Podcasts about Jupiter One

American indie rock band

  • 22PODCASTS
  • 27EPISODES
  • 45mAVG DURATION
  • ?INFREQUENT EPISODES
  • Sep 20, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Jupiter One

Latest podcast episodes about Jupiter One

Beginnings
Episode 647: Kishi Bashi

Beginnings

Play Episode Listen Later Sep 20, 2024 65:42


On today's episode, I talk to musician Karou Ishibashi AKA Kishi Bashi. Originally from Seattle, Washington, Karou grew up in Norfolk, Virginia and although he wanted to make music professionally, it wasn't until he flunked out of college that he began to pursue it in earnest. In 2003, he formed the band Jupiter One, and they were together for a decade and released three albums. Also, during this time, he was a member of Of Montreal for a number of years. In 2011 though, Karou released his first album as Kishi Bashi, 151a, on Joyful Noise, which has been his label ever since. His fifth album Kantos was just released at the end of August, and it is fantastic! This is the website for Beginnings, subscribe on Apple Podcasts, follow me on Twitter. Check out my free philosophy Substack where I write essays every couple months here and my old casiopop band's lost album here! And the comedy podcast I do with my wife Naomi Couples Therapy can be found here! Theme song by the fantastic Savoir Adore! Second theme by the brilliant Mike Pace! Closing theme by the delightful Gregory Brothers! Podcast art by the inimitable Beano Gee!  

Ripple Effects Radio
Collin Oliver - Ripple Effects Episode 190

Ripple Effects Radio

Play Episode Listen Later May 31, 2024 60:00


Collin Oliver - Ripple Effects Episode 190Tracklist:00:00:00 - Munk - Violent Love (The Twelves remix)00:05:21 Alan Braxe, Fred Falke - Palladium (Remastered 2023)00:11:50 - Marcus Marr - The Music (Original Mix)00:16:31 - Panthers - Goblin City (Holy Ghost! Extended Disco Dub)00:22:22 - MAM - Modern Heat (Original Mix)  00:26:29 - Justin Faust - Girl Talk00:28:44 - Jupiter - One o Six (A.N.D.Y. Remix)00:34:18 - Justin Faust - Revenge  00:38:32 Knightlife - Discotirso00:43:33 - Holy Ghost - The Deep End (Holy Ghost! Day School00:49:25 - Sébastien Tellier - Kilometer (A-Trak Remix)00:52:59 - Black Van - Yearning (Original Mix)00:58:14 - Tape To Tape - Pure & Easy (Original Mix)  Support this podcast at — https://redcircle.com/ripple-effects-radio/donations

effects remix ripple effect alan braxe jupiter one collin oliver
One More Tune

In Episode 57 I chat with singer, songwriter and multi-instrumentalist Kaoru Ishibashi who performs under the pseudonym Kishi Bashi about  being perfectly woke, always scheming, and fighting over the last bottle of Kombucha.Aside from being a world renowned violinist who has toured internationally with such diverse artists as Regina Spektor, Sondre Lerche, of Montreal, and Alexi Murdoch, he is also the singer and founding member of the New York electronic rock outfit Jupiter One and has garnered praise from the likes of NPR's Bob Boilen who listed him as his favourite new artist of 2012, noting that he created a 'radiant, uplifting soundscape'. In 2019 he released his album 'Omoiyari' in support of his feature  length documentary “Omoiyari: A songfilm by Kishi Bashi” which explores minority identity and the Incarceration of Japanese Americans in WWII. After 4 years in the making and over $100,000 donated by backers across the globe, the film officially premiered at the SXSW Film Festival in March 2022 and is due for wider release on Paramount+ and HBO in January 2024.Follow Kishi Bashi  onhttps://www.kishibashi.com/https://www.facebook.com/mrkishibashi/https://twitter.com/Kishi_bashihttps://www.youtube.com/channel/UChgbJryoRLOqHGGW31tYWxAhttps://open.spotify.com/artist/3LVPGE5jPPwtbGslx07YR0https://music.apple.com/us/artist/kishi-bashi/441315443Follow One More Tune onhttps://www.instagram.com/onemoretunepodcasthttps://twitter.com/onemoretunepodFollow The One More Tune Artist Playlisthttps://open.spotify.com/playlist/1ibJ3ZzmuZGqLW4FB6ZAdD?si=8b41c4aad7804c28Songs Used With Artists PermissionPodcast Music by Slim GoodyPodcast Artwork by Peter DoyleProduced by Ian Byrne Support the show

Tech Clubbers Podcast
TC Premiere: Kelvin Belton - Rough Pattern [ Transhuman Society ]

Tech Clubbers Podcast

Play Episode Listen Later Sep 6, 2023 6:01


Artist: Kelvin Belton Label: Transhuman Society Title: Polylog CAT: Trasy001 Format: Digital Release Date: 10.09.2023 TRACKLIST: 01. Drone One 02. Avon 03. Rough Pattern 04. Jupiter One 05. Polylog 06. Polylog ( Casual Treatment Remix ) 07. Matter Buy the EP here: Bandcamp: https://transhumansociety.bandcamp.com/album/polylog-ep Follow TRANSHUMAN SOCIETY here: Instagram: https://www.instagram.com/transhuman_society_/ Soundcloud: https://soundcloud.com/transhumansocietymusic Follow KELVIN BELTON here: Instagram: https://www.instagram.com/kelvin_belton_909/ Soundcloud: https://soundcloud.com/kelvin-belton

The Tech Trek
Adapting Management Styles to a New Environment

The Tech Trek

Play Episode Listen Later Jul 12, 2023 18:30


In this episode of Tech Trek, Amir Bormand interviews Andy Foglia, the Director of Engineering at JupiterOne, to discuss adjusting management styles after joining a new company. Andy talks about his experience of transitioning from a big company to a startup and gives insights on how to adapt to new management styles. He also sheds light on the Jupiter One product that helps security practitioners understand what assets they have within their enterprise and identify potential vulnerabilities. Highlights: [00:01:15] Adjusting your management style. [00:03:05] Transitioning to a new challenge. [00:06:36] Taking risks in management. [00:10:05] Startup planning cycles. [00:11:26] Building relationships for success. [00:15:31] Transitioning to startups. [00:17:29] Managing engineers and staff. Guest: Andy Foglia has over eight years of experience as a Director of Software Engineering in education technology and Cybersecurity. Andy currently works at JupiterOne, a data platform applied to security use cases that delivers unified cyber insights to organizations. He manages the Integrations and Site Reliability engineering teams, which focus on data collection from 100+ platforms and enabling the engineering organization to improve the design and operation of its systems to be more reliable and scalable. JupiterOne secured Series C funding in 2022 with a $1B valuation. Previously, Andy worked at McGraw Hill as a Director of Software Engineering focused on Enterprise Integrations with 3rd party systems and all K12 digital products. During his time there, the organization transformed its business towards digital solutions, and Andy was responsible for building and managing several engineering teams focused on new digital products. Andy received a BS in Computer Science and Engineering from UCLA. LinkedIn: https://www.linkedin.com/in/andy-foglia-ab244758/ --- Thank you so much for checking out this episode of The Tech Trek, and we would appreciate it if you would take a minute to rate and review us on your favorite podcast player. Want to learn more about us? Head over at https://www.elevano.com Have questions or want to cover specific topics with our future guests? Please message me at https://www.linkedin.com/in/amirbormand (Amir Bormand)

Unsupervised Learning
Erkang Zheng of JupiterOne | SPONSORED INTERVIEW SERIES

Unsupervised Learning

Play Episode Listen Later Dec 3, 2022 27:17


In this standalone episode we're doing a sponsored interview with Erkang Zheng of Jupiter One. So Jupiter One is a special company to me. I just built a vuln management program at Robinhood based around them, and I believe so much in their vision that I'm looking to actually become an advisor. I mention this because when I fanboy for something, like Apple, or whoever, I want you to know that I'm fanboying and/or have a relationship with them. Or that I want to. The interview here talks mostly about concepts, however, and not so much specific features. But I just wanted to mention my orientation to the company prior to starting. I'm speaking with Erkang Zheng who is the founder and CEO of the company, and as you can hear we have a similar take on many of the problems currently in security. So with that, here's Erkang Zheng.Become a Member: https://danielmiessler.com/subscribe/See omnystudio.com/listener for privacy information.

Unsupervised Learning
Erkang Zhang of JupiterOne | SPONSORED INTERVIEW SERIES

Unsupervised Learning

Play Episode Listen Later Nov 27, 2022 27:17


In this standalone episode we're doing a sponsored interview with Erkang Zhang of Jupiter One. So Jupiter One is a special company to me. I just built a vuln management program at Robinhood based around them, and I believe so much in their vision that I'm looking to actually become an advisor. I mention this because when I fanboy for something, like Apple, or whoever, I want you to know that I'm fanboying and/or have a relationship with them. Or that I want to. The interview here talks mostly about concepts, however, and not so much specific features. But I just wanted to mention my orientation to the company prior to starting. I'm speaking with Erkang Zhang who is the founder and CEO of the company, and as you can hear we have a similar take on many of the problems currently in security. So with that, here's Erkang Zhang.Become a Member: https://danielmiessler.com/subscribe/See omnystudio.com/listener for privacy information.

Unsupervised Learning
News & Analysis | NO. 352

Unsupervised Learning

Play Episode Listen Later Oct 12, 2022 13:05


CISA Assets, Contractor Hack, China CVEs… Sponsored by: Jupiter One @ jupiterone.com/unsupervisedlearning Become a Member: https://danielmiessler.com/subscribe/See omnystudio.com/listener for privacy information.

member jupiter one
Bite Size Sales
157: Erkang Zheng, CEO of Jupiter One - need for sales structure | power of community in building a customer base | founder led selling

Bite Size Sales

Play Episode Listen Later Sep 7, 2022 35:04


Erkang Zheng, CEO of Jupiter One, knows all about building a solid foundation and growing from there. He joins us today to discuss how he built his company, scaled its sales team, and uses content and word-of-mouth marketing to develop its reputation.Tune in to this episode to learn more about what Jupiter One does, how they use context to make their team more efficient, their biggest innovations in the cybersecurity space, and so much more. We'll talk about why focusing on specific use cases is helpful and how to stand out in a crowded market. At the end of the episode, I share my takeaways from our conversation and how they can apply to your business.You'll Learn:How to identify problems your service solvesWhat granularity of assets can do for youHow many issues in cybersecurity come down to the fundamentalsWhat roles to hire first when scalingHow to use content marketing and word of mouthSupport the show

Unsupervised Learning
News & Analysis | NO. 340 | SF Surveillance, APTs vs. Journalists, TikTok Changes…

Unsupervised Learning

Play Episode Listen Later Jul 18, 2022 21:18


SF Surveillance, APTs vs. Journalists, TikTok Changes… Sponsored by Jupiter One. Support the show: https://danielmiessler.com/support/ See omnystudio.com/listener for privacy information.

Cloud Security Podcast
Feds go "Cloud Smart"+ Alibaba Cloud targeted by Hackers

Cloud Security Podcast

Play Episode Listen Later Nov 17, 2021 4:48


Cloud Security News this week 17 November 2021 According to a research by Trend Micro, Elastic Computing Service (ECS) instances for Alibab Cloud are becoming an increasingly common target for financially motivated hackers with cryptomining goals. This increased targeting may be due to a few unique features of Alibaba Cloud. Alibaba ECS instances come with a preinstalled security agent and provides root access/ privileged control by default. There is a detailed article attached about this here JupiterOne (a Cyber Asset Management Platform ) and Cisco have announced the launch of Secure Cloud Insights, an expanded cloud security and security operations partnership designed to provide businesses with a range of cybersecurity services. This new solution is aimed at helping Cisco customers achieve a higher level of maturity with their digital transformation and security program. CEO of Jupiter One, Erkang Zheng calls it a game changing offering - that would provide increased visibility, efficiency, and speed to security operations, with combined context from situational awareness and structural data. We would be curious to know if you think the same. Those familiar with Palo Alto and their core cloud-security package, Prisma may be intrigued to know that they have launched Prisma 3.0. Truffle Security has released an open source hacking tools called Driftwood designed to discover leaked, paired private and public keys which may be harmful. Driftwood builds upon Truffle Hog and is available on Github. Truffle Security in their blog which is shared here. stated that With this tool they found the private keys for hundreds of Transport Layer Security certificates, and Secure Shell keys that would have allowed an attacker to compromise millions of endpoints/devices. The Federal government is going from a “Cloud First” to a “Cloud Smart” strategy to leverage cloud without compromising security. They quoted that “Cloud Smart is about equipping agencies with the tools and knowledge they need to make these decisions for themselves, rather than a one-size-fits-all approach.The shift will be from “buy before build” to “solve before buy,”. Under security they added that “Successfully managing cloud adoption risks requires collaboration” leaning into that shared responsibility model we hear often about with Cloud Security. The link to the document is here Episode Show Notes on Cloud Security Podcast Website. Podcast Twitter - Cloud Security Podcast (@CloudSecPod) Instagram - Cloud Security News If you want to watch videos of this LIVE STREAMED episode and past episodes, check out: - Cloud Security Podcast: - Cloud Security Academy:

Cloud Security News
17 November 2021 - Feds go Cloud Smart + Alibaba Cloud targeted by Hackers

Cloud Security News

Play Episode Listen Later Nov 17, 2021 4:48


Cloud Security News this week 17 November 2021 According to a research by Trend Micro, Elastic Computing Service (ECS) instances for Alibab Cloud are becoming an increasingly common target for financially motivated hackers with cryptomining goals. This increased targeting may be due to a few unique features of Alibaba Cloud. Alibaba ECS instances come with a preinstalled security agent and provides root access/ privileged control by default. There is a detailed article attached about this here JupiterOne (a Cyber Asset Management Platform ) and Cisco have announced the launch of Secure Cloud Insights, an expanded cloud security and security operations partnership designed to provide businesses with a range of cybersecurity services. This new solution is aimed at helping Cisco customers achieve a higher level of maturity with their digital transformation and security program. CEO of Jupiter One, Erkang Zheng calls it a game changing offering - that would provide increased visibility, efficiency, and speed to security operations, with combined context from situational awareness and structural data. We would be curious to know if you think the same. Those familiar with Palo Alto and their core cloud-security package, Prisma may be intrigued to know that they have launched Prisma 3.0. Truffle Security has released an open source hacking tools called Driftwood designed to discover leaked, paired private and public keys which may be harmful. Driftwood builds upon Truffle Hog and is available on Github. Truffle Security in their blog which is shared here. stated that With this tool they found the private keys for hundreds of Transport Layer Security certificates, and Secure Shell keys that would have allowed an attacker to compromise millions of endpoints/devices. The Federal government is going from a “Cloud First” to a “Cloud Smart” strategy to leverage cloud without compromising security. They quoted that “Cloud Smart is about equipping agencies with the tools and knowledge they need to make these decisions for themselves, rather than a one-size-fits-all approach.The shift will be from “buy before build” to “solve before buy,”. Under security they added that “Successfully managing cloud adoption risks requires collaboration” leaning into that shared responsibility model we hear often about with Cloud Security. The link to the document is here Episode Show Notes on Cloud Security Podcast Website. Podcast Twitter - Cloud Security Podcast (@CloudSecPod) Instagram - Cloud Security News If you want to watch videos of this LIVE STREAMED episode and past episodes, check out: - Cloud Security Podcast: - Cloud Security Academy:

Craig Peterson's Tech Talk
IT Wages are down, Big Tech and HIB Visas, Ransomware and the National Guard plus more on this Tech Talk with Craig Peterson Podcast

Craig Peterson's Tech Talk

Play Episode Listen Later Oct 31, 2020 76:30


Welcome!  Craig has an exciting podcast that covers quite a few interesting topics this week including USB safety, Properly disposing of your smartphone before getting a new one, Why the National Guard is being used to investigate Cybersecurity incidents in Louisiana, Iran, and threatening mail sent to democrat voters, Phishing is back in the news and why you must train your employees to watch for it.  Then he talks about IT Wages and problems with the H1B Visa program. For more tech tips, news, and updates, visit - CraigPeterson.com. --- How safe is your USB drive?   How to protect your privacy when selling your phone   Louisiana Calls Out National Guard to Fight Ransomware Surge   U.S. government concludes Iran was behind threatening emails sent to Democrats   How AI Will Supercharge Spear-Phishing   IT Job Wages Are No Longer 'Exceptional'   Need for 'Guardrails' in Cloud-Native Applications Intensifies   GIRDUSKY: Corporations Use The ‘STEM Shortage’ Myth To Abuse Guest Worker Programs --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] We've even seen where USB thumb drives come pre-infected with viruses and other pieces of nastiness. So, just how safe is your USB drive in this day and age of us taking them home and to work? Hi, everybody, Craig Peterson here. Welcome. We're going to be talking not only about USB drives but how to protect your privacy when you're selling your phone. Okay. We've got a national guard call out in Louisiana over the election. We've got the government concluding that Iran was behind some email sent to Democrats, and we've got artificial intelligence that's going just to supercharge spear phishing. We'll be talking about that. Defining both of what they are. IT wages are no longer considered exceptional. That's a study from Harvard business school. Guardrails in cloud native applications are needed. That's a great call. I love that. Corporations using this STEM shortage myth to abuse the H1B programs. H1B visa programs that President Trump has been trying to clamp down on. What do you call these little devices that we have these a USB drives, thumb drives? What do you call them personally? Probably about 10 years ago, I grabbed the domain. I registered thumbdrive.com and I never did anything with it. I was thinking, Oh man.  I could have a whole bunch of different thumb drives up there.  I ended up letting it go when I was really low on cash one time. I just went to it today. Thumb drive.com and it's somebody selling toshiba thumb drive type stuff.  It's still the disappointments in life that you tend to remember much more than the successes. So it's a bit of a shame. But thumb drives have become way more useful in this day and age. We're going from work to home. Our kids are taking their work for school. They've got to bring it to the teacher. Many of the times, of course now it's electronic, right? We upload it. We don't even use FTP anymore, but we upload it. We download it and we might email it. We use Box or Dropbox or Google drive in order to share files. That's really the most common way to do it nowadays. But thumb drives are still out there. They're still in wide use and I still have a supply of them and somehow they all seem to keep disappearing and that's where the problems start, really? If you own at least one thumb drive, you've transferred a file. You might've used it as a method of backing up some of your documents or your photos or other things you might like to carry your work with you. So you can dive into it at a moment's notice and you keep it in your pocket. I have one that is waterproof. It's a light fireproof, and it sitting there on my key chain. So that I have it if I ever need it in order to do something and you know what, I've used it a few times, but not so much. I've even got thumb drives in my wallet. Just really thin ones in case ever need them. I have used them from time to time. If you're like most people. You might be using thumb drives that aren't necessarily trustworthy. So let's talk about that for a minute. Students tend to use flash drives to print out study materials at  a Kinko's store, or maybe they go to a library to grab something. Maybe you are using it to move documents back and forth to your work, to your family events, soccer church or whatever it might be. Now, when we're talking about kids, they also tend to lend their classmates these drives, and they might have their notes from their class on them. They might've made their notes on a Google Chromebook, and now somebody plugged it into a windows laptop or Mac. Think about spreading diseases, right? It's the same sort of thing as they're passing them around and sharing them.  It's not just kids in school, in college. It's also friends at the office. It's friends that you have at home and you really can't be sure of these things and how protected they're going to be.  If any of those thumb drives has been infested with malware, it's really very possible that your computer, if you've used one of these infected thumb drives, that your computer is now infected as well. Some devices like your Macs, for instance, you've got a Mac laptop is immune to all windows viruses that are windows based. So it can spread them. It's like a little super spreader. So that if there is a virus for windows, that's on your Mac in a file, your Mac, will be just fine. It doesn't care. But when you now transfer it to somebody else, or you put it onto a drive you're in big trouble. here's some options that you can take. Microsoft has made a big change a couple of releases ago, major releases in the windows operating system. There used to be an auto run file that was there, on, for instance, a CD drive or a thumb drive. So when Windows opened it up and said, okay, I'm going to run this file. And that file would do something like cool, play a movie for you. Or it might run a video game or whatever it's supposed to be doing on there, but the bad guys started taking advantage of that pretty early on. They started using this crass cross-contamination route using these auto run files as a way to send all of their malware to other people. Okay, so you have to be careful. We're going to get into some solutions here in just a minute. What really do you have on your thumb drives? I want everybody to think about it for a minute. What are you using them for? How can they be misused?  What happens if they're lost? I mentioned that this week on the radio, what happens if you lose the thumb drive and it has some intellectual property on it?  has personal information on it? I know a couple of listeners who are using external drives, which are more common now than they used to be. They plug into the USB port. It's the same sort of problem. You can't put these into your pocket like you can a thumb drive, but you can certainly share them. You can move them around and they're using these USB drives now spinning media, or sometimes even SSD, they're using them to move stuff back and forth. So how do you deal with it? One of the ways is what we tend to do for our customers that need high security.  We remove the mechanisms for people to be able to use them in the first place. We'll disconnect it from the motherboard if that's possible and we'll fill the port with epoxy. So people can't just put it in there. Now most of the time, they're not being malicious. They just want to plug it in and grab this file. But there are people who are malicious who are trying to steal data. Which is why, again, in high security, We remove those USB ports. So that the thumb drives just can't be put in there. Companies like IBM have opted to completely ban removable storage devices, period. It's a real big deal. They were talking about all of this at WeLiveSecurity.com Amer Owaida is his name who was talking about some of this stuff. But when he looked around, he found that IBM was banning it, many other major companies were.  Let's start with what can be done. First of all. When we're transferring sensitive information from one place to another. So for instance, we might be tightening up security in a doctor's office or helping a doctor's office upgrade their systems, and we need to send all of their patient data. To the third party who now has this new system that they're going to be starting to use in the doctor's office and we want it to be secure. So we have a disk drive cabinet that is encrypted the whole thing is, it's just a little thing. It's not much bigger than a disc drive and it has a drive inside of it. You have to enter the key when it powers on, and then it uses that key for the encryption on the disk So even if somebody breaks into the case, it doesn't matter because the disk that's inside is encrypted using this key. So you could consider doing that. There are thumb drives that have built into them. Thumb print readers. Most of them that I've seen are pretty easily defeated, but let me tell you that's harder to do than, having to defeat one of these things than just plugging in a drive that's not encrypted okay. So step number one. You need to have, if you can use them, drives that you can trust for confidential information. That means they need to look different. They need to be different than the drives that you are using at home for your personal data, for your personal backups.  So first of all, they need to look different. So maybe just having that thumbprint reader on the drive is enough to remind you. Sensitive data should be on that drive with a thumb print reader. The next thing you probably want to do is encrypt all of the sensitive data that you want to load onto the drive. Now there's a number of ways to do it. You've got built right into windows, full disk encryption. The same thing's true for your Mac. So you could encrypt it that way. You can also use something that's free. I think it's pretty easy called PGP, which uses public keys.  You encrypt the files before you put them on the disks. I do like the hardware security solutions for the thumb drive that uses a pin code. That's probably best, as I said, I don't really trust the biometric scanners, but there are some really great articles out there about these thumb drives, and what could possibly go wrong. Now there are thumb drives that are designed to burn up your computer, literally melt it down. Don't pick them up. Oh yeah, we've used that trick against Iranians before. Our smartphones have our lives on them. There are some very quick ways to make sure all of your data on them are destroyed because we're upgrading these things left, right, and center.  It isn't just about e-waste as they call it. It's about your personal information. Let's start getting into our security here on your phones. People are getting rid of their phones at record rates. In fact, in the market for new customers, their smartphones have dropped dramatically. We've reached saturation in most markets, worldwide, where people who want a smartphone have a smart phone, people who want an iPhone or maybe an Android, heaven forbid, have got those devices and they're pretty happy with them. Now, Android is going to be cheaper initially. If you ask me, it's way cheaper in the long run to have an iPhone. What do we do with these things? We're talking about 50 million metric tons of e-waste every year and a large part of that is our smartphone devices. Most of it isn't recycled. However. Your smart phone can be. So instead of tossing it into the trash, I think you need to look at a few different options. You can recycle it. You can donate it. You can sell it. There are a number of different places that you can go in order to get rid of these things and really make back a few bucks in the long run here. Best Buy, Whole Foods, Home Depot, Lowe's, and Staples typically have free drop off spots to take dead batteries. So that's step one. If you have a removable battery. You can remove it and drop it off on one of those. You can also check out a website that's called earth nine one one, and it's simple or nine one one.com and it will tell you where you can recycle these things because they've got all kinds of nastiness in them. The button cells, the older ones had mercury. You've got lithium, you've got zinc in these things. So that's always a good place to go to start recycling them. There are also cell phones for soldiers where you can donate. That's their website, cell phones for soldiers dot com they will take your cell phones and they'll provide them to soldiers overseas. This is really cool too. Cell phones for soldiers also provide about 2,500 calling cards every week as well for the soldiers to use. Man, I'm choking up a little bit here.  In case you didn't know it, by the way, we're planning on building a 4g cell phone network on the moon and a 5g cell phone network on Mars, like real soon now with the next couple of years. So maybe you can donate them to NASA for them to take while they go up there. Now, there are a few places that you can go to. Recycle specifically, and I've used Gazelle before. Let me just check. Make sure they are online still. Yeah, there they are. Gazelle, G A Z E L L E.com. They'll let you buy refurbed pre-owned phones. You can sell them as well. They'll trade them in for cash. So let me just see, I'm poking around on their website as I'm here. I'll tell you how to clean up your phone securely here a little bit, but let's say like me, I've got an iPhone eight plus, right? That's my phone. It's probably about time to upgrade it.  I'm going to say it's factory unlocked and it's saying, I think mine's a  two 56. So I'm going to say two 56 because I want money. Does the device power on? Yes. All functional all parts work. Yes. Front and back. Free of cracks. Yes. Cosmetic looks like new, which is true. So for excellent condition worth 181 bucks, light signs of use it's worth 173, normal signs 160 bucks. Then you can send it in. I've even seen gazelle having kiosks, where you can go ahead and just put your phone in. They have cameras in them and somebody remotely will look at the phone that you just stuck into it and will give you an offer. So there's buy-back services, flip C, and all kinds of others. So before you get rid of it, make sure you have a good hard look. Declutter gadget is gone. That's a cool name, right? Oh, Apple, by the way, they've got store credits. I got $300. Last time I turned in my iPhone at the store. right now my iPhone eight is worth 170 bucks at the Apple store. So it's worth about the same as it is worth over on gazelle. Best buy lets you trade it in. Some will take them to Craigslist, Facebook marketplace, E-bay, and others. So there you go. There are some things to do with that phone. Eco ATM, by the way, that's the name of the ATM that's owned by Gazelle trade. Amazon has a trade-in store, but just look, if you do a search for gazelle, you're going to see ads for others as well. Before you do that, let's talk about your privacy here. Before you just throw it away into one of these recycled bins. So this is some suggestions from TechRepublic and I'm, of course, going to add my own little tips into this as well. Veronica Combs wrote this original article. she says that you should unpair all devices. I don't think that matters really. I don't think you have to unpair anything because of what gonna do next is sign out of all services. Now that can be important. If you have an iPhone, what all you really need to do on your iPhone is go to the settings. Once you're there in settings, you're going to go to general and then reset and then select a erase all content. Before you do that, you're going to have to turn off, Find my iPhone because if find my iPhone is turned on not only does it let you find your iPhone, if it's lost or stolen. but What find model iPhone it is Also it makes the phone, so it cannot be erased and then used by a third party. You have to be able to log into the phone using your Apple ID if it has been reset. So turn that off first. Find my iPhone. Then go to settings general, reset, erase all contents. Now it's not really erasing the content on the iPhone and also un-encrypted Android devices. What it does is it destroys the decryption key. That only takes a second or two. Once that's destroyed that phone is now completely reset. It's like a factory reset. There is nothing left on the machine. So on Android phones turn off the factory reset protection. This started a couple of releases to go with Android. You can go to settings, privacy, factory data, reset, and then choose "reset phone." Once you've done that with your phone, either one of them. You are safe to send it off to a recycler. Now, if you're like the campaign staff for Hillary Clinton or her phones themselves, they just took ball-peen hammers to them. Once the investigation had started and it was illegal to destroy evidence. So remember that, if you use a ball-peen hammer, apparently it's legal to destroy it that way. By the way, it'll make it pretty much unrecoverable if you really bash the living daylights out of How could our elections be attacked? Well, they already are according to a report right now in Louisiana.  It may not have been directed at our election infrastructure, but it sure is affecting it.  Here we go. We have some serious problems being reported down in Louisiana. According to Threat Post, the Louisiana National Guard has been called out. Now that's a very big deal. You might ask yourself, why would they call out the National Guard to battle a cyber security problem? That would be a good question, if you were to ask, so let's ask it. The answer to that would be. That the national guard, as well as our military, have been trained. Not all of them, obviously. They have teams that have been trained to do cybersecurity work, and we've done some. I've done some training on that for the FBI InfraGard program, so I have some intimate awareness of how this stuff works. Here's the bottom line, according to the article that was in Reuters. They're saying that there's evidence suggesting a sophisticated hacking group was involved. So what happened now? This is something that happens to businesses. It happens to government agencies. It happens to almost everybody out there. They were attacked. Most of the time these attacks are coming, the more successful ones, in the form of phishing and phishing campaigns.  I've got some training that if your company really wants to do some, phishing training, let me know. I have some excellent training materials and we buy licenses for these from our third party. It just isn't worth it for me to do custom training for all of my companies and we buy these things in blocks and I have extra licenses. We buy them a thousand at a time. So if you'd like to offer some security training for your employees, that's primarily focused on the whole concept of phishing and what they should be doing, what they shouldn't be doing. Social engineering even goes so far as to inbound phone calls. Let me know, just drop me a line. me@craigpeterson.com and I'll be glad to get back to you. We can make some arrangements to help you out there. Cause I know a lot of companies just don't know where to go and you can't afford these expensive training. We have some extra licenses, so we can definitely help you with some of that stuff. So just email me@craigpeterson.com. If you'd like to get a little bit of that training and I can probably do it too for home users, if you're interested, let me know. I'll see if I can't just drop you into one of these classes with one of my business clients, that, again, it's a nice little series of training. I think they do a really good job. I should be able to squeeze some people here and there. So let me know. That's how most of the time bad guys are getting into our networks. They send an email, it looks like it's legitimate. It looks like not only is it legitimate, but it's something you need to open and you need to open it right now. These guys have gotten really good at that sort of thing. Then you click on it and they have your information or they have you running a program for them. Now, many times these programs are called RATS, which is a remote access Trojan. If they can get a RAT onto your network, it's over for you if you don't know it's there. That's why we always suggest and there are a few companies that have these, I like Cisco, but there are some other good ones out there that we work with, that have the ability to detect these Trojans. They're watching them calling home. Where are they going?  A remote access Trojan on your network means they can remotely get onto your network right through your firewall. Right through it and then start doing whatever they want to on their network, anytime they want. That's part of the reason I really strongly urge everyone to use Umbrella and you can find it,  just umbrella.com. We sell the professional version of this for enterprises, but they have free versions as well. That is simple as just changing your DNS server IP addresses. They've got them right there on the homepage. Two, two Oh (860) 722-2222.  It explains it all. If you just go to umbrella.com. The idea is you use the Cisco umbrella software for your DNS server and if there is a Remote Access Trojan when it tries to call home to give the bad guys access to your network, it is foiled in its attempt. It doesn't block it per se, but it's like hopping in an UBER and saying take me to one, two, three main street, and the Uber driver says, I don't know where that is. That's kind of the equivalent here, you ain't getting to one, two, three main street if the car or the driver doesn't know where that is or how to get you there. That's what Umbrella does for you. There are free versions of it. If you're a business you should use one of the higher level ones. What we sell the enterprise version is tastic for businesses because it allows it all to be customized as well. Umbrella has family stuff too, that you can use and the family stuff is great too. You can keep the kids from stumbling on websites that they probably shouldn't be stumbling on, bottom line. This paper that was released, showed that they had done a forensic investigation.  I'm looking at this Reuters story, that goes into it and they found something called the Kim Jong rat. Which is a back door. It is a remote access Trojan and it had a source code leaked. I haven't checked lately on the dark web, but it used to be easy to buy tools like this for 20 bucks. They're not expensive. So problem number one, the bad guys got into Louisiana's government networks. Problem. Number two, they installed a remote access Trojan in the network. Very common. Usually, within a week to two weeks after that been installed, they will have examined your network and they are going to be digging in even deeper. What did they do here? Wow. They installed the Trojan. Now I've talked about this before. We've seen attacks involving EmoTet, it was found also in the networks of these government victims, according to Reuters. The EmoTet Trojan can also load other malware and it's like a worm. It propagates all by itself through the networks, onto the file servers, and onto the desktops and laptops. It also, by the way, is just as happy to spread through a VPN connection. Do you know what I think about VPNs? They have their place. I use them, but as a rule, VPN's not a good idea.  For most very small businesses, not at all. Okay. So this is a problem.  We now have the national guard in Louisiana called in according to Reuters to protect the systems, when we're in the middle of election season. Isn't that fun?  Before we get to that, I want to talk about this email. That concludes that Iran was behind sending these very threatening emails out to Democrats. How could that have happened? What should you be looking for? We got answers. There have been some emails that are very scary out there. There were supposedly from this pro-Trump group called the Proud Boys and they have a very scary message. The messages say that they are in possession of all your information. By the way, that if you really want it and you're willing to pay a few bucks on the dark web you can probably get anybody's information on almost anything, okay. But in there in possession of all your information and they've instructed voters to change their party registration and cast their ballots for Trump and I quote here from the emails, and this is an article from the Washington post. Yes. It says you will vote for Trump on election day, or we will come after you. So pretty, scary stuff. Some of these were in hotly contested swing States in the upcoming presidential election. It's going to be one heck of a season here. Let me tell you. But the U S official said privately that through the post that the operation was not terribly sophisticated and they said it was disclosed before it could have any major impact. The cybersecurity researchers that they spoke with said little about the operation.  They're thinking there wasn't a large scale deception. We'll see what happens. It was first divulged Tuesday by local law enforcement and election officials in Florida and Alaska, and people rightly reported them. For FBI reporting, it is IC three.gov online. If you get an email like this, or you get another threatening email or something that you think the FBI might. Want to know about because they do investigate these things. I am involved in a couple of their investigations, that revolve around China and Chinese espionage. Anything like this, you can report, just go to IC three.gov. I C three as in internet crime complaint center. I C three.gov. Okay.  This is a real problem. In 2016, it took months for the Obama administration to publicly point the finger at Moscow for the hacks and leaks of democratic e-mails despite the intelligence community, having determined Russian culpability early on. So there you go. The Russian story continues at the Washington Post, but this came up from disclosure by the Director of National Intelligence, the DNI, John Ratcliffe.  I like the fact that President Trump has, I'm not going to say strong-armed, but he certainly has convinced our intelligence agencies to be more open with the public. Be more open with business, this FBI InfraGard thing that I'm involved with and did a lot of training, meaning over the years for, it's been around for a very long time. Let me see. 1996 it's been around. So it's a partnership for protection. It's a nonprofit, they have a lot of volunteers like myself that are involved with it. So the cooperation between the fed and business is nothing new. 96 was a long time ago. That would have been what President Clinton, did that, but it actually started in Ohio and one of the field offices, as I recall.  President Trump here has taken this to the next level and we have had disclosures from the NSA. Remember NSA, we used to joke is true for no such agency because it was just so secretive. The NSA has even released information about vulnerabilities in our systems. So it's a huge deal. On Thursday, by the way, Iran, some in the Swiss Envoy in Tehran, and Switzerland is who handles affairs for the US there, because the U S doesn't have an embassy or anything really there in Iran. Other than probably the CIA. They were condemning the baseless accusations of meddling in the U S election.  They said Iran has no interest in interfering in the US election. It's the old habit and there's a new name for it, but the old habit of keeping information from people. You might remember in World War Two, right? If you tell a big lie often enough and you tell it with absolute rigor, people will believe you nowadays, they call it gaslighting and it's been very effective. So that's what Iran is trying to do. So be careful with those emails. So that kind of leads us into this whole thing on spear phishing. If you miss it today, I'm going to have that up on my website, along with IT job wages and pretty much everything else. I try and get it all up on Craig Peterson.com. I send out my weekly newsletter and we've also sent out some that people are really interested in. If you didn't get it this last week, you might just drop me a note. We don't automatically send it to people who sign up new. So if you are going to go to Craig peterson.com/subscribe right now, you'd only get future newsletters. You wouldn't get the past ones. This past weekend I put together a really great newsletter. And it talked about taking your computer in for repairs.  I used this fictitious character called Hunter. Who took his Mac book into a computer store to have it repaired for water damage.  I came up with all of the main things you should do step-by-step before you take a computer in for water damage.  I think if our fictitious character Hunter had done all of this, he wouldn't be in all of this big trouble with this daddy, but I can send that to you if you're interested. We talked about it a little earlier this week as well, but just email me at Craig Peterson dot com. And let me know you want the Hunter email. I'll be glad to send that to you. Also, if you sign up, I am going to be sending you some of my most popular special reports. The stuff you need to know because everybody needs to understand how to do a security reboot. I've got some very in-depth courses, but let's just start you with a simple checklist. I don't want to confuse anybody. So it's easy enough for me to just reply to you when you sign up and send you this stuff I have at this point about 60 different six zero different special reports. So when you ask a question, oftentimes I can just send you a special report on it. Oftentimes if I don't have a special report, I will write one. because if you're interested, other people are entrusted too. So make sure you sign up and you can just do that by going to Craig Peterson.com/subscribe. I'd be glad to do that for you. We also have a couple of things, that I really want to cover quickly here when it comes to the election and election technology. I think as a whole, our election is pretty safe from a technology standpoint, right? I'm not saying anything about people printing their own ballots and sending them in. About gathering ballots about bribing people to vote a certain way. That's not what I'm talking about. Obviously, all of that's easy enough to manipulate. We've seen post carriers who are dropping ballots into gullies and ditches and trash cans. That's one thing. On the other side, there's technology. I am pretty confident that in most of our States here where we are using these paper ballots and they're more like light cardboard, right? What a hundred-pound stock give or take 80-pound where we fill in that oval. Then we take it up to the machine. We put it into the machine, which reads it, optically and tallies. I'm pretty confident those machines are in good shape. One of my sons, who works with me and he's a Cisco fire jumper certified guy. He is also one of these election overseers. He had a look at machines that were shipped off from the Secretary of State's office, and even though some of the seals were broken, The seals that really counted, which are the seals over that little memory card inside that optical reader. Those seals were all intact. So that does my heart. Good. I'm also pretty confident that the people who are working the local polls and tabulating are being supervised and there tend to be Republicans and Democrats and independently minded people who are overseeing the process. So those tallied numbers that are then sent off to the Secretary of State's office, I think are likely to be correct. Then the Secretary of State's office puts them up on their website, and then the Feds are going to look at them. That's where I'm the most worried about it. Emails sent to the Feds with tallies. The feds visiting a hacked website. We just went through the major ransomware and remote access Trojan problem that they're having down in Louisiana. That is a very big problem because that could be a weak point that would be exploited by people who wanted to change our votes.  If you are involved in oversight in this stuff, make sure everything is double checked with the human. Get on the phone, call somebody, call the Secretary of State's office to verify. If you're working at a local polling place, verify that the Secretary of State's office has the right numbers.  Then make sure the right numbers are on the Secretary of State sites website. The rest of this is going to be an absolute disaster. What can I say? Craig Peterson (2): [00:38:49] You've probably heard about spear phishing. I did a little phishing myself online and looked at some of these companies, like Barracuda that is saying that they stopped spear-phishing attacks using AI. Hey, I've never been a fan of Barracuda. Now spear phishing is by definition and this is from CSO online.com,  is the act of sending an email to specific and well-researched targets while purporting it to be a trusted sender. Now you've seen phishing. If you've been on the internet for the last 10 or 20 years, you've probably seen what's called the Nigerian Prince scam. That's an idea that has really perpetrated into every bad guy's mind over the years. The idea is, Hey, if we can send an email out to people and find the gullible people, maybe we can make some money. It's fishing just like you might be out in a boat and you're casting a net to catch a certain type of fish. You hope that the gill size is right on that net and you're always catching some other things, right?  Dolphin, tuna, and some of these other things, but, you don't really care. What we're talking about here with regular phishing, which is spelled P H I S H I N G. We are talking about bad guys casting a huge net. This net is out there to try and catch anybody, anything there will go ahead and get caught in that net. So the Nigerian Prince scam is, Hey, I am a Prince in Nigeria and I need to move my family's $1 million worth of wealth and the only way I can do that and get it out of US banks is if I have a US bank account. So if I could go ahead and I'll transfer in this $10,000 that I need to move. I'll let you keep 2000. So I'm going to transfer 10,000 into your account, and then you're going to wire me $8,000 of that money and you can keep the $2,000. Now, there are many forms of this scam. The Nigerian Prince scam is one of them. Of course what's happened here is they say they wired the money in, and that money may show as pending in your account coming from an overseas account. So you look at, and you say, Oh yeah the $10,000 is there. The Nigerian Prince contacts you and says, Hey, I sent you that $10,000. I really need that 8,000 now, or I'm not going to be able to get my mother out of jail or something along those lines, kidney for my best friend on and on. People look at the account, look at that, there's that $10,000. Now they go to the bank and they wire the $8,000 to this account overseas and off goes your $8,000. When you wire that money out, it is gone. What happens is a few days later, it can take anywhere up to basically two weeks for the bank to clear the money. I know about the check 22 laws, that's all down the tubes. It's eight days to two weeks usually, especially for international transactions and they can take three weeks or longer sometimes. That transaction where he wired the money in is canceled on his side because he's got an inside thing going on with the bank. So you thought you had 10,000 that he had put into your account. You wired out 8,000. Net 2000, that's not so bad. But then a week or two, or maybe even three weeks later, your bank contacts you for insufficient funds because that $10,000 transfer that he was putting into your account, actually never finalized and never really happened. So you have now sent him $8,000 of your own money. So that was the Nigerian phishing scam. There are a lot of scams that are based on that are still out there today. One of the big ones that the FBI just a few months ago arrested a dozen or so people out in California for is a mule scam. I don't know if you saw this latest Clint Eastwood movie. I thought it was pretty good. I've liked Clint Eastwood for a very long time, but he has a movie out called The Mule, came out in 2018. This is a 90-year-old, horticulturalist and Korean war veteran that turned into a drug mule for a Mexican cartel. A very interesting movie, rather believable, a lot of movies that just totally rip apart. but I enjoyed this enough to allow it to be believable. He was hauling money for the Mexican cartel. What these people in California were doing is they were money laundering and that's typically called a mule, they're moving money around. They would get some money from somebody. It much like this scam. I was just talking about the Nigerian Prince scam. So they say, Hey, we're going to wire some money into your PayPal account, for instance, or we're going to route wired into your bank account. And then we want you to use PayPal to send us 90% of the money. In this case, these mules, we're not getting ripped off. They would actually get the $10,000 into the bank account and then they would send $9,000 via PayPal and the bad guys were happy, cause that money is laundered, it came from a more legitimate-looking source. I had some really great training that I did on this for the FBI InfraGard program with some think it was a secret service guy, and they tracked a lot of this down. There were some arrests here a couple of months back. We have to be very careful about this and how we're transferring money around and whether or not we do it for one of these people. Because we're getting tricked. What's happening is these people who are doing the spear phishing are doing research on us. We had a great example of another spear phishing thing. There was a company in the UK that was purchased by a German company. They knew all of the basics about this German company and they got a phone call one day from the CEO of the German company. The CEO told them to wire some funds to this particular bank account, and they did. It sounded like the CEO. They used some technology to impersonate, the guy's voice. They went ahead and wired the money. Then we got Barbara Cochran who is one of the sharks on Shark Tank. Her assistant went ahead and wired, I think it was like $400,000. Another assistant of hers, her executive assistant, caught it, noticed it, because she was CC'd on the response, freaked out. They managed to stop the transfer from happening. So good news on that one. These scams are out there and they're out there big time. I have another one where a lady was going online and doing research about business owners. She found a couple of business owners, actually quite a few. She wanted to narrow it down. So she researched them. She found some of these business owners had Facebook pages. She went to the Facebook pages, and while on those pages, she found those business owners that said that they were going on vacation. She followed them a little bit and found out about where they were going when they were going. Then she managed to trick the email providers. By letting them into the actual email account, which she did in this one case, she got more than $40 million out of the company. She finds out who the CFO is, and then when the owner is on an airplane or is in Bermuda, in cannot be contacted. She then sent off an email to the CFO saying, Hey, we've got this new provider, a supplier we've had for three months, and we've never paid any of their invoices. Here's the invoice on the bottom of the invoice or statement. At the bottom of the statement, it says, or to wire the money to, I need you to wire right now, or we're going to be out of business next month because we've never paid this new supplier that, and it's critical. The CFO wired the money because she had done her research, and that's what it takes. They want to send you an email that is really coded up for you. That fake email that you got represents a huge industry, and that industry is undergoing some amazing changes. They are using artificial intelligence for evil. So we're going to tell you about it right now. These types of phishing are going after a specific person. After doing a bunch of research is called spear-phishing attacks. It's not like those from the mid-nineties where you had the Nigerian Prince out there sending emails and just waiting for anybody to respond to them. These are aimed at someone individual. Here's an example that was in Dark Reading this week, where it says:  Hey, I'll see you at nine for our four-hour call. You're going to kill it today. See the dial in details for the call attached. Cheers, Al. Now, most people would not question the legitimacy of this email. It's kind of laid back. They might've done some research on Al. They might have cracked Al's machine. Somehow gotten a list of all of his contacts and sent this to everybody in his contact list that worked at the same company. This is happening all of the time, everybody. So be careful of this. So you get it. Looks legit. Everything about it smells legit. You're going to open it up because heck I'm going to kill it today in our nice little conference call, right? Yeah. That's what you're going to do. But what could well be happening here is that email attachment that they said, Hey, you need to click on this, could well have a malicious payload. So you have to be careful, and it may not have a malicious payroll payload on it. Maybe it went through the email filters looked pretty good, but maybe the website it's pointing to, or even the file on the website it's pointing to is malicious is a malicious payload. So you've got to be very careful, and you could lose your job in total embarrassment. You could really harm the company by opening this. But it's getting worse. It's going to get even worse right now. There is something called offensive artificial intelligence. This is ushering in a whole new era of phishing attacks that are going away from these more simple ones, the broad phishing attacks, even the spear-phishing attacks, where they do some research about your company.  I've picked up a few clients, unfortunately, that have had these attacks worked successfully. And then we had to put in some really great software to make it even work better for them. Artificial intelligence can go out and start looking around, can figure out what's going on. For instance, blue.ai found a cluster of pneumonia cases around a market in Wuhan, China, it flagged it and found it nine days before the World Health Organization found it.  It's now being used to look at all of this health literature from around the world about COVID 19, the Coronavirus, that we have this novel one and figure out what's going on, and it's even comparing it to DNA. AI can be absolutely wonderful. We use it for monitoring and protecting various types of networks, but inevitably AI has now opened the door for sophisticated cyber attacks. It is really crazy what's going on right now. Cause it's not just these phishing attacks, it's going to augment every type of cyber attack. It's using adaptive decision-making capabilities based on what it finds inside your network. This is scary as heck because once it gets inside your network, think of Skynet, right? That's really what it's going to ultimately be like, maybe not with Androids out there trying to shoot us but trying to steal everything we have. Our email boxes are just going to be used as a stepping stone to get into the business network. The only way to really compete with this is to fight AI with AI. That's what's happening with some bigger companies out there. I searched for my own online, and I got a little upset because I came across an article. At the top an ad for Barracuda. Now, I've known these guys for a long time. They have used open-source, freely available firewall software and other software to build their business and, good for them. There's nothing wrong with it. That's our open source software is for. But there seems to be some misrepresentation that is out there. That's where it gets scary. Right there on their website, Barracuda Sentinel gets AI-based protection from phishing and account takeover. You read down a little bit further block threats already in your email in your inbox. Stay a step ahead of attackers with AI-based threat detection. Stop wasting time managing static security rules. I agree with that one. I think the problem that we have is we're putting a lot of trust in these companies. This is Barracuda. I have had clients who've used it before, and I've had nightmares trying to fix problems with it, but that's me.  I could tell you about them if you wanted. On the other side, there are other systems, like Aruba and Cisco, which I use and sell. These are not a panacea. You have to look at all kinds of things, and you have to be tying them together. We're no longer just dealing with the perimeter. It's no longer just having a good firewall or trying to have a good email filter. Now we really are talking about this Zero Trust model because the bad guys are using AI. It is getting into our systems. We have to ensure that none of the data, what we call in the biz, east-west or west-east traffic, east-west traffic, none of that internal data, internal communications are going somewhere it shouldn't or is being misused. Spear phishing is difficult to detect. It is challenging for AI to detect it. It is much easier for a person to detect it. You need to do training on this. Have your people get some training. I think it's just that important. This whole business email compromise thing that the FBI has been talking about. That's all tied into spear phishing. So we gotta be cautious. Harvard business school has a fascinating article out right now about wages in IT, of course, information technology. We used to call it MIS management information systems, way back when. Hey,  it's bringing back memories of when I was a professor out at Pepperdine University. MIS 422? That class anyway.  Of course, Harvard has been helping people in all kinds of aspects of business, which includes things like the law, IT, and general business, as well. But they've come out with something that has really surprised many people, and it has to do with IT job wages.  I have talked about getting jobs in cybersecurity and how many open jobs there are. The biggest problem people have is getting into cybersecurity and then getting the support they need once they're in cybersecurity. Over just the last few weeks, I've had a couple of listeners who have sent me an email, and I asked a little bit about it. I pointed them in a couple of different directions and even pulled another listener into one of the conversations that have moved into IT security. Exceptional wages were the norm in computers for a very long time. You got paid good money if you were good at IT, whether in management or coding. I made good money for a lot of years as a kernel programmer. Writing the operating system itself and device drivers and implementing internet protocols and designing new protocols. I made one of the world's very first centralized security systems for computers and computer networks. Way back when. So it has been around a while, and it has paid very well. Their jobs have always been stable, the fast-rising within the organization, and made a lot of money. Back in the nineties, you had the dotcom boom. It really bothered me. All of these people started hanging up shingles, saying,  I'm an IT person.  I design websites. I do these, and they've never really had any real experience with IT. To this day, I still bemoan Microsoft products. Because it seems like it's a chimpanzee throwing darts at boards, as far as trying to make sure their systems work and inter-operate and don't even conflict with each other. It's so frustrating. Since I've been on the Unix side for so long and the mainframe side as well, the systems that work well and work consistently. It turns out things have changed a bit now when it comes to the wages paid in information technology. According to Harvard, in all but the largest cities, wage growth in IT jobs has become relatively moderate following the dotcom boom. They're saying that these wages in IT are a lot more like wage patterns that have been seen in the broader STEM space. STEM being science, technology, engineering, and mathematics. So some of those like mathematics are well known for really having terrible wages, right? You got a Ph.D. in math, and wow, you can get a $60,000 a year job. So IT has changed. IT really has leveled out. In some geographical regions where there's fierce competition for IT talent, superstar performers do not earn the same high premium they once did over average performing programmers and other IT professionals. So, in short, IT wages are still relatively high compared to most other occupations, but they have lost what Harvard says is their exceptional luster. Today's IT wage premiums have more to do with where you are working then with rewarding, specific skills that you have for the job. So keep that in mind. If you want to look it up, this paper is called the digital labor market inequality and the decline of IT exceptionalism. It was written by a Harvard business school post-doctoral researcher involved with this at the Martin Marshall professor of business administration. So there's a whole lot to chart the rise and fall of the salaries. They examined 142 of the largest urban areas in the US between 2000 and 2018, and of course, we've had crazy change over those 18 years in IT. We've seen the major rise of the internet and apps, which didn't really exist until the last 10 years, these mobile phone smartphone apps. We've also had two pretty darn big recessions over that period of time. Smaller cities and rural areas, which we're talking about here for most of my listening area, were excluded because of missing data for at least one year. They use the data from the Bureau of labor statistics. They parsed both the broad difference in wages against other lower-paying jobs, STEM professionals. Salaries they found in five places, Silicon Valley, San Francisco, Seattle. Washington DC and New York climbed as there was more competition for talent.  I will interject there that I think that places like New York City are going to see a continued Exodus of IT professionals since there are so many people working from home. That will have an absolutely major impact on all of us IT workers in the rest of the country just didn't get the same bump. Let's see. So they're saying there are two distinct and competing forces. On the one hand, the advantage of tech hubs and urban metropolises, especially the combination of dense population and vigorous innovation, increasingly leads to higher wages making some regions more attractive to skilled talent. On the other hand, this is not Ronald Reagan's, ideally economist, right? On the other hand, wage spread narrowed within advantaged areas, moving the top 10% of IT wages into convergence with other STEM occupations. So they're saying, yeah. The highest paying IT job category they examined, a research scientist, paid between 140 and 170,000 per year in the Bay area. So that's almost a minimum wage out there considering how much it costs for a house, et cetera—45% more than a typical region such as Indianapolis. In contrast, those with biochemists earn about the same wage in the Bay area as they do in Indianapolis on average. Isn't that scary? So it goes on and on. Superstars are not super paid anymore. There are major implications for organizations. If you're looking at IT wages. You need to use the same sort of reasoning you would have used for other skilled labor markets. There are HR people who are used to this. When you get into the rare parts of STEM, how rare are they really? How many openings are there? This is an interesting time, and it's changing more and more because of people working from home and the lockdowns, and you saw France just locked down. I think it was Switzerland just locked down. Belgium apparently is about to lockdown. We've even got Vermont locking down saying, don't go into these two counties in New Hampshire, which is right across the river because of higher COVID rates. Now I'm not going to get into all of it cOVID rates versus death, right? What morbidities and other things, but it's really tough.  People are moving out of the big cities, including IT professionals that are moving way out. We've had a lot of people moving into New Hampshire and other more rural areas. So I suspect IT jobs, as well as other STEM jobs, just are going to continue to go down.  We just talked about AI in the last segment and its effect. I think AI will have a huge effect, on the whole, IT industry, but it will take a few years before it really hits. We were just talking about wages. We're going to talk right now about another reason those wages have gone down, something I've seen personally that has caused harm to my business and that President Trump has been trying to crack down on.  We're going to talk about cloud-native apps too. Hi everybody. Craig Peterson here. Let's get into this guest worker program problem that we have.  It's very upsetting to me because I have lost business. I have lost contracts because of this program. What's been going on, and I took advantage of this program back in the nineties. I had a company with about 40- 50 employees. They were all IT people, and I needed somebody with a particular skillset. I needed a couple of people, and so I hired an attorney and what they did is they worked to show the federal government that we had indeed tried to get people to work for us with these skillsets, and we couldn't find anybody. We needed to bring in a foreign worker, and that was under what's called an H1B visa. We brought them into the country and gave them the jobs and the work, and off they go. Eventually, I ended up paying for the airline tickets to send them on back home because we didn't need them anymore after the whole dot com boom thing. It was a really, quite a mess back then. This whole H1B visa thing has been a real problem. We have some huge consulting companies bringing in thousands of foreign workers in the IT space, tens of thousands of them. They then bid against US American companies. Even though they're supposed to pay prevailing wages, some of these companies, with H1Bs, we're not. What we've ended up with now is a clampdown on this. We bid on, and we had proposals, where there was absolutely no way in heck that we could have matched the price of this other consulting firm using people that were paid about a fifth of what we were paying. We found this out, of course, after the fact. We'd dug into it, trying to figure out why we were the obvious choice, why didn't they use us? President Trump has realized that Americans need jobs in America, first. He has put a bit of pressure onto this whole H1B program. The Daily Caller has an article out this week called Corporations use the STEM shortage myth to abuse tech worker programs that President Trump's announcement really sent shockwaves through the whole tech sector. He suspended most of these guest worker visas through the end of the year. The big guys in tech were all condemning this. You've got Google, Amazon, Facebook, Microsoft, all individually condemn the moratorium. It affects these H1B visas that these big tech firms use to hire the foreign workers they don't really need. Tim Cook, who's the head of Apple, said he was deeply disappointed. Twitter called it short-sighted. Overall, they may reduce the cost of things produced here in the US because they work for much less money. However, The quality isn't there. When I was bringing some people into the country, I looked into their backgrounds and found these people claiming PhDs, and they have their certificates. Yet their background was basically a high school education. It was shocking to me. Shocking. I also found that some of these companies found somebody they were going to hire overseas that would work for cheap money, as I said, a fifth of what we had to pay US wages and crafted the advertisement. They crafted the language in the application to the state department, et cetera, specifically for that person. So they took the resume, and they said, we need someone with these exact qualifications three and a half years in this technology, two years in that technology, a degree in this and degree and that a five years experience in this so that they could then justify it because you post that ad somewhere and Americans are going to look at it and say, no, I don't have that exact qualification. Then they took those applications, and they got the foreign workers that got them to come into the US. They were able to pay them a fraction of what they would normally have to pay a US worker. So that's where I'm coming from. Okay. I think that's pretty obvious these companies, Google, Amazon, Facebook, Microsoft, and these big consulting companies. I mentioned earlier. I didn't give names, but you've probably heard of them. They were all actually worried about their bottom line. That's got to be the sole thing that they were worried about here. Congress created this H1B program back in 1990 to help companies recruit skilled foreign workers, where there was a shortage of qualified workers in the US. But the companies have circumvented the H1B program's safeguards. They're weak. It's crazy. They've been bringing in cheaper and less qualified foreign workers, even when there's plenty of qualified workers here now. When we've got an unemployment rate above 10 or so, it's ridiculous to be bringing these people in. We have people in the US that can take these jobs that they just don't want to pay because they want to pay foreign workers. Now, we had problems before where they were shipping jobs overseas to again unqualified companies. People in the US were forced to train their replacements overseas. You've heard these stories before. I know people that were forced to do this in the tech industry. It's all fake. That's exactly what they're saying right now. Rutgers professor Hal Salzman testified in Congress that this whole idea of science, technology, engineering, mathematics, employee mathematics, employee shortage, this desperate lack of people trained in these fields is a myth. Rutgers professor Salzman said that they graduate about twice as many STEM students as STEM jobs each year. In fact, he said in Minneapolis, Federal reserve bank president Neel Kashkari dismisses the whole concept of STEM shorter worker shortage. Noting that the skills gap is just a euphemism for, we want skills at lower wages. So if there's no shortage of graduates and Americans are willing to do the work, why are these big tech companies so obsessed with H1B visas?  It really comes down to money. Let's see. There's a lot more detail in this article. I think Harvard did a great job Harvard business school on this, but man, we've got to be hiring Americans. We've got to.  I'm great with people coming into the country. I'm an import, right? I've been here for many years. I got my US citizenship, and I think it's wonderful because we need new blood. We need talented blood. We need bright people. Bringing in these people for just cheap labor or outsourcing our jobs because it's a lot cheaper will hurt these companies in the long run. It's hurting the United States in the short run. There's no doubt about it. We are all looking at cloud apps. We probably use them every day. If you've got an iPhone or an Android phone, you're definitely using the cloud. Many businesses have looked at the cloud as a way to save money. Sometimes saving a whole lot of money. A lot of organizations have decided that the cloud is this panacea that they can use. Because of the pandemic, why not shift the worker's functions to the cloud and get rid of our local computer room, data center closet, wherever it is, you might have your file server, et cetera. We have a huge security fallout because of this sprint to set up employees' home offices because it's not just about vulnerable endpoints in-home networks anymore. We've now rushed into adopting cloud-based technologies that have not been secured. It's absolutely nuts. We've got this hybrid physical cloud-based IT infrastructure, and it is altering the landscape. Obviously, it's already altered in 2020, but in 2021 and beyond, it will be just changed forever. So how do you manage it? How do you put up guardrails? Look at what's happened with Amazon web services, their S3 data storage, and how many security breaches there have been with S3. These buckets being wide open. Salesforce, Slack Service now, and others have all had hacks.  We've got a major potential for vulnerabilities because we're tying together systems that were never even designed to be working together in the first place. Certainly weren't designed for security in the first place. So this is just a hint of things that are to come. Okay. It's very easy to mess up cloud security. Now there are several startups right now that are out there trying to address this. Jupiter One came out of stealth mode here. They had $19 million in Series A funding that tells you how much these investors are thinking they're going to make off of this. This service automatically finds and keeps updated online, physical and virtual devices and assets and organization, including cloud-native services. That doesn't seem like it's that hard to do, but man, the misconfiguration of all of the Software as a Service or Cloud Native, is common, and it's mainly due to human error. So if you are using cloud services, I really would suggest that you, if you're a business, assign someone to look into this or you look into it yourself. You're using Dropbox. You're using Microsoft O three 65. What are they doing to secure their data? A lot of these services don't even guarantee that they'll back it up and just had a huge data loss because it wasn't properly backed up, Hey, if you have any questions, just email me@craigpeterson.com. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

covid-19 united states america ceo new york director amazon california new york city google donald trump china uk ai apple social man coronavirus washington france service state americans san francisco phd chinese writing ohio washington dc seattle german russian microsoft dna iphone barack obama mars congress students nasa harvard uber fbi world war ii exodus iran mexican states silicon valley alaska republicans companies louisiana software android cheers defining washington post democrats front mac switzerland minneapolis nigeria cd cia stem federal paypal korean windows belgium indianapolis secretary smartphones ibm cybersecurity new hampshire vermont shocking ip artificial clinton cfo moscow emails hillary clinton bay corporations shark tank nigerians iranians bureau big tech salesforce world health organization salary oftentimes whole foods rats wuhan sensitive ronald reagan rat cisco home depot mis clint eastwood lowe usb reuters craigslist smaller cc nsa feds atm rutgers dropbox dolphin national guard bermuda best buy exceptional wages superstars ransomware vpn umbrella declutter tehran staples thumb tim cook recycle ic mule proud boys spear phishing trojan macs cso skynet u s tech talk kim jong ssd dns aruba pepperdine university s3 cosmetic visas soit trojans guardrails zero trust dni ftp noting barracuda unix national intelligence gazelle daily caller h 1b cloud native lousiana apple id pgp emotet salzman nigerian prince kinko john ratcliffe us american neel kashkari dark reading h1b visa google chromebooks techrepublic craig peterson jupiter one h1bs
Squawk Ident - An Aviation Podcast
040 Virus Warheads, Student Pilots, and Nasty Crashpads

Squawk Ident - An Aviation Podcast

Play Episode Listen Later May 4, 2020 162:16


Recorded on 01 May, 2020 On this, the 40th episode of Squawk Ident, I am so very honored to be joined by some fantastic aviators who have had incredible journeys in their aviation careers. Today, we start the show by catching up with the Squawk Ident Crew. We discuss a few of today’s headlines and how they affect an aviator's career potential. We then dive into many stories from our past, and what we learned from some of our very first experiences in aviation. From GA flight training, to some of our early experiences as flight instructors. We also explore dealing with the adventures of crash pads while sitting on a reserve schedule. So stay with us as we discuss our experiences with you. References: Virus Warhead article Enhanced Cleaning and PPE article US Airlines require passenger face masks article American Suspends all Regional Flying out of MIA article Farewell to Five Fantastic Fleets article Jetstream 32 cockpit photo Thank You for Listening! Don't forget to Subscribe, Like, Support, and Share Please visit Av8rtony.com for all show audio, cover art, Squawk Ident gear, leave audio feedback, and more. Intro and transition music & cover art by Av8rTony and produced at Av8r Sound Studios of Southern California *Jeri D's intro music Jupiter One by YouTube Creator's Studio You can also follow Av8rTony and Squawk Ident Podcast on Twitter, & YouTube. Facebook and Instagram user search Squawk Ident Podcast Squawk Ident can now be heard on iHeart Radio, Spotify, Anchor.FM, Apple Podcasts, Google Podcasts, Breaker, Overcast, PocketCasts, RadioPublic, and more. Copyright © Squawk Ident 2020, All Rights Reserved Copyright © Av8r Sound Studios 2020, All Rights Reserved Squawk Ident by Av8rTony is licensed under a Creative Commons Attribution - 4.0 International License --- Send in a voice message: https://anchor.fm/SquawkIdent/message Support this podcast: https://anchor.fm/SquawkIdent/support

Rockstar Violinist Podcast
Episode 47: Kishi Bashi

Rockstar Violinist Podcast

Play Episode Listen Later Mar 18, 2020 50:16


Kishi Bashi is the pseudonym of singer, multi-instrumentalist, and songwriter Kaoru Ishibashi. Kaoru studied film scoring at Berklee College of Music before becoming a renowned violinist. Kishi Bashi is also the singer and founding member of the New York electronic rock outfit, Jupiter One. In 2011, he started to record and perform as a solo artist, opening for Sondre Lerche, Alexi Murdoch, and of Montreal. He supported of Montreal on their spring 2012 tour. Shortly after Ishibashi debuted his full-length solo album "151a" on Indianapolis label Joyful Noise Recordings, NPR All Songs Considered host Bob Boilen listed Kishi Bashi as his favorite new artist of 2012 noting that he created "a radiant, uplifting soundscape" with songs such as "Bright Whites." Kishi Bashi has since been invited to play in major festivals such as SXSW and Austin City Limits and gone on an extensive US tour with supporting acts such as The Last Bison (from his native Hampton Roads, Virginia). In early 2013, Kishi Bashi held a North American tour across the United States and Canada, continuing in EU and UK in spring 2013. In 2014 Kishi Bashi released his own line of coffee through Jittery Joe's called Royal Daark Blend. Each purchase comes with an exclusive song download. 2016 saw Kishi Bashi release his new album "Sonderlust" live on NPR's All Songs Considered. His latest album Omoiyari was released May 31st and available on all platforms. Learn more at www.kishibashi.com. Rockstar Violinist is the Electric Violin Shop podcast, hosted by Matt Bell and featuring interviews with the most creative and noteworthy electric strings performing and recording artists. Electric Violin Shop is the world leader in amplified strings. Shop at www.electricviolinshop.com or contact us at info@electricviolinshop.com for advice.

Secret Famous
SF 006 - David Heilman, Drummer/Gentleman

Secret Famous

Play Episode Listen Later Feb 6, 2018 126:48


When you are hanging out with David Heilman, it often feels like you are a co-star in a movie that would be entitled How to Be Cool. Though I realize my prose is generally humor-filled, I wrote this in the most serious tone: Dave is the epitome of cool, defining the word in his every move, action, thought and groove that he lays down. Spending half his year in Norway, where the native people gave him a nickname, Herremannen, that translates to ‘the gentleman’ (in a country filled with gentlemen) speaks for itself. Here, he tells his inspiring journey from being a road dog with Jupiter One to suddenly becoming Regina Spektor’s drummer, which led to his long and fortuitous relationship with Sondre Lerche and other wonderful Norwegian musicians. He is a natural storyteller, and ends with some life improvement tips.

Tour D'oeuvres Podcast
Ep. 21 "Clayton Was Really Impressed" w/ Kishi Bashi

Tour D'oeuvres Podcast

Play Episode Listen Later Dec 4, 2017 13:06


In this episode Taber talks with Kishi Bashi (K for short). This interview is from 2 years ago, before the Tour D'oeuvres Podcast was started. It was the first interview Taber had ever done and as a result he and Jojo decided to make the podcast. To help with the interview, Taber recruited his good friend and previous Tour D'oeuvres guest, Drew Kirby. When this interview was recorded K had just released his 3rd studio album, Sonderlust. Taber and Drew were invited to K's studio to listen to and discuss the album. Unique to this episode is the addition of music throughout the conversation.With his laptop handy K took us through some of the songs on the album and explained different aspects of the writing/recording process. He also shared some of his favorite bands and the groups whose music helped inspire the new album. Other topics include K's background in Jazz, his musical career from his first band, Jupiter One, to playing for Regina Spektor, to joining of Montreal and to eventually headlining tours around the country and around the world. For more info about Kishi Bashi go to www.kishibashi.com 

Sounds of Berklee
Kishi Bashi '99, "Manchester?"

Sounds of Berklee

Play Episode Listen Later Jul 15, 2015 4:45


By Adam Olenn February 27, 2012 1999 film scoring alumnus Kishi Bashi has toured with Sondre Lerche, Alexi Murdoch, and of Montreal, not to mention the splash he made with his previous band, Jupiter One. A versatile musician, he has found success in many roles: violinist, composer, producer, and now as multi-lingual singer-songwriter Kishi Bashi. In addition to blending English and Japanese lyrics, Kishi Bashi writes primarily on the violin, and performs all the instruments on his record 151a. A composer with a lush and cinematic sensibility, Kishi Bashi pushes the envelope beyond typical coffeehouse arrangements.

Sounds of Berklee
Jupiter One, "Countdown"

Sounds of Berklee

Play Episode Listen Later May 15, 2015 4:20


By Adam Olenn K Ishibashi and Zac Colwell founded Jupiter One after working together as traveling musicians in the Barnum’s Kaleidoscope orchestra. Many of their tracks have been used in video games, including Madden NFL, NHL 08, Burnout Paradise, and FIFA 08. Other tracks have been used in advertisements for Mazda, the FIFA soccer federation, Payless shoes, and the MLB network. Both their eponymous debut and Sunshower are out on Cordless Recordings, and they opened for Regina Spektor on her 2009 and 2010 tours.

Dry Paint Signs Presents: The Next Round
Episode 28: Fancy Colors

Dry Paint Signs Presents: The Next Round

Play Episode Listen Later Dec 5, 2014 65:47


Zac Colwell and Dave Heilman of Fancy Colors meet me in the Lower East Side at Whynot Coffee & Wine for some glasses of the latter.  The duo formed while both members were in indie rock outfit Jupiter One, when it became apparent that Zac was writing too many songs for one band to keep up with.  Since 2012, Fancy Colors have released an EP and two albums, including this summer's Island of the Dead.  Colwell and Heilman often perform with artists as diverse as Of Montreal, Sondre Lerche, and Nicole Atkins, and they reflect on how playing with different musicians influences them. fancycolorsmusic.com drypaintsigns.com

THE WANDERING WOLF
Episode 52- K Ishibashi (Kishi Bashi)

THE WANDERING WOLF

Play Episode Listen Later Apr 23, 2014 61:51


Episode 52- K Ishibashi (Kishi Bashi). Yoni's band, WHY? and Kishi Bashi share a bill at an Indianapolis club for a night and Yoni and K take the opportunity to meet on the mic for a podcast. They discuss K's beginnings, early influences, playing with Of Montreal, Regina Spektor, and Jupiter One, recording his debut as Kishi Bashi in his parents' attic, and tour parties.

Guy In A Tie Personal Financial Wellness Coach

Think about what you think about. The ingredients are their for a great life, your recipe. That is the topic of today's podcast. Welcome to Skyline and GuyInATie.Enjoy the tracks today. Email GuyInATie@gmail.comsharing music, love of life, teaching and working w/ my students.'Click the subscribe in iTunes button rather than listening on your computer.Good choice!Enjoy these tracks. Listen/RightClick -just click the musical note to listen or the pop-up player!!!If you don't have iTunes.........get it!Hey, do me a favor and show a friend how to subscribe to podcasts and then how to listen to them. Thanks and give me feedback. Bye - Guy In A Tie (www.GuyInATie.com)Tracks for this 'cast, check 'em out, email the bands that you heard them on Guy In A Tie podcast or purchase your fav's.......- Motion City Soundtrack - Calling All Cops.Yellowcard- Believe.Rhythme, Rhyme, Results - Photosynthesis.Lucuna Coil - Closer.Jupiter One - Countdown.

SkylinePodShow.com
Guy 172 The Recipe

SkylinePodShow.com

Play Episode Listen Later Oct 10, 2009


Think about what you think about. The ingredients are their for a great life, your recipe. That is the topic of today's podcast. Welcome to Skyline and GuyInATie.Enjoy the tracks today. Email GuyInATie@gmail.comsharing music, love of life, teaching and working w/ my students.'Click the subscribe in iTunes button rather than listening on your computer.Good choice!Enjoy these tracks. Listen/RightClick -just click the musical note to listen or the pop-up player!!!If you don't have iTunes.........get it!Hey, do me a favor and show a friend how to subscribe to podcasts and then how to listen to them. Thanks and give me feedback. Bye - Guy In A Tie (www.GuyInATie.com)Tracks for this 'cast, check 'em out, email the bands that you heard them on Guy In A Tie podcast or purchase your fav's.......- Motion City Soundtrack - Calling All Cops.Yellowcard- Believe.Rhythme, Rhyme, Results - Photosynthesis.Lucuna Coil - Closer.Jupiter One - Countdown.

Band In Boston
The Flophouse Sessions 96 – Jupiter One

Band In Boston

Play Episode Listen Later Mar 27, 2008


Angly, funky, eminently danceable. From NYC, Jupiter One is one of those bands that I’m surprised I haven’t gotten sick of hearing everywhere. I suppose that’s a good thing. Give it time. And just to further blow your mind, lead singer/guitarist K actually sings while playing a violin on the first track. Listen to it […]

Next Big Hit B-Side - Enhanced AAC Feed
Vol.304 B-Side-October-Dressed Up and Stripped Down-Next Big Hit

Next Big Hit B-Side - Enhanced AAC Feed

Play Episode Listen Later Oct 19, 2007 75:00


Three more live cuts, one album cut, and an interview with each of the four acts we dressed up and stripped down in the A-Side... Jupiter One, Little Horse, The Surefire Way and Jessie Kilguss.

Next Big Hit B-Side - Enhanced AAC Feed
Vol.304 B-Side-October-Dressed Up and Stripped Down-Next Big Hit

Next Big Hit B-Side - Enhanced AAC Feed

Play Episode Listen Later Oct 19, 2007 75:00


Three more live cuts, one album cut, and an interview with each of the four acts we dressed up and stripped down in the A-Side... Jupiter One, Little Horse, The Surefire Way and Jessie Kilguss.

After School Special
ASSisode 11

After School Special

Play Episode Listen Later Jun 1, 2006 31:04


Conservative Sex Cracker: Neil, Daniel and Miriah blow shit up... yup. And also we talk to you about Jamie Kennedy and why Daniel loves him, Daniel tells you a sex story (how embarassing), Miriah talks about a baby shoe, and Neil eats a gunpowder infused rotten olive. We're disgusting. Music from FuriousBall and Jupiter One. Enjoi!