quote by Dutch Ruppersberger

People ask me all the time, 'What keeps you up at night?' And I say, 'Spicy People ask me all the time, 'What keeps you up at night?' And I say, 'Spicy Mexican food, weapons of mass destruction, and cyber attacks.'

— Dutch Ruppersberger

Courageous Cyber Attacks quotations

Cyber attacks quote When you build in silence, people don't know what to attack.

When you build in silence, people don't know what to attack.

The potential for the next Pearl Harbor could very well be a cyber-attack.

If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation.

Cyber attacks quote Rise up and attack the day with enthusiasm.

Rise up and attack the day with enthusiasm.

27

I think we have started accelerating over the past years.

It's a modernization of NATO. It's at air, it's at sea, it's undersea, it's in cyber. Estonia in 2007, hit by Russian cyber-attacks. So what you see there with those exercises are critical.

If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation.

The United States is more reliant on the technical systems.

We're more reliant on the critical infrastructure of the internet than any other nation out there. And when there's such a low barrier to entering the domain of cyber-attacks we're starting a fight that we can't win.

Cyber attacks quote Attack life, It's going to kill you anyways

Attack life, It's going to kill you anyways

15

Cyber Command is supposed to be defending our critical infrastructure at home, but they are spending so much time looking at how to attack networks, how to break systems, and how to turn things off. I don't think it adds up as representing a defensive team.

The attack on the law firms and attacks like that are industrial espionage, searching for copyrighted materials to lift and so on; it's not quite the same as cyber-warfare. They are regarded as related. The Chinese are trying to steal an economic march on the West, which is a consequence of the fact that we outsourced all of our manufacturing to China in the 1990s.

I think that all of the cyber attacks that are taking place, but particularly this - the Russian one, had a profound impact on the American system, on our political process, on our - it invaded the space of our election. The releasing on a regular basis of one party's stolen emails had an impact, and I think that other things also had an impact.

Cyber attacks quote Attacking people with disabilities is the lowest display of power I can think of

Attacking people with disabilities is the lowest display of power I can think of.

Bob Mueller for the FBI, myself, met with a particular group of executives that have major roles in the so-called ISPs, the Internet service providers, what they could possibly do. We have met with leaders in private industry in terms of the core critical infrastructure of the country as to what they can possibly do with cyber-attacks.

What we're going to do with cyber-attacks - and we have already actually started - we started well before the executive order actually was issued - is working with the private sector, determine how best to share information, because, you know, we can't help until we know that there has actually been an attempted intrusion or attack. Information-sharing piece is very important.

It's always been government's role to protect the security of the nation.

And cyber-attacks is a security issue, from our perspective. And it's a security issue of particular concern with respect to the nation's core critical infrastructure, the infrastructure everyone relies on, the energy sector, the telecommunications sector, the banking sector.

Cyber attacks quote As long as the problems of the poor are not radically resolved by rejecting the

As long as the problems of the poor are not radically resolved by rejecting the absolute autonomy of markets and financial speculation and by attacking the structural causes of inequality, no solution will be found for the world's problems or, for that matter, to any problems.

There are a number of countries that we see cyber-attacks emanating from.

And, again, they can be just individuals who are located in the country. But three that I think are of special concern would be Iran, would be Russia, and China.

I think what we are confronting now is a new war of ideas.

It's not communism versus capitalism, but it is authoritarianism versus democracy and representative government. And that is a threat that here in Europe, they feel acutely. They've seen their countries interfered with, bombarded by cyber-attacks, by Russian propaganda, indeed, by Russian troops.

In terms of my conversations with [Vladimir] Putin, these are conversations that took place before the election. As I indicated, there has been very clear proof that they have engaged in cyber attacks. This isn't new. It's not unique to Russia. There are a number of states where we've seen low-level cyber attacks and industrial espionage and, you know, other behavior that we think should be out of bounds.

I will also ask my secretary of defense and joint chiefs to present recommendations for strengthening and augmenting our cyber command. As a deterrent against attacks on our critical resources, the United States must possess, and has to, the unquestioned capacity to launch crippling cyber counterattacks. And I mean crippling. Crippling.

Cyber attacks from foreign governments, especially China, Russia, North Korea along with non-state terrorist actors and organized criminal groups constitute one of our most critical national security concerns. They're leaning everything about us and we don't have - wanna have any servers in the basements, by the way folks.

I know Donald's [Trump] very praiseworthy of Vladimir Putin, but Putin is playing a really tough, long game here. And one of the things he's done is to let loose cyber attackers to hack into government files, to hack into personal files, hack into the Democratic National Committee. And we recently have learned that, you know, that this is one of their preferred methods of trying to wreak havoc and collect information.

Increasingly, we are seeing cyber attacks coming from states, organs of states.

The most recent and troubling of these has been Russia.

There's no doubt now that Russia has used cyber attacks against all kinds of organizations in America, and I am deeply concerned about this.

It ends a 40-year ban on exporting U.

S. oil. It's changed - it's included in its cyber-security legislation - that says to private companies, hey, if you share with us your data on your cyber-attacks, your potential cyber-attacks, we'll give you liability protection. And they authorized a health care program for 9/11 responders for 75 years to cover the length of their lifespans.

What if someone hit us with an EMP, cyber-attack, and dirty bomb all at once? That would be pretty bad.

I have done business in China for 25 years, so I know that in order to get China to cooperate with us, we must first actually retaliate against their cyber-attacks so they know we're serious. We have to push back on their desire to control the trade route through the South China Sea through which flows $5 trillion worth of goods and services every year.

In our efforts to battle terrorism and cyber attacks and biological weapons, all of us must be extremely aggressive. We must protect our people from danger and keep America safe and free.

The bare bones tools for a cyber-attack are to identify a vulnerability in the system you want to gain access to or you want to subvert or you want to deny, destroy, or degrade, and then to exploit it, which means to send codes, deliver code to that system somehow and get that code to that vulnerability, to that crack in their wall, jam it in there, and then have it execute.

Custom developed digital weapons, cyber weapons nowadays typically chain together a number of zero-day exploits that are targeted against the specific site, the specific target that they want to hit. But it depends, this level of sophistication, on the budget and the quality of the actor who's instigating the attack. If it's a country that's less poor or less sophisticated, it'll be a less sophisticated attack.

We reject techniques like torture regardless of whether they're effective or ineffective because they are barbaric and harmful on a broad scale. It's the same thing with cyber warfare. We should never be attacking hospitals. We should never be taking down power plants unless that is absolutely necessary to ensure our continued existence as a free people.

What we need to do is we need to create new international standards of behavior - not just national laws, because this is a global problem. We can't just fix it in the United States, because there are other countries that don't follow U.S. laws. We have to create international standards that say that cyber attacks should only ever occur when it is absolutely necessary.

If you ask anybody at Cyber Command or look at any of the job listings for openings for their positions, you'll see that the one thing they don't prioritize is computer network defense. It's all about computer network attack and computer network exploitation at Cyber Command.

The majority of terrorist attacks that have been disrupted in the United States have been disrupted due to things like the Time Square bomber, who was caught by a hotdog vendor, not a mass surveillance program, not a cyber-espionage campaign.

When people conceptualize a cyber-attack, they do tend to think about parts of the critical infrastructure like power plants, water supplies, and similar sort of heavy infrastructure, critical infrastructure areas. And they could be hit, as long as they're network connected, as long as they have some kind of systems that interact with them that could be manipulated from internet connection.

When it comes to cyber warfare, we have more to lose than any other nation on earth. The technical sector is the backbone of the American economy, and if we start engaging in these kind of behaviors, in these kind of attacks, we're setting a standard, we're creating a new international norm of behavior that says this is what nations do. This is what developed nations do.

I think the public still isn't aware of the frequency with which the cyber-attacks, as they're being called in the press, are being used by governments around the world, not just the US.

Cyber attacks are not what makes the cool war cool.

As a strategic matter, they do not differ fundamentally from older tools of espionage and sabotage.

The challenges posed by threats like terrorism, proliferation, and cyber attacks are not going away any time soon, and for our intelligence community to be effective over the long haul, we must maintain the trust of the American people and people around the world.

famous quotes