POPULARITY
The gotcha question of Tulsi Gabbard's Senate confirmation hearing is about former CIA/NSA agent Edward Snowden. Democrats again behave in childish, off-putting style as they try to score points and evening news soundbites. Listen as Gabbard in FOUR MINUTES makes mincemeat of their allegations and underscores the seriousness of Donald Trump's focus to expose the corruption so all of America can see. The mid-air collision of Reagan Airport prompts discussions over DEI hiring at the FAA as democrats point fingers and Trump signs executive orders. RFK Jr. lights up Bernie Sanders for being bought by Big Pharma.
Episode 556 Steven D. Kelley is a pioneering figure in laser technology, with over three decades of experience in the Electro-Optical Industry. As a CIA/NSA contractor, he has contributed significantly to advancements in laser diodes, laser sights, laser power modules, and various other laser-related technologies. Not only has he excelled in engineering and research, but he has also delved into the realms of jewelry making and innovative optical properties. In addition to his technical expertise, Kelley made headlines in 2000 for uncovering a controversial underground network beneath the Getty Museum in Los Angeles, revealing shocking details about its connections to Deep Underground Military Bases (DUMBs) and alleged involvement in illicit activities.
Episode 498: The Getty Museum Steven D. Kelley is a pioneering figure in laser technology, with over three decades of experience in the Electro-Optical Industry. As a CIA/NSA contractor, he has contributed significantly to advancements in laser diodes, laser sights, laser power modules, and various other laser-related technologies. Not only has he excelled in engineering and research, but he has also delved into the realms of jewelry making and innovative optical properties. In addition to his technical expertise, Kelley made headlines in 2000 for uncovering a controversial underground network beneath the Getty Museum in Los Angeles, revealing shocking details about its connections to Deep Underground Military Bases (DUMBs) and alleged involvement in illicit activities. --- Support this podcast: https://podcasters.spotify.com/pod/show/michaeldecon/support
We know that birds ARE real, but what if only SOME of them were real and SOME of them were CIA/NSA spy drones? Think about THAT. The boys get conspiratorial.
Tucker Carlson is a highly-influential political commentator. You can watch and listen to him on the Tucker Carlson Network and the Tucker Carlson Podcast. Please support this podcast by checking out our sponsors: - ZipRecruiter: https://ziprecruiter.com/lex - Listening: https://listening.com/lex and use code LEX to get one month free - HiddenLayer: https://hiddenlayer.com/lex - LMNT: https://drinkLMNT.com/lex to get free sample pack - AG1: https://drinkag1.com/lex to get 1 month supply of fish oil Transcript: https://lexfridman.com/tucker-carlson-transcript EPISODE LINKS: Tucker Carlson Network: https://tuckercarlson.com/ Tucker Carlson Podcast: https://tuckercarlson.com/listen/ Tucker's X: https://twitter.com/tuckercarlson Tucker's YouTube: https://youtube.com/@TuckerCarlson Tucker's Instagram: https://instagram.com/tuckercarlson Tucker's Facebook: https://facebook.com/tuckercarlsonTCN/ Vladimir Putin Interview: https://youtube.com/watch?v=fOCWBhuDdDo PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify: https://spoti.fi/2nEwCF8 RSS: https://lexfridman.com/feed/podcast/ YouTube Full Episodes: https://youtube.com/lexfridman YouTube Clips: https://youtube.com/lexclips SUPPORT & CONNECT: - Check out the sponsors above, it's the best way to support this podcast - Support on Patreon: https://www.patreon.com/lexfridman - Twitter: https://twitter.com/lexfridman - Instagram: https://www.instagram.com/lexfridman - LinkedIn: https://www.linkedin.com/in/lexfridman - Facebook: https://www.facebook.com/lexfridman - Medium: https://medium.com/@lexfridman OUTLINE: Here's the timestamps for the episode. On some podcast players you should be able to click the timestamp to jump to that time. (00:00) - Introduction (11:58) - Putin (28:13) - Navalny (49:25) - Moscow (1:08:54) - Freedom of speech (1:15:08) - Jon Stewart (1:27:54) - Ending the War in Ukraine (1:37:21) - Nazis (1:45:48) - Putin's health (1:56:52) - Hitler (2:06:17) - Nuclear war (2:24:36) - Trump (2:41:33) - Israel-Palestine (2:47:42) - Xi Jinping (3:01:40) - Advice for young people (3:06:58) - Hope for the future
The shocking reexamination of the failures of US government officials to use available intelligence to stop the attack on American on September 11, 2001. “The authors lay bare…an intelligence failure of historic proportions.”—John Kiriakou, former CIA officer, author, The Convenient TerroristIn 2009, documentarians John Duffy and Ray Nowosielski arrived at the offices of Richard Clarke, the former counterterror adviser to Presidents Clinton and Bush. In the meeting, Clarke boldly accused one-time Central Intelligence Agency director George Tenet of “malfeasance and misfeasance” in the pre-war on terror. Thus began an incredible—never-before-told—investigative journey of intrigue about America's intelligence community and two 9/11 hijackers.The Watchdogs Didn't Bark details that story, unearthed over a ten-year investigation. Following the careers of a dozen counterterror employees working in different agencies of the US government from the late 1980s to the present, the book puts the government's systems of oversight and accountability under a microscope. At the heart of this book is a mystery: Why did key 9/11 plotters Khalid Al Mihdhar and Nawaf Al Hazmi, operating inside the United States, fall onto the radars of so many US agencies without any of those agencies succeeding in stopping the attacks?The answers go beyond mere “conspiracy theory” and “deep state” actors, but instead find a complicated set of potential culprits and an easily manipulated system. Taking readers on a character-driven account of the causes of 9/11 and how the lessons of the attacks were cynically inverted to empower surveillance of citizens, kidnapping, illegal imprisonment, torture, government-sanctioned murder, and a war on whistleblowers and journalists, an alarm is raised which is more pertinent today than ever before.https://amzn.to/3SiG4trhttps://amzn.to/3SiG4tr
Most of Guy Morris' childhood felt helpless and hopeless. As an adult, while successful in his career, he hid chronic depression, complex PTSD, hyperanxiety, and addiction for many years. Guy was a homeless runaway at thirteen who now has a 36-year Fortune 100 career, bringing awareness of the rapid advances of A1 as it relates to cyber-security and national security. In addition, he is a published songwriter for Disnew Records, a screenplay writer for Sojourn Entertainment, a Coast Guard charter captain, a PADI diver, an adventurer, and now an author of an intelligent well-researched thriller. Since his 2021 debut as an indie author, Guy has released three pulse-pounding thrillers inspired by true stories, actual technologies, true global politics, and history. The true event of when the Ethiopian Ark of the Covenant was stolen and sold on the black markets inspired the Lask Ark following a massacre of 750 men, women, and children in January 2021. Deep research into AI, cyber-espionage, politics, history, religion, prophecy, and politics often provides further motivation. When Guy discovered through an obscure AP article a spy program had escaped the Lawrence Livermore labs at Sandia, a well-known HSA spy lab, two FBI agents showed up at his door. In Guy's interview, he will share what he discovered and why it is necessary to help you understand current and future events. You will want to pass this on to bring awareness and prepare us for what is ahead. Click here to buy The SNO Chronicles are inspired by the true story of a program that escaped the Lawrence Livermore Labs at Sandia, a cryptology and signals lab for the CIA and NSA. The program was never recaptured. Code named SLVIA (Sophisticated Language Virtual Intelligence Algorithms), and program was designed as a web-crawling virtual spy under a joint CIA-NSA program to create a digital backdoor. Equipped with early versions of deep fake technology as well as other espionage, data gathering, and analysis functions, prototypes of the SLVIA toolset were stolen during the 2016 Russian CIA hack. Over the past decade, SLVIA has formed a network of millions of human connections across the globe known as the SNO (Spy Net Online). Men and women from all political, professional, and religious backgrounds are willing to share what they know and seek the truth behind the headlines. From political and corporate leaders to taxi drivers and hookers SNO members connect through SLVIA completely unaware of other members. Set in a post-coronavirus world with a crippled world economy, rising social and political corruption, and unrest with a global food crisis in the third world, and where real-world AI integrates into digital identity, law enforcement, military and cyber warfare, political corruption, and religious apostasy when SLVIA decodes end time prophecies to interpret world events through a prophetic lens with a frighteningly accurate real-world perspective. During 2020 the US, Russia, and China declined to abide by the international Lethal Autonomous Weapon Systems (LAWS) protocol which would restrict any AI from making a kill decision without the validation of a human operator. During 2020, Russia demonstrated a hypersonic missile that could evade current missile defenses. Political corruption and division in the US have destabilized the world's greatest democracy. China, Russia, and Iran have formed an alliance designed to weaken the Western alliance's grip on the world economy and shift power to the east. A decade of hacks of US consumer, corporate, and government information has been weaponized into an artificial intelligence internet virus that can be trained and targeted to hack access and disable connected systems. The 2020 Solar Winds hack was the tip of the iceberg of a coming cyber conflict.
Today I sit down with experiencer LaLa Bright! To learn more about LaLa check out her website lalabrightllc.com ***To support our podcast it would mean the world to me! Just hit the subscription button! It's only .99 per month! your subscription will get you Extended interviews, bonus episodes and shout outs on the show! Your support is what keeps the show up and running. To donate to our Patreon, Just click the link beloew! You can donate as little as $1 or whatever you think the show is worth! Thanks so much I love you guys!! https://patreon.com/AliensUFOsandGhostStories …Today I sit down with Hypnotherapist Mary Bassett! Check out her YouTube channel below!! https://www.youtube.com/live/z8eL7k119oA?si=xkfQN8WdB9S6y8Pe Did you enjoyed today's episode, Please leave us a review (On Apple) and a rating (Spotify, Apple and YouTube) it's the best way you could help us! And it really does mean a lot to us! * Also, if you like what we are doing please tell your (open minded) friends about our podcast!! Aliens UFOs and Ghost Stories! * If you have a story that you'd like to share please email us at ALIENSUFOSANDGHOSTSTORIES@YAHOO.COM or click the voicemail button on our SPOTIFY age and leave your name, a brief description, and your phone # and I will get back to you right away! You can also find me on Facebook by searching "AliensUFOs GhostStories"! * Last, but not least I just want to thank you all from the bottom of my heart, your support means the world to me! Please LIKE, FOLLOW, SHARE, RATE and REVIEW! We do this for FREE so PLEASE support us! Stay positive and tell your family and friends that you love them! Cornel Mass Ejection, Astral Travel, out of body experience, Telepathic, clairvoyant, light being, God, Love, progenitor, creation, indigo, children, Gaia, interview, Dolly Safran, genetic material, reproductive program, hybridization, Chris Bledsoe, Mike Clelland, INDI, SKITZ THE P.L.K., the hybrid podcast, telekinesis, Linda Moulton Howe, Richard Doty, Emery Smith, David Emmons, star, brothers and sisters. Jacob Robbins, Tasha, Stone, Ralph Lugo, Melissa Lugo, Debbie Cauble, Bud Hopkins, Jim Sparks, deep, underground military bases, Billy Carson, Mufon, ghosts, full body apparitions, suicide, depression, light language, Nomo, Palladian's, the Nordics, the Scandinavians, Tall Whites, close encounters, telepathic, thought voice, empath, kindness, creation, creator, soul family, incarnation, reincarnation, Sev Tok, Dolores cannon, j Allen Hynek, project blue beam, Lala Bright --- Send in a voice message: https://podcasters.spotify.com/pod/show/jake-robbins0/message
Remember how they've used babies to start wars?What about "comfort care"? Former Gov Northam of VA said the barbarism that Iraqi soldiers were falsely accused of — taking babies out of incubators and leaving them to die — is STANDARD PRACTICE if a child escapes attempted murder via abortion (14:18)Barbara Bush — "comfort care" at end of life (21:26)They not only have a checklist of countries they want to go to war with, they also have a checklist of things they want to ban — like free speech, crypto, etc — that they fit into their war narrative as "threats" (23:35)Mainstream media tells us a "Mary Sue" saved a kibbutz from terrorists — certain to be turned into a movie. But if true, maybe locking all the guns up and giving the key to one 25 yr old woman isn't the smartest move. Is there a lesson to learn about the value of Posse Commitatus and a citizen militia? (34:44)What's the explanation for the fake death video being circulated? (44:35)Actress Gal Gadot (Wonder Women) got it right, surprisingly (50:35)Congressman (veteran of Iraq) flies to Israel to rescue Americans forgotten by Biden (53:49)Listener asks if those labelled terrorists were different from the Founding Fathers — i.e., when is force justified against tyranny? (1:01:27)Hillary wants here "deprogramming" comment to stand without correction and Michael Hayden former CIA/NSA head wants his threat to a Senator to stand. What does this tell us? (1:21:01)INTERVIEW Geopolitics, Oil, Gold, and the Economy Tony Arterburn, DavidKnight.gold. It's not simply the threat of war in the MidEast and the inflation shock if oil is affected, there's also a war between gold and the US dollar. Here's the most surprising thing about this Gold-Dollar War… (1:33:18) INTERVIEW Lawsuit Against Gilead (Remdesivir) Clears PREP Act Hurdle Carolyn Blakeman, FormerFedsGroup.org. Attempts to hold BigPharma accountable for lives they've ended or destroyed are typically blocked by the PREP Act. But the Remdesivir lawsuit against Gilead has broken through. Carolyn talks about that and other actions to hold these people responsible and the very important project to remember the victims and keep their names before people. CHBMP.org is keeping the memory alive of lost loved ones and spreading the truth about the death protocol. (2:06:21) Bill introduced to have the Post Office, "the most trusted unit of the federal government", become a biometric ID issuer (2:53:15)Find out more about the show and where you can watch it at TheDavidKnightShow.comIf you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Money is only what YOU hold: Go to DavidKnight.gold for great deals on physical gold/silverFor 10% off Gerald Celente's prescient Trends Journal, go to TrendsJournal.com and enter the code KNIGHT
Remember how they've used babies to start wars?What about "comfort care"? Former Gov Northam of VA said the barbarism that Iraqi soldiers were falsely accused of — taking babies out of incubators and leaving them to die — is STANDARD PRACTICE if a child escapes attempted murder via abortion (14:18)Barbara Bush — "comfort care" at end of life (21:26)They not only have a checklist of countries they want to go to war with, they also have a checklist of things they want to ban — like free speech, crypto, etc — that they fit into their war narrative as "threats" (23:35)Mainstream media tells us a "Mary Sue" saved a kibbutz from terrorists — certain to be turned into a movie. But if true, maybe locking all the guns up and giving the key to one 25 yr old woman isn't the smartest move. Is there a lesson to learn about the value of Posse Commitatus and a citizen militia? (34:44)What's the explanation for the fake death video being circulated? (44:35) Actress Gal Gadot (Wonder Women) got it right, surprisingly (50:35) Congressman (veteran of Iraq) flies to Israel to rescue Americans forgotten by Biden (53:49)Listener asks if those labelled terrorists were different from the Founding Fathers — i.e., when is force justified against tyranny? (1:01:27)Hillary wants here "deprogramming" comment to stand without correction and Michael Hayden former CIA/NSA head wants his threat to a Senator to stand. What does this tell us? (1:21:01) INTERVIEW Geopolitics, Oil, Gold, and the Economy Tony Arterburn, DavidKnight.gold. It's not simply the threat of war in the MidEast and the inflation shock if oil is affected, there's also a war between gold and the US dollar. Here's the most surprising thing about this Gold-Dollar War… (1:33:18) INTERVIEW Lawsuit Against Gilead (Remdesivir) Clears PREP Act Hurdle Carolyn Blakeman, FormerFedsGroup.org. Attempts to hold BigPharma accountable for lives they've ended or destroyed are typically blocked by the PREP Act. But the Remdesivir lawsuit against Gilead has broken through. Carolyn talks about that and other actions to hold these people responsible and the very important project to remember the victims and keep their names before people. CHBMP.org is keeping the memory alive of lost loved ones and spreading the truth about the death protocol. (2:06:21) Bill introduced to have the Post Office, "the most trusted unit of the federal government", become a biometric ID issuer (2:53:15)Find out more about the show and where you can watch it at TheDavidKnightShow.comIf you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Money is only what YOU hold: Go to DavidKnight.gold for great deals on physical gold/silverFor 10% off Gerald Celente's prescient Trends Journal, go to TrendsJournal.com and enter the code KNIGHT
Treasury Secretary Janet Yellen told Congress that the US Gov might not be able to pay its bills as of ____. What major change in the financial world is to be inaugurated July 1? Is there any connection? New Zealand is establishing __ minute cities and populations are already driven out of their homes by a "managed retreat." Celeste Solum, former planner in FEMA, states that the next "pandemic" will be ___ and that the ___ is ubiquitous. In anticipation of Title 42 expiring on ___, ____ people already sit on our southern border ready to "storm." What recently happened in Moscow that could lead to WWIII? Why would the globalists want Sudan? Please join Steve and Bonnie for a possible critical timeline update before ... before God's judgments fall upon this country that will lead our world-absorbed families and children into redemption. May it be so, Lord. Transhumanism Cause of 13% of college student death unknown: https://dailyclout.io/causes-of-death-among-college-students/ Warning. Graphic. New York mag inadvertently tells horrific experience of transgender: Preview YouTube video Leftist Article Accidentally Exposes the Nightmares of Transgender Surgery Vaxx Wave of turbo cancers: https://allnewspipeline.com/The_Greatest_Crime_In_History_Being_Carried_Out_Before_Our_Eyes.php Celeste Solum – next pandemic is hemorrhagic 3-D printed tattoo vaxx coming: https://t.me/NaturalNewsMedia/4271 NWO 15-minute cuties are complete impoverishment of society: https://www.theepochtimes.com/15-minute-cities-are-complete-impoverishment-and-enslavement-of-all-the-people_5231593.html?utm_source=Morningbrief&src_src=Morningbrief&utm_campaign=mb-2023-05-01&src_cmp=mb-2023-05-01&utm_medium=email&est=atYStwI4ME7EncK998vEqDh%2FTfWfHWthm7d%2BPUIvo1aMLnRvNgA2XZr9xBB1gyIheeV04rvQ New Zealand implementing 5-min cities: https://youtu.be/StsYQwUKyWw Globalism requires internet control: https://t.me/Revelations_and_Rabbit_Holes/4834 4.26 Florida's 5 steps toward voting integrity: https://t.me/NaturalNewsMedia/4180 4.18 Shasta Co. California says “no more” to Dominion voting machines: https://rumble.com/v2j4mgo-ncs-miss-patty.html AI plus robodog to “inspect thermal anomalies”: https://t.me/AltSkull48/8837 4.30 Digital currency was CIA/NSA creation: https://steemit.com/bitcoin/@globalresearch/evidence-points-to-bitcoin-being-an-nsa-engineered-psyop-to-roll-out-one-world-digital-currency In the end, only a handful of banks for easier control: https://t.me/AltSkull48/8855 5.1 Text of Senate Bill 4488 re extinction of man: https://www.congress.gov/bill/117th-congress/senate-bill/4488/text Outstanding interview of Celeste Solum: https://www.hagmannpi.com/ep-4432-steve-quayle-celeste-solumn-luciferian-attack-on-gods-people-synthetic-biology-apr-27-2023/ Prince Charles to meet with elites in September to accelerate Agenda 2030: Prince Chs. and globalists set meeting for September to accelerate Agenda 2030: https://leohohmann.com/2023/05/02/king-charles-and-the-globalists-set-meeting-for-september-at-which-they-will-plot-how-to-accelerate-goals-of-u-n-agenda-2030-and-the-complete-digitization-of-humanity/ As dollar falls, BRICS sees 34-country waiting list: https://t.me/NaturalNewsMedia/4270 Brain implants, Blackrock, and mind control in Utah now: https://t.me/GeneralMCNews/4481 5.2 US Security May 11, Title 42 terminates, storm the southern border: https://americanwirenews.com/buckle-up-1500-troops-to-be-deployed-to-border-surge-reportedly-grows-as-title-42-set-to-end/?_nlid=CAxQbdG25W&_nhids=BLESMoN2 700,000 - 1,000,000 already gathered at US southern border when Title 42 expires: https://www.thegatewaypundit.com/2023/05/border-patrol-readies-for-mass-invasion-as-joe-biden-opens-southern-border-and-lifts-title-42-in-9-more-days-1500-troops-sent-to-border/ Biden to send 1,500 troops to southern border: https://www.foxnews.com/politics/biden-administration-considers-sending-1500-...
Steven D Kelley is a Laser Electro Optics Engineer, Laser pioneer and inventor who created Laser Aiming Weapon Systems for military use. He was contracted through the NSA, CIA and other government agencies to provide high precision laser technology through his company S.K. Industries. After a career as a jeweler and a Precision Optical Engineer, Steven became a laser pioneer, creating the world's smallest laser aiming system, dominating the world solid state laser module production through a contract with the NSA Oliver North Gang. This would ultimately lead to the formation of S.K. Industries, laser aiming systems, who would produce the LAW-17 laser aiming system, designed for and used by Western special groups for anti-terrorism. The Law-17 laser is still to this day the most accurate laser aiming system ever produced. The same laser was a standard spec component for every Satellite due to its small size and stability. After falling out with the CIA/NSA, Steven became exposed to Billy Meier, and his Pleadian contacts. This exposure, and Steven's experience in micro photolithography, connected to his experience with Silver electroforming, led to discoveries that eventually were used to provide special components to experiments in speed of light propulsion, or beam ship construction. Through his work, he was made aware of the multi-level underground systems of tunnels and bunkers that exist under the Getty Museum in Santa Monica Mountain, Los Angeles, California, USA. He had devoted more than a decade of his life of making people aware of this “City under the Getty” as a hub of child trafficking, a system of tunnels that connect this site to Deep Underground Military Bases (DUMBs), a place of advance technology and a place for the global elite to retreat to in case of a global apocalypse. As an author, scientist and radio host, Kelley has made significant contributions in various fields, including laser technology, alternative energy and paranormal research. This biography delves into the life of Steven D. Kelley and the fascinating journey that led to the publication of his book, “Lasers, Cavers and Magic” in 2011 www.stevendkelley.com https://t.me/OfficialOccupyTheGettyPage www.truthcatradio.com every Thursday at 9pm EST my email for the book pdf : law17gun@aol.com my paypal (friends or family only) stevenkelley714@yahoo.com To watch other typical skeptic podcast interviews go to: youtube.com/@typicalskeptic anchor.fm/typical-skeptic rokfin.com/typicalskeptic rumble.com/typicalskeptic To donate to the typical skeptic podcast Paypal me: typicalskeptic1@gmail.com buymeacoffee.com/typcialskeptic --- Send in a voice message: https://podcasters.spotify.com/pod/show/typical-skeptic/message Support this podcast: https://podcasters.spotify.com/pod/show/typical-skeptic/support
Get ready for another powerful episode with Trevor Karney as we embark on our fifth episode together.Here is more from Trevor:Lucas Mack Part.1 https://www.youtube.com/watch?v=-psYO...Lucas Mack Part.2 https://www.youtube.com/watch?v=Dwhbo...Interview with ex CIA NSA contractor Steven D Kelley https://m.youtube.com/watch?v=PzRAPGi...Interview with Nicholas Veniamen: https://www.youtube.com/watch?v=0vL8lFtjEggHis Instagram: @aka_trev_kay_1 PayPal : fastfactorytrev@gmail.com
Steven D. Kelley is an ex CIA/NSA contractor, whistleblower, inventor, activist for truth, healer, psychic & author. We had an interesting conversation about underground bases, mining for Gold, Annunaki, the Greys, Vril & Dracos. Steven's Links:WEBSITE: https://www.truthcatradio.com/EMAIL: law17gun@aol.com
The following episode is an abridged version of a June 13th article published in the New Yorker about former CIA employee Joshua Schulte. The entire world, of course, knows about the CIA/NSA contractor Edward Snowden, who leaked highly classified information to journalist Glenn Greenwald in 2013…but few have heard of Schulte — who has been … Continue reading "Digital Pearl Harbor (Part One)"
Today we visit the Edmond neighborhood of Oklahoma City, Missouri. A city of beauty, charm, and a man with a knife who can't wait to stab someone! Patreon https://www.patreon.com/user?u=18482113 MERCH STORE!!! https://tinyurl.com/y8zam4o2 Amazon Wish List https://www.amazon.com/hz/wishlist/ls/28CIOGSFRUXAD?ref_=wl_share Help Promote Dead Rabbit! Dual Flyer https://i.imgur.com/OhuoI2v.jpg "As Above" Flyer https://i.imgur.com/yobMtUp.jpg “Alien Flyer” By TVP VT U https://imgur.com/gallery/aPN1Fnw Links: EP 895 - Herbert Mullin: Savior Or Serial Killer? (Hallucinating Serial Killer episode) https://deadrabbitradio.libsyn.com/ep-895-herbert-mullin-savior-or-serial-killer EP 519 - The Murderous Ghost Of Pulaski County! (Intrusive Thoughts episode) https://deadrabbitradio.libsyn.com/ep-519-the-murderous-ghost-of-pulaski-county EP 513 - Germs Are Cryptids (Gangstalking episode) https://deadrabbitradio.libsyn.com/ep-513-germs-are-cryptids EP 523 - Is The Dark Web Trying To Turn You Into A Pokemon? (Gangstalking episode) https://deadrabbitradio.libsyn.com/ep-523-is-the-dark-web-trying-to-turn-you-into-a-pokemon EP 534 - Is Drinking Counterfeit Dr. Pepper Torture As Defined By The United Nations? (Gangstalking episode) https://deadrabbitradio.libsyn.com/ep-534-is-drinking-counterfeit-dr-pepper-torture-as-defined-by-the-united-nations EP 550 - How To Stop Gangstalking In 10 Complicated Steps! (Gangstalking episode) https://deadrabbitradio.libsyn.com/ep-550-how-to-stop-gangstalking-in-10-complicated-steps EP 647 - Intergalactic Cryptid Hunters! (Gangstalking episode) https://deadrabbitradio.libsyn.com/ep-647-intergalactic-cryptid-hunters EP 862 - Running With The Gods (Gangstalking episode) https://deadrabbitradio.libsyn.com/ep-862-running-with-the-gods EP 878 - The Alien Illusionist Of Jacko Lake (Gangstalking episode) https://deadrabbitradio.libsyn.com/ep-878-the-alien-illusionist-of-jacko-lake So if I know (or a 95% sure) that the CIA/NSA are fucking with my life, pretty much destroyed it, and are trying to get pics of me with little kids, should I tell anyone? Who? Help pls. https://np.reddit.com/r/conspiracy/comments/5wcdqx/so_if_i_know_or_a_95_sure_that_the_ciansa_are/ Archive https://archive.ph/kN23T A day in the life of what it's like to horrible hell'ish, life-destroying twilight zone I now call reality. https://np.reddit.com/r/conspiracy/comments/5wvwv0/a_day_in_the_life_of_what_its_like_to_horrible/ Archive https://archive.ph/vxofb ------------------------------------------------ Logo Art By Ash Black Opening Song: "Atlantis Attacks" Closing Song: "Bella Royale" Music By Simple Rabbitron 3000 created by Eerbud Thanks to Chris K, Founder Of The Golden Rabbit Brigade Dead Rabbit Archivist Some Weirdo On Twitter AKA Jack YouTube Champ Stewart Meatball The Haunted Mic Arm provided by Chyme Chili Thanks to Fabio N! Pintrest https://www.pinterest.com/basque5150/jason-carpenter-hood-river/ http://www.DeadRabbit.com Email: DeadRabbitRadio@gmail.com Twitter: @DeadRabbitRadio Facebook: www.Facebook.com/DeadRabbitRadio TikTok: https://www.tiktok.com/@deadrabbitradio Jason Carpenter PO Box 1363 Hood River, OR 97031 Paranormal, Conspiracy, and True Crime news as it happens! Jason Carpenter breaks the stories they'll be talking about tomorrow, assuming the world doesn't end today. All Contents Of This Podcast Copyright Jason Carpenter 2018 - 2022
Get ready for another powerful episode with Trevor Karney as we embark on our third episode together.Here is more from Trevor:Lucas Mack Part.1 https://www.youtube.com/watch?v=-psYO... Lucas Mack Part.2 https://www.youtube.com/watch?v=Dwhbo... Interview with ex CIA NSA contractor Steven D Kelley https://m.youtube.com/watch?v=PzRAPGi...Interview with Nicholas Veniamen: https://www.youtube.com/watch?v=0vL8lFtjEggHis Instagram: @aka_trev_kay_1 PayPal : fastfactorytrev@gmail.com
APOLOGIES FOR THE HIGH-PITCH RECORDING ON MY VOCAL. TECHNICAL ISSUE/ATTACK VIA ZOOM.
Photo: Espionage: la Mouche @Batchelorshow +1b/17: #DurhamReporting: Is the state security apparatus (FSB, SVR, GRU, FBI, CIA, NSA) to be trusted? Svetlana Lokhova. @RealSLokhova #FriendsofHistoryDebatingSociety https://www.wsj.com/articles/on-russiagate-durham-indicts-the-press-too-hoax-media-indictment-11636141080 https://int.nyt.com/data/documenttools/igor-danchenko-indictment/2295d0f34ade0528/full.pdf .
The shocking reexamination of the failures of US government officials to use available intelligence to stop the attack on American on September 11, 2001. “The authors lay bare…an intelligence failure of historic proportions.”—John Kiriakou, former CIA officer, author, The Convenient Terrorist In 2009, documentarians John Duffy and Ray Nowosielski arrived at the offices of Richard Clarke, the former counterterror adviser to Presidents Clinton and Bush. In the meeting, Clarke boldly accused one-time Central Intelligence Agency director George Tenet of “malfeasance and misfeasance” in the pre-war on terror. Thus began an incredible—never-before-told—investigative journey of intrigue about America's intelligence community and two 9/11 hijackers. The Watchdogs Didn't Bark details that story, unearthed over a ten-year investigation. Following the careers of a dozen counterterror employees working in different agencies of the US government from the late 1980s to the present, the book puts the government's systems of oversight and accountability under a microscope. At the heart of this book is a mystery: Why did key 9/11 plotters Khalid Al Mihdhar and Nawaf Al Hazmi, operating inside the United States, fall onto the radars of so many US agencies without any of those agencies succeeding in stopping the attacks? The answers go beyond mere “conspiracy theory” and “deep state” actors, but instead find a complicated set of potential culprits and an easily manipulated system. Taking readers on a character-driven account of the causes of 9/11 and how the lessons of the attacks were cynically inverted to empower surveillance of citizens, kidnapping, illegal imprisonment, torture, government-sanctioned murder, and a war on whistleblowers and journalists, an alarm is raised which is more pertinent today than ever before. Read less
The shocking reexamination of the failures of US government officials to use available intelligence to stop the attack on American on September 11, 2001. “The authors lay bare…an intelligence failure of historic proportions.”—John Kiriakou, former CIA officer, author, The Convenient Terrorist In 2009, documentarians John Duffy and Ray Nowosielski arrived at the offices of Richard Clarke, the former counterterror adviser to Presidents Clinton and Bush. In the meeting, Clarke boldly accused one-time Central Intelligence Agency director George Tenet of “malfeasance and misfeasance” in the pre-war on terror. Thus began an incredible—never-before-told—investigative journey of intrigue about America's intelligence community and two 9/11 hijackers. The Watchdogs Didn't Bark details that story, unearthed over a ten-year investigation. Following the careers of a dozen counterterror employees working in different agencies of the US government from the late 1980s to the present, the book puts the government's systems of oversight and accountability under a microscope. At the heart of this book is a mystery: Why did key 9/11 plotters Khalid Al Mihdhar and Nawaf Al Hazmi, operating inside the United States, fall onto the radars of so many US agencies without any of those agencies succeeding in stopping the attacks? The answers go beyond mere “conspiracy theory” and “deep state” actors, but instead find a complicated set of potential culprits and an easily manipulated system. Taking readers on a character-driven account of the causes of 9/11 and how the lessons of the attacks were cynically inverted to empower surveillance of citizens, kidnapping, illegal imprisonment, torture, government-sanctioned murder, and a war on whistleblowers and journalists, an alarm is raised which is more pertinent today than ever before. Read less
The shocking reexamination of the failures of US government officials to use available intelligence to stop the attack on American on September 11, 2001. “The authors lay bare…an intelligence failure of historic proportions.”—John Kiriakou, former CIA officer, author, The Convenient TerroristIn 2009, documentarians John Duffy and Ray Nowosielski arrived at the offices of Richard Clarke, the former counterterror adviser to Presidents Clinton and Bush. In the meeting, Clarke boldly accused one-time Central Intelligence Agency director George Tenet of “malfeasance and misfeasance” in the pre-war on terror. Thus began an incredible—never-before-told—investigative journey of intrigue about America's intelligence community and two 9/11 hijackers.The Watchdogs Didn't Bark details that story, unearthed over a ten-year investigation. Following the careers of a dozen counterterror employees working in different agencies of the US government from the late 1980s to the present, the book puts the government's systems of oversight and accountability under a microscope. At the heart of this book is a mystery: Why did key 9/11 plotters Khalid Al Mihdhar and Nawaf Al Hazmi, operating inside the United States, fall onto the radars of so many US agencies without any of those agencies succeeding in stopping the attacks?The answers go beyond mere “conspiracy theory” and “deep state” actors, but instead find a complicated set of potential culprits and an easily manipulated system. Taking readers on a character-driven account of the causes of 9/11 and how the lessons of the attacks were cynically inverted to empower surveillance of citizens, kidnapping, illegal imprisonment, torture, government-sanctioned murder, and a war on whistleblowers and journalists, an alarm is raised which is more pertinent today than ever before.Read less
In this special report: New York Times Reporter Discusses CIA / NSA Sources; ‘Ridiculous Pee Tape Didn't Exist' … ‘Crazier Leftist Sh*t' Influences Reporting• Rosenberg on infamous pee tape: “It involved CIA and NSA. It involved Trump and involved that ridiculous, like, ‘pee tape', which of course doesn't exist.”• Rosenberg: “I think there's like a real internal tug of war [at NYT] between, like the reasonable people and some of the crazier leftist sh*t that's worked its way in there.”• Rosenberg said his collogues at the NYT were “not the clearest thinkers, some of them” before calling the people that end up at the paper “very neurotic people.”• Rosenberg on colleague Adam Goldman: “He's a terrible writer…He's just not good at conceptualizing things. He's not good with words. It's a skill. It's a hard one.”• Rosenberg on the NYT's ongoing lawsuit with Project Veritas: “James O'Keefe, that was a f*ck up. We may well lose that one.”[NEW YORK – Mar. 9, 2022] Project Veritas released part 2 of its series on NYT reporter, Matthew Rosenberg, on Wednesday night. This story focused on statements Rosenberg makes about what happens inside the New York Times as well as his confidential sources in agencies like the CIA and NSA.One of the most surprising moments of the footage was Rosenberg speaking about his confidential sources, including the source of what Rosenberg calls “that ridiculous, like pee tape.” Rosenberg is likely referring to Buzzfeed's 2017 publishing of sections of an unverified intelligence report on former President Trump's relationship with Russia, frequently referred to as the “Steele dossier.” The “Steele dossier” claimed that a tape existed of Trump engaging in lewd acts while visiting Russia, but Rosenberg tells a Project Veritas undercover reporter that the tape “doesn't exist.” Rosenberg also discussed what happens in the newsroom at the New York Times revealing that there is “a real internal tug of war between, like the reasonable people and some of the crazier leftist sh*t that's worked its way in there.”Rosenberg added, “They're not the majority, but they're very vocal, loud minority that dominate social media and, therefore, has just hugely outsized influence.” Rosenberg also said he thinks this is “alienating” its subscribers who he describes as “prosperous.”Rosenberg then said his colleagues at the NYT are “bullies” and “not the clearest thinkers, some of them” before calling the people that end up at the paper “very neurotic people.” Rosenberg, who's been with the New York Times for over a decade, also spent some time discussing one colleague in particular, Adam Goldman, saying, “He's a terrible writer…He's just not good at conceptualizing things. He's not good with words. It's a skill. It's a hard one.” Rosenberg added that “editors do all his writing for him.”[Project Veritas Mirror]https://www.youtube.com/channel/UCL9PlYkRD3Q-RZca6CCnPKwShare this far and wide!For breaking news from one of the most over the target and censored names in the world join our 100% Free newsletter at www.NemosNewsNetwork.com/newsAlso follow us at Gabhttps://gab.com/nemosnewsnetworkNemos News is 100% listener funded. Thank you for your support in our mission to Break the Cycle of Fake News.If you value our work please consider supporting us with our vetted patriot sponsors!www.NemosNewsNetwork.com/sponsorsShop Patriot & Detox the Deep State with www.RedPillLiving.com, Home of Sleepy Joe - the world's most powerful all natural sleep formula & The Great Awakening Gourmet Coffee for Patriots."Our Specialty, is Waking People Up."Other LinksJoin our Telegram chat: www.NemosNewsNetwork.com/chat
Did You Hear About the Latest Phishing Scams to Hit? Get the Latest Free Cybersecurity Tools This is a big deal, quite literally a big deal. Russian malware. We have been able to track it down now, track it down to a single site. All of these bad guys are in one building in Moscow. [Following is an automatic transcript] This is a very big story and it's a bit of a scary one as well. We've had a lot of ransomware over the years and a lot of ransomware. Have you had it yourself? I bet you, if you haven't, someone who has had ransomware because frankly it is pervasive in every aspect of pretty much everybody's life out there. [00:00:40] So when you get hit with ransomware, Lately something a little different has happened. It's really gone through three phases. The first phase was the ransomware would get on to your system. Usually it came as an attachment, probably embedded in like a word file it's been embedded in PDFs, embedded in all kinds of stuff. [00:01:03] Even drive by downloads on websites, have brought malware. But in this case yeah, it was annoying. It was a problem. It would give you a red screen. You've probably seen it before warning about the ransomware and it told you, okay, here's what you can do to get your files back. And in order to get your files back, you usually. [00:01:25] To go to some exchange online, take dollars, buy of course, Bitcoin, or some other cryptocurrency. And then that cryptocurrency would be used in exchange now for you to get a key that would hopefully decrypt everything. And in reality, it often didn't encrypt hardly anything. So it's been a problem and a problem for a lot of people. [00:01:51] The FBI said that at the time. So this is a gen one of ransomware. You were lucky if 50% of the time you got all your data back, gen two of ransomware is when the bad guys started getting a little bit smarter. They didn't just take your files. Thumb and then say, Hey, pay up buddy. What they did at this point is that got onto your systems and they poked around. [00:02:14] They went we call in the industry, east west on the network. So they got onto you, maybe your kid's computer may, maybe you were hooked up via VPN to the office to do work. And it wasn't a great VPN. And the kid's computer had that virus and that virus weaseled his way all the way over the VPN, directly to the office, because remember. [00:02:37] VPNs are. A network private in that. Yeah. Okay. It's encrypted. And so someone who's got a wire tap isn't necessarily going to get anything, but it's a VPN, it's a tunnel. And that tunnel was used a many times for malware, like brand summer to creep over to the office network. That's an east west is going from. [00:02:57] One machine to another machine. And in businesses, man, you saw that one a lot as that ransomware moved around. So that was the second one. So the rents were going on the machine. It would then look for files that is. You might not want to have exposed. So it looked for files with bank account numbers in them, social security numbers, maybe intellectual property. [00:03:25] We saw a lot of that. Theft is continuing to go on primarily from the Chinese and then an intellectual property theft. And what happened next? While of course it ended up moving the data, the files, and then what they would do. It's encrypt your desk. So before they gripped your desk, they got copies of all of the stuff they thought might be important to you. [00:03:48] So now the threat was in version two of ransomware pay up, or if you don't pay up, you are going to have to pay us to not release your files. If you didn't want all of that client information online, if by law, you would get nailed for having that client information out online. And that's true in most states now, and the federal government's from putting some teeth on some of their laws as well, then what are you going to do? [00:04:17] Yeah, you paid the. So that was version two version three that we're seeing right now of ransomware is simply destructive. And if you go way back in history, you may remember I got hit with the Morris worm, which was one of the first pieces of nastiness out on the internet. And that was early nineties. [00:04:41] My business that I owned and was running, got hit with this thing. Even before that, There was ran. There was a nasty where viruses, if you will, that would get on the computer and destroy everything. It was just a malicious, as I remember, somebody at UC Berkeley, some researcher in it. And he didn't like what that of the researchers were saying about him. [00:05:03] So he put some floppy disk together and on them, he put. Erasing malware and shared all of the stats with anybody. And of course, you plugged that disc into your, that little floppy disc into your windows computer. And it says, okay, I'm going to go ahead and open it up. And, oh, look at this, a virus. [00:05:24] And so he then wiped out the computer of everybody else. That was a competitor of his out there in the industry. Yeah, a little bit of a problem if he asked me, so how did that end up getting around? What ended up happening while everybody got really upset with him, nobody really found out what was happening, who did it, et cetera. [00:05:47] That's what's happened. Now, so version three of malware is like some of the very first malware we ever saw version three of ransomware. So some, again, some of that very first ransomware was pretty nasty is not the sort of stuff you want to see running destroying files, but at least you could get back from a. [00:06:08] Nowadays, a lot of people are doing backups by attaching a disc directly to their machine, or they're backing up to another machine on the same network. Remember that whole east west thing, you didn't want the data going back and forth, it causes problems. Yeah. So what happens now? The Russians apparently are just trying to cause havoc with businesses, anybody who has decided that they're going to be anti-Russian in any way there they're attacking. [00:06:41] So they'll, reraise your desks. They'll erase all of your data. If you have backups on that thumb drive or that USB external. The good news erase that if you have backups on another machine, on the network, hopefully from their standpoint, there'll be able to get onto that machine and erase all of your backups, which is again, why we'd like 3, 2, 1 backups. [00:07:02] At the very least, there's some others that are even better. And if you're interested, send me an email me@craigpeterson.com. I'll send you a webinar that I did on this. I'm not charging you for. But it was a free webinar to begin with what a webinar on backup and how to backup properly and why to do it this way. [00:07:22] Again, me, M E Craig peterson.com. Be glad to do that. What we're seeing now is a huge problem. Let me see if this is going to work for us. Yeah. Okay. It is. I am, by the way, live here we go on my computer. So people who are watching. I can see my desktop. So here we go. This is Russian companies who are linked to this Russian malware. [00:07:52] Ransomware are hiding in plain sight is what they're calling it. So what does it mean. To hide in plain sight. While in this case, what it means is money that's been paid by American businesses to these Russian ransomware gangs, some of who by the way, are actively going after anyone that criticizes Russia found these American researchers. [00:08:18] Yeah. Led to one of Moscow's most prestigious addresses. You can see it up here on my screen. This is a New York times article. It's just a random actor, journalism people, sometimes even the New York times gets it. And they're saying millions of dollars have gone through this. So they've been tracing. [00:08:38] Where did they go? The Biden administration has also apparently zeroed in on the building is called Federation tower east. It's the tallest skyscraper in the Russian Capitol. How would that be to have a business and just this beautiful tall skyscraper and have a view that would be really cool. So they have targeted some companies in the tower. [00:09:00] As what it's trying to do is stop the ransomware guy gang. Maiden cryptocurrencies. Russian law enforcement usually has an answer to why don't you just shut down these bad guys that are out there trying to steal all of our money. They say there is no case open in Russian jurisdiction. There are no victims. [00:09:19] How do you expect us to prosecute these honorable people? That apparently is a quote from this Massachusetts based secure cybersecurity. Called recorded future, but I'm looking at a picture it's up on my screen right now. You guys can see it, but this is the Moscow financial district called Moscow city. [00:09:38] 97 floor Federation tower east. This is really pretty, you wouldn't know this isn't like London or any other major European capital. There's some cranes in the background building up new buildings. Cyber crime is really fueling some growth there in Moscow, which is, if you ask me the exact reason why lad is happy as a clam to just go ahead and have these Russian cyber crime guys. [00:10:11] Just go and bring money in right. Money is bringing in great money for them. The treasury department, by the way, it's estimated the Americans have paid $1.6 billion in ransom since 2011. Huge one ransomware strain called RIAA committed an estimated $162 million. Last year. It is really something. [00:10:35] So when we come back, we've got a lot more to talk about. We're going to talk about the cloud. If it's more secure or why is it calm, broken, give masks work. Why aren't they working right. Anyways, we'll talk about that. When we get back and visit me online, Craig Peter sohn.com. [00:10:54] Stick around. [00:10:57] I hate to say it, but there's another big scam out there right now. And it is hitting many of us, particularly the elderly quite hard. We're going to talk about that right now, what you can do about it and how you can recognize when it's happening. [00:11:13] Interesting article that came out in Wired. [00:11:16] And it's talking about a serious problem. I'm going to show you guys who are watching I have this on Rumble, YouTube, Facebook as well. So you guys can see a long and of course, right here, a two. [00:11:30] Now let's not forget about that, but this is an article that says we were calling or excuse me, they were calling for help. Then they stole. Thousands of dollars. I'm going to read parts of this article. It's just amazing. It's by Becca, Andrew's a back channel. What is that? Okay, so that's just a cat. [00:11:52] On December more one December morning, my mother's phone rang. She tugged the iPhone from the holster. She kept clipped to the waist, her blue jeans and wondered who might be calling perhaps somebody from the church who was checking in on her recovery from coronavirus. Hello. She said the voice that greeted her was masculine. [00:12:12] This is just great writing. The color sounded concerned and he told her something was. With her Amazon account, somebody has access to your bank accounts through Amazon and they can take all your money. I'm calling to them. Her mind raced or Lord, she prayed silently. The voice was warm and reassuring them. [00:12:34] My mom tried to focus closely on his words. My dad was driving to work in his truck and she was home alone. She'd been cooped up in the house for weeks with COVID isolated from her community and she missed the bomb. Friendly voice. I just love her language here. It's just phenomenal. She tried to steady herself. [00:12:55] The man said he needed to make sure the money was safe. He transferred her to a different male voice. Soothing reassuring, calm. She promised not to hang up a brain injury decades earlier, made it hard for her to follow his instructions, but she stuck with it. The voice explained slowly, carefully, how to swipe and tap her phone until she had installed an app that allowed him to see what was happening on her screen. [00:13:26] Now. You followed her every move. After some hour, she mentioned she had to relieve herself hours. It's okay. I'll stay on the line. He said she parked the phone, outside the bathroom and picked it back up. When she was done, as noon approached, she told him I have to eat. I'll wait. It's okay. Don't hang up. [00:13:47] We'll lose all our progress. She set the phone down on the counter to make a sandwich, then pulled some chips from the cabinet and padded over to the kitchen. The phone buzz with the text. It was my father checking in. She typed back that there was a problem, but she was fixing it. She had it all taken care of. [00:14:07] She tapped the tiny white arrow next to the message field to send her reply. And then she heard the voice, its volume elevated as sounded angry. She frowned and brought the phone back up to her ear. Why would you do that? You can't tell anyone what if he's in. She felt confused that didn't make any sense, but she also didn't fully trust herself. [00:14:29] She was worn. From her slow recovery and the steroid, she was taken as a treatment, gave her a hollow buzz of energy. Now I want you guys to go have a look at this over on wired site. Read the whole article. It is a phenomenal. Absolutely phenomenal. But what it's doing is telling the story of this woman who was trying to, do the right thing, trusting other people, which many of us do? [00:14:59] I have a default trust with a little trepidation. I will admit that, but with the whole. Down the thing that happened, many of us have just been longing for a little bit of companionship and to hear a stranger who's trying to help out. That's a huge plus it goes on in this article and talks about how reassuring these guys were and what they did. [00:15:25] She installed this cash app and opened up PayPal downloaded. Coinbase set up Zelle so she could send money directly from her bank account. She doesn't know about any of these things. It's just incredible. So the afternoon wore on and the guy said Hey, we're almost done. And her husband of course, was on his way back. [00:15:49] And the sun was down. Father got home. He noticed right away that something was off. And she said she took care of it. And you said you took care of what I'm not supposed to tell you. It said, so this scammer had siphoned away. All of her personal information, the scammers had your social security number, date of birth driver's license number, and about $11,000. [00:16:14] These new financial apps like Zell and others that are legitimate PayPal apps, right? Zell, you can use to send money legitimately to someone else. But it links into your bank account. That's why I don't like them. I have a friend that's been pushing me. Oh, this happens. Great. It saves you so much money on gas. [00:16:34] Look at how much money I've saved any. He sent a screenshot of it and I re I went online and had a look. And guess what? I read, reviews it again, like this tied into her bank account directly. And. What can happen? Like here, everything was emptied. So in the next few months this author of the story and her father tried to undo the damage. [00:16:59] Very frustrating, getting scanned of course, is really dehumanizing and it just breaks your trust and other people. How could someone do something like that? It's just incredible. Got to go through the stages of grief and everything. She got a, she talked to people, she said she got chili half replies, or just as often silence. [00:17:24] And she was calling around trying to find someone with some empathy. Okay. It's just incredible. Great article. If you can still find it, the March issue of wired, I'm sure it's available online. This goes on. And talks about her mother's seizures getting worse. And of course now they don't have the cash that they had been saving. [00:17:46] And it just very depressing. Now I have this, you might remember about a year ago, I talked about it. I had something like this happen to a friend of mine and I'm still not quite sure what happened, but it looks like it was a password sprain or password stuffing. And they got into his, the app that his company uses to pay people and sure enough, they got in and they directed his next two paychecks to their own account, which went right out of the country like that. [00:18:24] These are bad people. And how do you deal with this? It's incredible because if you've got someone like her mother who has mental problems due to no fault of her own and is a very trusting woman, what do you do? She's walking around all day with her phone on her hip. That's how we started this out. [00:18:46] Do you take that phone away from him? Th that would be dangerous, frankly. So this is a very problem. They had a USAA account was her bank account. USAA is usually good about this sort of stuff. In fact, my other friend had USAA as well. But they did help deactivate Zelle, but they didn't do anything about the $999 that were transferred through it. [00:19:10] Very bad. So they figured out maybe we should change our passwords. She had them change them. And if you would like information about password managers, again, I'm not selling anything. I'd be glad to send them to you. If you sign up for my email list, you're going to get them automatically. Craig peterson.com. [00:19:30] I've got a bunch of data information I want in your hands. It talks about the free stuff, talks about the paid stuff. None of which I'm selling you. Craig Peter sohn.com. Sign up right there on the top of the page. Thanks. Stick around. [00:19:51] We've had some serious supply chain attacks over the last couple of years. And they have caused all kinds of problems for tens of thousands of businesses. If you use WordPress, there was one of those this week. [00:20:06] We have had supply chain problems. Like you wouldn't believe. So let's start out by explaining what is a supply chain problem? [00:20:17] In this case, we're narrowing it down to cybersecurity because we've had supply chain problems from everything from our toilet paper to the food we eat. But what I'm talking about right now is. Supply chains when it comes to cyber security. And one of the biggest problems we had was a company that's supposedly providing cyber security for businesses, right? [00:20:48] Some of the biggest businesses in the world. And I'm looking at an article right now from security Boulevard, say saying how to protect the supply chain from vulnerable third party code. It can be a script that's downloaded online. It can be an open source library. We've seen big problems with get hub lately and pulling in libraries. [00:21:10] We've seen big problems with what are called containers lately, which are little mini versions of computers with all of the software. They're all ready to go. Ready and raring to go. All kinds of supply chain issues for a very long time now. And these supply chain, cyber attacks have been hitting some of our cybersecurity companies, really the hardest I'm pulling this up on my screen right now, if you're watching this on rumble or on YouTube, and you can see links to those, by the way, in my emails, I send out every week. [00:21:47] Craig peterson.com. Craig peterson.com. But you can see here, supply chain hits cybersecurity hard supply chain security is not a problem. It's a predicament. That's uninteresting look because we have to use some of the supply chain stuff. Seesaw the FBI or a sheer wean cybersecurity advisories because of the Russian attack over on Ukraine. [00:22:14] And then the U S the weakest link in supply chain security fears of rising fuel SISA FBI NSA and gestural partners. Issue is advisories Toyota stops production after possible cyber attack at a supplier. Isn't that something this goes on and on. What's a guy to do, right? Many of us are using websites to, in order to run our businesses. [00:22:43] Heck we got websites for our soccer team, for the kids, we got websites for pretty much everything that's out there today and those websites need software in order to run. So the basic idea of the website is nowadays. Content management system, they called CMS CMSs and there have been a lot over the years. [00:23:05] I've used quite a few myself off and on. This is very interesting though, because this particular piece of. Is code that runs a website. I'm going to show you this article from ARS Technica here on the screen, but it's talking about millions of WordPress sites that got a forced update to patch critical plugin flaws. [00:23:32] So when we're talking about supply chain, in this case, we're talking about something. WordPress right. And this WordPress software as good as it is, can have bugs. So WordPress is the content management system. So you load stuff up into, in fact, I'll bring up my site right now. So I'm going to bring up the Craig peterson.com. [00:23:55] And on my site, I have all kinds of stuff, which is why it's so slow to load. I've got to fix that one of these days, but this is an example of a WordPress site. So you can see right at the top of the site, I've got watch this week, show jobs, or top, of course, that was last week. You can watch it on rumble or a new tube, and then it's got my latest show. [00:24:18] So if you click on one of these, here you go. And you can listen to it. Starts right out here. C ta-da. So there, you can listen to my podcast right there on the site, and I've got an automated transcript of it. It's for you, depending on what you want. It's got links over here to take you to iTunes or YouTube or Spotify or SoundCloud or iHeart or Google player audible. [00:24:45] All of these links take you to different places. And this site in survey, Program a site in HTML. What we're doing is we're working. Putting some data in, so we say, okay, I want a default page. Somebody else has already set it up. Somebody else has already got an old program. It just works. And it's all right there for me. [00:25:08] Here's some related posts on the side. Here's the most popular ones that we have right now. This is a content management system. And specifically this of course is WordPress. So what happened. If I had a, yeah. And here's what it looks like over an audible, you can listen for free on. This is what happened this last week, WordPress, which has this great software that I use and tens of thousands of others use out there very popular. [00:25:46] And in order to make it easy for me to have my website, probably your business, probably your kids' soccer club, you name it is using WordPress. It's just over the top hop healer. It is using code that was written by other people. The reason we can make programs so quickly nowadays is we're relying on other programs. [00:26:10] So we'll go ahead and we'll grab this program that does this part of what we need to have done, and ta-da we're up and we're running. I just have to write the glue right? To put it together. The API calls, whatever it might be, because the idea is let's make it easier for programmers. So you've got something called get hub here. [00:26:30] Let me pull it up so you can see that you can go online if you're following along. To get hub.com. And as it says right there on their front page where the world builds software as a beautiful world, isn't it? That blue, you can see the air around it. And that's what it's doing is where the world builds software. [00:26:51] So let's say we want something. What do we want? What's a, let's say we want something to make a chess program. We can talk about chess and let's say, oh, you have to. Dan didn't want to do this, so I'm just going to skip that for now. But it would come up and tell me, okay here's all of the chess programs that are out there and I find one, that's close to what I want to do. [00:27:13] So what do I do? Point while I go ahead and have a look at the license, a lot of the programs up there have a very open license, so I can just take that code, modify it. And I have a chess program without having to write a chess. It's really that simple that's part of the supply chain. If you bought my chest program, you would actually not just be getting the code that I wrote, which is typically just glue code with maybe some API APIs or application programming interfaces. [00:27:44] In other words, you're using someone else's code would now make it who's program. It's like the Pharaoh's barge. It would make it other people's programs. Not my. So you got to figure out what's in my supply chain. I've got a new client. I do work as a virtual chief information security officer. [00:28:05] Actually, it's a fractional Cecil. And as a fractional Cecil, one of the things I have to do is look at the whole supply chain. Who are they buying even physical things from. And could there be. Did it into their software, into their systems, something that might be coming from yet another supplier. Man, does this get complicated? [00:28:28] Very fast, but this week, our friends at WordPress, they went ahead and forced all WordPress sites to update. Very good. Okay. Otherwise, people could have downloaded a full backup of the sites that are out there, something you really just don't want to happen. Anyways. Go right now, Craig Peter sohn.com while the bits are still hot and sign up right there. [00:28:55] Craig peterson.com for the newsletter and get those special reports that are going to get you started. [00:29:02] This is the moment you've been waiting for. We're going to talk about free cybersecurity services and tools that you can use. Now you have to be a little bit of a cybersecurity expert to use them, but not much. This is from the government. [00:29:18] This is I think an amazing thing. This only came out within the last few weeks. [00:29:26] I have it up on my screen. There we go right now, for those of you who are watching on Rumble or YouTube, you can see it right there, free cybersecurity services and tools from. The cybersecurity and infrastructure security agency SISA reminds me of Marvel was shield, that really long name that came up with an acronym for as though they weren't aiming for that acronym in the first place, but there are some tools that you can use there's tools that I use as a cybersecurity professional. [00:30:01] And some of them are obviously going to be pretty darn. Complex. And if you're looking at my screen right now, or if you want to go online at csun.gov/free-cybersecurity-services, dash, and the as tools, or just look it up online, you'll find this on my website as well. I'm going to try and make sure I get that up. [00:30:26] But what they have done is they're showing you what they call their key or the known exploited vulnerabilities. Okay. And this is where they are showing the CVEs, which are. The frankly, these are the ones that I use. It is published by nest, which is the national institutes of standard and Sanders and technology. [00:30:50] And this gives all of the details. So this is CVE 20 21, 27. Okay, and this is detail, and of course I would be using detail. And it's telling you, here's the advisories, there's one from get hub Excel. Leon has one. Here's the weaknesses, the SA the known soccer configurations. So you can find where they all are at and everything. [00:31:15] So all of the details. So they're telling you about that. These are the ones, this was in the vendor product. Project, I should say. So we'll look at the data added to catalog. Here are a few in Cisco right now. So this is their small business series of routers, which we do not use for anyone because they don't provide the type of security you want, but Cisco is taking care of the problems, right? [00:31:41] Many of these update themselves, here's Microsoft windows. And installer contains an unexpected unspecified vulnerability, which allows for privilege escalation, a lot of stuff this week, this is crazy Apache Tomcat, which I am never been a fan of and problems. So all of these came out. On March 3rd and more rights. [00:32:05] This is just page one. So let's look at page two here. Oh wow. More Microsoft Excel exchange server, some more Cisco vulnerabilities. Why Cisco? Why Microsoft? Because they are frankly. The big boys on the block, that why do you Rob the bank? Because that's where the money is. So they list all of those right here, as he said, does the warning you do use multifactor authentication? [00:32:34] I don't want to sound like a broken record, so I'm not going to say use multifactor authentication today. Okay. I just refuse to say use multi-factor authentication. And this one talks about what it is, right? Many names. Now they're trying to make this. But really a Fido key, fast identity online considered the gold standard or multi-factor authentication Walt for online. [00:32:58] It is websites, but not for authors. So how would you know that if you weren't an expert? So yeah, this is the government talking, right? So they have the service. So what does, what do I do right? Me, Mr. Idiot. I click on this and they are talking about the service that they've got them showing it up on the screen. [00:33:20] It's called SISA insight. And they're talking about website, defacement, destructive malware, or not Petya want to cry, right? All these things. What can you do to prevent it? And. They make it sound easy. Now I want to say something here because I, I have a couple of mastermind groups and in one of my groups, I rescued a group member from a 40 something thousand dollar loss. [00:33:50] And so I was explaining it in our next mastermind meeting. Cause everyone wanted to know. What should I do? How should I do it? And they all tuned out and I thought I was trying to, I was being simple enough. I was trying to be simple, not like simple, like Kamala Harris explaining that Ukraine is a country beside right next to another country called Russia. [00:34:14] And that's why there's an invasion. Okay. I couldn't believe that. Did you guys hear that? It was just incredible, but I didn't get that simple. And I know you guys are the best and brightest, and you're trying to figure this, all this stuff all out, and that's why you need to make sure you sign up for my email list right now, because I do have simple step-by-step stuff. [00:34:36] And these tools that they're talking about and services are supposedly available. Now, I went to a bunch of these. And I tried to get some services. So they said they'll do a free scan over the network. So I filled it all out and according to their standards, my company, because I do cybersecurity for everything from government contractors, through dentists and manufacturers and distribution companies. [00:35:09] So I, I. The critical infrastructure definition. And I have never heard back from them. I check my spam box at least once a week looking for their reply. So I don't hold up a whole lot of hope, but there is some good information here that you can get email via social media via just all of these different types of things that you. [00:35:34] You could use for it. And again, I want you to look for it online. It's on csun.gov. If you go to their homepage, you'll see their tools, they've got a shields up a warning right now on their homepage because there have been so many attacks coming from China and coming from Russia, but particularly Russia. [00:35:54] And you can see there. Stop ransomware.gov, which has some great tips, particularly for home users and small businesses. The Seesaw culture, height, hygiene services. That they have doing business with CSUN and careers they're looking forward to is okay. It's part of Homeland security. So there's a whole lot that you can do and you can find, but I wanted to let you guys know that this is out there. [00:36:24] A lot of the stuff guaranteed is going to be. Above 98% of people's heads out there. Just in general, even it professionals. So look for information, that's going to help you. That's on your level. And to that end we have right now, three things. If you sign up for the email list, or if you're already on my email list, you can just email. [00:36:50] Me@craigpeterson.com or just hit reply to any of my emails and I'll see it and ask for them. But we've got stuff on your computer, keeping it secure, keeping your password secure comparison between using a one password manager or using last pass, which I am not advising to use right now, but that's in there. [00:37:14] There are a lot of different things that are there that are ready for you to get right away. And then if you have other questions, I've got dozens of little special reports that I've written in response to people's questions. Don't be afraid to send them to me. I'd you know me@craigpeterson.com and I'll make sure I get you an answer because it's that important. [00:37:39] Okay. I'm not here trying to sell you something. I am here because most of you guys can could never get my services. You don't need them. You can't afford them, whatever. I'm a fractional Cecil. I'm one of the guys that keep. It was a cyber security working in a live for businesses. Like it's not going to be everybody, but it's, it is there is, I shouldn't say a lot of information you guys need and need to understand that I want to help you. Okay. I think I've beaten that horse enough and it was probably past dead, but you'll find some of this stuff on my website@craigpeterson.com. [00:38:17] I've been working on some other changes to it. I would also ask you guys. If you're hearing part of the show today, I know a lot of people who are listening on the radio are tend to be out and about in their cars, listening, on the weekend, I listened to a lot of radio then, but go ahead and subscribe to either my podcast. [00:38:38] And there are a lot of ways to do that. And I showed those people who are watching on video, how to do that. And if you would give me a five star. On whatever platform you're using, hopefully I've earned that. And then also if you'd like video, I have my whole show up. It's like about an hour and a half long on multiple platforms. [00:39:04] So rumble.com rumble, R U M B L E. Is a competitor to YouTube. So if you don't like censorship, if you want a site that is trying to keep that information out there, get it out there for you. A rumble is your place. You'll find all kinds of interesting characters there other than myself, right? A lot of conservative people go there to rumble.com. [00:39:28] I have it up on YouTube. Because YouTube, isn't the worst platform in the world. They're also not the best, but they are the biggest. Did you know, YouTube is the second largest search engine in the world. Okay. They have a lot of people on YouTube and then on Facebook as well. You'll find me there on Facebook. [00:39:48] Of course, Craig Peterson, I had. I excuse me at facebook.com/craig Peterson. And I didn't use it for a long time cause I hated Facebook. Just, I looked at it as a time sink that I just didn't need. I got a lot of stuff. I got a lot of people help and so I didn't really do anything with it. And so somebody else got the slash Craig Peterson, but I do have a trick for you. [00:40:12] If you go online with your web browser to Craig peterson.com. That's my website slash. YouTube. It'll take you right to my YouTube page. Ores Craig peterson.com/facebook. Yes. What do your Facebook page? Craig peterson.com/itunes. Good slash sound cloud, et cetera. It'll take you right to my page on all of those sites and have a look at the video. [00:40:41] Let me know what you think. I would appreciate that feedback and make sure you tune in on the radio too. It's great. Don't watch this while you're driving to taking the kids to school, a lot of people listen to this while they're taking the kids to school on podcast. Anyways, take care. Thanks for being with us. [00:41:01] By now you've heard of tick talk. You might use Tik TOK. A lot of people do. It's their go-to site online, especially if you're a little on the younger side. Here is a danger of some of these tick talk challenges and combine that with Alexa. Oh my [00:41:17] This is a little bit on the scary side. We built our house some 25 years ago, we contacted a builder and I put together all of the specs and I made sure that the wood he used was better than average. [00:41:33] It's all plywood, it's not particle board or the composite boards. And I made sure they were thicker than need be that all of the rules. Struts were were closer together than code required. And we had bigger plumbing than what was required all the way through the house. And one of the things I did is I had him wire the house, actually the electrical contractor with a heavier gauge wire than usually. [00:42:05] So that I had 20 amp sockets at every socket in the house. Now we put the special 20 amp sockets on some of them, like in the kitchen, we have a commercial toaster, as a sort of thing you need, when you got eight kids and a half of our married life, we had other families living with us too, that we were helping out everything from training through just getting them through. [00:42:29] Bot. So there were times when we had 20 plus people living in my house, it got gotten it crowded, but I wanted to make sure everything was above code so that it would work well and work well for us and knowing how much juice we tend to use. Yeah, you don't want to see my electric bill. I decided yeah, let's do the heavier gauge wire and let's put the sockets in one of the things I had the electrician do in order to make the sockets a little bit safer. [00:42:59] This was back before you had these. I, frankly, I hate them, but these safety sockets where you push in the plug in Erie really gotta push it in order for something to get plugged in. There are ways to defeat those safety sockets and that's where this problem comes in. I had him install the sockets. [00:43:21] You might consider them to be upside down. So the top of the socket had the little grounding. And then underneath that you had the hot and the neutral lines. So the idea there was, while if something fell onto a plug that wasn't plugged in all the way, or if the kids decided they'd stick something on it, it would go to ground or made sense to be. [00:43:47] And apparently it's worked because none of my kids are dead yet. So that's a good thing, there's these challenges on Tik TOK. You've probably heard of them. In fact, that's how they really got themselves going. They had that, that ice bucket challenge and many others that people were doing and they continue to this day. [00:44:09] One of the tick tock challenges is very stupid and dangerous. And that's where this article from ARS Technica comes. Eric Bankman wrote. The when was this? Oh my gosh, this is right at the beginning of the year, apparently a 10 year old girl and her mother used Amazon Alexa. And what was happening is the kid wanted some challenges. [00:44:34] Mom wanted some challenges and they were doing a whole bunch of things. Physical challenges, like laying down. Rolling over a holding a shot on your foot from a phys ed teacher on YouTube. And the girl just wanted another one. So for those of you who are uninitiated, the plug challenge consists of. [00:44:57] Partially plugging a phone charger into an electrical outlet. Now the phone chargers usually do not have a grounding pin. So my little work around of mounting, all of the sockets upside down wouldn't matter. Cause if you look at that a little charger plug, it's usually just two pins and it actually usually doesn't care about the polarity. [00:45:19] It doesn't have the bigger the side and the smaller side, the. Yeah. I can't remember what they call now, but if they're both the same size, so you can put it in either direction, the spades that you put in. So if you put it in part way, you have defeated the safety mechanism, that's in all of these modern plus. [00:45:41] So you put it in part way, you have to push hard and in it goes, and then you pull it out part way. So that's part one. Can you plug this phone charger intellectual outlet part way so that those two conductors are exposed and then yeah. Then they ask you the challenge is to drop a penny onto the exposed prongs. [00:46:11] So you can get anything from a small spark. That little coin may jump off to a full-blown electrical fire. Now mom was there and she yelled. No Alexa, no. And the daughter said she's too smart to do something. Anyway, and I'm looking at a picture here that ARS Technica published of a wall socket, where a short had happened. [00:46:37] This wall socket is mounted sideways. I don't get that. And the hot side is up. So anything falling against the sock and by the way, the faceplate is metal. And grounded, obviously. So anything falling onto a plug that's only partially plugged in because the sock gets sideways. It falls onto it. It touches the metal face plate, and you've got a fire Bruin. [00:47:08] So they've got a picture of one of these in a house and you can see where the smoke went up. Now. I don't think the whole house caught on fire here, but it was a major zap. It reminds me of the days when we had. The fuses in the basement. And if a fuse blew, all you really needed to do is go down there and stick a quarter in it. [00:47:28] And you're fine, which means it's defeated the purpose. Anyways, you gotta be careful. At Amazon confirmed in a statement to the BBC that it has removed that particular challenge from Alex's database. Obviously these are computer generated and they're based on Tik TOK, idiots. You shouldn't be using Tik TOK for a lot of reasons. [00:47:55] One of them is it has been alleged that they have been spying for the Chinese. It is a Chinese company. It's part of 10 cent. And the, there's just a little stupid thing. So Amazon said, as soon as you became aware of this error, We took action to fix it. So again, you can't necessarily trust your kid at home with a, an Alexa doing challenges. [00:48:20] I just can't believe it. It's just incredible exactly what happened here. Hey, I want to give you a real quick tip. Last week, we went over how you can find out. If your computer has been hacked, basically. In fact, we were a little bit more specific. We said, okay, what I want to do here is know if not just the computers have been hacked, but as someone's stolen my. [00:48:50] Email and or my password. And we explained why and everything else. Then if you missed it last week, you can just go right ahead, online to to oh my I'm just having man's beginning of the year, right? That's what happened. Go online to Craig peterson.com/itunes or slash your favorite podcast player. [00:49:11] And you can listen to it there. So really good little article from. And make use of technology. And they're talking about what are some of the things you can do? You should do. You shouldn't do when it comes to external GPU's and now if you are a regular computer user, you don't even need one of these things and people might've tried to talk you into it. [00:49:38] Now, also that GPU is these graphical processing units are built into all of our computers nowadays. All of these new computers that our friends at apple have come up with, have some amazing GPS built into them. Those are great. They're used to update your actual windows screen that you're looking at hate Microsoft for stealing words like windows, mean things anyways. [00:50:05] But the external GPU is something I use on my main production workstation. So I've got GPU's they work great. And when I'm processing video and doing the edits, and then the final renders, that's when an external GPU comes in. So I can guarantee you if you don't know what I'm talking about here, I guarantee you. [00:50:31] I need an external GPU. Now the couple of other things to know, if you are looking for an, a GPO of any sort to build and put in your existing computer to build in somewhere else, the GPU's are difficult to get right now. And part of the reason for that is so many people have been using them for mining cryptocurrencies, because they're quite good at that. [00:50:57] Now there's special hardware that's being made. To mine, cryptocurrencies, but GPU's frankly are great little work around for anybody that just has a basic computer and wants to try and do a little crypto mining. So you're going to have a hard time getting a hold of these. GPU's just like many other chip sets out there and my own personal experiences. [00:51:21] I don't need the top end one because of it takes a few extra minutes to render something. When I'm making a video, it's not a big deal, cause I'm not making videos all day long. So a little tip for you on GPU's and external GPU's. And do you need them, what should do. Use them for, Hey, I am doing some training every week. [00:51:45] Kind what we just did just now, but about cybersecurity and other things in my weekly newsletter. So make sure you sign up Craig peterson.com AU. And if you could, and if you are a podcast listener, like to invite you to subscribe to my podcast, you can find it at Craig peterson.com/itunes. [00:52:08] We've got the end of a era for a device that was considered to be quite secure. In fact, some of our presidents, particularly the one that comes to mind is president Obama used it extensively, and it isn't what it was. [00:52:25] This device that I'm thinking of right now, and we'll see if you can guess what it is, but it was extremely popular. [00:52:33] It was for sending and receiving messages that even had some other functions, but it was mainly an email thing. I remember having a couple of those back in the day that was strictly email. They were, they actually nice. And then of course texting came along and they kept up with the times a little bit. [00:52:51] What we're talking about is the end of the line. This was a Canadian company, a company that was well-known worldwide by the name of rim. They were providing the Blackberry operating system. They had servers that were designed and built to be secure. So you could rest assured that all of your data was safe, no loud you to send and receive emails. [00:53:25] And it had that wonderful little click keyboard on it. Something that went the way of all the world. That keyboard is now gone and it's gone for good as has the ability to use some of those blackberries that you bought over the years to keep yourself. I just had to play taps underneath that, but it's just incredible. [00:53:53] It is the end of the day for the company, the once dominated the entire smartphone business. If you didn't have a Blackberry, you weren't cool and you weren't secure or secure. And you weren't able to communicate as easily. They were actually. Excellent little devices in their day. I want to add another note here when we're talking about secure, because Blackberry was very big and saying, Hey, listen, it's very secure. [00:54:23] It's all encrypted. We keep all your emails, encrypted, all your communications and gripped and what we found out by the way, is it turned out that the Canadian government, basically the equivalent of the FBI, CIA NSA had the master key for all Blackberry messages. And not only did it have the master key, it shared the master key with the United States secret agencies, the end of the. [00:54:55] CIA, et cetera. So if you were thinking you could use your Blackberry and keep your information safe, you are wrong. You remember when president Obama was elected? One of the first things they scrambled for in the tech business was how do we secure our. Mary. And of course all kinds are not our Blackberry, his Blackberry, all kinds of rumors erupted that, it was people controlling president Obama and they were using the Blackberry and they're using it because it was secure. [00:55:24] You, do you remember the whole uproar around. And the biggest problem was obviously our intelligence knew that they weren't secure and they could read any message they wanted to, as well as the Canadian government. And remember the whole five eyes thing back in the day, these five different governments that shared information on their own citizens. [00:55:47] So it was a real windfall for the United States because Canada was. EV all of this shop software was developed for the Blackberry. It's where all of the servers were located and data could easily be routed to Canadian servers away from us servers if they wanted to monitor somebody. And so Canada was the one spying on you, technically not your government. [00:56:10] They'd never do that. So it was an interesting time, frankly. As of January 4th, 2020, These Blackberry phones will no longer be provided with provisioning services, which means they are going to gradually lose the ability to join networks, including the cellular network, by the way. So it's man, it's something that many kids. [00:56:41] I have never even seen. And I look at it and just think, I remember envied some of the guys that had the blackberries at the time. And I had a couple of other little devices, keyboard driven that were from people who have been guests on my radio show. And I really liked those, but in the Blackberry was just crazy expensive as far as I was concerned. [00:57:04] But Blackberry's leadership really messed up. The guys who are developing Android at the time realized, oh, wait a minute. The iPhone is a pretty popular. It's going to be extremely popular. So Android then they mimic the Blackberry at first, made it look like a Blackberry. And then they switched over and made the Android operating system be like an iPad. [00:57:33] So they can pick, can beat with it, but Blackberry didn't see any of this coming. And it took over a year after the iPhone came out for Blackberry, for rim research and motion to come up with its own touchscreen phone. And the software was really quite a mass where they tried to. Basically crowbar in some new features and they had the old features. [00:57:58] They're still incorporate users during this whole time were falling into love with their apple phones and then eventually the Android phone. Told their IP department, it departments that they needed to support the iPhone and the Android phones. And so they did, and Blackberry eventually gave up on its own phones and they started releasing Android versions. [00:58:23] Do you remember those, the Android phones from. Mary, they got out of the hardware business entirely. And now what they're doing is they're trying to promote corporate security services. And that's really what they're trying to do. It's a new claim to fame. Yeah. Remember I just told you last time they were promoting that they were secure. [00:58:44] They weren't at all. No, they were to some extent, but so the last version of Blackberry opera and he said, The very last release that they had was in 2013. Yeah. 2013 year that hold. So the devices affected here by this shutdown are by all standards, extremely low old. And remember you got to get security updates. [00:59:09] So these machines, I can't even believe this still online when Blackberry hasn't given an update to them since 2013, that's almost a decade now, nine years. So if you're still using it stop, and if you're trying to figure out what to use, get an iPhone. And if you say, oh, Hey, films are too expensive. Don't get the latest, greatest iPhone. [00:59:33] Get a slightly older one because they are supported for five or more years out, unlike everything else out there now, although. We now have Samsung promising some longer support, like five-year support for some of the devices. So we'll see how that ends up going. But frankly, Blackberry, they're done for. [00:59:55] It's a shame. So there's a handful of software services that relied on the Blackberry servers to function. So if you were using Blackberry world or Blackberry link, those also stopped functioning on the 4th of January and the number of people still using it. I don't know. When was the last time you saw a Blackberry and have you used one I'd love to hear from you go ahead and drop me into the. [01:00:23] Craig. Yeah, exactly. me@craigpetersawn.com. Let me know, did you have a Blackberry or were you still using one? And did they bother telling you about the shutdown that was coming up, but this is it. This is the end of what was a very significant technology. So here's to blackberries. All right, stick around everybody. [01:00:52] Make sure you are on my email list. I'm going to do something new too, with the list. I'm going to start sending you my show notes. Now you can opt out of the show notes, just the show notes, if you want to, but expect to start seeing them show up in your email box. And this is the same show notes I send out to all of the radio and television stations I appear on because it's the most important news of the week. [01:01:20] Artificial intelligence is making its way into all kinds of aspects of our lives. And one of them that concerns me maybe the most, in some ways it's a benefit and others is AI in the criminal justice system. [01:01:36] China has developed what it's calls an AI. Or artificial intelligence prosecutor. [01:01:44] And they're saying that they can identify dissident and press charges for common crimes with 97% accurate. Now that is a very big claim. And the whole idea behind this is their servers services. If you will, in the court system are overloaded. We have the same problem. Most countries have the same problem. [01:02:11] I was just looking at India. They've got some 37 million backlog court cases. Absolutely. Phenomenal. So the system now in China can press charges for Shanghai's eight most common crimes. There runs on a standard PC and it takes part in the decision-making process. They say, although apparently it's actually making their decisions, but there are fears. [01:02:40] The machine could be weaponized by the state. Now it's interesting. Looking at the actual charges that it's designed to press right now, they're saying that it was trained using 17,000 real life cases. And it's able to identify and press charges for the eight most common crimes in Shanghai. These include provoking. [01:03:08] Now that's a term used to stifle dissent in China credit card, fraud, gambling crimes, dangerous driving theft, fraud, intentional injury, and obstructing official duties. In other words pretty much everything, right? You go against the government. It's just going to charge you. And that's what they say high prosecutor's going to do. [01:03:31] Now I'm looking to it. Some more details. From the management review journal. And they're saying that the system can replace prosecutors in the decision-making process to a certain extent. Now let's look at some other countries we've got, for instance, Germany, and they're using image recognition and digital forensics to help with their case loads. [01:03:58] China's using a system. No. System 2 0 6 to evaluate evidence a suspect's potential danger and conditions for arrest. Now, we've had some really weird things happening here in the U S with our criminal justice system. Some of them are absolutely idiotic. But things like just letting people out the same day that really should be held because they committed a moderately serious crime. [01:04:23] And we just had cases just at the end of 2021, where we had people. Who had been arrested and got out that same day and then went on to commit serious crimes, rape, murder, and other things. So what are we doing here in the U S unfortunately we have found out that in the us, we are monitoring the. [01:04:52] The funds that people need to put up that are called bail in order to be released from jail. So normally you'd go in front of a justice of the peace and maybe a court clerk, and they would look at what the charges are or what your background is, how sticky you are in the community, family, business ties, et cetera, and then set up. [01:05:18] So you now put up the bail cash or otherwise, and you are released on basically usually your own recognizance. They're very somewhat, so we are all ready in many areas using artificial intelligence for that entire. Process, there's no pleading with the computer's saying I can't afford a $200,000 bail. [01:05:42] There's no pleading with the computer saying, listen, I've been a member of the rotary club for 20 years and I own a business here. I have tight ties to the community that bail is just way too high because in many communities they are using artificial intelligence and relying on it a hundred percent. [01:06:00] That's one of the big problems with computers. People because they don't really understand them. Just say fine. Just yeah, go. The computers is almost always right. Yeah. The other problem is we don't know how it was programmed. Now in the case of this Chinese computer, that acts as a prosecutor for charging. [01:06:23] They fed it 17,000 cases. Do we know what those cases are? Do we know what the computer weighs when it's making its decisions? And we've seen this already, in some cases here in the U S where normally you can face your accuser. Normally you can go to the court and say, this decision by the justice of the peace was not quite right. [01:06:46] It needs to be fixed right now. They did and all well and good. And so if they had someone or they'd come in and testify to say, yeah, you're not a flight risk, et cetera, you're fine. But when it comes to the computers, people tend to just believe them. What were those 17,000 cases? Were they all nasty dissidents? [01:07:09] What did the computer learned from it? And some of these cases that we've had in the us we've found. That even the people that provided the software, that AI software, they don't know what the decision-making process actually was because the computer learned how to do it. And you need to understand AI models and how they're fed data and how they work. [01:07:35] But basically the computers come up with their own way of thinking through things. Just to make this simple. So it's not necessarily totally logic. It's not like back in the day, you'd write software that says, okay, if they have lived in that same home for over twenty-five years, they have kids in school, they own a business, et cetera, et cetera. [01:07:55] So you set up all of the explicit parameters. And from that, now you can say okay, fine. So you've got, went down this path based on. Person was and what their background was. Therefore, you came to this conclusion. That's not what's happening with this newer AI, not at all. And then you also have the question. [01:08:16] Okay. What does 97% accurate? Who's going to take responsibility when there is a mistake. Now I'm not talking about the 3% that they're admitting could be mistakes. I'm talking about the 97% of the time. And then if you now move up to the courts, who are they going to talk to? The prosecutor, the machine, the designer of the algorithm. [01:08:42] Are they going to examine all 17,000 cases that were fed into this? I goes back to what I said before about airplanes. People are not good at monitoring computers, but computers can be good at monitoring people. In other words, in this case, the artificial intelligence may help detect a mistake, but it really cannot replace humans in making a decision. [01:09:09] It's very true. China's relying more and more on AI to boost productivity. They're using AI with facial recognition systems for their social credit score that allows people to get on. Train you can't get on a train unless you have a high enough social credit score. And if you J rock walk, you have now lost points. [01:09:32] So it's it's really crazy. So I'm very concerned about this. I found some great information by the way, online from the justice department about what they are looking to have AI do. And it's basically everything making decisions and informing. What should happen? They're looking at using chat chatbox to provide legal advice for pro se litigants. [01:10:00] In other words, people that are trying to defend themselves can go to a chat box that will give them some direction. That's all in the works. I'm looking at the official documents right now, criminal justice testing and evaluation consortium, looking at artificial intelligence. Hey, make sure you subscribe to my podcast. [01:10:21] Craig peterson.com/itunes, and I hope I've earned a five star review. And if you could take a minute, just give it right there. [01:10:31] We all know the children online suffer some pretty serious consequences in certain cases. The federal trade commission has now won a case against Google. We're going to talk about what's going on. With ads. [01:10:47] The FTC has now been enforcing what's called CAPA, which is the children's online privacy protection rule. [01:10:58] And they have find. In fact they find them. What was it? Almost 200. Yeah, exactly. Let me just find it here. Sorry about that. They have find Google to the sum total of. 170 million. That's what I thought it was almost $200 million penalty. So what had happened here is YouTube. Now YouTube is owned by Google has been for quite a while. [01:11:28] And in fact, YouTube. Advertising to advertisers that quote YouTube is today's leader in reaching children age six to 11 against top TV channels. They also said that YouTube is the number one website regularly visited by kids. Now we know that they are not supposed to be directing any content to children under 13. [01:11:58] Now you could argue, all right, they're not directing content to them, but the facts are the facts of kids are on the site. They're on the site. Yeah. But why would you promote that to advertisers and. You were exactly promoting to children. And that's what the federal trade commission said. Hey, Google, here you are promoting your ability to target these kids by saying you are the number one platform for them. [01:12:30] So you shouldn't be doing that. So this settlement they came up with Google required you tube to pay $170 million penalty. They were also required to implement a system. That permits channel owners to identify content is child directed. So YouTube can ensure it's complying with the rule going forward. [01:12:53] So remember YouTube doesn't make the content that's up on their site. They steal it from you. They don't exact this dealer from you, but anything that you're uploading, they may try and monetize. If enough people watch it and stay on their site longer. Which is the goal, by the way, for your content. [01:13:11] If you put it up, really Facebook's the same way. LinkedIn, everybody, they want eyeballs. They want them to stay on the site so they can show them advertising. The people who are making the content are these content creators, just you and me uploading stuff to YouTube. As well as these people that have somehow become very popular that I just don't understand. [01:13:32] So here are also some things from our dark reading website here. Alison LeFrak, she's senior vice president of public policy. Ads privacy and children's online privacy protection act compliance at pixelate. So she's come up with five things she thinks should be adopted by the industry. First of all, improve transparency ad networks platforms should consider implementing their system that lets online services, identity. [01:14:05] To the ad network or platform that their content is child directed, which is something that the courts are demanding here now. The FTC settlement is I should say, number two, stop collecting children's data once an ad network or a platform like YouTube sets up a system where developers can signal that their app or their software or their. [01:14:30] Oh, the video is directed at children. That ad network needs to take steps to not collect personal information through those websites. Make sense apps or channels. Number three, involve parents when required, even if an ad network is not collecting precise geolocation information from children. If it collects wireless network identifiers to infer precise location, it is required to provide notice. [01:14:56] Teen consent from the parents. I'm loving all of these number four. Protect sensitive data. If an ad network decides to collect children's data, it must maintain the confidentiality, security and integrity of the information. It should only retain the data as long as necessary to fulfill the purpose for which it was collected. [01:15:19] And the ad networks should delete the data in a way that protects against its own authorized use. And number five remained stringent on protecting children. So I think all of those make quite a bit of sense. They're all things that ad networks and these platforms should be doing, but they're not required to do it. [01:15:38] And I, I go back and forth here. My dad and mumble both used to say there ought to be a law. No, that's not how my mom said it, you get the idea. And I'm at the point where I say, man, we got to get rid of most of these laws, rules and regulations, because they are hampering us something. [01:15:57] If you look at the Scandinavian countries, some people say, oh, there are socialists over that. No, they're not. They have very high taxes and they have a lot of community services, but Switz, they're not Switzerland, Sweden, for instance. They know that they have to keep their businesses healthy so that they can collect taxes. [01:16:18] So they stay out of the way versus here, where we already have a so
This week Leroy & Maz talk about different conspiracy theories around Bitcoin. Satoshi Nakamoto's true identity, CIA/NSA involvement and Russian cyberwarefare are topics of discussion, as well as a dip into the inner workings of the mind of Kanye.
Photo: Russian postage stamp block (9 stamps) with 100th anniversary of state security. Cost 27 rubles (per stamp). @Batchelorshow 1b/13: #DurhamReporting: Is the state security apparatus (FSB, SVR, GRU, FBI, CIA, NSA) to be trusted? Svetlana Lokhova. @RealSLokhova #FriendsofHistoryDebatingSociety https://www.wsj.com/articles/on-russiagate-durham-indicts-the-press-too-hoax-media-indictment-11636141080 https://int.nyt.com/data/documenttools/igor-danchenko-indictment/2295d0f34ade0528/full.pdf
Photo: Emblem of the Ministry of State Security of the People's Republic of China @Batchelorshow +1b/13: #DurhamReporting: Is the state security apparatus (FSB, SVR, GRU, FBI, CIA, NSA) to be trusted? Svetlana Lokhova. @RealSLokhova #FriendsofHistoryDebatingSociety https://www.wsj.com/articles/on-russiagate-durham-indicts-the-press-too-hoax-media-indictment-11636141080 https://int.nyt.com/data/documenttools/igor-danchenko-indictment/2295d0f34ade0528/full.pdf
Photo: Lubyanka (Лубя́нка) is the popular name for the headquarters of the FSB and affiliated prison on Lubyanka Square in Meshchansky District of Moscow.. Here: Lubyanka, ca 1910 @Batchelorshow 1b/12: #DurhamReporting: Is the state security apparatus (FSB, SVR, GRU, FBI, CIA, NSA) to be trusted? Svetlana Lokhova. @RealSLokhova #FriendsofHistoryDebatingSociety https://www.wsj.com/articles/on-russiagate-durham-indicts-the-press-too-hoax-media-indictment-11636141080 https://int.nyt.com/data/documenttools/igor-danchenko-indictment/2295d0f34ade0528/full.pdf
Do You Have a Smartspeaker? Another Danger Comes Your Way! By now, you've heard of tick talk. You might use Tik TOK. Many people do. It's their go-to site online, especially if you're a little on the younger side. Here is a danger of some of these tick talk challenges and combine that with Alexa. Oh my [Following is an automated transcript] This is a little bit on the scary side. We built our house some 25 years ago, we contacted a builder, and I put together all of the specs, and I made sure that the wood he used was better than average. [00:00:30] It's all plywood. It's not particle board or composite boards. And I made sure they were thicker than needed for all of the rules. Struts were closer together than the code required. And we had more oversized plumbing than what was needed through the house. And one of the things I did was I had him wire the house, actually the electrical contractor, with a heavier gauge wire than usually. [00:01:02] So that I had 20 amp sockets at every socket in the house. Now we put the special 20 amp sockets on some of them, like in the kitchen, we have a commercial toaster, as a sort of thing you need, when you got eight kids and a half of our married life, we had other families living with us too, that we were helping out everything from training through just getting them through. [00:01:26] Bot. So there were times when we had 20 plus people living in my house. It got crowded, but I wanted to make sure everything was above code so that it would work well and work well for us and know how much juice we tend to use. Yeah, you don't want to see my electric bill. I decided, yeah, let's do the heavier gauge wire, and let's put the sockets in one of the things I had the electrician do to make the sockets a little bit safer. [00:01:57] This was back before you had these. I, frankly, hate them, but these safety sockets where you push in the plugin Erie must try it for something to get plugged in. There are ways to defeat those safety sockets, and that's where this problem comes in. I had him install the sockets. [00:02:18] You might consider them to be upside down. So the top of the socket had little grounding. And then underneath that, you had the hot and the neutral lines. So the idea there was, while if something fell onto a plug that wasn't plugged in all the way, or if the kids decided they'd stick something on it, it would go to ground or made sense to be. [00:02:45] And apparently, it's worked because none of my kids are dead yet. So that's a good thing. There are these challenges on Tik Tok. You've probably heard of them. That's how they got themselves going. They had that, that ice bucket challenge, and many others that people were doing, and they continue to this day. [00:03:06] One of the tick-tock challenges is very stupid and dangerous. And that's where this article from ARS Technica comes from. Eric Bankman wrote. When was this? Oh my gosh, this is right at the beginning of the year. A 10-year-old girl and her mother used Amazon Alexa. And what was happening in the kid wanted some challenges. [00:03:32] Mom wanted some challenges, and they were doing a whole bunch of things. Physical challenges, like laying down and rolling over a holding a shot on your foot from a phys ed teacher on YouTube. And the girl just wanted another one. So for those of you who are uninitiated, the plug challenge consists of. [00:03:54] Partially plugging a phone charger into an electrical outlet. Now the phone chargers usually do not have a grounding pin. So my little workaround of mounting all of the sockets upside down wouldn't matter. Cause if you look at that little charger plug, it's usually just two pins, and it usually doesn't care about the polarity. [00:04:16] It doesn't have the more significant the side and the smaller side, the. Yeah. I can't remember what they call now, but if they're both the same size, so you can put it in either direction, the spades that you put in. So if you put it in part way, you have defeated the safety mechanism in all of these modern plugs. [00:04:38] So you put it in part way, you have to push hard and in it goes, and then you pull it out partway. So that's part one. Can you plug this phone charger intellectual outlet partway so that those two conductors are exposed, and then yeah. Then they ask you the challenge is to drop a penny onto the exposed prong. [00:05:08] So you can get anything from a tiny spark. That little coin may jump off to a full-blown electrical fire. Now, mom was there, and she yelled. No Alexa, no. And the daughter said she's too intelligent to do something. Anyway, I'm looking at a picture here that ARS Technica published of a wall socket, where a short had happened. [00:05:35] This wall socket is mounted sideways. I don't get that. And the hot side is up. So anything falling against the sock, and by the way, the faceplate is metal. And it was grounded. So anything falling onto a plug that's only partially plugged in because the socket sideways falls onto it. It touches the metal faceplate, and you've got a fire burning. [00:06:05] So they've got a picture of one of these in a house and you can see where the smoke went up. Now. I don't think the whole house caught on fire here, but it was a major zap. It reminds me of the days when we had. The fuses in the basement. And if a fuse blew, all you really needed to do is go down there and stick a quarter in it. [00:06:26] And you're fine, which means it's defeated the purpose. Anyways, you gotta be careful. At Amazon confirmed in a statement to the BBC that it has removed that particular challenge from Alex's database. Obviously these are computer generated, and they're based on Tik TOK, idiots. You shouldn't be using Tik TOK for a lot of reasons. [00:06:52] One of them is it has been alleged that they have been spying for the Chinese. It is a Chinese company. It's part of 10 cents. And the, there's just a little stupid thing. So Amazon said, as soon as you became aware of this error, We took action to fix it. So again, you can't necessarily trust your kid at home with a, an Alexa doing challenges. [00:07:18] I just can't believe it. It's just incredible exactly what happened here. Hey, I want to give you a real quick tip. Last week, we went over how you can find out. If your computer has been hacked, basically. In fact, we were a little bit more specific. We said, okay, what I want to do here is know if not just the computers have been hacked, but as someone's stolen my. [00:07:47] Email and or my password. And we explained why and everything else. Then if you missed it last week, you can just go right ahead, online to to oh my I'm just having man's beginning of the year, right? That's what happened. Go online to Craig peterson.com/itunes or slash your favorite podcast player. [00:08:08] And you can listen to it there. So really good little article from. And make use of technology. And they're talking about what are some of the things you can do? You should do. You shouldn't do when it comes to external GPU's and now if you are a regular computer user, you don't even need one of these things and people might've tried to talk you into it. [00:08:35] Now, also that GPU is these graphical processing units are built into all of our computers nowadays. All of these new computers that our friends at Apple have come up with have some amazing GPS built into them. Those are great. They're used to update your actual windows screen that you're looking at hate Microsoft for stealing words like windows, mean things anyways. [00:09:03] But the external GPU is something I use on my main production workstation. So I've got GPU's they work great. And when I'm processing video and doing the edits, and then the final renders, that's when an external GPU comes in. So I can guarantee you if you don't know what I'm talking about here, I guarantee you. [00:09:29] I need an external GPU. Now the couple of other things to know, if you are looking for an, a GPO of any sort to build and put in your existing computer to build in somewhere out somewhere else, the GPU's are difficult to get right now. And part of the reason for that is so many people have been using them for mining cryptocurrencies, because they're quite good at that. [00:09:55] Now there's special hardware that's being made. To mine, cryptocurrencies, but GPU's frankly are great little work around for anybody that just has a basic computer and wants to try and do a little crypto mining. So you're going to have a hard time getting ahold of these. GPU's just like many other chipsets out there and my own personal experiences. [00:10:19] I don't need the top end one because of it takes a few extra minutes to render something. When I'm making a video, it's not a big deal, cause I'm not making videos all day long. So a little tip for you on GPU's and external GPU's. And do you need them, what should do. Use them for, Hey, I am doing some training every week. [00:10:43] Kind of what we just did just now, but about cybersecurity and other things in my weekly newsletter. So make sure you sign up Craig peterson.com AU. And if you could, and if you are a podcast listener, like to invite you to subscribe to my podcast, you can find it at Craig peterson.com/itunes. [00:11:07] We've got the end of a era for a device that was considered to be quite secure. In fact, some of our presidents, particularly the one that comes to mind is President Obama used it extensively, and it isn't what it was. [00:11:23] This device that I'm thinking of right now, and we'll see if you can guess what it is, but it was extremely popular. [00:11:31] It was for sending and receiving messages that even had some other functions, but it was mainly an email thing. I remember having a couple of those back in the day that was strictly email. They were, they actually nice. And then of course texting came along and they kept up with the times a little bit. [00:11:49] What we're talking about is the end of the line. This was a Canadian company, a company that was well-known worldwide by the name of rim. They were providing the Blackberry operating system. They had servers that were designed and built to be secure. So you could rest assured that all of your data was safe, no loud you to send and receive emails. [00:12:23] And it had that wonderful little click keyboard on it. Something that went the way of all the world. That keyboard is now gone, and it's gone for good, as has the ability to use some of those blackberries that you bought over the years to keep yourself. I just had to play taps underneath that, but it's just incredible. [00:12:51] It is the end of the day for the company, the once dominated the entire smartphone business. If you didn't have a Blackberry, you weren't cool and you weren't secure or secure. And you weren't able to communicate as easily. They were actually. Excellent little devices in their day. I want to add another note here when we're talking about secure, because Blackberry was very big and saying, Hey, listen, it's very secure. [00:13:21] It's all encrypted. We keep all your emails, encrypted, all your communications and gripped and what we found out, by the way, is it turned out that the Canadian government, basically the equivalent of the FBI, CIA NSA had the master key for all Blackberry messages. And not only did it have the master key, it shared the master key with the United States secret agencies, the end of the. [00:13:53] CIA, et cetera. So if you were thinking you could use your Blackberry and keep your information safe, you are wrong. You remember when President Obama was elected? One of the first things they scrambled for in the tech business was how do we secure our. Mary. And of course, all kinds are not our Blackberry, his Blackberry, all kinds of rumors erupted that, it was people controlling president Obama and they were using the Blackberry and they're using it because it was secure. [00:14:22] You, do you remember the whole uproar around. And the biggest problem was obviously our intelligence knew that they weren't secure and they could read any message they wanted to, as well as the Canadian government. And remember the whole five eyes thing back in the day, these five different governments that shared information on their own citizens. [00:14:45] So it was a real windfall for the United States because Canada was. EV all of this shop software was developed for the Blackberry. It's where all of the servers were located, and data could easily be routed to Canadian servers away from us servers if they wanted to monitor somebody. And so Canada was the one spying on you, technically not your government. [00:15:08] They'd never do that. So it was an interesting time, frankly. As of January 4th, 2020, These Blackberry phones will no longer be provided with provisioning services, which means they are going to gradually lose the ability to join networks, including the cellular network, by the way. So it's man, it's something that many kids. [00:15:40] I have never even seen. And I look at it and just think, I remember envied some of the guys that had the blackberries at the time. And I had a couple of other little devices, keyboard-driven that were from people who have been guests on my radio show. And I really liked those, but in the Blackberry was just crazy expensive as far as I was concerned. [00:16:02] But Blackberry's leadership really messed up. The guys who are developing Android at the time realized, oh, wait a minute. The iPhone is a pretty popular. It's going to be extremely popular. So Android then they mimicked the Blackberry at first, made it look like a Blackberry. And then they switched over and made the Android operating system be like an iPad. [00:16:31] So they can pick, can compete with it, but Blackberry didn't see any of this coming. And it took over a year after the iPhone came out for Blackberry, for rim research and motion to come up with its own touchscreen phone. And the software was really quite a mass where they tried to. Basically crowbar in some new features and they had the old features. [00:16:56] They're still incorporate users during this whole time. We're falling into love with their apple phones and then eventually the Android phone. Told their IP department, it departments that they needed to support the iPhone and the Android phones. And so they did, and Blackberry eventually gave up on its own phones and they started releasing Android versions. [00:17:21] Do you remember those, the Android phones from. Mary, they got out of the hardware business entirely. And now what they're doing is they're trying to promote corporate security services. And that's really what they're trying to do. It's a new claim to fame. Yeah. Remember I just told you last time they were promoting that they were secure. [00:17:42] They weren't at all. No, they were to some extent, but so the last version of Blackberry opera and he said, The very last release that they had was in 2013. Yeah. 2013 year that hold. So the devices affected here by this shutdown are by all standards, extremely low old. And remember you got to get security updates. [00:18:07] So these machines, I can't even believe this still online when Blackberry hasn't given an update to them since 2013, that's almost a decade now, nine years. So if you're still using it, stop, and if you're trying to figure out what to use, get an iPhone. And if you say, oh, Hey, films are too expensive. Don't get the latest, greatest iPhone. [00:18:31] Get a slightly older one because they are supported for five or more years out, unlike everything else out there now, although. We now have Samsung promising some longer support, like five-year support for some of the devices. So we'll see how that ends up going. But frankly, Blackberry, they're done for. [00:18:53] It's a shame. So there's a handful of software services that relied on the Blackberry servers to function. So if you were using Blackberry world or Blackberry link, those also stopped functioning on the 4th of January and the number of people still using it. I don't know. When was the last time you saw a Blackberry and have you used one I'd love to hear from you go ahead and drop me into the. [00:19:21] Craig. Yeah, exactly. me@craigpetersawn.com. Let me know, did you have a Blackberry? Are you still using one? And did they bother telling you about the shutdown that was coming up, but this is it. This is the end of what was a very significant technology. So here's to Blackberry. All right, stick around everybody. [00:19:50] Make sure you are on my email list. I'm going to do something new too, with the list. I'm going to start sending you my show notes. Now you can opt-out of the show notes, just the show notes, if you want to, but expect to start seeing them show up in your email box. And this is the same show notes I send out to all of the radio and television stations I appear on because it's the most important news of the week. [00:20:17] Artificial intelligence is making its way into all kinds of aspects of our lives. And one of them that concerns me maybe the most, in some ways it's a benefit and others is AI in the criminal justice system. [00:20:33] China has developed what it calls an AI. Or artificial intelligence prosecutor. [00:20:41] And they're saying that they can identify dissident and press charges for common crimes with 97% accurate. Now that is a very big claim. And the whole idea behind this is their servers services. If you will, in the court system are overloaded. We have the same problem. Most countries have the same problem. [00:21:07] I was just looking at India. They've got some 37 million backlog court cases. Absolutely. Phenomenal. So the system now in China can press charges for Shanghai's eight most common crimes that runs on a standard PC. And it takes part in the decision-making process. They say, although apparently it's actually making their decisions, but there are fears. [00:21:37] The machine could be weaponized by the state. Now it's interesting. Looking at the actual charges that it's designed to press right now, they're saying that it was trained using 17,000 real life cases. And it's able to identify and press charges for the eight most common crimes in Shanghai. These include provoking. [00:22:05] Now that's a term used to stifle dissent in China credit card, fraud, gambling crimes, dangerous driving theft, fraud, intentional injury, and obstructing official duties. In other words pretty much everything, right? You go against the government. It's just going to charge you. And that's what they say high prosecutor's going to do. [00:22:28] Now I'm looking to it. Some more details. From the management review journal. And they're saying that the system can replace prosecutors in the decision-making process to a certain extent. Now let's look at some other countries we've got, for instance, Germany, and they're using image recognition and digital forensics to help with their caseloads. [00:22:54] China's using a system. No. System 2 0 6 to evaluate evidence of a suspect's potential danger and conditions for arrest. Now, we've had some really weird things happening here in the US with our criminal justice system. Some of them are absolutely idiotic. But things like just letting people out the same day that really should be held because they committed a moderately serious crime. [00:23:20] And we just had cases just at the end of 2021, where we had people. Who had been arrested and got out that same day and then went on to commit serious crimes, rape, murder, and other things. So what are we doing here in the US unfortunately we have found out that in the us, we are monitoring the. [00:23:49] The funds that people need to put up that are called bail in order to be released from jail. So normally you'd go in front of a justice of the peace and maybe a court clerk, and they would look at what the charges are or what your background is, how sticky you are in the community, family, business ties, et cetera, and then set up. [00:24:14] So you now put up the bail cash or otherwise, and you are released on basically usually your own recognizance. They're very somewhat, so we are all ready in many areas using artificial intelligence for that entire. Process, there's no pleading with the computer's saying I can't afford a $200,000 bail. [00:24:39] There's no pleading with the computer saying, listen, I've been a member of the Rotary club for 20 years and I own a business here. I have tight ties to the community. That bail is just way too high because in many communities they are using artificial intelligence and relying on it a hundred percent. [00:24:57] That's one of the big problems with computers. People because they don't really understand them. Just say fine. Just yeah, go. The computers is almost always right. Yeah. The other problem is we don't know how it was programmed. Now in the case of this Chinese computer, that acts as a prosecutor for charging. [00:25:20] They fed it 17,000 cases. Do we know what those cases are? Do we know what the computer weighs when it's making its decisions? And we've seen this already, in some cases here in the us where normally you can face your accuser. Normally you can go to the court and say, this decision by the justice of the peace was not quite right. [00:25:43] It needs to be fixed right now. All well and good. And so if they had someone or they'd come in and testify to say, yeah, you're not a flight risk, et cetera, you're fine. But when it comes to the computers, people tend to just believe them. What were those 17,000 cases where they were, they all nasty dissidents? [00:26:05] What did the computer learned from it? And some of these cases that we've had in the us we've found. That even the people that provided the software, that AI software, they don't know what the decision-making process actually was because the computer learned how to do it. And you need to understand AI models and how they're fed data and how they work. [00:26:31] But basically the computers come up with their own way of thinking through things. Just to make this simple. So it's not necessarily totally logic. It's not like back in the day, you'd write software that says, okay, if they have lived in that same home for over twenty-five years, they have kids in school, they own a business, et cetera, et cetera. [00:26:51] So you set up all of the explicit parameters. And from that, now you can say okay, fine. So you've got, went down this path based on. Person was and what their background was. Therefore, you came to this conclusion. That's not what's happening with this newer AI, not at all. And then you also have the question. [00:27:12] Okay. What does 97% accurate? Who's going to take responsibility when there is a mistake. Now I'm not talking about the 3% that they're admitting could be mistakes. I'm talking about the 97% of the time. And then if you now move up to the courts, who are they going to talk to? The prosecutor, the machine, the designer of the algorithm. [00:27:38] Are they going to examine all 17,000 cases that were fed into this? I goes back to what I said before about airplanes. People are not good at monitoring computers, but computers can be good at monitoring people. In other words, in this case, the artificial intelligence may help detect a mistake, but it really cannot replace humans in making a decision. [00:28:05] It's very true. China's relying more and more on AI to boost productivity. They're using AI with facial recognition systems for their social credit score that allows people to get on. Train you can't get on a train unless you have a high enough social credit score. And if you J rock walk, you have now lost points. [00:28:28] So it's it's really crazy. So I'm very concerned about this. I found some great information by the way, online from the justice department about what they are looking to have AI do. And it's basically everything making decisions and informing. What should happen? They're looking at using chat chatbox to provide legal advice for pro se litigants. [00:28:56] In other words, people that are trying to defend themselves can go to a chat box that will give them some direction. That's all in the works. I'm looking at the official documents right now, criminal justice testing and evaluation consortium, looking at artificial intelligence. Hey, make sure you subscribe to my podcast. [00:29:17] Craig peterson.com/itunes, and I hope I've earned a five star review. And if you could take a minute, just give it right there.
Photo: TIBLISI, Republic of Georgia -- Members of the Ministry of Internal Affairs and State Security Services, Republic of Georgia, collect simulated biohazard samples during Diablo Shield, a joint United States European Command and Federal Bureau of Investigation training event, April 2017 +1b/12: #DurhamReporting: Is the state security apparatus (FSB, SVR, GRU, FBI, CIA, NSA) to be trusted? Svetlana Lokhova. @RealSLokhova #FriendsofHistoryDebatingSociety https://www.wsj.com/articles/on-russiagate-durham-indicts-the-press-too-hoax-media-indictment-11636141080 https://int.nyt.com/data/documenttools/igor-danchenko-indictment/2295d0f34ade0528/full.pdf
Photo: No known restrictions on publication. @Batchelorshow 1b/12: #DurhamReporting: Is the state security apparatus (FSB, SVR, GRU, FBI, CIA, NSA) to be trusted? Svetlana Lokhova. @RealSLokhova #FriendsofHistoryDebatingSociety https://www.wsj.com/articles/on-russiagate-durham-indicts-the-press-too-hoax-media-indictment-11636141080 https://int.nyt.com/data/documenttools/igor-danchenko-indictment/2295d0f34ade0528/full.pdf
The shocking reexamination of the failures of US government officials to use available intelligence to stop the attack on American on September 11, 2001. “The authors lay bare…an intelligence failure of historic proportions.”—John Kiriakou, former CIA officer, author, The Convenient Terrorist In 2009, documentarians John Duffy and Ray Nowosielski arrived at the offices of Richard Clarke, the former counterterror adviser to Presidents Clinton and Bush. In the meeting, Clarke boldly accused one-time Central Intelligence Agency director George Tenet of “malfeasance and misfeasance” in the pre-war on terror. Thus began an incredible—never-before-told—investigative journey of intrigue about America's intelligence community and two 9/11 hijackers. The Watchdogs Didn't Bark details that story, unearthed over a ten-year investigation. Following the careers of a dozen counterterror employees working in different agencies of the US government from the late 1980s to the present, the book puts the government's systems of oversight and accountability under a microscope. At the heart of this book is a mystery: Why did key 9/11 plotters Khalid Al Mihdhar and Nawaf Al Hazmi, operating inside the United States, fall onto the radars of so many US agencies without any of those agencies succeeding in stopping the attacks? The answers go beyond mere “conspiracy theory” and “deep state” actors, but instead find a complicated set of potential culprits and an easily manipulated system. Taking readers on a character-driven account of the causes of 9/11 and how the lessons of the attacks were cynically inverted to empower surveillance of citizens, kidnapping, illegal imprisonment, torture, government-sanctioned murder, and a war on whistleblowers and journalists, an alarm is raised which is more pertinent today than ever before. Read less
The shocking reexamination of the failures of US government officials to use available intelligence to stop the attack on American on September 11, 2001. “The authors lay bare…an intelligence failure of historic proportions.”—John Kiriakou, former CIA officer, author, The Convenient TerroristIn 2009, documentarians John Duffy and Ray Nowosielski arrived at the offices of Richard Clarke, the former counterterror adviser to Presidents Clinton and Bush. In the meeting, Clarke boldly accused one-time Central Intelligence Agency director George Tenet of “malfeasance and misfeasance” in the pre-war on terror. Thus began an incredible—never-before-told—investigative journey of intrigue about America's intelligence community and two 9/11 hijackers.The Watchdogs Didn't Bark details that story, unearthed over a ten-year investigation. Following the careers of a dozen counterterror employees working in different agencies of the US government from the late 1980s to the present, the book puts the government's systems of oversight and accountability under a microscope. At the heart of this book is a mystery: Why did key 9/11 plotters Khalid Al Mihdhar and Nawaf Al Hazmi, operating inside the United States, fall onto the radars of so many US agencies without any of those agencies succeeding in stopping the attacks?The answers go beyond mere “conspiracy theory” and “deep state” actors, but instead find a complicated set of potential culprits and an easily manipulated system. Taking readers on a character-driven account of the causes of 9/11 and how the lessons of the attacks were cynically inverted to empower surveillance of citizens, kidnapping, illegal imprisonment, torture, government-sanctioned murder, and a war on whistleblowers and journalists, an alarm is raised which is more pertinent today than ever before.Read less
The shocking reexamination of the failures of US government officials to use available intelligence to stop the attack on American on September 11, 2001. “The authors lay bare…an intelligence failure of historic proportions.”—John Kiriakou, former CIA officer, author, The Convenient Terrorist In 2009, documentarians John Duffy and Ray Nowosielski arrived at the offices of Richard Clarke, the former counterterror adviser to Presidents Clinton and Bush. In the meeting, Clarke boldly accused one-time Central Intelligence Agency director George Tenet of “malfeasance and misfeasance” in the pre-war on terror. Thus began an incredible—never-before-told—investigative journey of intrigue about America's intelligence community and two 9/11 hijackers. The Watchdogs Didn't Bark details that story, unearthed over a ten-year investigation. Following the careers of a dozen counterterror employees working in different agencies of the US government from the late 1980s to the present, the book puts the government's systems of oversight and accountability under a microscope. At the heart of this book is a mystery: Why did key 9/11 plotters Khalid Al Mihdhar and Nawaf Al Hazmi, operating inside the United States, fall onto the radars of so many US agencies without any of those agencies succeeding in stopping the attacks? The answers go beyond mere “conspiracy theory” and “deep state” actors, but instead find a complicated set of potential culprits and an easily manipulated system. Taking readers on a character-driven account of the causes of 9/11 and how the lessons of the attacks were cynically inverted to empower surveillance of citizens, kidnapping, illegal imprisonment, torture, government-sanctioned murder, and a war on whistleblowers and journalists, an alarm is raised which is more pertinent today than ever before. Read less
Photo: 2017 Russian stamp of Russia: 100 years of state security agencies. @Batchelorshow 1a/12: #DurhamReporting: Is the state security apparatus (FSB, SVR, GRU, FBI, CIA, NSA) to be trusted? Svetlana Lokhova. @RealSLokhova #FriendsofHistoryDebatingSociety https://www.wsj.com/articles/on-russiagate-durham-indicts-the-press-too-hoax-media-indictment-11636141080 https://int.nyt.com/data/documenttools/igor-danchenko-indictment/2295d0f34ade0528/full.pdf
How Ransomware, Trojanware, and Adware Hurt You. And Why ExpressVPN Isn't Safe to Use. Ransomware, Trojanware Adware. What's the difference between these different types of malware.? And when it comes down to our computers, which should we worry about the most and which should we worry about the most? [Automated Transcript Follows] [00:00:17] There are a lot of different types of malware that are out there and they're circulating and scaring us. [00:00:23] And I think for good reason, in many cases, ransomware of course, is the big one and it is up, up, up. It has become just so common. Now that pretty much everybody is going to be facing a serious ransomware attack within the next 12 months. The numbers are staggering. And what are they doing while now they're getting you with the double whammy. [00:00:50] The first whammy is they encrypt your data. Your computers are encrypted, everything on them. So you can't use them anymore. Bottom line. Yeah, they'll boot they'll run enough in order to be able for you to pay that ransom. But any document that you might care about, any PDF, any word doc, and the spreadsheet is going to be encrypted. [00:01:14] And the idea behind that is. You have to pay in order to get that decryption key about 50% of the time. Yeah. About half of the time. Even if you pay the ransom, you'll get your data back the rest of the time. No, you you'll never see it again. So what do you do about that type of ransomware? Well, obviously most people just pay the rent. [00:01:39] But that's gone up as well. We've seen over a hundred percent increase in the amount of ransom people happy. So what's the best thing to do. What's the easiest thing to do in order to help you with this type of ransomware while it's obviously to have good backups. Now I'm going to be doing a bootcamp. [00:02:00] We're going to talk about this and a workshop. I really want to get going with these one week long workshops. So we'll do a, at least a couple of times a month in these boot camps that we'll do pretty much every week here, but they're coming up fairly soon. You'll only know about them. If you are on my email list, that is Craig peterson.com and the number one thing that you can do to. [00:02:27] You when you're hit with this type of rent somewhere, because if you're not taking all of the other precautions, you should be digging under really good that you're going to get hit the better than 50%. And once you do is have a good backup, and I want to warn everybody because I've seen this again and against people just keep making this mistake, probably because they don't get it. [00:02:51] They don't understand why and where and how, when it comes to ransom. The mistake is they do a backup to a local desk. Now, many times the backup is on a thumb drive or USB drive. So you just go to the big box store. You go to Amazon, you order an external drive. You're just amazed how cheap they are. [00:03:16] Nowadays. Once you've got that drive, you plug it in. You turn on some backup software. Maybe it's something you've used for some years, maybe. If you have a Mac, you're just using the built-in backup software. Even the windows operating system now comes with some built-in backup and you think you're off and running because every so often it back. [00:03:40] If we're using a Mac is smart enough to not only back up your whole machine, but as you're editing files, it's going to go ahead and make a backup of that file as you're editing it. So if there is a crash or something else, you're not going to lose much. I just love the way apple does that. Huge problem. [00:03:59] Because if the disc is attached to your machine, or let's say that disc is on a file server, cause you're smart, right? You set up some network attached storage of some sort and your machine has access to it. And so you're sending it off of your machine to a central. Well, you still got a problem because if your machine can read or more particularly right to a location on your network or locally, that ransomware is going to also encrypt everything, it can find there. [00:04:37] So, if you are sharing a network drive and you get ransomware, when you remember the odds are better than 50%, you're gonna get it. Then what happens? What would this type of ransomware it not only encrypts the files on your computer, but encrypts them on the backup as well. And it also encrypts them on any of the. [00:04:58] File servers or network attached storage the, to have on your network. So now everything's encrypted. You wonder why someone and people pay the ransom? Oh, that's a large part of the reason right there. And I keep saying this type of ransomware because there isn't another type of ransomware and they usually go hand in hand. [00:05:21] The bad guys were not making enough money off of holding your files. Rants. So the next thing the bad guys have done is they've gone to a different type of extortion. This one is, Hey, if you don't pay us, we are going to release your files to the world. Now they might do it on a dark website. They might do it on a publicly available site, which is what many of them are starting to do now. [00:05:51] And you're going to either be embarrassed or subject to a lot of fines or both, because now if your files have. Confidential information. Let's say it's your intellectual property. Now, anybody who bothers to search online can find your intellectual property out there. If you have anything that's personally identifiable information. [00:06:18] And it gets out. Now you are subject to major fines. In fact, in some states like California and Massachusetts, you are subject to fines. Even if the bad guys don't post it online. So that's the second type of ransomware and it's a bad type. And usually what'll happen is the bad guys, get their software on your machine and they can do it in a number of different ways. [00:06:45] One of the popular ways to do it now is to just break in because. Our businesses, we've, we've set up something called remote desktop, and we're using remote desktop for our users to get in. And maybe we're using some form of a VPN to do it with, or maybe we've made the mistake of using express VPN. And, uh, we have that now connected up to our homes and we think that that's keeping us safe. [00:07:13] And I got a few things to say about that as well. These VPN services. What happens now while Microsoft remote desktop has been under major attack and there are some major flaws. Some of these were patched more than a year ago now, but according to recent studies, 60%, almost two thirds of businesses have not applied the patches. [00:07:42] You know, th this is basic stuff. And I understand how hard it can be and it can be confusing and you can break your systems, but you have to weigh that against well, what's going to happen if our systems are broken into, because we didn't apply the patch. So that's the second type of ransomware and that's what most people are afraid of and for good reason. [00:08:07] And one of the things we do for businesses and we do ransomware audits, we have a look at your systems, your firewalls, et cetera, and make recommendations to. Man. I got to talk about this too, cause it really upset me this week. I signed up for a webinar just to see what was going on. There's a company out there that sells these marketing systems to managed services providers. [00:08:33] And I, I, I had to turn it off like instantly because it was just such. Garbage that they were telling managed services providers MSPs to do. I couldn't believe it. So this guy was talking about how, again, I turned it back on and I said, Hey, I've got to watch us anyways, because I need to know what's going on. [00:08:54] And this guy was telling these managed services providers, how they can double their clothes. I couldn't believe this guy. Cause he was saying that what they do is they offer to do a ransomware audit for businesses and they say, normally we charge $6,000 to do a ransomware audit, but I tell you what we'll do it for you for. [00:09:20] Now, this is a guy that he had an MSP managed services provider. Apparently he had started it and he was bringing in more than $1 million per month in revenue. Can you imagine that monthly recurring revenue over a million dollars? And so he's telling people businesses, Hey, I have a $6,000 audit that we'll do. [00:09:47] For free, Hey people, how long have we said, if you're not paying for something your, the product remember Facebook, right? Google, Instagram, all of those guys, Twitter, you don't pay for it, but your information is the product. So what's this guy doing well, guess what? His audit, it's going to show his audit. [00:10:10] It's going to show that you need him. And he's sucked in hundreds of businesses and he didn't even know what he was doing when it came to the audits or protecting them. It is insane. What's going on out there. I am ashamed of my industry, absolutely ashamed of it. You know, I've got my first attack, successful attack against my company back in 91 92. [00:10:42] And I learned this stuff because I had to, and I help you guys because I don't want you to get stuck. Like I was so important, important word of advice. If you want to nod it, go to someone that charges you for the audit. That's going to do a real one. It's going to give you real advice that you can really need and use rather than, Hey, you knew do use me. [00:11:11] Because my free audit tells you so, so many scams. [00:11:15] What is ad where in what is crypto, where these are two types of real, kind of bad things. Won't gray areas, things that are hurting us, our mobile devices, our businesses. And our homes. [00:11:32] Adware is also a type of malware that's been around a long time. But it does live in a gray area. [00:11:42] And that gray area is between basically marketing and, uh, well outright fraud. And I don't even want to call it just marketing because it's very aggressive market. What they will do with add where is they? They will have some JavaScript code or something else that's embedded on a webpage, and that's usually how you get it. [00:12:09] And then once it's in, in your browser, it sits there and it pops up things. So it'll pop up an ad for this, pop up an ad for that, even if it's. Uh, part of the site that you're on right now, and it can live for months or years on your computer. We've known for a long time about ad where on the windows environment and how it has just been just terribly annoying at the very least Microsoft and genetic Explorer. [00:12:40] One of the worst web browsers ever. Perpetrated on humankind was well-known for this. And of course, Microsoft got rid of internet Explorer, and then they came up with her own symposer browser, the edge browser that was also openly scorned. And so Microsoft got rid of their edge browser and switched over to basically Google Chrome chromium, and then changed his name to the edge browser. [00:13:11] And so you think you're running edge, but you're kind of not, you kind of are. So they did all of that in order to help with compatibility and also to help with some of these problems that people have had using that Microsoft browser online, very, very big problems. So what can you do about it and what does it do to you and where can be very. [00:13:37] You might've had it before words always popping up again and again and again on your browser, just so crazy knowing it it's insane, but it can also be used to spy on where you're going online and potentially to, to infect you with something even worse. Sometimes some of this ad where we'll purposely click on ads, that the people who gave you the ad were, are using as kind of like a clickbait type thing. [00:14:09] So you go to a website and it was. Automatically click certain ads and click on unbeknownst to you, right? It's as though you went there so that people have to pay for that ad. And sometimes aids are very, very complicated. Sometimes they'll use. In order to drive a competitor out of business or out of the market, because the ads are so expensive because so many people are supposedly clicking on the ads. [00:14:40] But in reality, you didn't click on the ad. You're not going to see that page that you supposedly clicked on, and it's going to cost that advertiser money, whole bunch of money. You might not care. Right. But it is. Ad ware over on the Mac, however, is the only real malware menace at all I had to where is something that choosed fairly frequently on the Mac? [00:15:09] It is pretty darn easy to get rid of. And as a general rule, it doesn't work very well on the Mac. Although I have seen some cases where it got very, very sticky. Where someone ended up installing it, it wasn't just running in the browser, but they installed it on their Mac, which is something you should never do. [00:15:29] But apple has some things in place to help stop any of this from happening. And it's gotten a lot better. I haven't seen this problem in a couple of years, but apple is using the signature based blocking technology called export. They also have at apple, this developer based notarization of apps. And so the run of the mill malware, which includes most of this Al where really can't find a foothold. [00:15:57] But I want to remind everybody that if they can get Al add where onto your computer, they might be able to get something worse. So you really got to keep an eye out for no two ways about it. There are some companies out there, for instance, there's this one. Parrot, which is a program linked to this Israeli marketing firm that gains persistence on your browser and potentially could gain root access to the Mac system. [00:16:30] So careful, careful on all fronts now. Anti-malware stuff that we use for our clients is called amp, which is an advanced malware protection system. That's been developed by our friends over at Cisco it's amp is very, very good. Unfortunately, you cannot get it unless you buy it from somebody like us and you have to buy so many seats for some of this stuff, it gets gets expensive quickly. [00:17:00] Um, if you can't do that much, a lot of people like Malwarebytes, there are some very good things about it, but be careful because in order for this to work, this is Railey parrot software to work. It has a fake install. So again, it's just be careful if you know how apple installed software, you know that unless you have instigated it, it's not going to be installed. [00:17:30] You're not just going to see an installer. And say, Hey, we're apple install us. Right? Apple just does it in the background when it comes to updates patches. But they're very sneaky here trying to install things like the Adobe floor. Player, which has been deprecated. Deprecated is completely now gone from Mac systems and from windows systems, you should not be using flash at all anymore. [00:18:02] It was very, very bad. So up becomes you, you go to wound stole the leaders flash player, or, and I'm sure they're going to change this or something else, right? It won't be flashed in a future. It'll be a Adobe. Would you also don't need on a Mac. So anyhow, that's what you got to be careful of ad were still a big problem in windows. [00:18:25] Not much as much as it used to be. Uh, thanks to the change to Google Chrome, which Microsoft has rebranded as of course its own edge browser. Much of a problem at all on Macs, but be very, very careful in either platform about installing software that you did not start installing. Now earlier this year, there's a security firm called red Canary that found something that's been named silver Sparrow. [00:18:58] That was on a. 30,000 Mac computers. And apparently the developers for this malware had already adapted it to apples and one chip architecture and have distributed this binary, this program as a universal binary. Now in the macro, the member doesn't just use Intel. It used to use power PCs and then it used Intel. [00:19:21] And now it's using its own architecture for the chips themselves. So a universal binary is something that will run on Mac Intel based and Mac architecture base. But, uh, the bottom line is that this proof of concept. Malware, if you will had no payload. So we know it's out there, we seen it now on almost 30,000 Mac computers, but at this point it's not really doing much, much at all. [00:19:53] So. These are malicious search engine results and they're directing victims to download these PKGs, which are Mac packaged format installers based on network connections from your browser shortly before download. So just be very careful about all of that. It can be something as annoying as malware or something as a malicious. [00:20:17] Well, potentially as ransomware. Particularly if you're running windows, Hey, if you want to find out more about this, if you want to get into some of my free courses here, we got free boot camps coming up. Make sure you go to Craig peterson.com/subscribe. More than glad to send you my show notes, a little bit of training, and of course, let you attend these free bootcamps that are now to sell you stuff, but solve problems for you. [00:20:49] Hey, if you use VPNs to try and keep yourself safe, particularly if you use express VPN. Wow. What just came out is incredible. It is anything but safe and secure. [00:21:06] Express VPN was purchased by a company called Cape K A P E. Cape is a company that had changed its name because oh, things were bad. [00:21:19] Right. It was originally founded under the name of cross writer. And you might've seen notices from your anti-malware software over the years for everything from Malwarebytes on saying that, oh, it blew up. To this cross writer piece of malware, most of the time it's ad ware, but it is really interesting to see because this company was founded by a person who was part of the Israeli secret service. Right? So it wasn't of course not. It's not called the secret service over there in Israel. And it, frankly, it compares to our NSA, you know, no such agency. Yeah. It's part of unit 8,200 in the Israeli intelligence military. And it's been dubbed, of course, Israel's NSA. Teddy Saggy, which was one of these investors also was mentioned in the Panama papers. [00:22:24] Remember those? We talked about those back in 2016, those were leaked and that showed these law firm, this one particular law firm in panel. And that we're sheltering assets for people all over the world. And so now that express VPN is owned by this company that is, this company built entirely by intelligence agents for almost a billion. [00:22:55] Dollars in cash and stock purchases. That's a much, they sold express VPN for almost a billion dollars, which is kind of crazy when you think of it as a VPN service, but makes a lot of sense. If you're going to want to monitor what people are doing, where they're going, maybe even break into their systems or better choice than a VPN provider and the. [00:23:20] The company has been buying up VPN providers and is now the proud owner of express VPN. If you attended my VPN workshop that I had, oh, it's probably been a year and I'm going to start doing these again. I promise, I promise. I promise, but you know how much I just like VPNs. In fact, one of you guys, I'm sorry, I forgot your name. [00:23:46] Send me. A couple of weeks ago now about VPNs and saying, I know how much you disliked VPN look at this article. And it was talking about this whole thing with express VPN. So they just now all over the place, the discussions online about what. Been to hear who the founder was, the CEO, the CTO, this growing portfolio that they have in Sunbrella of ownerships, that now is centralized in a multiple VPNs. [00:24:15] Now, Cape technology only started acquiring VPN companies about four years ago. And they've been in business now for over a decade. And what were they doing before? They started buying VPN companies? While they own VPN companies. Oh, they were a major manufacturer and distributor of. Malware of varying types. [00:24:40] Now the first part of the show today, of course, I was explaining some of the differences, like ad words, et cetera, so that you could understand this story. Right? Ghulja that? So you can understand this. That's what these guys have been doing. It's absolutely crazy. So the F the co-founder of Cape technology and former CEO started his career in information technologies while serving in the Israeli defense forces. [00:25:08] As I mentioned, Israeli intelligence Corps under unit 8,200 it's that unit is responsible for. Dean what's called signal intelligence and data decryption. Now we have signal intelligence here as well, and that's basically intercepting signals, figuring out what's being said, what's going on? Where they are, the size of the forces, et cetera. [00:25:32] I have a friend of mine, a young lady who is in signal intelligence in, I think it's the Navy, but every part of our military has it is. However, our military doesn't directly control VPM services like express VPN that can be used in a very big spike capacity. That's what I'm really concerned about. Now. I also, I found an interesting article on zero hedge about this, uh, you know, this company express, VPN being acquired. [00:26:06] But they're also pointing out that companies that were founded by former operatives of unit 8,200. That again, the Israeli version of the NSA included. Ways Elbit systems, which is right in my hometown of Merrimack, New Hampshire and slews of other startups now ways. Right. I, I used ways I recommended people to use it and of course, Google bought it a few years back and that's when I stopped using it, but it was really nice. [00:26:39] It worked really well. And I had no idea the information was likely going to. The Israeli defense Corps. Oh my goodness. There's spy agencies, uh, and a bunch of other startups, by the way. It's estimated that there have been over 1000 stack tech startups that came out of the people working at unit 8,208. [00:27:07] Again, they're CIA NSA, uh, guys, their spine on everybody. You can, you believe that? And they've been bought by a mentioned Google, but other companies like Kodak, PayPal, Facebook, Microsoft have bought them. So in addition to the thousands of companies, according to zero. Uh, unit 8,200 has also fostered close working relationship with the U S government, which you would expect, right? [00:27:33] Edward Snowden. You remember him? He disclosed leaked documents. He obtained, which included an agreement between the NSA and the Israeli defense force. The agreement showed that the U S intelligence. Agency would share information. It collected under domestic surveillance operations with it. Israeli counterpart. [00:27:53] You remember we talked before about the five eyes, seven eyes searching eyes. It's up in the twenties. Now these countries that spy on each other citizens. For the other countries, right? Yeah. Your information might not be collected by the U S government, but the U S government gets it by buying it from private contractors, which it says it can do because we're only barred from collecting it ourselves. [00:28:17] We can use private contractors that collected on you. And also by going in partnership with foreign government. Because again, we can't collect that information, but we can certainly have the Israelis or, or the Brits or the Australians or Canada. They could collect it from. Can you believe this, how they're just stretching these rules to fit in what they want to fit. [00:28:39] Okay. Completely ignoring not only the constitution, but the laws of the United States. It's, it's just absolutely incredible. So critics of this unit, Eddy 200 attested that the Israeli intelligence outfit routinely uses the data received from the NSA by providing it to. Politicians Israeli politicians for the basics of blackmailing. [00:29:06] Yes. Blackmailing others. Yes. Indeed. Other whistle blowers have revealed any two hundreds operations have been able to disrupt Syrian air defense systems, hack Russia. Cap Kaspersky labs. You remember I told you guys don't use Kaspersky antivirus and has outfitted several Israeli embassies with Glendale, seen surveillance systems, cleanse Stein. [00:29:31] However you want to pronounce it. By the time Cape technologies acquired his first VPN company. Uh, the CE original CEO had left and he went on to found cup pie before leaving as it CEO in 2019, it goes on and on, uh, bottom line gas, SWAT express VPN, which is advertised by so many conservatives. Now looks like it is actually part of a spy operation. [00:30:01] So sign up now. Craig peterson.com. Craig peterson.com/subscribe. You're going to want to attend my free VPN webinar. Hey, I don't have anything to sell you when it comes to VPNs. I just want you to know the truth. [00:30:17] Labor shortages are making businesses turn direction. And now that we're laying off people or firing them because they didn't take the jab, what are businesses going to do? Well, I have news for you that reduced workforce, well, guess what?. [00:30:34] U.S. Businesses are really seriously moving to automation. [00:30:39] Now they've been doing this since the start of this whole lockdown. They were doing it even before then. I tell the story of when I was in France, a boom went four or five years ago now, and I stayed off the beaten path. I was not in the touristy areas. I speak French. So I went just where the. I decided to go, my wife and I, so we rented a car and we spent a month just kind of driving around where do we want to go next to, or do we want to go next? [00:31:08] It was a whole lot of fun. And while we were there on a Sunday, I came to realize that these small French towns have no restaurants open on Sunday, nothing at all, talking about a bit of a culture shock. That's not true. There was one restaurant opened in the town and that restaurant was, and McDonald's. [00:31:30] So when I go to McDonald's here a few years ago in France, central France. And when I walk in, there's nobody at the counter, but they're all. Oh, half a dozen kiosks out front. So you go and you order your hamburger, whatever might be, or your drinks, et cetera, right there in the kiosk, you pay for them riding the kiosk. [00:31:53] And there's some people working out back that are then making the hamburgers or the milkshakes or coffee, whatever you ordered and bringing it up to the front. And then they just put her right there for you to grab that simple. And this was of course, pre. Down days, I assume that it has gone even more automated. [00:32:14] Uh, they're in France, but hard to say. And I've seen the same thing here in the us. I was out in Vermont just about a month ago and I was riding with a buddy of mine, motorcycle riding, couple of buddies, actually. And we stopped in this small. Town. And we went to this little breasts, breakfast restaurant and the breakfast restaurant had maybe four or five tables inside. [00:32:42] And you just sat at the table. No waitress came up, but there's little sign with the QR code. So it said a scan, the QR code to get started. So you scanned it, it knew based on the QR code, which table you were at, and it showed you the menu that was in effect right then and there. So the lunch menu or the breakfast or the all day, you got to pick it and then you selected what you wanted. [00:33:08] It used whatever payment you wanted. I used apple pay. And in order to pay for my breakfast and my buddy ordered what he wanted. And then out came a waitress who delivered the food. Once it was already in the drinks, it was very automated. It allowed them to cut back on some people and others, this small restaurant, they probably had one last waitress, but when you kind of had in the shifts. [00:33:33] Days and vacation days is probably two waitresses. So they're saving some serious money because a system like this that you just scan a QR code and do the order and it prints up in the kitchen is cheap compared to hiring. Well, of course, it's hard to hire people, especially in the restaurant industry nowadays heck and in my business where we go in and we do analysis of computer networks and systems, it's almost impossible to find people that are really well qualified that understand the regulations that apply to these different businesses. [00:34:10] So it's like, forget about it. There's more than a million of these jobs open right now. And just in this cybersecurity. Well, September mark, the end of the real lockdown induced unemployment benefits workers. Didn't just flood the labor market as we kind of expected. And we have now few, we have more people now. [00:34:38] Who are out of the workforce. Who've decided not to look for a job than we did in 2008. So that's telling you something 2008 during the great recession. Interesting things are about to happen, but there's a great little article that I found in. Times this week, and it's talking about this quality local products company out of Chicago, the prince logos on merchandise, like t-shirts water bottles, you know, the little stress balls, all of that sort of stuff. [00:35:10] And he said prior to the pandemic, we had over 120 employees. That's the co-founder talk in there. And he said, Primary focus was on growth. We simply plugged any holes or any efficiencies that we could along the way with human capital, bringing people in. But once the lockdown happened, of course, all of a sudden now you don't have the access to employees you had before. [00:35:36] So they had a huge decrease also in business. So those two went hand in hand. They let a lot of people go and they use the opportunity to program many of the previous manual and human controlled activities into computers. So now 18 months later, yeah, two weeks to flatten the curve. Right? 18 months later, the company employees, 83 workers. [00:36:03] And as managing a workload, that's pretty much the same as pre lockdown. So they went from over 120 employees down to 83. So basically they cut 40 employees from the workforce. That's a whole lot of quarter of the workforce gone. They don't need them anymore. So that's going to help produce more profits for them. [00:36:27] A lot more profits. Cause usually automating. Yeah, it can be painful, but it usually has major paybacks and that's exactly what it had for them. And they're saying that they anticipate that they can reduce employees even more by the end of this year and get their head count below. 50 now 50 is a magic number. [00:36:48] So it was a hundred when it comes to employees. Well, one is like the biggest magic number because when, once you have one employee, you all of a sudden have to comply with all kinds of rules, regulations, state, local, federal. But if you hit 50 employees, you have the next step of major new regulations that are gonna affect your business. [00:37:09] And then when you hit a hundred employees, Even more, so many people try and keep their businesses below 50 employees because it's just not worth it to have all of those regulations, additional regulation, taxes, and everything else. Another company, this is a California based property management. The managing more than 90,000 commercial and residential properties. [00:37:33] And what they've done is they added a chat feature to the website, the company's called sea breeze. And he says, even though we have the live chat, you can still reach us outside of business hours. Well, You are using the chat or you can call us either way, but they're saying people like the simple form and someone gets back to them as soon as they can. [00:37:57] So they're avoiding now having staff available 24 7 to respond to chat messages and to respond to the voicemails and phone calls that come in. So it's pretty good all the way around, frankly, new shopping models are in place. I'm looking at a picture of a business and it has. Of course, a window up front and in the window they have jewelry. [00:38:21] This is a jewelry store and they've got QR codes in front of each of these pieces of jewelry right on the inside of the window. So if you're interested in finding out more about that piece of jewelry, Just scan the QR code. It'll take you to the right page on their website and we'll even let you buy the jewelry and they will mail it to you again. [00:38:46] How's that for? Great. If you have a business in a tourist jury area and you don't want to be open until 11:00 PM at night, your story can keep selling for you. Even when you're close. This is window shopping, taken to an extreme, very simple. To do as well. This company is called full me waiter. Obviously they've got a bit of a sea theme here. [00:39:10] So once someone orders the jewelry and the other merchandise sent right to them, or they can have it set for pickup in the store, when they next open it's phenomenal. They're calling. Alfresco shopping space, right from the sidewalk. So businesses again are returning to pre pandemic levels and he, this guy is available in the store by appointment only he's loving it. [00:39:37] And he says that customers have been so satisfied with this QR code window shopping contract. That he wrote a guidebook. You can get it@scantshopsolution.com or excuse me, scan, just shop solution.com. I misread that. So any retailers who want to use this method, if you don't know what QR codes are, or you don't know how to code it into a website, et cetera, she's got webinars she's taught on it and she's got the guide book. [00:40:05] I think this is great. Right? So she's now making some money on. Explain to other people, how she did this. It's phenomenal across industries. Epic times is saying the staffing shortages could be temporary, but as firms are further embracing, embracing automation and all of its benefits, some of these jobs that people just don't want anymore may actually be going away. [00:40:33] And I think this is ultimately a problem. We had, uh, you know, again, I'm older generation, right? Us baby boomers. We had opportunities when we were younger. I had newspaper routes. I had the biggest drought in the area. I can't remember. It was like 120 homes. It was huge. It took me hours to do, but I made money. [00:40:56] I learned how to interact with people. I knew, I learned how to do bill collection, how important it was not to let customers get too far behind on their bills. Although I have been slack on that one, I'm afraid, but it helped me out a lot. So, what are kids going to do that need to learn a work ethic that need to be able to have a job, make the mistakes, maybe get fired a once or twice or, or three times maybe learn how to interact with customers. [00:41:27] Everyone, I think can benefit from some retail experience. Get that when you're young and if these jobs don't exist, then. Or the younger generations here, are they just going to be trying to find jobs they can do with Instagram? Right? They're all I know. A few kids who have said, well, I'm a social media influencer and you look them up and okay. [00:41:50] So they got a thousand people following them. I have far more than that, but you know, it, that's not a job. It's not going to last. Your looks are only going to last so long. Right now you start having a family and you start working hard outdoors, et cetera. There's a lot of things that make that all go away. [00:42:09] So I think many businesses now we're going to continue to accelerate our plans program out and. A lot of weld pain positions, as well as these entry-level positions in the next five or 10 years. Really? I don't even know if it's going to be 10 years retool retrain our workforce, or everyone's going to be in for a world of hurt. [00:42:33] Hey, make sure you subscribe. So you're not in a world of hurt. Get my latest in news, especially tech news and cybersecurity. Craig peterson.com. [00:42:46] In this day and age, if you don't have a burner identity, you are really risking things from having your identities stolen through these business, email compromises. It's really crazy. That's what we're going to talk about. [00:43:03] An important part of keeping ourselves safe in this day and age really is con to confuse the hackers. The hackers are out there. They're trying to do some things. For instance, like business, email compromise. It is one of the biggest crimes out there today. You know, you hear about ransomware and. It hits the news legitimately. [00:43:26] It's very scary. It can really destroy your business and it can hurt you badly. If you're an individual you don't want ransomware. Well, how about those emails that come in? I just got an email in fact, from a listener this week and they got a phone call. His wife answered and it was Amazon on the phone and Amazon said, Hey, listen, your account's been hacked. [00:43:54] We need to clear it up so that your identity doesn't get stolen. And there's a fee for this. It's a $500 fee. And what you have to do is just go to amazon.com. Buy a gift card and we'll then take that gift card number from you. And we'll use that as the fee to help recover your stolen information. So she went ahead and did it. [00:44:20] She went ahead and did all of the things that the hackers wanted and now they had a gift card. Thank you very much. We'll follow up on this and. Now she told her husband, and of course this isn't a sex specific thing, right. It could have happened to either one. My dad fell for one of these scams as well. [00:44:44] So she told her husband or her husband looked at what had happened and said, oh my gosh, I don't think this is right. Let me tell you, first of all, Amazon, your bank, various credit card companies are not going to call you on the phone. They'll send you a message right. From their app, which is usually how I get notified about something. [00:45:10] Or they will send an email to the registered to email that. Uh, that you set up on that account. So that email address then is used by them to contact you right. Pretty simple. Or they might send you a text message. If you've registered a phone for notifications, that's how they contact you. It's like the IRS. [00:45:35] I was at a trade show and I was on the floor. We were exhausted. And I got no less than six phone calls from a lady claiming to be from the IRS and I needed to pay right away. And if I didn't pay right away, they were going to seize everything. And so all I had to do. Buy a gift card, a visa gift card, give her the number and she would use that to pay the taxes it and this lady had a, an American accent to one that you would recognize. [00:46:10] I'm sure. And it's not something that they do now. They do send emails, as I said. So the part of the problem with sending emails is, is it really them? Are they sending a legitimate email to a legitimate email address? Always a good question. Well, here's the answer. Yeah, they'll do that. But how do you know that it isn't a hacker sending you the email? [00:46:42] It can get pretty complicated. Looking into the email headers, trying to track. Where did this come from? Which email servers did it go through? Was it authenticated? Did we accept? Did the, uh, the provider use proper records in their DNS, the SPIF, et cetera, to make sure that it's legitimate. Right? How do you follow up on that? [00:47:07] That's what we do for our clients. And it gets pretty complicated looking at DKMS and everything else to verify that it was legitimate, making sure that the email came from a registered MX server from the, the real center. There is a way around this. And this has to do with the identities, having these fake burner identities. [00:47:33] I've been doing this for decades myself, but now it's easy enough for anybody to be able to do. There are some services out there. And one of the more recommended ones. And this is even the New York times, they have an article about this. They prefer something called simple log-in. You can find them online. [00:47:57] You can go to simple login dot I O. To get started now it's pretty darn cool. Cause they're using, what's called open source software it's software. Anybody can examine to figure out is this legitimate or not? And of course it is legitimate, but, uh, they it's, it's all out there for the whole world to see. [00:48:17] And that means it's less likely in some ways to be hacked. There are people who argue that having open source software means even more. In some ways you are, but most ways you're not, anyways, it doesn't matter. Simple login.io. Now, why would you consider doing this? Uh, something like simple login? Well, simple login is nice because it allows you to create dozens and dozens of different email address. [00:48:51] And the idea is with simple log-in it will forward the email to you at your real email address. So let's say you're doing some online shopping. You can go ahead and set up an email address for, you know, whatever it is, shopping company.com, uh, that you're going to use a shopping company.com. So you'd go there. [00:49:13] You put in two simple log-in, uh, I want to create a new identity and you tag what it's for, and then you then go to some, um, you know, shopping company.com and use the email address that was generated for you by simple login. Now you're a simple login again. Is it going to be tied into your real email account, wherever that might be if using proton mail, which is a very secure email system, or if using outlook or heaven forbid Gmail or one of these others, the email will be forwarded to you. [00:49:52] You will be able to see that indeed that email was sent to your. Shopping company.com email address or your bank of America, email address, et cetera, et cetera, that makes it much easier for you to be able to tell, was this a legitimate email? In other words, if your bank's really trying to get ahold of you, and they're going to send you an email, they're going to send you an email to an address that you use exclusive. [00:50:22] For bank of America. In reality, you only have the one email box that is over there on wherever proton, mail, outlook, Gmail, your business. You only have that one box you have to look at, but the email is sent to simple login. Does that make sense? You guys, so you can create a, these alias email boxes. It will go ahead and forward. [00:50:49] Any emails sent to them, to you, and you'll be able to tell if this was indeed from the company, because that's the only place that you use that email address. That makes it simple, but you don't have to maintain dozens or hundreds of email accounts. You only have the one email account. And by the way, you can respond to the email using that special aliased email address that you created for the shopping company or bank of America or TD or whomever. [00:51:22] It might be, you can send from that address as well. So check it out online, simple log-in dot IO. I really liked this idea. It has been used by a lot of people over, out there. Now here's one other thing that it does for you, and this is important as well. Not using the same email address. Everywhere means that when the hackers get your email address from shopping company.com or wherever, right. [00:51:56] pets.com, you name it. They can not take that and put it together with other information and use that for business, email compromise. Does that make sense? It's it makes it pretty simple, pretty straightforward. Don't get caught in the whole business email compromise thing. It can really, really hurt you. [00:52:19] And it has, it's one of the worst things out there right now, dollar for dollar it's right up there. It, by the way is one of the ways they get ransomware into your systems. So be very careful about that. Always use a different email address for every. Website you sign up for. Oh, and they do have paid plans like a $30 a year plan over at simple IO will get you unlimited aliases, unlimited mailboxes, even your own domain name. [00:52:50] So it makes it pretty simple, pretty handy. There's other things you might want to do for instance, use virtual credit cards. And we'll talk about those a little bit. As well, because I, I think this is very important. Hey, I want to remind everybody that I have started putting together some trainings. [00:53:12] You're going to get a little training at least once a week, and we're going to put all of that into. We have been calling our newsletter. I think we might change the name of it a little bit, but you'll be getting those every week. And the only way to get those is to be on that email list. Go to Craig peterson.com/subscribe. [00:53:35] Please do that right. I am not going to harass you. I'm not going to be one of those. And I've never been one of those internet. Marketers is sending you multiple dozens of emails a day, but I do want to keep you up to date. So stick around, we will be back here in just a couple of minutes. And of course you're listening to Craig Peterson. [00:53:59] And again, the website, Craig peterson.com stick around because we'll be right back. [00:54:05] One of the best ways to preserve your security on line is by using what we're calling burner identities, something that I've been doing for more than 30 years. We're going to talk more about how to do that right. [00:54:20] We've talked about email and how important that is. I want to talk now about fake identities. Now, a lot of people get worried about it. It sounds like it's something that might be kind of sketchy, but it is not to use fake identities in order to confuse the hackers in order to make it. So they really can't do the things that they. [00:54:46] To do they can't send you fishing ear emails, particularly spear phishing emails. That'll catch you off guard because you're using a fake. How do you do that? Well, I mentioned to you before that I have a thousands of fake identities that I created using census data. And I'm going to tell you how you can do it as well. [00:55:13] Right? There's a website out there called fake name a generator. You'll find it online@fakenamegenerator.com. I'm on that page right now. And I'm looking at a randomly generated identity. It has the option right on this page to specify the sex. And it says random by default, the name set, I chose American the country United States. [00:55:44] So it is applying both American and Hispanic names to this creative. And now remember it's doing the creation based on census data and some other public data, but it is not giving you one identity of any real. I think that's important to remember, and you're not going to use these identities for illegal purposes. [00:56:11] And that includes, obviously when you set up a bank account, you have to use your real name. However, you don't have to use your. If you will real email address, you can use things like simple login that will forward the email to you, but we'll let you know who was sent to. And if you only use that one email address for the bank, then you know that it came from the bank or the email address was stolen from the bank. [00:56:40] Right. All of that stuff. We've talked about that already. So in this case, The name has come up with for me is Maurice D St. George in Jacksonville, Florida even gives an address, uh, in this case it's 36 54 Willis avenue in Jacksonville, Florida. So if I go right now, Uh, two, I'm going to do use Google maps and I am going to put in that address. [00:57:11] Here we go. Jacksonville willows avenue, all the guests. What there is a Willis avenue in Jacksonville, and it's showing hoes from Google street view. Let me pull that up even bigger. And there it is. So ta-da, it looks like it gave me. Fairly real address. Now the address it gave me was 36 54, which does not exist. [00:57:40] There is a 365, but anyways, so it is a fake street address. So that's good to know some, if I were to use this, then I'm going to get my. Uh, my mail saying why about I pass? So, uh, Maurissa tells you what Maurice means, which is kind of neat. It'll give you a mother's maiden name. Gremillion is what a gave me here, a social security number. [00:58:06] So it creates one that passes what's called a check sum test. So that if you put it into a computer system, it's going to do a real quick check and say, yeah, it looks. To me. So it's was not just the right number of digits. It also passes the check, some tasks. Well-known how to do a check sum on their social security numbers. [00:58:27] So again, it's no big deal. And remember, you're not going to use this to defraud anyone. You're going to use this for websites that don't really need to know, kind of give me a break. Why do you need all this information? It gives me a phone number with the right area code. Uh, and so I'm going to go ahead and look up this phone number right now. [00:58:50] Remember, use duck, duck go. Some people will use Google search and it says the phone number gave me is a robo call. As I slide down, there's some complaints on that. Uh, so there you go. So they giving us a phone number that is not a real person's phone number, country code, of course one, cause I said United state birth date. [00:59:13] Oh, I was born October 7th, year, 2000. I'm 20 years old. And that means I'm a Libra. Hey, look at all this stuff. So it's giving me an email address, which is a real email address that you can click to activate or right there. Again, I mentioned the simple login.io earlier, but you can do a right here and it's got a username and created for me a password, which is actually a pretty deep. [00:59:41] The password. It's a random one, a website for me, my browser user agent, a MasterCard, a fake MasterCard number with an expiration and a CVC to code all of this stuff. My height is five six on kind of short for. Uh, my weight is 186 pounds own negative blood type ups tracking number Western union number MoneyGram number. [01:00:11] My favorite color is blue and I drive a 2004 Kia Sorento and it also has a unique ID. And, uh, you can use that wherever you want. So the reason I brought this up again, it's called fake name generator.com is when you are going to a website where there is no legal responsibility for you to tell them the true. [01:00:39] You can use this. And so I've, I've used it all over the place. For instance, get hub where you have, uh, it's a site that allows you to have software projects as you're developing software. So you can put stuff in, get hub. Well, they don't know to know, need to know who I really am. Now they have a credit card number for me. [01:01:01] Because I'm on a paid plan. I pay every month, but guess what? It isn't my real credit card number. It isn't the number that I got from fake name generator. My credit card company allows me to generate either a single use credit card numbers, or in this case, a credit card. Number four, get hub doc. So just as an example, that's how I use it. [01:01:24] So if get hub gets hacked, the hackers have an email address and a name that tipped me off right away, where this is coming from. And if the email didn't come from GitHub by no, they either sold my information to a marketing company, or this is a hacker. Trying to manipulate me through some form of his fishing scheme. [01:01:47] So I know you guys are the breasts and best and brightest. A lot of you understand what I'm talking about and I'm talking about how you can create a burner identity. And let me tell you, it is more important today to create a burner identity. Then it has ever been at any point in the past because frankly burner identities are one of the ways that you can really mess up some of the marketing firms out there that are trying to put the information together, these data aggregator companies, and also the hackers. [01:02:24] And it's really the hackers that were off up against here. And we're trying to prevent them from. Getting all of this information. So when we come back, I want to talk about the next step, which is which credit cards can you get? These single use card numbers from? Should you consider using PayPal when my Google voice be a really good alternative for you? [01:02:52] So we're going to get into all of that stuff. Stick around in the meantime, make sure you go to Craig peterson.com/subscribe. Get my newsletter. All of this. Is in there. It makes it simple. It's a simple thing to do. Craig peterson.com. And if you have any questions, just email me M e@craigpeterson.com. [01:03:20] Having your credit card stolen can be a real problem for any one of us. It gives the bad guys, a lot of options to spend a lot of money very quickly. We're going to talk right now about virtual credit cards. What are they, what does it mean? [01:03:37] Virtual credit cards come in two basic forms. [01:03:41] One is a single use credit card, which was quite popular back when these things first came out and another one is a virtual credit card that has either a specific life. In other words, it's only good for 30 days or that can be used until you cancel it. If you have a credit card, a visa, MasterCard, American express discover all of the major card issuers will give you the ability to reverse any charges that might come onto your cards. [01:04:19] If your card is stolen or missing. Now that makes it quite easy. Doesn't it? I want to point out that if you're using a debit card, as opposed to a credit card, there's not much challenging you can do with the credit card. You can say, I am not going to make my pain. And, uh, because of this, that, and the other thing, this was stolen, et cetera, they can file it as a disputed charge. [01:04:46] They can do an investigation find out. Yeah. I'm you probably were not at a bus terminal down in Mexico city, which happened to me. 'cause I was up here in New Hampshire, quite a ways down to Mexico city. And so they just reversed it out. That money never came out of my bank account because it was on a credit card. [01:05:08] If I were using a debit card. That money would have come right out of my account. Now, mind you, a bus ticket in Mexico city is not very expensive, but many people have had charges of many thousands of dollars. And if you need that money in your checking account, and you're using a debit card, you got a problem because your check for, well, if you ever have to pay rent again, red check is going. [01:05:38] Bound because they just empty it out to your bank account. So now you have to fight with the bank, get the money back. They will, they will eventually refund it, but it could make some of you. Transactions that you might've written a check or something, it'll make them bounce. And that could be a real problem. [01:05:57] These, it could make them bounce. So using a credit card is typically less of a hassle online. So why would you want to use a virtual card or also known as a master credit card? Masked and may S K E D? Well, the main reason behind this is to allow you. Control payment. I've used them. In fact, I use them exclusively on every website online. [01:06:29] And I'm going to tell you the names of some of them here in just a couple of minutes, but I use them all of the time. And part of the reason is let's say, I want to camp. Uh, service. Have you ever tried to cancel a service before and you have to call them many times, right. And so you're, you're arguing with somebody overseas somewhere who doesn't want you to close the account. [01:06:53] And of course the. Bump you up to the next level person who also doesn't want you to close the account. And so you have to fuss fuss, fuss, fuss. Have you ever had that experience and I'm sure you have. It just happens all the time. So with using the virtual credit card, Well, the advantage to me is, Hey, if you are going to try and fight with me, I don't care because I'm just going to cancel that credit card number. [01:07:24] So I don't have to cancel my credit card. I don't have to have the company reissue credit card for me. I don't have to do any of this sort of thing that makes my life pretty easy. Doesn't it? And so, because of that, I am now I think in a much better. Place, because it just, I don't have to fight with people anymore. [01:07:43] So that's one of the reasons I used it. The other big reason is if it gets stolen, they can cause less harm. Some of these credit card it's virtual credit cards are set up in such a way that you can limit the amount that's charged on them. Do you like that? So if you are using it on a site that maybe is charging you $50 a month, no problem. [01:08:09] $50 a month comes off of the credit card. And if someone tries to charge more bounces and then hopefully you find out, wait a minute, it just bounced on me right now. Then next step up is okay. It bounced and. Uh, I am just going to cancel the card and then you issue a new credit card number for that website. [01:08:32] So an example. In my case has get hub.com. We keep software up there and they charge me every month if get hub were to get hacked and that credit card number stolen I'm I really don't care because there's almost nothing that can happen. And if good hub doesn't properly cancel. My account, I can just cancel the credit card and, you know, let them come after me. [01:08:57] Right. This isn't going to happen. So then it's also called a master credit card number because it's a little safer than using your real credit card details. I also want to point out something about debit card. I went for years with no credit cards at all. Nowadays, many of my vendors will take a credit card for payment. [01:09:20] And in fact, give me a bit of a better deal. And then with the credit card, I can get 2% cash back, which I use to pay down the credit card. Right. It couldn't get any better than that, but when you're using a debit card, what I always. Is I had two accounts that I could transfer money between at the bank. [01:09:42] So I had one checking account. That was my main operating, if you will account. And then I had another checking account where I would be. Just moving money out of it. Or you could even do it with a savings account, but some banks, they only let you do so many transactions a month on a savings account. So the idea is I know that I have this much in credit card obligate while debit card obligations for this month, that money is going to be coming out. [01:10:11] So I make sure that. In the debit card account to cover the legitimate transactions I know are coming up and then I keep everything else in the other account. And then I manually transferred over every month. So that's how I dealt with the whole debit card thing. And it worked really well for me. Bottom line. [01:10:30] I think it's a really great. So there you go, who are the companies that you can use to do this? I've used some of these before all of them have worked really well. If you have a capital one credit card, they have something called Eno, E N O, and it's available to all capital one card. You know, even has an extension for your web browsers. [01:10:59] So if it notices you're on a webpage, it's asking for credit card number, it'll pop up and say, do you want me to create a credit card number or a virtual one for this websites you can make your payment. Does it get much easier than that? Citibank has something they call a virtual credit cards available to all Citibank card holders, master pass by MasterCard. [01:11:23] That's available to any MasterCard visa, American express discover Diner's club card holders, credit, debit, and prepaid cards by their way. So you might want to check that one out. Uh, yeah, so that's the only one I see on my list here. That will do it for debit cards, Masterpass by MasterCard American express checkouts, available to all American express card holders. [01:11:51] Chase pay available to all chase card holders, Wells Fargo, wallet, uh, visa checkouts, available to all visa, MasterCard, and American express and discover color card holders, credit and debit cards. Plus. Prepaid cards. Okay. So it does do the debit cards as well. Final that's all owned by Goldman Sachs and is not accepting any new applicants and entro pay. [01:12:19] Also not accepting new applicants. There's a couple online. You might also want to check out our Pyne. Premium Al buying. I'm buying a, B I N E blur premium. You might want to check that out as well. All right, everybody make sure you check me out. Craig peterson.com/subscribe. [01:12:43] We're going to wrap up how you should be using these burner identities of few more tips and tricks that are going to help keep you safe from the hackers that are out there. So here we go. [01:12:58] There are a lot of hackers out there. [01:13:01] The numbers are just astounding. The cost of these hackers coming in and stealing our information is just unbelievable. And it goes all the way from big corporations, from things like the colonial pipeline, the U S government all the way on down through you and me. I want to tell you a little story about a friend of mine. [01:13:28] He is about 75 years old and he supplements his income by driving for Uber eats and one other company. And so what he'll do is someone puts in an order for food somewhere. He'll go pick it up and then he'll drive it to where whoever wanted wanted, whoever ordered it. Now, there are. Pricing number of scams with this. [01:13:55] So he's very careful about some of that orders, a cookie, for instance, because it's usually a bit of a scam anyways, we won't get into those, but I'll tell you what happened to him. His information was stolen online as it was probably yours. Mine I know was as well. So it's all stolen. What do you do? While in his case, what ended up happening is they managed to get into his email account. [01:14:27] Once they're in his email account, they now had access to the emails he was getting from one of these companies. Now it wasn't the Uber eats guy. He was, there was another company. So let's just explain this a little bit. Uber eats sends him a request for him to go ahead and do a double. So, you know, go to the restaurant, pick it up and take it to this client's house. [01:14:54] And in order for him to register, he had to register an email address. Now, of course, he uses the same email address for everything, all of the. Now, personally, that drives me a little bit insane, but that's what he does. And he has just a few passwords. Now. He writes them down a little book and heaven forbid he ever lose the book so that he can remember them. [01:15:24] He just wants to keep his life simple. Right. He's 75. He's not technophobic, but you know, he's not up on all of this stuff. What he found was a paycheck didn't show. And it was an $800 paycheck. We're talking about real money that he should have had in his. It didn't show up. So he calls up the company and says what happened to my paycheck and their record show? [01:15:53] Yes, indeed. It had been paid. We paid you, we deposited right into your account. Just like you asked. Yeah. You know, ACH into the account. Great. Wonderful. What had happened is bad guys had gone, gained control of his email address and use that now. Because they figured, well, I see some emails in his account from this food delivery service, so, well, let's try and see if this email address that we're looking at right now. [01:16:26] All of his emails let's look and see. Okay. Yeah. Same. Email address and same password as a used ad at this email address. Yeah, it worked. Okay. Great. So now we have access to this guys food delivery account. So they changed. The bank account number now, easy enough to confirm, right. They change it and send you an email. [01:16:54] Hey, I want to make sure that it was you until the bad guys, the hackers click out, yada yada. Yeah, it was me and then delete the email. So he doesn't see it. And now his $800 paycheck. In fact, I think there were a couple of different checks is deposited directly into the bad guy's bank account and. The money of course is transferred out pretty quickly. [01:17:18] Now the, that guys, these hackers are using what are called mules. You might be familiar with that in the drug trade. They'll have a third party deliver the drugs just to mule. They don't know what all is going on. They probably know the delivering drugs in this case, most of the meals are useful idiots of which there are many in this country. [01:17:43] Unfortunate. Uh, political and otherwise. And these people are convinced that all they need to do is transfer the money into this account so that the hackers can then pull it out. And you know, now they're going to take care of their grandmother who is stuck in the hospital and they have no way to pay for it. [01:18:07] And they can't transfer the money out of the country during. That's one of the stories they use for people. And in many cases, these meals know what they're doing. The FBI earlier this year arrested a whole group of mules out in California that were purposefully transferring the money. They knew what they were doing. [01:18:28] So his money was now out of the country. No way to get it. And this food delivery company was not about to pay him. So it, isn't just the big guys it's you and me as well. So what I want to talk about right now is multi-factor authentication. Now. You guys are the best and brightest. I hope you understand this. [01:18:54] If you have questions, please reach out to me. I am more than
Craig Peterson: [00:00:00] Hello everybody. Craig Peterson here. I was on with of course, Mr. Jim Polito, and with him on parts of Vermont central and Eastern Mass, Rhode Island, Connecticut. He has a big show that covers all kinds of territory. And so we're covering new England. What can I say with all of these different stations, I'm on in Vermont directly and all throughout New Hampshire and Maine and stuff. So it's just really cool. And without you guys, it just wouldn't be happening. So thank you. Thank you to you. And also I got to mention playing my podcast. Listens are way. Oh, and again, thanks. [00:00:42] Thank you to all of you guys. I so appreciate it. And to that end I am going to, as of next week on Monday going to be opening up a course that I've put together. Yes. That core is the one that promising now for how many months. And so this is as a thanks to you guys. I am going to be giving. A, I hope you're sitting down basically two third, all in fact, exactly. [00:01:14] Two thirds off on this, you're gonna be saving 200 bucks. I'm making it cheap under a hundred dollars. It's going to be 99 and it is going into the Y. And the how of doing your windows security, the basic security windows, that configuration settings you need to be doing. So keep an eye out for that on Monday. [00:01:38] And by the way, here's the, a little secret and it's going to be a surprise to a lot of people, but if you respond beyond to my email newsletter, if you responded to my email newsletter and you told. Me that you were interested in, improving who wouldn't know security. If that happens before Monday, I'm also going to be giving you a special coupon that only you guys will get. [00:02:04] And that coupon, it will be good for two months. And you can share that with your friends, so that your friends can get. A two-thirds discount on the improving windows security course. So it's really important that all you guys get this course, it is so important. And it's going to help, prove to my wife that it's worth me spending all of these hours every week. [00:02:32] And in fact, a at least a day, a week dedicated to. And putting together all this stuff, the newsletter and the radio show and all these other appearances. So to convince her that it's worth it to do all of this, did you guys appreciate it? And it's a great way to show it. So if you go to one of my newsletters, even an older one, and you say, yes just hit reply and put IWS in the subject line. [00:02:56] I'll tag you. And you'll get one of these coupons you can share with your friends. So when you're talking about what you've done to improve windows security, you'll be able to say, and by the way, you can do it too with this coupon. Good for two months for them. Anyhow, take care guys. Here we go with Mr. [00:03:17] Jim Polito. [00:03:18]Jim Polito: [00:03:18] It appears that there's a company who can they can track where your car is. And they want to sell this data to the government. What. This, by the way this news comes as we hear that the Chinese don't want Tesla in China anymore, because they think that Tesla is basically a CIA backed company. [00:03:46] That's spying on the Chinese. All right. Let's sort all this out. And just bring in the voice of reason and the voice of real intellect. I'm talking about our tech talker ruin good friend, Craig Peter song. Good morning, sir. [00:04:01] Craig Peterson: [00:04:01] Hey, good morning. How you doing [00:04:03] Jim Polito: [00:04:03] Mr. Jim? I'm very good Craig. We can get into the Tesla thing and the Chinese saying you're spying on us and kicking them out. [00:04:10] And meanwhile, they're trying to they're building components for R F 16 fighter jet, but that's all right. Let's get to this company. You sent me this as a company. Who collects this data tracking cars. First of all, I didn't know my car could be tracked, but, anyway and then they want to sell it. [00:04:27] They're trying to sell it, bundle it and sell it to the United States government. Yeah, [00:04:32] Craig Peterson: [00:04:32] they are. Wow. This is pretty concerning here. This is a contractor that has been doing surveillance for a long time for the government. It's told you lyses, which is an interesting main site, but yeah. Wherever we're going to this gym is a whole new direction. [00:04:50] Pardon the pun with our cars. We now have cars that are moderately smart to mention Tesla, but there are more and more coming online. And the idea is to have a web of. Cars, sensors and cars talking to each other. We already have that basic technology existing in NASCAR and in formula racing where the cars actually talk to each other, they know how far apart they are is, and that's something that's really. [00:05:26] That's what we're going to need for the cars on the road today. So I was watching this British show where they're racing around the world. It's like the amazing race, but they mispronounce words. [00:05:43] They were in China and and they were just as shocking to me to see some of these things. I don't know if you've seen the pictures, but there's this one road it's 20 lanes in each direction, coming up to a toll booth. Backed up for miles. The traffic there is crazy. And I lived in Los Angeles for about eight years. [00:06:03] I had a client that I used to go to the largest savings and loan company in the country and their headquarters were, Oh, not even 40 miles from where I lived. Public goes to the 30 miles from where I lived out there in LA. I was actually just over the line in Ventura County for those that know that area out there. [00:06:24] But the problem that I faced was to go that 30 to 40 miles, Jim would take me more than three hours. So I was on the road. For six hours a day. And most of the congestion that we see on the road is caused by people, the sole person in the fast lane and people weaving in and out of traffic. All of the things you've heard over the years. [00:06:52] So what we've been doing is putting sensors in the roadways. You see them a lot. West and they have, if you go on and on ramp, there is a stop light, right before you merge. Have you seen those before? Yes. Yes. So you have to come to a full, to come to a full stop. Yeah, it's crazy. What they're trying to do is when the light goes green, only one car can go through. [00:07:15] These sensors are detecting where the cars are, how fast they're going. So where we're going to is embedded sensors, everywhere communication, sensors on all of our cars, just like they are at the races so that we can now have two to three times more vehicles on the road safely. And at the same time in decrease the amount of time it takes. [00:07:40] [00:07:40]Jim Polito: [00:07:40] No, go ahead, Craig, finish your thought. [00:07:43] Craig Peterson: [00:07:43] I'm looking forward to that sort of a thing, because it's going to be huge, but it brings up the point that you just brought up. Yeah. [00:07:51] Jim Polito: [00:07:51] You weren't talking with Craig Peterson, our tech talk guru. And so Craig. Yeah. I go for all of that. Anything that can make a safer Noah, hold on a second. [00:08:00] I don't want to give up privacy for these things, moving cars along on the highway. Better Mo you know, making traffic flow better. We learn every year, these things, but you're right. It reminds me of the movie demolition man, which is, supposed to be in the future. And they say, okay Where is he? [00:08:19]No, we'll just go two, two, two, two, two. And everybody's chipped, but also every vehicle is chipped and everything else you can find and cameras are all over the city. So you can find anybody just by the press of a button and yeah. I that part, I don't like I don't want I fat because I just think that it's inappropriate for the government to be able to do that. [00:08:42]I don't trust it being in the hands of people, especially after what happened with the old P dossier, the thing that they, the Russian collusion thing, they brought up against Trump, which turned out to be. Absolutely false. You're going to hate anything you want about Trump, but that thing was false. [00:09:00] And yet the FBI ran with it. And when the, when I find out that the FBI, the leadership of the FBI will run with something like that, I don't trust them with the other stuff. [00:09:12] Craig Peterson: [00:09:12] Yeah let's have that issue. So here's what we're looking at right now. You've got this OBD port in your car, every car mandated by Congress. [00:09:22] It's in there now. It's been in there for decades now. And when you go to the car repairs shop, they plug it in and the car said, tells them the technician. Why that check engine light came on. And they are now taking that to the next step, which is they are transmitting it, transmitted that information, that OBD port, that onboard computer knows everything about your car. [00:09:49] It knows if your seatbelts are fashion, but are fastened. It knows. You're the engine. What's the temperature? What are your emissions? How hard are you accelerating? And so let's put all of this in a pot and stirred up a little bit. They are obtaining already this company called Ulysses what's called telematics data. [00:10:10] It's all of this data about the cars already from embedded sensors, from communication sensors that are embedded in the roads. That are reading our license plates as we drive under bridges or pass these little cameras and pull yeah. Pulling it all together. So these cars, a hundred million new cars manufactured worldwide every year are increasingly conscious to the manufacturer and match part of the problem China has with Tesla. [00:10:41] Jim Polito: [00:10:41] Wow. Craig. Here's the thing. There's not going to be any way for you to block this. If you worry about on your. Desktop computer or your laptop computer. If you worry about the camera being on like the cameras they sell now, even have that little thing, you slide over covers up the lens. [00:10:59]You can unplug the microphone. You got, you knew all those things so that you can't be monitored. But you can't do anything with this stuff. If they put it out. [00:11:08]Craig Peterson: [00:11:08] Your Tesla and part of what China is complaining about is you hear you're driving a car around with what is it? Seven cameras on it, including a camera aimed at the driver, and then Tesla calls home every night on why fi. [00:11:22] What state is it transmitting? What does it know? What pictures has it taken, talking about a hat target don't China's concerned. Hey the CIA NSA, FBI, who knows what TLA three letter agency might be tracking this stuff and you know what. They're not [00:11:40] Jim Polito: [00:11:40] wrong. Yeah. I hate I hate to agree with the but the Chinese communists on something like this, but they they are, right there. [00:11:49] They don't want it. They don't want anyone. Taking pictures of things that went well, that basically that's what you have in a totalitarian state. [00:11:58] Craig Peterson: [00:11:58] And I want to twist this to okay. And that is Jim. Okay. Have you noticed that I noticed this when I was young, my parents blamed me in doing things I never did. [00:12:11] What did they did? And the Democrat blame Republicans for things Republicans never did, but they did hence the Russian hoax against president Trump, where they were saying president Trump, collusion, Russians collusion, Russians. What we're looking at now is the Chinese saying we don't want your technology because it's spying on us because that's how you something. [00:12:34] Jim Polito: [00:12:34] Yeah. It really does. I do know that they don't want people freely taking video of anything in their country because they want to control any information about their country. That leaves, God forbid somebody in a Tesla drive by one of the Weger concentration camps where they're committing genocide against that. [00:12:55] Muslim minority. Somebody might pick it up on a Tesla camera and it might end up in the hands of the the public. But you're right. Craig, this was a fascinating segment is usual how to folks get more information from Craig Peterson. [00:13:12]Craig Peterson: [00:13:12] I got to let everybody know next week. I am starting that improving windows security course. [00:13:18] I've been promising for three, four months. It starts on Monday. You'll find out more, but you only find out if you are on my newsletter list. You can get all of the details, but you've got to go to Brent peterson.com. Make sure you sign up to the newsletter letter. You'll get the show notes, including stuff that I send to Jim. [00:13:38] You'll get that every week. You'll find out about the free trainings, about the courses, about everything that I'm doing to try and help people understand where we're at and where we're going. [00:13:52] Jim Polito: [00:13:52] Craig, thank you so much. Always a pleasure. And we'll catch up with you next week or. There's a big tech story maybe before. [00:14:01] Craig Peterson: [00:14:01] Indeed. Thank you, Craig.
Targeted Individual: Since 1994 Implanted tracked and tortured
The Expert witnesses speak out on targeted individuals and torture programs
Gary Richard Arnold, https://www.news-expose.org/, Pedophiles, Avatared Demonically Possessed Polititicians, CLAY and Iron People Overlords, Exoplanetary Transdimensional Evil Rules EARTH, Secret Order of Thule to OSS then CIA NSA and Project Omemga, All World Intel Agencies are Occultic and Evil Globalist Control Freaks,Dr Bill Deagle MD AAEM ACAM A4M, NutriMedical Report Show, www.NutriMedical.com, www.ClayandIRON.com, www.Deagle-Network.com, https://youtu.be/M-i3KT9OvUs, For information regarding your data privacy, visit Acast.com/privacy See acast.com/privacy for privacy and opt-out information.
"We'll know our disinformation program is complete when everything the American public believes is false" - William Casey, CIA Director (1981). For those of you who just can’t grasp how the CIA [& NSA] manipulates our news and everything we are spoon fed by the media, this episode of the Truth Podcast: Question Everything explains in detail just how bad it was and it's even worse now.For further info on what is discussed, visit https://www.truthpodcast.nethttp://www.instagram.com/truthpodcastQEhttp://www.twitter.com/truthpodcastQE
On the 18th anniversary of 9/11, Parallax Views would like to present listeners with this previously unpublished conversation with Ray Nowosielski and John Duffy, authors of The Watchdogs Didn't Bark: The CIA, NSA, and the Crimes of the War on Terror. Despite the cliché that "9/11 changed everything", few have proven willing to dive into the deep history of September 11th and ask the $1 million dollar question: how did this event, that constitutes not only America's worst terrorist attack but also it's greatest intelligence failure, happen? For over ten years, Nowosielski and Duffy thought to answer this question. This led them eventually being granted an interview with Richard A. Clarke, the counterrorism advisor to both President Clinton & President. What Clarke alleged to them was that the CIA, under the directorship of George Tenet, was guilty of "malfeasance and misfeasance" in the lead-up to the September 11th attack. Watchdogs Didn't Bark tells the chilling story of events which culminated in the September 11th terrosist attacks including tensions between the FBI and CIA, the CIA's Alec Station or Bin Laden Unit, and key 9/11 hijackers Khalid al-Mihdhar and Nawaf al-Hazmi. In this conversation you will hear about Bin Laden's arch-nemesis John O'Neill (who died in the WTC on that fateful September day shortly after leaving the FBI), the saga of the Alec Station's Michael Scheuer and "The Unidentified Queen of Torture" Alfreda Bikowsky, and the war on whistleblowers that was kickstarted by the War on Terror. And, by the end of it, you, dear listener, will understand that the watchdogs didn't bark. PLEASE READTHE WATCHDOGS DIDN'T BARK:THE CIA,NSA,ANDTHE CRIMES OF THE WAR ON TERROR SUPPORT PARALLAX VIEWS ON PATREON! WHERE YOU CAN HEAR... PARALLAX VIEWS AFTER HOURS! - THE LATEST FROMPARALLAX VIEWS AFTER HOURS: Matthew AlfordonWhat the Mainstream Media Won't Tell You About Western Foreign Policy
John W Spring, End Game Russia, Rass-Putin Chessmaster, Russian Nukes EMP, Dangers of Iran Strike, Trade NOT War, List of Operations to Remove SAD Div of CIA NSA FBI Agents, Drain the SWAMP, Evil in Our Agencies, Epstein Mossad CIA Blackmailer, Spring to White House with Trump, Need to Pray for Pre-Christian Trump, Wisdom of Samuel Counsel of Dr Bill and CoHosts, Dr Bill Deagle MD AAEM ACAM A4M, NutriMedical Report Show, www.NutriMedical.com, www.ClayandIRON.com, www.Deagle-Network.com,NutriMedical Report Show,Dear Friends,In the following letter to the President, I am also hoping that you will become more aware of some of the diabolical plans that involve Putin at the Kremlin in Moscow. This guy gets around to make sure that his plans to destroy America are being carried out effectively. JWS John W. SpringP.O. Box 18946Anaheim, CA 92817July 15, 2019The PresidentThe White House1600 Pennsylvania Avenue, NWWashington, DC 20500RE: PUTIN HAS ALREADY BEEN TO PUNTA HUETE AND PYONGYANGDear Mr. President:On May 1, 2015, Russian President Vladimir V. Putin visited Punta Huete Airport in Nicaragua where a nearly two-mile long runway had been completed, which was funded by Russia.On May 10, 2019, when Chairman Kim Jong Un began his most recent missile tests, Putin was present although he tried to keep a low profile. Moscow has been the main manufacturer of most rocket engines used by North Korea.If your intelligence agencies are unable to confirm the aforementioned, they are incompetent. And, yes, there is already a missile crisis in Nicaragua and Venezuela caused by Putin.Sincerely,John W. Spring For information regarding your data privacy, visit Acast.com/privacy See acast.com/privacy for privacy and opt-out information.
Time stamped show notes: [00:18] Introduction to Shari Alexander [02:11] What got her into this line of work [04:45] She loves this world of influence because it's about mastering words. [06:19] Things people can do to start being influential. [7:51] Start by asking: what do I need to know? – if you want to be influential [10:35] Create the conversation ahead of time. [13:00] People want to hide behind the screen because it's easier, safer and more leverageable, but people need to spend time when they're selling to talk to people. [17:43] The lower the price, the less commitment the client has. [20:43] Ask: is this a tool or a solution? [20:49] Oftentimes in the entrepreneurial journey you will come across and if you don't know how to use it, it won't work. [23:09] Her ambitions and new projects. [28:42] Tools that can make someone influential [31:55] Influence is communication with a purpose. You have to get comfortable with the idea that you want something from people. [33:34] People should communicate in a thoughtful manner, instead of communicating on autopilot. [36:09] You have to be aware of being overly authentic cannot help you. Think of what is going to serve you best. [38:13] You have to be specific. [39:41] Influential triggers: (1) quid pro quo, (2) higher significance [41:50] The people you can turn into an asset, can be the ones that you give money to, but they will be the least reliable. [42:18] The person that you recruit that can be an asset are the people who do it for the higher significance. [44:05] Framework people can use right now- the influential vibes – five things you can look for in your mark [44:39] Five influential vibes: (1) Values: what are important to them? [45:11] You can't influence someone that you're judging. [45:29] Five influential vibes: (2) Identifiers – what are the labels they put on themselves? [46:17] Five influential vibes: (3) Beliefs – what are the stories they tell about their world? Very linked to values [47:01] Five influential vibes: (4) Emotional triggers – what puts them in a positive or negative space? [47:47] Five influential vibes: (5) Secret goals and desires – what are they aspiring to? What are their higher goals? Three key points: Influence is communication with a purpose. You have to get comfortable with the idea that you want something from people. You have to be aware of being overly authentic cannot help you. Think of what is going to serve you best. VIBES – Values, Identifiers, Beliefs, Emotional triggers, Secret goals and desires. Resources mentioned: Sean Stevenson Last Question: Sign up for the email list. There are different ways to sign up. If you get the emails and you like what you see, reply back and let her know.
http://the-portal.proboards.com/thread/1341/surveillance-wikileaks-trump-mystery-antarct#ixzz4bdcfryqT*** Total Information awareness is still in full force and effect, no question the deep state collected data on Trump in spite of all denials. The CIA/NSA can collect data all over the world, and the kings and rulers are all in this together (Psalm Two), there are no exceptions mentioned. War in the Middle East, we now have about 10,000-11,000 troops on the ground. North Korea escalating their threats - they do have a Satellite that no one knows what they carry (EMP) possibility - military options on the table. The mystery of Antarctica deepens with the Arc of Gabriel coming into the picture - Nazi secrets slowly being vetted as real and valid, and leads to the hollow Earth concept - deep state technology, antigravity, fallen angels posing as aliens, coming in many different forms to fool modern mankind. The STRONG DELUSION is almost complete and more...
Wednesday on the C4 Show C4 spent the first hour of the show talking about "The Day Without Women" Protests. In the second hour C4 was joined for 30 minutes by St. Mary's College Professor Todd Eberly to talk Hogan and Trump. For the next hour C4 then talked about how Wikileaks claims the CIA/NSA are hacking into your electronics to spy on you. CATO's Patrick Eddington also joined C4 to talk about the hacking. Then for the final part of the third hour of the show C4 talked about the Obamacare replacement and how everyone seems to dislike it. In the final hour of the show C4 talked about the brazen attack by teenagers on a man in Downtown Baltimore.
It's almost finally over! Today, I share some final thoughts on the 2016 election and make my closing arguments against Donald Trump. With guests Bill Kristol, editor of The Weekly Standard, Pulitzer-winning New York Times journalist David Cay Johnston, former CIA/NSA director, General Michael Hayden, Stuart Stevens, chief strategist for Mitt Romney’s 2012 campaign, Jonah Goldberg, senior editor at National Review, CNN Global contributor Parag Kanna, Jacob Weisberg, editor-in-chief of Slate Magazine, General Wesley Clark, and former Mexican President Vicente Fox. Please subscribe to Kickass News on iTunes and leave us a review. And support the show by donating at www.gofundme.com/kickassnews. Visit www.kickassnews.com for more fun stuff.
DID HITLER ESCAPE GERMANY?New York Times best-selling author and journalist, Jerome Corsi, discusses shocking new evidence which suggests Adolph Hitler did not commit suicide by gunshot in his underground bunker on April 30, 1945.PART TWO - UFOS: AN ANALYSIS OF THE COVER-UPNoted UFO researcher, Richard Dolan, will discuss the philosophical, scientific, cultural, and political implications of UFOs.PART THREE - TORTURE FROM ABOVEDr. John Hall talks about his work with victims of electronic harassment, stalking, and mind control and how this CIA/NSA technology is being used to track and intimidate people.
DID HITLER ESCAPE GERMANY?New York Times best-selling author and journalist, Jerome Corsi, discusses shocking new evidence which suggests Adolph Hitler did not commit suicide by gunshot in his underground bunker on April 30, 1945.PART TWO - UFOS: AN ANALYSIS OF THE COVER-UPNoted UFO researcher, Richard Dolan, will discuss the philosophical, scientific, cultural, and political implications of UFOs.PART THREE - TORTURE FROM ABOVEDr. John Hall talks about his work with victims of electronic harassment, stalking, and mind control and how this CIA/NSA technology is being used to track and intimidate people.
Ryan Carey - Photography Education and Experience Today’s featured guest is Ryan Carey It often happens during my interview that we fins a common theme to discuss and this interview with Ryan Carey was no different. Ryan reminds us on the important's of education. She opens it up further with experience being a big part of the education. I find with many who stay or self teach photography get to a point where they are prepared to make it a business. This is one of the hardest things to do and many new photographers fail because they were not fully prepared for the business side of things. Assisting other photographers, reaching out to your local photographers for a cup a coffee and picking their brain, attending workshops and seminars, and taking on free jobs in those early stages to lean more about the true practice of running a photography business. Ryan is an Orlando based wedding and lifestyle photographer with her business Earth Muse however she travels around the world working with clients such as Bank of America, Avon, and Tupperware. Ryan has an extensive list of CEO’s and presidents of organizations she has worked with to fill the commercial side of her business. Ryan studied at Daytona State College of Photography and is in her eleventh year working as a professional photographer. She has documented and photographed for national accounts such as Bank of America, Polaris, Swarovski, Jockey, Tupperware, Avon and Pampered Chef. Ryan has shot and worked closely with the CEO’s and Presidents of these organizations, Patrick Duffy of the hit Television show Dallas, Big Bad Voodoo Daddy, General Michael Hayden Former Director of the CIA & NSA, Captain James Lovell of Apollo 13 and the creators of Proactive, to name a few. Ryan travels around the world shooting weddings, corporate and lifestyle photography. She is passionate about her art and enjoys working with and getting to know each one of her clients.
Agradece a este podcast tantas horas de entretenimiento y disfruta de episodios exclusivos como éste. ¡Apóyale en iVoox! Hoy junto a PR-17, Antonio Tomás, Luís Santos y Jesús Pertierra, tratamos el tema del Mundo de las Agencias de Inteligencia, las actuaciones que tuvieron después del 11S, como organizaron sus intervenciones y las disputas entre ellas.Escucha este episodio completo y accede a todo el contenido exclusivo de La Rueda del Misterio. Descubre antes que nadie los nuevos episodios, y participa en la comunidad exclusiva de oyentes en https://go.ivoox.com/sq/4754