threats are about data exfiltration. it will really be fascinating to see how a former pentagon official at senior levels is able to negotiate this with the pentagon. >> fascinating stuff. thanks for coming in. we appreciate it. >>> coming up on "the lead," feeding your brain. a new study looks at the power of sleep in fighting off diseases like alzheimer's and dementia. we'll explain....
205
205
Apr 19, 2013
04/13
by
CNNW
tv
eye 205
favorite 0
quote 0
it all depends on how fast people put in plans to block that exfiltration plan. when we look at eric robert rudolph, he was at large for five years in the mountains of north carolina. so i think the odds are that they are going to get them and get them soon but if these folks managed to make it out of the country and, let's face it, we have some pretty open borders to the north and to the south. and so challenge is out there. if they are still in the united states, i think we have a very, very good chance of getting them. >> jeff beatty, thank you much. >>> still to come, we're following live tonight from boston, a police officer shot at m.i.t. we'll be right back. [ ship horn blows ] no, no, no! stop! humans. one day we're coming up with the theory of relativity, the next... not so much. but that's okay -- you're covered with great ideas like optional better car replacement from liberty mutual insurance. total your car and we give you the money to buy one a model year newer. learn about it at libertymutual.com. liberty mutual insurance. responsibility. what's yo
it all depends on how fast people put in plans to block that exfiltration plan. when we look at eric robert rudolph, he was at large for five years in the mountains of north carolina. so i think the odds are that they are going to get them and get them soon but if these folks managed to make it out of the country and, let's face it, we have some pretty open borders to the north and to the south. and so challenge is out there. if they are still in the united states, i think we have a very, very...
86
86
Dec 17, 2013
12/13
by
CSPAN
tv
eye 86
favorite 0
quote 0
to took place just now allow the exfiltration. desperate for cash and only looking for a quick it, you're not going to take that time. the first difference between these guys and almost everybody else is they were willing to and be patient. second, they had this -- this -- division of labor where skilled in ple were the initial hack. skilled e were people at exfiltration. hen finally skilled at montization. most groups, most gangs, don't kind of really specific division of labor. the other thing that really should be pointed out is that the case that we announced in really a continuation case. albert gonzalez the albert gonzalez case is a number of reasons and andy actually worked on it. high school, i think -- no. but -- but it was -- it was an mazing case that resulted in the longest sentence in cyberhistory, albert gonzalez is 20 years right now. for one- he was amazing albert gonzalez was caught initially. he flipped. cooperating at a high level. at the same time he was cooperating at a high level on hacking at , he was extrem
to took place just now allow the exfiltration. desperate for cash and only looking for a quick it, you're not going to take that time. the first difference between these guys and almost everybody else is they were willing to and be patient. second, they had this -- this -- division of labor where skilled in ple were the initial hack. skilled e were people at exfiltration. hen finally skilled at montization. most groups, most gangs, don't kind of really specific division of labor. the other...
84
84
Dec 17, 2013
12/13
by
CSPAN
tv
eye 84
favorite 0
quote 0
and look to see once the change, what took place just now that allowed the exfiltration? so they waited. if you are desperate for cash and only looking for a quick hit, you're not going to take that time. the first difference between these guys and almost anybody else was that they're willing to wait, they're willing to be patient. second, they had this division of labor where they had specific people who were skilled at the initial hack. then there were people who were skilled at exfiltration and finally there are people who are skilled at monetization. most groups, most gangs don't have that kind of really specific division of labor. the other thing that should be pointed out is that the case we announced in july was really a continuation of the albert gonzalez case. albert gonzalez case was an amazing case for a number of reasons and andy worked on it. i was still in high school, i think. [laughter] it was amazing for one reason -- it was an amazing case that resulted in the longest sentence in cyber history. albert gonzalez is serving 20 years right now. it was amazin
and look to see once the change, what took place just now that allowed the exfiltration? so they waited. if you are desperate for cash and only looking for a quick hit, you're not going to take that time. the first difference between these guys and almost anybody else was that they're willing to wait, they're willing to be patient. second, they had this division of labor where they had specific people who were skilled at the initial hack. then there were people who were skilled at exfiltration...
45
45
Dec 17, 2013
12/13
by
CSPAN
tv
eye 45
favorite 0
quote 0
they did not exfiltration any data. the systems would not necessarily see brand-new code and immediate exfiltration and look to see, what has changed? what took place just now that allowed this excellent ration? they waited. if you are desperate for cash you are not going to take that time. the difference between these guys and almost anybody else without they were willing to wait. they were willing to be patient. secondly they have this division of labor where they had specific people who were skilled at the initial hack. then there were people who were skilled exfiltration. finally, there are people who are skilled at monetization. most groups and gains do not have that kind of really specific division of labor. the other thing that really should be pointed out is that the case we announced in july was really a continuation of the albert gonzalez case. it is amazing case for a number of reasons. in the actually worked on it. -- and the actually -- andy actually worked on it. i was in high school. [laughter] it was an
they did not exfiltration any data. the systems would not necessarily see brand-new code and immediate exfiltration and look to see, what has changed? what took place just now that allowed this excellent ration? they waited. if you are desperate for cash you are not going to take that time. the difference between these guys and almost anybody else without they were willing to wait. they were willing to be patient. secondly they have this division of labor where they had specific people who were...
100
100
Dec 30, 2013
12/13
by
CSPAN
tv
eye 100
favorite 0
quote 0
then there were people who were skilled at exfiltration and finally there are people who are skilled at monetization. most groups, most gangs don't have that kind of really specific division of labor. the other thing that should be pointed out is that the case we announced in july was really a continuation of the albert gonzalez case. albert gonzalez case was an amazing case for number of reasons and andy worked on it. i was still in high school, i think. no, no. [laughter] it was amazing for one reason -- it was an amazing case that resulted in the longest sentence in cyber history. albert gonzalez is serving 20 years right now. it was amazing for one reason , that albert gonzalez was caught initially. he flipped and began cooperating at a very high level and at the same time that he was cooperating at a high-level on the one hand he was hacking at an extremely high level on the other hand simultaneously. he is quite a character. he was caught again and his arrest really spurred on this heartland case which was still producing results as of july of this year. and he can probably giv
then there were people who were skilled at exfiltration and finally there are people who are skilled at monetization. most groups, most gangs don't have that kind of really specific division of labor. the other thing that should be pointed out is that the case we announced in july was really a continuation of the albert gonzalez case. albert gonzalez case was an amazing case for number of reasons and andy worked on it. i was still in high school, i think. no, no. [laughter] it was amazing for...
74
74
Dec 17, 2013
12/13
by
CSPAN
tv
eye 74
favorite 0
quote 0
yourself, you show you get in, get out, demonstrate exfiltrate data. cybercriminals have become more professional. that's a trend we're trying to deal with. we'll continue to. i s gotten away from the -- don't know if there was an group, but there's more dedication to getting paid than there used to be. that's a good capitalist. talking about the landscape rom the criminal profession is changing. the russian government came out ecently and stated if you're a cybercriminal and hacking against other countries, you should not travel outside of russia, right. countries cially to america has treaties. he law enforcement around the world is working together and i think the same is going for the operations urity around the world. so i changed my operations based upon the regulatory requirements of certain countries and of where the data i want to steal the tes in and i track arrests of bad guys around the world and i understand how they are arrested and so i can how law enforcement is doing what they do around the world. that's an important part. they're stud
yourself, you show you get in, get out, demonstrate exfiltrate data. cybercriminals have become more professional. that's a trend we're trying to deal with. we'll continue to. i s gotten away from the -- don't know if there was an group, but there's more dedication to getting paid than there used to be. that's a good capitalist. talking about the landscape rom the criminal profession is changing. the russian government came out ecently and stated if you're a cybercriminal and hacking against...
87
87
Sep 8, 2013
09/13
by
CSPAN
tv
eye 87
favorite 0
quote 0
what is hard to understand is why he was why he was not exfiltrated when the operation went down? >> i think it was brilliant on two ways. it is ethically dubious for them to be pirating doctors. >> we're talking about the doctor who helped set up the raid. >> he had no idea he was involved with the bin laden operation. he had no way to know. he thought he was being recruited to vaccinate people in a particular neighborhood and he is working for the cia. they never succeeded in getting dna from the bin laden compound. >> you wrote last week that he is still in prison in pakistan. >> he is not a hero. jonathan pollard is still in the united states prison. it does not matter if friendly countries are spying, they are still spies. the pakistanis had every right to lock up someone who was spying for someone else. the reason i think it is ethically dubious to put it mildly is in pakistan people are beingio workers are routinely assassinated because of the view that they work for the cia. this is a common urban legend. we added to this. it is true. the cia has employed people to do vacc
what is hard to understand is why he was why he was not exfiltrated when the operation went down? >> i think it was brilliant on two ways. it is ethically dubious for them to be pirating doctors. >> we're talking about the doctor who helped set up the raid. >> he had no idea he was involved with the bin laden operation. he had no way to know. he thought he was being recruited to vaccinate people in a particular neighborhood and he is working for the cia. they never succeeded...
96
96
Dec 1, 2013
12/13
by
CSPAN
tv
eye 96
favorite 0
quote 0
three years ago where somebody apparently from russia hacked the georgia ministry and try to exfiltrate the document. and the computer emergency response team in georgia found out something was fishy and they actually put a pdf fire rigged had malware embedded and something fancy like nato agreement. so the russian hacker apparently stepped to the trap and hacked him and took a video of the guy and picture with his web cam. it's a guy sitting there and his wife in -- >> if anybody hasn't seen the photograph. go home tonight and dig it up. it's exactly what you think it would be. [laughter] but it's an interesting point. it didn't solve the attribution problem. they didn't know who it was. they had no idea who of it. >> okay. chad, back in your days in dhs let's say company x got attacked. they call you up and say, i know my government. they are not going attack back on my behalf. because they don't want to escalate to a general cyber war. do you have any problem if we think we know who attacked us if we blow up their servers? >> well, it's a fair question and we -- when we got asked tha
three years ago where somebody apparently from russia hacked the georgia ministry and try to exfiltrate the document. and the computer emergency response team in georgia found out something was fishy and they actually put a pdf fire rigged had malware embedded and something fancy like nato agreement. so the russian hacker apparently stepped to the trap and hacked him and took a video of the guy and picture with his web cam. it's a guy sitting there and his wife in -- >> if anybody hasn't...
86
86
Jun 1, 2013
06/13
by
CSPAN
tv
eye 86
favorite 0
quote 0
that is often was used to exfiltrated this data. host: albert, michigan, independent line. caller: a quick addition to this nonsense, all we have to do is go back to the old system and limit some of the information online. that is all we have to do. host: is it as simple as that? guest: i think we can do better at protecting information. i am not sure that we want to give up the advantages of the internet and technology, it has given us incredible advantages in the world of competitiveness. i think that there are ways to mitigate the risks while leveraging that advantage. that is really where our focus should be, promoting more innovation. as the debate continues it is important to think about policy that will promote innovation and create demand for greater security. in my view some of the bills discussed is not enough. the government should be doing more to encourage companies, particularly those that provide critical services to the communities -- power to hospitals, clean water, safe transportation. it is about 85% a critical infrastructure that is privately owned and o
that is often was used to exfiltrated this data. host: albert, michigan, independent line. caller: a quick addition to this nonsense, all we have to do is go back to the old system and limit some of the information online. that is all we have to do. host: is it as simple as that? guest: i think we can do better at protecting information. i am not sure that we want to give up the advantages of the internet and technology, it has given us incredible advantages in the world of competitiveness. i...
80
80
Apr 22, 2013
04/13
by
CSPAN2
tv
eye 80
favorite 0
quote 0
probably aren't worried as much about a denial of service which is what the banks are experiencing or the exfiltration of data thatpl might u steal corporate espionage or th nature. or the criminal attacks that people want to, you know, attack the banks to try and get some money. we are more worried about, again, the physical damage that would be done to the electric system that would disable the economy and every other part of the economy that depends on electricity. >> host: are there deficiencies in the information sharing abilities? >> guest: well, we are definitely working to improve the information sharing abilities. there is information sharing that is going on right now through, again, through from the government to the industry to the federal regulators and our federal regulator is greatly expanding under the chairman's leadership. its own capabilities. but it needs to be improved, and it needs to focus on exactly what kind of intelligence we need, actionable intelligence. and this is why we have a very, very high level group working with ceos and cios and others working with the secretaries
probably aren't worried as much about a denial of service which is what the banks are experiencing or the exfiltration of data thatpl might u steal corporate espionage or th nature. or the criminal attacks that people want to, you know, attack the banks to try and get some money. we are more worried about, again, the physical damage that would be done to the electric system that would disable the economy and every other part of the economy that depends on electricity. >> host: are there...
59
59
Sep 30, 2013
09/13
by
CSPAN2
tv
eye 59
favorite 0
quote 0
oftentimes when we speak about china and chinese entities, infiltrating targets in the united and exfiltrating information. there are a couple of things that come to mind here. first, they cannot lose it entirely. they adopt have to send somebody in to do that. that's an interesting historic issue. also, i think it's a fair assumption in china we have both scenarios at the same time hire -- [inaudible] engaged in operation intelligence. and companies where individuals take a initiative, essentially a market for stolen ip, intellectual property. we have at the same time entrepreneurial and -- [inaudible] this is a very confusing situation, because, for instance, a lot of discussion in washington, d.c., right now about hacking back. not sitting back and being, you know, robbed of valuable property, intent yule property. but try fog go after the attackers. now it makes a difference who you are going after. whether you're going after a small individual or after an organized state entity. it's difficult to go in to more detail in the debate because so much is -- is not in the public domain, and i s
oftentimes when we speak about china and chinese entities, infiltrating targets in the united and exfiltrating information. there are a couple of things that come to mind here. first, they cannot lose it entirely. they adopt have to send somebody in to do that. that's an interesting historic issue. also, i think it's a fair assumption in china we have both scenarios at the same time hire -- [inaudible] engaged in operation intelligence. and companies where individuals take a initiative,...
77
77
Jun 26, 2013
06/13
by
CSPAN2
tv
eye 77
favorite 0
quote 0
really have as much data as we would like, particularly day that that shows us property that's been exfiltrated back to china who then is successfully able to reverse engineer it who can then productize it, markettize it and show a demonstrable, quantifiable loss of u.s. company market share in china and then when they compete with them globally. there are few cases where we have enough data to make that chain, and it's primarily because there are not really the guidelines for many of those companies to self-report those problems. the sec has tightened up some of their guidelines about reporting loss of shareholder value. but many of the companies i deal with feel that they're not properly indemnified from reporting that. so in many ways, many of them are looking to congress for legislation that will provide them with the indemnification that they need to share information with the government without antitrust problems or even collude with one another and share intrusion data with one another so they can engage in collective defense without legal jeopardy. now, we have begun the talk to the chi
really have as much data as we would like, particularly day that that shows us property that's been exfiltrated back to china who then is successfully able to reverse engineer it who can then productize it, markettize it and show a demonstrable, quantifiable loss of u.s. company market share in china and then when they compete with them globally. there are few cases where we have enough data to make that chain, and it's primarily because there are not really the guidelines for many of those...
55
55
Nov 27, 2013
11/13
by
CSPAN2
tv
eye 55
favorite 0
quote 0
three years ago where somebody apparently from russia hacked the georgia ministry and try to exfiltrate the document. and the computer emergency response team in georgia found out something was fishy and they actually put a pdf fire rigged had malware embedded and something fancy like nato agreement. so the russian hacker apparently stepped to the trap and hacked him and took a video of the guy and picture with his web cam. it's a guy sitting there and his wife in -- >> if anybody hasn't seen the photograph. go home tonight and dig it up. it's exactly what you think it would be. [laughter] but it's an interesting point. it didn't solve the attribution problem. they didn't know who it was. they had no idea who of it. >> okay. chad, back in your days in dhs let's say company x got attacked. they call you up and say, i know my government. they are not going attack back on my behalf. because they don't want to escalate to a general cyber war. do you have any problem if we think we know who attacked us if we blow up their servers? >> well, it's a fair question and we -- when we got asked tha
three years ago where somebody apparently from russia hacked the georgia ministry and try to exfiltrate the document. and the computer emergency response team in georgia found out something was fishy and they actually put a pdf fire rigged had malware embedded and something fancy like nato agreement. so the russian hacker apparently stepped to the trap and hacked him and took a video of the guy and picture with his web cam. it's a guy sitting there and his wife in -- >> if anybody hasn't...
82
82
May 16, 2013
05/13
by
CSPAN2
tv
eye 82
favorite 0
quote 0
become increasingly adept at exploiting weaknesses in our computer networks, and once inside they can exfiltrate the state secrets and trade secrets. and we also faced persistent threats from hackers for profit, organized criminal cyber syndicates, and activist groups. as i said in the past, i believe that the cyberthreat may well eclipse the terrorist threat in years to come. and in response we're strengthening our cyber capabilities in the same way we enhanced our intelligence and national security capabilities in the wake of september 11 attacks. the cyber division is focused on computer intrusions and network attacks. fbi special agents work side-by-side with federal, state and local counterparts on cyber task forces in each of our 56 field offices, working to detect and disrupt computer intrusions. we have increased the size and scope of the national cyber investigator joint task force, which brings together 19 law enforcement, military and intelligence agencies to stop current attacks and prevent future attacks. and together with dhs and nsa, we have clarified the lanes and roads for our c
become increasingly adept at exploiting weaknesses in our computer networks, and once inside they can exfiltrate the state secrets and trade secrets. and we also faced persistent threats from hackers for profit, organized criminal cyber syndicates, and activist groups. as i said in the past, i believe that the cyberthreat may well eclipse the terrorist threat in years to come. and in response we're strengthening our cyber capabilities in the same way we enhanced our intelligence and national...
68
68
Aug 29, 2013
08/13
by
FBC
tv
eye 68
favorite 0
quote 1
first of all, there's data exfiltrations. for years, companies and as for -- government operatives in china come and take information, take intellectual capital, take pa tend -- neil: done that with our intelligence. >> creating an empire for themselves. neil: it's tick for tack. if you don't see your point, earlier in the break, you know, attack us, easily, we eventually find out who did it, we attack back. how do you respond to a hack attack? >> particularly, today, because the technology evolves almost minute-by-minute, and now you can spoof your address of where you are coming from, and there's a million different cutouts you can use to make sure you mask where you are coming from. the nsa enu.s. are good at finding you, but, again, it's not a clear case of oh, this came from this person sitting here. neil: if you're not ashamed to say you're the syria electronic army, yao not coming from ireland. what's the purpose there? >> that's publicity. we can reach you across your ocean. neil: attack us, lob missiles at us, but we
first of all, there's data exfiltrations. for years, companies and as for -- government operatives in china come and take information, take intellectual capital, take pa tend -- neil: done that with our intelligence. >> creating an empire for themselves. neil: it's tick for tack. if you don't see your point, earlier in the break, you know, attack us, easily, we eventually find out who did it, we attack back. how do you respond to a hack attack? >> particularly, today, because the...
84
84
Jun 13, 2013
06/13
by
FBC
tv
eye 84
favorite 0
quote 0
i think that would be something you would have to look at because he did exfiltrate a lot of data in a very short period of time where most nobody thought he could do that. so the issue is, are there other people in the nsa up in the food chain who helped him? maybe also in, you know, there are a lot of federal agencies in hawaii where he was. this is a critical place for china. this is where we do our surveillance of china. so we have to start thinking about all of this. when snowden runs prematurely out of hawaii, we have a lot of questions we've got to ask. and what he has been doing in terms of showing this operational detail is absolutely critical. melissa: your sources tell you that the fbi office in hawaii has been thoroughly penetrated? >> yeah, perhaps. melissa: really? what does that mean? >> that means essentially he has been tipped off and that he, he fled at the time he did because he was told it was time to go. melissa: there are others in hawaii helping him? you're saying hawaii is a place that is -- >> we've always known all along that china has devote ad lot of atten
i think that would be something you would have to look at because he did exfiltrate a lot of data in a very short period of time where most nobody thought he could do that. so the issue is, are there other people in the nsa up in the food chain who helped him? maybe also in, you know, there are a lot of federal agencies in hawaii where he was. this is a critical place for china. this is where we do our surveillance of china. so we have to start thinking about all of this. when snowden runs...
105
105
tv
eye 105
favorite 0
quote 0
so, i really, the concern really should be the exfiltration of data from our government, from our clear defense contractors, from all of our manufacturing, organizations and u.s. commercial space writ large. that to me is a long-term problem for the united states in terms of our competitive advantage and our ability to compete at a national level or an international level economically. that's a significant impact. ashley: is there any way we can totally prevent this. or is this something we have to try to keep up with and try to prevent as best as possible? >> the most significant, most substantial attackers are going to get on a network. our networks are so vast. they ride on inherently insecure infrastructure which is the internet. it is really important for us to identify and detect when these attacks occur, and infiltrations occur and look to mitigate the consequences from these attacks. right now, the risk to foreign governments, when they steal this data is pretty close because there is no impact on them. ashley: right. >> the benefit is substantially high. until we invert that, t
so, i really, the concern really should be the exfiltration of data from our government, from our clear defense contractors, from all of our manufacturing, organizations and u.s. commercial space writ large. that to me is a long-term problem for the united states in terms of our competitive advantage and our ability to compete at a national level or an international level economically. that's a significant impact. ashley: is there any way we can totally prevent this. or is this something we...
120
120
Feb 27, 2013
02/13
by
KPIX
tv
eye 120
favorite 0
quote 0
" in spy talk from under the noses of crowds chanting "death to america." >> we're doing an exfiltration for a group of people, you need a cover story. >> reporter: cover story? you needed a lie. >> yeah, a lie. maybe it's not credible, but it's so strange that it couldn't be false. it has to be true. >> reporter: so mendez came up with a bogus movie called "argo," complete with ads in "variety" and business cards. >> well, we have to invent some offices and if you go there, you call him up, you answer the phone. >> reporter: you had an office in hollywood. >> we decided to call it studio 6 productions. >> my name is tony mendez. >> reporter: both as played by affleck and in real life, mendez went into tehran disguised as a producer scouting locations for his movie and turned the 6 americans who were hiding in the home of a canadian diplomat into members of his crew. outfitted with false identities, they passed through customs at the tehran airport and flew home to a joyous welcome. mendez had pulled off the perfect caper. >> it's like robbing banks except in our case, we had made it loo
" in spy talk from under the noses of crowds chanting "death to america." >> we're doing an exfiltration for a group of people, you need a cover story. >> reporter: cover story? you needed a lie. >> yeah, a lie. maybe it's not credible, but it's so strange that it couldn't be false. it has to be true. >> reporter: so mendez came up with a bogus movie called "argo," complete with ads in "variety" and business cards. >> well, we...
230
230
May 18, 2013
05/13
by
KPIX
tv
eye 230
favorite 0
quote 0
probably weren't meant to find this but then they said it's been accessed and information has been ex exfiltrated from it. and during the court this week to see if they can get the ruling of suicide changed. >> it's a fascinating story on many layers. >> many layers. >>> now here's a look at your weather for the weekend. >>> and up next if you're texting while driving, you're 23 more times likely to crash than someone who isn't. the problem is so bad now even the cell phone companies are getting involved. we'll show you the big new ad campaign to stop it, ahead. you're watching "cbs this morning" saturday. k9 advantix ii not only kills fleas and ticks, it also repels most ticks before they can attach. the leading brand kills, but doesn't repel. a tick that isn't repelled or killed may attach and make a meal of us. get veterinarian recommended k9 advantix ii! if you're seeing spots before your eyes... it's time... for aveeno® positively radiant® face moisturizer. [ female announcer ] only aveeno® has an active naturals total soy formula that instantly brightens skin. and helps reduce the look o
probably weren't meant to find this but then they said it's been accessed and information has been ex exfiltrated from it. and during the court this week to see if they can get the ruling of suicide changed. >> it's a fascinating story on many layers. >> many layers. >>> now here's a look at your weather for the weekend. >>> and up next if you're texting while driving, you're 23 more times likely to crash than someone who isn't. the problem is so bad now even the...
90
90
Nov 15, 2013
11/13
by
KQED
tv
eye 90
favorite 0
quote 0
he left believing that she had planned this exfiltration route for him and that she will come and get him but i think it becomes clear to him she might not know where he is. and i think that's the sense more than ever now we're in dante's nine circles of hell and i think he's descending those circles of hell and he -- he's not sure if carrie has abandoned him, whether anybody knows where he is. >> you need to leave. go out there. i need to get out of here. >> where? where you think you go? >> out. >> out? out where? >> to the next place. i've been taken from one place to the next, from here to there. >> you were nearly killed. >> i can't stay here. >> why? >> it's -- >> it's not good enough. >> no, i didn't mean that. >> not good for enough for you. huh? why? because of that thief? he upset you? >> i appreciate all you've done for me, stock? but i'm better now. >> what does that mean? >> it means i can make it on my own. i just need to get to the next place. >> there's no next place! >> what? there has to be! >> no. >> does carrie know i'm here? does she? >> no one can know. >> we hav
he left believing that she had planned this exfiltration route for him and that she will come and get him but i think it becomes clear to him she might not know where he is. and i think that's the sense more than ever now we're in dante's nine circles of hell and i think he's descending those circles of hell and he -- he's not sure if carrie has abandoned him, whether anybody knows where he is. >> you need to leave. go out there. i need to get out of here. >> where? where you think...
55
55
Jun 12, 2013
06/13
by
KQED
tv
eye 55
favorite 0
quote 0
. >> he was good enough to exfiltrate a substantial amount of classified eci, and make it out of the country and into a country with hostile jurisdiction. it took a lot of planning and skill i'd say. his motivation i think is exactly what he said. you can think what he did was good or bad for the country, but it is just self evidently from his behavior and from his knowledge of his likely faith, something that was done to him out of idealistic purposes. >> rose: what do you think about this guy, personalize it for a while. >> if you look at the profile i go a step back which is here's a guy who could not excel at school, didn't seem to stay in a job for very long and hopped from thing to thing, i don't know him the way barton does but on paper he seems fairly undistinguished. and then what you have is a much more common phenomenon which is a guy who seems to be again on paper. i haven't spoken to him. extremely unremarkable, all of a sudden becomes remarkable because he does something to bring attention to himself. >> rose: motivated by attention? >> well he's got a little propensity
. >> he was good enough to exfiltrate a substantial amount of classified eci, and make it out of the country and into a country with hostile jurisdiction. it took a lot of planning and skill i'd say. his motivation i think is exactly what he said. you can think what he did was good or bad for the country, but it is just self evidently from his behavior and from his knowledge of his likely faith, something that was done to him out of idealistic purposes. >> rose: what do you think...
SFGTV2: San Francisco Government Television
7
7.0
Apr 9, 2013
04/13
by
SFGTV2
quote
eye 7
favorite 0
quote 1
we try to stop, not only infiltration, but exfiltration, where sewage would actually leak out of the pipe. the head is larger, so it breaks away the old pipe and allows the new pipe to come in behind it. griffin: we are saving about 67% of the cost of actually digging old pipe up. clyne: it's less invasive than an open-cut process, where you would open the whole trench up and replace the pipe. it's called "trenchless" technology, so... that's as good as it gets. griffin: we don't have to dig up everyone's yard, and we refurbish that pipe at a much-reduced cost. another technique, the cured-in-place lining. it's equivalent to putting a large sock through the existing sewer. we form a new pipe inside the old pipe, and therefore we seal up all of the defects that allow rainwater to come in. hunter: we repair
we try to stop, not only infiltration, but exfiltration, where sewage would actually leak out of the pipe. the head is larger, so it breaks away the old pipe and allows the new pipe to come in behind it. griffin: we are saving about 67% of the cost of actually digging old pipe up. clyne: it's less invasive than an open-cut process, where you would open the whole trench up and replace the pipe. it's called "trenchless" technology, so... that's as good as it gets. griffin: we don't have...