Governmental agency belonging to the United States Department of Justice
Photo: The emeritus professor, despite the unusual conduct. 11/12 #CrossfireHurricaneDiary: At CPAC 2020. Publishing "Spygate Exposed" January, 2021. Svetlana Lokhova @TheRealSLokhova. #FriendsofHistoryDebatingSociety .. https://www.bbc.com/news/world-us-canada-44230733 "Stefan A Halper, a 73-year-old professor emeritus at the University of Cambridge, has been identified as an informant who worked with the FBI to gather information on at least three members of the Trump campaign team it suspected could have ties to the Russian government. " Mr Halper's identity had been the subject of a battle between the Justice Department, which oversees the FBI, and Republican members of Congress, who demanded to know more details about the FBI's 2016 counter-intelligence investigation of Russian attempts to influence the US presidential election. . . . Mr Halper is a partner with the Cambridge Security Initiative, a research firm chaired by former British Intelligence head Sir Richard Dearlove, which lists 'UK and US government agencies, management consultants, international accountancy and finance firms' as recent clients."
Photo: US Theatrical Poster. Fair use. "Halper, 75, a Cambridge professor and an FBI informant against Trump's campaign, demanded the claims in the U.S. District Court of Eastern Virginia filed in May by Svetlana Lokhova in a complaint that labels him a 'spy' and [bleep] be dismissed and his accuser be sanctioned by the judge." —Washington Examiner 2/12: #CrossfireHurricaneDiary: Remembering the Stefan Halper origins, August 10-16, 2016. Svetlana Lokhova @TheRealSLokhova. ..
Photo: The Jealous Husband, a genre painting by Cornelius Krieghoff depicting a cuckolded husband. Strzok is married to Melissa Hodgman, an associate director at the U.S. Securities and Exchange Commission. "Don't you hate it when you and your married girlfriend are trying to engineer a coup against the duly elected president of the United States, and your wife busts you and threatens to hire a keyhole peeper and call your mistress's cuckolded husband? "Meet Peter Strzok, the fired crooked FBI agent. And now all his lovey-dovey texts with his galpal are in the public domain, and his squalid, corrupt Deep State life is like an old country song." —Howie Carr, Boston Herald https://www.bostonherald.com/2019/11/21/howie-carr-things-about-to-get-worse-for-fired-fbi-agent-love-struck-strzok/ 1/12: #CrossfireHurricaneDiary: Remembering the Peter Strzok origins, July 31, 2016. Svetlana Lokhova @TheRealSLokhova.
Started this week with a British member of parliament getting stabbed to death in what is described as a terrorist incident. Then it was on to the local violence in Lebanon and how it all came about, the Norway mass bow and arrow killings, Joe Rogan vs. CNN, Iraq national election results, FBI arrests couple trying to pass of submarine secrets, and there has been yet another rectal air compressor death in India. Music: Jane's Addiction/"Stop!"
Nicolle Wallace discusses the January 6th select committee voting to hold Steve Bannon in contempt. Plus, a Democrat running for governor focusing on voting rights, the DOJ asks the Supreme Court to block Texas's abortion law, a panel examining the Supreme Court says its open to term limits, the culture wars in Texas reach new lows, former deputy FBI director Andy McCabe wins back his pension after being fired by Trump years ago, the Transportation Secretary fights off attacks on right-wing media over taking parental leave, and Democratic heavy-hitters are set to campaign for Terry McAuliffe in Virginia.Joined by: Rep. Eric Swalwell, Betsy Woodruff Swan, Robert Costa, Josh Shapiro, Reverend Al Sharpton, Maya Wiley, Brian Fallon, Rep. Sheila Jackson Lee, Charlie Sykes, Ari Berman, Nick Confessore, Carol Leonnig, Secretary Pete Buttigieg, and Mara Gay
How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why? We've got a new study out showing that North American organizations, businesses, and others, are being hit with an average of 497 cyber attacks per week, right here in the good old USA. [Following is an automated transcript] This is a study by checkpoint software technologies. Checkpoint, I used, oh my gosh. It would have been back in the nineties back then. They were one of the very first genuine firewall companies. And it was a system that I was putting in place for my friends over at troopers. I think it was New England telephone. It might've been Verizon by then. I can't even remember, man. [00:00:41] It's been a little while, but it was, a system we were using in front of this massive system that I designed, I made the largest internet property in the world. At that time called big yellow. It morphed into super pages. It might be familiar with. But it was me and my team that did everything. We built the data center out. [00:01:05] We wrote all of the software. Of course they provided all of the yellow pages type listing so we can put it all in. And we brought it up online and we were concerned. Well, first of all, You know, I've been doing cyber security now for over 30 years. And at this point in time, they wanted something a little more than my home grown firewall. [00:01:29] Cause I had designed and written one in order to protect this huge asset that was bringing in tens of millions of dollars a year to the phone company. So they said, Hey, listen, let's go ahead and we'll use checkpoint and get things going. We did, it was on a little, I remember it was a sun workstation. If you remember those back in the. [00:01:52] And it worked pretty well. I learned how to use it and played with it. And that was my first foray into kind of what the rest of the world had started doing, this checkpoint software, but they've continued on, they make some great firewalls and other intrusions type stuff, detection and blocking, you know, already that I am a big fan, at least on the bigger end. [00:02:17] You know, today in this day and age, I would absolutely use. The Cisco stuff and the higher end Cisco stuff that all ties together. It doesn't just have the fire power firewall, but it has everything in behind, because in this day and age, you've got to look at everything that's happening, even if you're a home user. [00:02:37] And this number really gets everybody concerned. Home users and business users is. Businesses are definitely under bigger attacks than home users are. And particularly when we're talking about businesses, particularly the bigger businesses, the ones that have a huge budget that are going to be able to go out and pay up, you know, a million, $10 million ransom. [00:03:05] Those are the ones that they're after and this analysis. Point software who does see some of those attacks coming in, showed some very disturbing changes. First of all, huge increases in the number of cyber attacks and the number of successful ransoms that have been going on. And we're going to talk a little bit later, too, about where some of those attacks are coming from, and the reason behind those attack. [00:03:36] According to them right now, the average number of weekly attacks on organizations globally. So far, this year is 40% higher than the average before March, 2020. And of course that's when the first lockdowns went into effect and people started working from home in the U S the. Increase in the number of attacks on an organizations is even higher at 53%. [00:04:07] Now you might ask yourself why, why would the U S be attacked more? I know you guys are the best and brightest, and I bet it, I don't even need to say this because you can figure this out yourself, but the us is where the money is. And so that's why they're doing it. And we had president Biden come out and say, Hey, don't attack the. [00:04:27] well, some of those sectors are under khaki for more after he said that then before, right. It's like giving a list to a bad guy. Yeah. I'm going to be gone for a month in June and yeah, there won't be anybody there. And the here's the code to my alarm. Right. You're you're just inviting disaster checkpoints. [00:04:49] Also showing that there were more. Average weekly attacks in September 21. That's this September than any time since January, 2020. In fact, they're saying 870 attacks per organization globally per week. The checkpoint counted in September was double the average in March, 2020. It's kind of funny, right? [00:05:14] It's kind of like a before COVID after COVID or before the Wu Han virus and after the Wu Han virus, however, we might want to know. So there are a lot of attacks going on. Volume is pretty high in a lot of different countries. You've heard me say before some of my clients I've seen attack multiple times a second, so let's take a second and define the attack because being scanned. [00:05:40] I kind of an attack, the looking to see, oh, where is there a device? Oh, okay. Here's a device. So there might be a home router. It might be your firewall or your router at the business. And then what it'll do is, okay, I've got an address now I know is responding, which by the way is a reason. The, we always configure these devices to not respond to these types of things. [00:06:04] And then what they'll do is they will try and identify it. So they'll try and go into the control page, which is why you should never have when. Configuration enabled on any of your routers or firewalls, because they're going to come in and identify you just on that because all of a sudden them brag about what version of the software you're running. [00:06:26] And then if it's responding to that, they will try and use a password. That is known to be the default for that device. So in a lot of these devices, the username is admin and the password is admin. So they try it and now off they go, they're running. Some of these guys will even go the next step and we'll replace the software. [00:06:52] In your router or firewall, they will replace it so that it now directs you through them, everything you are doing through them. So they can start to gather information. And that's why you want to make sure that the SSL slash TLS. That encryption is in place on the website. You're going to, so if you go to Craig peterson.com right now, my website, I'm going to go there myself. [00:07:22] So if you go to Craig peterson.com, you're going to notice that first of all, it's going to redirect you to my secure site and it doesn't really matter. You won't see it. Okay. But you are there because if he. Typically at the left side of that URL bar where it says, Craig peterson.com. You'll see, there's a little lock. [00:07:44] So if you click that lock, it says connection is secure. Now there's a lot more we could go into here. But the main idea is even if your data is being routed through China or. Both of which have happened before many tens of thousands, hundreds of thousands of time times. I'm not even sure of the number now. [00:08:06] It's huge. Even if your data is being routed through them, the odds are, they're not going to see anything. That you are doing on the Craig Peterson site. Now, of course you go into my site, you're going to be reading up on some of the cybersecurity stuff you can do. Right. The outages what's happened in the news. [00:08:27] You can do all of that sort of thing on my side, kind of, who cares, right? Um, but really what you care about is the bank, but it's the same thing with the bank. And I knew mine was going to be up there. And when everybody just check it out anyway, so. So the bad guys, then do this scan. They find a web page log in. [00:08:47] They try the default log in. If it works, the Le the least they will do is change. What are called your DNS settings. That's bad because changing your DNS settings now opens you up to another type of attack, which is they can go ahead. And when your browser says, I want to go to bank of america.com. It is in fact, going to go out to the internet, say is bank of America, the bad guys. [00:09:18] Did, and they will give you their bank of America site that looks like bank of America feels like bank of America. And all they're doing is waiting for you to type into your bank of America, username and password, and then they might redirect you to the. But at that point, they've got you. So there are some solutions to that one as well, and Firefox has some good solutions. [00:09:44] There are others out there and you had to have those that are in the works, but this is just an incredible number. So here's what I'm doing, right. I have been working for weeks on trying to figure out how can I help the most people. And obviously I needed to keep the lights on, right? I've got to pay for my food and gas and stuff, but what I'm planning on doing and what we've sketched out. [00:10:10] In fact, just this week, we got kind of our final sketch out of it is we're going to go ahead and have a success path for cyber security. All of the basic steps on that success path will be. Okay. So it will be training that is absolutely 100% free. And I'll do a deeper dive into some of these things that I'm doing that I'm doing right now here on the radio, because you can't see my desktop. [00:10:40] It's hard to do a deep dive and it's open to anybody, right? If you're a home user or if you're a business user, all of the stuff on that free. Is going to help you out dramatically. And then after that, then there'll be some paid stuff like a membership site. And then obviously done for you. If the cybersecurity stuff is just stuff that you don't want to deal with, you don't have the time to deal with. [00:11:05] You don't want to learn, because believe me, this is something that's taken me decades to learn and it's changing almost every day. So I understand if you don't want to learn it to. That is the other option. I'll give you, which is done for you, which we've been doing now for over 20, 30 years. Stick around. [00:11:25] We'll [00:11:25] So which sectors are economy are being hacked? I mentioned that in the last segment, but yeah, there are some problems and the sectors that president Biden lined out laid out are, are the ones that are under, even more attack after his message. [00:11:42] 497 cyber attacks per week. On average here in the US, that is a lot of attacks. And we started explaining what that meant so that we talked about the scan attacks that are automated and some person may get involved at some point, but the automated attacks can be pretty darn automated. Many of them are just trying to figure out who you are. [00:12:09] So, if it shows up, when they do that little scan that you're using a router that was provided by your ISP, that's a big hint that you are just a small guy of some sort, although I'm shocked at how many bigger businesses that should have their own router, a good router, right. A good Cisco router and a really good next generation firewall. [00:12:34] I'm shocked at how many don't have those things in place, but when they do this, That's the first cut. So if you're a little guy, they'll probably just try and reflash your router. In other words, reprogram it and change it so that they can start monitoring what you're doing and maybe grab some information from. [00:12:56] Pretty simple. If you are someone that looks like you're more of a target, so they connect to your router and let's say, it's a great one. Let's say it's a Cisco router firewall or Palo Alto, or one of those other big companies out there that have some really good products. Uh, at that point, they're going to look at it and say, oh, well, okay. [00:13:18] So this might be a good organization, but when they get. To it again, if when access has turned on wide area, access has turned down, that router is likely to say, this is the property of, uh, Covina hospital or whatever it might be, you know? And any access is disallowed authorized access only. Well, now they know. [00:13:42] Who it is. And it's easy enough just to do a reverse lookup on that address. Give me an address anywhere on the internet. And I can tell you pretty much where it is, whose it is and what it's being used for. So if that's what they do say they have these automated systems looking for this stuff it's found. [00:14:02] So now they'll try a few things. One of the first things they try nowadays is what's called an RDP attack. This is a remote attack. Are you using RDP to connect to your business? Right? A lot of people are, especially after the lockdown, this Microsoft. Desktop protocol has some serious bugs that have been known for years. [00:14:25] Surprisingly to me, some 60% of businesses have not applied those patches that have been available for going on two years. So what then button bad guys will do next. They say, oh, is there a remote desktop access? Cause there probably is most smaller businesses particularly use that the big businesses have a little bit more expensive, not really much more expensive, but much better stuff. [00:14:51] You know, like the Cisco AnyConnect or there's a few other good products out there. So they're going to say, oh, well, okay. Let's try and hack in again. Automate. It's automated. No one has to do anything. So it says, okay, let's see if they patch, let's try and break in a ha I can get in and I can get into this particular machine. [00:15:14] Now there's another way that they can get into their moat desktop. And this apparently has been used for some of the bigger hacks you've heard about recently. So the other way they get in is through credential stuff. What that is is Hey, uh, there are right now some 10 billion records out on the dark web of people's names, email addresses, passwords, and other information. [00:15:43] So, what they'll do is they'll say, oh, well this is Covina hospital and it looks it up backwards and it says, okay, so that's Covina hospital.org. I have no idea if there even is a Gavino hospital, by the way, and will come back and say, okay, great. So now let's look at our database of hacked accounts. Oh, okay. [00:16:04] I see this Covina hospital.org email address with a password. So at that point they just try and stuff. Can we get in using that username and password that we stole off of another website. So you see why it's so important to be using something like one password, a password generator, different passwords on every site, different usernames on every site, et cetera, et cetera. [00:16:29] Right. It gets pretty important per te darn quickly. So now that they're in, they're going to start going sideways and we call that east west in the biz. And so they're on a machine. They will see what they can find on that machine. This is where usually a person gets some. And it depends in historically it's been about six days on average that they spend looking around inside your network. [00:17:00] So they look around and they find, oh yeah, great. Here we go. Yep. Uh, we found this, we found that. Oh, and there's these file server mounts. Yeah. These SMB shares the, you know, the Y drive the G drive, whatever you might call it. So they start gaining through those and then they start looking for our other machines on the network that are compromised. [00:17:23] It gets to be really bad, very, very fast. And then they'll often leave behind some form of ransomware and also extortion, where that extort you additionally, for the threat of releasing your data. So there, there are many other ways they're not going to get into them all today, but that's what we're talking about. [00:17:43] Mirman, we're talking about the 500 cyber attacks per week against the average. North American company. So we have seen some industry sectors that are more heavily targeted than others. Education and research saw an 60% increase in attacks. So their education and I've tried to help out some of the schools, but because of the way the budgets work and the lowest bidder and everything else, they, they end up with equipment. [00:18:17] That's just totally misconfigured. It's just shocking to me. Right. They buy them from one of these big box online places. Yeah. I need a, a Cisco 10, 10. And I need some help in configuring it and all, yeah, no problems or we'll help you. And then they sell it to the school, the school installs it, and it is so misconfigured. [00:18:38] It provides zero protection, uh, almost zero, right. It provides almost no protection at all. And doesn't even use the advanced features that they paid for. Right. That's why, again, don't buy from these big box. Guys just don't do it. You need more value than they can possibly provide you with. So schools, 1500 attacks per week research companies, again, 1500 attacks per week, government and military. [00:19:10] Entities about 1100 weekly attacks. Okay. That's the next, most highest attacked. Okay. Uh, health care organizations, 752 attacks per week on average. Or in this case, it's a 55% increase from last year. So it isn't just checkpoints data that I've been quoting here. That, that gives us that picture. There are a lot of others out there IBM's has Verizon's has all of these main guys, and of course in the end, They've got these huge ransoms to deal with. [00:19:50] Hey, in New Hampshire, one of the small towns just got nailed. They had millions of dollars stolen, and that was just through an email trick that they played in. K again. I T people, um, I I've been thinking about maybe I should put together some sort of coaching for them and coaching for the cybersecurity people, even because there's so much more that you need to know, then you might know, anyways, if you're interested in any of this. [00:20:22] Visit me online. Craig peterson.com/subscribe. You will get my weekly newsletter, all of my show notes, and you'll find out about these various trainings and I keep holding. In fact, there's one in most of the newsletters. Craig peterson.com. Craig Peterson, S O n.com. Stick around. [00:20:43] We've been talking about the types of attacks that are coming against us. Most organizations here in north America are seeing 500 cyber attacks a week, some as many as 1500. Now, where are they coming from? [00:21:00] Whether they're scanning attacks, whether they're going deeper into our networks and into our systems who are the bad guys and what are they doing? Microsoft also has a report that they've been generating, looking at what they consider to be the source of the attacks. Now we know a lot of the reasons I'm going to talk about that too, but the source is an interesting way to look at. [00:21:29] Because the source can also help you understand the reason for the attacks. So according to dark reading, this is kind of an insider, a website you're welcome to go to, but it gets pretty darn deep sometimes, but they are showing this stats from Microsoft, which you can find online that in the last year rush. [00:21:53] Has been the source of 58% of the cyber cat tax. Isn't that amazing now it's not just the cyber attacks. I, I need to clarify this. It's the nation state cyber tech. So what's a nature's nation state cyber attack versus I don't know, a regular cyber attack. Well, the bottom line is a nation state cyber attack is an attack that's occurring and is actually coordinated and run by and on behalf of a nation state. [00:22:31] Uh, So Russia at 58% of all nation state attacks is followed by North Korea, 23% Iran, 11% China, 8%. Now you probably would have thought that China would be. Right up there on that list, but Russia has 50% more of the nation state cyber attacks coming from them than from China. And then after China is south Vietnam, Viet, or I should say South Korea, Vietnam, and Turkey, and they all have less than 1%. [00:23:14] Now, this is this new pool of data that Microsoft has been analyzing. And it's part of this year's Microsoft digital defense report, and they're highlighting the trends in the nation state threat cyber activity hybrid workforce security. Disinformation and your internet of things, operational technology and supply chain security. [00:23:35] In other words, the whole gambit before, before all of this, now the data is also showing that the Russian nation state attacks are increasingly effective, calming from about a 21% successful compromise rate last year to 32%. So basically 50% better this year at effectiveness there, Russians are also targeting more government agencies for intelligence gathering. [00:24:10] So that jumped from 3% of their victims last year to 53%. This. And the Russian nation state actors are primarily targeting guests who us, right? The United States, Ukraine and the United Kingdom. Now this is all according to the Microsoft data. So why has Russia been attacking us? Why is China been attacking us and why the change this. [00:24:38] Well, Russia has been attacking us primarily to rent some us it's a cash cow for them just like oil and gas. They are making crazy money. Now that president Biden has made us dependent on foreign oil supplies. It's just insanity and even dependent on. Gas coming from other places. Well guess where the number one source of gases now for Europe and oil it's Russia. [00:25:08] So we are no longer going to be selling to Europe. Russia is so they're going to be making a lot of money off of. But before then they were actually counted on ransomware to help fund the Russian federal government, as well as of course, these Russian oligarchs, these people who are incredibly rich that have a substantial influence on the government. [00:25:33] Don't if you're wondering who they might be, just think of people like, oh, I don't know. Bill gates and, uh, w who are on the, some of the other big guys, you know, Tim cook, uh, Amazon's Jeff bayzos Elon Musk, right? Those are by my definition and looking it up in the dictionary, they are all a. They get exemptions to laws. [00:25:58] They get laws passed that, protect them. In fact, most of regulations actually protect these big companies and hurt small companies. So I would call them oligarchs and that's the same sort of thing in Russia in Russia. Okay. They probably have a little bit more underhanded stuff than these guys here do, but that's what Russia has been. [00:26:21] China has been continually going after our national secrets, national defense, the largest database of DNA of Americans DNA, of course, is that unique key. If you will building block for all of us, that's what DNA is. And the largest database of all of that uniquely identifying information is in. China stole from the office of personnel management records of a federal employees, their secret clearance, all of their background check information who was spoken with, what did they have to say? [00:27:03] And on and on. So China has been interested in infiltrating our businesses that provide things to the military and the military themselves and the federal state, and even the local governments that's who they've been targeting. And that's why there's 8% number might seem small. Although, as I just mentioned this year, Russia moved, moved dramatically. [00:27:30] They used to be about 3% of their attacks or against the government agencies. And now it's 53%. So Russia. And China are going after our national secrets and they can use them in a cold war, which as I've said, I think the first shots of the third world war have been fired. And frankly, they're all cyber, it's all online and Russia. [00:27:57] Isn't the only nation state actor who's changing its approaches here as espionage is the most common goal amongst all nation state groups as of this year. Tivity of hackers reveals different motivations in Iran, which quadrupled its targeting of Israel. Surprise, surprise. Over the last year. And Iran has been launching destructive attacks, things that will destroy power, power plants, et cetera, and North Korea, which is targeting cryptocurrency companies for profit. [00:28:29] So they're stealing these various crypto coins again, funding their government. So it's, it's a problem. Absolute problem. Government sectors are some of the most targeted 48%. These NGOs non-government organizations that act kind of a quasi government functions and think tanks are 31%. Uh, and Microsoft, by the way, has been alerting customers of nation, state attack, attack attempts. [00:29:01] Guess how many this year that they had to warn about 20,500 times in the past three years. So that's a lot and Microsoft is not a company that's been out there at the front lines. It never has been it's in behind. So to have them come out and say, this is. And okay, by the way, your stolen username and password run for a buck per thousand, and it's only gonna take you hundreds of hours to get it all cleared up. [00:29:32] Isn't that nice spear fishing for a hire can cost a hundred to a thousand dollars per successful account takeover and denial of service attacks are cheap from protected sites, roughly $300. Per month. And if you want to be ransomware king, it's only going to cost you 66 bucks upfront 30% of the profit. [00:29:54] Okay. Craziness. Hey, visit me online. Sign up Craig, peter.com/subscribe. [00:30:03] I had an interesting mastermind meeting this week. There's six of us. We're all business owners and it opened my eyes pretty dramatically because one of the members got hacked, but that's not what I really want to emphasize. [00:30:20] This whole cybersecurity thing gets pretty complicated, pretty quickly. And a friend of mine who is in one of my mastermind groups had a real problem. And the here's here's what went on. We'll call him Walt for back of a letter, lack of a better name since that is his name. [00:30:40] And he doesn't mind me sharing this with you. Walt has a very small business that he and his wife run, and they have a couple of contractors that help out with some things, but his business is very reliant on advertising and primarily what he does is Facebook advertising. Now I've been talking for two years, I think in this mastermind group about cyber security and the fact that everyone needs good cyber security. [00:31:13] And he always just kind of pole hum to, uh, wow. You know, and it's just too complicated for me. I got to thinking for a, you know, a bit, really a few weeks, what does he mean to complicated? Cause there's some basic things you can do. So this week on Tuesday, I was on our mastermind groups meeting and I explained, okay, so here's what happened to Walt. [00:31:42] He had $40,000 stolen, which by the way, it's a lot of money for a teeny tiny husband wife company. And. Uh, well, here's what we did. He, we helped them. We got the FBI involved and, you know, with our direct ties, cause we work with them on certain types of cases and he got back every dime, which is just totally unheard of. [00:32:06] But um, without going into all of the details there, I spent a problem. 1520 minutes with the whole group and the mastermind explaining the basics of cyber security. And that really kind of woke me up, frankly, because of their responses. Now these are all small business owners and so they're making pretty decent money. [00:32:31] In fact, every one of them and they all have some contractors and some employees all except for Walt and his wife, they had just have contractors and. I had two completely different responses from two members of this group that no. Let me tell you this was really eye opening for me. And this is why you might've heard me in the first segment talking about this, but this is why I have really changed my view of this stuff, this cybersecurity stuff, because I explained. [00:33:08] If you're using things like Norton antivirus or McAfee, antivirus, or really any of them, even the built-in Microsoft defender this year, those standard antivirus system. I have only been able to catch about 30% of the malware out there, 30%, you know, that's like having a house and you've got a security guard posted out front. [00:33:39] He's armed, he's ready to fight. And yet all of your windows are open and all of your doors are unlocked. And all someone has to do is crawl in the side window because that guy that's posted up front, he's not going to be able to stop. So 30% effectiveness. And of course, Walt had all of the basic stuff. [00:33:59] He thought he was good enough. It's not worth spending time or money doing any of this. And of course it turned out to be well worth the time and money if he had done it. But he has a friend who has contacts and, and made things happen for him. So I guess he's kind of, kind of lucky in that regard, but I explained that and I said, do you know the, the way you. [00:34:21] To go. If you're a small business, it's about $997 a month for a small business, with a handful of employees to get the type of security you really need. There's going to catch. 90 something 98%. Maybe if, if things go well of the stuff going on, in other words, you don't just have an armed guard at the front door. [00:34:46] You've got all the windows closed and blocked and the doors closed and locked as well. So yeah, somebody can still get in, but they got to really want to get in and risk getting caught. So that's kind of the analogy that I used now. One of the members of my. Of my mastermind thought, well, okay. Cause you're just being Frank with me. [00:35:09] Right? We're all friends. She said, well, initially I thought, oh Craig, I'm going to have to have you help out with stuff here. Cause my, you know, I'm concerned about my security. I make some good money. Uh, she's the one that has employee. She has a million dollar plus a year business and she wants to keep it safe. [00:35:26] But then she. Uh, you know, but, but you know, you were talking about all of this Norton and stuff and that it doesn't work. So I, I just, I don't have any hope. And that's when the another member jumped in and this other member said, well, Uh, oh, that's not what I got at all. I got the, the normal off the shelf stuff that you buy that you're going to get from Amazon, or you're going to get from PC connection or wherever that stuff is not going to work, but there is stuff that does, but it's only professional stuff. [00:36:02] You can only get it from professionals that are trained in certified. Which is the right message. Right. That was the message I was trying to relay. Yeah. Don't try and do it yourself because you can't even get the right tools that you need. That is frankly a problem. So that really got me to think. In, in a very big way, because here are two people that have heard me talk about cybersecurity and their eyes probably glazed over, but now their eyes, I know at least one of these ladies definitely glazed over. [00:36:36] So I've come to the realization that sometimes I. A little too deep into things. And although I can explain it quite well to many people, sometimes people glaze over and I get emails from you guys saying kind of the same thing. I really appreciate it. I don't understand a lot of what you're saying, Craig, but thanks for being there. [00:36:59] Listen to you every week here on the radio. Uh, then that's good. That's reassuring, but now I've come to realize a few things. One is. The I've got to be a lot clearer in my messaging, because even when talking to my friends, it is a little bit overwhelming for them sometimes. Right. And then the next thing is everybody needs help because you're being lied to. [00:37:29] Right. How are people getting ransomware? If the stuff that they're buying work. Maybe it's just me, but I think there's a disconnect there. So a lot of you guys have gone out and you've hired people and I want to spend just a few minutes right now, going through some red flags that you need to be looking out for in vendor security assessment. [00:37:56] Now I'm putting one together. As well, right yet another one. Uh, and what I'm trying to do is help you out, right? This is not as sales tool. It is trying to help you figure out where you're at. I'm putting together a webinar that I'm going to be holding these what I'm calling bootcamps, where I go through and show you exactly how to do the basic steps that you need to do in order to be safe on. [00:38:25] Okay. If an online, all that means is your, is plugged in, right. Okay. It doesn't mean you're going out and doing a lot of stuff out there on the internet just means it's connected. So those are going to be coming out. I will send an email out as soon as all of that. Stuff's ready. Cause. Absolutely free. And these assessments, I have the basic one that you can do yourself. [00:38:47] It's a self-assessment. And then I have the more advanced ones that I do that are five grand. Okay. So you've got to be a decent sized business for this to make sense where we look for all of the security problem. On all of your computers and your networks, and then give you a list of things you need to do and how to do them. [00:39:10] Okay. So it's well worth it for them, but if you're a very small company and you're trying to do some of this yourself, I want to help you. So that's what these boot camps are going to be all over. And also what the scorecard is going to be all about. So that's coming up, but here are some good red flags and an assessment. [00:39:30] I found this again on dark reading. This is kind of an insider website for those of us in the cybersecurity business, but, um, How can you verify the information that vendors are giving you about their own cybersecurity posture? We've heard in the news and I've talked about them all year, this year, and for years past. [00:39:56] That are we're vendors can be our worst nightmare because some of these hacks come in through our vendors. So you've got yourself, a cybersecurity company. How do you know if they are really telling you the truth? And man, is that hard for you to know? Right. You're going to ask him questions and the salesmen are going to say, oh yeah, yeah, yeah. [00:40:21] That's why we don't have salesmen. Right. We have engineers. You talk to me, you might talk to my son or my daughter, people who have been doing this with me, who I have trained and helped out. So this guy who wrote the article and there's this on attributed, I don't see an attribution on here on this page. [00:40:41] I definitely want to give him, probably I heard is John Babinec wrote this thing and he is a principle threat hunters. What he calls himself over at net and rich. So he says, here's what you got to do. And if you're trying to be cost-effective, he puts it in. What I call an ed month clause. And one of these days I'll tell you that story, but he calls it a validity check question so that an honest vendor would tell you, no, they don't do X and give you a good reason why they don't like it's not cost effective. [00:41:17] It's outside of a reasonable risk model. Does that make sense to you? So when you're trying to evaluate a vendor, who's going to be doing your cyber security put in one of these validity checks put in one of these questions. It doesn't really matter to you, but it's something that would be very hard for one of these cybersecurity companies to do. [00:41:42] And maybe it doesn't fit the risk model that you have. I think it's just absolutely brilliant. Probably one of the better ways when you're trying to evaluate an MSSP as cybersecurity managed or otherwise provider stick in something like that. So you have a red flag that just stands out for you. All right. [00:42:04] Make sure you are registered online. Craig Peter sohn.com/subscribe. So you can find out about all of these trainings coming up. [00:42:17] If you've never heard of the Carrington event, I really hope, frankly, I really, really do hope we never have to live through one of these. Again, there is a warning out there right now about an internet apocalypse that could happen because of the Sun. [00:42:34] Solar storms are something that happens really kind of all of the time. The sun goes through solar cycles. About every seven years, there are longer cycles as well. You might know. I have an advanced class amateur radio license I've had for a long time, and we rely a lot when we're dealing with short wave on the solar cycle. [00:42:59] You see what happens is that the sun charges, the atmosphere. You see that if you've ever seen the Northern light, that is. Part of the Sunzi missions, hitting our magnetic field and kind of getting sucked into the core of the earth, if you will, as they get caught in that field. And the more charged the atmosphere is, the more bounce you get. [00:43:24] That's what we call it bounce. And the reason us hams have all these different frequencies to use is because of the battle. We can go different frequencies with different distances, I should say, using different frequencies. So think about it right now. You've got the earth and I want to talk from Boston to Chicago. [00:43:47] For instance, I know about how many miles it is, and I have to figure out in the ionosphere up in the higher levels of the atmosphere, what frequency. To use in order to go up into the atmosphere, bounce back, and then hit Chicago. That's the idea. It's not quite as simple or as complex in some ways, as it sounds, a lot of people just try different frequencies and a lot of hams just sit there, waiting for anybody anywhere to talk to, particularly if they are. [00:44:20] It's really quite fun. Now what we're worried about, isn't so much just the regular solar activity. We get worried when the sun spots increase. Now, the solar cycle is what has primary image. On the temperature on earth. So no matter what, you might've heard that isn't your gas, guzzling car or a diesel truck that causes the Earth's temperature to change. [00:44:49] Remember the only constant when it comes to the Earth's temperature has been changed over the millions of years. We had periods where the earth was much warmer than it is now had more common that carbon dioxide in the atmosphere than it does now had less. In fact, right now we are at one of the lowest levels of carbon dioxide in the atmosphere in earth, long, long. [00:45:15] So the sun, if you might remember, comes up in the morning, warms things up, right? And then it cools down. When the sun disappears at nighttime, it has a huge impact. It's almost exclusively the impact for our temperatures. If there's other things too, for instance, eruption can spew all to hold a lot of carbon dioxide. [00:45:40] In fact, just one, just Mount St. Helens wanted erupted, put more carbon dioxide into the atmosphere than man has throughout our entire existence. Just to give you an idea, right? So these alarms that are out there, uh, you know, come on, people. Really, and now we're seeing that in, uh, this last year we had a 30% increase in the ice cap up in the, in, up in the north, up in Northern Canada, around the polls. [00:46:12] Uh, we also had some of these glaciers growing. It was so funny. I saw an article this year, or excuse me, this week that was showing a sign that was at one of our national parks. And it said this glacier will have disappeared by 2020. Of course it hasn't disappeared. In fact, it has grown now and it's past 2020. [00:46:34] Anyhow, the sun has a huge impact on us in so many ways. And one of the ways is. Well, something called a coronal mass ejection. This is seriously charged particles. That tend to be very, very directional. So when, when it happens, when there's one of these CMS coronal, mass ejections, it's not just sending it out all the way around the sun everywhere. [00:47:02] It's really rather concentrated in one. One particular spot. Now we just missed one not too long ago. And let me see if I can find it here. Just mast, a cm E near miss. Here we go. There a solar super storm in July, 2012, and it was a very, very close shave that we had most newspapers didn't mention it, but this could have been. [00:47:33] AB absolutely incredible. We'd be picking up the pieces for the next 50 years. Yeah. Five, zero years from this one particular storm. And what happens is these, these solar flares, if you will, are very, very extreme, they CME. You're talking about x-rays extreme UV, ultraviolet radiation, reaching the earth at the speed of light ionizes, the upper layers of atmosphere. [00:48:02] When that happens, by the way, it hurts our communications, but it can also have these massive effects where it burns out saddle. And then causes radio blackouts, GPS, navigation problems. Think about what happened up in Quebec. So let me just look at this call back, uh, hit with an E and yeah, here we go. And March 13th, 1989. [00:48:33] Here we go. Here's another one. Now I remembered. And this is where Quill back got nailed. I'm looking at a picture here, which is, uh, looking at the United States and Canada from the sky and where the light is. And you can see Quebec is just completely black, but they have this massive electrical blackout and it's becomes. [00:48:57] Of this solar storm. Now they, these storms that I said are quite directional, depending on where it hits and when it hits things can get very, very bad. This particular storm back in 1989 was so strong. We got to see their Rora Borealis, the Northern lights as far south, as Florida and cue. Isn't that something, when we go back further in time to this Carrington event that I mentioned, you could see the Northern lights at the equals. [00:49:35] Absolutely amazing. Now the problem with all of this is we've never really had an internet up online. Like we have today when we had one of the storms hit. And guess what we're about to go into right now, we're going into an area or a time where the sun's going to be more active, certainly on this, this 11 year cycle and possibly another bigger cycle too, that we don't really know much about. [00:50:07] But when this hit us back in the 1850s, what we saw was a, uh, a. Telegraph system that was brought to its knees. Our telegraphs were burned out. Some of the Telegraph buildings were lit. They caught on fire because of the charges coming in, people who were working the telegraphs, who are near them at the time, got electric shocks or worse than that. [00:50:34] Okay. 1859 massive Carrington event compass needles were swinging wildly. The Aurora Borealis was visible in Columbia. It's just amazing. So that was a severe storm. A moderate severity storm was the one that hit in Quebec here, knocked out Quebec, uh, electric. Nine hour blackout on Northeast Canada. What we think would happen if we had another Carrington event, something that happened to 150 years ago is that we would lose power on a massive scale. [00:51:13] So that's one thing that would happen. And these massive transformers that would likely get burned out are only made in China and they're made on demand. Nobody has an inventory. So it would be at least six months before most of the country would get power back. Can you believe that that would be just terrible and we would also lose internet connectivity. [00:51:39] In fact, the thinking that we could lose internet connectivity with something much less than a severe storm, maybe if the Quebec power grid solar, a massive objection here. Maybe if that had happened, when. The internet was up. They might have burned out internet in the area and maybe further. So what we're worried about is if it hits us, we're going to lose power. [00:52:07] We're going to lose transformers on the transmission lines and other places we're going to lose satellites and that's going to affect our GPS communication. We're going to lose radio communication, and even the undersea cables, even though they're now no longer. Regular copper cables. It's now being carried of course, by light in pieces of glass. [00:52:32] The, those cables need to have repeaters about every 15 miles or so under underwater. So the power is provided by. Copper cables or maybe some other sort of power. So these undersea cables, they're only grounded at extensive intervals, like hundreds or thousands of kilometers apart. So there's going to be a lot of vulnerable components. [00:52:59] This is all a major problem. We don't know when the next massive. Solar storm is going to happen. These coronal mass ejections. We do know they do happen from time to time. And we do know it's the luck of the draw and we are starting to enter another solar cycle. So be prepared, everything. Of course, you're listening to Craig Peterson, cybersecurity strategist. [00:53:28] If you'd like to find out more and what you can do, just visit Craig peterson.com and subscribe to my weekly show notes. [00:53:39] Google's got a new admission and Forbes magazine has an article by Zach Dorfman about it. And he's saying you should delete Google Chrome now after Google's newest tracking admission. So here we go. [00:53:55] Google's web browser. Right? It's been the thing for people to use Google Chrome for many years, it's been the fastest. Yeah, not always people kind of leapfrog it every once in a while, but it has become quite a standard. Initially Microsoft is trying to be the standard with their terrible browser and yeah, I to Exploder, which was really, really bad and they have finally completely and totally shot it in the head. [00:54:29] Good move there on their part. In fact, they even got rid of their own browser, Microsoft edge. They shot that one in. They had to, I know I can hear you right now saying, oh, Craig, I don't know. I just use edge browser earlier today. Yeah. But guess what? It isn't edge browser. It's actually Google Chrome. The Microsoft has rebranded. [00:54:52] You see the guts to Google Chrome are available as what's called an open source project. It's called chromium. And that allows you to take it and then build whatever you want on top of. No, that's really great. And by the way, Apple's web kit, Kat is another thing that many people build browsers on top of and is part of many of these browsers we're talking about right now, the biggest problem with the Google Chrome. [00:55:22] Is they released it so they could track you, how does Google make its money? Well, it makes us money through selling advertising primarily. And how does it sell advertising if it doesn't know much or anything about you? So they came out with the Google Chrome browser is kind of a standard browser, which is a great. [00:55:43] Because Microsoft, of course, is very well known for not bothering to follow standards and say what they have is the actual standard and ignoring everybody else. Yeah. Yeah. I'm picking on Microsoft. They definitely deserve it. Well, there is what is being called here in Forbes magazine, a shocking new tracking admission from. [00:56:05] One that has not yet made headlines. And there are about what 2.6 billion users of Google's Chrome worldwide. And this is probably going to surprise you and it's frankly, Pretty nasty and it's, I think a genuine reason to stop using it. Now, as you probably know, I have stopped using Chrome almost entirely. [00:56:31] I use it when I have to train people on Chrome. I use it when I'm testing software. There's a number of times I use it, but I don't use. The reality is the Chrome is an absolute terror. When it comes to privacy and security, it has fallen way behind its rivals in doing that. If you have an iPhone or an iPad or a Mac, and you're using safari, apple has gone a long ways to help secure your. [00:57:09] Well, that's not true with Chrome. In fact, it's not protecting you from tracking and Dave up data harvesting. And what Google has done is they've said, okay, well, we're going to get these nasty third party cookies out of the whole equation. We're not going to do that anymore. And what they were planning on doing is instead of knowing everything specifically. [00:57:34] You they'd be able to put you in a bucket. So they'd say, okay, well you are a 40 year old female and you are like driving fast cars and you have some kids with a grandkid on the way, and you like dogs, not cats, right? So that's a bucket of people that may be a few hundred or maybe up to a thousand. As opposed to right now where they can tell everything about you. [00:58:04] And so they were selling that as a real advantage because they're not tracking you individually anymore. No, we're putting you in a bucket. Well, it's the same thing. Right. And in fact, it's easier for Google to put you in a bucket then to track everything about you and try and make assumptions. And it's easier for people who are trying to buy ads to place in front of you. [00:58:28] It's easier for them to not have to kind of reverse engineer all of the data the Google has gathered in instead of. To send this ad to people that are in this bucket and then that bucket. Okay. It makes sense to you, but I, as it turns out here, Google has even postponed of that. All right. They really have, they're the Google's kind of hiding. [00:58:54] It's really what's going on out there. Uh, they are trying to figure out what they should do, why they should do it, how they should do it, but it's, it's going to be a problem. This is a bad habit. The Google has to break and just like any, anybody that's been addicted to something it's going to take a long time. [00:59:16] They're going to go through some serious jitters. So Firefox is one of the alternatives and to Google Chrome. And it's actually a very good one. It is a browser that I use. I don't agree with some of the stuff that Mozilla and Firefox does, but again, right. Nobody agrees on everything. Here's a quote from them. [00:59:38] Ubiquitous surveillance harms individually. And society Chrome is the only major browser that does not offer meaningful protection against cross cross site tracking and Chrome will continue to leave users unprotected. And then it goes on here because. Uh, Google response to that. And they admit that this massive web tracking out of hand and it's resulted in, this is a quote from Google and erosion of trust, where 72% of people feel that almost all of what they do online is being. [01:00:19] By advertisers, technology firms or others, 81% say the potential risks from data collection outweigh the benefit by the way, the people are wrong. 72% that feel almost all of what they do on online is being tracked. No, no. The answer is 100% of what you do is probably being tracked in some way online. [01:00:41] Even these VPN servers and systems that say that they don't do log. Do track you take a look at proton mail just last week. Proton mail it's in Switzerland. Their servers are in Switzerland. A whole claim to fame is, Hey, it's all encrypted. We keep it safe. We don't do logging. We don't do tracking, uh, guess what they handed over the IP addresses of some of the users to a foreign government. [01:01:10] So how can you do that? If you're not logging, if you're not tracking. Yeah, right. They are. And the same thing is true for every paid VPN service I can think of. Right. So how can Google openly admit that their tracking is in place tracking everything they can, and also admit that it's undermining our privacy and. [01:01:38] Their flagship browser is totally into it. Right? Well, it's really, it's gotta be the money. And Google does not have a plan B this anonymized tracking thing that they've been talking about, you know, the buckets that I mentioned, isn't realistic, frankly. Uh, Google's privacy sandbox is supposed to Fitbit fix it. [01:02:00] I should say. The, the whole idea and the way it's being implemented and the way they've talked about it, the advertisers on happy. So Google's not happy. The users are unhappy. So there you go. That's the bottom line here from the Forbes article by Zach Dorfman, delete Google Chrome. And I said that for a long time, I do use some others. [01:02:27] I do use Firefox and I use. Which is a fast web browser, that some pretty good shape. Hey, if you sign up for my show's weekly newsletter, not only will you get all of my weekly tips that I send to the radio hosts, but you will get some of my special reports that go into detail on things like which browser you shouldn't be using. [01:02:52] Sign up right now. Craig peterson.com. [01:02:57] Many businesses have gone to the cloud, but the cloud is just another word for someone else's computer. And many of the benefits of the cloud just haven't materialized. A lot of businesses have pulled back and are building data centers again. [01:03:14] The reason I mentioned this thing about Microsoft again, and the cloud is Microsoft has a cloud offering. [01:03:23] It's called Microsoft Azure. Many people, many businesses use it. We have used it with some of our clients in the past. Now we have some special software that sits in front of it that helps to secure. And we do the same thing for Amazon web services. I think it's important to do that. And we also use IBM's cloud services, but Microsoft is been pitching for a long time. [01:03:51] Come use our cloud services and we're expecting here probably within the next month, a big announcement from Microsoft. They're planning on making it so that you can have your desktop reside in Microsoft's cloud, in the Azure cloud. And they're selling really the feature of it doesn't matter where you are. [01:04:17] You have your desktop and it doesn't matter what kind of computer you're on. As long as you can connect to your desktop, using some just reasonable software, you will be able to be just like you're in front of a computer. So if you have a Chromebook or a Mac, Or a windows or tablet, whatever, and you're at the grocery store or the coffee shop or the office, you'll be able to get it, everything, all of your programs, all your files. [01:04:47] And we, Microsoft will keep the operating system up to date for you automatically a lot of great selling points. And we're actually looking into that. Not too heavily yet. We'll give them a year before we really delve into it at all. Cause it takes them a while to get things right. And Microsoft has always been one that adds all kinds of features, but most of the time, most of them don't work and we can, we can document that pretty easily, even in things like Microsoft. [01:05:18] Well, the verge is now reporting that Microsoft has warned users of its as your cloud computing service, that their data has been exposed online for the last two years. Yeah, let me repeat that in case you missed it, you, uh, yeah. I'm I'm I might've misspoken. Right. Uh, let me see, what does it say? It says, um, users of Azure cloud competing service. [01:05:48] So that's their cloud. Microsoft's big cloud. Okay. Um, their data has been. Exposed online. Okay. So that means that people could get the data, maybe manipulate the data that sort of exposed means for the last two years. Are you kidding me? Microsoft is again, the verge. Microsoft recently revealed that an error in its Azure cosmos database product left more than 3,300 as your customers data. [01:06:24] Completely exposed. Okay guys. So this, this, this is not a big thing, right? It can't possibly be big thing because you know who uses Azure, right. Nobody uses a zer and nobody uses hosted databases. Come on, give me a break. Let me see, what else does this have to say? Oh, okay. It says that the vulnerability was reported, reportedly introduced into Microsoft systems in 2019, when the company added a data visualization feature called Jupiter notebook to cosmos DB. [01:06:59] Okay. Well, I'm actually familiar with that one and let's see what small companies let's see here. Um, some Azure cosmos DB clients include Coca Cola. Liberty mutual insurance, Exxon mobile Walgreens. Hmm. Let me see. Could any of these people like maybe, maybe Liberty mutual insurance and Walgreens, maybe they'd have information about us, right. [01:07:26] About our health and social security numbers and account numbers and credit cards. Names addresses. Right, right. That's again, why I got so upset when these places absolutely insist on taking my social security number, right? It, it, first of all, when it was put in place, the federal government guaranteed, it would never be used for anything other than social security. [01:07:53] And the law even said it could not be used for anything other than social security. And then the government started expanding it. Right. And the IRS started using it. To track all of our income and you know, that's one thing right there, the government computers, they gotta be secure. Right. All of these breaches we hear about that. [01:08:12] Can't be true. Uh, so how about when the insurance company wants your personal information? Like your social security number? What business is it of? There's really no. Why do they have to have my social security number? It's a social security number. It's not some number that's tattooed on my forehead. [01:08:36] That's being used to track me. Is it this isn't a socialist country like China is, or the Soviet union was right. It's not socially. So why are they tracking us like that? Walgreens? Why do they need some of that information? Why does the doctor that you go to that made the prescription for Walgreens? Why do they need that information? [01:09:00] And I've been all over this because they don't. Really need it. They want, it makes their life easier, but they don't really need it. However, it exposes us. Now, if you missed the email, I sent out a week ago, two weeks ago now, I guess. You missed something big because I, in my weekly newsletter went through and described exactly what you could do in order to keep your information private. [01:09:35] So in those cases where websites asking for information that they don't really need, right? You don't want to lie, but if they don't really need your real name, why you're giving them your real name? Why do you use a single email address? Why don't you have multiple addresses? Does that start make sense to you guys? [01:09:54] And now we find out that Microsoft Azure, their cloud services, where they're selling cloud services, including a database that can be used online, a big database, uh, 3,300 customers looks like some of them are actually kind of big. I don't know. ExxonMobil pretty big. Yeah. I think so. Walgreens, you think that that might be yeah, yeah, yeah, yeah. [01:10:22] Y. Why are we trusting these companies? You know it, if you have a lot of data, a lot of customers, you are going to be a major target of nation states to hack you and bat just general hackers, bad guys. But you're also, if, if you've got all this information, you've also got to have a much higher level of security than somebody that doesn't have all of that information. [01:10:52] Does that make sense too? Did I say that right? You don't need the information and, and I've got to warn anybody that's in a business, whether you're a business owner or you're an employee, do not keep more data than you need the new absolutely need to run your company. And that includes data about your customers. [01:11:16] And maybe, maybe it's even more specifically data about your customer. Because what can happen is that data can be stolen and we just found. That? Yes, indeed. It could have been, it was exposed Microsoft the same. We don't know how much it was stolen. If anything was stolen. Um, yeah, Walgreens. Hey, I wonder if anyone's going to try and get some pain pills illegally through, uh, this database hack or a vulnerability anyways. [01:11:47] All right, everyone. Stick around. We'll be back. Of course, you listening to Craig Peterson. I am a cybersecurity strategist for business, and I'm here to help you as well. You can ask any question any time, uh, consumers are the people I help the most, you know, I wish I got a dime for every time I answered a question. [01:12:09] Just email email@example.com firstname.lastname@example.org and stick around. [01:12:18] Whether or not, you agree with the lockdown orders that were put in place over this COVID pandemic that we had. Uh, there are some other parts of the world that are doing a lot more. [01:12:34] Australia has, I don't know. I think that they went over the deep end. The much, the same thing is true right next door to them. [01:12:45] And I am looking at a report of what they are doing with this new app. Uh, you might be aware that both apple and Google came out with an application programming interface. That could be used for contract tack tracking, contact tracking. There you go. Uh, it wasn't terribly successful. Some states put some things in place. [01:13:13] Of course you get countries like China. I love the idea because heaven forbid you get people getting together to talk about a Tannen square remembrance. Now you want to know who all of those people were, who were in close proximity, right? So, you know, good for China a while, as it turns out, Australia is putting something in place they have yet another COVID lockdown. [01:13:39] They have COVID quarantine orders. Now I think if you are sick, you should stay on. I've always felt that I, you know, I had 50 employees at one point and I would say, Hey, if you're sick, just stay home. Never required a doctor's note or any of that other silliness, come on. People. If someone's sick, they're sick and let them stay home. [01:14:04] You don't want to get everybody else in the office, sick and spread things around. Right. Doesn't that just kind of make sense. Well, they now in Australia, don't trust people to stay home, to get moving. Remember China, they were, they were taking welders and we're going into apartments in anybody that tested positive. [01:14:22] They were welding them into their apartment for minimum of two weeks. And so hopefully they had food in there and they had a way to get fresh water. Australia is not going quite that far, but some of the states down under. Using facial recognition and geolocation in order to enforce quarantine orders and Canada. [01:14:47] One of the things they've been doing for very long time is if you come into the country from out of the country, even if you're a Canadian citizen, you have to quarantine and they'll send people by your house or you have to pay to stay for 10 days in a quarantine hope. So you're paying the course now inflated prices for the hotel, because they're a special quarantine hotel. [01:15:14] You have to pay inflated prices to have food delivered outside your door. And that you're stuck there for the 10 days, or if you're at home though, they, you know, you're stuck there and they'll send people by to check up on you. They'll make phone calls to check up on you and. They have pretty hefty find. [01:15:36] Well, what Australia has decided to do is in Australia is Charlene's even going from one state to another state are required to prove that they're obeying a 14 day quarantine. And what they have to do is have this little app on their phone and they, the app will ping them saying, prove it. And then they have to take a photo of themselves with geo location tag on it and send it up via the app to prove their location. [01:16:15] And they have to do all of that within 15 minutes of getting the notification. Now the premier of the state of south Australia, Steven Marshall said we don't tell them how often or when on a random basis, they have to reply within 15 minutes. And if you don't then a police, officer's going to show up at the address you're supposed to be at to conduct an in-person check. [01:16:43] Very very intrusive. Okay. Here's another one. This is a, an unnamed government spokesperson who was apparently speaking with Fox news quote. The home quarantine app is for a selected cohort of returning self Australians who have applied to be part of a trial. If successful, it will help safely ease the burden of travel restrictions associated with the pandemic. [01:17:10] So there you go. People nothing to worry about. It's just a trial. Uh, it will go away. Uh, just like, uh, for instance, income tax, as soon as rule, number one is over, it will be removed and it will never be more than 3% and it will only apply to the top 1% of wage-earners. So there you go. Right. And we all know that world war one isn't over yet. [01:17:34] Right. So that's why they still have it in somehow. Yeah, some of the middle class pays the most income tax. I don't know. Interesting. Interesting. So there you go. Little news from down under, we'll see if that ends up happening up here. News from China, China has, uh, China and Russia have some interesting things going on. [01:17:55] First of all, Russia is no longer saw. Country, they kind of are. They kind of aren't, they are a lot freer in many ways than we are here in the United States. Of course, China, very heavily socialist. In fact, they're so socialists, they are communist and China. And Russia both want their kids to have a very good education in science, engineering, and mathematics. [01:18:23] Not so much on history, not so much on, on politics. Right. But definitely heavy on the, on the sciences, which I can see that makes all the sense. I think everybody should be pretty heavily on the science. Well, according to the wall street journal this week, gamers under the age of 18 will not be allowed to play online games between 8:00 PM and 9:00 PM on Friday, Saturdays and Sundays. [01:1
MVC&R are not fans of vaccine mandates, and neither are many Chicago police officers. The Transportation Secretary is taking time off during a literal transportation crisis, and former President Obama's defense secretary is blasting President Biden over Afghanistan. Former President Bill Clinton is hospitalized in California with non-COVID symptoms, and Queen Elizabeth has been advised to drop her daily cocktail. NBC News lies about Texas teachers having to offer pro-Holocaust material, and nurses sue a hospital for “blanket denial” of religious vaccine exemptions. A member of the UK Parliament is stabbed and killed while meeting with constituents, and an FBI negotiator has tips for talking to your unvaccinated family members. Ryan Fujitani from Rotten Tomatoes has the latest in spooky cinema, and an especially sweet Friday Five -- Best Sweet Songs.
Host Reed Galen is joined by Peter Strzok, former Deputy Assistant Director of the Counterintelligence Division of the FBI and author of the book, Compromised: Counterintelligence and the Threat of Donald J. Trump. They discuss the past, present, and future of Donald Trump and also the continuing threats of the January 6th insurrection (both present and future threats). Be sure to pick up Compromised at your favorite book retailer.
TV watchers, this time we're talking about the third episode of Ozark (no 's') season 1, "My Dripping Sleep"! Beware: Charlotte's got a mean right hook, and she's going to use it, even if it means not getting that job at the Blouse Barn. FBI agent #2 offers what seems like a good deal to Marty and Wendy who can really come together as a united front when they have to. Poor Jonah is watching the vultures, Wendy throws a dead animal carcass at Wyatt, Ruth points out to her uncles that two female bobcats are a bad business deal, and Marty starts getting personal messages from Sarah McLachlan through the TV. Plus, what is dripping sleep anyway? [TV is Awesome Season 2: Episode 5]
From the atrocity in Loden County, to why most Republicans wont stand up for their constituents, and why republicans don't stand together like democrat's do. And is it time to disband our nations top intelligent agencies?
You're done, get out… and more on today's CrossPolitic Daily Newsbrief. I'm Toby Sumpter and today is October 15, 2021. Do you love the CrossPolitic Daily News Brief? Do you wake up in the morning wondering what Gabe might mispronounce today? Does the sound of Chocolate Knox crumpling up paper just put a little skip in your step, a little extra warmth in your heart? Would you consider becoming a Fight Laugh Feast Club Member? Go to FLF Network dot com and click “join the club.” We are committed to continuing to bring the sword of God's word to everything on this planet. This is what we mean by rowdy Christians. God's word cuts all our folly, slices through all our pride, and confronts all our sin. This is considered very rude and unseemly to all the fleshly elites. And we are not sorry at all. In fact, we plan to do it more. So if you want to help us make the ungodly squirm, become a club member today. Go to FLF Network dot com and click on “join the club.” And we promise not to stop. Dem. Governor Candidate Says He Will Never Allow School Choice in Virginia Play Audio Terry McAuliffe has four kids going to 30K per student tuition private school and opposes the use of vouchers to send poorer kids to private schools. But it's actually not just that. He opposes allowing parents to keep their own money to pay for the education that they believe is best for their own kids. He supports taking money from hard working families whether or not they want to pay for government schools. Why would anyone want to get their kids out of government schools? Loudoun County School Board Meeting Erupt in Chaos Back in June https://www.dailymail.co.uk/news/article-10083783/Loudoun-County-father-arrested-school-meeting-says-daughter-raped-boy-girls-bathroom.html#v-4656337064846966859 Play Audio: 0:21-0:31 That's the video/audio of the school board meeting back in June where Scot Smith was arrested for exploding at the school board. What was the board discussing that day? Transgender policies. What was the frustrated 48-year old father trying to say? He was trying to tell the room that his daughter had been raped by a boy at school in the girls' bathroom. In an interview with The Daily Wire that was published on Monday, he explained that he was trying to stick up for his daughter, who was attacked at Stone Bridge High School in a girl's restroom on May 28 by a boy 'wearing a skirt.' Smith says the boy took advantage of the school's trans policies to get into the girls' bathrooms and assault her. On the day of the incident, Smith says the school told him to come to the campus because his daughter had been physically assaulted. They did not say she had been sexually assaulted. Once he got there, he says school staff told him they would handle it internally, choosing not to call the police for an as-yet unexplained reason. He was enraged by the decision and challenged them on it. The school board then did call the police but to report Smith, not the boy, for making a scene. The school's principal sent out an alert that day warning parents of what had happened involving Smith, but it said nothing of the sexual assault allegations in the bathroom. Smith and his daughter ultimately ended up at the hospital where a rape kit was performed that verified his daughter's claim. They took it to the police and a case was then opened. Meanwhile, it would be two months before the boy was arrested, a month after the crazy school board meeting. So the boy in a skirt who had assaulted his daughter in a ladies' room was still at large, when at the meeting on June 22 the board took up discussion of their trans policy. During the meeting, Loudoun County School Superintendent Scott Ziegler said the school had never had any form of incident inside a bathroom or locker room involving a transgender child. 'To my knowledge, we don't have any record of assaults occurring in our restrooms,' he said. He went on to quote Time magazine research that he said disproved the notion transgender kids might sexually attack cisgender kids, and said: 'I think it's important to keep our perspective on this, we've heard it several times tonight from our public speakers but the predator transgender student or person simply does not exist.' And it was this claim that caused Smith to became irate. He started arguing with another woman at the meeting, and called her names after she allegedly denied his daughter's claim. He was then charged with disorderly conduct and resisting arrest. The boy was finally arrested a month after that, but here's the crazy part: earlier this month in October, the same boy was arrested again on different charges for allegedly assaulting a different girl, at a different school. He is now in a juvenile detention center. The Smiths were understably stunned when the same boy was arrested again on October 6, at a different school in the same district. On this occasion, he was charged with 'with sexual battery and abduction', allegedly holding a different girl in a classroom to attack her in Broad Run High School - 2.5miles from the high school where Smith's daughter was assaulted. The Loudoun County Sheriff's Office did confirm the October 6 incident, saying in a press release on October 7: 'A teenager from Ashburn has been charged with sexual battery and abduction of a fellow student at Broad Run High School. All of this comes on the heels of the Biden Justice Department announcement last week that the FBI would now investigate and prosecute any parent who it deems to be 'threatening' towards school staff. The order from Attorney General Merrick Garland was in response to a request from the National School Board Association to President Biden, asking him to protect them from angry parents. All of this reminds me of the day that James Coates was arrested in Alberta, Canada for holding church services against COVID regulations. On the very same day, a sexual predator was released into the community from the same jail where Coates was admitted. Not only was the sexual predator released but law enforcement officials released the criminal with a community warning advising that he was considered likely to recommit crimes. This is what happens when you abandon God's word. When you have no anchor, no foundation, everything is tossed by the wind and waves. You have the storm of liberals, the storm of conservatives, rage, hate, shame, and chaos. And there will only be more if we do not turn back to Christ and His word. And the first thing you ought to do is get your kids out of those schools. It is worth the sacrifice. It is worth working longer hours. Guitar AD Have you always wanted to play guitar but didn't know where to start? Learning to play the guitar can be a lonely, confusing and expensive experience. But it doesn't have to be that way. Fight Laugh Feast member David Harsh has created a unique, online monthly membership, that has community, a clear success path, and it's super affordable. David has spent decades of touring, leading worship, and teaching guitar. He's helped thousands of guitar players discover their potential. You may have heard us talk about GuitarSuccess4U. Here's an update. Several of our listeners have joined this membership, and they are having a blast! Maybe it's time for you to hop on board! When you join this membership, you can learn at your own pace, from home, alongside a community of guitarists including worship leaders, hobbyists, retirees, stay-at-home moms and more. Through video lessons, worksheets, and weekly Zoom calls, David will take you step-by-step towards becoming the musician you were made to be. GuitarSuccess4U is only $29 a month – that's less than a dollar a day, and a fraction of the cost of guitar lessons. Learn more and join now at GuitarSuccess4U.com. That's “Guitar Success,” the number “4” and the letter “U,” dot com. Join today and get 5 instant bonuses to help accelerate your progress! Head on over to GuitarSuccess4U.com to start your guitar journey. That's Guitar Success, the number “4” and the letter “U,” dot com. George Clooney Supports Mandatory Vaccines Play Audio: 0:00-1:28 They screwed up the polio vaccine and a bunch of kids died, but hey, we'll get this one figured out, and in the meantime, mandate, mandate, mandate. Yeah, I don't think so, Mr. Clooney. Psalm of the Day: Africa “Now Shall My Inward Joys Arise” Can a kind woman e'er forget The infant of her womb? Among a thousand tender thoughts Her suckling have no room? Yet saith the Lord should nature change And mothers monsters prove Zion still dwells upon the heart Of everlasting love. Deep on the palms of both of my hands I have engraved her name My hands shall raise her ruined walls And build her broken frame. God loves His church more than the fiercest mother's love, and if in our day, so many mother's have become monsters, how much more does God's love burn for Zion. The Church is engraved on both of His hands, and He will raise her ruined walls. 1:33-3:06 Remember you can always find the links to our news stories and these psalms at crosspolitic dot com – just click on the daily news brief and follow the links. This is Toby Sumpter with Crosspolitic News. A reminder: if you see news stories and links that you think we should cover on the daily news brief, please send them to news @ crosspolitic.com and don't forget to check deft wire dot com where we are constantly posting all our stories. Support Rowdy Christian media, and share this show or become a Fight Laugh Feast Club Member. You always get a free Fight Laugh Feast t-shirt with a membership and remember if you didn't make it to the Fight Laugh Feast Conferences, club members have access to all the talks from Douglas Wilson, Joe Boot, Jeff Durbin, Glenn Sunshine, Nate Wilson, David Bahnsen, Voddie Baucham, and many more. Join today and have a great day.
FBI to prosecute people threatening teachers and school board members | North Carolina poultry CAFOs produce outrageous amounts of chicken shit | Biden and Democrats legislative majorities may depend on factory towns | Donald Trump continues to assert dominance over Republican Party | Chicago Mayor Lori Lightfoot tells anti-vax FOP head to bring it on | Huge new solar array to power new Pueblo, CO steel mill | Missouri Gov Mike Parson is absolutely clueless
FreedomToons, Rittenhouse Update, DOJ's Dirty List, Forcing Religion. FreedomToons- Forcing Religion. Use-Of-Force Expert Testifies Kyle Rittenhouse Acted Reasonably. Who's on the DOJ's Dirty List? Coverup: A Boy in a Dress Rapes Student in School Bathroom. Freedom Toons Forcing Religion. https://youtu.be/1mlYSoMq7HM 297,570 views FreedomToons 705K subscribers guys STOP FORCING UR BELIEFS ONTO ME :((( ! http://patreon.com/freedomtoons Use-Of-Force Expert Testifies Kyle Rittenhouse Acted Reasonably | Prosecution Has Another Bad Day 53,779 views Oct 9, 2021 Matt Christiansen 243K subscribers Support my channel: On my website: http://www.mattchristiansenmedia.com/... Or SubscribeStar: https://www.subscribestar.com/matt-ch... Merch shop: https://www.mattchristiansenmedia.com... Deals on cool stuff from listener-owned businesses: http://www.mattchristiansenmedia.com/... Contact/social media: Email: email@example.com Website: http://www.mattchristiansenmedia.com Twitter: http://www.twitter.com/MLChristiansen Minds: http://www.minds.com/MLChristiansen Gab: http://www.gab.ai/MLChristiansen Parler: https://parler.com/#/user/MLChristiansen Alternative video platforms: BitChute: http://www.bitchute.com/mlchristiansen Rumble: https://rumble.com/c/MLChristiansen Odysee: https://odysee.com/@MLChristiansen lbry.tv: https://lbry.tv/@MLChristiansen Utreon: https://utreon.com/c/mattchristiansen/ Live streams: YouTube: http://www.youtube.com/skagg3/live Rumble: https://rumble.com/c/MLChristiansen Dlive.tv: http://www.dlive.tv/mlchristiansen My podcast on demand: http://bit.ly/1TUcepj Apple Podcasts: http://apple.co/23YM9rM Google Podcasts: https://bit.ly/3pHoVIv Spotify: https://spoti.fi/2WjdqLl Stitcher: http://bit.ly/1TlubhE Podbean: https://bit.ly/39qjTvf Music by Chris Gard, Morbicae Official: https://bit.ly/2GrOAnv 'This Is Your Name' outro song: https://bit.ly/37CqGQi Susan Wicky Wicky outro song: https://youtu.be/ESkfJe44W-E Items referenced: In Tense Hearing, Kyle Rittenhouse Defense Convinces Judge to Throw Out Significant Portions of the Government's Case: https://bit.ly/3lGuZB3 Kyle Rittenhouse Motions Hearing 10/5/2021 Part 1: https://youtu.be/wHnoeaQU5o8 Force expert: Rittenhouse decisions to shoot were reasonable: https://bit.ly/3lnlU14 Wisconsin self-defense law: https://bit.ly/3mCpbsU Kyle Rittenhouse Motions Hearing 10/5/2021 Part 2: https://youtu.be/v2SoPzBdElI Hunting laws allowed Kyle Rittenhouse to carry weapon during fatal shootings in Wisconsin, lawyers say: https://nbcnews.to/3oKOtYC Blue check hot takes: https://bit.ly/3iJRi89 https://bit.ly/3FqqaF4 https://bit.ly/3oLw7q3 Kyle Rittenhouse was justified in shooting victims, expert claims in court: https://bit.ly/3Ft70OK Victims of Kenosha protest shooting tried to disarm Kyle Rittenhouse: Reports: https://7ny.tv/2Yzg4B2 Who's on the DOJ's Dirty List? https://youtu.be/tzca6bgXU0c LevinTV The DOJ just made a startling announcement: the FBI is partnering with local law enforcement to potentially target parents who attend school board meetings. Think about it: simply by speaking out at a school board meeting, the board members might deem you a threat and report you for prosecution. Who wants to be on the DOJ's naughty list? Now, Mark raises a big red flag warning about our own government shutting down freedom of speech and restricting your ability to protect your own children. Click here to subscribe to LevinTV on YouTube: https://bit.ly/2YU9XXS Click here to check out Mark Levin's Facebook page: https://bit.ly/2XuTpp7 Click here to watch more Mark Levin on BlazeTV: https://bit.ly/3tIHmQM Newsmax @newsmax BREAKING: In an exclusive with @ericbolling, Loudoun County dad Scott Smith breaks his silence on the case of an alleged bathroom assault on his daughter by a boy in a skirt. The Sheriff Dept. urged he stay silent, and the alleged predator reportedly committed another assault.
Host Scott Moritz was a guest speaker at the October NAVEX Next Virtual Conference joined by Gregory Coleman, a former FBI colleague, to discuss established investigation techniques and how some of these practices have changed in recent times. For more information visit: FraudEatsStrategy.com
The Biden Administration has launched a major attack on our free speech liberties. Are your rights to free speech at risk? Steve Forbes on who the DOJ is targeting and on why federal law enforcement is coming for parents who challenge the policies and practices of local school boards.Steve Forbes shares his What's Ahead Spotlights each Tuesday, Thursday and Friday.
Laura and former New York City Prosecutor and retired FBI profiler Jim Clemente continue their forensic deconstruction of Sophie Toscan Du Plantier's murder. In this episode Laura uses the Sky docuseries ‘Murder at the Cottage: The Search for Justice for Sophie' directed by six-time Oscar nominee Jim Sheridan as a jumping off point for my discussion with Jim. We share our thoughts on the police investigation, the key witness Marie Farrell, what happened to the missing weapon as well as the main suspect who was arrested twice by the Garda. #HerNameWasSophieToscanDuPlantier #SophieToscanDuPlantier #WestCork #Stalking #CriminalBehaviouralAnalysis #Profiling #DomesticAbuse #Podcast #TrueCrime #CrimeAnalyst #CriminalBehaviouralAnalysis #Advocacy #Misogyny #Femicide #WomenMatter Clip Used https://www.youtube.com/watch?v=mUDhP3GVOJ0 Thank you to my sponsor Athena Club: Show your skin you care with the Athena Club Razor Kit! Sign up today and you'll get 20% off your first order! Just go to https://www.AthenaClub.com and use promo code crimeanalyst. Leave a Review If you want to support my work and Crime Analyst and if you enjoyed this episode, please leave a 5-star review here: https://www.crime-analyst.com/reviews/new/
When Isabella realizes the man she loved is a fraud, she turns her heartbreak into a determination for justice. Working with local law enforcement and the FBI, Isabella uncovers information linking her case to a large organized crime syndicate. Her tenacity pays off when Robert Asante and accomplices are arrested and charged with stealing millions of dollars. Isabella now has the strength to share what she's learned and helps other victims of romance scams
Townhall Review - October 16, 2021 Dan Proft and Amy Jacobson talk with Economist Stephen Moore about inflation of the sort we haven't seen in well over a decade. Mark Davis talks with Texas Congressmen Van Taylor about his recent trip to the border to witness the crisis there first hand. Seth Leibsohn and Pete Peterson, of the Pepperdine Graduate School of Public Policy, talk about U.S. Attorney General Merrick Garland threatening the use of the FBI and the Patriot Act against parents who dare challenge local school boards. Hugh Hewitt talks with Retired Admiral James Stavridis about the dangers we face from China and how Russia seems most pleased to lend them a hand. Mark Davis and Seth Jones talk about Seth's book, “Three Dangerous Men: Russia, China, Iran and the Rise of Irregular Warfare.” Hugh Hewitt talks with John Bursch, of Alliance Defending Freedom, about the U.S. Supreme Court hearing cases that could overturn Roe v Wade. Sebastian Gorka turns to California Congressman Devin Nunes to examine the media establishment that seems intent on helping the left transform America. See omnystudio.com/listener for privacy information.
State School Board Groups Blast National Association For Exploiting Political Disputes To Attack Parents OCTOBER 13, 2021 By Jordan Davidson State school boards associations are condemning the National School Boards Association (NSBA) for mischaracterizing protests in their districts and using them to justify the involvement of federal law enforcement and domestic terrorism laws against concerned parents. Just last month, the NSBA sent a letter to President Joe Biden begging him and his administration to prosecute and punish parents who were fed up with the radical indoctrination of their children in schools. Shortly after, the U.S. Justice Department's Attorney General Merrick Garland directed the FBI and state attorneys to address “a disturbing spike in harassment, intimidation, and threats of violence against school administrators, board members, teachers, and staff who participate in the vital work of running our nation's public schools.” As of Wednesday, at least 14 state school board associations reported to Parents Defending Education that they were not consulted before the letter was sent to the Biden administration. Particular organizations such as the Georgia School Boards Association said the NSBA even cited incidents in their state as justification for federal overreach without asking them for input first. “The Georgia School Boards Association (GSBA) was not consulted about this letter, did not provide information to NSBA, and was not informed that the letter was being sent, even though a Georgia school district was used as an example in the letter,” GSBA noted in its statement to Parents Defending Education. “GSBA supports the constitutional authority of local boards to manage and control the public schools of this state. Elected officials and appointed leadership who are closest to the community are best suited to make those decisions, especially the hard ones. … While we look for support to our state and federal governments, we do not seek the involvement of federal law enforcement or other officials in local decisions.” While a handful of the state associations simply said they were unaware of NSBA's letter until it was published, most state groups condemned the national association's request to use domestic terrorism laws to target parents and said the protests they've experienced have not warranted law enforcement involvement beyond the local and state level. “The DSBA disagrees, in the strongest possible terms, with parents and citizens protesting school board meetings being characterized as ‘domestic terrorists' and their protests being likened to ‘hate crimes,'” the Delaware School Boards Association said in a statement. “The DSBA firmly asserts that citizen and public engagement in school board meetings is an integral and vital aspect of school board governance. We also made it clear that any attempt to silence citizens' voices is a clear violation of their rights to free speech. The DSBA is an apolitical advocacy organization, and we do not engage in partisan politics.” A few of the associations even said they support parents' rights to protest and publicly express frustration with how their children are being taught. “To this end, we provide extensive resources and training to our members, so school boards not only exceed the legal requirements of the Open Meetings Act, but also authentically nurture school communities where parent and community voices are welcomed,” the Texas School Boards Association wrote. “It's natural that community members across a state as large and diverse as Texas are going to have different opinions on important K-12 issues. We think this diversity of opinion — and the ability to express it openly — makes us strong.”
**The special episode of Heritage Explains was recorded LIVE on Facebook and YouTube** Are concerned parents DOMESTIC TERRORISTS? That’s what Attorney General Merrick Garland said in a memo threatening to use the power of the DOJ and FBI to “investigate” parents who speak out at school board meetings with concerns about what their children are […]
On this morning's episode we were talking about how the search at the Reserve had died down...well...that search was back on this afternoon as the authorities once again were on the ground as they continued to search for Brian Laundrie. We also take a look at John Walsh and his latest special and hear from an ex FBI agent about sealed warrants. Join me as I dive in!To contact me:firstname.lastname@example.orgTo contact me:email@example.comSource:https://www.wbal.com/article/537473/3/suspect-in-gabby-petito-homicide-may-already-be-named-behind-closed-doors-former-fbi-agent-saysSource:https://www.insideedition.com/brian-laundrie-could-have-taken-ferry-from-florida-to-bahamas-says-john-walsh-70563
On this morning's episode we were talking about how the search at the Reserve had died down...well...that search was back on this afternoon as the authorities once again were on the ground as they continued to search for Brian Laundrie. We also take a look at John Walsh and his latest special and hear from an ex FBI agent about sealed warrants. Join me as I dive in!To contact me:firstname.lastname@example.orgTo contact me:email@example.comSource:https://www.wbal.com/article/537473/3/suspect-in-gabby-petito-homicide-may-already-be-named-behind-closed-doors-former-fbi-agent-saysSource:https://www.insideedition.com/brian-laundrie-could-have-taken-ferry-from-florida-to-bahamas-says-john-walsh-70563
Highlights: “What this guy Michael Gerson is saying here about Trump's lawlessness is not true. Senate Judiciary Committee Republicans released a report just days back that concluded that President Trump emphatically did not pressure or weaponized either the Department of Justice or the FBI to supposedly overturn the election.”“If anyone is guilty in trying to undermine the integrity of a democratic election, it's this guy, Michael Gerson.”“Republicans are embracing Trump more than ever precisely because he's fighting back against the Democrat's own radicalization.”“Trump more than any other political figure has re-defined the political party as a party of the rural non-college-graduated voter. And as it turns out, he's tapped into a massive voting block that has the potential of re-defining politics for the foreseeable future. And the fact that CNN is now finally realizing that and panicking makes it even sweeter.”Timestamps:[01:35] CNN's interview with Michael Gerson regarding his article “The Trump nightmare looms again.”[03:00] Gerson's ridiculous accusation on Trump's lawlessness in trying to overturn 2020 election[05:35] Why Republicans are embracing Trump more than ever[06:32] How there are far more non-college-educated voters voting for Republicans [08:00] More accusations of what Trump may do when re-elected that Biden is already doing[10:46] How the Democratic Party is doomed Resources:Ep. 683 How REDNECKS Are SAVING Civilization!Sign up for the FREE webinar on October 14th here! Proven Strategies to Grow Existing Schools and Start New Ones: Proven Strategies to Grow Existing Schools and Start New Ones (schoolinboundmarketing.com)Get Your Brand-New PATRIOT T-Shirts and Merch Here: https://store.turleytalks.com/Become a Turley Talks Insiders Club Member and get the first 7 days FREE!!: https://insidersclub.turleytalks.com/welcomeFight Back Against Big Tech Censorship! Sign-up here to discover Dr. Steve's different social media options …. but without the censorship! https://www.turleytalks.com/en/alternative-media.com Thank you for taking the time to listen to this episode. If you enjoyed this episode, please subscribe and/or leave a review.Do you want to be a part of the podcast and be our sponsor? Click here to partner with us and defy liberal culture!If you would like to get lots of articles on conservative trends make sure to sign-up for the 'New Conservative Age Rising' Email Alerts.
Nick, Ant, and James sat down with Matt Baker the man behind Slave to Liberty. You may recognize him from the viral video of Matt speaking at the San Diego town council meeting putting them all on notice! Matt is a true Patriot doing what everyone needs to be doing. We all need to show up at our town council meetings, school board meetings, ect. It is no longer time to sit on the sidelines. Follow Matt's example and get involved. Follow Matt Baker on IG @Mattbaker_unhinged @Slave2Liberty Our fren Green Beret Veteran Jeremy Brown was recently arrested in his home by the FBI for TRESPASSING!! They searched his home for 5 Hours and denied him bail. If you don't remember Jeremy Brown story the FBI approached him to be an informant and infiltrate groups like the Oath Keepers and Proud Boys and Jermey blew the whistle on the whole thing. We had him on the show a few months back. Here is the link if you would like to hear more about his story: https://rumble.com/vfit5d-52-we-the-people-radio-w-green-beret-jeremy-brown-vs-the-fbi.html Jeremey is a true Patriot and does not deserve to be in jail facing any charges he was protesting peacefully and NEVER entered the Capital building. Jeremy Brown is a POLITICAL PRISONER!! Link to hear more about Jeremy's arrest https://www.thegatewaypundit.com/2021/10/judge-denies-bail-retired-green-beret-jeremy-brown-arrest-misdemeanor-charge-standing-us-capitol-jan-6-refusing-fbi-informant/ If you would like to donate to Jeremy to help him with his and defense costs and fight back against this tyrannical government. Donate HERE: https://www.givesendgo.com/JeremyBrownDefense MERCH IS LIVE!! GO TO WPRUSA.COM AND PICK UP YOURS TODAY https://wprusa.com/ Pick up the best topicals in the game sold nation wide Kush Creams! 21x Cannabis Cup Award Winning Visit their website today! https://kushcreams.com/ Put in WPRUSA for 15% off at check out New Rumble Channel https://rumble.com/c/c-648243 Weed The People YouTube channel https://www.youtube.com/channel/UCo5pjjpKyL4qkjj4IaSZ5jw CHAT WITH US AND JOIN OUR TELEGRAM!!!!!! Telegam link: https://t.me/wprusa17 Follow us on GAB:@We_The_People_Radio GAB Link: https://gab.com/we_the_people_radio Visit our Sponsor for all your beauty product needs for men and women Support local! https://thewarehouse.salon/ Put in code WPRUSA for 10% off at check out Follow on IG & YouTube @TheWarehouse.salon Subscribe to our Rumble channel: We The People Radio https://rumble.com/c/c-648243 We are now on all major streaming platforms go subscribe and follow Apple Podcast Link (If you Like our content give us a 5 star rating) https://podcasts.apple.com/us/podcast/we-the-people-radio/id1536870009 Podbean Link https://wprusa.podbean.com/ LIKE SUBSCRIBE SHARE Really helps us spread the truth to as many as possible Sign up for our Email List while we build our website incase we get removed from social media to keep up with what is going on WWW.WPRUSA.COM Follow us on IG: @We.The.People.Radio Follow our back up account: @We.The.People.Radio.2.0 Follow 2nd Backup Account: @WPRUSA__ Follow us on Twitter @WPRUSA17
It's amazing what's going on here and around the world…; it's hard to trust any info any more; the world hates the reality of the family; Polls show a divided America...; 44 percent want the FBI sicced on parents. Scott Smith…; Police Scotland…; --- Will from Arizona called back and spoke about his life. He moved in with his girlfriend.
Today's show rundown: Chuck warns that Government is NOT REASON, government is not eloquence, government is force. How is it that parents are getting treated like domestic terrorists when they want the Critical Race Theory instruction to STOP. The Government is saying that the FBI, DOJ is going to be coming into your schools and meetings and such to suppress your voice. Merrick Garland is at war with the American family. The Federal Government has NO business in a school board meeting. This week's "One Corrupt Politician" - Merrick Garlands son in law Xan Tanner, Co-Founded the company Panorama. This is the company that sells the curriculum of CRT to schools. This company sells millions of dollars to school boards, also keep in mind they sell a program called SEL which is about dismantling White Supremacy. This company circulates data and booklets instructing school administrators how to get around parents, and how to continue on teaching critical race theory. We get to our guest Derrick Hollie - Mark and him talk a little about the Ad Business. Derrick explains why he decided to step into the limelight in a public forum. Derrick talks about his work with the Census, how he was tasked to find enumerators, and what types of voters they were going after / targeting. What Project 21 really is focusing on now is energy poverty, families that can not afford basic heating, lights etc. He has been fortunate enough to have gone before congress 5 times to talk about this very topic. But under the guise of Environmental Justice, the Left is trying to shut down the oil and gas companies. Project 21 member Derrick Hollie is the president of Reaching America, a non-profit group he founded that addresses issues affecting the black community such as criminal justice reform, occupational licensing, energy poverty and free speech. He is a host of the weekly “Reaching America On Demand” podcast.Derrick became engaged in public policy after an extensive career in advertising and marketing. He previously served as executive director of the marketing firm Fresh Solutions Now and president of Global Advertising 1st. He was also the national sales manager for the black-focused Radio One media network (now called Urban One). He is a graduate of East Tennessee State University, where he earned a bachelor of arts degree in broadcast management and communications. A recipient of the ETSU Alumni Award of Honor, he attended the school on a football scholarship and was a member of the Omega Psi Phi fraternity. https://worldmission.cc/donate-humanitarianoutreach/ Give H2Max a try and let us know what you think: buyh2max.com Help us bring you the best content possible. Due to the left's boycotts of those who advertise with Conservatives, we have had a number of advertisers back-out to avoid possible backlash. Support the show and gain access to even more content at https://www.patreon.com/bftpodcast Don't forget to leave us a voicemail for the chance to have it played on a future episode. You can do so by clicking the link. https://bluntforcetruth.com/voicemail/ Also, check out the store on our website to get your own Blunt Force Truth gear. https://store.bluntforcetruth.com/
0:00 - Dan & Amy wonder if Kamala Harris is lost in space and what it would be like to go there with William Shatner 10:05 - Dan & Amy take callers reaction to Mayor Lightfoot's CPD vaccine mandate 25:18 - Dan & Amy remember democrats skepticism about the vaccine last year under Trump 29:00 - Dan & Amy respond to Trump not wanting Republicans voting in '22 or '24 49:27 -Reed Spaulding IV, MD, contributor to The American Spectator and practicing pathologist, explains how natural immunity is equal to or greater than receiving the vaccine. All opinions expressed are his and not those of his employer. Follow Dr. Reed Spaulding on twitter @SpauldingMd 1:05:59 - Kevin R. Brock, former assistant director of intelligence for the FBI and former principal deputy director of the National Counterterrorism Center, looks into the Hunter/Joe Biden business relationship and warns FBI should be wary of attorney general's directive on school board threats. Read Kevin Brock's Latest here 1:22:40 - Dan & Amy continue their look into the Loudon Co schools sexual assault cover-up 1:40:14 - Financial Times Global Finance correspondent, Robin Wigglesworth, shares his new book Trillions: How a Band of Wall Street Renegades Invented the Index Fund and Changed Finance Forever. Check out Robin Wigglesworth's latest here. Trillions: How a Band of Wall Street Renegades Invented the Index Fund and Changed Finance Foreveris available now 1:53:35 - Andrew Klavan, Podcaster (“Another Kingdom” ), host of “The Andrew Klavan Show” at Daily Wire and screenwriter of the movie Gosnell: The Trial of America's Biggest Serial Killer, looks at At the Heart of Our Divisions. For more info on all of Andrew Klavan's projects, including his soon to be released novel When Christmas Comes, go to andrewklavan.com See omnystudio.com/listener for privacy information.
Get ready for our fifth bonus episode because it's all about the Mighty Mississippi (and one other random topic). In this episode, Lisa and Amy discuss questions and topics from Trixie Belden and The Mystery on the Mississippi. You'll learn about the history of the Mississippi River and its impact on American life. Also, discover some interesting facts about the indigenous inhabitants in the St. Louis area and the Cahokia people. Add in some tidbits about the Secret Service and the FBI, as well as tourist sites you may want to visit, and you've got an abundance of new knowledge! There's no starter and no ender--just content and conversation. Sit back, relax and join us as we tackle these subjects and more. Please rate, review and subscribe on Apple Podcasts. It's free to subscribe, and you can still listen on your favorite platform. Just click on the link below, select listen on Apple iTunes, then choose ratings and reviews. It's just that easy and it really helps us out a lot! https://podcasts.apple.com/us/podcast/books-from-the-basement/id1544343334If you want to help us keep our podcast ad-free, please go to www.buymeacoffee.com/booksbasement where you can make a donation by buying us a "book" instead of a coffee! Visit our FB Page: www.facebook/booksfromthebasement Join our FB Group: www.facebook.com/groups/booksfromthebasementpcFollow us on Twitter: @books_basementThank you Sara Pack for helping us with our grammar and punctuation questions! Sara is an editor and can be found on Upwork or at sarapackediting.com
How much due diligence goes into filing bankruptcy? What are the document requirements? While these are not questions I get from clients too often, they are two of the most important questions when considering a bankruptcy filing. Why? Because failing to do any due diligence prior to filing could get both the client and the law firm (and me) in trouble with the bankruptcy court. And when you get into trouble with the bankruptcy court, it is the FBI that comes knocking on the door! So what are the due diligence requirements? We provide all of our clients with document checklists, information, and support. In today's episode, I discuss most of the different common types of documents and information we need. Of course, every bankruptcy is factually different, so the list provided in today's episode is just the starting point. If you have questions about bankruptcy, please let us know or post a comment wherever you listen to this podcast! We're also excited about Podfest Origins at the beginning of November, LIVE in Tampa, Florida. You can get more information at www.Podfestexpo.com. In the event an attorney does not do his or her due diligence, we have our sponsor, Sam Cohen of Attorneys First Insurance who handles malpractice coverage for attorneys and title companies throughout the United States but, right now, has a particular focus on Florida and Texas. If you know an attorney or title company in need of professional liability coverage, please refer them to Sam@AttorneysFirst.com or www.AttorneysFirst.com. More questions about bankruptcy or just want to know how to have more money at the end of the month rather than month at the end of the money? Check out my book, Become Debt Free in Less Than One Hour at www.ShawnMYesner.com/BecomeDebtFree.
This month, we're talking about troublemakers–from women who made “good trouble” to women who thrived in illicit industries to villains in the truest sense of the word.History classes can get a bad wrap, and sometimes for good reason. When we were students, we couldn't help wondering... where were all the ladies at? Why were so many incredible stories missing from the typical curriculum? Enter, Encyclopedia Womannica. On this Wonder Media Network podcast we explore the lives of inspiring women in history you may not know about, but definitely should.Every weekday, listeners explore the trials, tragedies, and triumphs of groundbreaking women throughout history who have dramatically shaped the world around us. In each 5 minute episode, we'll dive into the story behind one woman listeners may or may not know -- but definitely should. These diverse women from across space and time are grouped into easily accessible and engaging monthly themes like Educators, Villains, Indigenous Storytellers, Activists, and many more. Encyclopedia Womannica is hosted by WMN co-founder and award-winning journalist Jenny Kaplan. The bite-sized episodes pack painstakingly researched content into fun, entertaining, and addictive daily adventures. Encyclopedia Womannica was created by Liz Kaplan and Jenny Kaplan, executive produced by Jenny Kaplan, and produced by Liz Smith, Grace Lynch, Maddy Foley, Brittany Martinez, Edie Allard, Lindsey Kratochwill, Sundus Hassan, Adesuwa Agbonile, Carmen Borca-Carrillo, Taylor Williamson, and Ale Tejada. Special thanks to Shira Atkins.We are offering free ad space on Wonder Media Network shows to organizations working towards social justice. For more information, please email Jenny at firstname.lastname@example.org.Follow Wonder Media Network:WebsiteInstagramTwitter
Hoy en Historias del Más Acá: Notas Macabrosas Investigadores aseguran haber identificado al Asesino del Zodiaco: Dudoso, tan dudoso que el FBI dijo “Nel, están todos mecos estos chavos”. Demi Lovato aboga por los extraterrestres: Dice que decirles “Aliens” es ofensivo y se prepara para lanzar un documental sobre sus experiencias. Manifiestan en redes rechazo a Ricardo Ponce en Bacalar: Neta, ya encierrenlo, estamos hartos de él. Encuentros Cercanos (con Pablo Salum) El fundador de Librementes, conocido por su lucha contra organizaciones coercitivas (sectas, cultos, etc), nos platica de su experiencia y su activismo. #LeyAntiSectas ¿Tienes una noticia / suceso que te gustaría que comentemos? Escríbenos a email@example.com con el asunto "Historias del Más Acá" También puedes escucharnos en Youtube, Spotify, Apple Podcasts, Google Podcasts o tu app de podcasts favorita. Apóyanos en Patreon: https://www.patreon.com/leyendaspodcast Apóyanos en YouTube: https://www.youtube.com/c/leyendaslegendarias/join Síguenos: https://instagram.com/leyendaspodcast https://twitter.com/leyendaspodcast https://facebook.com/leyendaspodcast #Podcast #LeyendasLegendarias #HistoriasDelMasAca Patreon: https://www.patreon.com/leyendaspodcast
Listen to a new episode of Your Next Stop recorded live on Fireside with host Juliet Hahn featuring true-crime podcast host Sarah Ferris. “What I always choose to do is to step in and find that sliver of joy in everything I do.” - Sarah Ferris Sarah is a London-based Kiwi and was an avid podcast listener turned creator. The driver to create her first podcast was born out of the embers of her sister, Emma's horrific experience of being targeted in a romance scam. The podcast, Conning the Con achieved unexpected global success and recently came runner up in the International Women's Podcast Awards 2021. Sarah now hosts several shows on Fireside including CONmunity and The Guilty Greenie and is co-hosting and producing Stop the Killing podcast with Katherine Schweit, the former head of the FBI's active shooter program. Episodes of which are out weekly and can be found wherever you listen to podcasts. With many new and exciting podcasts in development under her CONmunity Podcasts Production banner, you can find out what she has in the pipeline on Instagram or Twitter. Find Us Online! Fireside: Juliet Hahn Instagram: @iamjuliethahn LinkedIn: Juliet Hahn FB: Juliet Hahn Clubhouse: @iamjuliethahn YouTube: Juliet Hahn Twitter: @iamjuliethahn
What if we told you 25 out of the 26 cities and counties that received at least $1 million from Zuckerberg's $420 million donation to the Center for Tech and Civic Life, were won by Biden in 2020? A new report from The Federalist confirms what we've been saying on this show for a long time, that Zuckerberg's hyper partisan election rigging scheme of private grants in public elections had a likely consequential impact on the 2020 election in key swing states and counties. How did this funding model change the way certain counties did elections in 2020? Can we affirmatively determine that it caused a change in the results? Charlie has the analysis for you and then, finally, Charlie documents the blockbuster reporting from DailyMail that Joe Biden and Hunter Biden shared a bank account which could embroil Joe Biden in Hunter Biden's FBI investigation. Support the show: http://www.charliekirk.com/support See omnystudio.com/listener for privacy information.
When a train coming through Benton, Arkansas, ran over two young men on the tracks in the early morning hours of August 23rd, 1987, law enforcement seemed immediately convinced that this was an accident or a double-suicide. The medical examiner ruled their deaths an “accident.” However, after a legal battle headed by the parents forced a re-examination of details from the scene as well as a second autopsy, their deaths were ruled “probable homicide.” In addition to the normal cold case question of who could possibly have hurt 16-year-old Don Henry and 17-year-old Kevin Ives, in this case, we also have much larger questions: why is no one, even today, willing to investigate this case as a murder? And, if Kevin's mother, Linda, were right and the unwillingness to investigate is part of a cover-up, how far up the ladder does the corruption go?If you would like to start your OWN podcast on Buzzsprout, please consider using our promo code so you can earn a $20 gift card after your second month on a paid plan:https://www.buzzsprout.com/?referrer_id=709643Support the show (https://www.buymeacoffee.com/CoffeeAndCases)
Biden helps explain supply chains to America. Standing up to the FBI. The crumbling of major American cities. Swing voters at the pump. Happy Birthday to Hunter Biden's laptop. Record numbers resigning yet bankruptcies are down? The system wants to take your kids. Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
Biden helps explain supply chains to America. Standing up to the FBI. The crumbling of major American cities. Swing voters at the pump. Happy Birthday to Hunter Biden's laptop. Record numbers resigning yet bankruptcies are down? The system wants to take your kids. Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
Michael Preysman is the founder and CEO of Everlane, a direct-to-consumer design brand based in San Francisco, California. Preysman shares tips and insights about what makes his company is extremely successful. 5x #1 Bestselling Author and Motivational Speaker Erik Qualman has performed in over 55 countries and reached over 50 million people this past decade. He was voted the 2nd Most Likeable Author in the World behind Harry Potter's J.K. Rowling. Have Erik speak at your conference: firstname.lastname@example.org Learn more at: https://equalman.com Motivational Speaker | Erik Qualman has performed in 55 countries and reached over 50 million people. Qualman inspires his audiences on Digital Leadership-ensuring they are harnessing the power of Innovation, Future Trends, Focus, and Digital Transformation. He has inspired audiences at FedEx, Chase, ADP, Huawei, Starbucks, Godiva, FBI, Google and many more.
This week, Alan, Quinta and Scott were joined by Rational Security forefather and Washington Post reporter Shane Harris to discuss:“The Hunt for Bread October”: Which country did a U.S. Navy employee and his wife attempt to smuggle nuclear secrets to inside a peanut butter sandwich? And why did that country turn them over to FBI instead?“Turn After Leaving”: Is the intelligence community executing its own pivot to Asia—and will the post-withdrawal collapse of Afghanistan stymie its effort?“You Got Served”: Will the January 6 committee get the testimony and documents it is demanding, over former President Trump's open direction not to cooperate?For object lessons, Alan steered listeners to do some self-guided learning via the Great Courses Plus program; Quinta brought some attention to the unique items former White House Press Secretary Stephanie Grisham chose to put in her background during her recent appearance on Meet the Press; Scott encouraged D.C. residents to run and get the cocomotion, rum distillery Cotton & Reed's incredibly delicious rendition of a fermented piña colada, before temperatures get too chilly; and Shane doubled down on the Queen's endorsement of her new favorite show, Line of Duty. Be sure to visit our show page at www.lawfareblog.com and to follow us on Twitter at @RatlSecurity. And Rational Security listeners can now get a committed ad-free feed by becoming a Lawfare material supporter at www.patreon.com/lawfare! See acast.com/privacy for privacy and opt-out information.
The FBI's head of Intelligence talks about the collection, analysis, and dissemination of intelligence gathered by the FBI that makes the Bureau a vibrant part of the US Intelligence Community. Follow Frank on Twitter: https://twitter.com/FrankFigliuzzi1 Promo codes: https://BuyRaycon.com/frank for 15% off of your purchase of Raycon earbuds. To try Shudder free for 30 days, go to shudder.com and use promo code frank Learn more about your ad choices. Visit megaphone.fm/adchoices
We chat with the creator of the investigative video games Her Story and Telling Lies about online surveillance, how Police are viewed in gaming, and FBI infiltration into green activism. Nerd time baby! Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
Las Vegas coach Jon Gruden resigned after offensive private emails were made public, but should this ever have happened in the first place? Texas Gov. Greg Abbott is prohibiting private entities from forcing people to get vaccinated, but is this too little, too late? When will Texas lead the way? Nancy Pelosi said the quiet part out loud again when she lectured reporters for not doing a good enough job selling President Biden's Build Back Better plan. The “F*** Joe Biden” chant has gone global. Note: The content of this episode does not provide medical advice. Please seek the advice of local health officials for any COVID vaccine questions & concerns. Today's sponsors: The FBI calls home title theft one of the fastest-growing white-collar crimes. Register your home at https://www.hometitlelock.com/ with a promo code RADIO for 30 FREE days of protection. If you're trying to stay fit and healthy, Built Bar is the answer. Go to https://built.com/ and use promo code NEWS15 to save 15% off your next order. Patriot Mobile is the only Christian conservative wireless provider. Go to https://patriotmobile.com/news and get free activation with the offer code NEWS Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of Quah (Q & A), Sal, Adam & Justin answer Pump Head questions about the best way to progress to a full unassisted pistol squat, developing quads when you are glute dominant or glutes when you are quad dominant, spiking insulin before the gym or after the workout, and the quality of carnivore/meat based protein powders. Ben Greenfield, Captain Springboard and Pseudoscience. (5:17) What is semen retention, and are there any benefits? (15:34) What message are we trying to send our children? (18:55) Attack of the fruit flies! (22:25) X-men, no more? (24:16) Woman's depression was cured by targeted electrical brain stimulation, a first, pioneered by UCSF researchers. (25:57) Alarming news with Sal: US homicides increased 30% in 2020. (31:23) Rad is coming back to theaters! (33:53) Irresponsible purchases with Mind Pump. (36:10) Your worst fans are usually the people closest to you. (44:26) #Quah question #1 – What is the best way to progress to a full unassisted pistol squat? (49:24) #Quah question #2 – What is harder to develop, quads when you are glute dominant or glutes when you are quad dominant? (54:46) #Quah question #3 – What is more important, spiking insulin before the gym or after the workout? (58:46) #Quah question #4 – What do you think about carnivore or meat-based protein powders? (1:03:39) Related Links/Products Mentioned October Promotion: MAPS Anabolic and NO BS 6-Pack Formula – Get Both for $59.99! How A Simple Stick Developed Into One Of The Most Advanced Muscle Self-Quantification & Isometric Training Tools That Exists. - Ben Greenfield Podcast w/Justin Andrews NCI Certifications x Mind Pump Semen Retention: Origin, How to, Purported Benefits, Risks Mind Pump #1660: Wokeism, Equity & Social Justice With Gad Saad The maker of popular selfie app Facetune just landed $135 million at a unicorn valuation Portion of South San Jose under state quarantine for oriental fruit flies Marvel May Change X-Men Name To Make It More Inclusive A custom brain implant lifted a woman's severe depression Homicides up 30 percent in largest increase on record, FBI says RAD Heads Back to Theaters for One Night to Celebrate 35th Anniversary Visit NED for an exclusive offer for Mind Pump listeners! Visit LivON Labs for an exclusive offer for Mind Pump listeners! Visit Paleo Valley for an exclusive offer for Mind Pump listeners! **Promo code “Mindpump15” at checkout for 15% discount** Step-By-Step Instruction on How to Pistol Squat – Mind Pump TV Two Ankle Mobility Exercises To Increase Your Squat Depth! - Mind Pump TV The Myth of Optimal Protein Intake – Mind Pump Blog Do I Need a Protein Shake Every Time I Workout? - Mind Pump Blog Mind Pump Podcast – YouTube Mind Pump Free Resources People Mentioned Ben Greenfield Fitness (@bengreenfieldfitness) Instagram Dr. Gad Saad (@doctorgadsaad) Instagram Bodybuilding.com (@bodybuildingcom) Instagram Jon Call (@jujimufu) Instagram
Rep. Chris Stewart joins to discuss the letter he wrote to AG Merrick Garland regarding the FBI investigating parents who are standing up against school boards. Victor Davis Hanson, the author of “The Dying Citizen,” joins to discuss the ongoing cultural revolution in America. BlazeTV host Jason Whitlock joins Glenn to discuss a coach being forced to resign because of old emails and the idea of cancel culture. Learn more about your ad choices. Visit megaphone.fm/adchoices