Statement of a fact in a pleading, that will be attempted to be proven
Share: "One Murdery Minute," produced by Darren Marlar from Weird Darkness and Allegedly Podcast(s) with your friends and family. First Listener to Post a Review About Sharing this Promo Wins a prize. If you think it's you, email the show at email@example.com If your peeps hear this promo and they won't follow and listen, then they've got cloth ears. It's not your fault. You did your best. Cloth ears are hard to overcome. Darren Marlar links for Darren Marlar diehard fans (e.g. Kinda Murdery) AND soon-to-be-diehard-fans Follow/Listen to Weird Darkness here: https://weirddarkness.com/Follow/Listen to Allegedly here: https://weirddarkness.com/allegedly
How do you control the Bull on Wall Street? Simple: you put a ring through its nose. The name of that ring is ESG: Environmental, Social, and Governance scoring for financing and investment. Allegedly, ESG is supposed to provide a measure of a company's long-term sustainability and profitability, but it is, instead, the tool of a small number of so-called "stakeholders" who are actually technocrats. The tool enables big investment firms like Blackrock, Vanguard, State Street, Fidelity, and others to effectively run a monopoly-trust, which is to say a cartel, without being in direct violation of existing anti-trust legislation. If you wonder why everything, especially every big corporation, is going Woke, ESG is your answer. Join James Lindsay in this quick episode of New Discourses Bullets to break it down. Support New Discourses: paypal.me/newdiscourses newdiscourses.locals.com/support patreon.com/newdiscourses subscribestar.com/newdiscourses youtube.com/channel/UC9K5PLkj0N_b9JTPdSRwPkg/join Website: https://newdiscourses.com Follow: facebook.com/newdiscourses twitter.com/NewDiscourses instagram.com/newdiscourses https://newdiscourses.locals.com pinterest.com/newdiscourses linkedin.com/company/newdiscourses minds.com/newdiscourses reddit.com/r/NewDiscourses © 2022 New Discourses. All rights reserved.
Adele moves in with her beau, Rich Paul, after a year of dating, and did Blac Chyna go Mortal Kombat on a friend and then get baptized? Our celebri-TEA cup is overflowing, so tune in to today's Dish Nation for a sip.
The extraterrestrial comedy podcast where we probe a pimped out UFO (which probably wasn't pimped out). Back in ‘82 in Laxou, France, a man saw a ufo. A man, with a camera. Do we have reliable evidence today? Allegedly truthfully, we may… Along the way we also discover whether aliens fly cars. “Ay yo dawg, you want a goldfish in that car?” We had to cut about 20 minutes of Xzibit quotes out of this episode and the episode still mainly consisted of Xzibit quotes. Did the aliens pimp their rides? Regardless, this one was serious enough to involve the police and we encounter some evidence that simply can't be explained (but also may have a simple explanation). But would this one turn out to have a more nefarious explanation overall, relating to Henri's garden preferences? All that and more on this weeks file. Patreon: https://www.patreon.com/butitwasaliens Store: https://butitwasaliens.co.uk/shop/ Probe us: Email: firstname.lastname@example.org Instagram @ ButItWasAliensPodcast Twitter @ ButItWasAliens Facebook: @ ButItWasAliens - join Extraterrestrial Towers Music: Music created via Garageband. Additional music via https://freepd.com and Purple Planet via www.purpleplanet.com - thank you most kindly good people.
Fill Out This Form For Early Access to our Podcasts and Exclusive Content: https://forms.gle/N7Dxdtv5AwKyBHSS6 Subscribe to the Podcast! YT: https://www.youtube.com/channel/UCFVNX9z-fe42yFeD56B-Y9A?sub_confirmation=1 Spotify: https://open.spotify.com/show/0DyRbBk7ebZQcBnt4CFxYE Apple Podcasts: https://itunes.apple.com/us/podcast/sarby-studios/id1458120241?mt=2 Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy81MjNhNDRjL3BvZGNhc3QvcnNz Follow the Podcast and the Hosts on Social Media Sarby Studios (IG): https://www.instagram.com/sarbystudiospodcast/ Sarby Studios (Tiktok): https://www.tiktok.com/@sarbystudios?lang=en&is_copy_url=1&is_from_webapp=v2 Matt (IG): https://www.instagram.com/mzemlickaa/ Ben (IG): https://www.instagram.com/bensarbacker/ #podcast #SarbyStudios #comedypodcast #storytellingpodcast #funnypodcast --- Support this podcast: https://anchor.fm/sarbystudios/support
On this week's episode we finally talk about Vampire Survivors, plus Aaron has played Haiku the Robot, so he gives his initial impressions of that game. But first, there's a bunch of interesting video game news items to talk about! [News of the Week] Sifu gets roadmap, adding difficulty settings, to coincide with physical release in May Xbox and Bethesda showcase set for June 12 Souls-like action RPG Thymesia gets August 9 release date, steam demo Starfield latest: Allegedly former Bethesda employee talks about Starfield Summer Games Fest officially announced for June 9 Embracer Group purchases three Square Enix studios and several franchises Silksong news (kind of) Golf thing [Games out this week] Rogue Lords Switch Sports Trek to Yomi Loot River [What We're Playing/Watching] Vampire Survivors Star Renegades Haiku, the robot Old Enough (Netflix) --- Send in a voice message: https://anchor.fm/starside-cafe/message
Aliens, the devil, a machine that sees into the past and future, the truth about demons, kangaroos... The Vatican is hiding it all. ALLEGEDLY. Follow us down this "alleged" rabbit hole and hear amazing quotes like:"This is not a church-group podcast.""The Illuminati may be involved.""I would pay to see demon jail."and"We don't want the bots and the algorithms to figure it out."You definitely don't want to miss this! Unless you're a very strict Catholic. Then you probably do.Support the show
Medina County Sheriff's investigator accused of stealing motorcycle club evidence from Hondo PD. Sabinal, Texas – An investigator with the Medina County Sheriff's Office is accused of stealing items from Hondo Police Department's evidence room, a search warrant obtained by the KSAT 12 Defenders confirms.Help us get to 10,000 subscribers on www.instagram.com/BlackDragonBikerTV on Instagram. Thank you!Follow us on TikTok www.tiktok.com/@blackdragonbikertv Subscribe to our new discord server https://discord.gg/dshaTSTGet 20% off Gothic biker rings by using my special discount code: blackdragon go to http://gthic.com?aff=147Subscribe to our online news magazine www.bikerliberty.comBuy Black Dragon Merchandise, Mugs, Hats, T-Shirts Books: https://blackdragonsgear.comDonate to our cause with Patreon: https://www.patreon.com/BlackDragonNP Donate to our cause with PayPal https://tinyurl.com/yxudso8z Subscribe to our Prepper Channel “Think Tactical”: https://www.youtube.com/channel/UC-WnkPNJLZ2a1vfis013OAgSUBSCRIBE TO Black Dragon Biker TV YouTube https://tinyurl.com/y2xv69buKEEP UP ON SOCIAL MEDIA:Instagram: https://www.instagram.com/blackdragonbikertvTwitter: https://www.twitter.com/jbunchiiFacebook : https://www.facebook.com/blackdragonbiker
A San Jose police officer was placed on administrative leave for allegedly masturbating while on a service call. Mark Thompson provides details on the situation - that is not the first issue the San Jose Police Department has faced - during "Law & Disorder". See omnystudio.com/listener for privacy information.
A San Jose police officer was placed on administrative leave for allegedly masturbating while on a service call. Mark Thompson provides details on the situation - that is not the first issue the San Jose Police Department has faced - during "Law & Disorder". See omnystudio.com/listener for privacy information.
Live from the No Panic Zone—I'm Steve Gruber—I am America's Voice—God Bless America—God Bless You and let's do this! This is the Steve Gruber show— raw and unrefined—delivering the cold hard truth—don't worry it's good for you! Here are three big things you need to know right now— ONE— Elon Mush issues a harsh warning to the Twitterverse—at least those working there—that an Extreme workload is coming soon— TWO— It appears the Supreme Court and its conservative members are un-swayed by the explosion over the leak of a draft brief—that will overturn the 1973 Roe V Wade Decision—and return abortion law—to the states— THREE— We are once again seeing the allegedly transitory inflation—soaring again— the cost of diesel fuel—continues to set records daily—and right now it's anybody's guess when it will stop going up— Gas prices are also shooting up—and we are looking at all time record setting numbers there too— BUT the Biden Administration is completely tone deaf—and instead of doing simple things to get American energy flowing and prices coming down to help the average family—they are engaging is bizarre tribal attacks over the pending end of Roe V Wade—returning abortion laws to the states— Plus creating a Disinformation board—at the Department of Homeland Security—that is sure to feed all kinds of disinformation to all of us—and keep the propaganda machines working overtime— AND an Environmental Justice office at the Department of Justice that will be used to punish taxpayers who violate the sanctity of mud puddles in their driveways—and God only knows what else— But as I have been telling you—these distractions—and that's what they are—distractions—even though they are Epic is size and scope are not going to work—they are a desperate act of futility—that will not move the needle in favor of these reckless socialist policies at all— The most vulnerable Senate Seat for the Democrats is Nevada—where there is a Senator that more than 95% of all Americans could not name—and gas there is well over $5 a gallon—what do you think is going to motivate voters come November? Nevada was among the hardest hit states by the economic disaster of the Covid-19 pandemic—because casinos all closed down during the government overreach— Next door in Arizona—another Democrat seat is in danger of flipping to the Republicans—and gas there is getting close to $5 a gallon—and again—what do you think is the driving force for voters? Plus Arizona is a border state that in about 2- weeks when the failing Biden Administration will open the floodgates to millions of illegal aliens in the coming months—so really what is the Democrat plan for America? I think you have figured it out—sell us out—to the highest bidder—which is never the ordinary folks like you and me— But that message is getting through to some die hard Democrats—and ones that have influence— They are fighting back on the economy—and ideas from the far-left—suggesting more freebies like paying off student loans—
In today's episode, Earl Thomas is in trouble, Jerry Jones and Daniel Snyder tried to get Roger Goodell fired, and Mark Davis is the subject of an NFL investigation. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Did You Hear How the FBI, NSA, and CIA Got Tracked Because of Their Smartphones? How About You? You're worried about surveillance. Hey, I'm worried about surveillance. And it turns out that there's a secretive company out there that to prove their mustard tracked the CIA, and NSA yeah. Fun thing. [Following is an automated transcript.] [00:00:16] This is a company that is scary. We've talked before about a couple of these scary guys. [00:00:22] There's this Israeli company called NSO group. And this it is, so group is absolutely incredible. What they've been doing, who they'll sell to these. Guys are a company that sells cell phones, smart phone exploits to its customers. And there are alleged to have sold their software to a variety of human rights abusers. [00:00:53] We're talking about NSO group coming up with what we would term a zero day hack against I-phones against Android phones against pretty much anything out. So in other words, I hacked that no one ever seen before and then use that in order to get into the phone and find information, they views things like the, I think it was what's app and video that was sent and usually. [00:01:22] To hack Saudi Arabian phones. You might remember Chris Shogi this journalist. I guess he was who apparently was murdered by them. Big problem. So this Israeli group. Yeah. Yeah. They sell to anybody that's willing to pay. At least that's what the allegations are. I've never tried to buy their stuff, but yeah, they're assisting government with hacks with. [00:01:48] Ultimate in surveillance. Another one clear view. We've talked about them on the show before this is a company that has done all kinds of illegal stuff. Now some of it's technically not illegal. They're against the terms of usage, what Clearview has done. And now they've gotten involved in this Russian Ukrainian. [00:02:12] War that's been going on here and they've gotten involved with a number of legal cases in the us. What they did is they said, okay great. Let's do something. You remember Facebook, right guys. So you've heard of that before. And how Facebook got started. Mike Zuckerberg. MK went ahead and stole the pictures of the women that were in Harvard's cattle. [00:02:41] And I will, when I'm, when I say catalog, okay, this isn't like a catalog of women, order one mail order type thing. We're talking about their index, their contacts, there is a catalog of all of the students that are there in the school. So Zuckerberg goes and grabs those against policy. [00:03:00] Okay. Maybe it wasn't strictly against policy at the time. And then he puts up some. Called the Facebook where people can look at a picture of a girl and decide whether or not she should get a five or a 10 or a one. Yeah. That sort of stuff, abusing people that really is abuse. I can't imagine. [00:03:19] The way people felt, I had seen their ratings by people that didn't know them, that somehow their Def definition of beauty really defined who they are. It's crazy what the stuff he did. So he started his business by stealing stuff. Microsoft started his business by. By going ahead and misrepresenting, some would say lying to IBM about what he had as far as an operative system goes right, again and again, we're seeing dishonest people getting involved, doing dishonest things to get their companies off of the ground. [00:03:54] And I have a friend who's an attorney who says, and Craig, that's why you will never be wealthy because you just wouldn't do any of that. So Clearview is another example of these types of companies. In this case, clear view, went to Facebook and crawled any page. It could get its little grubby crawlers on. [00:04:18] So it found your public fake Facebook page. It went. Over the internet. There's a number of websites. Some are out of business now, but the, you upload your pictures to you. People can rate them, can share them. You can share them. Hey, you got your own photo gallery here that you can share with friends and a million other people. [00:04:39] I'm right. That's what ended up happening. That's how those guys made the money. They're selling you on, Hey, you can look at how convenient this. And you can have your own little photo gathered at gallery and you can take that full load photo gallery and share it with your friends. And then if you read the fine print at T and we'll make money off of showing your pictures and showing ads well, Ah, Clearview went and scanned every website. [00:05:08] It could get its grubby little scanners on crawled through the mall, downloaded pictures of any face that it could find. And then went ahead and digitized information about people's faces. So it spent years scraping and then it put together its technology, facial recognition technology, and went to the next level, which is, Hey, please department, get my app so you can get the clear view. [00:05:41] And do you encounter someone? You can take a picture of them and upload it, which now gives them another face. Doesn't it. And then once it's uploaded, it'll compare it. It'll say, okay. Found the guy here. So with the Russia Ukrainian war, what they were doing is taking pictures of dead and injured, Russian soldiers, running them through this database online of all of these spaces, found out who they were and went so far as to use. [00:06:14] Stolen data online. Now this is war, right? The whole thing is crazy, but the stolen database online find out who their mothers were, the phone numbers for the mothers, and to have people all over the world, sending text messages to mom about their dads. Yeah. Okay. So Clearview sells it to police departments. [00:06:38] They sell it to pretty much the highest bidder they say, Hey, listen, we don't do that. Come on right now. There's other data brokers. And I've had a few on my show in the past who are using harvested information from phone apps to provide location data. To law enforcement so that they can then circumvent. [00:07:03] What you have a right to privacy. Don't you it's codified right in the bill of rights. I was first 10 amendments to the U S constitution and it was all defined by the Supreme court's carpenter decision. So we have protections in the constitution, natural, right? That were confirmed by the Supreme court that say, Hey, the federal government, you cannot track all of the citizens. [00:07:31] You can't track what they're doing. You can't harvest their information. And yet at the same time, They go to the data brokers that have put together all of these face pictures, figured out who your friends are, you sign up for Facebook and it says, Hey, you want me to find your friends? [00:07:49] See if they're already on Facebook. Just hit. Yes. Here, not blowed your contact list. So I'll go. Facebook says, oh, look at all your friends. Or we found isn't this exciting. And in the meantime, in the background, Facebook is looking at all of this data and saying, we now know who your friends are. And so many people have wondered I wait a minute. [00:08:10] I didn't talk about. I didn't do a search for product X online, and yet I'm getting ads for product X. Well, did you mention it to a friend who might've done a search for it? Because these search engines, these companies like Facebook know who your friends are, what they're interested in, and they'll sell ads to people who are going to promote to you the same items they're promoting to your friends. [00:08:35] It's absolutely crazy. So this company. It's called and they're very quiet, very low key. The website doesn't say anything at all, but they took their software. That's pulling all of this data together and compiling it. Yeah. And ASX pointed all of this technology towards the national security agency and the C I a and Jews, their own cell phones against them. [00:09:08] Now, why did they do this? They didn't do it to prove something about how, you shouldn't allow this sort of thing to happen and they didn't do it to prove that man, we've got to have tighter controls because look at what we can do. If we can do it, other people can do it. No. According to audio, visual presentations and recordings of an ACX presentation reviewed by the intercept and tech inquiry. [00:09:36] claimed that it can track roughly 3 billion devices in real time. That's equivalent to a fifth of the world population. You're not going to find anything out about Asics it's called anomaly six. Good luck online. If you find it, let me know email@example.com. I'd love to know more about these guys. The only thing on a website for them as an email address and a six anomalies six in that presentation showed the nation spooks. [00:10:13] Exactly what knew about. All right. Apparently is also ignoring questions from journalists and will only respond to emails from people in upper levels of federal agencies, which means, and maybe this is a supposition from our friends over at tech dirt. I don't know. But then what that means is they're looking to sell your information in real time. [00:10:43] To the feds to get around the carpenter decision and the constitution just absolutely amazing. Hey, go online right now. Craig peterson.com. I'll send you my special report on passwords and my two other most popular Craig peterson.com. Stick around. [00:11:06] Have you ever wondered about search engines? Which one should you be using? You're not alone. It's probably the number one question I get from people. What should I use? Google is falling behind, but we're going to talk about the top engines and the why. [00:11:23] Google has been an amazing company moving up. Of course, we're just talking about the cheats. [00:11:31] So many companies have taken over the years and Google has certainly had its share of cheat. I haven't seen anything about them just doing completely underhanded things to get started. I think. They were pretty straightforward. They had a great idea back in the beginning, where they were just looking at links, how many sites linked into this one particular site? [00:11:57] And that gave this concept of a page rank. Very simple, very easy to do. Of course, are problems with. Because you would end up with pages that are older, having more links to them, et cetera. And they have over the years really improved themselves, but we also have some other problems right now with Google. [00:12:22] If you do searches on Google for a number of different. And you'll see that really Google search quality has deteriorated in recent years. We've talked before here about some of the problems with Google and elections and how they have obviously gone out of their way to influence the election. [00:12:43] There is study down in, done in orange county, California, or at least about orange county, California, and an election down there showed that Google had a major influence on that election and also tilted it a certain way on purpose. Absolutely amazing. So that's one way Google has fallen behind, but you can. [00:13:06] At all kinds of searches and hope you're going to get a great response. And you don't have you noticed that it's gotten worse and then on top of it, you're starting to see more ads squeezed in it is not great. I have used. Of course for programming in years past, before that I liked alter Vista, which was a digital equipment corporation product out there. [00:13:32] Vista was pretty darn good. And you could use Boolean logic with it. Google says you can use Boolean with us, but it's not the same as Google's is very simple. But at any rate they have not made any. Leaps here going forward. It's been absolutely amazing. So let's go through the search engines. [00:13:53] I'm going to give you right now, the pros and cons to some of these search engines out there. So we started with. It is 800 pound gorilla. And in case you didn't know the number two overall search engine is YouTube. Okay. But let's stick with straight searches, not video searches. So what is great about Google? [00:14:19] One of the big things is they like fresh content. So if you're looking to do search engine optimization for your business, you are best off having some Keystone pages. So having these pages that are. Kept up to date. So you might have a page on whatever it might be hacking VPNs, right? And you make sure you update it because Google does favor the fresh content. [00:14:45] They rank blogs and. Services, which is really nice and they're accessible in any device. They have apps that work well on a browser. And I'm right now, I'm firstname.lastname@example.org on the best search engine. So you'll see some of this information there. They don't like about it is the same thing you don't. [00:15:09] Right? Which is, it collects all kinds of data on you. They also have hidden content that, that might damage your ranking as a business or someone who has a website and the search delivers. Too many results, millions of results. Yeah, there probably are millions of results for a single search, but what I want are the really relevant ones and Google learns over time. [00:15:38] What kind of results that you want, which is kudos to them, but they are tone deaf sometimes, frankly as well. Okay. Our number two on our list of topics. Is duck go. Now I've been talking about them for quite a while and some people have been disparaging talk, talk, go lately. And the reason is they say, what. [00:16:03] And those search results maybe are a little wrong, right? They are maybe student little sensory, not as much as Google does, but some, at first duck go.com is where you'll find them online named after that kids game. Is a privacy search engine. So it is not tracking or storing any information about you. [00:16:29] That's a very big one. There are searches are very fast, but they're backed. The actual backend search engine is. Which is Microsoft. We're going to get to that in a couple of minutes here. That means that if Microsoft is deciding to do some weighting on search results, based on their political views, then that's going to show up in duck go, but it's nowhere near as bad. [00:16:54] And I've talked about it on the show before we'd done some examples. So it is also now giving you the option to restrict your searches to the last month worth of results, which is really nice. That keeps a little more up to date. They also aren't great at image searches, no personalized results, and it is free, which is nice. [00:17:17] You might also want to look at quant Q w a N T. If you look at. A private or privacy browser. Quanta's a French company, but it does leave English as well. Okay. English results. They like the older and well-established web pages, they rank home pages. They do not rank blogs. They crawl all kinds of hidden content and non hidden, equally, unlike Google, which is really great being as not great at forums. [00:17:50] As I mentioned, blogs, they're not as fast as Google. And they have some seriously heavy search results screened. Dogpile they've been around for quite a while. You might want to check them out. They have something called fetches and favorite fetches. So you can have a home screen when you go to dog pile and you'll see right there. [00:18:14] Your favorite searches and they're right there for you. You can just keep going to them. They use multiple databases so they can get broad results, multiple backend search engines, and there's no home screen personalization available. And lots of sponsored results, which isn't a real big deal, but you'll find them email@example.com, Google scholar search. [00:18:38] I've used this a number of times. If you're looking for scholarly articles, it is really good. You can get citations in various styles. If you are working on your master's PhD, whatever. B and they're imposing a style in the document that you're writing. So you can put it into the bibliography and a, they got a lot of great stuff. [00:19:02] Google scholar you'll find online at scholar dot, google.com. Wearable PDs, sir. It focuses on technical terms and applications, which is good, friendly to non-tech users. And it is only searching the web well, PD is 10,000 word and phrase database. So that's pretty. To to understand to Yahoo search, they have a home screen, has news trending topics. [00:19:33] I've used y'all who? Of course it's not what it used to be, but it does have everything right there. Even your horoscope. And the ads are not marked out clearly. And then there's the internet archive search. This is actually a site that I fund. I donate money to them every month and you'll find firstname.lastname@example.org, but it is really cool. [00:19:58] You can search based on timeframes again, if you are doing papers, if you're a journalist. You can find what was the internet like? Or was this webpage? What was it like around a hurricane Katrina in 2005, right there. We will find it email@example.com. Hey, stick around. We'll be right back. [00:20:23] You already know that hackers are coming after you we've talked about how they are out there, scraping web pages, putting together stuff. I want to bring up again, the Ukraine, Russian war and Russia leaking data like a sieve . [00:20:39] It is, of course in the news again, it seems like it has been in the news for how long now, six years, maybe longer in this case, we're going to talk about what the hackers are doing because they're not just doing it to Russia. [00:20:56] They're doing. Us. And it's a problem. We're going to explain why you've heard of doxing before D O X I N G two docs, someone which is basically to find documentation about people and to release it. That's really a part of it. So you've seen some political operatives who have gone online and doxed people. [00:21:22] For instance one of them is libs of tick talk. You might've heard of that one, and this is where they take all of these crazy things that crazy people on tick talk, go ahead and publish and just put excerpts of them together. They don't cut it up to make them look crazy. No. They let them be crazy. [00:21:42] All by themselves and put it online. So some libs decided, Hey, we don't like this. And journalists who had been complaining about doxing before that shouldn't be done and it's unethical. It should be illegal. Yeah. What does she do? She goes and docks. The lady that was running libs of tick talk. [00:22:07] And I, it just blows my mind here. How can these people be so two faced, they really are just crazy to face. So she went ahead and did what she said should never be done. And I'm sure she had some form of justification for it and put it out online. So I went online, comes this lady's home. Address her name. [00:22:31] Kinds of stuff and that's available online right now. Now you might want to try and do something that I've done before, which is, if you go to one of these data brokers, ads for these things, right? Do a search for yourself with us. And have a look at how accurate that information is. When I looked last time I looked cause I had a few data brokers on the radio show. [00:22:58] I would say less than a third of the information that they claimed was information about me was actually accurate less than a third, frankly. And I don't think that's a particularly, what's the word I'm looking for, but Unique situation. Let me put it that way. I don't think it's unique at all. I think they get a lot of it wrong because remember, they're trying to piece together this piece together that and put it all together. [00:23:27] So you can't a hundred percent rely on any of that stuff. And as I said, for me, it wasn't particularly accurate. Now let's move into. Ukraine has claimed to have doxed Russian troops as well as FSB spies. Do you remember them from the Soviet union? They still exist, and hacktivists actually have official scheduled meetings and are leaking private information from various Russian organizations in Russia. [00:23:59] So we're talking about things like their names, birth dates, passport numbers, job titles, and the personal information that they have released about these Russian companies. And people goes on for pages here. It looks like frankly, any data breach, you'll find a great article about this that I'm referring to in wired.com, but this particular data. [00:24:25] Can change personal information on 1600 Russian troops who served in bootcamp, a Ukrainian city, that's been attacked by Russia. And by the way, you've probably seen these things. There were all kinds of accusations here of multiple potential war crimes. What was going on over there? So this data sets not the only one. [00:24:50] There's another one that legislature legislation. Allegedly contains the names and contact details of 620 Russian spies who are registered to work at the Moscow office of the F S B. That is Russia's main security agents. Now this information wasn't released by hackers in North Korea or hackers in the us or Russia, because we already know Russian hackers. [00:25:22] Don't attack Russia. They're not stupid. Okay. They don't want boudin coming after them, but this was published by Ukraine's intelligence service. So all of these names, all of these personal details, birth dates, passport numbers, job titles, where they're from all kinds of stuff. I'm freely available online to anyone who cares to look now, Ukrainian officials wrote in a Facebook post as they publish the data that every year peon should know their names. [00:25:56] So you got to bet, there are a lot of people freaking out over there. Absolutely freaking out in Russia that is. Since the Russians invaded Ukraine, there have been huge amounts of information about Russia itself, the Russian government activities and companies in Russia. These, all the guards that are over there and it's all been made public. [00:26:21] So it's very interesting because these are been closed off private institutions in the us. Yeah, we do some hacking of potential adversaries, but they don't release. All right. Not at all, but there's really two types of data here. First of all, you've got the information that the Russian authorities are publishing. [00:26:42] Their allies are publishing, and then you've got the hacktivists, these companies, these groups, I should say. Anonymous hundreds of gigabytes of files and millions of emails have been made public, including some of the largest companies within Russia. The big guys, oil and gas companies or lumber companies, et cetera, et cetera. [00:27:08] So there's a former British Colonel in the military intelligence. Wired is quoting here, his name's Phillip Ingram. And he said, both sides in this conflict are very good at information operations. The Russians are quite blatant about the lies that they'll tell we're used to that aren't we, and much of the Russian disinformation has been debunked, but they say. [00:27:36] They have to make sure that what they're putting out is credible and they're not caught telling out right. Lies in a way that would embarrass them or embarrass their international partners. So it's really quite interesting. We've started seeing the stuff coming out in March 20, 22. Of course. And it's hard to tell how accurate the data is. [00:28:00] Looks probably pretty accurate. It has been scooped up as I mentioned on the show before, but. Some activists, one of whom has put together an app that anyone can download. And that allows you to send texts to the mothers of Russian soldiers, some alive, some dead, and it automatically translated into Russian. [00:28:24] I assume it's a crude translation, but whatever. So you can. Harass some bore a babushka over there in Russia, whose grandson is out there fighting. This is just incredible. We've never seen anything like any of this before, but doxing very toxic online behavior. And when it comes to war, the gloves are off. [00:28:48] And by the way, these groups that I mentioned, these hacktivists have official meetings, Tuesday mornings on telegram, and they talk about who the next target is. Absolutely amazing. Make sure you visit me online. Craig Peter sawn.com and don't go anywhere because we've got more coming up here about organizations in general, here in the us breaches are up stolen data or. [00:29:17] And the number of bankruptcies are up because of it. [00:29:23] Hacks or up no, you know that we've known that for awhile, but did you know that is not necessarily the number one reason businesses are suffering breaches. So we're going to talk about that right now. What else you have. [00:29:39] We've talked before about some of the websites that I keep an eye on. [00:29:44] One of them is called dark reading and they've got a lot of good stuff. Some of the stuff I don't really agree with, who agrees with everybody or another person, just one, even a hundred percent of the time. Like no one. Okay. So in this case, we're talking to. Organization suffering a breach. [00:30:03] And the stat that they're quoting here is that more than 66, 0% of organizations have suffered a breach in the last 12 months. That's huge. And the breaches have gotten more expensive. Global average breach cost is $2.4 million. And if you are unprepared to respond to a compromise, that price tag increases to $3 million. [00:30:36] Yeah. That's how bad it is. That's what's going on out there right now. But the point that really they're trying to make here, a dark reading in this article by Robert Lim. Is that organizations are focused too narrowly on external attackers when it's insiders third parties and stolen assets that cause many breaches. [00:31:02] That's what this new study is showing from Forrester research. Now I had them on the show a few times in the past, you might be familiar with them. They are a research company. The charges a lot for very little information, they've got the research to back it up right there. They're really one of the leading, if not the leading research company out there. [00:31:26] So last month they came in. With the 20, 21 state of enterprise breaches report. And they found that the number of breaches in the cost of breaches varied widely, depending on where the organization is based. And. The big one that you have control over is whether they were prepared to respond to breaches. [00:31:53] Now, companies in north America had the largest disparity between the haves and have not listened to these numbers. They're bad for businesses, these numbers, and they're worse for individuals. The average organization required 38 days. 38 days over a month on average to find eradicate and recover from a breach, but companies that were not prepared for security challenges took 62 days. [00:32:28] Now the good news here is that this is down. It used to take nine months on average, and now we're down to two months, but here's the big question. Can you, or can a company survive 62 days or is it going to be out of business? Do you have enough money to make payroll for the next two months? That's where the problem. [00:32:55] Really starts to come in. That's why small businesses that are hacked small businesses that are using things like Norton or some of the other real basic software without having a good firewall and good security practices. And same thing with individuals here. You are going to be out of business. [00:33:17] That's of the showing right now. And your insurance policy that you have for cybersecurity insurance will not pay out. I did a presentation for an insurance industry group. This was in Massachusetts and it was a statewide group. And we'd talked about how the. Are not paying out the companies. [00:33:41] Aren't right. And why, and if you are not prepared, if you are not doing the right things and I can send you a list of what you need to be doing, if you'd like, just email firstname.lastname@example.org. Be glad to send it to me. M E at Craig Peterson, P E T E R. So when Dr. And just to ask for it and I'll respond to you or we'll get married or someone else to forward it to you because I've already got it. [00:34:07] Okay. This isn't a big deal for me. Okay. It's ready to go. But that list is an important list because if you don't meet the standard. That the insurance industry has set forward and you are a hack. They're not going to pay you a dime, even if you Sue them. And we've seen this with very large companies as well, where they're trying to recover tens of millions of dollars from the insurance policy, and they didn't get a dime. [00:34:36] They had to also pay who knows how many millions to lawyers to Sue the insurance companies. And they lost. Okay. It's a very big deal. So there's a huge misalignment, according to Forrester, between the expectation and the reality of breaches on a global scale, there's a big disparity of above $600,000 between those. [00:34:59] Paired to respond to a breach and those who are not. And we can talk about that as well, because there's things you need to do obviously backup, but backup means you've got to check the backup. You've got to make sure it's valid. You should be spinning up the backups on, in a virtual environment in order to make sure the backups are good. [00:35:22] There's a lot of things you should be doing. Okay. And that's just a part of it. Plus, do you have your PR people ready? Are you able to respond to the state requirements? A lot of states. Now, if you are hacked require you to report it to the state, in some cases in as little as 72 hours. So do you have that paperwork ready? [00:35:46] Do you have the phone numbers of all of the people that are on the team? Okay. All of these things now, the threats are not just the external hack. Anybody who's trying to protect their data is focused on obviously the external hackers. That's where we tend to focus part one part two is we focus in on the people that are working inside. [00:36:13] The company, right? It's a zero trust narrative here. Why is this guy in sales, trying to get into the engineering files? Why are they trying to get into payroll? You understand where I'm going with this, you buy and what I'm selling. You don't want them to have access to stuff that they don't need access. [00:36:37] Attacks that Forrester found were spread over external attacks, internal incidents, third party, and supply chain attacks, which is really big nowadays and lost or stolen. Assets globally. Half of companies consider external attacks to be this top threat, but in reality, only a third of the incidents come from external actors. [00:37:04] Nearly a quarter of them are traced back to an internal event. 23% consisted of lost or stolen assets and 21% involved with third. Partner. Interesting. Hey, so we've got to keep an eye on this. These external attacks are a very big deal and that's where they have success with what are called zero day attacks. [00:37:31] But your internal people can be a problem. Now I have. Put together in 2022, this is something really important. What we call a POA and M it's a plan of action and milestones of what you need to be doing. For your cybersecurity. Okay. This is available absolutely free. You have to email me M email@example.com. [00:38:00] But the idea behind this is it's a spreadsheet that you can use in numbers on a Mac or Excel on windows. And it has all of the key items. Now we follow what's called the. 801 71 standard. This is the national Institute of standards and technology, and they've laid out all of the different things. That you should be doing now. [00:38:26] We've broken them down into eight cybersecurity activators as what we called them. And we have, you should have already gotten an email this week from me. If you're on my email list, just talking about, cause we're starting now getting into those cybersecurity activators. I'm showing you. To do about each one of them. [00:38:46] So you can do it yourself. So many of us are stuck with being the CTO or the guy or gal in charge of it just because we like computers or we know more than somebody else. So if you're on my email list, you will be getting these things off. We're going to be going through them in the weeks. I had little quick mini micro trainings, if you will, but you gotta be on the email list in order to get them. [00:39:12] These are also appropriate for home users right now. You're going to have to make your decisions as to what you're going to do, but home users have the same exposure, the same basic problems that they have in bigger organizations out. So I follow the national Institute of standards and technologies. [00:39:34] They have broken it down into a number of different sections. They actually require it. And if you are compliant with this new standard you are going to be able to recover your money from the insurance company. If you are hacked, I don't know. I was going to say it for a win, but hopefully you won't get hacked because of this. [00:39:58] So it's an important thing to follow. So make sure you go to Craig peterson.com/subscribe right now and get subscribed. A lot of stuff for home users. My business is focused on securing businesses. Particularly regulated businesses, right? If you have intellectual property, you don't want to have stolen a few do government contracts where they're requiring you to be compliant with this new standard or some of the others, but it's. [00:40:27] Basic stuff that every business should be following. So just email me, M firstname.lastname@example.org with your questions. We've been really good at answering them. We've probably lately been averaging about a dozen a day. Which is quite a few, but so it might take us a little bit to get back to, but we've gotten much better. [00:40:48] Mary her number one responsibility right now is making sure that we answer all of your emails. We'll send out this plan of action and milestone spreadsheet for you. So you know what to do. This is updated. This is 2022. Everything you need right there. Me at Craig Peterson dot. Alright, you'll also find my podcast there. [00:41:14] Craig peterson.com. And I want to point out that I'm not doing the show on video anymore. Just wasn't getting enough traction with, if it just takes too long. Anyways, Craig peterson.com. [00:41:29] This is one of the top topics I've had people ask about lately, and that is protecting yourself and your business against Russian hacker. So I've got a presentation. We're going to run through it. We're going to talk about what you can do. [00:41:46] This has been a long time coming. I have been doing a lot over the years of webinars of online meetings, trying to help people understand what's going on, what can be done. [00:41:58] And I got a great email this week from one of the listeners. Who's been man on my email list now for years, I'm not even sure how many years. And he was saying, Hey, thanks for giving all of this information for free for small businesses. I can't afford it. And I got to thinking, because there've been a lot of requests lately, for instance, backups how should I be doing them? [00:42:22] What should I be doing? And a number of other topics that really all go together into the, how do I protect myself? My business. From ransomware from these Russian hackers. So that's what we're going to be talking about today. We're going to go through a few of these. This is going to be a series. [00:42:41] We're going to continue this here and weeks ahead, and I appreciate all your feedback. And if you miss part of it, make sure you email me just M. Craig peterson.com. Let me know, and I'll be glad to send some of it to you. Now I'm recording this on video as well. So it's great when you're driving around and listening in picking up some tidbits. [00:43:04] And if you do want to see the recorded version again, dropping them in an email to email@example.com or search for me on YouTube or on one of the other sites that are out there like grumble and you'll. This as I release it. Cause this is going to take a few weeks to really get into the whole thing. [00:43:26] So let's get started. I'm going to pull this up here. Full screen. For those watching at home and what this is called today, we're talking about protecting your business and your self from Russian hackers because they have been out there. They have been causing just all kinds of problems, but there's a few things that you can do. [00:43:48] And I have them up on the screen here. Let me pull them up, but I want to get into the background first. Russian ransomware group. They're a bunch of bad guys and it's called Conti. Now. Conti has been around for a long time. These are the guys that have been ransoming us. They're the guys who in rants. The businesses they've been rants. [00:44:10] Government, you might've heard them. They've got into hospitals. They have been all over the place and they've raised a whole lot of. For the Russians. I'm also going to tell you about a couple of things you can do here. Cause there's a real neat trick when it comes to keeping Russians out of your computers, but Conti decided, Hey, listen, we are all for Russia and president and Putin. [00:44:34] So they came out with an official warning, oh, I want to read this to it says if anybody. We'll decide to organize a cyber attack or any war activities against Russia. We are going to use our all possible resources to strike back at the critical infrastructures of an enemy. Yeah, no, not the best English, but much better than my Russian. [00:44:55] I got to say that I know two words or so in Russian, but they said that they were announcing full support for president. That's a pretty bad thing. If you asked me, they also have ties to Russian intelligence intelligence, but what are we talking about really? Think of the KGB. [00:45:13] The FSB is what they're called nowadays, but directly tie. China and North Korea, Iran, or also now tied in with Russia to varying degrees, but all of them are a little bit concerned about getting into it a little too much, but we're going to talk about their tactics. That's what's important today. What are they doing? [00:45:35] Why are they doing it? What can you do about. So the first thing is password sprain. This is big deal. I've got a nice big slide up here. I like that color blue. I don't know about you, but I think it's pretty, but password sprain is something we all need to understand a little bit better. It's a brute force attack that has been really hurting. [00:46:00] Many of us. Let me see if I can get this to work. For some reason it has decided it just doesn't want. Let me see here. What is up? Oh, is something isn't it's just, I'm getting a white screen, but it's a brute force attack targets users who have common passwords. Now this is a problem. When we're talking about passwords. [00:46:25] If you have a password that has been breached in any of these breaches that have gone on over the last, however long, right? 30 years plus now that password is known to the bad guy. So what they'll do is they'll take that common password and they'll start to try it. So password sprain is where they will go to a bank site or they'll go to Google. [00:46:51] The, oftentimes they're trying to get at your email accounts. So if you have Google email or Yahoo or Hotmail, they'll try it. Use passwords that they have found against accounts that they have found on those various sites that ends up being quite a big problem for everybody out there. Okay. I got that screen back here. [00:47:12] So I'll put that up for those people who are well. But they will send multiple times attacks using variations of these passwords. And it's known as a low and slow method of password hacking because if they were to go bam, and send all of these passwords and login attempts. [00:47:35] They'd get caught. The automated systems would say, Hey, wait a minute. This is not good. We're going to cut you off. In fact, that's what I do for my client. We have remote access using SSH, which is a an encryption session so that we can have a terminal session. And if you try and log in three times, We automatically zap you, right? [00:47:58] We shut you down. So they take a very slow approach to this password sprain technique. And they're also going after volume, which makes a whole lot of sense. And there are right now, billions of passwords usernames, email addresses that have been stolen that are sitting out in the dark. So you've got to make sure that you are not reusing passwords. [00:48:24] How many times have we talked about that? You've got one common password that you're using over and again, while that's a problem, but they're not going to keep hacking your account. They're going to switch from one account to another because they don't want to get locked out. [00:48:39] Just like I lock out somebody who's trying to get in. So if someone's coming from that same. IP address that same internet site. And they're trying to log into that same account multiple times. Bam. They are gone. So with path's word sprain, they're trying to get around the problem of you noticing they're trying to get into a bunch of different accounts and they try and leverage it. [00:49:04] So they'll oftentimes use multiple computers that they've stolen access to. We've talked about that before too. It gets to be a real big. Now they're also targeting these single sign-on and cloud-based applications, because once they're on. Using one of these federated authenticated authentication protocols, they can mask the malicious traffic. [00:49:30] We've heard some of these hacks lately where they're using a token that they managed to pick up from somebody's email, I account, or they got onto Microsoft and they got into the email account on Microsoft. That happened recently. In a supply chain attack, solar winds. You heard about that 20, 21, right? [00:49:52] So they're going after these email applications, including Microsoft or Microsoft has done they're going after routers and internet of things, devices for a very good reason, those IOT devices, which are things like your smart lights, they can be. Controlling the cameras outside, they go on and on there's thousands, millions of them. [00:50:14] Now I actually all the way through your microwave, they tend to not be very well protected. So that's a real big target for them. So step. They want to acquire a list of usernames. Step two, they're going to spray the passwords. Where do they get those passwords in those usernames? Or they get them from breaches. [00:50:36] So again, if you have an account that's breached at some online shopping site, a big one, a small one, it doesn't really mean. That particular breach is now well known and they can, will and do gain access to your account which is step three, gain access to it. It gets to be a serious problem. [00:50:57] Okay. How do you know if you are under attack? Number one? There is a spike in failed. Log-ins this is where having a system and there's technical terms is tough for this. I'm trying to avoid a lot of those terms, but this is where the system is watching logins, noticing that there's a problem and going ahead and stopping it, not just noticing it, but stop. Very important to do. There are a high number of locked accounts, which means what it means that again, someone's been trying to log in. You should make sure that your account, if there are invalid, lock-ins automatic. Locks it out after some number of attempts and five attempts is usually considered to be okay. [00:51:44] I know on my phone, for instance, I have a higher number of the neck, cause sometimes the grandkids get at it. But when it comes to your business account, when it comes to your bank account, you probably don't want to have a whole bunch of attempts, and then in known or valid or invalid, I should say use. [00:52:04] Attempt again, why are they trying to log in with a username that just doesn't exist? Yeah, it can be a problem. Hey, when we come back. We're going to talk about some steps. Like you can take here to really remediate, maybe even stop a password spraying attack. I've already given you a few ideas here, but what are some act of things that you can do, particularly for a small business to really protect yourself? [00:52:33] Hey, stick around. We'll be right back. Craig peterson.com. [00:52:39] Russia has, been hacking our computers, Russia's continuing to hack our computers and this is a real problem. So we are going to talk right now about how to stop some of these things. We already talked about password sprain. How do you stop it? [00:52:56] There are a lot of things we have to pay attention to, and that's what I'm going to be doing in the weeks ahead. [00:53:03] We're going to be going through some of the things you need to do to keep yourself safe. Keep your business safe in this really dangerous online. There are so many things going on. So many people that are losing their retirement businesses, losing their operating accounts. We've seen it before with clients of ours while you know their clients now. [00:53:29] And it was just a devastating thing to them. So I don't want that to happen to you now, if you are interested. All of this is recorded and I am doing this as video as well. We've got slides and you can find out more about it. Just email me M firstname.lastname@example.org. It's really that simple. And I didn't let me know. [00:53:54] And I'll be glad to send it off to you. Okay. This is available to anybody I'm trying to help. And we've had a lot of emails recently about some of these things. So th this is covering everything from the password spraying we're talking about right now through backups and other things that you need to do. [00:54:14] Let's get going on our sprain problem. So w what are the steps that we need to take in order to really remediate against one of these password spraying attacks? And frankly, it is. Oh, a lot to do. It has a lot to do with our users and what we do, if you're a business, if you are an individual, we need to be using longer passwords. [00:54:43] Now we're not talking about all of these random characters that we used to have. I remember having to have my password be at least four characters, long APAC, when didn't even have to have a username, it was just all based on the password. And things changed over the years, the latest standards that are out there right now come from this too, which is the national Institute for science and technology. [00:55:07] They are the guys that put together, all of the guidelines said federal government and businesses need to follow. And they're telling us that a longer passwords means elaborate pass phrase. So you should use 15 character passwords. I had an article just a couple of weeks ago saying that an eight character password can be cracked almost instantly, certainly within an hour, any eight character password. [00:55:39] So if you're still using that, you've got to make a change. And obviously nine characters is a lot more possibilities, takes a lot longer to crack. I don't have those numbers right in front of me, but 15 is the ideal. So use pass phrases instead of single words. So phrases like I don't know secretary of one, the Kentucky. [00:56:04] There you go. There's a phrase. So what you would do is put, maybe dashes between each one of the words. Maybe you would go ahead and use a comma, put some numbers in there, put some special characters in upper lowercase, right? So it's basically on uncrackable at that point. And that's what you want. [00:56:24] Next one. When we're talking about rules for your passwords, the best passwords are the passwords that you can remember without writing them down and words that don't make sense to anyone else's. I remember taking a memory course a few years back and they had random words and you had to remember them. [00:56:49] And the whole idea was okay, visualize this happening. And as I recall, man, it's been a lot of years I won't say decades, but it hasn't been. Since I did this, I still remember a part of it, it was first word was airplane. Next was all envelope. The next one was paper clip. Next one was pencil. [00:57:08] So I visualized an airplane flying into an all envelope and that all envelope then goes into a paper clip and a pencil writes on the outside. Like it's addressing it to someone. That is a good little password, actually airplane or envelope, paperclip, a pencil with a mixed case and maybe a number two or special symbol thrown in. [00:57:35] Those are the types of rules that we're talking about. The types of rules that really. Next up here. Oops. Wrong keyboard. Stay away from frequently used passwords. We've talked about this many times. If you're using one of the better password managers, like for instance, one password, you will automatically have any passwords that you are there in Shirin or that it creates you'll have them checked via a website out there. [00:58:07] It's called. Yeah. Okay. It's called. Have I been poned I, and I hated to say this because how do you spell it? It's all one big, long word. Have I been poned to.com and poned is P w N E d.com. It will tell you if a password that you're trying to use is a known password. If it has been found out in the wild, okay. [00:58:32] Use unique passwords for every site you visit, I can't stress this enough. We were talking about password sprain. If you use the same password and email address on multiple sites, you're in. Because all they have to do is try your email address and your password for whichever site it is that they might want to try out. [00:58:58] Remember, many of them are trying to get into your email and they have done that successfully. With Microsoft email, if you have their Microsoft 365 service and you might want to read the fine print there very carefully, because Microsoft does not guarantee much of anything. You make sure you back it up yourself. [00:59:20] Make sure you do all of these things because Microsoft just plain, isn't doing them for you. Next one here. Next up is our password manager. And I mentioned this before installing and using a password manager is phenomenal. It automates the generation of passwords. If you have. Integrated with your web browser. [00:59:45] It now allows your web browser to work with your password manager. So when you go to a site, you can have it pull up your passwords. How could it be much easier than that? It's really rather simple. That way it's keeping track of your logins. And again, One password.com is the one I recommend and people get confused. [01:00:06] When I say that, when I'm saying one password, I don't mean only have one password used for everything. One password is a name of a company. Okay. So it Talking about only having a single password, but use a password manager. And I've got all of these up on the screen right now. If you're interested in getting copies of these, you can go ahead and just email me M email@example.com. [01:00:35] And I'll make sure I send you a copy of the slide deck of this presentation as well. Cause this is just so important, frankly, but having these points is going to be huge for you. Now strange activity. That's another very big deal. And we're going to talk about this when we get back, what is it? [01:00:55] What does it mean? But I'm going to hold off the rest of this, I think for another week. But right now, what let's hit this, we're talking about odd log-in attacks. A lot of login attempts, the excessive login attempts trends in unusual activities take any, you need to basically take measures to block it and determine if this activity is legitimate. [01:01:20] Is someone just for forgetting their password and spraying themselves or what's going on? Okay. There you go. Simple. Hey, everybody, you can find out a lot more and you'll be getting links to this automatically to these videos, et cetera. If you're on my email list, Craig peterson.com and you can email me M firstname.lastname@example.org. [01:01:45] We'd be glad to send you this or any other information I might have. All right. Take care. We'll be right back. [01:01:54] Putin has been working for a while. In fact, it looks like as early as September in 2021, Putin started going after major us corporation. So we're going to talk about that. And what does it mean? [01:02:10] Putin has been going crazy for a while. I'm going to put this up on the screen for those of you who are watching either on rumble or YouTube, but Putin planned this whole invasion apparently quite a while ago. [01:02:27] And I got an article from the Washington post up on MSN talking about what Putin did at least a little bit about what he did. And you can see right here if you're following. That Russian agents came to the home of Google's top executive and Moscow. And what they did is gave an ultimatum. They told that Google, a senior executive that they needed. [01:02:55] Pull down an app that was in use in Russia. And this app was polling. It was for people to do polls and say, Hey what do you think about Putin's garden performance, et cetera. We do them in the U S all of the time you hear about the polls right left and center. Poland, which is a small country next to another small country called Ukraine next to a large country called Russia. [01:03:21] But we're talking about Paul's favoribility polls. What do you think they should be doing? What do you think that the government should be doing and maybe what they should not be. So Putin didn't like this. He didn't like this at all. And so what he did is he sent a couple of guys ex KGB, FSB, the secret police over in Russia by to visit this Google executive. [01:03:47] If you're the Google executive, what are you going to do? If you Google. Yeah, you're going to say, oh my gosh, I'm out of here. So I'm not sure if she, if this executive was an American or Russian, this article doesn't seem to be clear about it, but what happened is they said, okay let's go hide. [01:04:12] So they rented a hotel room for the. They put her in it and they rented the room under an assumed name. So it wasn't the real name of the executive. It wasn't tied into Google and they thought, okay, now we're pretty safe. Cause you got a hotel security, I guess there are a couple of Google people hanging out with her and they felt pretty safe. [01:04:35] What happens next? There is a knock on the door. These same agents, again, that are believed to be Russian secret. Police showed up at her room and told her that the cock was still ticking because they had given her 24 hours for Google to take down the app because Putin, dental. People weren't particularly pleased with Putin. [01:05:02] So at that point, of course it was forget about it. And within hours, Google had pulled down the app. Now you might complain, right? A lot of people might complain about it. It's one thing for a company like Google or apple to capitulate, to a government to do maybe some censorship, like the great firewall of China. [01:05:25] You might've heard of that where the Chinese citizens can't get certain information. Russia has something pretty similar and us companies have gone ahead and helped build it, provided the technology for it and put it in place. They sold it to them. I don't like that in case you didn't guess, right? [01:05:43] I'm all for free speech. I think it's very important for any form of a democracy. No question about it, but these companies apparently don't have a problem with that. However, now this is something, a little different. If you have employees who are being threatened and I mean threatened to serve 15 years in a Russian prison, what are you going? [01:06:10] Are you going to say no, I'm going to leave that app up. And then now all of a sudden your executives, or even a coder, somebody a programmer, like the guy that sweeps the floors, whatever are you going to let them be arrested so that you can have this app up on your Google play store or your app store over the apple side? [01:06:29] Probably not because frankly, this is something that is not worth it. So what are you. I think the only answer is what we've seen company after company do, and that is get out of Russia completely. And there was an interesting story. I read this recently about McDonald's you might remember back in the Soviet days, McDonald's worked out this deal with the Soviet union to open a McDonald's right there in downtown Moscow. [01:07:03] I guess it was pretty prominent. I don't know if it was, I think I might've been even on red square and there were people like. To have an American hamburger and it's been pretty popular the whole time. McDonald's closed that store and pulled out of the country. Starbucks has pulled out, are they going to reopen? [01:07:21] Cause I don't think either one of them said, forget about it. We're not coming back, but I know both of them have closed on operations. Automobile manufacturers from the U S have closed on operations. What is their choice? You can't just go ahead and say, okay yeah. Okay. Yeah. You're just going to arrest people or, we'll keep quiet for now and come back later. [01:07:42] What are you supposed to do? That's part of the problem with these oligarchies, with these people who are basically all powerful. Now we actually see some of that here in the us, which is just as shame, just a shame because we see these companies going ahead and cutting out free speech saying, oh, you can't say that there was a time where if you said masks work, that you would have been censored. And then there was a time where if you said masks don't work. You cloth mass don't work, you would have been censored. There was a time when you said masks aren't necessary. You would have been censored right now, but the science is settled. [01:08:27] It was just crazy. Science has never settled and oh, we could go on with this for hours and hours, but potent is not a good guy. And this article, I'm going to bring it up on the screen here again. But this article talks about. And a single year. And again, this is MSN. Potent had his political nemesis, Aloxi Novolin novel ne yeah, I got it right. [01:08:54] He had him in prison after a poisoning attempt, felled to kill him. Do you remember that whole poison in attempt? Where they gave him this really nasty radioactive bride product, as I recall, and potent went ahead and basically shut down. They pushed all of these independent news organizations to the brink of extinction. [01:09:17] Look at what happened with Russia today. The entire staff walked off on the. Saying, we're not going to report on any of these lies that are coming out of Moscow. It's happened again and again, Putin orchestrated a Kremlin controlled takeover of Russia's Facebook equivalent, and he's also issued liquidation orders against human rights organizations. [01:09:43] And so all this is going on. What are you going to do if you're. If you're a Google, right? I can see the criticism of those countries or companies should say when they're cooperating with the regimes, putting in place, things like facial recognition to, to spy on people, to have a social credit system, these great firewalls in these countries. [01:10:05] But when you have something like this happen, I forget about it. There's nothing you can do. And the crackdown is accelerated Facebook and Twitter were knocked offline by the government for millions of Russians news outlets had survived the state harassment for years, shut down in the face of a new law impose. [01:10:26] 15 year prison sentences for spreading fake news. It's incredible what has happened. And we've got to be careful here in the U S too, because we see this censorship, there's a lot of complaints about what was happening under Donald Trump president and old Biden, both Obama and Biden. [01:10:45] Both of those have done some of these same things to a lesser extent. Stick around. We'll be right back. [01:10:53] This whole war with the crane, Ukraine and Russia has brought a few things to light here over the months, and really the more than year that it's been leading up to the beginning of that war even, but we've got clear view in the news again. [01:11:09] So you can always follow along at rumble or at YouTube, but there's a great article here. [01:11:16] I have up on my screen for you to see. And this is from writer. Para carried over on MSN. And it is an exclusive story talking about Ukraine, using something called clear views. AI facial recognition. This to me is absolutely fascinating because what is happening. Is the technology that Clearview develop and has it been selling to police forces in the United States is being used on the battlefield and. [01:11:51] How here's what the technology did. And does Clearview illegally went on websites, major websites all over the world and did what we call scraping. Now, scraping is where they go to the site and they grab the pictures. So they scraped Facebook. They scraped you tube. They scraped. Dan and many more. [01:12:18] And then they put it all into a big database that told them where they found it, who that person was. And then they also took that biometric information from that image of the face and came up with some unique codes, a hash basically is what they did. And. Now what Clearview is doing is if you are a police organization, you can get a little app that runs right there on your. [01:12:46] And you have an encounter with someone you're a policeman, right? Let's say, and you just hold the camera up and it gets a picture of that person. It now finds the background information on them. And then you can use that tied into the police databases to check and see if there's any record of this person. [01:13:06] If they've been doing anything illegal. It's really quite cool. What they're able to do and scary at the same time, we use the same basic technology over in Afghanistan. So literary troops as they're out, and they're having encounters with civilians, people in the street fighters, et cetera. They could hold the device up. [01:13:29] It would identify them. It went further than just the face that actually did retinal scans and things, all kinds of cool stuff, but basically recognize the face. And they were able to tell if this was a friend of foe or. So a friend might be someone who worked as a translator who has been known to be helping the us troops in Afghanistan, et cetera. [01:13:53] So we built this huge database of hundreds, of thousands of people's biometrics person, very personal information in it. And if they were getting paid even how much they're getting paid, all of that was in the database, in the backend. And then we abruptly. And we left that equipment behind. I hope the database was destroyed. [01:14:16] I haven't found anything. Absolutely conclusive on it. That the withdrawal from Afghanistan was frankly unforgivable. It just I can't believe they did what they did at any rate. This is Clearview. This is this company. So now that same technology has moved to Ukraine. What's interesting. About this whole Ukrainian thing to me was okay, great. [01:14:42] Now they can identify people. Can they really identify a pretty much everybody? Who are they going to identify? As it turns out clear Clearview also illegally stole photos of people over in Russia and in Ukraine. So the clear view founder said that they had more than 2 billion images from. How's that right from this social media service called V contact a or somebody like that out of a database of 10 billion photos total. [01:15:16] So one out of five of the pictures they scraped was Russian, which surprised me. So the Ukrainians have been using it to identify dead Russian. And it's, they're saying it's much easier than matching fingerprints even works. If there's facial damage, it's scary to think about right. Wars, terrible. [01:15:38] Who wants to go to war? I can't believe all of the people that want to jump in there. I really feel for these people in Ukraine, what can we do? I'll start proximal interest. Research for the department of energy, found the decomposition, reduce the technology's effectiveness while a paper from 2021 showed some promising results. [01:16:01] Now, this again is an example of technology being used in a way it's never been used before. And having that ability to identify dead or living combined combatants on a field like this is just amazing. So this is the most comprehensive data set. There's critics, of course, they're saying that the facial recognition could misidentify people at checkpoints, obviously. [01:16:29] Could miss identify people in a battle mismatch could lead to civilians. Just like unfair arrests have risen from police use. And that's from Albert Kahn, executive director of surveillance, technology oversight, product project in New York. So as usual, these things can backfire and I think they probably will given a little bit of time and that's a sad. [01:16:56] Now I also want to talk about this. This is cool. Another article here, I'm pulling up on the screen right now, and this is about some hackers. Now we know that the Kremlin has been lying. Do we know that if a politician's lips are moving their line, right? Isn't that the old standby, but Russians apparently don't know this. [01:17:22] And the average Russian on the street is thinking that, okay, we're rescuing Ukraine. Isn't that just a wonderful thing? There's a couple of ways that the hackers have been getting around it. It's called a squad 3 0 3. They have this tool that's hosted at the domain. 1920 dot I N. There's
Amber Heard is now on the witness stand and earlier this week she took to the stand to recall the first time Johnny Depp allegedly hit her as well as some other gruesome stories about the trauma he allegedly caused. See omnystudio.com/listener for privacy information.
Amber Heard is now on the witness stand and earlier this week she took to the stand to recall the first time Johnny Depp allegedly hit her as well as some other gruesome stories about the trauma he allegedly caused. See omnystudio.com/listener for privacy information.
Amber Heard is now on the witness stand and earlier this week she took to the stand to recall the first time Johnny Depp allegedly hit her as well as some other gruesome stories about the trauma he allegedly caused. See omnystudio.com/listener for privacy information.
Palpatine Is Back (Allegedly) But In Kenobi Or Andor? | The Cantina #ObiWanKenobi #Palpatine #Kenobi #Andor #Ahsoka #Star Wars #LRMOnline #TheGenreVerse #TheCantina A KIDNEY FOR TOBY- lrmonline.com/news/want-to-be-a-…ones-charity-post/ Well, the 4th of May has come and went, but it did bring us a new Obi-Wan Kenobi trailer to discuss! Also, Papa Palpatine is back, according to the actor that plays him, but for which show? However, you know we'll be tackling some random thoughts here too, so sit back, relax, and enjoy The Cantina! (00:00)- Intro & Obi-Wan Kenobi Trailer Discussion (10:06)- POTENTIAL SPOILERS THIS CHAPTER ONLY (12:37)- A "Flea"-ridden Cameo In Kenobi? (17:59)- Ian McDiarmid Teases Palpatine Being Back For A Star Wars Show (26:34)- Ahsoka Filming Update (30:10)- Problems With CGI & Final Thoughts WE HAVE A SPONSOR! Check them out here: www.GrowGeneration.com Thanks to the band My Day at the Races for the music (besides the intro/outro) and you can find more of them here: mydayattheraces.bandcamp.com/ Welcome to The Cantina Podcast! The GenreVerse's hole-in-the-wall for Star Wars news, rumors, and reviews. The wretched scum of Cam, the villainy of Kyle, and the occasional loose lips of Shockey make for a wild time in a galaxy far, far away. Drink up and pay attention... and your tab! YOU WILL SUBSCRIBE AND HIT THE NOTIFICATION/FOLLOW BUTTON! This is the way... May the Force be with you! Join our Discord: https://discord.gg/G2bzcpDtqC Question(s) of the week: What were your thoughts on the Kenobi Trailer? Also, how do you feel about Palpatine being used again? Catch the last episode here: https://open.spotify.com/episode/7bOMQYbP0numCY8IXqEVC6?si=a8oy2xOWTCmuS0C7S_CaAQ Visit our websites: www.lrmonline.com www.genreverse.com Follow us on twitter: twitter.com/LRM_Exclusive twitter.com/TheGenreVerse Kyle Twitter: twitter.com/ThatKyleMalone Cam Twitter: twitter.com/LRM_Cam Shockey Twitter: twitter.com/LRM_Shockey
We will discuss all your favorite and not so favorite celebrities. Let's get the discussion poppin. Comment below and don't forget to subscribe and hit the notification bell. Remember, Issa lil bit of truth, a lil bit of lies, but it's all factual! Let's discuss the rumors of Kevin Samuels passing. Join me with my co-host Shawn as we break down the information we have heard. Get your fashions from www.lmtbs.com Disclaimer - Excerpts from books, blogs, social media, and public figures protected by Fair Use Clause of the Copyright Act which states Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phono-records or by any other means specified by that section, for purposes such as criticism, COMMENT, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
Trigger Warning: Amber Heard Revealed The First Time Johnny Depp Allegedly Abused Her See acast.com/privacy for privacy and opt-out information. Become a member at https://plus.acast.com/s/the-bert-show.
Stocks across Europe experienced a 'flash crash' earlier today, with drops around 8% before fully recovering. Allegedly this was due to trades placed in error by Citi's London based trading group. Although the trades were erroneous, Nasdaq is stating the trades will not be voided or reversed. Join me at Market Disruptors Live May 6-8 https://go.1markmoss.com/joseph
How Does Big Government Collaboration With Big Tech Raise the Costs of Everything? We're going to talk about the Senate bill that has big tech scared, really scared. I'll talk about a new job site problem for a number of different industries because of hackers, the cloud, the cost and reliability. [Following is an automated transcript] This tech bill. It has the Senate really scared. He is frankly, quite a big deal for those of you who are watching over on of course, rumble or YouTube. I'm pulling this up on this screen. This is an article. ARS Technica and they got it originally from wired it's it was out in wired earlier in the month. And it's pointing out a real big problem that this isn't just a problem. This is a problem for both the legislature. In this case, we're going to talk about the Senate and a problem for our friend. In big tech. So let us define the first problem as the big tech problem. [00:01:00] You're Amazon. You are Google. Those are the two big targets here of this particular bill. We're going to talk about, or maybe your Facebook or one of these other Facebook properties, et cetera. If you are a small company that wants to compete with any of these big guys, What can you do? Obviously you can do what everyone's been telling us. Oh, you don't like the censorship, just make your own platform. And there've been a lot of places and people that are put a lot of money into trying to make their own platform. And some of them have had some mild successes. So for instance, I'm on. You can watch my videos there. And there have been some successes that rumble has had and making it into kind of the competition to YouTube. But YouTube is still the 800 pound gorilla. Everybody wants to be where the cool kids are. So for most people. That YouTube. They look at YouTube as being the [00:02:00] popular place. Thus, we should be, we are obviously saw the whole thing with Elon Musk and Twitter, and the goings on there. And Twitter really is the public square, although it's died down a lot because of this censorship on Twitter. Interesting. So as time goes forward, these various big companies are worried about potential competition. So how do they deal with that? This is where the real problems start coming in because we saw Amazon, for instance, in support of an internet sales tax. You remember that whole big deal. The internet had been set aside saying, Hey, no states can tax the internet and that's going to keep the internet open. That's going to help keep it free. And people can start buying online. And that worked out fairly well. A lot of people are out there, why would Amazon support a sales tax on the internet? They are the biggest merchant on the internet, probably the biggest [00:03:00] merchant period when it comes to not just consumer goods, but a lot of goods, like a staples might carry for business. So they'd have to deal with what they're 9,000 different tax jurisdictions in the United States. And then of course all these other countries, we're not going to talk about them right now, but the United States 9,000 tax jurisdictions. So why would Amazon support an internet sales tax when there's 5,000 tax jurisdictions? The reason is it makes life easier for them when it comes to competition. So if you are a little. And do you want to sell your widgets or your service? Whatever it might be online. You now have to deal with 9,000 tax jurisdictions. It's bad enough in the Northeast. If you are in New Hampshire, if you live in New Hampshire and you spend more than, I think [00:04:00] it's 15% of your time south of the border and mass, then mass wants you to pay income tax for that 15% that you are spending your time there. Now they do that with the. Baseball teams with football teams, hockey, you name it, right? So the big football team comes into town. The Patriots are paying the New York jets or whatever it might be. The Patriots have to pay New York state taxes, income tax now because they stepped foot in New York heaven forbid that they try and do business there and help New York state out. And they now have to pay income tax. Now they only have to pay income tax for, or for the amount of time. They're more New York. Various states have various weirdnesses, but if you're only playing 1, 2, 3 dozen games a year, It isn't like your normal work here, which is 2080 hours. We're talking about their plane to New York and they're only spending maybe 10 hours working in New York, but that [00:05:00] represents what percentage, 10, 20, 30% of their income, depending on how many games they play and how they're paying. And so they got to keep track of all that and figure it out. Okay. We played in New York, we played in New Jersey. We're in mass. We were they weren't in New Hampshire, certainly the Patriots plane, but they got to figure it all out. Guess what? Those big pay. Football players, hockey, baseball. They can afford to have a tax accountant, figure it all out and then battle with them. I had a booth one time at a trade show down in Connecticut. Didn't say. Thing it was terrible trade shows, man. They aren't what they used to be. And they haven't been for a long time. This is probably a decade plus ago, maybe even 20 years ago. So I had a little booth, we were selling our services for cybersecurity and of course, nobody wanted to bother pain for cybersecurity who needs it. I haven't been hacked yet. [00:06:00] Although there's an interesting article. We'll talk about next week based on a study that shows. Small businesses are going out of business at a huge rate because of the hacks because of ransomware. And if you're worried about ransomware, I've got a really great little guide that you can get. Just email me, email@example.com. I'll send it off to you, right? It's a free thing. Real information, not this cruddy stuff that you get from so many marketers, cause I'm an engineer. They'll go out of business. So they figured I haven't got a business yet, not a big deal. And so no body. There's big trade show. And I was so disappointed with the number of people that even showed up for this silly thing. So what happens next while I get back to the office and about a month to two months later, I get this notice from the state of Connecticut they're tax people saying that I haven't paid my Connecticut taxes yet. [00:07:00] And because I was in connected. I should be paying my income tax for that day that I spent and wasted in Connecticut. Oh. And plus every company in Connecticut that I'm doing business with now, I need to collect their taxes and pay them the taxes that I'm collecting for those Connecticut businesses are resident. I didn't sell a thing. You know what it took almost, I think it was three or maybe four years to get the state of Connecticut to finally stop sending me all of these threatening notices because I didn't get a dime from anybody in Connecticut. So I'd love the internet from that standpoint saying you don't have to collect taxes in certain cases, certain states, et cetera, unless you have a legal nexus or a legal presence there in the state. So back to Amazon, Amazon loves the idea of having everything on the internet packs. They love the fact that there's 9,000 plus [00:08:00] tax jurisdictions. When you get right down to city, state county Lilian, either local taxes, or you look at those poor residents of New York state, or they're poor residents out in Washington state that have to worry about that, right? There's county taxes, state sales tax. City sales tax, and income taxes are much the same, the, all of these crazy cities and states around the country. Yeah. The ones that are in serious trouble right now, they are those same ones. Those particular jurisdictions are hard to deal with. So from Amazon standpoint is just like the Patriots football players. We've got plenty of money. We've got teams of lawyers. We have all kinds of accountant. We can handle this and you know why Amazon really loves it because it provides another obstacle for any competitors who want to enter the business. That's the [00:09:00] real reason, so many big businesses don't go ahead and charge you serious money so that they can use that money against you. Okay. You see where I'm going with this? Because if you want to start a business that competes with Amazon, if you want to have a doilies, you're making doilies. My grandmother used to make them all the time and she had them on the toilet paper in the bathroom, little doily holders. Doilies everywhere. And then of course, the seashells shells on top of the toilet paper holders. If you want to do that and sell it, how are you going to deal online with 9,000 tax jurisdictions? All what you're going to do is you're going to go to Etsy, or you may be going to go to Amazon marketplace and sell your product there. An Amazon marketplace. So Amazon is taking its cut out of it at is taking it's cut off. And you still ultimately have some of that tax liable. [00:10:00] Amazon loves it. It's the same reason you see these groups forums, right? Barbers saying, oh, we've got to be regulated. Really you need to have a regulation in place for barbers. You need to have licensing for barbers. Why do they do that? They do that. Not just barbers, right? It's all of these licensures and various states. They do that really to keep people. To keep their prices high. That's why they do it because someone can't just put up a sign and say, Hey, I am now a barber. Come get a haircut. And if you don't like the barber, if they do a lousy job, you go elsewhere. We don't need all of the bureaucracy on top of this to enforce licensure. Anyways, when we get back, let's talk about that Senate. It's a big deal. And I am coming down in the middle of this thing. Hey, visit me online. Sign up right now. Craig peterson.com and get my special report on passwords.[00:11:00] We just talked about how big business uses its advantages to crush potential competition. Crush them. And it's a shame and it's happened to me and many people I know, and now the Senate's getting involved and making things worse. This is a huge problem. This happened to me a number of years ago, and I will never forget it. It was a really big lesson for me. I had designed and written a computer system that would take the code that it was written for a much older system. And run it for much less money. So bottom line here, this was a system called Cade computer assisted data entry that was made by Sperry way back in the day. Yeah. I've been in there for that long and they had little programs, so they would not punch cards, but punch right on two tapes, those big [00:12:00] nine track tapes and that information would then be used for processing later on then. People, big businesses grocery stores, you name it. We're using that Sperry system. And I designed a system that would take their COBOL is what it was. It was a form of COBOL code from this cage system. And you could use my code to compile it and run it on a Unix system. So the cost involved here was that it would be cheaper to buy a whole new Unix computer and buy new terminals and do some slight training changes. But the key punch operators would be exactly the same keystrokes as they were already used to. Okay. So you know how fast they were, so it wouldn't slow than none at all. And their cost would be. Then just the maintenance contract on the old Sperry cage. Very [00:13:00] cool stuff. And I worked really well. Then I worked with a couple of sales guys at spirit because Barry had a Unix tower system. It was a mini computer that was Unix space. And I had one, I had saved up my money. We bought this thing. It was a lot of money nowadays. It'd be about a hundred thousand dollars I spent on that system and it was really great. Cool. So some grocery stores started using it. They used it to build the space shuttle to design it and send it into space. RCA, Astro space used it, my system, which is all really cool. So Sperry was interested in it saying, okay let's do this. Now. I had flown myself across the country too, because I was in California at the time to do some of this work for. The for RCA Astro space for the space program and help make sure it was working and get it installed, help them configure it and everything else. So [00:14:00] I had a lot of time, a lot of money, a lot of effort into this. It was a big venture. So Sperry invited me down to their headquarters down in blue bell, Pennsylvania to talk about this. And I was so excited because their sales guys wanted to sell it. They gave me some free space in a booth in Las Vegas. So I was in the Sperry booth with them and, say, yeah, you can buy this. And you're using the Sperry, the new Sperry hardware. And I went down there and talked with them. They never did anything with me, or, here's a huge investment young guy. And all of this stuff just worked and they had proof of concept. They had a couple of customers already using the system and it never materialized. And then about a year and a half later, I found out Sperry had tried to duplicate my system and had messed it up terribly. It [00:15:00] wasn't keystroke compatible. So anyone using the new Sperry system, they had to learn. Okay. So I got to hit this and I got to go over here and I got to click on this. Are you kidding me using a mouse? Aren't you not? These are data entry operators. They just go all day long, just typing and. They had stolen my ideas. They messed it up. They didn't do as good a job as I did, which turns out it's pretty common. And they had stolen it. They stolen years of my life. So I've seen that before with me. I've seen Microsoft do that with friends of mine, and I've seen apple do it with various products that they've decided to release. They all do it. Why do you think these businesses can not spend money on research and development, and yet at the same time, stay in business as technology's continuing to move forward? Why? The reason is. They don't have to do, or why [00:16:00] would we do T wait a minute. Now, all we have to do is either buy the company or steal the product just re-engineer. Oh. And if we want to buy the company, we can do what Microsoft has been accused of doing again and again, which is. We'll just Microsoft. Let's see here. I like that database is pretty darn cool. So here's what we're going to do. So Microsoft announces, Hey, we're going to have a competitor to that in coming out soon. And then they sit there and they wait and they say, okay, how many people are going to ask about, oh wow. A lot of people asking for it. In the meantime, that company that had that great little database soft. Trying to sell it. And people are saying, wait, Microsoft is going to come up with a version of this. I'm just, I'm going to wait. We can wait a few months. Let's see what Microsoft. So that poor company is now seriously struggling because this big company came out and made the announcement that they're going to do something like this. And then that small company gets a [00:17:00] knock on the door. Hey, we're Microsoft or company X. And we like your product. Wow. Okay. So we're going to do a buyout. We're going to we're just, oh, this is going to be fantastic. I might have to sign what a two year contract non-compete and help them manage it. Okay. We can deal with this. And then they find out that company X says Your company is not worth that much anymore. Your sales look at their sales here, man. They've gone way down. Okay. So let me see let's do a nickel on every dollar evaluation you had a year ago. This happens every day, worldwide in America, it should never happen to anyone. And as you can tell, it upsets me. So what are Klobuchar and Grassley doing here? Amy, when she was running for president, she made this big deal. I'm going to pull us up on my screen. Those of you who are watching [00:18:00] on rumble or YouTube. And you can find all of that in my website, Craig peterson.com can see here. So they are trying to protect the American consumer, right? Yeah. Yeah. That's it. They're gonna protect us. And so what they're doing is saying that. Would a rule ruin Google search results because that's what Google says. Is it going to bar apple from offering new features, useful ones on the iPhone? How about Facebook? Will it stop them from moderating content? So the legislation's core idea is we will just. The marketplace take care of things. We're not going to let Amazon put their products in the product listings before third parties, but how are you possibly going to be able to regulate that stuff you can't, you can regulate it [00:19:00] talking about a bureaucracy. You'd probably need one about as big as the federal government is right now. And the federal government needs to be cut back in a major way. There's this two months. How about the 150 million Americans? This article brings that up to that are currently using Amazon prime, even though the price one hump. And they have it free to prime members. It's this is a big deal. The bill doesn't mention prime. Doesn't mention Google by name, Amazon. But this is going to be a nightmare to enforce the bill is not specific enough. It should be voted down. And between you and me, I don't know what can be done about this other than to have additional marketplaces show up online. And you know what the conservative social media sites are starting to win. So maybe there's hope. We've got two things we're going to talk about right now. One of them [00:20:00] is tech jobs. And man, is there a lot of scamming going on there as you might expect in the second is cloud, are you looking at cloud services? Hey, a home or business. You can see this. I'm going to pull this up on my screen for those watching on rumble or on YouTube, but this is a big problem. And we've seen this again and again right now, they're going after certain workers in the chemical. The sector, but it isn't just the chemical sector. What we've seen is the bad guys going after anyone that's applying for a job. So let me give you a few tips here. First of all, you should not be pain to apply for a job. We see that all of the time when it comes to the head hunting firms, what. Is, they will charge the business who is looking to hire someone [00:21:00] that makes sense to you. They'll hire they'll charge the business. So oftentimes it's a percentage of the annual salary committee where from usually 20% up to a hundred percent or more, depending on the position. And boy can, they make a lot of money, but they don't necessarily place. People, but you know how it is right now, there, there can be quite a few. So people have been applying for jobs to make a lot of money and not realizing that fee that supposedly they have to pay is illegitimate. So remember that. Okay. The second thing has to do with this particular scam, because what they're trying to do is. Into some of these companies. So they will send a thing out saying, Hey, on my head hunter, I'm here for you. We're going to get you this job you need to apply. Are you interested in a new job now? I've seen some stats online saying [00:22:00] that somewhere around 30 plus percent of people are looking or at least open to. Take getting a new job, which means a lot more are looking for jobs. Now I have to add to that, that the people who have jumped ship over the lockdown period really are not happy. The majority of them wish they had stayed where they were at. So keep that in mind too. But what they'll do is they'll say, Hey, listen. Oh, there's this new feature on LinkedIn. By the way, you can say y'all are, I'm interested in looking for a job. I forget exactly what it says, but it goes around your picture and I have it up there because I'm a contractor, I go to businesses and I'm. To harden their cybersecurity. And we usually start slowly, especially with some of these startups we're doing work with right now where they won't, they go from a completely flat network and [00:23:00] it's all engineers and I don't want anything hindering anything. And so you got to work with them and it's just, we had a time sort of a thing. Okay. I just had this one thing this week. And then move on to one thing next week as well. So that's what I do for a living. And a lot of people are looking on LinkedIn and other places to find people who can be a chief information security officer. So I'm what you call a fractional chief information security officer. I do this under contract and I've been doing contracts and contract work for. I don't know if I shouldn't be on the air, but my gosh it's been now I guess it's 40 years right now. So I've been doing this for a long time. So I'm familiar with some of these scams, so they didn't take my word on some of this stuff. So what they do is they say, Hey, we've got a potential job opening. Are you in interested now? When we talk about 30 plus percent of people polled [00:24:00] say that they're looking interested in a new job, the numbers are probably a little higher. Not that everyone's going to jump ship. Some people will, but there are a lot of people that if they get this email, they're going to open it up. And so what'll happen now is this group out of North Korea called the Lazarus group? And we've talked about them before. We'll go ahead and say yeah, the here's, what's going to happen here. Let's just send you this thing. You can open it up. You can look at it and see if it's really a fit for you. I love this graphic that they have. This is from dark reading. I have it up on the screen again. Rumble and YouTube. What should we do now? Should I open this up? Should I not open it up? It turns out that what's happening is that Symantec and Broadcom, both have noticed this and stated in an advisory a couple of weeks ago. Be very careful [00:25:00] because what it's going to do is install a Trojan horse on your computer. So let's think about this. You're talking about the chemicals. You have a lot of people who are very technical. And if a company wants to get some new technology, we talked about this earlier in the show, what did they do? Do they just go and say, oh, okay, let's get some R and D going here. Let me research and development. Let's hire some scientists and do some pure science here, which are almost never happens anymore. No, what they do is they either buy a company, they steal a company's idea. If you are like the communist, you try and steal the technology directly. And that's exactly what these guys are doing. They put a Trojan on your machine because you open that file and that Trojan then gives you. Oh, excuse me, gives them access to your machine. Now this particular Trobe Trojan is a malicious [00:26:00] web file. Disguises. This job offer and your machine gets comparable. They attempt to compromise it, right? It's not always successful. They're not as many zero days out there for these lower level actors like North Korea, but they've been able. Now, they're not just going after chemical sectors, they're going after it service providers. So companies like mine that provide managed security services for businesses, they are being attacked. So that's a problem too, isn't it? Because if you can compromise. A nine company and we've seen this all the time. It's getting reported like crazy. You now have access to all of their customers because the it service company has passwords, et cetera. And they're probably using. Industry is number one or number two products for managing the customer's computers, neither of which are secure. [00:27:00] And that's the biggest problem that we've had. We use some of these things before, I'm not going to name them right now because it wouldn't mean anything to you anyways, but we had to get. We worked with our, it people inside the software companies that make the software that are used by the managed services providers. And we'd talked with their developers and said, Hey, listen, this is a serious problem. That's a serious problem. You've got to change this. You got to change that. And what ended up happening? We left them because they weren't doing what they were supposed to be doing a very big deal. So they're targeting defense, contractors, engineering firms of any sort. They want to steal IP, intellectual property, pharmaceutical companies. Yeah. Very big deal. These third hunting teams, including Cisco's, which are the guys that we use. Tallow sets again, an example of a big company buying a smaller company called telos that does threat intelligence and it looks at stuff. They're all reporting to this. [00:28:00] So high level jobs in an industry or what you have to watch out. It'd be very careful. Now, earlier this year, Lazarus group, again, North Korea went after some of these jobs people 250 that were identified working in the news media, software vendors, internet infrastructure providers, using job offers that appeared to come from. Disney, Google Oracle by the way, that was according to Google who tracked the campaign. They know what their employees are doing, where they're going, what emails coming in. It's crazy. We're looking a lot of stuff. Okay. So I want to move on to the next topic here. Last one, this hour, but I'm gonna pull this up right now on my screen. You can have a look at it there. Of course, if you are at home. You can or you really can't on the road. You can see this on rumble and also see this on the YouTube [00:29:00] site. At least for the time being until I get kicked off right. Kicked off again. That seems to be the word of the hour, but cost reliability are raising concerns in. Again, this is a dark reading article, came out a couple of weeks back here, but the biggest concerns about cloud computing to what is cloud computing. Let's talk about that first for a minute. Cloud computing is going online using something like salesforce.com. People don't think of that as cloud computing. But you have in Salesforce, all the communications with all of your customers, et cetera, that's an example of a platform as a service, basically. So they're providing you with everything and it's up in the cloud, nothing to worry about here, folks, but of course you have the same potential problems. You do outs where people use what's it called now? Microsoft 365. Which Microsoft disclaimed [00:30:00] any liability for any problems they cause for anything customers it's really crazy, but again, what are the problems there? Reliability slash performance, 50% of the people, 50% applaud on the screen. Again here worried about reliability and performance, because if your business is relying on cloud computing, What, how is the security any good? That you could use something, as I mentioned Salesforce, and just picking them out of a hat and not, they haven't been like a terrible provider by any stretch. But how about if you're going to Azure and you're using a workstation news here? How about if you're going to some other place, right? It could be Amazon web services. Google also has data processing services. Security's huge issue. Cost is a huge issue, reliability, performance, all of those. We're issues with more than 50% of the it [00:31:00] professionals. I'm surprised that this next one, which is our staff skillset on dealing with cog computing 26%. The reason I'm surprised by that is hardly anybody knows enough about cloud computing. Do we really confident about it? I'm serious about that. There's some companies right now, we're talking with a company called Wiz and they audit Azure configuration. So be very careful if you're using. Particularly if you're a business, it may not work out well for you. Hey, make sure you go online right now. Craig peterson.com/subscribe. Sign up. You'll get my newsletters. You'll get all kinds of great information. Absolutely free Craig peterson.com including my special report on passwords. Now, if you have any questions, just email me M firstname.lastname@example.org. [00:32:00] There is a whole bunch going on when it comes to Russia, of course, invasion of Ukraine. We're going to talk about that. And what is I can, how does this domain system work and why are people calling to have dot R U deleted? This is really a big deal. And if you're watching from home, I'm going to go full screen on this article. This is an article from ARS Technica, and I've been talking about it all week, which is that I can won't revoke Russian in Jeanette domains, says the effect. Devastating. This is frankly pretty darn fascinating to me because I can, as this international organization, it was put together in order to help make the internet international. And I'm not talking about the data international, but control of it. A lot of countries work. Because of [00:33:00] course the internet was created in that states. It was created by us tax payers, money for the DOD. And it was designed to be very resilient, in fact, so resilient that there could be a nuclear blast and that nuclear blast and. Causing problems, but yeah. Yeah, the internet is still going to work. And the whole idea behind it was you could have multiple routers. They're all talking to each other nowadays. They're talking BGP four and they can say, how can I get from here? To there. And so the idea behind BGP is they all share this information once the least cost way. What's the easiest way to post way. If you will, for me to get from point a to point B and it changes all the time. So you might be on a phone conversation. You might be listening to me right now, online streaming or watching the video you might be doing, who knows what [00:34:00] out there with digital communications. But the communications channel that you think you're using, where the data is going from, let's say my microphone, ultimately to your device, your ears, that data path, once it becomes dated. Can be changing multiple times a second. Now it actually changes quite a bit. Initially as these internet backbone routers, send the least cost, routing information back and forth to, and fro a very good thing, frankly, because it helps to speed everything up. And there's other tricks that we're using you. Might've seen. For instance, Akamai and some of the URLs before have sites that you've gone to, and that's called a content delivery network and that helps get the content to be closer to you. So if you're on a website in California and you're in New Hampshire, that website video, that website graphic, et cetera, is going to be coming from [00:35:00] a server local to me here in New Hampshire. All right. That's how that all is supposed to work. So we have names you guys know about that internet, domain names and those domain names. You already know those are turned into internet addresses, and those addresses are then used by the routers to figure out where to go, how to get the data. The problem that we're having right now, of course, is Russia seems to be substantially abusing the intranet Putin, put a kill switch on to the Russian internet sometime ago. And the idea behind the skills, which was, Hey, listen, if we don't want the world to be talking to us, we'll just cut it. Now he's tested it a couple of times, but what he has not done is shut it down and he hasn't shut it down. As part of this Ukraine, more, what they did is they passed laws saying, Hey, if you publish something that [00:36:00] disagrees with what we're saying, you get 15 years. And even these people who've been protesting on the streets, they're getting a bound 60 days, 30 to 60 days in jail, just for protesting what's going on. So a lot of people have been saying why don't we just, we turn off the Russian internet now we're not going to use Putin's kill switch in order to shut it all off. We're not going to do a well, a few things. She decided not to do, denial of service attacks, et cetera. Although there are hackers doing that and we are going to talk about that today, but they're saying what? Let's just go ahead and let's kill their dot R E. The country domain. And I can, the guy who heads it up said, Hey, listen our mission is just to make sure that the internet works. So shutting off the dot R U domain so that no one can go ahead and. We send right. A [00:37:00] request out to the domain name servers and get a resolution to an IP address. So if you try and go to Kremlin dot REU or something, you will get blocked and you will get blocked. Not blocked. No, I like the great firewall of China or of Russia. Now they've got one going pretty good. Yeah. Thank you. You ain't using us technology. It's crazy. What we've. But what it does is it says, oh, I hide dot, are you, I don't know. What are you talking about? So there have been a lot of people who have been pushing for it. And you'll see, on my screen here, that Ukraine is requested to cut Russia off from some of these core parts of the internet. And I can, which is the internet corporation for assigned names and numbers. I couldn't remember what that was earlier said that I can must remain neutral and their mission they say is not to take punitive actions. It's to make sure the internet works. So are they really taking punitive actions [00:38:00] of the cat Russia off? It's really interesting to me because look at what has been going on. You've got companies like Facebook as the great example who has gone ahead and just shut off people. They didn't like what they were saying. My goodness. At one point of you said you should wear a mask during this pandemic. You would be cut off from Facebook. And then of course, if you said, no, you don't, you shouldn't don't need you, you shouldn't wear a mask that at that point you would be cut off, because science right. Sciences, we know exactly what we're doing now. It goes on and on. If you said that it came from a lab in China, you would have your account suspended. Now of course their whole tune has changed and yeah probably came from a lab in China. It's crazy what these people have been doing. So we have arbiters of truth, who are some contractors sitting in their home or wherever it is the contractors for Facebook [00:39:00] that are going through posts that people are flagging as Incorrect as fake news. So what happens is people say fake news and then that goes off to their team that then looks at it and says okay. Yeah, fake news because we disagree with it. It just blows my mind. We have to have free and fair and open discussions. Don't we. You have that line at Facebook and Google does some of the same. A lot of these sites do a lot of the same. You get our major media outlets that are all deciding what they want to report on and what they want to label as fake and fake news. I'm just shaking my head because it's hard. It's hard to believe. What about. Russia is putting out fake news, as I've said many times before the first casualty in war, this isn't my quote. The first casualty in war is what, it's the truth. So if [00:40:00] truth is the first casualty, then that means we've got a lot of propaganda going on. We had propaganda coming out of Ukraine. We've caught some of those, like the, what was it? The. Chat goes, fighter, pilot, whatever it was who had killed, what was it? Five Soviet or Russian jets, Soviet era using silver deer, techno era technology on the part of the Ukrainian turns out well. Okay, that, that was false news. That was fake news. The whole thing about snake island, where you had that Russian military. I know what it was a frigging but anyways boat sitting there saying we are a Russia. Warship, you will surrender or, whatever. Do you remember that snake on just the small place, 13 guys and supposedly they shelled it and they killed all 13 turns out that was probably fake news as well. So that's from the Ukrainian side and on the Russian side they hardly reported I as to how many.[00:41:00] The we're in fact, initially for quite a while, they were saying there are no desks. Then at the same time, the Ukrainians are saying they're 2,500 Russians dead. And that number keeps going up, who knows what it is today. It gets really crazy in the time of war. So if Facebook is going to stop someone from saying don't wear masks or do wear masks, depending on what day of the week it is basically right. Wednesday. It's okay to say that Thursday is not okay to say that we're back. No it's not. Or then why can't that type of censorship? Move on to the next. I that's a big question I have now. Should we be shutting it off? I'll pull this back up on the screen again. And it, this article from ARS, Technica is saying that experts have warned, whoever they are that shutting down the dot R U domain. Is going to cause just incredible problems [00:42:00] for Russians, which man would it ever talking about a major blow to the economy. And it would also cause problems for people who are trying to find out more truth about. Russia cause you couldn't get to their site. Now we've seen some amazing things in Russia. We had the Russian, one of the Russian news agencies T, which is broadcasting and here in the U S that their entire staff just walked out saying, forget about it. We're not going to promote this fake news, but this is a little bit different question. Me personally. I don't think anybody should be censoring any. For almost anything. Yo, there are some limits, but they're pretty extreme in my book. I'd rather know someone is an idiot because they're allowed to say stupid things, and counter, counter it, counter their arguments. You've got to have discussions anyways, stick around. We'll be [00:43:00] right back. Microsoft. Yeah, they've been around a long time. They've been helping us. They've had lots of cybersecurity problems. People use Microsoft software on their desktop. Some people use it for servers, which is crazy, but listen to what they're doing now. This is a little concerning. I'm going to pull this article up on the screen. For those of you who are watching a long, either on rumble or YouTube ARS, Technica article, they have some really great articles. This particular one is about our friends at Microsoft. This is cool. Microsoft announced today? This was like a week or so ago that Microsoft would be suspending all new sales of Microsoft products and services in Russia. Following the countries, unjustified, unprovoked, and unlawful invasion of. Now Microsoft [00:44:00] didn't give any specifics about the products, but it really is likely to be a blanket ban of all of the Microsoft products. This is very cool because Microsoft has taken an approach I've never seen them do before, which is okay. When. Gets hacked. You get our friends at apple, putting together patches and getting them out. They get them up pretty quick. Microsoft had been doing much the same. The problem was some months there were patches every day that you had to apply. That's how bad this software is. And they decided that man, let's be like politicians here. Let's release some very damning news Friday. At about 4:30 PM before a long weekend. So no one will notice. Yeah. Y'all are friends of politicians do that all the time. What Microsoft decided they do is, Hey, wait a minute. We know we're going to have patches. [00:45:00] It's not going to slow down. And because our code is terrible. So what we're going to do, let me see here. How about we just release all of them at once and we'll just call it patch Tuesday, right? Because people were complaining about how much work it was, how much effort was effort. It was to try. They hate them. These machines apply these patches every day. Huge problem for everybody from home users to big companies out there. So Microsoft has said, okay let's do that. Let's burry it. So nobody will notice okay that's what Microsoft does. And now we've gotten used to that. Now we have. We remember two guys, right? Bill gates followed by Steve Ballmer. Steve Bohmer was a nut job. Bill gates was a bad man. I think he's just been trying extra hard to compensate for all of the evil he did over the years. But what we're looking at now is new management and that he's been in [00:46:00] there now for a few years, doing a great job, cleaning up Microsoft, making it a very competitive company. He has done some amazing things. One of the things that he has decided to do, that's been very effective is how about this? How about we go ahead. And we work with various governments to help stop these Russian hackers. And I mentioned this a couple of weeks ago, what was happening and the Microsoft had reached out to the white house and said, Hey, listen. What we have been looking at the hacks that have been coming from the Russian hackers, and we've been preparing fixes for some of those hacks. How about we work directly with some of these other countries? This reminds me a whole lot of the lend lease program in world war two. You might remember this thing, but the [00:47:00] us of course, initially was not involved in the war and they decided, okay we've got to help the United Kingdom. How are we going to help them? The UK doesn't have the money to buy ships, to have us make weapons, bullets know. What they did is they had people donate the rifles, the guns ammo from home. Plus they made them the government, instead of selling them to the UK, they lent them to the UK because the UK could not afford everything that it needed in order to fight a war against the national socialist in Germany. So what did they do? We just shipped the stuff over there and called it a lend slash lease. I think that's a great idea. And what Microsoft is doing is also great idea. They have been decoding, reverse compiling, if you will, and interpreting the code, looking at what some of the ransomware and other malicious code the Russia has [00:48:00] been using against Ukraine, and they have been providing. All kinds of insight information to these other countries. Now, this is a great idea for a few reasons, one of the reasons, and I think maybe the biggest reason is that the ransomware, the viruses, all of this malware that they're producing is. Not particularly discriminating. Do you guys remember maybe I dunno, what was it? Six months ago, I taught, told you how to avoid getting most of this Russian ransomware. And it was as easy as just installing. Yeah, installing a keyboard on your computer windows or Mac, windows. Those are the machines are always getting attacked quite successfully most of the time, but the windows keyboard. Russian language. Now you didn't even have to use it. [00:49:00] You don't have to have a keyboard, right? This isn't a Russian keyboard that I'm holding up here on camera. This is just a regular us keyboard. You can just install a virtual, Russian keyboard. And once that keyboard was installed, you're pretty safe. Why? Because Vladimir poop. Dictator for life of Russia decided he would just go ahead and stop anybody that was trying to hack Russian. Companies businesses, government agencies and what's the best way for the hackers to do that. Cause they didn't want to end up in Siberia for the rest of their lives because of a hack. Now they went ahead and said, okay if there's a Russian Cyrillic keyboard on the machine, we're not going to activate. So if the software, the malware on your computer, all you need to do is have a Russian keyboard. Yeah, that's it pretty simple. I told you that months ago, now what we're seeing is these indiscriminant [00:50:00] types of software that are being used in Ukraine. Why doesn't the keyboard trick work while some of Ukrainians peak Russian, we could go in. To the background on that of the massacre, the starvation purposeful starvation of Ukrainians by the Soviet union over many years ago. And how they then gave their property, their homes to Russians to move into in order to occupy Ukraine. So there's people in Ukraine who are Russian speaking of course. Now we're talking two or three generations, four, maybe down the road from when the Soviet union killed all of those millions of people. But there are some fights that to say, there's Russians, Russian speaking people there. Let me put it that way. Perfectly. In Southeastern Ukraine anyways I'm going on and on I, this is not an education on war or history. This we're talking about [00:51:00] cyber security. So the, they have, they been, Microsoft found many cases of Russians putting destructive. And disruptive or even more than that data wiping malware onto computers, it spreads indiscriminately. So Microsoft looking at what's happening, you crane, trying to get patches together for all of us, letting other countries know about what's going on is going to be. Amazing because this malware, which is wiping computers, primarily, it's not really just straight up ransomware give us money and we'll give you your data back. This is just showing your data, that malware is going to leak outside of Ukraine. Yeah. Cause us all kinds of book tension, probably. When we get back, I want to talk about this here. This is our friend Ilan Musk, and we've been following [00:52:00] along with some of the stuff been going on with his new satellite system in Ukraine. Stick around. The whole concept of these satellites and circling the earth, providing us with internet, just regular guides. It's going to be in our smartphones is changing everything. We're going to talk about Elon Musk and what's happened over in Ukraine. Our friend Elon Musk has done a lot of things over the years. He has really helped us for frankly, the Tesla and what's been happening there. SpaceX, his main concern being let's get off of a single planet on to multiple planets, right? The movement to Mars, NASA's working on a serious moon base. I reminded him of space 1999. You guys remember that show, but yeah, we're going to have a moon base by then [00:53:00] and it makes a lot of sense. So who's going to go to these well, there's some interesting lotteries people have to apply and everything else, but he's done so much, right? He's got the boring company you'd already know about Tesla and boring company in case you didn't know makes underground tunnels. He has also. A few other things has got a huge battery manufacturing facility. They're working on new battery technologies to make all of our lives a little bit better, particularly if we have an electric house or electric car, because this is what good is it to have electricity that you can't use. And that's really what they're trying to do is make it so that electricity is available 24 7 for you. And. Those space X, which is what I mentioned as well as what we're going to talk about right now. I'm going to pull this up on my screen. For those of you who are watching over on rumble, or of course, YouTube, this is fascinating. He [00:54:00] said there's a high probability of Russian attacks on Starlink in Ukraine. Now that is fascinating because what he's done is he has sent over truckloads. I'm showing a picture of a truck. In fact, with these Starling terminals in it, that's from ARS Technica. Just double-checking it here, but this is very cool. This is posted by the vice prime minister over there in Ukraine. And they are talking about these terminals. Now a terminal in this case is something that allows your devices to talk to the Starlink satellites, or there's going to be a huge constellation. They've got 2000 satellites up and they're putting another 12,000. These types of satellites are much different than what we've been used to over the years. We were typically, we've had these massive things sitting up in space. [00:55:00] I worked with RCA Astro space many years ago and I saw. They're testing facilities, which are just incredible. They had this huge vacuum chamber that they brought me in to see as we were working on space shuttle software. Yeah. I wrote software that they used to put the space shuttle together yeah. Way back in the day. So that was a pretty proud moment. Anyways. It's we're not talking about these huge satellites, like they used to launch, we're talking about very small cell. And they're not just sitting way, way up there. These are in basically in low orbit around the earth and they're geostationary. In other words, they stay in one spot. I believe this is the way they've got these things set up. So these satellites then allow because they're so close to the earth, allow them to use less power. And also the other advantage to that is.[00:56:00] The delay, right? The delay between having to send it all the way up and back down, because electricity takes time, right? Yeah. Travels at the speed of light. But nowadays you might've noticed it can take your quarter second, half a second. When you're talking to someone, when I'm on the radio with some of these radio stations or the delay can be absolutely incredible. Like I half second to a second sometimes. And that's just because they're being cheap. This type of technology where you have these constellations and it isn't just Elon Musk. It isn't just Starling, but constellations with will ultimately we'll have tens of thousands of satellites up there. Not, there's all kinds of other potential problems not getting into that right now. But what it does mean is yes. Can communicate and we've never had this sort of thing before we had the us military, the Navy in fact, put together a communication system that [00:57:00] lives on top of the internet and called nowadays. Generically the dark web. And it was set up to allow our military, our state department to be able to communicate with people in countries that are back in the day under Soviet control, all kinds of potential problems. So whenever those problems existed, they just went ahead and used this onion network, which is a part of the dark web, et cetera, et cetera. So let's say we had before. Now what happens if you're a country like Ukraine, where 100% of your internet comes from Russia, Russia obviously can sit there and listen in. Hopefully your encryptions. Good. A lot of Russians have been using telegram and already get real news about what's happening in their country and other places. And Della Graham is not that secure, frankly. WhatsApp pretty secure signal is the [00:58:00] one you want to pay close. Attention to signal is considered to be the most secure of all of these secure communications apps. But there's a level above all of that, because if they can tell that you're communicating, even that is enough to give them some information. So they might not know what was in that transmission, but if the transmission is all of a sudden, a tons of activity coming over, lots of data, lots of messages going back and forth, they can say maybe there's something about to happen. That came out. You might remember the old orange book for security way back in the eighties, I think is when it came out. But part of what you had to do was cover up your. Actual real communication. So it's one thing to have the communications encrypted, but you wanted to always have about the same amount of communications going back and forth. So people couldn't figure out what you're doing now with these types of devices. That [00:59:00] kind of problem still exists. And this is part of what Elon Musk is warning about here. Pull it up on my screen again, for those people who are watching Elon Musk is urging users of his satellite system to put their Starlink antennas as far as. From people as possible. Now, why would he be doing that? Because frankly, that terminal is transmitting to the satellite as well as receiving from the satellite. And it is entirely possible that there could be some evil software that is listening in for the satellite transmissions and sends a little missile your way. Also, of course the Russians have satellites in space that can look down on the ground. Now it's something as small as a terminal four Starlink, little hard to see, but Elon Musk is saying, Hey, listen guys, [01:00:00] go ahead and camouflage it. You might want to spray paint. It just don't use metallic paint so that they can't see it and place it as far away from where people are as post. So you can still use it and only use it when you need to use it. Don't keep it up and running all the time. But this is the start of something great. Something where you can't easily block people's communication. So Russia has tried to do. And they have been jamming the Starlink satellites. So what did must do? He delivered all of his engineers to working on how can we get around the Russian Jack? And according to Elon Musk, they have gotten around it and they now have their satellite systems completely jammed free from the Russians. I think that's fascinating. They're probably using some good spread spectrum technology that was actually known about it and world war II. And then we can talk [01:01:00] about that for a long time. Heady, you might remember her anyways, skip that for now. Stick her out. We got more when we. A whole bunch of pandemonium out there because of what Russia's been doing in Ukraine and how it's flowing over to us as well. Hey, this is not great news. Pandemonium is the name of the game over there in Russia. And they are being very successful. We're going to talk about what happened in Bella ruse. We'll talk a little bit about what happened in Ukraine with cybersecurity and what's happening right here right now. I'd also like to invite you guys to listen to me on all kinds of apps out there, including the tune-in app and many others. Let me get my screen set up because now you can also catch me on. And on YouTube, this is almost [01:02:00] a complete, let me pull this up for you. There we go. Complete ARS Technica today. They've got some great articles this week, looking into the Russians. What are they doing? What kind of problems is that causing us? But we are seeing some interesting attacks back on. And back in very big way. Russia has been going after you crane in the cyberspace for a long time, we spoke a few years ago about what Russia had been doing with the tax software for Ukraine. We don't do this in the us or in Canada, but my number of European countries do you, where you have to have. The old official tax preparation software put together by the government for your business or for your person, depending on the country you're living in [01:03:00] France is a great example of this. And Ukraine is another one. So Ukraine says, Hey guys, you got to go ahead and use our software. That means every business in Ukraine is using their software. To manage their tax payments and their accounts, frankly. And that wonderful little piece of software was hijacked by our friends in Russia. So they grabbed a hold of it. They in. Did some code into it that added rent somewhere to the software. So now all of the businesses in Ukraine are pretty much guaranteed to be using this hacked software. We have a client who has offices over in France, and we found a really interesting problem with them because. The French software that was being used for taxes for French businesses had an extra little [01:04:00] problem. And that extra problem was, it was insecure as can be whoever wrote this, must've taken a Microsoft programming course and had no idea DIA about the consequences of what they were. So it was very insecure. The, it was using a version of SSL, which is an encryption that's based on another type of increase. I don't want to get too wonky here, but that was just one of its many problems and bad keys, et cetera, et cetera. And keys by the way, was using keys that had been revoked, which you should never do. Bottom line. Oh my gosh. Hey, if you want more information on this, just drop me a note. email@example.com. Just let me know. So in this case, we had to help that company in [01:05:00] France. Ignore the security restrictions that were on their systems so they could use the French tax system. So anyways, I told you that, so I could tell you that the same thing happened to Ukraine. In a different way, their software was pre infected. So when they downloaded it, ta-da. They got that piece of ransomware that virus had spread. It was just a nightmare. And of course it robbed. If you will, Ukraine, government of funds, that would have been. So we had now a bit of a shift. I'm going to pull this up on the screen again, this article, because what this shift has shown is that the hackers are now operating on the side of you. Crazy. Which is just fascinating. So the group called anonymous, you might be familiar with them. Of course, they've been doing a lot of hacking for a [01:06:00] lot of years, releasing private information, government and information. All of that sort of stuff. And they have a mast what they're calling a volunteer. It. And this it army has been going and doing what well hacking Russian sites apparently. So this article is just absolutely fascinating and they pulled some of from wired as well, but the Russian space research Institute, their website was hacked, leaked files that were stolen from the Russian space agency, made it all the way on to the. The space agency was hacked in their website said, leave Ukraine alone, Alto anonymous. Will you up even more? They also did. What's called a D O S. Which is a distributed denial of service attack. Those can be [01:07:00] very difficult to protect against unless you're set up in advance to help protect yourself. And that pretty much destroyed Russia's dot are you top level domain? So we've talked about how domain services work, right? So Doug are, you is like.com except dot R U is for running. And so the domain name servers that handled our, you were knocked off the air because no one could really get to them. They used amplifying attacks and stuff without getting into all of the details. So basically they were trying to cut off access and they did for a lot of people to any. That ended in, are you? It's great. These are just some of the latest in this surge of hacktivism. That's been going on one of the ones I mentioned a couple of weeks ago with the Belarusians deciding they were going to hack the Belarus railroad, which was being used. To bring Russian [01:08:00] troops, supplies, tanks, et cetera, all on rail, right on down right to the border of Ukraine. So that was hacked so that they couldn't use it in order to go after. Of course Russia was able to get to Ukraine, but there's also been protests around the world. 48 Russian cities raise millions of dollars through cryptocurrency donations. Now, I'm not a big cryptocurrency guy and I'm not a big crypto currency guy because while. Cryptocurrency is likely to be outlawed by most, if not all governments. And they certainly could shut it down and it is not anonymous. All right. So using cryptocurrency does not mean it does not equate to completely anonymous. They have done a lot of donations. They're big companies including, we [01:09:00] just talked earlier about Microsoft, but also apple shell, BP, a McDonald's Starbucks. And these hacktivists have really joined in. And w we talked about a couple of other things, so this is messy. Because even more than in peace time, these active combat that are really hacking happening right now, rendering, hacktivism, any effectual and largely just distracting because we are now in a hot war right now. Maybe we don't have our. Eric planes bombing Russian movements or other things, but there is a kinetic war going on over there. There are bullets, et cetera, mean exchanged. So the hacktivist efforts have been, visible. There's no question about that. But what have they done? See, [01:10:00] that's an advantage to being a country like Russia, or like the Ukraine, or excuse me, Ukraine, because both of those countries there, their industrial base, the military industrial base is not heavily automated unlike ours. What could you do? What can you shut down? So what you shut down the Russian space agency's website, how far did you get into it? Probably not very far. We also have a couple of groups and we talked about these guys many times the Conti group, which has been. Terrible and hurting us businesses, individuals, government agencies, and stuff, the Cuming project, both of them have declared their allegiance to Russia. You might remember a few weeks ago, we talked here about how we have had some researchers track down most of these Russian hacker groups and their money. And they all ended up in one building in Moscow. [01:11:00] No, that should tell you something, right? In fact, the most expensive real estate right there in downtown Los gal, the tallest building, et cetera. So these groups getting together in order to protect the father land there in Russia. Ah interesting problem. How much of this is really controlled by the Kremlin? It's a very good question. Context. Was dismantling its infrastructure. It, some of their top people were arrested by Putins military. Not military, but police state over there. And that was interesting too. That was again before the invasion, but why would Putin be shutting them down at all? Apparently they said some things. That they shouldn't have said. So now they've come out and have decided they're going to support Russia in its entirety. Now we mentioned Microsoft and how [01:12:00] Microsoft has decided they are going to protect other countries. As well as you crane, at least as far as the Russian malware goes, and they've been very active in that. And there are a number of cybersecurity companies and other organizations that have released free versions of some of their software, these digital defense tools. Free offerings. Our big cranes defend the networks. Google says it's human rights focus de dos protection service project shield is now in use by more than 150 Ukrainian websites. So it's very good. Bottom line propped up by the way, published this massive trove of personal data. Allegedly identifying 120,000 Russian soldiers deploy. In Ukraine that was Ukrainian prov, not the old good old Russian Sophia Pramata man. I [01:13:00] remember I bought one of those on new standing Canada once. And I had a friend who was from Yugoslavia and he said, oh, can I show that to my wife? He showed it to his wife. She tore it up. I said, I want my Pramata, Craig Peterson got calm.
In a rare bit of good news for the nation's youth, a new natural history GCSE means 16 year olds might one day appreciate fauna as much as they do Fortnite. Author & conservation goddess Mary Colwell is the driving force behind the 10 yr + campaign to persuade the UK government to introduce this new qualification, no mean feat given the introductions they prefer to make are between plutocrat A and party fundraiser B. ALLEGEDLY.We natter to Mary about how on earth she got this campaign over the line - featuring Bond-style train chases, among other things - as well as the spell-binding power of the natural world, and why she's cur-razy about curlews [sorry, ed.]. So strap in for an immensely heart-warming chat with someone to whom future generations may owe a significant debt. Sustainababble is your friendly environment podcast, out weekly. Theme music by the legendary Dicky Moore – @dickymoo. Sustainababble logo by the splendid Arthur Stovell at Design by Mondial. Ecoguff read out by Arabella. Love the babble? Bung us a few pennies at www.patreon.com/sustainababble. MERCH: sustainababble.teemill.com Available on iTunes, Spotify, Acast & all those types of things, or at sustainababble.fish. Visit us at @thebabblewagon and at Facebook.com/sustainababble. Email us at firstname.lastname@example.org.
This is your cosmic energy report for April 29, 2022- May 6, 2022In this episode of Cosmic RX Radio, Madi Murphy joined by special guests Dana DeFranco, Elyse Carlucci, and Sarah Dembkowski, hosts of the Allegedly Astrology podcast, are talking all things celeb astrology, eclipse season and
H51 Classic Time!! Stranger Things Season 4 is coming out soon so what better way to celebrate than to revisit our Montauk episode, the story that gave inspiration to the Stranger Things. Plus, who doesn't want some more Peck in their life?!?!?! Original Description: On the eastern tip of Long Island New York sits the sleepy town of Montauk. It's a summertime getaway for New York's affluent and also happens to be the home of one of the darkest conspiracy theories in US history – the “Project Montauk ”. Allegedly a special ops black site where children were kidnapped, brainwashed, and experimented on, dissected, and killed. The purposes of which ranged from mind control, remove viewing, and ESP to telekinesis and ripping holes in space time. Were thousands of children turned into the telekinetic super soldiers…or is this just the mad ramblings of some weird old men. We'll journey into the upside down to find out. Plus, Brent professes his love for Wynona (Judd), the boys have an uncomfortable debate about the pronunciation of Winona's first name (Ryder), and Joe Peck joins the show for the last time (C-Bot means it this time). All of that and more on the podcast that doesn't always pick topics that have TV shows loosely based on them, but when we do it's always Stranger Things – Hysteria 51. Support the show: https://www.patreon.com/Hysteria51 See omnystudio.com/listener for privacy information.
Today's Topics: 1) Gospel - John 3:7b-15 - Jesus said to Nicodemus: “You must be born from above." Bishop Sheen quote of the day 2) Los Angeles based company to pay millions in settlement after allegedly faking hundreds of covid test results https://newsnationusa.com/news/usanews/los-angeles/la-based-company-to-pay-millions-in-settlement-after-allegedly-faking-hundreds-of-covid-test-results/ 3) The Tip of the spear. To see where the Biomedical Security State of CA is headed, look at the ten bills recently introduced in the CA State Legislature. Here's how you can push back: https://aaronkheriaty.substack.com/p/the-tip-of-the-spear?s=r 4) Governor DeSantis signs bills stripping Disney of special powers and blocking CRT In Schools https://www.dailywire.com/news/breaking-desantis-signs-bills-into-law-that-strips-disney-of-special-powers-blocks-crt-in-schools
Tune in this week for another heaping spoonful of games industry nonsense, including an ad system for Xbox games, Sonic Origins' preorder scheme, and "girl boss" energy. Also, Gearbox has announced a new Tales from the Borderlands game, a 'leaked' Game Boy emulator for Switch, and more. LINKS: Meta's Sheryl Sandberg reportedly pressured outlet to drop story on Activision CEO Bobby Kotick | Windows Central Gearbox announces new Tales from the Borderlands game | Windows Central Report: Microsoft working on ad system for Xbox games | Windows Central Sonic Origins comes to Xbox and other platforms in June 2022 | Windows Central Sonic Origins' preorder scheme is way past uncool | Windows Central Nintendo recap: Game Boy emulator for Switch 'leaks' and alleged workers' rights violations | iMore Nintendo allegedly violated workers' right to unionize | iMore
Penguin Post Office is hiring… Meth bust at the border… Horse trainer and horse on meth… Man hands officer his meth from glove box… Michigan pot sales up dramatically… Elon Twitter done deal?... Jack has new title… Tyson antagonist has attorney now… Subscribe to the YouTube Channel… Subscribe www.blazetv.com/jeffy / Promo code jeffy… Email Chewingthefat@theblaze.com CNN+ not dead… Who Died Today: Orin Hatch 88 / Daryl Lamonica 80 / Cynthia ‘Plaster Caster' 74... Lady survived Hitler and Stalin will survive Putin… Scene from Chernobyl… Executions are back… One down and couple halted… Last meals are fascinating… Kraft-Heinz Foods sued / Allegedly underfilling lemonade containers… Learn more about your ad choices. Visit megaphone.fm/adchoices
I wanted to tell you about a new true crime anthology podcast I produced, which features Michael Emerson (LOST), Jonathan Frakes (STAR TREK) and more actors and tells wild, crazy, scary, compelling true crime stories. There's a new crime in every episode. You can find the show by going to allegedlytruecrime.com or searching for "Allegedly Voyage Media" anywhere you listen to podcasts.
Rory Wild and The Wake Up Crew every weekday mornings from 6am to 10am
Shout out to Scotian for stumbling upon the title for this weeks episode! So much has happened this week from the return of the Munster family to Tik-Tokers rejecting AC. Lets dive right in. Also side note, in case we didn't mention it enough during this weeks episode , ALLEGEDLY. These statements are our opinions and in no way represent the complete and obvious degradation of our juridical system. Also huge congratulations to the artist who won big against AC last week! Enjoy :)
Special Thanks to Darren Marlar from Weird Darkness for inspiring me to do this...Listen to Weird Darkness here: https://weirddarkness.com/Edgar Allan Poe's, "The Masque of the Red Death," as read by your servant, Insomniac Centurion, Zevon Odelberg, exclusively for the enjoyment of The Legion of the Bloodshot Eye...
Noon All Local for Friday, April 22, 2022
On this weeks episode, Divine talks about maintaining healthy friendships as an adult! In a time when friends are getting married, popping out babies, and life is changing fast, Divine talks about navigating friendships fairly and honestly. She talks about gaining emotional maturity, giving good and thoughtful advice, balancing relationships and friendships and how to spot when you're being a bad friend. She also discusses having GRACE--with people, with yourself--hence the title, because apparently people can learn, people can grow and people can change.
How did you collapse your lung? Jonesy plays NFL Blitz and dominates. Thomas reviews 'The Batman'. Frank has stopped eating meat, ALLEGEDLY. They guys also discuss bar games, surprise party lawsuit, Lebanon shock experiment and Groom throws cake at Bride. What's your Tribe called again?
Our opening nonsense begins with Juan Soto's greatness, our potential trips throughout the rest of the year, and the ocks selling weed now.The Yankees are a hot topic this episode as Siddeeq has certain qualms about certain players. As a Yankee fan it's normal to be frustrated with the slightest inconvenience but he believes some of his points are warranted. With the help of Evan, they tackle the many issues with facts and profanity.Lebanon' Central Bank is bankrupt. Allegedly, according to the Prime Minister. On the other side, the Governor of the Central Bank allegedly says it isn't. We dig in to this and find out that Lebanon has no liquidity but still possesses solvency. For those that don't know the difference, please tune in to find out.Catch a quick info session with Diamond Pillar's very own Evan Brown as he helps us understand what this 5% mortgage rate actually means.
On this episode of the “Dr. Duke Show” we start in Richmond, California, where a biology teacher at an area charter school has been arrested for allegedly molesting seven of her students over the course of just three months.
Ebro, Rosenberg and Laura Stylez star in HOT97's flagship program Ebro in the Morning - this episode aired on 4/15/2022. Ebro, Rosenberg, Laura Stylez and the crew are in the studio talking about the star-studded roller party at Rockefeller Center, DaBaby's recent drama, and much more! Get excited for the gurus to help solve your problems and get the latest news with Flashing Lights. All that and more on Ebro In The Morning! LISTEN TO HOT 97's NEWEST PODCAST "TAP IN WITH TT" ON: Apple Podcasts -https://podcasts.apple.com/us/podcast/tap-in-with-tt/id1618314923 Hot97.com -Tap In With TT | Hot97 Amazon Podcasts - https://music.amazon.com/podcasts/d3104cc7-b28e-4e25-9884-5946219d0be6/tap-in-with-tt Spotify - https://open.spotify.com/show/0a2g28v979wHIY0Vlnrjul?si=a91f5e2a4d254f6d iHeart -Tap In With TT | iHeart See omnystudio.com/listener for privacy information.
MSNBC's Ari Melber hosts "The Beat" on Thursday, April 14, and reports on the latest in the Jan. 6 probe, the fatal police shooting of a Black man during a routine traffic stop, the conflict in Ukraine, and Obamacare. Elie Mystal and Melissa Murray join.