1 00:00:00,120 --> 00:00:03,199 Speaker 1: Now it's time for our daily Bloomberg Law Brieve, exploring 2 00:00:03,279 --> 00:00:05,840 Speaker 1: legal issues in the news, brought to you by American 3 00:00:05,960 --> 00:00:10,240 Speaker 1: Arbitration Association, International Trade or Business Dispute Result Faster with 4 00:00:10,280 --> 00:00:13,960 Speaker 1: the International Center for Dispute Resolution, the leader in alternative 5 00:00:14,000 --> 00:00:18,480 Speaker 1: dispute resolution around the world i c d R dot org. Today, 6 00:00:18,480 --> 00:00:21,840 Speaker 1: Bloomberg Law hosts Tun Grassoe and Michael Best discuss Wiki 7 00:00:21,920 --> 00:00:25,000 Speaker 1: League reports on ci A cyber hacking, which, if true, 8 00:00:25,360 --> 00:00:28,360 Speaker 1: show that the CIA can use personal technology devices to 9 00:00:28,440 --> 00:00:32,760 Speaker 1: eavesdrop on users. They speak to Stephen Letock, a professor 10 00:00:32,840 --> 00:00:35,320 Speaker 1: at the University of Texas School of Law, and William Banks, 11 00:00:35,600 --> 00:00:38,600 Speaker 1: director of the Institute for National Security and counter Terrorism 12 00:00:38,840 --> 00:00:43,560 Speaker 1: at Syracuse University College of Law. Stephen a blogger. Nicholas Weaver, 13 00:00:43,720 --> 00:00:48,120 Speaker 1: a security researcher at the International Computer Science Institute in Berkeley, said, 14 00:00:48,159 --> 00:00:50,720 Speaker 1: the story here isn't that the CIA hacks people. Of 15 00:00:50,840 --> 00:00:54,440 Speaker 1: course they do. Taxpayers would be right to be annoyed 16 00:00:54,560 --> 00:00:56,840 Speaker 1: if that warrant the case. Do you agree with that? 17 00:00:57,760 --> 00:00:59,560 Speaker 1: I do? I mean, I think part of the real 18 00:00:59,640 --> 00:01:03,200 Speaker 1: story here is, as Bill suggests, the remarkable fact that 19 00:01:03,280 --> 00:01:06,399 Speaker 1: WikiLeaks was able to get its hands on if these 20 00:01:06,440 --> 00:01:09,080 Speaker 1: are all accurate over eight thousand documents. This is just 21 00:01:09,200 --> 00:01:11,119 Speaker 1: the first of what's promised to be six or seven 22 00:01:11,160 --> 00:01:13,720 Speaker 1: different disclosures. But John also, I think it's not a 23 00:01:13,800 --> 00:01:16,360 Speaker 1: surprise that the CIA has the ability to do this. 24 00:01:16,440 --> 00:01:19,200 Speaker 1: I think the surprise is, if this holds up, if 25 00:01:19,240 --> 00:01:24,840 Speaker 1: these are really authentic, just how widespread and comprehensive um 26 00:01:24,959 --> 00:01:28,200 Speaker 1: the CIA's toolkit is, and basically just how able the 27 00:01:28,240 --> 00:01:31,640 Speaker 1: CIA is to defeat um or if not defeat at 28 00:01:31,720 --> 00:01:35,360 Speaker 1: least bypass um, just about all of the security measures 29 00:01:35,760 --> 00:01:38,319 Speaker 1: that many of us have even started to take, from 30 00:01:38,360 --> 00:01:42,640 Speaker 1: granting on our phones, on our computers, on our televisions, 31 00:01:42,680 --> 00:01:45,080 Speaker 1: in our cars. Um. If they're really this easy to 32 00:01:45,160 --> 00:01:47,920 Speaker 1: defeat by the CIA, it makes you wonder, you know, 33 00:01:48,080 --> 00:01:52,960 Speaker 1: who else could could manipulate those capabilities for for mischief? Well, Bill, 34 00:01:53,120 --> 00:01:57,320 Speaker 1: what is the danger here in terms of what other entities, 35 00:01:57,520 --> 00:01:59,600 Speaker 1: other countries, other hackers might be able to do with 36 00:01:59,680 --> 00:02:02,040 Speaker 1: the intra nation that WikiLeaks has put out. It's a 37 00:02:02,160 --> 00:02:06,240 Speaker 1: real danger. That's a good question. I mean, so the 38 00:02:06,360 --> 00:02:10,720 Speaker 1: CIA needs to share what it's known about these vulnerabilities 39 00:02:10,840 --> 00:02:13,799 Speaker 1: with the companies that are impacted. You know that the 40 00:02:13,919 --> 00:02:17,200 Speaker 1: apples and the and the other companies that make the 41 00:02:17,280 --> 00:02:20,000 Speaker 1: devices that we all use need to do a whole 42 00:02:20,040 --> 00:02:22,440 Speaker 1: bunch of a patches here as quickly as they can, 43 00:02:23,000 --> 00:02:26,280 Speaker 1: which will just lead to the next generation of vulnerabilities. 44 00:02:26,320 --> 00:02:29,400 Speaker 1: Of course, this is serve a cat and mouse game. Uh. 45 00:02:29,520 --> 00:02:32,519 Speaker 1: The offense has always been ahead of the defense in 46 00:02:32,600 --> 00:02:37,240 Speaker 1: this world, as this example illustrates, and now that there 47 00:02:37,240 --> 00:02:39,400 Speaker 1: will be a period where where we'll have to be 48 00:02:39,520 --> 00:02:44,679 Speaker 1: playing catchup. CIA has lost a tremendous amount of their 49 00:02:44,800 --> 00:02:47,359 Speaker 1: capabilities here and they're gonna have to rebuild those as well, 50 00:02:48,520 --> 00:02:52,360 Speaker 1: apart from working hard to shore up their operational security. 51 00:02:53,680 --> 00:02:55,840 Speaker 1: And that is William Banks, director of the Institute for 52 00:02:56,040 --> 00:02:59,799 Speaker 1: National Security and counter Terrorism at Syracuse University College of Law, 53 00:03:00,120 --> 00:03:03,080 Speaker 1: and Stephen Vladdock, a professor at the University of Texas 54 00:03:03,080 --> 00:03:06,120 Speaker 1: School of Law, speaking to Bloomberg, Lahoe, Stun Grasso, and 55 00:03:06,200 --> 00:03:09,000 Speaker 1: Michael Best. You can listen to Bloomberg Law weekdays at 56 00:03:09,080 --> 00:03:13,080 Speaker 1: one pm Wall Street Time here on Bloomberg Radio and Now. 57 00:03:13,120 --> 00:03:16,560 Speaker 1: Among the top legal stories from Bloomberg Law, shareholders are 58 00:03:16,639 --> 00:03:19,640 Speaker 1: suing a Yahoo and Verizon over a massive data breach. 59 00:03:19,720 --> 00:03:23,160 Speaker 1: The suit claims that senior executives at Yahoo knew about 60 00:03:23,240 --> 00:03:27,680 Speaker 1: the hack attack Ineen, but didn't disclose it until last September. 61 00:03:28,120 --> 00:03:31,239 Speaker 1: That was two months after Yahoo's proposed acquisition by Verizon. 62 00:03:31,560 --> 00:03:34,320 Speaker 1: After Yahoo announced the breach, the two companies negotiated as 63 00:03:34,360 --> 00:03:37,360 Speaker 1: three hundred fifty million dollar reduction in its purchase price. 64 00:03:37,680 --> 00:03:40,760 Speaker 1: No response to the lawsuit yet from either company. It's 65 00:03:40,760 --> 00:03:43,920 Speaker 1: being called South Korea's Trial of the century. Samsung vice 66 00:03:44,000 --> 00:03:47,440 Speaker 1: chairman j Y Lee went on trial in Soul today. 67 00:03:47,760 --> 00:03:50,120 Speaker 1: Prosecutors will try to prove the billionaire conspired to pay 68 00:03:50,200 --> 00:03:53,760 Speaker 1: millions to a confidant of South Korea's president to secure 69 00:03:53,840 --> 00:03:57,040 Speaker 1: control of the world's largest smartphone maker. Lee has denied 70 00:03:57,200 --> 00:04:01,000 Speaker 1: any wrongdoing. As this morning's bloom Law Brief, you can 71 00:04:01,000 --> 00:04:03,600 Speaker 1: find more illegal news at Bloomberg Law dot com and 72 00:04:03,680 --> 00:04:07,480 Speaker 1: Bloomberg BNA dot com. Attorneys will find exceptional legal research 73 00:04:07,560 --> 00:04:10,880 Speaker 1: and business development tools there as well. Visit Bloomberg Law 74 00:04:10,960 --> 00:04:15,040 Speaker 1: dot com and Bloomberg BNA dot com for more information.