• yesterday
Panayam kay DICT spokesperson at Assistant Secretary for Legal Affairs Renato Paraiso hinggil sa cyber attacks umano sa mga ahensya ng gobyerno

For more news, visit:
►https://www.ptvnews.ph/

Subscribe to our DailyMotion Channel:
►http://www.dailymotion.com/peoples-television-incorporated

Subscribe to our YouTube channel:
►http://www.youtube.com/ptvphilippines

Like our Facebook pages:
►PTV: http://facebook.com/PTVph
►Rise and Shine Pilipinas: https://www.facebook.com/riseandshinepilipinas

Follow us on Twitter:
►http://twitter.com/PTVph

Follow us on Instagram:
►https://www.instagram.com/ptvph

Watch our livestream on:
►http://ptvnews.ph/livestream/
►https://www.dailymotion.com/PTVPhilippines

Watch our News Programs, every Mondays to Fridays

Rise and Shine Pilipinas - 6:00 - 7:00 am | 7:30 - 8:00 am
Balitang Pambansa - 7:00 - 7:30 am | 12:00 - 12:30 pm |
6:00 - 6:30pm | 9:30 - 10:00 pm
PTV Sports - 8:00 - 9:00 am
Bagong Pilipinas Ngayon - 12:30 - 1:00 pm
Sentro Balita - 1:00 pm - 2:00 pm
Ulat Bayan - 6:30 pm - 7:00 pm
PTV News Tonight - 10:00 pm - 10:30 pm

Saturday & Sunday:
►Sentro Balita Weekend - 1:30 - 2:00 pm
►Ulat Bayan Weekend - 6:15 pm - 7:00 pm

Category

🗞
News
Transcript
00:00We have on the line, DICT spokesperson and Assistant Secretary for Legal Affairs, Renato Paraiso.
00:07Good morning to you, Asec.
00:10Good morning to you, to all the viewers and listeners. Good morning.
00:16Okay, Asec, please clarify. Is it true that the number of cyberattacks against government agencies has reached millions?
00:25That's right. On any given day, it ranges from a few hundred thousand attempts to a million attempts a day.
00:35That's what we experience on a daily basis.
00:39Our systems are being attacked.
00:42Okay, sir. Is it true which country these hackers came from?
00:51It is true that we have two ways to identify the threat actors.
00:58First is the IP addresses that we see.
01:02But more importantly, because of documented procedures, modus operandi and methodology,
01:11we can pinpoint these threat actors to a specific group and their acquaintances, even whether they are foreign nationals or locals.
01:23Okay. Again, sir, let me clarify. Most of the hackings are from China. Is that correct?
01:30We cannot say most, but there are many.
01:34But we have to remember that our attempts come from various countries, various individuals and various groups.
01:45Okay, sir. What is the protocol when this happens?
01:48Do you also contact your counterparts in the countries where hacking was committed?
01:56Yes. You will remember that in the middle of last year, we identified the threat actors.
02:04Their IP addresses came from China.
02:10We were surprised that it came from government facilities.
02:18The methodology we used came from known Chinese threat actors.
02:25We gave this information to Basan China.
02:28They denied that it is a state-sponsored hacking activities.
02:35We asked for their help since they denied that it's state-sponsored.
02:41They should help us identify and apprehend these threat actors.
02:46Okay, sir. If the hacker is identified and there is evidence that they are the ones who hacked, what will be the next step of the DICT?
02:56Usually, when it is local, we pass it to the law enforcement side of things for proper case buildup and identification and apprehension.
03:09Then we will pass it to the prosecution services.
03:13We have laws that should be passed by these threat actors.
03:18However, and this is a global trend, this is our problem with these threat actors.
03:25There are no boundaries.
03:27Like what we mentioned earlier, some of them or most of them are located and it creates jurisdictional problems and jurisdictional challenges for us to apprehend them.
03:44Okay. Sir, please update us on what we have regarding the defense of cyber attacks.
03:52Well, in this administration, we have the National Operations Center.
04:02This is our central nervous system.
04:09Here in DICT, we have our CSB, our Cyber Security Bureau, that monitors our threat actors and their attacks on government systems.
04:23Like what our good secretary, Secretary Ivan Uy, mentioned, this year we have provisions to procure a new system to build and provide the first layer of protection
04:36for the threat actors that will attack our systems.
04:40All right. Thank you very much for all the information you shared with us this morning.
04:44We have an update. DICT ASIC, Renato Paraiso.
04:47Thank you very much.

Recommended