4.1 • 2.2K Ratings
🗓️ 20 April 2021
⏱️ ? minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Welcome to Meet the Press Reports, where each week we do a deep dive into a single subject. |
0:17.0 | And today, in the second of three episodes, focused on key threats to our nation, it's |
0:21.7 | cybersecurity. |
0:23.5 | America's cyber war is escalating, and the more technologically advanced we become, the |
0:28.3 | more vulnerable we are. |
0:31.3 | Everything from cell phones in our hand to the electrical grid to our military is run |
0:36.4 | by software code. |
0:38.7 | Code that's written by humans, and all the things that go wrong there. |
0:43.6 | So what happens when a human makes a mistake in that code? |
0:46.6 | And what happens when countries can use that human error as a weapon? |
0:51.3 | Well, sadly, the answer is they find ways to exploit it. |
0:54.9 | By secretly gaining access to the technology that makes our world work, you've possibly |
0:59.6 | never heard of zero days. |
1:01.9 | But here's why you should know them. |
1:04.0 | It's the term for weaknesses in code that are so dangerous that companies responsible |
1:10.5 | for managing the code have zero days to fix it before it's a problem. |
1:14.8 | It's an immediate problem. |
1:16.3 | A zero day attack can allow hackers to embed inside your software permanently. |
1:21.5 | That's what's so scary here. |
1:23.1 | Getting off medical equipment if they'd like to. |
1:25.8 | Or how about releasing water from dams? |
1:29.0 | Or simply poisoning our drinking water? |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Chuck Todd, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Chuck Todd and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.