Podcast appearances and mentions of Saddam Hussein

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Copy link to clipboard

Iraqi politician and President

  • 842PODCASTS
  • 1,101EPISODES
  • 45mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Nov 26, 2021LATEST
Saddam Hussein

POPULARITY

20112012201320142015201620172018201920202021


Best podcasts about Saddam Hussein

Latest podcast episodes about Saddam Hussein

Hunk with Mike Bridenstine
THE KEY TO THE CITY (Ep. 145)

Hunk with Mike Bridenstine

Play Episode Listen Later Nov 26, 2021 81:56


Happy Thanksgiving. Kristal Adams, Chanel Ali, Kyle Ayers, Kimberly Clark, and Andy Peters join Brido on the panel. We talk crypto, NFTs, Chris Christie, The Last Duel, Will Smith, and a ton more. Video and extras are on patreon.com/brido.

TheHealthHub
Inside The Great Vaccine Race With Dugald Maudsley

TheHealthHub

Play Episode Listen Later Nov 25, 2021 53:18


In this episode we speak with Dugald Maudsley about his new documentary Inside The Great Vaccine Race. Dugald is an award-winning documentary filmmaker. He is also Creative Director of Infield Fly Productions, a Toronto-based independent that creates blue chip science and natural history documentaries for broadcasters around the world. At Infield Fly Productions, Dugald helped create the popular series Myth or Science for The Nature of Things with David Suzuki, on CBC Television. It has been broadcast in more than 50 countries. Infield Fly Productions has also worked with renowned broadcaster, Sir David Attenborough, to produce the award-winning documentary Jumbo: The Life of an Elephant Superstar for CBC TV and the BBC Television. Dugald has created and produced highly acclaimed series, feature documentaries and one off documentaries. He's currently working on films about the pandemic, climate change and a three part series for Netflix, Sky TV and the CBC on the unique way animals use sound to survive. Over a 30-year career Dugald has been an on-air national reporter and produced documentaries from many of the world's war zones. His interest in real life, personal stories comes from a career of traveling the globe to make films on subjects as varied as the HIV crisis in Africa, the war on heroin in Pakistan, and Saddam Hussein's oppression of the Kurds. He began working as a television journalist in New Zealand before joining the Australia ABC. Here he won the country's highest journalism award for a series on the Russian coup before becoming the executive producer of a prime time documentary series called Foreign Correspondent. In this role Dugald oversaw the production of more than 120 hours of programming that garnered dozens of international awards. In 2006, Dugald created the Gemini-nominated genealogy series Ancestors in the Attic for History Television. During four successful seasons he produced 49 documentaries shot around the world from Canada's high Arctic to West Africa, China and Belarus. Dugald also helped produce a four part series on wildlife trafficking for Nat Geo Wild in the United States, and another documentary on human trafficking for Explorer on the National Geographic Channel. Infield Fly Productions has been honoured with numerous awards including three prestigious Canadian Screen Awards, the Documentary POV Award at the 2021 Yorkton Film Festival and a Jackson Hole Science Media Award. Talking Points: 1. The unprecedented level of collaboration between scientists involved in COVID vaccine research 2. The profound personal sacrifices made by these scientists 3. RNA technology as a game changer in the field of medicine Social Media: https://www.instagram.com/cbcgem https://gem.cbc.ca/ https://www.cbc.ca/natureofthings/episodes/inside-the-great-vaccine-race https://www.cbc.ca/natureofthings/

After All This Time, Always - Life through a Harry Potter prism
Episode 185: Saddam Hussein? The very same...

After All This Time, Always - Life through a Harry Potter prism

Play Episode Listen Later Nov 25, 2021 59:12


We go from Boris to Die Hard to Ghostbusters to songs sung at Charlton matches in the first 15 minutes. Also, nobody exactly covers themselves in glory maths-wise. I mean it is what it is, right? If you're still listening to us, thank you.  Why not say something nice to us? Aattapod@gmail.com

Bridging
#45 Zainab Salbi: Freedom Is an Inside Job

Bridging

Play Episode Listen Later Nov 24, 2021 43:45


Zainab Salbi is an Iraqi American humanitarian, author of several books (Two Worlds: Escape from Tyranny: Growing Up in the Shadow of Saddam), public speaker, and women's rights activist. She is the founder and former executive director of the non-profit humanitarian organization Women for Women International.Zainab has been consistently identified as one of the women impacting the world. People Magazine named her as one of the “25 Women Changing the World”. She was also a guest of Oprah Winfrey at Super Soul Sunday.Her life was impacted by her first-hand experience of war as she lived in Baghdad during the Iran-Iraq war, as well as fear and dictatorship due to her family's close relationship with Saddam Hussein and her father being the private pilot of Saddam. In 1990 Zainab was sent to the USA through an arranged marriage to an Iraqi American living in the US while she was 19 years old.Listen to the Redefined Podcast via https://www.findcenter.com/redefinedFollow Zainab on Instagram @zainabsalbiFind out more about Zainab via http://zainabsalbi.com/Books:-Freedom Is an Inside Job Sign up for a course that Özlem teaches via www.ozkanozlem.com/goYou can find out more about Özlem via her book "The Student", Instagram, Linkedin, Website, and Youtube ChannelFor sponsorship or to book Özlem as your next speaker, send an email to ozlem@ozkanozlem.com. Bridging is a Podcast, hosted and produced by Özlem Özkan. She is the author of the book "The Student", an entrepreneur, freelancer, coach, and teacher. Sign up for a course that Özlem teaches via www.ozkanozlem.com/goYou can find out more about Özlem via her book "The Student", Instagram, Linkedin, Website, and Youtube ChannelFor sponsorship or to book Özlem as your next speaker, send an email to ozlem@ozkanozlem.com. 

Konflikt
PODDTIPS: P1:s Mellanösternpodd om Saddam Hussein

Konflikt

Play Episode Listen Later Nov 22, 2021 1:01


Vi på Konflikt vill tipsa om två avsnitt av P1:s Mellanösternpodd om hur Saddam Hussein styrde Irak med järnhand. Hör om krigen, gasattackerna, livet i gyllene palats och om Saddams brutala slut. Podden för dig som vill veta allt om Mellanöstern. I P1:s Mellanösternpodd intervjuar Johar Bendjelloul Sveriges Radios främsta experter på Mellanöstern. Bland gästerna finns de prisbelönta utrikeskorrespondenterna Cecilia Uddén och Johan Mathias Sommarström och medarbetare från de kurdiska, arabiska och persiska grupperna på Ekot. 

Le Nouvel Esprit Public
Thématique : La guerre de vingt ans, avec Elie Tenenbaum / n°219 / 14 novembre 2021

Le Nouvel Esprit Public

Play Episode Listen Later Nov 14, 2021 58:46


Connaissez-vous notre site ? www.lenouvelespritpublic.frUne émission de Philippe Meyer, enregistrée au studio l'Arrière-boutique le 29 octobre 2021.Avec cette semaine :Elie Tenenbaum, directeur du Centre des Études de Sécurité de l'Institut Français des Relations Internationales.Nicole Gnesotto, titulaire de la chaire « Union Européenne » au CNAM.Lucile Schmid, membre du comité de rédaction de la revue Esprit.Richard Werly, correspondant à Paris du quotidien helvétique Le Temps. Dans « La Guerre de vingt ans », un livre récompensé cette année par le prix du livre Géopolitique, Marc Hecker et Elie Tenenbaum chercheurs à l'Institut français des relations internationales, spécialistes des questions de défense et de terrorisme font la rétrospective de deux décennies de lutte contre le terrorisme, en particulier sur les théâtres étrangers : du début de la « guerre contre le terrorisme » américaine, après les attentats du 11 septembre 2001, à New York, à la fin du contre-terrorisme comme priorité stratégique revendiquée par les États-Unis. En 2021, les États-Unis se sont retirés d'Afghanistan, vingt ans après avoir occupé le pays pour traquer al-Qaïda tandis que la France est engagée dans un conflit comparable au Sahel, où elle tente de résorber la menace djihadiste qui ne cesse pourtant de croître aux quatre coins du désert.L'ouvrage distingue cinq actes. De 2001 à 2006 : après l'onde de choc des attentats du 11-Septembre, les États-Unis réagissent en renversant les Talibans en Afghanistan puis le régime de Saddam Hussein en Irak. De 2006 à 2011, de nouvelles méthodes de contre-insurrection sont mises en œuvre pour tenter de stabiliser ces deux pays. De 2011 à 2014, les djihadistes profitent du printemps arabe pour se relancer. De 2014 à 2017, c'est l'apogée de Daech en zone syro-irakienne. Enfin, le cinquième acte est encore en cours : la menace s'adapte à la perte du sanctuaire levantin. Parmi les enseignements tirés de ces différentes étapes, il ressort que les djihadistes ont une véritable pensée stratégique, savent innover et font preuve d'une remarquable capacité d'adaptation. Toutefois, estiment les auteurs, s'ils demeurent une menace durable et peuvent nous porter des coups et nous faire mal, ils ne constituent pas une menace existentielle. En surréagissant, nous risquons d'entrer dans un processus d'escalade dangereux, nous mettent en garde Hecker et Tenenbaum, rappelant que l'Occident représente à peine 1% des victimes du terrorisme dans le monde, avec en 2020 plus de morts du fait du terrorisme d'ultra-droite que du terrorisme djihadiste. En revanche, en Irak ou en Afghanistan, au Nigéria ou au Mozambique de véritables guerres se déroulent avec des bilans beaucoup plus lourds. Au total, ce sont les musulmans qui, à travers le monde, payent le prix le plus élevé du terrorisme djihadiste.Si Daech a fini par perdre son sanctuaire au Levant, ce groupe n'a pas disparu : il pratique encore la guérilla et son idéologie continue d'attirer des sympathisants. Fin 2018, le Center for Strategic and International Studies comptabilisait entre 100.000 et 230.000 djihadistes actifs dans le monde, soit deux à trois fois plus qu'en 2001. Aujourd'hui, il semble que le centre de gravité du djihadisme soit en train de se déplacer vers le sud. En Afrique, les trois fronts les plus visibles sont la Somalie, la bande sahélo-saharienne et le bassin du Lac Tchad, où sont présents des partisans d'al-Qaïda et de Daech, tandis que d'autres foyers voient le jour comme au nord du Mozambique.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Live Inspired Podcast with John O'Leary
A Veteran's Story of Courage, Combat + Recovery (ep. 410)

Live Inspired Podcast with John O'Leary

Play Episode Listen Later Nov 11, 2021 58:50


One of my favorite groups to partner with each year is FOCUS Marines Foundation. FOCUS does an amazing job providing coping skills, relationship guidance, goal creation and career advancement to wounded veterans struggling with physical ailments, PTSD, traumatic brain injuries and various other challenges.   Among the remarkable servants I've met through this organization is retired Marine Gunnery Sergeant Nick Popaditch. Wounded in action, Nick was struck in the head by an enemy rocket-propelled grenade (RPG), resulting in numerous shrapnel wounds to the head and neck which left him legally blind and partially deaf in his right ear. In honor of Veteran's Day, Nick joins us to share his inspirational story of courage, combat and recovery. SHOW NOTES: Nick Popaditch earned numerous military awards including a Silver Star and Purple Heart. "If you don't quit on us, we will never quit on you." The power of inertia: The greatest difficulty always arises in the beginning. As a drill sergeant, Nick learned that everything was trained in the antithesis. Courage was trained by fear, honor by unfair treatment and commitment by failing. April 9, 2003: An AP photographer captures a striking image seen around the world of Nick smoking a victory cigar in his tank with the haunting statue of Saddam Hussein hovering in the background, immortalizing him forever as "The Cigar Marine." April 6, 2004: During the battle for Fallujah, Nick suffers grievous head wounds that leave him legally blind and partially deaf. Nick and his wife April would sign every letter during his multiple deployments with Romans 1:11: For I long to see you so that I may impart to you some spiritual gift to strengthen you that is, that you and I may be mutually encouraged by each other's faith. Learn more about FOCUS Marines Foundation here. Get a copy of Nick Popaditch's book Once a Marine here. If you enjoyed this episode, Hear from award-winning actor Gary Sinise. As one of America's favorite, heart-led leaders Gary shares lessons on gratitude, service, and how his role in Forrest Gump as Lt. Dan led him to celebrate America's defenders, veterans, and first responders. Listen to Gary Sinise on ep. 128. GYSGT NICK POPADITCH'S LIVE INSPIRED 7 Q. What is the best book you've ever read? A. It Doesn't Take a Hero by General Norman Schwarzkopf. Q. What is a characteristic or trait that you possessed as a child that you wish you still exhibited today? A. Be positively motivated just because. Q. Your house is on fire, all living things and people are out. You have the opportunity to run in and grab one item. What would it be? A. My drill instructor hat called a Campaign Cover. Q. You are sitting on a bench overlooking a gorgeous beach. You have the opportunity to have a long conversation with anyone living or dead. Who would it be?  A. Avigdor Kahalani, an Israeli battalion commander, who saved the entire country of Israel in the Valley of Tears. Q. What is the best advice you've ever received?  A. My father told me to treat people with respect and hold them accountable. Q. What advice would you give your 20-year-old self?  A. I wouldn't change a thing. Every mistake made me who I am now. Q. It's been said that all great people can have their lives summed up in one sentence. How do you want yours to read?  A. I'd like it to say, "the world was a better place because I was here."

BIBLE IN TEN
Acts 2:20

BIBLE IN TEN

Play Episode Listen Later Nov 10, 2021 8:24


Wednesday, 10 November 2021   The sun shall be turned into darkness, And the moon into blood, Before the coming of the great and awesome day of the Lord. Acts 2:20   The words of Peter citing Joel, concerning the pouring out of the Spirit, continue now. This verse exactingly corresponds to the Greek translation of Joel 2:31. The NKJV translates the Hebrew exactly the same as this verse in Acts –   “The sun shall be turned into darkness, And the moon into blood, Before the coming of the great and awesome day of the Lord.”   The words now are also similar in content to various other Old Testament prophecies. A few examples are –   “For the stars of heaven and their constellations Will not give their light; The sun will be darkened in its going forth, And the moon will not cause its light to shine.” Isaiah 13:10   “When I put out your light, I will cover the heavens, and make its stars dark; I will cover the sun with a cloud, And the moon shall not give her light.” Ezekiel 32:7   “‘And it shall come to pass in that day,' says the Lord God, ‘That I will make the sun go down at noon, And I will darken the earth in broad daylight.'” Amos 8:9   Such words indicate phenomena that occur frequently, meaning the eclipse of the sun and the moon or other atmospheric events that obscure them, such as dust storms. This doesn't negate the supernatural, however, because the events are prophesied in advance. Further, what is probably the case is that these events will be specifically over the land of Israel. With these thoughts in mind, Peter's words of this verse begin with, “The sun shall be turned into darkness.”   Here, Luke introduces a word, metastrephó, that signifies to turn about, or corrupt. It is the changing of one thing into another. In Galatians 1:7, Paul uses this word concerning those who “pervert” the gospel. Peter's words indicate that what is normal in the sky will be unusually changed into a state of darkness.   As noted, this is the obscuring of the sun, probably during an eclipse. As solar eclipses can be precisely predicted as to when they will occur, it is as an advanced warning to those who are living in the tribulation period that the fulfillment of the prophecy is at hand. These words, however, could also be fulfilled in the covering of the sky with smoke. Such was the case during the Gulf War when Saddam Hussein set fire to the oil fields of Kuwait. The sun was turned to darkness.   Next, Peter says, “And the moon into blood.” Lunar eclipses will produce a sort of copper-colored effect. In this, it almost appears as blood. The term “blood moon” is thus appropriate. This effect can be realized by other such events, such as the smoke of fires as well. If the world is in a global conflict, which will surely be the case in the tribulation period, much of the planet could have smoky skies. Either way, these events will come, as Peter says, “Before the coming of the great and awesome day of the Lord.”   Here is a word found only this once in Scripture, epiphanés. It signifies that which is manifest, illustrious, or glorious. The corresponding noun, epiphaneia, is used to refer to the second coming of Christ in 2 Thessalonians 2:8 as well as verses in both 1 and 2 Timothy and also Titus.   What Joel prophesied is referred to by Jesus in the synoptic gospels, and it is repeated here by Peter. These great events will precede the day of the Lord. The words of Jesus confirm the prophecy –   “Immediately after the tribulation of those days the sun will be darkened, and the moon will not give its light; the stars will fall from heaven, and the powers of the heavens will be shaken. 30 Then the sign of the Son of Man will appear in heaven, and then all the tribes of the earth will mourn, and they will see the Son of Man coming on the clouds of heaven with power and great glory. 31 And He will send His angels with a great sound of a trumpet, and they will gather together His elect from the four winds, from one end of heaven to the other.” Matthew 24:29-31   There is a time coming when the Lord alone will be manifested in a unique and terrifying way. The world will already be in a state of complete turmoil and confusion, but it will find that nothing they could have imagined would prepare them for what will happen when He returns.   Life application: The Spirit was poured out on believers in Acts 2. The same Spirit is found in believers to this day as a seal and a guarantee for the day of redemption of the Lord's pu  rchased possession (Ephesians 1:13, 14). However, Israel as a nation rejected the Lord Jesus. As such, the nation went into an extended time period of punishment according to that set forth in the Law of Moses.   Seven more years under this law are set forth for Israel (see Daniel 9:24-27). That is the tribulation period, and it is coming at some point. Israel the people are back in the land of Israel. They have been prepared for the coming of this event, and they will eventually call out to God through Christ. What began in Acts, will find its final fulfillment. But before this occurs, the church will be taken home to glory.   Although it is not for us to speculate on the timing of these events, it is proper for us to be aware of the state of the world in which we live, and the state of Israel who are key to all of these prophecies. With the coming of modern technology, plandemics, a falling away of the church from sound doctrine, and the reestablishment of Israel, the days are closing in on the time when such events are likely to occur.   Let us be faithful to continue to share the gospel, and to tell others about the goodness of the Lord before it is too late. We should let others know about the great and awesome Lord who came once to save and who will come again to judge. Let us tell the world about JESUS!   Lord God, how exciting it is to see the world heading towards the fulfillment of prophecies made thousands of years ago. Time has marched on, and as it has, the world has slowly molded itself into matching what was written before. It is exciting to live in such times. Give us wisdom in our conduct through them. Amen.

Who's That Girl? A New Girl Podcast

This podcast covers New Girl Season 2, Episode 23, Virgins, which originally aired on April 30, 2013 and was written by Elizabeth Meriwether and directed by Alec Berg. Here's a quick recap of the episode:After Jess gets a text from Teddy, the guy who took her “flower”, the whole loft (plus Cece) share their stories about how they lost their virginity. We discuss Pop Culture References such as:David Foster Wallace - When Jess was slowly telling her story, Schmidt asked her to get to the point and called her David Foster Wallace. The Rolling Stones vs The Beatles - Cece lost her virginity to Mick Jagger, the front man for The Rolling Stones. Schmidt, however, called out “Beatlemania”. Additional Pop Culture References such as:Dave Matthews / “Daver” - In Schmidt's flashback, Nick was going to a Dave Matthews concert and called himself a “Daver”. Dave Matthews Band is an American rock band, formed in 1991 in Charlottesville, Virginia. As of 2018, the band had sold more than 20 million concert tickets and a combined total of 38 million CDs and DVDs. Dave Matthews Band is known for their concerts where they play songs differently each performance and that is a staple of their live shows since the 1990s.“Stay (I Missed You)” - Lisa Loeb - All throughout Jess's story, this song played over the scenes. "Stay (I Missed You)" is a song by American singer-songwriter Lisa Loeb that was released in May 1994 as the lead single from the original movie soundtrack to Reality Bites. Lyrically, the song deals with a relationship that has recently ended, but the narrator is now regretful.Titanic - During Nick's Dad's business trip, Winston and Nick were watching Titanic on TV. Titanic is a 1997 American epic romance and disaster film directed, written, produced, and co-edited by James Cameron. The film incorporates both historical and fictional aspects of the RMS Titanic and stars Leonardo DiCaprio and Kate Winslet. Annie - In the flashback, Nick's dad mentioned needing alcoholic drinks to get through Annie, which is a Broadway musical based upon the popular Harold Gray comic strip Little Orphan Annie and loosely based on the 1885 poem Little Orphant Annie written by James Whitcomb Riley. The original Broadway production opened in 1977 and ran for almost six years.“Anything Could Happen” - Ellie Goulding - When Jess and Nick get together, the song “Anything Could Happen” by Ellie Goulding is playing. "Anything Could Happen" is a song on English singer/songwriter Ellie Goulding's second album, Halcyon. "Anything Could Happen" peaked at number five on the UK Singles Chart. We also cover the flashback scene of Schmidt and Nick talking about sex in college as our “Schmidtism”. For “Not in the 2020s” we discuss Nick's father getting a prostitute for his son and Jess asking her date to “be a man” again. For “Yes in the 2020s” we celebrate the consent and gender equality talked about on the episode as well as Schmidt and Nick's talk about intercourse. We also give a brief look into Brenda Song (Daisy) and Johnny Pemberton (Jess's prom date), the Guest Stars we feature on this episode.Also in this episode were the following guest stars who we do not discuss in the podcast: Dennis Farina (Walt - Previously discussed in S2E13), Merritt Wever (Elizabeth - Previously discussed in S2E22), Satya Bhabha (Shivrang - Previously discussed in S2E18), Lauren Weedman (Mysteria), Carla Renata (Octopussy), Christopher Wallinger (Teddy), Dylan O'Brien (The Guy), Trixx Ian Vitolo (Murder Victim), Joseph Culp (Mick Jagger Voice), and Nick Adams (Bartender).We also share this article (which contains spoilers) where we learned that while they were hoping for an easy episode, this was the hardest episode due to the costume changes and everyone being in each other's flashbacks. We also talk about how this was Dennis Farina's last role before his death.While not discussed in the podcast, we noted other references in this episode including:Tuxedo vs. Suit - When Nick says he's worn a tuxedo before, Schmidt explains to him that a tuxedo is different from a suit. The main difference is that tuxedos have satin details, are only worn with white shirts that have a wing or turndown collar, and typically are accessorized with a cummerbund, waistcoat, suspenders, and a self-tied bow tie.Iraqi War - Schmidt says it was during the Iraqi War that he learned that men could be on top during sex. The Iraqi War was a United states led invasion of Iraq to overthrow Saddam Hussein and lasted 8 years from 2003 to 2011.Took My Flower – Jess brings about the plot of this episode by talking about Teddy, the man who “took her flower”. This is a euphemism to indicate taking someone's virginity.This episode got an 8.5/10 rating from Kritika whose favorite character was Nick and Kelly rated this episode a 9/10 and her favorite character was Schmidt!Thanks for listening and stay tuned for Episode 24!Music: "Hotshot” by scottholmesmusic.comFollow us on Twitter, Instagram or email us at whosthatgirlpod@gmail.com!Website: https://smallscreenchatter.com/

Craig Peterson's Tech Talk
You Know How To Use Fake Email Addresses to Stay Safe?

Craig Peterson's Tech Talk

Play Episode Listen Later Nov 5, 2021 64:01


If you follow my newsletter, you probably saw what I had in the signature line the last few weeks: how to make a fake identity. Well, we're going to take it a little bit differently today and talk about how to stop spam with a fake email. [Automated transcript follows] [00:00:16] Email is something that we've had for a long time. [00:00:19] I think I've told you before I had email way back in the early eighties, late seventies, actually. So, yeah, it's been a while and I get tens of thousands of email every day, uh, sent to my domain, you know, mainstream.net. That's my company. I've had that same domain name for 30 years and, and it just kinda got out of control. [00:00:46] And so we have. Big Cisco server, that exclusively filters email for us and our clients. And so it cuts down the tens of thousands to a very manageable couple of hundred a day. If you think that's manageable and it gets sort of almost all of the fishing and a lot of the spam and other things that are coming. [00:01:09] But, you know, there's an easier way to do this. Maybe not quite as effective, but allowing you to track this whole email problem and the spam, I'm going over this in some detail in. Coming bootcamp. So make sure we keep an eye on your emails. So you know about this thing again, it's free, right? I do a lot of the stuff just to help you guys understand it. [00:01:34] I'm not trying to, you know, just be June to submission to buy something. This is a boot camp. My workshops, my boot camps, my emails, they are all about informing you. I try to make them the most valuable piece of email. During the week. So we're going to go into this in some detail in this upcoming bootcamp. [00:01:55] But what we're looking at now is a number of different vendors that have gotten together in order to help prevent some of the spam that you might've been in. Uh, I think that's a very cool idea to have these, these sometimes temporary, sometimes fake email addresses that you can use. There's a company out there called fast to mail. [00:02:20] You might want to check them out. There's another company called apple. And you might might want to check them out. I'll be talking about their solution here as well. But the idea is why not just have one email address? And if you're an apple user, even if you don't have the hardware, you can sign up for an apple account. [00:02:42] And then once you have that account, you can use a new feature. I saw. Oh, in, in fact, in Firefox, if you use Firefox at all, when there's a form and it asks for an email address, Firefox volunteers to help you make a fake ish email address. Now I say fake ish, because it's a real email address that forwards to your normal regular. [00:03:10] Email address. And as part of the bootcamp, I'm also going to be explaining the eight email addresses, minimum eight, that you have to have what they are, how to get them, how to use them. But for now you can just go online to Google and this will get you started and do a search for Apple's new hide. My email feature. [00:03:30] This lets you create random email addresses and those email addresses. And up in your regular, uh, icloud.com or me.com, whatever you might have for your email address, address that apple has set up for you. Isn't that cool. And you can do that by going into your iCloud settings. And it's part of their service that are offering for this iCloud plus thing. [00:03:57] And they've got three different fi privacy focused services, right? So in order to get this from apple, so you can create these unlimited number of rather random looking emails, for instance, a blue one to six underscore cat I cloud.com that doesn't tell anybody. Who you are, and you can put a label in there. [00:04:21] What's the name of the website that, that, or the, the, a URL of the website, the two created this email for, and then a note so that you can look at it later on to try new member and that way. Site that you just created it for in this case, this is an article from CNET. They had an account@jamwirebeats.com. [00:04:45] This is a weekly music magazine subscription that they had. And apple generated this fake email address, blue one to 600 score Canada, cobb.com. Now I can hear you right now. Why would you bother doing that? It sounds like a lot of work. Well, first of all, it's not a whole lot of work, but the main reason to do that, If you get an email address to blue cat, one, two6@icloud.com and it's supposedly from bank of America, you instantly know that is spam. [00:05:23] That is a phishing email because it's not using the email address you gave to TD bank. No it's using the email address that it was created for one website jam wire beats.com. This is an important feature. And that's what I've been doing for decades. Email allows you to have a plus sign. In the email address and Microsoft even supports it. [00:05:53] Now you have to turn it on. So I will use, for instance, Craig, plus a Libsyn as an example@craigpeterson.com and now emails that Libson wants to send me. I'll go to Craig. Libsyn@craigpeterson.com. Right? So the, the trick here is now if I get an email from someone other than libs, and I know, wait a minute, this isn't Libsyn, and that now flags, it has a phishing attack, right. [00:06:28] Or at the very least as some form of spam. So you've got to keep an eye out for that. So you got to have my called plus, and if. Pay for the premium upgrade, which ranges from a dollar to $10. Uh, you you've got it. Okay. If you already have an iCloud account, your account automatically gets upgraded to iCloud plus as part of iOS 15, that just came out. [00:06:55] All right. So that's one way you can do it. If you're not an apple fan. I already mentioned that Firefox, which is a browser has a similar feature. Uh, Firefox has just been crazy about trying to protect your privacy. Good for them, frankly. Right? So they've been doing a whole lot of stuff to protect your privacy. [00:07:17] However, there you are. They have a couple of features that get around some of the corporate security and good corporate security people have those features block because it makes it impossible for them to monitor bad guys that might hack your account. So that's another thing you can look at is Firefox. [00:07:37] Have a look@fastmail.com. And as I said, we're going to go into this in some detail in the bootcamp, but fast mail lets you have these multiple email accounts. No, they restricted. It's not like apple where it's an infinite number, but depending on how much you pay fast mail is going to help you out there. [00:07:57] And then if you're interested, by the way, just send an email to me, me. Craig peterson.com. Please use that email address emmy@craigpeterson.com because that one is the one that's monitored most closely. And just ask for my report on email and I've got a bunch of them, uh, that I'll be glad to send you the gets into some detail here, but proton mail. [00:08:22] Is a mail service that's located in Switzerland? No, I know of in fact, a couple of a high ranking military people. I mean really high ranking military people that are supposedly using proton mail. I have a proton mail account. I don't use it that much because I have so much else going on, but the advantage. [00:08:45] Proton mail is it is in Switzerland. And as a general rule, they do not let people know what your identity is. So it's kind of untraceable. Hence these people high up in the department of defense, right. That are using proton mail. However, it is not completely untraceable. There is a court case that a proton man. [00:09:12] I don't know if you'd say they lost, but proton mail was ordered about a month ago to start logging access and provide it for certain accounts so they can do it. They are doing it. They don't use it in most cases, but proton mail is quite good. They have a little free level. Paid levels. And you can do all kinds of cool stuff with proton mail. [00:09:35] And many of you guys have already switched, uh, particularly people who asked for my special report on email, because I go into some reasons why you want to use different things. Now there's one more I want to bring up. And that is Tempa mail it's temp-mail.org. Don't send anything. That is confidential on this. [00:09:57] Don't include any credit card numbers, nothing. Okay. But temp-mail.org will generate a temporary email address. Part of the problem with this, these temporary email address. Is, they are blocked at some sites that really, really, really want to know what your really mail address is. Okay. But it's quite cool. [00:10:22] It's quite simple. So I'm right there right now. temp-mail.org. And I said, okay, give me email address. So gave me one. five04@datacop.com. Is this temporary email, so you can copy that address. Then you can come back into again, temp-mail.org and read your email for a certain period of time. So it is free. [00:10:48] It's disposable email. It's not particularly private. They have some other things, but I wouldn't use them because I don't know them for some of these other features and services. Stop pesky email stop. Some of these successful phishing attempt by having a unique, not just password, but a unique email for all those accounts. [00:11:12] And as I mentioned, upcoming bootcamp, and I'll announce it in my weekly email, we're going to cover this in some detail. Craig peterson.com. Make sure you subscribe to my newsletter. [00:11:25] Well, you've all heard is up. So what does that mean? Well, okay. It's up 33% since the last two years, really. But what does that amount to, we're going to talk about that. And what do you do after you've been ransomed? [00:11:42] Ransomware is terrible. It's crazy. Much of it comes in via email. [00:11:49] These malicious emails, they are up 600% due to COVID-19. 37% of organizations were affected by ransomware attacks in the last year. That's according to Sofos. 37% more than the third. Isn't that something in 2021, the largest ransomware payout, according to business insider was made by an insurance company at $40 million setting a world record. [00:12:21] The average ransom fee requested increased from 5,020 18 to around 200,000 in 2020. Isn't that something. So in the course of three years, it went from $5,000 to 200,000. That's according to the national security Institute, experts estimate that a ransomware attack will occur every 11 seconds for the rest of the year. [00:12:50] Uh, it's just crazy. Absolutely. Crazy all of these steps. So what does it mean? Or, you know, okay. It's up this much is up that much. Okay. Businesses are paying millions of dollars to get their data back. How about you as an individual? Well, as an individual right now, the average ransom is $11,605. So are you willing to pay more than $11,000 to get your pictures back off of your home computer in order to get your. [00:13:27] Work documents or whatever you have on your home computer. Hopefully you don't have any work information on your home computer over $11,000. Now, by the way, most of the time, these ransoms are actually unaffiliate affair. In other words, there is a company. That is doing the ransom work and they are pain and affiliate who are the, the affiliate in this case. [00:13:55] So the people who infected you and the affiliates are making up to 80% from all of these rents. Payments it's crazy. Right? So you can see why it's up. You can just go ahead and try and fool somebody into clicking on a link. Maybe it's a friend of yours. You don't productively like some friend, right. And you can go ahead and send them an email with a link in it. [00:14:20] And they click the link and it installs ransomware and you get 80% of them. Well, it is happening. It's happening a lot. So what do you do? This is a great little article over on dark reading and you'll see it on the website. The Craig peterson.com. But this article goes through. What are some of the steps it's by Daniel Clayton? [00:14:48] It's actually quite a good little article. He's the VP of global security services and support over at bit defender bit defender is. Great, uh, software that you've got versions of it for the Mac. You've got versions four of it for window. You might want to check it out, but he's got a nice little list here of things that you want to do. [00:15:13] So number one, Don't panic, right? Scott Adams don't panic. So we're worried because we think we're going to lose our job June. Do you know what? By the way is in the top drawer of the majority of chief information, security officers, two things. Uh, w one is their resignation letter and the second one is their resume because if they are attacked and it's very common and if they get in trouble, they are leaving. [00:15:47] And that's pretty common too. Although I have heard of some companies that understand, Hey, listen, you can't be 100% effective. You got to prioritize your money and play. It really is kind of like going to Vegas and betting on red or black, right? 50, 50 chance. Now, if you're a higher level organization, like our customers that have to meet these highest compliance standards, these federal government regulations and some of the European regulations, even state regulations, well, then we've got to keep you better than 99% safe and knock on wood over the course of 30 years. [00:16:27] That's a long I've been doing. 30 years. We have never had a single customer get a S uh, and. Type of malware, whether it is ransomware or anything else, including one custom company, that's a multinational. We were taking care of one of their divisions and the whole company got infected with ransomware. [00:16:50] They had to shut down globally for. Two weeks while they tried to recover everything, our little corner of the woods, the offices that we were protecting for that division, however, didn't get hit at all. So it is possible, right? I don't want you guys to think, man. There was nothing I can do. So I'm not going to do anything. [00:17:14] One of the ladies in one of my mastermind groups basically said that, right? Cause I was explaining another member of my mastermind group. Got. And I got hit for, I think it turned out to be $35,000 and, you know, that's a bad thing. Plus you feel just so exposed. I've been robbed before, uh, and it's just a terrible, terrible feeling. [00:17:37] So he was just kind of freaking out for good. But I explained, okay, so here's what you do. And she walked away from it thinking, well, there's nothing I can do. Well, there are things you can do. It is not terribly difficult. And listening here, getting my newsletter, going to my bootcamps and the workshops, which are more involved, you can do it. [00:18:03] Okay. It can be done. So I don't want. Panic. I don't want you to think that there's zero. You can do so that's number one. If you do get ransomware, number two, you got to figure out where did this come from? What happened? I would change this order. So I would say don't panic. And then number two is turn off the system that got rants. [00:18:29] Turn it off one or more systems. I might've gotten ransomware. And remember that the ransomware notification does not come up right. When it starts encrypting your data. It doesn't come up once they've stolen your data. It comes up after they have spread through your organization. So smart money would say shut off every computer, every. [00:18:56] Not just pull the plug. I w I'm talking about the ethernet cable, right? Don't just disconnect from wifi. Turn it off. Immediately. Shut it off. Pull the plug. It might be okay. In some cases, the next thing that has to happen is each one of those machines needs to have its disc drive probably removed and examined to see if it has. [00:19:18] Any of that ransomware on it. And if it does have the ransomware, it needs to get cleaned up or replaced. And in most cases we recommend, Hey, good time. Replace all the machines, upgrade everything. Okay. So that's the bottom line. So that's my mind. Number two. Okay. Um, he has isolated and save, which makes sense. [00:19:40] You're trying to minimize the blast radius. So he wants you to isolate him. I want you to turn them off because you do not want. Any ransomware that's on a machine in the process of encrypting your files. You don't want it to keep continuing to encrypting. Okay. So hopefully you've done the right thing. [00:20:00] You are following my 3, 2, 1 backup schedule that I taught last year, too, for free. For anybody that attended, hopefully you've already figured out if you're going to pay. Pay. I got to say some big companies have driven up the price of Bitcoin because they've been buying it as kind of a hedge against getting ransomware so they can just pay it right away. [00:20:25] But you got to figure that out. There's no one size fits all for all of this. At over $11,000 for an individual ransom, uh, this requires some preparation and some thought stick around, got a lot more coming up. Visit me online, Craig Peterson.com and get my newsletter along with all of the free trainings. [00:20:52] Well, the bad guys have done it again. There is yet another way that they are sneaking in some of this ransomware and it has to do with Q R codes. This is actually kind of clever. [00:21:08] By now you must've seen if not used QR codes. [00:21:12] These are these codes that they're generally in a square and the shape of a square and inside there's these various lines and in a QR code, you can encode almost anything. Usually what it is, is a URL. So it's just like typing in a web address into your phone, into your web browser, whatever you might be using. [00:21:35] And they have been very, very handy. I've used them. I've noticed them even showing up now on television ad down in the corner, you can just scan the QR code in order to apply right away to get your gin Sioux knives. Actually, I haven't seen it on that commercial, but, uh, it's a different one. And we talked last week about some of these stores that are putting QR codes in their windows. [00:22:02] So people who are walking by, we even when the store is closed, can order stuff, can get stuff. It's really rather cool. Very nice technology. Uh, so. There is a new technique to get past the email filters. You know, I provide email filters, these big boxes, I mean, huge machines running Cisco software that are tied into, uh, literally billion end points, plus monitoring tens of hundreds of millions of emails a day. [00:22:39] It's just huge. I don't even. I can ha can't get my head around some of those numbers, but it's looking at all those emails. It is cleaning them up. It's looking at every URL that's embedded in an email says, well, is this a bad guy? It'll even go out and check the URL. It will look at the domain. Say how long has this domain been registered? [00:23:01] What is the spam score overall on the domain? As well as the email, it just does a whole lot of stuff. Well, how can it get around a really great tight filter like that? That's a very good question. How can you and the bottom line answer is, uh, how about, uh, using the QR code? So that's what bad guys are doing right now. [00:23:26] They are using a QR code in side email. Yeah. So the emails that have been caught so far by a company called abnormal security have been saying that, uh, you have a missed voicemail, and if you want to pick it up, then scan this QR. It looks pretty legitimate, obviously designed to bypass enterprise, email gateway scans that are really set up to detect malicious links and attachments. [00:24:01] Right? So all of these QR codes that abnormal detected were created the same day they were sent. So it's unlikely that the QR codes, even that they'd been detected would have been previously. Poured it included in any security blacklist. One of the good things for these bad guys about the QR codes is they can easily change the look of the QR code. [00:24:26] So even if the mail gateway software is scanning for pictures and looking for a specific QR codes, basically, they're still getting. So the good news is the use of the QR codes in these types of phishing emails is still quite rare. We're not seeing a lot of them yet. We are just starting to see them, uh, hyperlinks to phishing sites, a really common with some of these QR codes. [00:24:58] But this is the first time we've seen an actor embed, a functional QR code into an email is not. Now the better business bureau warned of a recent uptick, ticking complaints from consumers about scams involving QR codes, not just an email here, but because these codes can't really be read by the human eye at all. [00:25:21] The attackers are using them to disguise malicious links so that you know, that vendor that I talked about, that retail establishment that's using the QR codes and hoping people walking by will scan it in order to get some of that information. Well, People are going to be more and more wary of scanning QR codes, right? [00:25:43] Isn't that just make a lot of sense, which is why, again, one of the items in our protection stack that we use filters URLs. Now you can get a free. The filter and I cover this in my workshop, how to do it, but if you go to open DNS, check them out, open DNS, they have a free version. If you're a business, they want you to pay, but we have some business related ones to let you have your own site to. [00:26:15] Based on categories and all that sort of stuff, but the free stuff is pretty generalized. They usually have two types, one for family, which blocks the stuff you might think would be blocked. Uh, and other so that if you scan one of these QR codes and you are using open DNS umbrella, one of these others, you're going to be much, much. [00:26:39] Because it will, most of the time be blocked because again, the umbrella is more up-to-date than open DNS is, but they are constantly monitoring these sites and blocking them as they need to a mobile iron, another security company. I conducted a survey of more than 4,400 people last year. And they found that 84% have used a QR code. [00:27:05] So that's a little better than I thought it was. Twenty-five percent of them said that they had run into situations where a QR code did something they did not expect including taking them to a malicious website. And I don't know, are they like scanning QR codes in the, in the men's room or something in this doll? [00:27:24] I don't know. I've never come across a QR code. That was a malicious that I tried to scan, but maybe I'm a little more cautious. 37% were. Saying that they could spot a malicious QR code. Yeah. Yeah. They can read these things while 70% said they'd be able to spot a URL to a phishing or other malicious website that I can believe. [00:27:50] But part of the problem is when you scan a QR code, it usually comes up and it says, Hey, do you want to open this? And most of that link has invisible is, is not visible because it is on your smartphone and it's not a very big screen. So we'll just show you the very first part of it. And the first part of it, it's going to look pretty darn legit. [00:28:14] So again, that's why you need to make sure you're using open DNS or umbrella. Ideally, you've got it installed right at your edge at your router at whoever's handling DHCP for your organization. Uh, in the phishing campaign at normal had detected with using this QR code, uh, code they're saying the attackers had previously compromised, some outlook, email accounts, belonging to some legitimate organizations. [00:28:43] To send the emails with malicious QR codes. And we've talked about that before they use password stuffing, et cetera. And we're covering all of this stuff in the bootcamp and also, well, some of it in the bootcamp and all of this really in the workshops that are coming up. So keep an eye out for that stuff. [00:29:03] Okay. Soup to nuts here. Uh, it's a, uh, it's a real. Every week, I send out an email and I have been including my show notes in those emails, but I found that most people don't do anything with the show notes. So I'm changing, I'm changing things this week. How some of you have gotten the show notes, some of you haven't gotten the show notes, but what I'm going to be doing is I've got my show notes on my website@craigpeterson.com. [00:29:35] So you'll find them right. And you can get the links for everything I talk about right here on this. I also now have training in every one of my weekly emails. It's usually a little list that we've started calling listicles and it is training on things you can do. It is. And anybody can do this is not high level stuff for people that are in the cybersecurity business, right. [00:30:07] Home users, small businesses, but you got to get the email first, Craig peterson.com and signup. [00:30:14] California is really in trouble with these new environmental laws. And yet, somehow they found a major exception. They're letting the mine lithium in the great salt and sea out in California. We'll tell you why. [00:30:31] There's an Article in the New York times. And this is fantastic. It's just a incredible it talking about the lithium gold rush. [00:30:43] You already know, I'm sure that China has been playing games with some of these minerals. Some of the ones that we really, really need exotic minerals that are used to make. Batteries that are used to power our cars. And now California is banning all small gasoline engine sales. So the, what is it? 55,000 companies out in California that do lawn maintenance are going down. [00:31:13] To drive those big lawnmowers around running on batteries. They're estimating it'll take 30 packs battery packs a day. Now, remember California is one of these places that is having rolling blackouts because they don't have. Power, right. It's not just China. It's not just Europe where they are literally freezing people. [00:31:37] They did it last winter. They expect to do it more. This winter, since we stopped shipping natural gas and oil, they're freezing people middle of winter, turning off electronics. California, at least they're not too likely to freeze unless they're up in the mountains in California. So they don't have enough power to begin with. [00:31:57] And what are they doing there? They're making it mandatory. I think it was by 2035 that every car sold has to be electric. And now they have just gotten rid of all of the small gasoline engines they've already got. Rolling blackouts, come on. People smarten up. So they said, okay, well here's what we're going to do. [00:32:20] We need lithium in order to make these batteries. Right. You've heard of lithium-ion batteries. They're in everything. Now, have you noticed with lithium batteries, you're supposed to take them to a recycling center and I'm sure all of you do. When your battery's dead in your phone, you take it to a recycling center. [00:32:39] Or if you have a battery that you've been using in your Energizer bunny, and it's a lithium battery, of course you take it to the appropriate authorities to be properly disposed of because it's toxic people. It is toxic. So we have to be careful with this. Well, now we're trying to produce lithium in the United States. [00:33:06] There are different projects in different parts of the country, all the way from Maine through of course, California, in order to try and pull the lithium out of the ground and all. Let me tell you, this is not very green at all. So novel. Peppa Northern Nevada. They've started here blasting and digging out a giant pit in this dormant volcano. [00:33:38] That's going to serve as the first large scale, lithium mine in the United States and more than a decade. Well, that's good. Cause we need it. And do you know about the supply chain problems? Right. You've probably heard about that sort of thing, but that's good. This mine is on least federal lands. What does that mean? [00:33:59] Well, that means if Bernie Sanders becomes president with the flick of a pen, just like Joe Biden did on his first day, he could close those leads to federal lands. Yeah. And, uh, we're back in trouble again, because we have a heavy reliance on foreign sources of lithium, right. So this project's known as lithium Americas. [00:34:25] There are some native American tribes, first nation as they're called in Canada. Uh, ranchers environmental groups that are really worried, because guess what? In order to mine, the lithium, and to do the basic processing onsite that needs to be done, they will be using. Billions of gallons of groundwater. [00:34:48] Now think of Nevada. Think of California. Uh, you don't normally think of massive lakes of fresh water to. No. Uh, how about those people that are opposed to fracking? Most of them are opposed to fracking because we're pumping the water and something, various chemicals into the ground in order to crack the rock, to get the gas out. [00:35:11] Right. That's what we're doing. They don't like that. But yet, somehow. Contaminating the water for 300 years and leaving behind a giant mound of waste. Isn't a problem for these so-called Greenies. Yeah. A blowing up visit quote here from max Wilbert. This is a guy who has been living in a tent on this proposed mine site. [00:35:38] He's got a. Lawsuits that are going, trying to block the project. He says blowing up a mountain. Isn't green, no matter how much marketing spend people put on it, what have I been saying forever? We're crazy. We are insane. I love electric cars. If they are coolest. Heck I would drive one. If I had one, no problem. [00:35:57] I'm not going to bother to go out and buy one, but, uh, yeah, it's very cool, but it is anything but green. Electric cars and renewable energy are not green, renewable energy. The solar and the wind do not stop the need for nuclear plants or oil or gas burners, or cold burners, et cetera. Because when the sun isn't shining, we still need electricity. [00:36:29] Where are we getting to get it? When the wind isn't blowing or when the windmills are broken, which happens quite frequently. Where are we going to get our power? We have to get it from the same way we always have from maybe some, uh, some old hydro dams. Right. But really we got to start paying a lot more attention to nuclear. [00:36:53] I saw a couple of more nuclear licenses were issued for these six gen nuclear plants that are green people. They are green, but back to our lithium mine. They're producing cobalt and nickel as well as the lithium. And they are ruined this to land, water, wildlife, and. Yeah. Yeah, absolutely. Uh, we have had wars over gold and oil before and now we're looking at minerals. [00:37:27] In fact, there's a race underway between the United States, China, Europe, Russia, and others, looking for economic and technological dominance for decades to come by grabbing many of these precious minerals. So let's get into this a little bit further here. Okay. So they're trying to do good, but really they're not green. [00:37:53] They're they're not doing good. And this is causing friction. Okay. Um, first three months of this year, us lithium miners raise nearly three and a half billion dollars from wall street, seven times the amount raised in the last six months or 36 months. Yeah, huge. Money's going into it. Okay. They're going after lithium from California's largest leak, the Salton sea. [00:38:23] Yeah. Yeah. So they're going to use specially coded beads to extract lithium salt from the hot liquid pumped up from an aquifer more than 4,000 feet below the surface. Hmm. Sounds like drilling aren't they anti drilling to the self-contained systems connected to geothermal power plants generating emission free electricity. [00:38:44] Oh, that's right. They don't have a problem with the ring of fire in California with earthquakes and things. Right. Ah, yeah. Drilling on that and using the, the, uh, It's not going to be a problem. Uh, so, um, yeah, so that you're hoping to generate revenue needed to restore the lake fouled by toxic runoff from area farms for decades. [00:39:08] So they're looking to do more here. Lithium brine, Arkansas, Nevada, North Dakota, as I mentioned already, Maine. Uh, they're using it in every car that's out there, smartphones, et cetera. Uh, the us has some of the world's largest reserves, which is, I guess, a very good thing. Right? A silver peak mine in Nevada is producing 5,000 tons a year, which is less than 2% of the world's supply. [00:39:40] Uh, this is just absolutely amazing going through this. Okay. Um, I know bomb administration official, Ben Steinberg said right now, China decided to cut off the U S for a variety of reasons. We're in trouble. Yeah. You think. Uh, the another thing here in the New York times article is from this rancher and it's a bit of a problem. [00:40:06] He's got 500 cows and calves. Roaming is 50,000 acres and Nevada's high desert is going to have to start buying feed for. This local, mine's going to reach about 370 feet. Uh, here's another kind of interesting thing. This mine one mine is going to consume 3,200 gallons of water. Per minute. Yeah. In, in Baron Nevada, I I'm looking at a picture of this and it is just dead sagebrush. [00:40:37] Oh my gosh. So they're expecting the water table will drop at least 12 feet. They're going to be producing 66,000 tons of battery grade, lithium carbonate a year. But, uh, here we go. They're digging out this mountain side and they're using 5,800 tons of so FERC acid per day. Yeah. They're mixing clay dug out from the ma from the Mount side with 5,800 tons of clay of sulfuric acid. [00:41:10] I should say every day, they're also consuming 354 million cubic yards. Of mining waste. I'm not consuming creating 354 million cubic yards of mining waste loaded with, uh, discharged from this sulfuric acid treatment and may contain. Modest amounts of radioactive uranium. That's according to the permit documents, they're expecting it'll degrade quote unquote 5,000 acres of winter range used by the antelope herd, the habitat of the Sage groves nesting areas for Eagles. [00:41:48] It just goes on and on. It is not. BLM is not, of course stumbled the bureau of land management, but I guess both PLMs are not, and this is a real problem and the tribes are trying to stop it. The farmers are trying to stop it, but Hey, California needs more lithium batteries for their electric cars. [00:42:10] They're electric lawn mowers, leaf blowers, et cetera. So we've got to get that lithium. We've got to get it right away, uh, in order for their green appetite in. Hey get some sanity. Craig peterson.com. Sign up for my newsletter right now. [00:42:28] Doing a little training here on how to spot fake log-in pages. We just covered fishing and some real world examples of it, of some free quiz stuff that you can use to help with it. And now we're moving on to the next. [00:42:44] The next thing to look for when it comes to the emails and these fake log-in pages is a spelling mistake or grammatical errors. [00:42:56] Most of the time, these emails that we get that are faking emails are, have really poor grammar in them. Many times, of course the, the commas are in the wrong place, et cetera, et cetera. But most of us weren't English majors. So we're not going to pick that up myself included. Right. That's why I use Grammarly. [00:43:17] If you have to ever write anything or which includes anything from an email or a document, uh, you, you probably want to get Grammarly. There's a few out there, but that's the one I liked the best for making sure my grammar. So a tip, I guess, to the hackers out there, but the hackers will often use a URL that is very close to. [00:43:41] Where are you want to go? So they might put a zero in place of an O in the domain, or they might make up some other domain. So it might be a amazon-aws.com or a TD bank dash. Um, account.com, something like that. Sometimes the registrars they'll catch that sort of thing and kill it. Sometimes the business that they are trying to fake will catch it and let them know as well. [00:44:16] There's companies out there that watch for that sort of thing. But many times it takes a while and it's only fixed once enough people have reported it. So look at the URL. Uh, make sure it's legitimate. I always advise that instead of clicking on the link in the email, try and go directly to the website. [00:44:38] It's like the old days you got a phone call and somebody saying, yo, I'm from the bank and I need your name and social security number. So I can validate the someone broke into your account. No, no, no, no, no, they don't. They don't just call you up like that nowadays. They'll send you a message in their app. [00:44:55] That's on your smart. But they're not going to call you. And the advice I've always given is look up their phone now. And by the way, do it in the phone book, they remember those and then call them back. That's the safest way to do that sort of thing. And that's true for emails as well. If it's supposedly your bank and it's reporting something like someone has broken into your account, which is a pretty common technique for these fissures, these hackers that are out there, just type in the bank URL as you know, it not what's in the email and. [00:45:32] There will be a message there for you if it's legitimate, always. Okay. So before you click on any website, Email links, just try and go directly to the website. Now, if it's one of these deep links where it's taking new Jew, something specific within the site, the next trick you can play is to just mouse over the link. [00:45:57] So bring your mouse down to where the link is. And typically what'll happen is at the bottom left of your. Your screen or of the window. It'll give you the actual link. Now, if you look at some of them, for instance, the emails that I send out, I don't like to bother people. So if you have an open one of my emails in a while, I'll just automatically say, Hey, I have not opened them in a while. [00:46:25] And then I will drop you off the list. Plus if you hit reply to one of my newsletters, my show notes, newsletters. That's just fine, but it's not going to go to me@craigpeterson.com and some people you listeners being the best and brightest have noticed that what happens is it comes up and it's some really weird URL that's so I can track who responded to. [00:46:53] And that way I can just sit down and say, okay, now let me go through who has responded? And I've got a, kind of a customer relationship management system that lets me keep track of all of that stuff so that I know that you responded. I know you're interacting, so I know I'm not bothering you. Right. And I know I need to respond to. [00:47:13] Well much the same thing is true with some of these links. When I have a link in my newsletter and I say, Hey, I'm linking to MIT's article. It is not going to be an MIT. Because again, I want to know what are you guys interested in? So anytime you click on a link, I'll know, and I need to know that, so I know why, Hey, wait a minute. [00:47:37] Now, 50% of all of the people that opened the emails are interested in identifying fake login pages. So what do I do? I do something like I'm doing right now. I go into depth on fake login. Pages. I wouldn't have known that if I wasn't able to track it. So just because the link doesn't absolutely look legit doesn't mean it isn't legit, but then again, if it's a bank of it involves financial transactions or some of these other things be more cautious. [00:48:13] So double-check for misspellings or grammatical errors. Next thing to do is to check the certificate, the security certificate on the site. You're on this gets a little bit confusing. If you go to a website, you might notice up in the URL bar, the bar that has the universal resource locator, that's part of the internet. [00:48:40] You might've noticed. There's a. And people might've told you do check for the lock. Well, that lock does not mean that you are saying. All it means is there is a secure VPN from your computer to the computer on the other side. So if it's a hacker on the other side, you're sending your data securely to the hacker, right? [00:49:07] That's not really going to do you a whole lot of good. This is probably one of the least understood things in the whole computer security side, that connect. Maybe secure, but is this really who you think it is? So what you need to do is click on their certificate and the certificate will tell you more detail. [00:49:32] So double-check their certificate and make sure it is for the site. You really. To go to, so when it's a bank site, it's going to say, you know, the bank is going to have the bank information on it. That makes sense. But if you go for instance on now, I'm going to throw a monkey wrench into this whole thing. [00:49:51] If you go to Craig peterson.com, for instance, it's going to say. Connection is secure. The certificate is valid, but if you look at their certificate and the trust in the details, it's going to be issued by some company, but it's going to just say Craig peterson.com. It's not going to give a business name like it would probably do for a bank. [00:50:17] So you know, a little bit of a twist to it, but that's an important thing. Don't just count on the lock, make sure that the certificate is for the place you want to contact. Last, but not least is multi-factor authentication. I can't say this enough. If the bad guys have your username or email address and your password for a site, if you're using multifactor authentication, they cannot get. [00:50:56] So it's going to prevent credential stuffing tactics, or they'll use your email and password combinations that have already been stolen for mothers sites to try and hack in to your online profile. So very important to set up and I advise against using two factor authentication with your, just a cell phone, as in a text message SMS, it is not secure and it's being hacked all of the time. [00:51:26] Get an authorization. App like one password for instance, and you shouldn't be using one password anyways, for all of your password. And then Google has a free one called Google authenticator. Use those instead of your phone number for authentication. [00:51:43] I've been warning about biometric databases. And I, I sat down with a friend of mine who is an attorney, and he's using this clear thing at the airport. I don't know if you've seen it, but it's a biometric database. What are the real world risks? [00:52:00] Well, this " Clear"company uses biometrics. It's using your eye. Brent, if you will, it's using your Iris. [00:52:08] Every one of us has a pretty darn unique Iris, and they're counting on that and they're using it to let you through TSA very quickly. And this attorney, friend of mine thinks it's the best thing since sliced bread, because he can just. Right on through, but the problem here is that we're talking about biometrics. [00:52:30] If your password gets stolen, you can change it. If your email account gets hacked, I have another friend who his account got hacked. You can get a new email account. If your Iris scan that's in this biometric database gets stolen. You cannot replace your eyes unless of course you're Tom cruise and you remember that movie, right. [00:53:00] And it's impossible to replace your fingerprints. It's possible to replace your face print. Well, I guess you could, to a degree or another, right. Some fat injections or other things. Could it be done to change your face sprint, but these Iris scans fingerprints and facial images are something I try not to provide any. [00:53:27] Apple has done a very good job with the security of their face print, as well as their fingerprint, because they do not send any of that information out directly to themselves, or do any database at all. They are stored only on the device itself. And they're in this wonderful little piece of electronics that cannot be physically compromised. [00:53:56] And to date has not been electronically compromised either. They've done a very, very good. Other vendors on other operating systems like Android, again, not so much, but there are also databases that are being kept out there by the federal government. I mentioned this clear database, which isn't the federal government, it's a private company, but the federal government obviously has its fingers into that thing. [00:54:27] The office of personnel. Uh, for the federal government, they had their entire database, at least pretty much the entire database. I think it was 50 million people stolen by the red, Chinese about six years ago. So the communists. Uh, copies of all of the information that the officer personnel management had about people, including background checks and things. [00:54:55] You've probably heard me talk about that before. So having that information in a database is dangerous because it attracts the hackers. It attracts the cybercriminals. They want to get their hands on it. They'll do all kinds of things to try and get their hands. We now have completely quit Afghanistan. [00:55:19] We left in a hurry. We did some incredibly stupid things. I just, I can't believe a president of the United States would do what was done here. And now it's been coming out that president Biden completely ignored. The advice that he was getting from various military intelligence and other agencies out there and just said, no, we're going to be out of there. [00:55:46] You have to limit your troops to this. And that's what causes them to close the airbase bog that we had had for so many years. Apparently the Chinese are talking about taking it over now. Yeah. Isn't that nice. And whereas this wasn't an eternal war, right? We hadn't had anybody die in a year and a half. [00:56:05] Uh, it's crazy. We have troops in south Vietnam. We have troops in Germany. We have troops in countries all over the world, Japan, you name it so that we have a local forest that can keep things calm. And we were keeping things calm. It's just mind blowing. But anyhow, politics aside, we left behind a massive database of biometric database. [00:56:40] Of Afghanis that had been helping us over in Afghanistan, as well as a database that was built using us contractors of everyone in the Afghan military, and basically third genealogy. Who their parents were the grandparents blood type weight, height. I'm looking at it right now. All of the records in here, the sex ID nationality. [00:57:13] Uh, date of exploration, hair color, favorite fruit, favorite vegetables, place of birth, uncle's name marker signature approval. Signature date, place of birth. Date of birth address, permanent address national ID number, place of ISS. Date of ISS native language salary. Date of salary, group of salary, police of salary education. [00:57:38] Father's named graduation date kind of weapon. And service number. These were all in place in Afghanistan. We put them in place because we were worried about ghost soldiers. A gold soldier was someone who we were paying the salary of taxpayers. The United States were paying the salaries of the Afghan military for quite some time. [00:58:06] And we were thinking that about half of the. Payroll checks. We were funding. We're actually not going to people who were in the military, but we're going to people who were high up within the Afghan government and military. So we put this in place to get rid of the ghost soldiers. Everybody had to have all of this stuff. [00:58:33] In the database, 36 pieces of information, just for police recruitment. Now this information we left behind and apparently this database is completely in the hand of the Taliban. Absolutely. So we were talking about Americans who helped construct Afghanistan and the military and the Teleman, the looking for the networks of their Poland supporters. [00:59:07] This is just absolutely amazing. So all of the data doesn't have clear use, like who cares about the favorite fruit or vegetable, but the rest of it does the genealogy. Does they now know who was in the police department, who was in the military, who their family is, what their permanent address is. Okay. [00:59:31] You see the problem here and the biometrics as well in the biometrics are part of this us system that we were using called hide H I D E. And this whole hide thing was a biometric reader. Well, the military could keep with them. There were tens of thousands of these things out in the field. And when they had an encounter with someone, they would look up their biometrics, see if they were already in the database and in the database, it would say, yeah, you know, they're friendly, they're an informant. [01:00:08] Or we found them in this area or w you know, we're watching them. We have concerned about them, et cetera, et cetera. Right. All of their actions were in. Well turns out that this database, which covered about 80% of all Afghans and these devices are now in the hands of the Taliban. Now, the good news with this is that that a lot of this information cannot be easily extracted. [01:00:40] So you're not going to get some regular run of the mill Taliban guide to pick one of these up and start using. But, uh, the what's happening here is that we can really predict that one of these surrounding companies like Pakistan that has been very cooperative with the Taliban. In fact, they gave refuge to Saddam, not Saddam Hussein, but to bin Ladin and also Iran and China and Russia. [01:01:13] Any of those countries should be able to get into that database. Okay. So I think that's really important to remember now, a defense department spokesperson quote here, Eric Faye on says the U S has taken prudent actions to ensure that sensitive data does not fall into the Tolo bonds. And this data is not at risk of misuse. [01:01:38] Misuse that's unfortunately about all I can say, but Thomas Johnson, a research professor at the Naval postgraduate school in Monterey, California says, uh, not so fast. The Taliban may have used biometric information in the Coon dues attack. So instead of taking the data straight from the high devices, he told MIT technology review that it is possible that Tolo bond sympathizers in Kabul provided them. [01:02:11] With databases as a military personnel against which they could verify prints. In other words, even back in 2016, it may have been the databases rather than these high devices themselves pose the greatest risk. This is very concerning big article here in MIT technology review. I'm quoting from it a little bit here, but there are a number of databases. [01:02:39] They are biometric. Many of these, they have geological information. They have information that can be used to round up and track down people. I'm not going to mention world war two, and I'm not going to mention what happened with the government before Hitler took over, because to do that means you lose that government had registered firearms, that government had registered the civilians and the people and Afghanistan. [01:03:13] The government was also as part of our identification papers, registering your religion. If you're Christian, they're hunting you down. If you were working for the military, they're hunting new day. And this is scary. That's part of the reason I do not want biometric information and databases to be kept here in the U S Hey, make sure you get my show notes every week on time, along with free training, I try to help you guys out. [01:03:50] Craig peterson.com. Craig peterson.com. Here I am. Cybersecurity strategist and available to you.

Two Girls One Mic: The Porncast

Alice & Kate Kennedy are joined by comic Wenzler Powers (@WenzlerPowers) to review Woodrocket's Vencum porn parody! They also discuss mustache rides from Saddam Hussein, personalized gifts, Tom Brady doesn't eat tomotoes, alien beastiality, April O'Neil is our Meryl Streep, scientist porn names, posing tips, and more! Support the show on Patreon! https://patreon.com/twogirlsonemic

On est fait pour s'entendre
Le jour où Saddam Hussein est exécuté

On est fait pour s'entendre

Play Episode Listen Later Oct 27, 2021 35:48


Nous sommes le 30 décembre 2006. A l'aube, dans un lieu tenu secret en Irak. Escorté par ses bourreaux cagoulés, Saddam Hussein vêtu d'un costume et d'un manteau noir, lève les yeux vers la corde, au bout de laquelle, dans quelques instants, balancera son corps. Cela fait presque 3 mois que le 5e Président de la République d'Irak sait qu'il est condamné. Ce jour-là, à l'issue d'un procès d'un an crée de toutes pièces sous le haut patronage des Américains, Saddam Hussein, le sunnite, face des magistrats chiites et kurdes, avait demandé à être fusillé comme un militaire, mais le nouveau 1er ministre irakien, Nouri Al Maliki, en avait décidé autrement. Ecoutez Jour J avec Flavie Flament du 27 octobre 2021

Football Book Club
Pat Nevin's 'The Accidental Footballer' (ft. Pat Nevin)

Football Book Club

Play Episode Listen Later Oct 25, 2021 66:52


To celebrate the release of his autobiography, the Book Club are joined by ex-Chelsea & Everton star, punditry God and occasional indie DJ Pat Nevin. Join us as we talk writing, football, music, Saddam Hussein, John Parrott, Jorginho the genius, Belle and Sebastian, Duncan Ferguson and, of course, rank the Mike Myers movies. Follow us on Twitter! @FootieBookClub Instagram @footballbookclub Join The Football Book Club *Club* - www.patreon.com/footballbookclub

MinddogTV  Your Mind's Best Friend
Meet The Author - Aurea Franklin - SILENT FREEDOM

MinddogTV Your Mind's Best Friend

Play Episode Listen Later Oct 22, 2021 63:11


https://www.silentfreedom101st.com/PATREON: https://www.patreon.com/minddogtvSponsors:https://podmatch.com/signup/minddogtvhttps://mybookie.com Promo Code minddoghttps://record.webpartners.co/_6_DFqqtZcLQWqcfzuvZcQGNd7ZgqdRLk/1https://apply.fundwise.com/minddoghttps://myvitalc.com/minddog. promo code minddogtvhttps://skillbuilder.academy/dashboard?view_sequence=1601856764231x540742189759856640&promoCode=MINDDOG100OFFhttps://shareasale.com/r.cfm?b=599839&u=1659788&m=52971&urllink=&afftrack=https://enticeme.com/#minddog

Inside-America
Powell's Legacy and GITMO | Inside America with Ghida Fakhry

Inside-America

Play Episode Listen Later Oct 20, 2021 26:00


The passing on Monday of General Colin Powell, an icon of US military and political life, revered by Republicans and Democrats alike, and whose illustrious career at the service of both Republican and Democratic Presidents is quite uncommon, has reignited the debate over Powell's responsibility in making the case for war in Iraq, internationally, and to the American people. The four-star general, son of Jamaican immigrants, who served directly under Presidents George HW Bush, Bill Clinton and George W Bush, died from Covid complications at the age of 84. He was suffering from multiple myeloma, a type of blood cancer that can severely compromise the immune system. Despite being a member of the Republican Party, Powell endorsed Democratic candidates in the last 4 presidential elections, starting with Barack Obama in 2008. He was also a vocal critic of former President Donald Trump, calling him a “national disgrace” who should have been removed from office through impeachment. Following the Jan 6 storming of the US Capitol, Powell said he no longer considered himself a Republican. Despite his trailblazing record as the first Black American to hold the highest national security positions, Powell's legacy remains overshadowed by his public advocacy for the 2003 invasion of Iraq and his infamous presentation before the United Nations Security Council on February 5th, 2003, claiming that President Saddam Hussein had weapons of mass destruction and presented a gathering and imminent danger. Powell later called it a permanent “blot” on his record. One issue Powell was particularly critical of, over the last few years, was the US military prison at Guantanamo Bay. He criticized the Bush administration's treatment of detainees and called for closing the military detention facility, saying it would be in the “best interest” of the US to do so. Asked earlier this year if President Biden would shut the prison at Guantanamo by the time his presidency ends, White House spokeswoman Jen Psaki told reporters: “That certainly is our goal and our intention.” Meanwhile, the Biden Administration has told the US Supreme Court that it will allow Abu Zubaydah, a Guantanamo detainee who has never been charged, to present limited testimony about his alleged torture by the CIA. Earlier this month, the Supreme Court began hearing arguments in Abu Zubaydah's case to determine if testimony from CIA agents and contractors who oversaw his torture, can be subpoenaed. Guests: Sarah Leah Whitson Executive Director of Democracy for the Arab World Now Mark Denbeaux Attorney for Guantanamo Bay Detainees and Director of the Seton Hall Law School for Policy and Research Moazzam Begg Former Guantanamo Bay Prisoner and Director of Outreach for CAGE

Late Night Live - Separate stories podcast
Bruce Shapiro on Colin Powell

Late Night Live - Separate stories podcast

Play Episode Listen Later Oct 19, 2021 14:10


Colin Powell rose to the highest ranks in the military and served as the Secretary of State to George W Bush. Bruce Shapiro looks back at the highs and lows of his career, including his speech at the UN convincing the world that Saddam Hussein had weapons of mass destruction.

Esteri
Esteri di lun 18/10/21

Esteri

Play Episode Listen Later Oct 18, 2021 27:41


1-Siria. Riprendono questa settimana a Ginevra i colloqui sponsorizzati dall'Onu per scrivere una ..nuova costituzione. Il Presidente Assad, alle prese con una grave crisi economica e sociale, si sta invece rafforzando sul piano diplomatico regionale. (Emanuele Valenti)....2-Birmania. La giunta militare ha annunciato la liberazione di oltre 5 mila manifestanti anti golpe. Il punto di Esteri (Simonetta Poltronieri)....3- Missile ipersonico. La Cina ridimensiona le rivelazioni del Financial Times (Gabriele Battaglia)....4-Stati Uniti. È morto a 84 anni Colin Powell, primo afroamericano capo di stato maggiore e delle forze armate e segretario di stato. Ma la storia lo ricorderà soprattutto per le sue bugie sulle armi chimiche di Saddam Hussein. (Esteri)....5-Germania. Via libere alle trattative tra Spd , liberali verdi. L'accordo politico di venerdì approvato dalle rispettive segreterie. (Esteri)....6-Serie TV: Da domani su Fox Italia AMERICAN CRIME STORY: IMPEACHMENT (Alice Cucchetti – Film TV)

UnPresidented: Creating change that empowers the Resistance

Today's show is all about Colin Powell's death from complications associated with Covid, and his mixed legacy as an African-American trailblazer, who was the first Black US Secretary of State, Chairman of the Joint Chiefs, and National Security Adviser, who also had a few blots on his record, including his support for banning gays from the military (Powell successfully sabotaged President Clinton's effort to repeal the gay ban), and his now-infamous speech to the United Nations justifying the second Iraq War by claiming that Saddam Hussein had weapons of mass destruction, when he did not.This is one of our premium episodes. You can listen to a free excerpt here, and then, if the spirit moves you, head on over to Patreon and become a patron. Thanks so much.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Harold's Old Time Radio
Paul Harvey - Saddam Hussein (The Godfather)

Harold's Old Time Radio

Play Episode Listen Later Oct 16, 2021 3:48


Paul Harvey - Saddam Hussein (The Godfather)

From Our Own Correspondent Podcast
Disillusion in Iraq

From Our Own Correspondent Podcast

Play Episode Listen Later Oct 16, 2021 28:43


When western troops overthrew Saddam Hussein, the argument was that this would turn Iraq from a dictatorship into a democracy. And they have indeed held elections there; the latest vote for a new Iraqi parliament took place last Sunday. Yet when it comes to actually voting, tribal and religious affiliation appear to have trumped any ideological leanings, and with a heavy dose of apathy and disillusionment thrown in, says Lizzie Porter. As with Iraq, Japan also faces much disillusionment with democratic politics. The last election saw only a little over half the voting population turn out, and it's not hard to see why: in almost every single contest, the same party has won. Now, the Liberal Democrat Party has chosen a new leader, and he automatically became interim prime minister, pending a general election later this month. It is an election nobody expects him to lose, but was the country's new leader welcomed with great excitement and fanfare? Hardly, says Rupert Wingfield-Hayes: According to mythology, Rome was founded by a pair of twins who had been raised by wolves. But Romulus and Remus might have been surprised to know that in the early Twenty First Century, the “eternal city” would have wild wolves spotted near its airport. Meanwhile wild boars and other animals have been stalking the streets, feasting on the rubbish that sits uncollected. It's all just one sign of the extent to which Rome has not been particularly well run in recent years, maladministration and the mafia making easy bedfellows. Tomorrow, Romans will have the chance to choose a new mayor, hoping they save the city from this plight. Italian politics is, of course, often rather colourful, and the two remaining candidates in this contest are a radio star with links to the far right, and a former Economics Minister, who has attempted to seduce voters by serenading them with a bit of bosa nova guitar. Watching this spectacle is long-term Rome resident, Joanna Robertson. Someone once said that when it came to British politics, there had only been three issues in recent elections: Brexit, Brexit and Brexit. This was not a subject that other countries necessarily wanted to focus on, most governments having enough challenges of their own to think about. Yet, for the Republic of Ireland, the UK's rows over Europe were always going to make their mark; the country has so much trade with Britain, as well as an open border with Northern Ireland. Emma Vardy says that the latest developments in the Brexit saga, have left Irish people exasperated, and also rather sad. It was the writer William Faulkner who famously said “The past is never dead. It's not even past.” That's something which another writer, Colin Freeman, discovered, when he visited Ukraine this month. He was there to hear about a new memorial and museum for the “Babi Yar” massacre, an atrocity which took place in 1941. German Nazi occupiers shot dead more than thirty thousand Jews there, and later, would use the same site to kill gay people, prisoners of war, and the mentally ill - some of the worst mass shootings in human history. Plans for a new museum about the massacres have been underway for some time, but it's a development, which Colin Freeman say,s tells us much about present day Ukraine, as well as about the moment in history being commemorated.

Casual Conspiracy Podcast
Episode 34 - Funding Terrorism

Casual Conspiracy Podcast

Play Episode Listen Later Oct 13, 2021 82:44


Casual Conspiracy Podcast Store Join Chris, Matt, and Ibrahim to celebrate Saddam Hussein, make fun of Detroit, and relate Rambo to Alexander the Great. Join in on the discussion on social media by sharing your thoughts. Recorded on September 9th, 2021. Episode 34 - Funding Terrorism Email Us: show@casualconspiracypodcast.com Social Media: Casual Conspiracy Podcast Facebook Group Casual Conspiracy Podcast MeWe Group Casual Conspiracy Podcast on Twitter Show Links:

Saturday Morning with Jack Tame
Journalist Stephen Davis: British Airways Flight 149 was a "trojan horse"

Saturday Morning with Jack Tame

Play Episode Listen Later Oct 8, 2021 14:47


On August 1 in 1990, British Airways Flight 149 departed Heathrow for Kuala Lumpur but it never made it. The flight stopped in Kuwait to refuel - the very same day Saddam Hussein invaded.The nearly 400 passengers and crew, including two Kiwis, were trapped by Iraqi soldiers and used as human shields.(Photo / Supplied)An explosive new book on Flight 149 called OPERATION TROJAN HORSE has been written by Kiwi journalist Stephen Davis. He's uncovered proof that Margaret Thatcher authorised a team of intelligence officers to travel into Kuwait on 149 while all other flights were rerouted.Stephen Davis speaks to Jack Tame about his investigation. LISTEN ABOVE

AlternativeRadio
[Eqbal Ahmad] Terrorism: Theirs and Ours

AlternativeRadio

Play Episode Listen Later Oct 1, 2021 57:01


Terrorism is the scourge of the era. It is a fearsome symbol conjuring up images of ferocious-looking, bearded men brandishing AK-47s. The media focus on the terrorism of official enemies like Saddam Hussein, bin Laden, and Zarqawi. After they were done away with, new demons appear to justify war and bloat the Pentagon budget. Be afraid of ISIS and Al Qaeda in the Arabian Peninsula. Be afraid of Yemen and Somalia, Pakistan and Afghanistan, Iraq and Syria. Be afraid of all the jihadi groups that have mushroomed all over the Middle East. The notion that the U.S. and its allies engage in terrorism is simply not a topic for discussion. To scrutinize U.S. policy is verboten. The War on Terror goes on and on. Recorded at the University of Colorado.

Leaders & Lagers
EP. 101 - Eric Maddox/Yuzu Lager

Leaders & Lagers

Play Episode Listen Later Oct 1, 2021 42:37


On this week's podcast we are joined by Special Guest Eric Maddox, a former US Army Special Forces Interrogator who conducted over 300 interrogations and collected intelligence that led to the direct capture of Saddam Hussein. He now consults with the corporate world on the lessons of Empathy-Based Listening. I share a glass of Yuzu Lager from the Kiuchi Brewery in Ibaraki-ken, Japan.Upon graduating from the University of Oklahoma in 1994, Eric Maddox joined the U.S. Army as an infantry paratrooper for the 82nd Airborne Division. After spending three years as a paratrooper, jumpmaster and a qualified ranger, Eric reenlisted as an interrogator and Chinese Mandarin linguist. Since 9/11, Eric has conducted over 2,700 interrogations while deploying eight times in support of the Global War on Terrorism (GWOT) to include multiple tours in Iraq, Afghanistan, South America, Southeast Asia, and Europe.In 2003, while assigned to a special operations task force in Tikrit, Eric conducted over 300 interrogations and collected the intelligence which directly led to the capture of Saddam Hussein. As a result, he was awarded the Legion of Merit, the Defense Intelligence Agency's Director's Award and the National Intelligence Medal of Achievement. After being hired as a civilian with the Department of Defense, Eric continued to help fight the Global War on Terror (GWOT) until 2014. In May 2015, he earned his MBA from Washington University in St. Louis and is now a private consultant and negotiator and lives in his hometown of Tulsa, Oklahoma.Eric is also the author of Mission: Black List No. 1 (Harper Collins, 2008), which he wrote with the permission of the Department of Defense.Connect with Eric at https://www.ericmaddox.com/

The Tim Ferriss Show
#535: General Stanley McChrystal — Mastering Risk: A User's Guide

The Tim Ferriss Show

Play Episode Listen Later Sep 30, 2021 90:13


General Stanley McChrystal — Mastering Risk: A User's Guide | Brought to you by Kettle & Fire high quality, tasty, and conveniently packaged bone broths; Eight Sleep's Pod Pro Cover sleeping solution for dynamic cooling and heating; and ShipStation shipping software. More on all three below.General Stanley McChrystal (@stanmcchrystal) was called “one of America's greatest warriors” by Secretary of Defense Robert Gates. Having held leadership and staff positions in the Army Special Forces, Army Rangers, 82nd Airborne Division, the XVIII Army Airborne Corp, and the Joint Staff, McChrystal became commander of JSOC in 2003, responsible for leading the nation's deployed military counterterrorism efforts around the globe. His leadership is credited with the 2003 capture of Saddam Hussein and the 2006 locating and killing of Abu Musab al-Zarqawi, the leader of al-Qaeda in Iraq. In June 2009, McChrystal received his fourth star and assumed command of all international forces in Afghanistan.General McChrystal founded the McChrystal Group in January 2011, an advisory services firm that helps businesses challenge the hierarchical “command and control” approach to organizational management.He is a senior fellow at Yale University's Jackson Institute for Global Affairs, where he teaches a course on leadership, and he is the author of the bestselling leadership books My Share of the Task: A Memoir; Team of Teams: New Rules of Engagement for a Complex World; and Leaders: Myth and Reality. His new book is Risk: A User's Guide. He is also the co-host (with former Navy SEAL Chris Fussell) of the No Turning Back podcast, where they explore the future of leadership and teams with the world's most consequential leaders.Please enjoy!This episode is brought to you by Kettle & Fire! Kettle & Fire makes one of the highest quality, tastiest, and most conveniently packaged bone broths on the market, and I have a huge collection of their broths on my kitchen counter for easy access. I've been a fan ever since 2015, when podcast guest and ketogenesis expert Dr. Dominic D'Agostino introduced me to the company. Their products fit me and my lifestyle extremely well: bone broth is a great ‘one-stop shop' for low-carb, high-protein nutrition, and bone broth makes an excellent lower-calorie breakfast that requires no prep.It's one of the simplest ways to get many of the nutrients I need, and I simply feel better when broth is a regular part of my diet. You can save 25% off your order by going to KettleAndFire.com/Tim and using code TIM at checkout.*This episode is also brought to you by ShipStation. Do you sell stuff online? Then you know what a pain the shipping process is. ShipStation was created to make your life easier. Whether you're selling on eBay, Amazon, Shopify, or over 100 other popular selling channels, ShipStation lets you access all of your orders from one simple dashboard, and it works with all of the major shipping carriers, locally and globally, including FedEx, UPS, and USPS. Tim Ferriss Show listeners get to try ShipStation free for 60 days by using promo code TIM. There's no risk, and you can start your free trial without even entering your credit card info. Just visit ShipStation.com, click on the microphone at the top of the homepage, and type in TIM!*This episode is also brought to you by Eight Sleep! Eight Sleep's Pod Pro Cover is the easiest and fastest way to sleep at the perfect temperature. It pairs dynamic cooling and heating with biometric tracking to offer the most advanced (and user-friendly) solution on the market. Simply add the Pod Pro Cover to your current mattress and start sleeping as cool as 55°F or as hot as 110°F. It also splits your bed in half, so your partner can choose a totally different temperature.And now, my dear listeners—that's you—can get $250 off the Pod Pro Cover. Simply go to EightSleep.com/Tim or use code TIM. *If you enjoy the podcast, would you please consider leaving a short review on Apple Podcasts? It takes less than 60 seconds, and it really makes a difference in helping to convince hard-to-get guests. I also love reading the reviews!For show notes and past guests, please visit tim.blog/podcast.Sign up for Tim's email newsletter (“5-Bullet Friday”) at tim.blog/friday.For transcripts of episodes, go to tim.blog/transcripts.Discover Tim's books: tim.blog/books.Follow Tim:Twitter: twitter.com/tferriss Instagram: instagram.com/timferrissFacebook: facebook.com/timferriss YouTube: youtube.com/timferrissPast guests on The Tim Ferriss Show include Jerry Seinfeld, Hugh Jackman, Dr. Jane Goodall, LeBron James, Kevin Hart, Doris Kearns Goodwin, Jamie Foxx, Matthew McConaughey, Esther Perel, Elizabeth Gilbert, Terry Crews, Sia, Yuval Noah Harari, Malcolm Gladwell, Madeleine Albright, Cheryl Strayed, Jim Collins, Mary Karr, Maria Popova, Sam Harris, Michael Phelps, Bob Iger, Edward Norton, Arnold Schwarzenegger, Neil Strauss, Ken Burns, Maria Sharapova, Marc Andreessen, Neil Gaiman, Neil de Grasse Tyson, Jocko Willink, Daniel Ek, Kelly Slater, Dr. Peter Attia, Seth Godin, Howard Marks, Dr. Brené Brown, Eric Schmidt, Michael Lewis, Joe Gebbia, Michael Pollan, Dr. Jordan Peterson, Vince Vaughn, Brian Koppelman, Ramit Sethi, Dax Shepard, Tony Robbins, Jim Dethmer, Dan Harris, Ray Dalio, Naval Ravikant, Vitalik Buterin, Elizabeth Lesser, Amanda Palmer, Katie Haun, Sir Richard Branson, Chuck Palahniuk, Arianna Huffington, Reid Hoffman, Bill Burr, Whitney Cummings, Rick Rubin, Dr. Vivek Murthy, Darren Aronofsky, and many more.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

jim collins america seth godin guide tim ferriss amazon engagement fire iraq matthew mcconaughey hugh jackman afghanistan darren aronofsky entrepreneurship reality vince vaughn terry crews ups neil gaiman user ebay secretary michael pollan lebron james productivity risk shopify yale university team startups bob iger chuck palahniuk arianna huffington mastering sia ken burns jordan peterson malcolm gladwell ramit sethi jane goodall elizabeth gilbert arnold schwarzenegger timothy ferriss kevin hart bill burr kettle jamie foxx sam harris doris kearns goodwin dan harris tony robbins jerry seinfeld edward norton bren brown michael lewis saddam hussein jocko willink yuval noah harari esther perel fedex mary karr michael phelps kelly slater elizabeth lesser usps vitalik buterin cheryl strayed jim dethmer whitney cummings rick rubin zarqawi eric schmidt qaeda amanda palmer airborne division dax shepard neil strauss global affairs maria popova mcchrystal no turning back madeleine albright naval ravikant brian koppelman daniel ek lifestyle design sir richard branson ray dalio reid hoffman marc andreessen teams new rules complex world shipstation jsoc joe gebbia howard marks tim ferriss show general mcchrystal maria sharapova tools of titans jackson institute general stanley mcchrystal leaders myth mcchrystal group defense robert gates vivek murthy grasse tyson my share army rangers katie haun army special forces abu musab peter attia joint staff discover tim timferrissfacebook longform interviews kettleandfire
Fall In 360
Dishonorable Mention: Abu Ghraib Incident

Fall In 360

Play Episode Listen Later Sep 28, 2021 70:52


Abu Ghraib was one of Saddam Hussein's most dangerous prisons where inmates were often tortured and in many cases … murdered. That prison's reputation didn't change much under US Military control, as allegations of torture along with disturbing photos appear in the front news in April of 2004. Join us as we discuss those involved and who the Dishonorable Mention actually belongs to! --- Support this podcast: https://anchor.fm/fall-in-360/support

Big Blend Radio
Mike Guardia - Skybreak: The 58th Fighter Squadron in Desert Storm

Big Blend Radio

Play Episode Listen Later Sep 27, 2021 54:00


This episode of Big Blend Radio's Military Monday Show features internationally acclaimed and award-winning historian and author Mike Guardia who discusses his new book, "Skybreak: The 58th Fighter Squadron in Desert Storm." The top MiG Killers of Operation Desert Storm. August 1990: Iraqi forces under the command of Saddam Hussein invaded the tiny emirate of Kuwait. Within hours, the Kuwaiti defenses collapsed under the onslaught of the Iraqi Army. In response, the US military led a coalition of thirty-four nations in what became known as Operation Desert Storm—a violent air and ground campaign to eject the Iraqis from Kuwait. At the tip of the spear were the men of the US Air Force's 58th Fighter Squadron. Based on hours of interviews and archival research, "Skybreak" reveals an intimate, no-holds-barred account of modern aerial combat…as told by the men who lived it. More: https://mikeguardia.com/ 

Miller's Military Moments
Saddam Hussein was my Passenger

Miller's Military Moments

Play Episode Listen Later Sep 27, 2021 40:21


This is maybe one of the most anticipated episodes from my experiences as a Soldier. Saddam Hussein was a passenger on my helicopter in 2006. YES! In the flesh, he was climbed in the aircraft on my side and sat about 2 feet from me. He was as defiant as ever. Saddam chewed on a unlit cigar while pointing at me and saying who knows what! We did not handcuff him or blindfold him as we treated him as a head of state. Some may find that difficult to hear, but we did. We often do try and do the right things in according to international norms. The preparation and execution of this mission was painstakingly difficult. The step by step process included about 40+ steps. The Commanding General was listening to the execution of the mission in case some thing went wrong. We executed it flawlessly,  but it was a pain in the ass getting ready for a mission that lasted about 7 minutes. After dropping him off, we went and picked up Chemical Ali and the other henchmen. Ali was dressed in cargo shorts, a Hawaiian shirt, flip flops like he was going to the beach! Tune in for the rest of the details! Support the show (https://www.patreon.com/millersmilitarymoments)

Borne the Battle
#257 Army Veteran Vincent "Rocco" Vargas, Entrepreneur, Entertainer, Actor on Mayans MC on FX

Borne the Battle

Play Episode Listen Later Sep 27, 2021 98:22


If you know of Black Rifle Coffee Company or watch Mayans MC on FX, you may already know this week's Borne the Battle guest – Army Veteran, entrepreneur, actor and overall entertainer Vincent Vargas.It was a windy road that led him to this point in his life. Too many wild parties got him kicked out of college and ended his childhood dream of playing professional baseball. At 20, as a young father who was no longer playing ball or attending school, Vargas felt like a disappointment to his family.In 2003, during the invasion of Baghdad at the outbreak of the Iraq War, Vargas watched a televised newscast in which a Marine helped to topple a statue of dictator Saddam Hussein. News reporters interviewed the Marine's family, who emotionally expressed their pride in his service.The next day, Vargas went to a military recruiting office to enlist. He later served in both Iraq and Afghanistan as an Army Ranger, became a drill sergeant, and after serving, even joined the U.S. Border Patrol.In this week's episode of Borne the Battle, Vincent Vargas discusses his many transitions between sports, military and civilian lives, getting into acting, his time on the Drinkin' Bros podcast, and the founding of Beteran, his Veteran-focused clothing line that emphasizes empowerment and positivity rather than the prevailing Veteran narratives of depression, alcoholism, and suicide.Borne the Battle Veteran of the Week: Army Veteran Ricardo Barraza Also Mentioned in this Episode: https://vincentroccovargas.com/ VETSmile pilot program to improve affordable dental care access for Veterans Program of Comprehensive Assistance for Family Caregivers to provide an additional year for eligibility and reassessment of certain participants

Parallax Views w/ J.G. Michael
James Woolsey‘s Operation Dragon & the Triumph of ”Crackpot Realism” in U.S. Foreign Policy w/ Jim DiEugenio

Parallax Views w/ J.G. Michael

Play Episode Listen Later Sep 26, 2021 95:47


On this edition of Parallax Views, earlier this year a curious new book was published dealing with the assassination of John F. Kennedy.  Co-written by R. James Woolsey, former Director of the CIA under President Bill Clinton from 1993 to 1995, and Ion Mihai Pacepa, a former Romanian spy and a noted, high-ranking Eastern Bloc defect during the Cold War, Operation Dragon: Inside the Kremlin's Secret War Against America argues that the JFK assassination was the result of a plot involving the Soviet Union's Nikita Khrushchev and Cuba's Fidel Castro. Lee Harvey Oswald, the book claims, was instructed by Khrushchev to kill President Kennedy. According to Woolsey and Pacepa, Khrushchev actually called off the plot for fear that it might be discovered and lead right back to him as one of the perpetrators.  What Khrushchev did not count on, say Woolsey and Pacepa, is that Oswald would go rogue and carry out the assassination plot in spite of orders to the contrary. In other words, Operation Dragon alleges that President Kennedy's assassination was the result of nefarious Soviet treachery. Is Operation Dragon just another entry in dizzying array of theories positing an alternative to the Warren Commission Report's oft-contested findings concerning the fatal shooting of a sitting President of the United States in Dallas, TX on November 22nd, 1963? Perhaps. Then again, most books that challenge, in varying degrees, the official line on the Kennedy assassination aren't written by ex-CIA Directors. But the curiosity of the book's co-author, the aforementioned James Woolsey, penning a book dealing with the Kennedy assassination doesn't end with his status as the former highest-ranking official in the CIA. In addition to his tenure as DCIA, Woolsey served as U.S. Under Secretary of the Navy in the late 1970s and was involved in negotiations with the Soviet Union in the 1980s. In other words, he was in the thick of it, so to speak, during the Cold War. Most curiously of all, however, when it comes to Woolsey is his connections to the neoconservative foreign policy movement and his penchant for promoting various conspiratorial fears about foreign countries even prior to the publication of Operation Dragon. A member of the notoriously hawkish neocon think tank The Project for a New American Century (PNAC) before its dissolution in 2006, Woolsey has stoked fears that North Korea could use electromagnetic pulse (EMP) weapons against the United States and was also a notable proponent of the theory that al Qaeda and Saddam Hussein's Iraq were involved in the Oklahoma City Bombing. Since the publication of Operation Dragon, Woolsey has appeared on the right-wing outlet Newsmax to promote his theory about the Kennedy assassination. This, combined with his neoconservative inclinations and conspiratorial musings that align quite well with the bolstering of a hawkish, pro-war agenda, raises the question of Woolsey's political motivations in promoting what The Daily Beast has referred to as a "QAnon-style spin" on the Kennedy assassination. Joining us to pushback against Woolsey's JFK assassination theory and place it within the context of his hawkish neocon history is returning guest James DiEugenio, the leading figure behind the website Kennedys and King, writer for the upcoming Oliver Stone documentary JFK Revisited: Through the Looking Glass, and author of such books as Destiny Betrayed: JFK, Cuba, and the Garrison Case, Reclaiming Parkland: Tom Hanks, Vincent Bugliosi, and the JFK Assassination in the New Hollywood, and The JFK Assassination. DiEugenio argues that not only is Woolsey's Kennedy assassination theory wrong, but that it is representative of a certain brand of foreign policy thinking in Washington, D.C. that sociologist C. Wright Mills would refer to as "crackpot realism". Before delving into Operation Dragon, however, Jim fills us in on the latest news concerning the fight to declassify and release the last of the JFK records. We discuss how President Trump, despite at times signaling to the contrary, helped keep the records declassified during his Presidency. Now said records and their review for declassification lay in the hands of President Joe Biden. Then we shift our attention to Operation Dragon and discuss the problems with the book's claims that theoretical physicist and "Father of the Atomic Bomb" J. Robert Oppenheimer and British Prime Minister Clement Attlee were secretly Soviet spies, the relationship between Woolsey's theories on the Kremlin and the paranoid "Monster Plot" of the CIA's James Jesus Angleton, a brief history of neoconservatism, Woolsey's neocon credentials, the relationship between the narrative of the Cold War promoted by Woolsey and the ideas of the far right-wing John Birch Society, James Angleton and the origins of the idea that Lee Harvey Oswald was a KGB agent or asset,, Operation Dragon as a retread of the narrative put forth in Edward Jay Epstein's 1992 book Legend: The Secret World of Lee Harvey Oswald, Norman Cousins and the quest for détente with Khrushchev's Soviet Union, French journalist Jean Daniel's meeting with Fidel Castro in Havana on the day of Kennedy's assassination , Kennedy and rapprochement negotiations with Cuba, Khrushchev and Castro's reactions to the assassination, why neither the Soviet Union or Cuba benefitted from Kennedy's assassination, former Deputy Secretary of Defense Paul Nitze's Cold War ideology and the rise of neoconservatism, neoconservatism as an ideology that has now slipped into both the Republican and Democratic Parties, "crackpot realism" in the killing of Gaddafi in Libya and the U.S. intervention in Assad's Syria, Barack Obama and the CIA's classified weapons supply and training program in Syria known as "Timber Sycamore", the Project for American Century's agenda, George HW Bush's comments calling the neocons "the crazies in the basement" of U.S. foreign policy in the Middle East, the notion that Henry Kissinger and Henry Kissinger were "soft" on Communism during the Cold War, neocons as constantly seeking pretexts for war, the late Russian studies scholar Stephen F. Cohen vs. Richard Pipes on the Soviet Union, Nixon and Kissinger as being to the right of Ronald Reagan and Margaret Thatcher on Mikhail Gorbachev, neocons and the Australia nuclear submarines deal as part of a geopolitical strategy against China, "Noble Lies" and the selling of wars, NATO's expansion and the lack of historical context provided by crackpot realism in foreign policy, Woolsey's book as a psyop, PNAC member Robert Kagan and his wife Victoria Nuland's involvement in U.S. foreign policy related to Ukraine, the neocon agenda as bankrupting the U.S. and destroying social programs vis-à-vis war spending, and, much, much more.

Scott Horton Show - Just the Interviews
9/24/21 Barbara Slavin on the True Winner of Iraq War 2

Scott Horton Show - Just the Interviews

Play Episode Listen Later Sep 26, 2021 31:19


Scott interviews Barbara Slavin from the Atlantic Council. Slavin recently co-authored an article with Abbas Kadhim about how Iran's influence in the middle east has grown substantially since the U.S. overthrew Saddam Hussein's regime in Iraq. Slavin explains that the U.S. was more supportive of Iraq while they were engaged in a brutal war with Iran in the 80s, because the foreign policy establishment saw Iran as a bigger threat. Of course this changed in the 90s when George Bush Sr. launched a war against Iraq. And then there was the invasion in 2003 that disposed of Saddam. Scott and Slavin reflect on the ridiculous claims from that time arguing that regime change in Iraq would not hand Iran more influence, with some claiming it would weaken Iran by giving the U.S. leverage over the entire region.  Discussed on the show: “Iran ‘won' the war with Iraq but at a heavy price” (Atlantic Council) Bruce Riedel overheard Bush's phone call days after 9/11 “After Sistani and Khamenei: looming successions will shape the Middle East” (Atlantic Council) A Clean Break  Cheney 1994 interview Barbara Slavin is director of the Future of Iran Initiative at the Atlantic Council. Follow her on Twitter: @BarbaraSlavin1. This episode of the Scott Horton Show is sponsored by: The War State and Why The Vietnam War?, by Mike Swanson; Tom Woods' Liberty Classroom; ExpandDesigns.com/Scott; EasyShip; Thc Hemp Spot; Green Mill Supercritical; Bug-A-Salt; Lorenzotti Coffee and Listen and Think Audio. Shop Libertarian Institute merch or donate to the show through Patreon, PayPal or Bitcoin: 1DZBZNJrxUhQhEzgDh7k8JXHXRjYu5tZiG.

The Libertarian Institute - All Podcasts
9/24/21 Barbara Slavin on the True Winner of Iraq War 2

The Libertarian Institute - All Podcasts

Play Episode Listen Later Sep 26, 2021 31:19


Scott interviews Barbara Slavin from the Atlantic Council. Slavin recently co-authored an article with Abbas Kadhim about how Iran's influence in the middle east has grown substantially since the U.S. overthrew Saddam Hussein's regime in Iraq. Slavin explains that the U.S. was more supportive of Iraq while they were engaged in a brutal war with Iran in the 80s, because the foreign policy establishment saw Iran as a bigger threat. Of course this changed in the 90s when George Bush Sr. launched a war against Iraq. And then there was the invasion in 2003 that disposed of Saddam. Scott and Slavin reflect on the ridiculous claims from that time arguing that regime change in Iraq would not hand Iran more influence, with some claiming it would weaken Iran by giving the U.S. leverage over the entire region.  Discussed on the show: “Iran ‘won' the war with Iraq but at a heavy price” (Atlantic Council) Bruce Riedel overheard Bush's phone call days after 9/11 “After Sistani and Khamenei: looming successions will shape the Middle East” (Atlantic Council) A Clean Break  Cheney 1994 interview Barbara Slavin is director of the Future of Iran Initiative at the Atlantic Council. Follow her on Twitter: @BarbaraSlavin1. This episode of the Scott Horton Show is sponsored by: The War State and Why The Vietnam War?, by Mike Swanson; Tom Woods' Liberty Classroom; ExpandDesigns.com/Scott; EasyShip; Thc Hemp Spot; Green Mill Supercritical; Bug-A-Salt; Lorenzotti Coffee and Listen and Think Audio. Shop Libertarian Institute merch or donate to the show through Patreon, PayPal or Bitcoin: 1DZBZNJrxUhQhEzgDh7k8JXHXRjYu5tZiG.

Angry Americans with Paul Rieckhoff
133. Zainab Salbi. The War on Women In Afghanistan. The Reality of American Drone Strikes. Why Doesn't Biden Get It? Recognizing The Taliban Is Like Gilead from Handmaid's Tale. Women's Rights Under Fire From Kabul to Texas. Finding Peace In Trying Tim

Angry Americans with Paul Rieckhoff

Play Episode Listen Later Sep 23, 2021 78:42


With Afghanistan now firmly in the hands of the Taliban, a full-scale war on women is underway inside that country. Women are being forcibly married, hunted, beaten and killed. Our President and many in Congress want to turn the page. But Zainab Salbi is on the front lines of the fight—and refuses to allow it.  We continue the Independent Americans deep dive into Afghanistan and all the ways it's impacting the world, national security and American politics, with a focus this episode on the 14 million women left to fight and die under Taliban rule.  Zainab Salbi is an activist, author, Founder of Women for Women International, a renowned journalist. And she is a returning guest and audience favorite. She first appeared on this show in May 2019 and is back to break it down.  Raised in Baghdad, Iraq, Zainab grew up as a small girl calling Saddam Hussein her uncle. Her father was Hussein's private pilot and from an early age, Zainab was thrust into the small and twisted circle of the notorious dictator. She escaped an abusive arranged marriage with only $400 in her pocket and would go from working in a Hallmark store in Chicago to receiving honors from the President of the United States at the White House. She now is a best-selling author and one of the most powerful Muslim-American voices in media and politics. Zainab has dedicated her life to the cause of helping women everywhere. And there has been no more urgent crisis than this one.  And with mounting tensions and issues for women everywhere reaching a boiling point, Zainab is the perfect voice for this moment. It's another conversation that keeps it real. With tough lessons--and hard truths. The kind to help you stay vigilant. Because eternal vigilance is the price of freedom.  As always, we're bringing the Righteous Media 5 I's: independence, integrity, information, inspiration and impact.   Our host, national security and political analyst and Army veteran Paul Rieckhoff (@PaulRieckhoff) takes you behind the scenes for candid conversations with top leaders from all backgrounds. It's a bold and blunt perspective you won't find anywhere else on the media landscape. You can support this show and join the community of listeners by joining our IA Patreon community. You'll get access to events, guests, merch discounts, and exclusive content. And you'll help us keep speaking independent truth to power. Independent Americans is powered by Righteous Media. On social media or www.IndependentAmericans.us. Where you can check out new IA merch to hook up your favorite independent as fall begins. You can also watch the full conversation with Zainab Salbi and Paul Rieckhoff here: https://youtu.be/e7_vOeAulLY Stay vigilant, America. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Closet Conservative Podcast
How to Become a Tyrant

The Closet Conservative Podcast

Play Episode Listen Later Sep 18, 2021 10:57


In the Netflix series, "How to Become a Tyrant," the 6-episode titles illustrate the steps taken by each of our world's most successful regimes:  "Seize Power" "Crush your Rivals" "Reign through Terror" "Control the Truth" "Create a New Society" And "Rule Forever" While these titles depict and describe the likes of Adolf Hitler, Josef Stalin, and Saddam Hussein, and the actions each took from 1920 to 2006, they can most assuredly apply today to the actions taken by our nation's 46th president and the radical liberals of today's American Democrat Party. I want to use the "rule book" described in this new Netflix series and how Democrats have applied these same tactics to destroy our country from within and the freedoms of our nation's people. American liberalism took root in the United States immediately following the Vietnam War - and has entrenched itself ever since. For over the last 50 years, but particularly under the Democrat administrations of Bill Clinton, Barack Obama, and now Joe Biden, liberals have transformed and revamped the American way of life.  Clinton was elected twice because most Americans wanted domestic solvency - a balanced fiscal budget, expanded and secure Medicare, Medicaid, and Social Security benefits. Slick Willy was a good salesman, and when his pants were zipped, most Americans believed that he delivered on his promises. But, in reality, he helped plant the seeds of today's Democrat Communist Party by creating a welfare state, establishing an American Class system of the "haves and have-nots," and implementing legislation to disarm lawful citizens of our nation under the "Assault Weapon's Ban."  When Barack Obama was elected, it was more about something new and radical for America than legitimate policies put forward by a junior Senator and community organizer with zero experience. Obama's qualification was more about race than American societal reward. The most crucial detail of Obama's presidency is the incredible assimilation of money - the political machine to outspend political rivals had arrived. In politics, money can buy you anything - including votes.  During Barack Obama's reign in America, he and his fellow Democrats strong-armed their rivals to get what they wanted. It was to rule with a pen for the president, implementing policy with the stroke of his pen through Executive Orders. For the Democrat Party-controlled House, it was to attempt to push legislation through that would force government interference through the lives of every American in the passing of universal healthcare.  Fast-forward now through Donald Trump's administration to that of Joe Biden, and the Democrat dictatorial playbook starts to show itself. Today's liberals control the truth by controlling the narrative and the media markets in print and television. Democrats use the airwaves and social media platforms to crush their rivals and completely ignore what is occurring across our country or spin anything negative against the regime of Joseph R. Biden.  Like Hitler and Stalin before them, today's American liberals have successfully discounted and removed all media and ideas that go against their regime. From failing to acknowledge conservative commentary and questions to fact-checking and Facebook jail, rivals of today's Democrats are crushed quickly in their opposition. Freedom of speech is eroding before our eyes.  During the Holocaust and under Hitler's regime, many worldwide asked the Jews, why didn't they do you something? Why didn't they fight back rather than line up to be slaughtered? It was the fear instilled by the Nazis that commanded obedience. Today, liberals are using the same fear to demand compliance across the country. Within that fear, the message is clear; only the government can lead us out of these troubled times.  I am here to tell you that these are lies - only under the authority of God and His blessings upon man will we overcome any crisis, any obstacle. Our Lord and Savior Jesus Christ commands that we leave all and follow him. Those who choose to follow tyranny will suffer the wrath of what history has offered - the choice is yours; we all know the path of the past and the atrocities it brings. The question is, what are you, what am I going to do? Who will we follow?  What playbook will you play in? One of pain and suffering, or the one that contains the truth and the light and brings every lasting life beyond the borders of Biden and his regime here on earth? Music courtesy of Greg Shields Music. http://www.reverbnation.com/GregShields

Craig Peterson's Tech Talk
Do You Know How to Identify a Fake Web Page? - Whole Show

Craig Peterson's Tech Talk

Play Episode Listen Later Sep 10, 2021 81:44


Do You Know How to Identify a Fake Web Page? The FBI's reporting that more than 70% of all business hacks are because of our employees. They're clicking on emails, they're going to websites, what can we do? How do we know if a website is legitimate or not? [Automated transcript] [00:00:19] There's a great little article that McAfee published now, McAfee is a company that's been in the cybersecurity business for quite a while. [00:00:28] I do not use their products. I use some competing products. I have not been impressed with their products. [00:00:35] Let me tell you this particular web post that they put up is fantastic and you'll see it in my newsletter this week. Make sure you get that. [00:00:45] Have you ever come across a website that didn't look quite right if you haven't, you haven't been on the internet very much because whether you're an individual at home or you are in a business environment, we are likely going to end up on websites that are not legitimate. Sometimes we'll see these things, that company logo might be wrong. There's not enough information on the page. You've been there before and this looks down page. The odds are that you were on a hack site, a site that's trying to get you to do something most of the time when you end up on these sites, they're trying to get you to put in your username and password. [00:01:31] Already that the bad guys have stolen your username and password from so many websites out there. So why would they try and do it this way? It's because if they're pretending to be your bank and you try and log in, They know this as your bank account, and many times they immediately try and get into your bank account or your phone account, whatever it might be. [00:01:56] This is a very long-standing tactic that's relied on by hackers everywhere. Usually it's a knockoff of a real page. They'll take it and they will recreate it. Then it's easy to do if you're in a web browser right now, when you go to your bank's website. You can just go to file, save as, and go ahead and save the entire webpage and you'll get everything. [00:02:23] You'll get all of the links that are on there. All of the graphics that are there, it'll pull it in for you all automatically. And that's all they do. That's what they use. Just a copy. How do they get in front of you in the first place? Typically the hackers will go ahead and send a phishing email. [00:02:43] They'll make the email sound legitimate. They'll make it look legitimate. They'll often even use a URL that looks a lot like it. B the real banks email. I've seen it before where the URL is bank of america.safe site.com. That sort of a thing. I'm not blaming safe site. They could be a great company. [00:03:04] I don't know. I just made it up as we're going, but that type of a URL where it's not really bank of america.com or it's a misspelling of bank of America, that's the sort of thing that gets to be pretty darn common and. Clicking on that link and then submitting your information. It hasn't been leading to credit card fraud, data extraction, wire transfers, identity theft, and a whole lot more. [00:03:34] Now with the COVID relief, that's been out there. All of these things from filing for unemployment claims through filing for PPP protection as a business, the whole. Industry has changed. I'm talking about the hacker industry here, because there are so many people who are falling for these scams and ransomware as well has gone up over 300%. [00:04:08] It's just absolutely amazing. Now, if you go online and you duck, duck, go. Fake login pages. And for those of you who don't know what I mean by that duck go is the search engine I've been recommending lately. It is a search engine that doesn't take politics into play like Google does. And it also does not track you. [00:04:31] And what you're looking at it is ad based. It gets its revenue from advertisement, but it's not selling your information just on the basic search. That you're doing. I think it's a very good alternative, but if you go ahead and your search for fake login pages, you're going to find thousands of guides on how to create websites. [00:04:53] And these bad guys can create these websites in absolutely no time at all. It just a minute or two in order to make one of them. Now it can be difficult nowadays to figure out if it's a fake site, because the, again, the hackers are constantly updating their techniques to be more sophisticated. So it's made it more difficult for consumers to really recognize when something's fraudulent. [00:05:22] Now I want to get it into a psychological term. In attentional, blindness. You've probably heard of this. I remember this from, I think it was college days for me, so a very long time ago, but there's a study that was done on inattentional blindness called the invisible gorilla test. If you go right now online and just search for invisible gorilla test, you'll see a bunch of these coming. [00:05:52] No, there's even a book called that the invisible gorilla test that came out about 11 years ago, 12 years ago, I think. But here's the bottom line on this? They tell you to do something in this study. What they did here is there's a video. People there's six people, three of them are dressed with white shirts and three of them have black shirts and they're passing basketballs back and forth. [00:06:20] The white shirts are only passing to the white shirts and the black shirts under the black shirts. And what they ask you to do is count the number of times the team in white past. Now, you're sitting there watching, knowing they're going to try and fool you, you're paying a whole lot of attention to it. [00:06:40] And then at the end, they ask you a question that may be not expecting the video. I just watched on this, that was called the monkey business. Illusion is the name of this. I counted and I counted carefully and I came up with 16 passes. So the monkey business, illusion, 16 times the people in the white shirts passed the basketball back and forth. [00:07:06] So I got that. But then they said did you notice the person in the gorilla costs? Who walked through the game. He didn't just walk through the game, walked in, beat on this chest and then walked out of the game. If you didn't know about this and okay. In chorus, all honesty, I always try and put everything upfront here. [00:07:29] I knew about it beforehand. I remember from college days. But eight, most people actually about 50% of people who did not know, there is a gorilla in the middle of this. Would not have noticed the gorilla walking through the game, but this monkey business illusion video, there's something else too. [00:07:52] And I've got to admit, I did not notice that. And that is the curtain color change. From red to gold, this curtain that was in the background of all of these players. And I didn't notice one other thing. I'm not going to tell you what that is. You'll have to watch the video of yourself too, to figure that out again, just go online and search for the monkey business illusion. [00:08:19] And I think you'll find it. So the reason I brought this up is because if you come across a well forged login page and you're not actively looking for signs of fraud, you're fairly likely to miss a cybercriminals gorilla. You're likely to miss that the logo's not quite right, or the placement isn't the same as I'm used to. [00:08:45] Because you're focused in, on doing what you're supposed to be doing. It's the whole concept as well of have tunnel vision. And I'm sure you're aware of that. We've all had that before, where we're really focused on this one little thing and we don't notice everything else going on. It particularly happens in high stress times. [00:09:08] So how do you steer clear of the fake login pages? We're going to talk about that when we get. But it's absolutely crucial for everyone, even if you've had phishing training and you are trying to be cautious, you could fall for this invisible gorilla and enter in your personal details, not something that you really want. [00:09:36] Hopefully you guys got my newsletter last weekend. I got a lot of comments on it. People are saving. In fact, that's the first thing I said in this email last week is don't lose this because it went through point by point on about 10 different things that you should be doing too. Yourself and your business safe during the holidays. [00:10:03] Now, of course we had labor day coming up. We're going to have more holidays, right? There's always more holidays in the future and less it's after the first of the year, then you got to wait a long time. Make sure you get it, make sure you dig it out. If he didn't notice it just search for me@craigpeterson.com. [00:10:23] That's where the email comes from and have a look at that. I have links on how to do all of those things. It's very important. FBI warning out just last week. [00:10:33] I just told you about one of the biggest problems we are facing right now, when it comes to hackers and then has to do with fishing and going to fake login pages. Now I'm going to tell you exactly what to do. [00:10:47] How do you steer clear of these fake log-in pages and how do you protect yourself in case you accidentally do provide the bad guys with the information that you shouldn't have? [00:11:01] If they've got your email address or your login name and they have your password, it's pretty easy for them to log in. In most cases right into your bank account. So first of all, don't fall for phishing, but as we just described because of this whole inattentional blindness that we have, it's easy enough to fall, pray for this. [00:11:28] Beat yourself up too bad if you followed, if you fell for some of that stuff, but there is a great little website the Google has that you might want to check out. And that website gives you a real quick quiz, is the best way to. And it shows you some emails and you get to determine whether or not you think it's fishing and then it tells you what the reality of it is. [00:11:59] So go to fishing quiz. Dot with google.com. If you miss that, you can always email me M e@craigpeterson.com and I'll send it off to, but phishing quiz dot with google.com. And of course, phishing is spelled P H I S H I N G fishing. Dot with google.com. So you can go there and right there on the screen, it says, take the quiz. [00:12:30] You can hit it and make up a name and an email address. So it doesn't have to be your real name or your real email address. Okay. It's not going to send you anything. It's not going to sign you up for stuff. It just wants to use it in. Phishing email examples. That's going to give you, so I put in a fake name and a fake email address and it is showing me an email. [00:13:00] So to me, from a Luke, John. And it says Luke Johnson shared a link to the following document, Tony 21 budget department dot doc. So if I click on that, I have now told them, Hey, I'm open to all that sort of stuff. It's so anyways, it's got the link and it's got the opening docs and you now up above say, is this phishing or is it. [00:13:27] Legitimate. Okay. So if we say fishing that says, correct, this is a phishing email. You might have spotted the look alike, you are out. And that is indeed exactly what it is cause it it wasn't legitimate. And remember when you mouse over a link, you can see down at the bottom. The URL that is going to open up for you. [00:13:51] So you can just go through this at your own speed at your own pace and figure it out again. If you didn't get that, you can always email me M E ed Craig peterson.com. And I'll be glad to get back to you. So that's a good way to learn about fishing. I want to con really warn, I should say businesses. If you are sending out phishing emails to your employees to see if they are opening fake phishing emails or not. [00:14:23] That's an okay. Practice. The problems really come in with the companies that are sending out phishing emails and are then following up in such a way that employee is punished in some places they are being punished by if you've opened three fake emails over the last year or whatever it might be. [00:14:47] But over the last year, you're. It's that bad. So we have to be careful. You're not going to increase the confidence of your employees by doing that. And what's, you're actually going to end up doing is slowing down the productivity of your employees. Because now they're going to be really worried about opening, any emails that look like they might be legitimate. [00:15:14] And so your business is going to slow right down. So having some more training about it. Okay. I can see that everyone makes mistakes and we've got to remember that as well, but watch free, man. But we really are trying to get you to move quickly, act fast, or I need this answer right away. Or one of the big ones is we've got this vendor and in fact, I'll, let me give you a real world example. [00:15:41] It's a manufacturing company and of course they. To buy product from vendors, as supplier. And then they use that product or whether it's copper or whatever it might be now to put it all together to make their products. And this one person, this one, hacker a lady again in Eastern Europe, she went and found out about this company. [00:16:08] Okay, great. Found on their website, who the CEO was, who the CFO was. Okay, great. And was able to find the CEO online on Facebook and on his Facebook account, he said, yeah, we're going to The Bahamas. Rear-ending a sailboat. We're going to be out there, the whole family for two weeks. This is going to be fantastic disconnected. [00:16:37] So she found all of that. Now what she had to do was she found out who it was. The CEO, what school he went to. So first she had to get around the restrictions. Cause he had said, don't share my posts with anyone other than friend. So she sent him a message because she found his LinkedIn profile. You see how easy this is to do. [00:16:59] She found his LinkedIn profile and that he went to Harvard and got his MBA. So she sent him. A little note saying, Hey, remember me Janie from X, Y, Z class at Harvard, and want to be friends catch up a little bit. And then he doesn't remember who she is, but the picture looks cute enough. I might as well say yes. [00:17:21] And now she had his contact information over on LinkedIn, send him a friend request over on Facebook as well. That's how she found out he was going to be gone for two weeks. And so now she knows when he's gone. And where he's going to be completely out of touch. So once he's gone about two or three days later, she sent an email off to the CFO inside the company and said, Hey. [00:17:49] We've got this new vendor they've been providing us with product for the last three months. We haven't paid them at all yet. I need you to wire. It was a little more than $40 million because she'd done her homework. She knew how much money the company made, what their expenses probably were. I need you to wire $40 million to this account, or they're going to stop. [00:18:17] All shipments to us. And instead of the CFO doing a little bit more homework into it and digging in and finding out because talking to the people in receiving that we've never received anything from that company. I don't know what you're talking about. And then talking with the guy on the manufacturing floor, the CFO didn't do any of that, just okay. This looks legit. And by the way, it is so easy for these hackers to also gain access to personal email accounts. And we're not going to spend time going into that right now. So he wired. Yes indeed. So there's an example of falling for fishing. A little bit of follow up on the part of the CFO would have shown him that this was not legitimate. [00:19:07] Even over on Shark Tank. Barbara Cochran. She fell prey to this, actually it was her assistant and who wired some $400,000 to a vendor that wasn't real. Now the good news is the assistant copied Barbara who saw the email right away and said, whoa, wait a minute. They called the bank and they put a stop on it.. [00:19:34] Doing a little training here on how to spot fake log-in pages. We just covered fishing and some real world examples of it, of some free quiz stuff that you can use to help with it. And now we're moving on to the next step. [00:19:50] The next thing to look for when it comes to the emails and these fake login pages is a spelling mistake or grammatical errors. [00:20:02] Most of the time, these emails that we get that are faking emails are, have really poor grammar in them. Many times, of course the commas are in the wrong place, et cetera, et cetera. But most of us weren't English majors. So we're not going to pick that up myself included. That's why I use Grammarly. [00:20:21] If you have to ever write anything or which includes anything from an email or a document you probably want to get Grammarly. There's a few out there, but that's the one I liked the best for making sure my grammar. So a tip, to the hackers out there, but the hackers will often use a URL that is very close to it. [00:20:45] Where are you want to go? So they might put a zero in place of an O in the domain, or they might make up some other domain. So it might be amazon-aws.com or a TD bank-account.com. Something like that. Sometimes the registrars they'll catch that sort of thing and kill it. Sometimes the business that they are trying to fake will catch it and let them know as well. [00:21:19] There's companies out there that watch for that sort of thing. But many times it takes a while and it's only fixed once enough people have reported it. So look at the URL. Make sure it's legitimate. I always advise that instead of clicking on the link in the email, try and go directly to the website. [00:21:41] It's like the old days you got a phone call and somebody saying, yo, I'm from the bank and I need your name and social security numbers. So I can validate the someone broke into your account. No, they don't. They don't just call you up like that nowadays. They'll send you a message in their app. [00:21:56] That's on your smart. But they're not going to call you. And the advice I've always given is look up their phone. And by the way, do it in the phone book, they remember those and then call them back. That's the safest way to do that sort of thing. And that's true for emails as well. If it's supposedly your bank and it's reporting something like someone has broken into your account, which is a pretty common technique for these fissures, these hackers that are out there, just type in the bank URL as it not what's in the email. [00:22:33] There will be a message there for you if it's legitimate, always. Okay. So before you click on any website, Email links, just try and go directly to the website. Now, if it's one of these deep links where it's taking new Jew, something specific within the site, the next trick you can play is to just mouse over the link. [00:22:58] So bring your mouse down to where the link is. And typically what'll happen is at the bottom left. Your screen or of the window. It'll give you the actual link. Now, if you look at some of them, for instance, the emails that I send out, I don't like to bother people. So if you have an open one of my emails in a while, I'll just automatically say, Hey, I have opened them in awhile, and then I will drop you off the list. [00:23:28] Plus if you hit reply to one of my newsletters, my show notes, newsletters. That's just fine, but it's not going to go to me@craigpeterson.com and some people you listeners being the best and brightest have noticed that what happens is it comes up and it's some really weird URL that's so I can track. [00:23:51] Who responded to me. And that way I can just sit down and say, okay, now let me go through who has responded? And I've got a, kind of a customer relationship management system that lets me keep track of all of that stuff so that I know that you responded. I know you're interacting, so I know I'm not bothering you. [00:24:11] And I know I need to respond. Much the same thing is true with some of these links. When I have a link in my newsletter and I say, Hey, I'm linking to MIT's article. It is not going to be an MIT. Because again, I want to know what are you guys interested in? So anytime you click on a link, I'll know, and I need to know that, so I know why, Hey, wait a minute. [00:24:36] Now, 50% of all of the people that opened the emails are interested in identifying fake login pages. So what do I do? I do something like I'm doing right now. I go into depth on fake logs. Pages. I wouldn't have known that if I wasn't able to track it. So just because the link doesn't absolutely look legit doesn't mean it isn't legit, but then again, if it's a bank of it involves financial transactions or some of these other things be more cautious. [00:25:11] So double check for misspellings or grammatical errors. Next thing to do is to check the certificate, the security certificate on the site. You're on this gets a little bit confusing. If you go to a website, you might notice up in the URL bar, the bar that has the universal resource locator, that's part of the internet. [00:25:38] You might've noticed a. And people might've told you do check for the lock. That lock does not mean that you are safe. All it means is there is a secure VPN from your computer to the computer on the other side. So if it's a hacker on the other side, you're sending your data securely to the hacker, right? [00:26:05] That's not really going to do you a whole lot of good. This is probably one of the least understood things in the whole computer security side, that connect. May be secure, but is this really who you think it is? So what you need to do is click on their certificate and the certificate will tell you more detail. [00:26:29] So double check their certificate and make sure it is for the site. You really. To go to, so when it's a bank site, it's going to say, the bank is going to have the bank information on it. That makes sense. But if you go for instance on now, I'm going to throw a monkey wrench into this whole thing. [00:26:48] If you go to Craig peterson.com, for instance, it's going to. Connection is secure. The certificate is valid, but if you look at their certificate and the trust in the details, it's going to be issued by some company, but it's going to just say Craig peterson.com. It's not going to give a business name like it would probably do for a bank. [00:27:14] So you know, a little bit of a twist to it, but that's an important thing. Don't just count on the lock, make sure that the certificate is for the place you want to contact. Last, but not least is multi-factor authentication. I can't say this enough. If the bad guys have your username or email address and your password for a site, if you're using multifactor authentication, they cannot get in. [00:27:53] So it's going to prevent credential stuffing tactics, or they'll use your email and password combinations that have already been stolen for mothers sites to try and hack in to your online profile. So very important to set up and I advise against using two factor authentication with your, just a cell phone, as in a text message SMS, it is not secure and it's being hacked all of the time. [00:28:23] Get an authorization. Like one password, for instance, and you shouldn't be using one password anyways, for all of your passwords. And then Google has a free one called Google authenticator. Use those instead of your phone number for authentication. [00:28:40] You're listening to Craig Peterson, cybersecurity strategist, and online@craigpeterson.com. [00:28:48] I've been warning about biometric databases. And I sat down with a friend of mine who is an attorney, and he's using this clear thing at the airport. I don't know if you've seen it, but it's a biometric database. What are the real world risks? [00:29:04] This clear company uses biometrics. [00:29:08] It's using your eye. Brent, if you will, it's using your Iris. Every one of us has a pretty darn unique Iris, and they're counting on that and they're using it to let you through TSA very quickly. And this attorney, friend of mine thinks it's the best thing since sliced bread, because he can just. On through, but the problem here is that we're talking about biometrics. [00:29:34] If your password gets stolen, you can change it. If your email account gets hacked, I have another friend who his account got hacked. You can get a new email account. If your Iris scan that's in this biometric database gets stolen. You cannot replace your eyes unless of course you're Tom cruise and you remember that movie, and it's impossible to replace your fingerprints. It's possible to replace your face print. I guess you could, to a degree or another, some fat injections or other things. Could be done to change your face sprint, but these Iris scans fingerprints and facial images are something I try not to provide any. [00:30:29] Apple has done a very good job with the security of their face print, as well as their fingerprint, because they do not send any of that information out directly to themselves or to any database at all. Period. They are stored only on the device itself. And they're in this wonderful little piece of electronics that can not be physically compromised. [00:30:59] And to date has not been electronically compromised either. They've done a very good job. Other vendors on other operating systems like Android, again, not so much, but there are also databases that are being kept out there by the federal government. I mentioned this clear database, which isn't the federal government, it's a private company, but the federal government obviously has its fingers into that thing. [00:31:29] The office of personnel. For the federal government, they had their entire database, at least pretty much the entire database. I think it was 50 million people stolen by the red, Chinese about six years ago. So the communists. Copies of all of the information that the officer personnel management had about people, including background checks and things. [00:31:55] You've probably heard me talk about that before. So having that information in a database is dangerous because it attracts the hackers. It attracts the cybercriminals. They want to get their hands on it. They'll do all kinds of things to try and get their hands. We now have completely quit Afghanistan. [00:32:20] We left in a hurry. We did some incredibly stupid things. I just, I can't believe our president of the United States would do what was done here. And now it's been coming out that president and Biden completely ignored. The advice that he was getting from various military intelligence and other agencies out there and just said, no, we're going to be out of there. [00:32:46] You have to limit your troops to this. And that's what causes them to close the air base battleground that we had for so many years. Apparently the Chinese are talking about taking it over now. Yeah. Isn't that nice. And whereas this wasn't an eternal war, right? We hadn't had anybody die in a year and a half. [00:33:05] It's crazy. We have troops in south Vietnam. We have troops in Germany. We have troops in countries all over the world, Japan, you name it so that we have a local forest that can keep things calm. And we were keeping things calm. It's just mind blowing. But anyhow, politics aside, we left behind a massive database of biometric database. [00:33:38] Of Afghanis that had been helping us over in Afghanistan, as well as a database that was built using us contractors of everyone in the Afghan military and the basically third genealogy. Who their parents were the grandparents blood type weight, height. I'm looking at it right now. All of the records in here, the sex ID nationality. [00:34:11] Date of exploration, hair color, favorite fruit, favorite vegetables, place of birth, uncle's name marker signature approval. Signature date, place of birth. Date of birth address, permanent address national ID number place of ISS. Date of ISS native language salary data salary, group of salary, police of salary education, father's name, graduation, date, weapon and service now. [00:34:41] These were all in place in Afghanistan. We put them in place because we were worried about ghost soldiers. A gold soldier was someone who we were paying the salary of taxpayers of the United States were paying the salaries of the Afghan military for quite some time. And we were thinking that about half of the. [00:35:06] Payroll checks. We were funding. We're actually not going to people who were in the military, but we're going to people who were high up within the Afghan government and military. So we put this in place to get rid of the ghost soldiers. Everybody had to have all of this stuff. In the database, 36 pieces of information, just for police recruitment. [00:35:39] Now this information we left behind and apparently this database is completely in the hand of the Taliban. Absolutely. So we were talking about Americans who helped construct Afghanistan and the military and the telephone. The looking for the networks of their Ponant supporters. This is just absolutely amazing. [00:36:07] So all of the data doesn't have clear use, like who cares about the favorite fruit or vegetable, but the rest of it does the genealogy. Does they now know who was in the police department, who was in the military, who their family is, what their permanent address is. Okay. You see the problem here and the biometrics as well in the biometrics are part of this us system that we were using called hide H I D E. [00:36:41] And this whole hide thing was a biometric reader. The military could keep with them. There were tens of thousands of these things out in the field. And when they had an encounter with someone, they would look up their biometrics, see if they were already in the database and in the database, it would say, yeah, they're friendly, they're an informant. [00:37:03] Or we found them in this area or w we're watching them. We have concern about them, et cetera, et cetera. All of their actions were in. Turns out that this database, which covered about 80% of all Afghans and these devices are now in the hands of the Taliban. Now, the good news with this is that a lot of this information cannot be easily extracted. [00:37:32] So you're not going to get some regular run of the mill Taliban guy to pick one of these up and start using. But the what's happening here is that we can really predict that one of these surrounding companies like Pakistan that has been very cooperative with the Taliban. In fact, they gave refuge to Saddam, not Saddam Hussein, but to a bin Ladin and also Iran and China and Russia. [00:38:04] Any of those countries should be able to get into that database. Okay. So I think that's really important to remember now, a defense department spokesperson quote here, Eric Fay on says the U S has taken prudent actions to ensure that sensitive data does not fall into the Tolo bonds. And this data is not at risk of misuse. [00:38:29] Misuse that's unfortunately about all I can say, but Thomas Johnson, a research professor at the Naval postgraduate school in Monterey, California says not so fast, the taller Bon may have used biometric information in the Coon dues. So instead of taking the data straight from the high devices, he told MIT technology review that it is possible that Tolo bond sympathizers in Kabul, provided them with databases of military personnel, against which they could verify prints. [00:39:07] In other words, even back in 2016, it may have been the databases rather than these high devices themselves pose the greatest risk. This is very concerning big article here in MIT technology review. I'm quoting from it a little bit here, but there are a number of databases. They are biometric. Many of these, they have geological information. [00:39:35] They have information that can be used to round up and track down. Now, I'm not going to mention world war two, and I'm not going to mention what happened with the government too, before Hitler took over, because to do that means you lose that government had registered firearms, that government had registered the civilians and the people and Afghanistan. [00:40:04] The government was also as part of our identification papers, registering your religion. If you're Christian, they're hunting you down. If you were working for the military, they're hunting you down. And this is scary. That's part of the reason I do not want biometric information and databases to be kept here in the U S Hey, make sure you get my show notes every week on time, along with free training, I try to help you guys out. [00:40:41] If you've never heard of the Carrington event, I really hope, frankly, I really do hope we never have to live through one of these. Again, there is a warning out there right now about an internet apocalypse that could happen because of the sun. [00:40:58] Solar storms are something that happens really all of the time. The sun goes through solar cycles. About every seven years, there are longer cycles as well. You might know. I have an advanced class amateur radio license I've had for a long time, and we rely a lot when we're dealing with short wave on the solar cycle. [00:41:22] You see what happens is that the sun charges, the atmosphere. That if you've ever seen the Northern light, that is. Part of the Sunzi missions, hitting our magnetic field and getting sucked into the core of the earth, if you will, as they get caught in that field. And the more charged the atmosphere is, the more bounce you get. [00:41:46] That's what we call it bounce. And the reason us hams have all these different frequencies to use is because of the bow. We can go different frequencies with different distances, I should say, using different frequencies. So think about it right now. You've got the earth and I want to talk from Boston to Chicago. [00:42:08] For instance, I know about how many miles it is, and I have to figure out in the ionosphere up in the higher levels of the atmosphere, what frequency. To use in order to go up into the atmosphere, bounce back, and then hit Chicago. That's the idea. It's not quite as simple or as complex in some ways, as it sounds, a lot of people just try different frequencies and a lot of hams just sit there, waiting for anybody anywhere to talk to, particularly if they are. [00:42:41] It's really quite fun. Now what we're worried about, isn't so much just the regular solar activity. We get worried when the sun spots increase. Now, the solar cycle is what has primary image. On the temperature on earth. So no matter what, you might've heard that isn't your gas, guzzling car or a diesel truck that causes the Earth's temperature to change. [00:43:10] Remember the only constant when it comes to the Earth's temperature has been changed over the millions of years. We had periods where the earth was much warmer than it is now had more common that carbon dioxide in the atmosphere than it does now had less. In fact, right now we are at one of the lowest levels of carbon dioxide in the atmosphere in earth long. [00:43:36] So the sun, if you might remember, comes up in the morning, warms things up, right? And then it cools down. When the sun disappears at nighttime, it has a huge impact. It's almost exclusively the impact for our temperatures. There's other things too, for instance. eruption can spew all to hold a lot of carbon dioxide. [00:44:01] In fact, just one, just Mount St. Helens wanted erupted, put more carbon dioxide into the atmosphere than man has throughout our entire existence. Just to give you an idea, right? So these alarms that are out there, come on, people. Really, and now we're seeing that in this last year, we had a 30% increase in the ice cap up in the, in, up in the north, up in Northern Canada, around the polls. [00:44:32] We also had some of these glaciers growing. It was so funny. I saw an article this year, or excuse me, this week that was showing a sign that was at one of our national parks. And it said this glacier will have disappeared by 2020. Of course it hasn't disappeared. In fact, it has grown now and it's past 2020. [00:44:54] Anyhow, the sun has a huge impact on us in so many ways. And one of the ways is. Something called a coronal mass ejection. This is seriously charged particles. That tend to be very directional. So when it happens, when there's one of these CMS coronal, mass ejections, it's not just sending it out all the way around the sun everywhere. [00:45:21] It's really rather concentrated in one. One particular spot. Now we just missed one not too long ago. And let me see if I can find it here. Just mast, a cm E near miss. Here we go. There a solar super storm in July, 2012, and it was a very close shave that we had most newspapers didn't mention it, but this could have been. [00:45:51] AB absolutely incredible. We'd be picking up the pieces for the next 50 years. Yeah. Five, zero years from this one particular storm. And what happens is these solar flares, if you will, are very extreme, the CME. You're talking about x-rays extreme UV, ultraviolet radiation, reaching the earth at the speed of light ionizes, the upper layers of atmosphere. [00:46:19] When that happens, by the way, it hurts our communications, but it can also have these massive effects where it burns out saddle. And then causes radio blackouts, GPS, navigation problems. Think about what happened up in Quebec. So let me just look at this back hit with an E and yeah, here we go. And March 13th, 1989. [00:46:50] Here we go. Here's another one. Now I remembered. And this is where Quill back got nailed. I'm looking at a picture here, which is looking at the United States and Canada from the sky and where the light is. And you can see Quebec is just completely black, but they have this massive electrical blackout and it's becomes. [00:47:13] Of this solar storm. Now they, these storms that I said are quite directional depending on where it hits and when it hits things can get very bad. This particular storm back in 1989 was so strong. We got to see their Rora Borealis, the Northern lights as far south, as Florida and cute. Isn't that something, when we go back further in time to this Carrington event that I mentioned, you could see the Northern lights at the eclipse. [00:47:50] Absolutely amazing. Now the problem with all of this is we've never really had an internet up online. Like we have today when we had one of the storms hit. And guess what we're about to go into right now, we're going into an area or a time where the sun's going to be more active, certainly on this 11 year cycle and possibly another bigger cycle too, that we don't really know much about. [00:48:22] But when this hit us back in the 1850s, what we saw was a a. Telegraph system that was brought to its knees. Our telegraphs were burned out. Some of the Telegraph buildings were lit. They caught on fire because of the charges coming in, people who were working the telegraphs, who are near them at the time, got electric shocks or worse than that. [00:48:48] Okay. 1859 massive Carrington event compass needles were swinging wildly. The Aurora Borealis was visible in Columbia. It's just amazing. So that was a severe storm. A moderate severity storm was the one that hit in Quebec here knocked out Quebec electric. Nine hour blackout of Northeast Canada. What we think would happen if we had another Carrington event, something that happened to 150 years ago is that we would lose power on a massive scale. [00:49:27] So that's one thing that would happen. And these massive transformers that would likely get burned out are only made in China and they're made on demand. Nobody has an inventory. So it would be at least six months before most of the country would get power back. Can you believe that would be just terrible and we would also lose internet connectivity. [00:49:52] In fact, the thinking that we could lose internet connectivity with something much less than a severe storm, maybe if the Quebec power grid solar, a massive objection here. Maybe if that had happened, when. The internet was up. They might have burned out internet in the area and maybe further. So what we're worried about is if it hits us, we're going to lose power. [00:50:20] We're going to lose transformers on the transmission lines and other places we're going to lose satellites and that's going to affect our GPS communication. We're going to lose radio communication, and even the undersea cables, even though they're now no longer. Regular copper cables. It's now being carried of course, by light in pieces of glass. [00:50:45] The, those cables need to have repeaters about every 15 miles or so under underwater. So the power is provided by. Copper cables or maybe some other sort of power. So these undersea cables, they're only grounded at extensive intervals, like hundreds or thousands of kilometers apart. So there's going to be a lot of vulnerable components. [00:51:12] This is all a major problem. We don't know when the next massive. Solar storm is going to happen. These coronal mass ejections. We do know they do happen from time to time. And we do know it's the luck of the draw and we are starting to enter another solar cycle. So be prepared. Of course, you're listening to Craig Peterson, cybersecurity strategist. [00:51:42] If you'd like to find out more and what you can do, just visit Craig peterson.com and subscribe to my weekly show notes. [00:51:52] Google's got a new admission and Forbes magazine has an article by Zach Dorfman about it. And he's saying you should delete Google Chrome now after Google's newest tracking admission. So here we go. [00:52:09] Google's web browser. It's been the thing for people to use Google Chrome for many years, it's been the fastest. Yeah, not always people leapfrog it every once in a while, but it has become quite a standard. Initially Microsoft is trying to be the standard with their terrible browser and yeah, I to Exploder, which was really bad and they have finally completely and totally shot it in the head. [00:52:42] Good move there on their part. In fact, they even got rid of their own browser, Microsoft edge. They shot that one in. They had to, I know I can hear you right now saying, oh, Craig, I don't know. I just use edge browser earlier today. Yeah. But guess what? It isn't edge browser. It's actually Google Chrome. The Microsoft has rebranded. [00:53:04] You see the guts to Google Chrome are available as what's called an open source project. It's called chromium. And that allows you to take it and then build whatever you want on top of. No, that's really great. And by the way, Apple's web kit, Kat is another thing that many people build browsers on top of and is part of many of these browsers we're talking about right now, the biggest problem with the Google Chrome. [00:53:35] Is they released it so they could track you, how does Google make its money? It makes us money through selling advertising primarily. And how does it sell advertising if it doesn't know much or anything about you? So they came out with the Google Chrome browser is a standard browser, which is a great. [00:53:55] Because Microsoft, of course, is very well known for not bothering to follow standards and say what they have is the actual standard and ignoring everybody else. Yeah. Yeah. I'm picking on Microsoft. They definitely deserve it. There is what is being called here in Forbes magazine, a shocking new tracking admission from. [00:54:17] One that has not yet made headlines. And there are about what 2.6 billion users of Google's Chrome worldwide. And this is probably going to surprise you and it's frankly, Pretty nasty and it's, I think a genuine reason to stop using it. Now, as you probably know, I have stopped using Chrome almost entirely. [00:54:42] I use it when I have to train people on Chrome. I use it when I'm testing software. There's a number of times I use it, but I don't use it. The reality is that Chrome is an absolute terror. When it comes to privacy and security, it has fallen way behind its rivals in doing that. If you have an iPhone or an iPad or a Mac, and you're using safari, apple has gone a long ways to help secure your data. [00:55:19] That's not true with Chrome. In fact, it's not protecting you from tracking and Dave data harvesting. And what Google has done is they've said, okay we're going to get these nasty third party cookies out of the whole equation. We're not going to do that anymore. And what they were planning on doing is instead of knowing everything specifically. [00:55:43] You they'd be able to put you in a bucket. So they'd say, okay, you are a 40 year old female and you are like driving fast cars and you have some kids with a grandkid on the way, and you liked dogs, not cats, right? So that's a bucket of people that may be a few hundred or maybe up to a thousand. As opposed to right now where they can tell everything about you. [00:56:12] And so they were selling that as a real advantage because they're not tracking you individually anymore. No, we're putting you in a bucket. It's the same thing. And in fact, it's easier for Google to put you in a bucket than to track everything about you and try and make assumptions. And it's easier for people who are trying to buy ads to place in front of you. [00:56:34] It's easier for them to not have to reverse engineer all of the data the Google has gathered in instead. To send this ad to people that are in this bucket and then that bucket. Okay. It makes sense to you, but I, as it turns out here, Google has even postponed of that. All right. They really have, they're the Google's kind of hiding. [00:56:59] It's really what's going on out there. They are trying to figure out what they should do, why they should do it, how they should do it, but it's going to be a problem. This is a bad habit. The Google has to break and just like any, anybody that's been addicted to something it's going to take a long time. [00:57:19] They're going to go through some serious jitters. So Firefox is one of the alternatives and to Google Chrome. And it's actually a very good one. It is a browser that I use. I don't agree with some of the stuff that Mozilla and Firefox does, but again, nobody agrees on everything. Here's a quote from them. [00:57:41] Ubiquitous surveillance harms individually. And society Chrome is the only major browser that does not offer meaningful protection against cross site tracking and Chrome will continue to leave users unprotected. And then it goes on here because. Google response to that. And they admit that this massive web tracking out of hand and it's resulted in, this is a quote from Google and erosion of trust, where 72% of people feel that almost all of what they do online is being. [00:58:19] By advertisers, technology firms or others, 81% say the potential risks from data collection outweigh the benefit by the way, the people are wrong. 72% that feel almost all of what they do on online is being tracked. No. The answer is 100% of what you do is probably being tracked in some way online. [00:58:41] Even these VPN servers and systems that say that they don't do logs. Do track you take a look at proton mail just last week. Proton mail it's in Switzerland. Their servers are in Switzerland. A whole claim to fame is, Hey, it's all encrypted. We keep it safe. We don't do logging. We don't do tracking guess what they handed over the IP addresses of some of the users to a foreign government. [00:59:09] So how can you do that? If you're not logging, if you're not tracking. Yeah, they are. And the same thing is true for every paid VPN service I can think of. So how can Google openly admit that their tracking is in place tracking everything they can, and also admit that it's undermining our privacy. [00:59:36] Their flagship browser is totally into it. It's really, it's gotta be the money. And Google does not have a plan B this anonymized tracking thing that they've been talking about, the buckets that I mentioned, isn't realistic, frankly. Google's privacy sandbox is supposed to Fitbit fix it. [00:59:56] I should say. The whole idea and the way it's being implemented and the way they've talked about it, the advertisers on happy. So Google is not happy. The users are unhappy. So there you go. That's the bottom line here from the Forbes article by Zach Dorfman, delete Google Chrome. And I said that for a long time, I do use some others. [01:00:20] I do use Firefox and I use. Which is a fast web browser. That's pretty good shape. Hey, if you sign up for my shows weekly newsletter, not only will you get all of my weekly tips that I send to the radio hosts, but you will get some of my special reports that go into detail on things like which browser you shouldn't be using. [01:00:46] Sign up right now. Craig peterson.com. [01:00:50] Many businesses have gone to the cloud, but the cloud is just another word for someone else's computer. And many of the benefits of the cloud just haven't materialized. A lot of businesses have pulled back and are building data centers. [01:01:07] Now, the reason I mentioned this thing about Microsoft again, and the cloud is Microsoft has a cloud offering. [01:01:17] It's called Microsoft Azure. Many people, many businesses use it. We have used it with some of our clients in the past. Now we have some special software that sits in front of it that helps to secure. And we do the same thing for Amazon web services. I think it's important to do that. And we also use IBM's cloud services, but Microsoft is been pitching for a long time. [01:01:45] Come use our cloud services and we're expecting here probably within the next month, a big announcement from Microsoft. They're planning on making it so that you can have your desktop reside in Microsoft's cloud, in the Azure cloud. And they're selling really the feature of it doesn't matter where you are. [01:02:11] You have your desktop and it doesn't matter what kind of computer you're on. As long as you can connect to your desktop, using some just reasonable software, you will be able to be just like you're in front of a computer. So if you have a Chromebook or a Mac, Or windows or tablet, whatever. And you're at the grocery store or the coffee shop or the office, you'll be able to get it, everything, all of your programs, all your files. [01:02:41] And we, Microsoft will keep the operating system up to date for you automatically a lot of great selling points. And we're actually looking into that, not too heavily yet. We'll give them a year before we really delve into it at all. Cause it takes them a while to get things right. And Microsoft has always been one that adds all kinds of features, but most of the time, most of them don't work and we can document that pretty easily, even in things like Microsoft. [01:03:11] The verge is now reporting that Microsoft has warned users of its as your cloud computing service, that their data has been exposed online for the last two years. Yeah, let me repeat that in case you missed it, you yeah. I'm I might've misspoken. Let me see, what does it say? It says users of Azure cloud competing service. [01:03:36] So that's their cloud. Microsoft's big cloud. Okay. Their data has been. Exposed online. Okay. So that means that people could get the data, maybe manipulate the data that's exposed means for the last two years. Are you kidding me? Microsoft is again, the verge. Microsoft recently revealed that an error in its Azure cosmos database product left more than 3,300 as your customer's data. [01:04:12] Completely exposed. Okay guys. So this is not a big thing, right? It can't possibly be big thing because you know who uses Azure, nobody uses a zer and nobody uses hosted databases. Come on, give me a break. Let me see, what else does this have to say? Oh, okay. It says that the vulnerability was reported, reportedly introduced into Microsoft systems in 2019, when the company added a data visualization feature called Jupiter notebook to cosmos DB. [01:04:46] Okay. I'm actually familiar with that one and let's see what small companies let's see here. Some Azure cosmos DB clients include Coca Cola. Liberty mutual insurance, Exxon mobile Walgreens. Let me see. Could any of these people like maybe Liberty mutual insurance and Walgreens, maybe they'd have information about us, about our health and social security numbers and account numbers and credit cards. Names addresses. That's again, why I used to get so upset when these places absolutely insist on taking my social security number, right? It, first of all, when it was put in place, the federal government guaranteed, it would never be used for anything other than social security. [01:05:34] And the law even said it could not be used for anything other than social security. And then the government started expanding it. And the IRS started using it. To track all of our income and that's one thing right there, the government computers, they gotta be secure. All of these breaches we hear about that. [01:05:52] Can't be true. So how about when the insurance company wants your personal information? Like your social security number? What business is it of? There's really no. Why do they have to have my social security number? It's a social security number. It's not some number that's tattooed on my forehead. That's being used to track me. [01:06:18] Is it this isn't a socialist country like China is, or the Soviet union was right. It's not social. So why are they tracking us like that? Walgreens? Why do they need some of that information? Why does the doctor that you go to that made the prescription for Walgreens? Why do they need that information? [01:06:40] And I've been all over this because they don't. Really need it. They want, it makes their life easier, but they don't really need it. However, it exposes us. Now, if you missed the email, I sent out a week ago, two weeks ago now, you missed something big because I, in my weekly newsletter went through and described exactly what you could do in order to keep your information private. [01:07:13] So in those cases where websites asking for information that they don't really need, right? You don't want to lie, but if they don't really need your real name, why you're giving them your real name? Why do you use a single email address? Why don't you have multiple addresses? Does that start make sense to you guys? [01:07:33] And now we find out that Microsoft Azure, their cloud services, where they're selling cloud services, including a database that can be used online, a big database 3,300 customers looks like some of them are actually big. I don't know. ExxonMobil pretty big. Yeah. I think so. Walgreens, you think that might be yeah. [01:07:57] Why. Why are we trusting these companies? If you have a lot of data, a lot of customers, you are going to be a major target of nation states to hack you and bat just general hackers, bad guys. But you're also if you've got all this information, you've also got to have a much higher level of security than somebody that doesn't have all of that information. [01:08:24] Does that make sense to you? Did I say that right? You don't need the information and I've got to warn anybody that's in a business, whether you're a business owner or you're an employee, do not keep more data than you need the new absolutely need to run your company. And that includes data about your customers. [01:08:48] And maybe it's even more specifically data about your customer. Because what can happen is that data can be stolen and we just found it. That? Yes, indeed. It could have been, it was exposed Microsoft the same. We don't know how much it was stolen. If anything was stolen. Yeah, Walgreens. Hey, I wonder if anyone's going to try and get some pain pills illegally through a, this database hack or a vulnerability anyways. [01:09:17] All right, everyone. Stick around. We'll be back. Of course, you listening to Craig Peterson. I am a cybersecurity strategist for business, and I'm here to help you as well. You can ask any question any time consumers are the people I help the most, I wish I got a dime for every time I answered a question. [01:09:38] Just email me@craigpeterson.com and stick around. [01:09:44] Whether or not, you agree with the lockdown orders that were put in place over this COVID pandemic that we had. There are some other parts of the world that are doing a lot more. [01:10:00] Australia has. I don't know. I think that they went over the deep end that much, the same thing is true right next door to them. [01:10:11] And I am looking at a report of what they are doing with this new app. You might be aware that both apple and Google came out with an application programming interface. That could be used for contract tack tracking, contact tracking. There you go. It wasn't terribly successful. Some states put some things in place. [01:10:38] Of course you get countries like China. I love the idea because heaven forbid you get people getting together to talk about a Tannen square remembrance. Now you want to know who all of those people were, who were in close proximity, right? Good for China a while, as it turns out, Australia is putting something in place they have yet another COVID lockdown. [01:11:03] They have COVID quarantine orders. Now I think if you are sick, you should stay here. I've always felt that I, I had 50 employees at one point and I would say, Hey, if you're sick, just stay home. Never required a doctor's note or any of that other silliness, come on. People. If someone's sick, they're sick and let them stay home. [01:11:26] You don't want to get everybody else in the office, sick and spread things around. Doesn't that just make sense. They now in Australia, don't trust people to stay home, to get moving. Remember China, they were taking welders and we're going into apartments in anybody that tested positive. [01:11:42] They were welding them into their apartment for minimum of two weeks. And so hopefully they had food in there and they had a way to get fresh water. Australia is not going quite that far, but some of the states down under. Using facial recognition and geolocation in order to enforce quarantine orders and Canada. [01:12:07] One of the things they've been doing for very long time is if you come into the country from out of the country, even if you're a Canadian citizen, you have to quarantine and they'll send people by your house or you have to pay to stay for 10 days in a quarantine hope. So you're paying the, of course now inflated prices for the hotel, because they're a special quarantine hotel. [01:12:34] You have to pay inflated prices to have food delivered outside your door. And that you're stuck there for the 10 days, or if you're at home though, they, you're stuck there and they'll send people by to check up on you. They'll make phone calls to check up on you. They have pretty hefty fines. [01:12:54] What Australia has decided to do is in Australia is Charlene's even going from one state to another state are required to prove that they're obeying a 14 day quarantine. And what they have to do is have this little app on their phone and they, the app will ping them saying, prove it. And then they have to take a photo of themselves with geo location tag on it and send it up via the app to prove their location. [01:13:32] And they have to do all of that within 15 minutes of getting the notification. Now the premier of the state of south Australia, Steven Marshall said, we don't tell them how often or when on a random basis, they have to reply within 15 minutes. And if you don't then a police, officer's going to show up at the address you're supposed to be at to conduct an in-person check. [01:13:59] Very intrusive. Okay. Here's another one. This is an unnamed government spokesperson who was apparently speaking with Fox news quote. The home quarantine app is for a selected cohort of returning self Australians who have applied to be part of a trial. If successful, it will help safely ease the burden of travel restrictions associated with the pandemic. [01:14:27] So there you go. People nothing to worry about. It's just a trial. It will go away. Just for instance, income tax, as soon as rule, number one is over, it will be removed and it will never be more than 3% and it will only apply to the top 1% of wage-earners. So there you go. And we all know that world war one isn't over yet. [01:14:47] So that's why they still have it in somehow. Yeah, some of the middle class pays the most income tax. I don't know. Interesting. Interesting. So there you go. Little news from down under, we'll see if that ends up happening up here. News from China, China has China and Russia have some interesting things going on. [01:15:08] First of all, Russia is no longer. Country, they are. They aren't, they are a lot freer in many ways than we are here in the United States. Of course, China, very heavily socialist. In fact, they're so socialists, they are communist and China. And Russia both want their kids to have a very good education in science, engineering, and mathematics. [01:15:35] Not so much on history, not so much on, on politics. But definitely heavy on the sciences, which I can see that makes all the sense. I think everybody should be pretty heavily on the science. According to the wall street journal this week, gamers under the age of 18 will not be allowed to play online games between 8:00 PM and 9:00 PM on Friday, Saturdays and Sundays. [01:16:02] Okay. So basically what they're doing, I reverse that what they're doing is they're only allowing the kids three hours of gaming per week. In other words, they can play between eight and 9:00 PM, Friday, Saturday, and Sundays. I think that might overload some gaming servers. Cov gaming addiction has affected studies and normal lives. [01:16:23] And many parents have become miserable. That's China's press and public administration. Sedna state. Okay. There's going to be some relief during the school holidays. Children will be allowed 60 minutes per day for gaming hard to say how China plans didn't force it, but they have their ways, identity cards. By the way required for playing online. They've got a facial recognition system introduced in July by 10 cent. Remember all of the uproar around 10 cent and their apps and president Trump trying to get them blocked here in the U S yeah, there you go. Facial recognition bill right into the app, and it's proven effective at catching children pretending to be adults in order to get around government gaming curves. [01:17:12] So this goes on and on and Korea as well, South Korea has had some very big problems. You might remember it was headlines just a few years ago of some of these south Korean kids dying because they were playing video games four days straight with no sleep, no real food. Just taking all of these energy. [01:17:37] And we'll literally gaming themselves to death. So South Korea passed a law that prevented young people from playing online video games late at night. So that was introduced back in 2011 and it's targeted at players 16 or up. And south Korean miners were prevented from playing online PC games between midnight and six, 8:00 AM. [01:18:03] Now South Korea has scrapped that law. Interesting. So they're saying it's out of respect for younger citizens, right? They're going to abolish this law, replace it by. Permit system that allows players to request a permit per game and play during self-assigned hours that their parents will sign off on. [01:18:27] This is in an article from GameSpot, by the way, a gamespot.com. You might remember them too, the whole Robin hood scandal. But I think it's an interesting question. When my kids were young lo those many years ago I got this box that the, you took the TV wire, you ran it into the box and you could program. [01:18:51] So that each kid had their own code and you could specify how much time the kid could watch TV or how much time or when they could watch TV and how much time cumulative the kids could have. And it actually worked pretty well. And the kids certainly complained a lot about it. And a couple of them tried to work the way around it hard to when the plug is inside the box. [01:19:17] Yeah, ingenuity as they are. They were able to do that. They cut the wire off and put another power connector on the end of the TV wire. Anyhow Microsoft, we've been talking about them a lot. This show. I do not like Microsoft, that already the windows 11 is coming out and we talked about. [01:19:38] Before, because windows 11 is plying. Microsoft is planning on requiring you to have a very modern computer. You need to have a TPM in it, which is this special security module. You need to have a certain speed, et cetera, but the TPM is a big thing. That's going to make it. So most of your computers won't work. [01:20:04] Tons of pushback on that. I can see what Microsoft is trying to do it. They really would love to have a clean operating system that really wasn't getting hacked all the time. And this will help it won't solve their problem, but it will help. So that they're going to be doing now is they're going to over

The Whole Rabbit
The Blood Episode!

The Whole Rabbit

Play Episode Listen Later Sep 10, 2021 58:02


Why is blood red? Is blood supposed to taste good? How many times do I have to say "Bloody Mary" in the bathroom mirror before I get haunted? Prepare your red cells for an exciting injection of knowledge as we plunge through your arterial dimensions to converse about the mysteries hidden within your blood! On this episode we discuss:-Bloody Mary!-How Blood Works?-Luke's Hemophobia-The Hussein Blood Koran-The Color Red-Esoteric Anatomy-Duck Blood Soup-Why Blood Tastes Good-Animal Sacrifice in the Bible In the extended episode available at http://www.patreon.com/TheWholeRabbit we go even further and discuss:-Burning Blood-Vampires and Drinking Blood-Spermatogonial Cells-Menstrual Blood Magick-Telomeres-Tardigrades-The Blood Of The SaintsThis episode was written based on the research and original writings of Heka Astra. Where to find The Whole Rabbit:Online Emporium: https://shop.spreadshirt.com/thewholerabbit/Stickers, t-shirts, hoodies and more!Twitter: https://twitter.com/1WholeRabbitLet's get the conversation started!Spotify: https://open.spotify.com/show/0AnJZhmPzaby04afmEWOAVThe best place for ALL devices.Instagram: https://www.instagram.com/the_whole_rabbit_/Like, subscribe and comment to see all our weird artsy stuff.Reddit: https://www.reddit.com/r/thewholerabbit/Please share your strange findings, stories and feedback with us.Support the show (https://www.patreon.com/thewholerabbit)

Cultures monde
Irak : détruire l'Etat au nom du "nation building"

Cultures monde

Play Episode Listen Later Sep 7, 2021 58:03


durée : 00:58:03 - Cultures Monde - par : Florian Delorme, Mélanie Chalandon, Antoine Dhulster - En 2003, George W. Bush arguait la présence d'armes de destruction massive en Irak pour renverser Saddam Hussein. Aujourd'hui, à l'heure du retrait annoncé des dernières troupes, le processus de construction d'un Etat irakien connaît de grandes difficultés. - réalisation : Vincent Abouchar, Benjamin Hû - invités : Loulouwa Al-Rachid chercheuse spécialiste de l'Irak; Adel Bakawan directeur du département recherche de l'Institut de Recherche et d'Études Méditerranée Moyen-Orient (iReMMO), directeur du Centre de Sociologie de l'Irak (CSI/ Université de Soran); Géraldine Chatelard

Gibborim
Capturing Saddam Hussein with Steve Russell

Gibborim

Play Episode Listen Later Sep 6, 2021 46:15


Join the Gibborim today by downloading the Gibborim app or visiting www.gibborim.com 

Scientifically...
Jim Al-Khalili's Life Scientific

Scientifically...

Play Episode Listen Later Sep 3, 2021 35:27


In an ideal (quantum) world, Jim Al-Khalili would be interviewing himself about his life as a scientist but since the production team can't access a parallel universe, Adam Rutherford is stepping in to ask Jim questions in front of an audience at The Royal Society. Jim and his family left Iraq in 1979, two weeks before Saddam Hussein came to power, abandoning most of their possessions. Having grown up listening to the BBC World Service, he had to drop his ts to fit in at school in Portsmouth where he was one of just three boys in a class of more than a hundred girls. He specialised in nuclear physics and spent fifteen years in front of a computer screen trying to understand an exotic and ephemeral sub-atomic phenomenon known as the halo effect. His ‘little eureka moment' came in 1996 when Jim discovered that, for the mathematics to add up, these halo nuclei had to be a lot bigger than anyone had thought. It isn't going to lead to a new kind of non-stick frying pan any time soon but it was exciting, nonetheless. More recently he has become interested in quantum biology. It started as a hobby back in the 1990s when physicists were sceptical and many biologists were unconvinced. Since then evidence has been stacking up. Several studies suggest that lasting quantum mechanical effects could explain photosynthesis, for example. 'It maybe a red herring' Jim admits but Jim and his team at the University of Surrey are determined to find out if the idea of quantum biology makes sense. Could life itself depend on quantum tunnelling and other bizarre features of the sub-atomic world? Produced by Anna Buckley. First broadcast on Tuesday 5th February 2019.

The Profile
Joel Rosenberg: The Christian author who accidentally predicted 9/11

The Profile

Play Episode Listen Later Aug 27, 2021 51:54


Imagine if terrorists hijacked a plane and flew it into an American city. What if that led to the US President attempting to overthrow Saddam Hussein's Iraq. This was premise of Joel Rosenberg's first novel - and it was written months before the September 11th attacks took place. The astonishing story of how Rosenberg appeared to have predicted geo-political events led to a huge amount of media. In the 20 years since, Rosenberg has written many more books - both fiction and non fiction - all with the aim of helping Christians to understand the times we live in. In this interview with Premier Christianity's Sam Hailes, Joel explains how he came to Christ from a Jewish background and why the landscape of the Middle East is changing so dramatically - a subject he unpacks in his new book Enemies and Allies. The pair also discuss Israel, Bible prophecy and the current situation in Afghanistan.   The Profile is brought to you in association with Premier Christianity magazine. *SPECIAL OFFER ​*Subscribe now FOR JUST £1/month

Archives d'Afrique
Archives d'Afrique - Kofi Annan vs Etats-Unis : les raisons du divorce (11&12)

Archives d'Afrique

Play Episode Listen Later Aug 27, 2021 49:00


Après les attaques sur l'Afghanistan en représailles aux attentats du 11 septembre 2001, la Maison-Blanche veut faire tomber le régime de Saddam Hussein qu'elle accuse de développer des armes de destruction massive. Malgré les efforts de Kofi Annan pour empêcher une nouvelle guerre en Irak, malgré l'intense ballet diplomatique qu'il déploie à la fois pour inciter le président irakien à laisser les inspecteurs de l'ONU procéder aux vérifications sur son territoire, mais également à pousser les grandes nations à convaincre le président George W. Bush d'oublier l'option militaire, Washington semble décidée à en découdre.

Departures with Robert Amsterdam
"We don't do windows" - How the Bush administration sold the Iraq War

Departures with Robert Amsterdam

Play Episode Listen Later Aug 25, 2021 29:43


The chaotic withdrawal of US troops from Afghanistan and rapid fall of Kabul to the Taliban brought back in sharp focus the misguided policies of the George W. Bush administration that led the US into the War on Terror. In “To Start a War: How the Bush Administration Took America into Iraq,” Robert Draper, a writer at large for the New York Times Magazine and the author of several books tells the story of the Bush Administration's misguided invasion of Iraq in 2003. Draper delves into the relationships between the President, his key advisors, and the US intelligence community while painting a vivid picture of the misguided decision-making process that led to groupthink and a colossal intelligence failure. The popular narrative on the invasion of Iraq points to the politicization of intelligence on the question of Iraq's possession of weapons of mass destruction. Draper's book delves into this question, revealing in intimate detail the intense pressure piled onto the agency by Vice President Dick Cheney and his chief of staff Lewis Libby. While Draper tells the story of the invasion of Iraq with remarkable impartiality and fair-mindedness, he also presents an especially unflattering portrayal of CIA Director George Tenet and Defense Secretary Donald Rumsfeld. Draper reveals, for instance, that the Defense Secretary was privy to authoritative intelligence in September 2002 – a full seven months before the invasion of Iraq was launched – that it was highly unlikely that Saddam Hussein possessed weapons of mass destruction. “Rumsfeld was uniquely in possession of an argument not to go to war, and he sat on it,” Draper concludes. The United States continues to suffer from the consequences of the decisions made in the wake of the attacks of September 11, 2001. Draper's book should serve as a warning and a guide about the dangers of executive decision making gone wrong and the disastrous consequences that can result.

The Spear
Battle for the Mosque

The Spear

Play Episode Listen Later Aug 25, 2021 48:44


On April 10, 2003, Company A, 1st Battalion, 5th Marine Regiment (A/1/5) was tasked with searching a mosque in Baghdad for Saddam Hussein. The previous night and into that morning, A/1/5 had fought a running gunfight to capture a presidential palace where Marines were wounded and the company gunnery sergeant was killed. Despite the losses the company had suffered, A/1/5 was sent back out into the streets of Baghdad. Upon arrival at the mosque, 2nd Lieutenant Nick Horton 's platoon came under attack. With a simple and direct command, Horton’s Marines seized a foothold in the mosque, routing the occupants, and seizing a significant haul of prisoners. These actions culminated a long day of combat that saw Horton awarded the Silver Star for conspicuous gallantry. Listen as he tells the story.

Finding Humanity
[S0309] PTSD: The Hidden Costs of War | Jonathan Hancock

Finding Humanity

Play Episode Listen Later Aug 25, 2021 34:17


In 2004, Jonathan Hancock was assigned to the Second Battalion Fourth Marines, also known as the “Magnificent Bastards.” He was sent to Ramadi, then a stronghold for Saddam Hussein's followers and Al Qaeda leadership. Five years after deployment, Jonathan fell into a depression — a dark hole that he couldn't get out of — and attempted to take his own life. PTSD or post traumatic stress disorder is a mental health issue developed after experiencing or witnessing a life-threatening event like combat, a natural disaster, a car accident, or sexual assault. In the general US population alone, an estimated 6.8% will experience PTSD at any point in their lives. That number is much higher among veterans, between 13 to 30%. In this episode, we'll unpack PTSD as it relates to veterans of war. How does one move past the guilt of hurting innocent lives? Is there such a thing as ‘just war'? Does traditional masculinity in the military impact the severity of PTSD symptoms? What can be done to provide more support to people impacted by war? Featuring policy and advocacy insights from experts: Army Col. Dr. David M. Benedek, Professor & Chair, Department of Psychiatry at the Uniformed Services University of the Health Sciences and Dr. Elizabeth Neilson, PhD, Assistant Professor at Morehead State University. -- Finding Humanity is a production of Humanity Lab Foundation and Hueman Group Media. Subscribe, rate and leave us a review. For more information, visit findinghumanitypodcast.com. Follow us on Twitter @find_humanity and Facebook.

Undaunted.Life: A Man's Podcast
230 – BOTCHING AFGHANISTAN | Eric Maddox

Undaunted.Life: A Man's Podcast

Play Episode Listen Later Aug 23, 2021 29:40


In this episode, we continue our Botching Afghanistan series, where we give friends of the show the ability to give their brief thoughts on the situation currently going on in Afghanistan. This episode features veteran, author, speaker, and interrogation expert Eric Maddox. Eric served three tours in Afghanistan and was part of the Joint Special Operations Command (JSOC) team responsible for tracking down Saddam Hussein. Let's get into it... Episode notes and links: https://www.undaunted.life/podcast/ericmaddox

Witness History
Saddam Hussein's foreign hostages

Witness History

Play Episode Listen Later Aug 19, 2021 12:15


In August 1990 following the Iraqi dictator, Saddam Hussein's invasion of neighbouring Kuwait hundreds of foreign nationals were held hostage by the Iraqi government. Among them were the Rahims, a British Muslim family who had been in Iraq on a religious pilgrimage. Sameer Rahim has been speaking to Farhana Haider about his time as Saddam's prisoner. Image: Saddam Hussein with western hostages, Iraq 1990 Credit: Shutterstock

Rush Limbaugh Morning Update
A Book by a Great American: Lt. Col. Mark Hasara, Tanker Pilot in Afghanistan

Rush Limbaugh Morning Update

Play Episode Listen Later Aug 17, 2021 17:46


RUSH: I mentioned at the top of the program that there was a book that I wanted to tell you about. It's actually a source of great pride that I tell you about this book. I want to go back to 2003, May the 3rd of 2003. I've told this story before. Some of you who have been longtime listeners have heard the story, but it is worth hearing it again. It's May of 2003. A couple of months earlier, we began the invasion of Iraq, one of the first acts in the War on Terror. This was the war that was to remove and eliminate Saddam Hussein. George W. Bush had spent a year and a half traveling the country explaining it, gearing up support for it. It was a major, major conflict in the War on Terror and our response to it. https://www.rushlimbaugh.com/daily/2017/11/06/a-new-book-by-a-great-american/ Learn more about your ad-choices at https://www.iheartpodcastnetwork.com

The Audio Long Read
The toppling of Saddam's statue: how the US military made a myth

The Audio Long Read

Play Episode Listen Later Aug 16, 2021 32:44


In 2003, the destruction of one particular statue in Baghdad made worldwide headlines and came to be a symbol of western victory in Iraq. But there was so much more to it – or rather, so much less. By Alex von Tunzelmann. Help support our independent journalism at theguardian.com/longreadpod

Bill O’Reilly’s No Spin News and Analysis
Biden Makes Town Hall Unwatchable, Race Relations Cause Trouble For America's Youth, and Bipartisanship No More!

Bill O’Reilly’s No Spin News and Analysis

Play Episode Listen Later Jul 23, 2021 43:11


Tonight's rundown: Bill analysis of Biden's Town Hall with CNN – and a point that Biden made that isn't getting as much attention as it should  Relations between black and white Americans are at a historic low point and with critical race theory at the forefront, our children are the ones who will suffer The January 6th bipartisan committee might be at a stalemate as Nancy Pelosi rejects two GOP nominees, but Kevin McCarthy is not backing down  First Lady Jill Biden arrives in Tokyo ahead of the Olympic Games as COVID cases continue to rise This Day in History, 2003: Saddam Hussein's sons are killed Final Thought: Anticipation is a very important part of life  Learn more about your ad choices. Visit megaphone.fm/adchoices