Clint Watts Breaks Down Latest On Colonial Pipeline Ransomware Attack

NBC National Security Analyst and Distinguished Research Fellow at the Foreign Policy Research Institute, Clint Watts, joined Stephanie Ruhle to discuss the country's security vulnerabilities in the wake of a wave of cyberattacks. Plus, NBC's Pete Williams shares his latest reporting on the Colonial Pipeline ransomware hack.
» Subscribe to MSNBC:

About: MSNBC is the premier destination for in-depth analysis of daily headlines, insightful political commentary and informed perspectives. Reaching more than 95 million households worldwide, MSNBC offers a full schedule of live news coverage, political opinions and award-winning documentary programming — 24 hours a day, 7 days a week.

Connect with MSNBC Online
Visit msnbc.com:
Subscribe to MSNBC Newsletter: MSNBC.com/NewslettersYouTube
Find MSNBC on Facebook:
Follow MSNBC on Twitter:
Follow MSNBC on Instagram:

#Pipeline #Colonial #Ransomware

29 comments

  1. NELLIS AIR FORCE BASE
    sergeant Robert Justin alford green where is my two daughters karee and Jahmela and my 7 grandchildren and what have you done to them.

  2. Oil companies should no longer receive any exemption on taxes or subsidies as long as those companies don’t take network security lightly, absolutely no taxpayers money should be used to help as they don’t want government intervention.

  3. Its cheaper to have a well-engineered security system with multiple Authenticators on all entry points. “ they didn’t realize”= “I didn’t do my job”

  4. This is purely a failure of leadership…
    The CEO must be removed..
    YOU GET WHAT YOU PAY FOR..
    He didn’t do the job…

  5. C’mon. Be nice to the dear little CEO. He was only paid many millions per year to do his job. We should have paid him even more many millions to do his job. CEOs are never paid enough, poor little guys. Be nice to them. Just a few mansions, private jets, islands, only a dozen super luxury cars….. is that enough??? C’mon.

    1. Dont forget to mention the provision in their contracts that clearly state their failure is not their failure and needs to be rewarded with a golden handshake or parachute!

  6. “..10 And he said unto me, Seal not the words of the prophecy of this book; for the time is at hand.

    11 Let the unrighteous still do unrighteousness; let the unclean still be defiled; let the righteous still do righteousness, and let the holy one still be sanctified.

    12 Behold, I am coming soon, and my reward is with me, that I may reward every man according to his works.

    13 I am Alpha and Omega, the beginning and the end, the First and the Last.

    14 Blessed are those who keep his commandments, that they may have a right to the tree of life, and enter the city by the gate.

    15 But outside are dogs, and sorcerers, and fornicators, and murderers, and idolaters, and everyone who loves and does unrighteousness.

    16 I, Jesus, have sent my angel to bear witness to you in the churches. I am the root and descendant of David, the bright and morning star.

    17 And the Spirit and the bride say, Come! And let him who hears say: Come! Let him who is thirsty come, and let him who is desirous take the water of life freely.

    18 And I also bear witness to everyone who hears the words of the prophecy of this book: If anyone adds anything to them, God will put on him the plagues that are written in this book;

    19 And if anyone takes away anything from the words of the book of this prophecy, God will take away from him his part in the book of life, and in t7he holy city, and in what is written in this book.

    20 He who bears witness to these things says, ” I am coming soon.” Amen to that. Hey, come on, Lord Jesus!

    21 The grace of our Lord Jesus Christ is with you all. Amen to that.”

    Revelation of John the Evangelist, 22:10-21

    “And he says, Repent, for the kingdom of heaven is at hand” (Matthew 3: 2).

    “But as it was in the days of Noah, so it will be in the coming of the Son of Man: for as in the days before the flood they ate, and drank, and married, and were married, until the day Noah entered the ark, and did not think until the flood came and destroyed them all, so will be the coming of the Son of Man; then there will be two in the field: one is taken, and the other is left; two grinding in the millstones: one is taken, and the other is left. Watch therefore, for you do not know at what hour your Lord will come”(Matthew 24: 32)

  7. Given the speed with which gas prices rose and the slow rate of decline, I am beginning to suspect that the oil companies actually made a profit on this. If there is no loss, there is no incentive to invest in better security.

  8. Cybercriminals should be caught for their ransomware attacks. Cybercriminals should be caught red-handed.

  9. This is one more right wing problem. Privatization without sufficient regulation and sufficient funds to enable and enforce those regulations leaves us vulnerable to serial cyber attacks. We are all perfectly happy with socialized police forces and fire departments. Perhaps a little more socialization of our infrastructure would make us all safer.

  10. IIoT is hackable at 4G, waaaay harder with 5G … and wasn’t the hack to the billing system, not delivery? Just checking.

    1. @Tavernum China has 6G in progress, keep rolling … security is having no backdoors on hardware, this was a software hack, the pumps were controllable, not the billing, perfect crime or false-flag?

    2. @Tom Mallard Japan was working on 6G when 4G was launched. Probably South Korea is working on 6G as well

  11. In the face of direct threats to the infrastructure, Republicans, Joe Manchin and Kirsten Sinema sit idly by protecting the filibuster? WTF??

  12. “Don’t put all of your eggs in one basket” is a very old saying.
    We’re depending upon a few large companies instead of several thousand smaller companies for just about everything.
    Bigger might (or might not!) be cheaper, but tens of thousands of smaller energy sources could easily be made into a harder target, and we will be attacked again and again in the future.

  13. Didn’t they end up using a backup anyway? That the information given by the hackers to un encrypt everything was too slow?

  14. This system operated manually before computers, and there is still zero reason that it
    is even connected to the Internet, as opposed to being a private network.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.