Info

Craig Peterson's Tech Talk

ClearChannel Radio's Number One Weekend Tech Show in the Boston Market -- More Than 20,000,000 Podcast Downloads! Craig interviews top industry insiders and explains the technology secrets everyone needs to know. www.CraigPeterson.com
RSS Feed
2018
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
April
March
February
January


2015
November
October
September
July
June
May


Categories

All Episodes
Archives
Categories
Now displaying: August, 2018
Aug 29, 2018

Find out how an 11-year-old girl changed the results of Florida's presidential vote as Craig talks with Matt and Joe on the WGAN Morning News.

 

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Hippies Are Going To End Up Killing Us All! How China Will Win The Deadly Race For AI Weapons

Election Systems Are So Insecure, That Even An 11-Year-Old Changed The Results Of Florida’s Presidential Vote.

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/29/2018

Hippies Could Kill Us All - How To Make Elections Safer

 

Craig Peterson: 0:00 Hey good morning everybody. Here in the northeast, we are going through a heat wave three H's hazy, hot and humid. Now I know I mentioned this on the FBI webinar I did yesterday I mentioned how hot it was and we're miserable because it's in the 90s and it's humid and poor us and I got notes from people in gas Dallas is hotter than even Houston this year more miserable down there so I get it but for us this is really hot, okay and I'm not really happy about this but you know falls coming that's my favorite time of year I love fall up here in the northeast up in New Hampshire it's just beautiful. So today I was on with Ken was out. So it wasn't Ken and Matt, it was Joe and Matt today. And we talked about two things really, we talked about the hippies in Berkeley and the Bay Area out there and how they are now putting all of our lives at risk. This is a very real threat. So we talked about it and get into some detail and then we get into a little bit about hacking and where things are going and what's happening with our voting system. Because of course, we got a route midterm and then a midterm primaries first. And then the general big election coming up in a couple of years. So what happened out at DEF CON black hat, and, and it's frankly, it's a little scary sides. Oh, here we go.

1:32
Okay. It is 737 on the WGAN Morning News with Canada. We have Joe Reagan in for Ken and we have Craig Peterson, Tech Talk guru who is joining us right now to give us an eye on technology around the world. Craig, how are you? 

1:46
Hey, good morning. I feel like I'm melting lately. This is kind of nasty. But last time of the year. I suppose I this is your last opportunity to get sweat out of your living room. Yes, absolutely.

1:57
And all you wouldn't look forward to is a very cold, long, cold, snowy winter. Yes. Yes.

2:03
I have a daughter right now over Norway. And she's working over there right now on a project. But anyways, she's saying that right now. She wants to send over her winter clothes because it's already about 32 degrees at night. So yeah, that's to look forward to

2:24
yesterday, just like it was yesterday. Okay.

2:26
So Craig, tell me exactly how the hippies are destroying America.

2:31
Oh, those hippies are back again. That's what you know about the military. You know about DARPA, you know that they're constantly trying to improve the technology to kind of one up bar potential enemies. And they've been doing it for a long time using military contractors and others. Right now, guys, when you're thinking about the most advanced technologies, you're probably thinking about mag AF. Right?

3:02
What you may get Microsoft, Apple, Google Amazon. And let me stop you right there. There are so many acronyms in my brain

3:13
government work, you can't start giving them new ones

3:17
like mega with an F on the end. I thought it would be easy for you. Is there a hat? I can put this on

3:27
Red Hat

3:29
Do you think about right? All these leading tech companies are kind of in the lead when it does come to the different types of technology out there. So what is the military do they go to all of those companies? And particularly, we're going to talk right now about Google. But they go to those companies and say, Hey, listen, you've got this great technology. Now, all of these companies license some of their technologies, you other people, and particularly when we're talking about Google, we've received some great technology. Look at me, Amazon now with the echo because I you guys, you know, those right, you have to have any those.

4:09
I have an echo and echo plus, I've got a tap. Yeah, no, I've got a lot of those things.

4:12
I got an echo show. And I got a couple of them. So I gave one to our granddaughter who's over in Kentucky so that we can chat with her. She can jump in anytime she wants. So I mean, Google Home, do you have Google Home or any of those devices now is now

4:28
home stuff terrifies me.

4:30
You know, a refrigerator tweeting is I don't

4:32
mind the refrigerator, tweeting. It's the security peace behind it. And having the cloud that concerns me.

4:39
Yeah, the IoT, right? The Internet of Things. We're talking about 50 billion devices within a couple of years. So that technology gets license Google, license it to other people, Amazon, license it to other people. So when the military of saying, hey, Google, you've got this really cool artificial intelligence project, and we want to use that in some of our development work every want to give it to them, some startup by contractors, you want to pay you for it, etc, etc. You would expect that to happen, right? That's a legit logical thing they license protect other people, why would they not license it to the military. So it started out with a small group of people inside Google who said, No, I don't want my work being used by the military to potentially kill people. And then it ended up being about three to 5000 people within Google who signed a petition saying, I'm going to quit my job, if you license any of this AI technology to the military. So now, we've got all of these peaceniks, which is bringing back in my mind, memories of the 60s and 70s, these hippies running around saying, No, no, no, you can't use our tech, you can't use our tech nine and I man,

5:58
but in the 60s, the government was investing heavily let me the whole purpose of Silicon Valley expanding was due to government investment in the 80s. Where did we get the internet from the army again, from the military? It was another ARPANET project, they will bring that in the internet today, right? That's right. It was the project of where they were linking universities into the military, linking them all together so they could communicate and develop stuff. It's all military, it was military funded. Heck, we even got pain from NASA, right? That does anyone tell you any more, by the way,

6:39
so that's not really a high bar to said,

6:43
Where's the snare drum there? We need to call

6:48
anyways, it's cold. It's cold room shop

6:51
shop there. So the military has long use high tax the years they're young with some

7:02
now they worked with our universities, etc. And now these hippies are saying, No, you can't use it. Now, here's the problem that's just

7:10
cots technology coming out of Google, DARPA is still doing

7:15
investigative research into those areas.

7:17
Absolutely. DARPA has not stopped doing what they've been doing. And of course, they'll know that's the Defense Advanced Research Project Agency because I have to explain some of the fly is today some of the four letter acronym

7:31
so so that's what DARPA is, yes. But the AI technology that the military was trying to license is critical. And here's why China is ahead of us right now, with at least it appears to be with some of this AI technology. And where this could ultimately lead, if it came down to war could be a very, very bad path. We I'm personally I don't think that those people inside Google are thinking this through. I don't think they realize that by not allowing the military to use the most advanced technology in the world, we are going to start falling behind. And when that happens, I personally think things could turn pretty bad ultimately. But that's where the hippies coming back. Who knew?

8:24
Well, Craig, it's a great point. I think that, you know, looking at as far as foreign policy concerned, but also the impact of technology on our voting systems. I mean, we've had a lot of conversations around the use of the Russians both influencing through social media, traditional media. But then there's also discussions around the actual threats to the physical things in which we use to vote, right. Yeah,

8:46
we just had the big conference out there in Vegas, we had the black hat and DEF CON conferences. Now, these are conferences that every year, it's kind of interesting, because they are talking about how things can be hacked. And if go to one of those conferences, you do not want to bring any electronic devices, because the likelihood is they will be hacked. I don't care what they are, they're going to get hacked out there. And one of the things that they did this year is they expanded it. Well, let me just back up a little bit. You've been to conventions before, and conferences anytime. And they've got tracks, right. So you might have the CEO track or this tracker, that track record, they do the same thing out of these hacking conferences in Vegas. And this year, they had the biggest that they've ever had voting systems online. So they took a whole bunch of wanting system, some of which are in us, in the US and throughout the US. And they put them into a room and they said, have added guys, and they had contests and of course, they were they were all hacked, right? Every one of them. And I got to say that the secretaries of state say, Hey, listen, you know, that's not the real world. Because in the real world, we have more secure networks, we have air gaps, and of course, all that defeated to the thing that's most interesting. Joe, I'm glad you brought this up from the conference here just a couple of weeks ago, is that they also had a junior section. So they had they had let him loose. I mean, kids on voting machines and an 11-year-old girl hack voting machine. And I mean, what she ended up doing was, and this is interesting, right, man, how do the results get disseminated to the press? Most of the time it's via websites, right? You check the website and you've got it. So what does this 11-year-old girl do? She had a replica of the Florida Secretary of State's website out there at Black Hat. So again, every part of this is a problem because what happens if in Washington, they're not calling up and saying I'm you're the Secretary of State for me, give me the vote tallies. What was a code word of the week change code words? I know what you so I know the numbers are legit. What happens if they go to the state of Maine's website to find out what the vote tallies are to put them together to say yes, so it's always our new next president. And in fact, all they had to do was had website had the email. So, Joe, you're dead on this is a huge, huge problem. We have not fought all the way through yet. What are some of the solutions that are being proposed, you'd like to hope that when you look at what DEF CON is trying to do, is it's trying to bring in those white hat hackers that can come in and try and identify the problems in the hope that you're gonna have solutions that are going to come out of that. I mean, are there any ways in which we can further secure the voting system or there's being discussed? Well, yeah, I think they are. I think the best way to do this is a spot audience by people. I think that you using a piece of paper where you mark down who you're voting for, you know, and most of the states that are doing the paper ballots now or are using the optical scanners and it's not, you know, it's not Paper Paper till heavier than a sheet of paper. But then the machine reads it and then the machine gives the tallies and I think what should we only way to move forward here because we're gonna have to use some of this technology but he is you have the machines read them and then you have people spot check they manually go through looking for hanging chads rice in a flashback 20 years ago, and that they look at them, they looked at the tallies, make sure everything looks fine. And then we have to have a secure way of making sure that those tallies that are coming from individual districts and counties and state or all shared properly so that we get good final numbers. That's the only way we can really trust it. I think that the recount that we have right now some states have automatic recount. So if it's close enough of a race, some don't have that. But I think we should make recount easier. So if you want to do a recount, no problem. We bring you some of your people in we will watch you guys with the balance making sure you're not doing anything phony baloney so that anyone almost can do a recount so that we can trust the final tallies. That's the only way I think that we can move forward on this job. Because the tech the tech just cannot be 100% trusted.

13:34
Well, on that happy note, Craig, I think we're done. Unfortunately, we ran out of time. So we have to leave it there, Craig, appreciate your appearance. And we will talk to you again next Wednesday. Hey, gentlemen, take care. Thanks so much. All right. We're gonna take a quick break. We'll come back on the other side.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Aug 28, 2018

What kind of effect do video games have on gamers? Do video games make people violent?

Listen as Craig discusses the latest news story about the video game shooting in Florida with Jim Polito.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Looks Like Google Is Always Recording Your Location -- Even When You Tell It Not To

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/28/2018

Psychology And Videogames

Craig Peterson: [00:00:00] Hey, Good Morning everybody! Craig Peterson here. And I'm saying good morning cause as you probably already know tape these in the morning. This morning I was on with Jim Polito. Jim was all by himself this morning. He didn't have Danny. His board op and producer to help him out. So, I kind of took it easy with him and we stuck with the one big story in the news this week, which of course is the story about the video game shooting down in Florida. So, we went a little bit more detail obviously a different track than I went on with Jack yesterday. But, you know if you heard Jack's interview you might skip today's, but you might want to listen to today's because there's always a little bit different. 

[00:00:41] So, here we go with Mr. Jim. Here he is, our tech guru, the man with all the answers. Craig Peterson. Good morning, sir. 

[00:00:55] Good morning, Jim. It's been quite a morning here with all of the video game stuff going on. Mental health issues. Did you know I was the chairman of the oversight board for Health and Human Services in New Hampshire for a couple of years? 

[00:01:11] Yeah, yeah I did not know that. 

[00:01:15] Oh, OK.

[00:01:17] Yet another hat that I've worn. Craig every time you're on the show, it's something else, next going to tell me you were an astronaut. 

[00:01:29] That would be fun I always wanted to go to that place down in Alabama. Are you kidding me? Yeah right. Right. No. Rocketown.

[00:01:40] Absolutely. You're absolutely right.

[00:01:44] No, go ahead. No, I'm just a space cadet. That's all.

[00:01:48] Never ever made it into the space force.  This whole thing is really interesting when you're talking about mental health issues and kids and video games. In fact, a lot of people might not really be aware of what it's like, nowadays. You know you and I might have played some Donkey Kong or I you remember when Pong came out and I had pong.

[00:02:11] I wish I had the original game because my parents bought it for me one Christmas. 

[00:02:18] Do you burn in the TV tube? Pretty much 

[00:02:21] It was an old black and white. And you know eventually, I did. But, nobody cared because it was an old black, a spare black and white that we had. 

[00:02:32] When did you get your first color TV? I remember my family of like 1970. 

[00:02:37] I think we were '72 because it was a tiny one. It weighed a ton. And I actually ended up bringing it to college as my TV. It was a small way too tiny it was one of those so-called portables. But, you know it was like a medicine ball trying to lift the thing. It was around 72 because this is the anniversary right about now the 72 Olympics I was just doing something on it earlier this morning Mark Spitz. I remember watching that small color TV when the Israeli athletes were taken hostage, in the siege and the slaughter. I remember watching Jim McKay on that little-colored TV that weighed a ton. So, it had to be around 72. The first real color TV like a big one. I don't remember but this was 72. The big old console TV.

[00:03:39] Yeah, we had a console TV in the living room, exactly.These games have come a long way. Now, what's happening at this event and if you've never seen one of these or been one of them. I think this will be a real eye-opener for a lot of people because these are huge events, and there is more excitement in the stands than I have ever seen anywhere, except for maybe the U.S. first event, the first robotics. To me, it's interesting Jim because I don't watch professional sports, right. 

[00:04:13] Period. Right. Right. Not even the Canadian Football. Craig, not even Canadian football but that's real football. An extra 10 yards on the field a field and one less down you know by that, by the way, no hockey, Craig. 

[00:04:31] Yeah. I was captain of my hockey team. But, you know I've never watched the game other than my dad was watching or my brothers were watching. My brother was on the minor league team for the Toronto Blue Jays. 

[00:04:45] That's a big deal. 

[00:04:47] It's a very big deal, but not me. Right. So, I just don't get it. Why would you be there cheering on someone? Watching them play a video game because that's what it is. You have the players up in the front and the players are playing, in this case, Madden football and they're they're all up at the front there's huge screens so everyone can watch. Yeah, and they're going through it. Now, there's lots of them. There's a shoot up scenarios you know you can be in World War Two. Yeah, and you're there with your platoon and you're talking back and forth with the other members of your platoon. Your killing zombie nazis and things, right, as you're going around. Now, they have this artificial feeling, like they are actually there. When they might be in their mom's basement and somebody else might be in Siberia, it doesn't really matter. They're all around the world. In reality, they're not building real friendships they're not really communicating, People, there's a whole huge business, look up twitch, a huge business built around people going to twitch and watching other people play video games. And you're not even watching them play the video game watching, you're watching their screen. 

[00:06:11] Yeah right. I don't get it.

[00:06:13] I don't either. I've seen it. I went to what is at PAX East and I watched some competition. Danny, who's not here today. Danny watches other people compete in things like Fortnight. I mean it's actually become something that people do. Watch these competitors on these games. I mean I get it. I do. I do get it. Now, the question is you know psychologically and I know you used to be when we were younger, Craig, people would say oh watching violent movies make people violent, you know. And now it's OK so playing these video games makes people violent. I just don't think that's it. I think it's like my psychiatrist friend years ago, 20 years ago, said to me how do you know if this person didn't have a psychiatric issue. If they wouldn't be violent, anyway. And the same thing about a gamer, just because they're playing the game, maybe if they weren't a gamer they'd still be a violent person. 

[00:07:25] There's a difference between correlation and causation, right. And that's kind of why I was going to add to Jim these types of games are attractive to certain people with certain types of mental disorders. However, the same can be said about circuses or almost anything that you might name, right. This is not causal, near as we can tell. I've had a number of psychiatrists and psychologists on my radio show, talking about this whole issue in general. Is it harmful? I think what we have to look at and I think pretty much everyone's in agreement when the child is very young like, in the single digits of age, particularly the first four or maybe even as much as eight years of their life. Now the first four certainly. Do not expose them to a whole lot of time either in front of the TV or in front of an iPad or in front of a computer. Because their brains need to mature those pathways need to develop. And near as we can tell those pathways don't develop as well when the kid is sitting watching something. As opposed to maybe they're outside or creating. I used to love Lego when I was a kid. Yeah, I made all kinds of stuff, that that's the right things flowing in the brain. Jim, I don't think there's really anything conclusive, there certainly is no agreement as to whether this is just kind of an associative sort of thing at that track that people with these types of disorders and obviously doesn't track a lot of them like this. This isn't happening frequently but it is a different world that I think a lot of people should look into a little bit. You know you mentioned PAX East. I have a son that went to that event. In fact, he went there with a girlfriend because he loves to play the video games on his little video game console. You know when you're 30 35 40 and you're still spending a lot of time in your video game. It's you know it's time to move on to real life.

[00:09:33] I get it. Craig I know we had so much other stuff to talk about today but it's always good to get your perspective when things like this are in the news. Especially I found fascinating, the stuff you sent me about how Google is still tracking me even when I tell it not to. That's a great, great piece and folks that's just some of the stuff, you can get from Craig Peterson if you text him my name Jim to this number 8 5 5 3 8 5 55 53 that is text the Jim or ask any questions you might have.

[00:10:13] to 8 5 5 3 8 5 fifty five fifty three. 

[00:10:18] That's right. Standard data and text rates apply. You get great information from Craig Peterson. If there's some type of an emergency with a massive hack or a data breach, he gets you the facts and what you need to do. He doesn't try to sell you anything and it's all free. Craig, thank you so, so much I really appreciate the time and your perspective on that news story.

[00:10:45] Take care, Jim. Already. Bye-bye folks don't go anywhere. Final word when we return you're listening to.

[00:10:52] Hey, everybody. I want you know this is a bit of a heads up. Starting next week for the entire month of September every week I'm going to be doing a special webinar. We're going to talk about how to protect yourself from certain types of attacks. And I have a package I'm going to offer to you if you are on the Webinar some really special deals with some real special bonuses. But, overall a whole lot of learning and stuff. I don't think you are already aware of. So, keep an eye out for that in your e-mail. And if you want to sign up you can always just text me or e-mail me at Craig Peterson dot com. Have a great day bye-bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 27, 2018

 

Video Games and Tournaments are interesting.  Jack and I discussed the shooting in Jacksonville, yesterday and the effects of video gaming on the young people today, as well as some of the underlying mental health issues.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

Jacksonville Shooting The High-Pressure Big Money World of Competitive Gaming

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/27/2018

Jacksonville Video Game Shooter.  My experience with gamers.  Mental health issues.

Craig Peterson[00:00:00] Hey, Good Morning, everybody. Craig Peterson, here. Unfortunately and you might have seen this in the news. In fact, probably pretty hard to miss, although it's been a very busy news week, this week. There was a shooting at a video game tournament in Florida. So, this morning Jack Heath and I spent a few minutes discussing it. I don't know if you knew that I have also a mental health background. So, this was an interesting discussion. I think you'll maybe pick up a few things, I know Jack was surprised So, here we go. 

[00:00:35] You know one of the stories that we're watching this morning is out of Jacksonville, Florida and that video gaming tournament. Craig Peterson, our tech talk guy, with tech talk which airs on the weekends, on Saturdays on iHeart news talk stations. Craig, I'm not saying video gaming is really all about high tech, but a lot of it is, and this is a separate story, but these video gaming tournaments, have you ever been to one?

[00:01:00] Good morning, Jack. I have been to them before. I've been to a couple of them just to kind of check them out and do some interviews. And, I have one of my sons. He's thirty-four and he just loves to play video games. Now, he doesn't spend his days and nights playing them. But he does enjoy them. These things Jack, are absolutely huge. You get a lot a lot of emotion in the audience, and that to me, you know I guess, Jack, we're the wrong generation. I look at it and say yes, somebody else is playing the video game. Why do I care? But, to these kids, they've played these games many times before. They've been unable to get past some of these obstacles that these professional players are able to get past and then they just go wild at that talent.

[00:01:55] that some of these kids have. I guess, you know you hear the story about this one 24 year old David Katz, who you know, is the apparent killer of two and wounding several others before, taking his own life. And, the other thing I might again there's no correlations here. You know it's the old ninety-nine point nine percent of the people that go to these, you don't have probably incidences, but I think you know this story is all about video gaming and the gun and, so forth versus, I think at the core of this is going to be another mental illness, mental health story, that we just don't seem to be addressing. Another young man, you know I just heard the Fox National Lead on our on our news top of the hour, bottom hour they are saying you know he lost a video game and then apparently lost his mind. I mean that's sort of the way they're portraying this. I imagine once they investigate more, in Baltimore, I think you'll see there were probably some issues in terms of the mental health front. 

[00:02:54] Yeah, I don't know if you're aware of it but I was chairman of Health and Human Services Advisory Board, for a few years. And,  it was troubling to see just how many people have real mental health issues and very few tend to get the treatment that they need. You know families just don't accept the fact that there is a problem you know. Going into the basement, right. The standard depiction of one of these kids going into the basement playing video games online all day long and having mom bring you food and whatever. That's not necessarily a sign that someone's going to be violent. There's no question about that. Kids really getting into video games, again not necessarily a mental health issue. But you know, Jack, you and I have talked many times in the past. And part of what we've discussed is how these kids need to get out. They need to meet people, face to face. You know they have this illusion that somehow they are communicating. They're making friends with people when all they're doing is playing a game together. Again, I don't know how much you've been into some of these games, but I think you know Craig you're in laugh I don't think I've ever played a video game. I think Mario Kart was the last one I played. But what happens with these games now is that kids are sitting there, in their homes. Each one of them has on, usually a headset with headphones, so they don't have to listen to what's going on in the house, and they are but for instance in a platoon together in a war scenario. They could be in World War Two. They could be fighting aliens on a distant planet. They're talking to each other just like you would expect a military platoon to talk to each other.

[00:04:55] And, so now they're living in this fake universe that being created and they're having these experiences that are almost life and death experiences, at least as far as they're concerned. You know the line between reality and fiction, but you know that's a really separate issue because the mental health, mental illness situation, in this state, I think it even underlies the drug opioid, drug crisis because mental illness in some ways can be part of that. It's a more pervasive wider spread, the reality it's affecting more families, and for some reason, the state and the country got away from. And, as you said earlier about five minutes ago a lot of the folks who do need treatment, either go undiagnosed or don't get or don't get the real help. It does it lead to bigger issues. All right, Craig, I appreciate it on this Monday morning. Craig Peterson Tech Talk stuff. Make it a good one. Stay cool.

[00:05:52] Hey you too, Jack.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 24, 2018

Would you like to know about Black Hat and DEFCON? Listen in today as I explain to you some of the things that went on at these two Conferences.  

MAGAF might be the end of us?  Yes.  Today I will tell you why we must be concerned about these companies and the people they employ.

Weaponizing Satellites? I will explain how it can and is happened and why.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/25/2018

11-year-old hacks election machines. MAGAF could kill us all. New dangers in satellite systems.

Craig Peterson: [00:00:01] Hi, Everybody. Craig Peterson here. We've got a ton going on as usual. You know the big conference out in Vegas gave us some real surprises, in fact, there's some things that you can learn from it. We'll talk about those DefCon and Black Hat Conferences. You're not going to believe this. Let me tell you what an 11-year-old can do. This is kind of scary when you think about November this year, and going forward. Satellite systems, they can be hacked we've kind of known that for a long time, but have you ever heard about people being exposed to microwave signals, and what happens to them? Well, there's a tie there. And, I really am going to have to do a little bit of a rant here, about our friends out in the Bay Area of California, these Silicon Valley developers just don't understand what's really going on. They may have their hippie ways, but they could destroy us very quickly if you have an internet at your house or on your phone. I've got a couple of tips on how to properly check your internet speed, and how to block and report spam calls and text messages. 

[00:01:10] And, did you know Google they are recording your location even when you tell them not to. So, all of that and more, please stick around. We only got half an hour. So, here we go. Well, I'm going to have to start the show this week with a little bit of bad news again. If you have Wi-Fi enabled, and you have more than one hot spot and even if you don't, even if you only have one, I've got to give you a bit of a word of warning. A huge, huge, huge, issue with Wi-Fi, yet again. Check your e-mail from me this week, I'll be sending something out. It's also up on my Web site. You've got to turn off some specific protocols. It gets kind of complicated, but you'll find it here on my Web site. And, in this week's newsletter Craig Peterson dot com. So we'll leave it at that. Now, we'll get back into our regular show for today. Well, I definitely have to get that data, don't I?

[00:02:14] It's over 20 years now, and I don't do as many interviews as I used to. Well, actually I do do a ton of interviews but they're not on the radio anymore. I do a lot of stuff over on the web, on our side. You know I do stuff with the FBI Infraguard program and, in fact, I'm doing at least a webinar a week so, I haven't had any complaints. I think most people are pretty darn happy with what's been happening here with the show I get lots of great comments from people thanking me for it. So, we'll we'll leave it at that. But, I do have to change that, although I'm updating a few things, as you've noticed. And, we're back up to about almost a full half hour. It's really great. Here we are. We are running solid through our whole time since we got to cut back a little bit. Which is nice because I'm just so busy, as it were. All right today. Wow. More security stuff if you listen to my podcast. Craig Peterson dot com slash iTunes. You saw some major things this week. We were talking about Black Hat all week and what they can do with our voicemail, of course. 

[00:03:24] We talked a little bit about that, on this show, last week, as well. So, if you want to find out about your voicemail how it can be hacked and, in fact, even how it ultimately will be hacked make sure you check out my podcast, again Craig Peterson dot com slash iTunes, you can see many of them up there. I think I'm close to a thousand weekly shows. How's that for a long time. We've been doing it. The most recent few hundred of them are up there. Some of the oldest ones are lost, forever. I hate it when that happens. I had a backup but it turned out the backup was bad. It was bad. Has that happened to you before? So, I lost all kinds of show information, interviews, videos that I had done, and stuff. Now, C'est la vie, move on. Onward and upward. Better back up now that I test frequently, just like I do for my customers. You know I've always done it for my customers. You try and restore machines or restore files. Just make sure it works. But, somehow again it's the poppers kids. 

[00:04:29] I mean the cobbler's kids that just don't get the shoes. Hacked satellite systems, we've known about this for a long time, and satellites are all over the world, now. They're just everywhere, in northern and southern latitudes, all the way on up. There geostationary satellites, there are satellites that are moving. Typically the geostationary ones are the ones that we're using for data communications and things. But, here's the bottom line. A lot of these satellites are used by my daughter and by my son when they're at sea. Now, you know I have a daughter who was in the Merchant Marine. In fact, she still is in the merchant marine, right now. She is doing some autonomous ship development work for a company out in Norway. But when they're at sea they use, kind of like cell phones, but their satellite phones you might have seen that if you're a fan of Deadliest Catch, you probably saw Sig Hansen on there he was trying to call another ship to find out, because there are rumors that their emergency beacon had gone off and that little phone that he had, that was a satellite phone. And they're getting simpler, they are getting smaller all of the time and the reason for some of that is that the satellites that we're using for the satellite phone calls are getting closer and closer to Earth. There was a license that came out about five years ago, I think it was and they started flying their first satellites, just last year. 

[00:06:03] That's designed to be able to give high-speed Internet and voice to anyone, basically in North America. That's what it's aimed at, but ultimately worldwide, which is really cool. Well, those satellites are close enough to us, that in certain conditions, you could have what is now being called, a hybrid cyber-physical attack. Here's what would happen. This is according to research presented at Black Hat, last week here in Las Vegas, a couple actually two weeks ago, in Las Vegas. But one of these guys is saying based on his study and based on his experience a number of very popular satellite communication systems are vulnerable to a hack. And, what will happen is that the control systems for the satellite are what are actually hacked, and it goes beyond just leaking information. Did you know that these satellites could potentially be used to microwave people on the ground? Think about what happened recently over in Cuba. We expanded or our presence over there, our ambassador, I think we have a full embassy over there now, and some of the workers were complaining about pains, headaches some of them lost some of their hearing, some of them lost all of their hearing, and that was probably due to a directed attack. We don't really know who did the attack. It might have been sonic, but we're not really sure. 

[00:07:40] Well, think about what would happen, if somebody was out there who was controlling those satellites and aiming their beams at people and running them at high wattage.

[00:07:56] This is a guy named, Ruben Santa Marta, and he did some research that he presented back in 2014, and he said this is a quote "essentially the theoretical cases I developed four years ago are no longer theoretical". So, they're going to be able to use this type of technology connect to the satellite antenna from the ground through the Internet, and then using some security weaknesses in the software that operates the antenna. They're going to be able to seize control of it. So, now the potential damage is going to vary. The very least they could disrupt, they could intercept, they could modify communications are passed through the antenna. So, they could for instance eavesdrop on the e-mails, sent through in-flight Wi-Fi, attempt to launch other hacking attacks against devices connected to the satellite network. That's where my kids come in, because a lot of our vessels, Navy frankly, as well as merchant vessels, are connected to satellites for being able to share data. Now, there are higher risks still, and in some situations for instance in the case of the military, this attack is going to expose the location of this satellite antenna, for the ground equipment or the equipment on the ships that are out there. It could be really bad. Think of the Bond movie The World Is Not Enough, No, Tomorrow Never Dies where there mucking with GPS signals which are used for navigation by the Navy, by our cars right all over the place. Things start getting really bad, and then ultimately they could turn up the wattage on some of these satellite antennas and have them beam microwaves back to the ground. 

[00:09:48] Theoretically, cooking equipment and maybe even people. So, not great news, on that front. Well, we've got another piece of news coming out of the conferences, here just a couple of weeks ago out in Las Vegas Nevada. This particular one has to do with some of the Games they play over at Def Con which is kind of a defense conference and some of the games are as simple and fun as "Spot the Fed", right. Who in the audience is the Fed, and who's not the Fed, out there? But, one of the things that they've been doing, that's been getting more and more popular every year. They have what they call a voting village. Now, this village is where the organizers are setting up decommissioned election equipment, and then they let hackers loose on it and they watch these hackers and see how they can hack in. So, they're finding newer, creative, alarming ways to break in. Well, last year, the conference attendees found some new vulnerabilities for all 5 of the voting machines, and as a single e-poll book of registered voters, over the course of the weekend, was hacked into as well. So that caught the attention of senators, and they introduced some legislation and hopefully, it'll be good, right. Who knows? They just don't understand how this all works. But, this year's voting bigger voting village was bigger. 

[00:11:26] They had more equipment. They had voting machines that ranged from tabulators to smart card readers, equipment that's all currently in use in the United States. Now, they had another little voting village. This is with the little one. This was a room set aside for kid hackers. An 11-year-old girl hacked a replica of Florida Secretary of State Web site. And she hacked it within ten minutes and changed the results. So, what that means potentially is, that if the people who are doing the national tabulations were not directly contacting a known person that the former secretary of state's office. A known person using some form of two-factor authentication. You know like codewords or something. So, they pick up the phone, they call them, the proper code codewords or exchange bidirectionally. And then the Secretary of State of Florida says and here are the election results and gives them to them. So, if that's not what happens. If what happens is they go to the Web site for the Secretary of State's office, and they find the Hacking results, there. Well, now we're talking about some really big trouble. Because if an 11-year-old kid can hack a replica of the Florida Secretary of State's website within ten minutes. And, we are relying on Secretary of State's Web sites to have the national results, tabulated. Wow. That is huge. Now, we heard this week as well, from our friends at Microsoft saying that they had discovered some Russian hackers who had put up fake Web sites. Websites that pretended to be Democrat and Republican Web sites, to try and again mislead people and create confusion. 

[00:13:28] And all. We had Russian hackers attacking 2016, and now already we see them attacking 2018, and of course, they're going to continue to do this. Now, I had this week, the CEO of Black Ops partners on a webinar I did for the FBI's Infragard program and we talked about the hacking that's going on. And, it's even worse than any of us thought. And, there was information that he could not disclose even to the FBI InfraGard team. So, that tells you something here too. But, he's telling us that the Chinese have been actively hacking us and the Chinese were talking about their military, the People's Liberation Army, the communist Chinese military has been covering up their tracks. He said they are using plausible deniability in a very, very big way, versus the Russian hackers that don't seem to really care, frankly, some of these Russian hacks, if you ask me may well be Chinese military hacks, disguised as coming from Russia. The Chinese are very, very, good at this. So, there's been some pushback about this voting village, because it was just so notable, this year. And, one of the largest providers of election equipment in the U.S. sent an e-mail to its Customers, assuring them that while attendees will absolutely access some voting machines internal components physical security measures make it extremely unlikely that an unauthorized person with malicious intent could ever access a voting machine. 

[00:15:15] Yeah, yeah. And, then we have the National Association of Secretaries of State quote "Our main concern with the approach taken by Def Con is it uses a pseudo-environment which no way replicates state election systems networks or physical security". So, you know when we're talking about distributing software, a lot of these systems are using thumb drives. Now, remember thumb drives have been hacked. In fact, brand new thumb drives have been shipped with viruses on them. So, you format the thumb drive. Again, there's so many ways, I know ways that I could do, that would fake it enough, that the election systems could be hacked. Believe me, it's very, very possible, even with people that pretty much know what they're doing on the security front. This is this is very concerning to me. Many people say that you know, hey listen, it's just crazy you can't do this. But, here we go. Matt Blaze, he's a veteran of elections security researcher who helped organize voting village said I think the statement was misguided. Talking about the statements from the various Secretaries of State organizations. "It's only through scrutiny that we're going to have confidence in the elections". "That said, the fact that this system has vulnerabilities in it, even incredibly serious vulnerabilities, is not the same as saying any given election has been tampered with. There's an interesting paradox. 

[00:16:47] We know the systems are wildly insecure and there's been precious little evidence of these vulnerabilities so, far being exploited in real elections. I think we've been very lucky and I think there's been a little bit of a ticking time bomb here". I absolutely agree with that. Unfortunately, our copyright laws have made it very difficult for researchers to legally acquire the voting equipment and mess with its software and test it. I think we need to have exceptions in the law for security researchers. And, there are some exceptions for certain security researchers under the Digital Millennium Copyright Act, the DCMA. But, I think it has to be a little better than it has been. All right we're going to get into China, next. And the hippies in Silicon Valley. How were they threatening our security? The hippies, that is. Well, those darn hippies they're back out in California. You remember me talking a few weeks ago about how Google had, well it started with just a few people saying we are not going to work on any projects involved with the Department of Defense. And, it ended up being what was, it like 3000 of these people saying, we will quit our jobs if you have anything to do with the Department of Defense. And we have seen this in a couple of other companies, before. Now, people are stepping back and thinking about what the actual consequences are. Google has a very big artificial intelligence program, underway, and if you use an Apple device there is machine learning behind it. 

[00:18:42] If you're using an Amazon Alexa, Google home, there's machine learning behind it. Machine learning is kind of a subset of artificial intelligence. Artificial intelligence, AI, where machines are figuring stuff out for themselves, is on its way. Don't, don't get us wrong here. Well, these main companies and I've started calling them MAGAF kind of like Magaf with an F on the end. You know MAGA, President Trumps slogan, I'm using MAGAF to stand for Microsoft, Apple, Google, Amazon, and Facebook- MAGAF. So, now you know when I refer to that what I'm talking about. Well last month, some of these companies the biggest names in technology they officially signed a pledge promising to not develop lethal autonomous weapons. Now, I can see that as being a very good thing, right. In many, many ways. We had Google's project maven, where employees said, We will not allow our technology, our work product to be used by the military. And some praise them for these initiatives, as ethical and moral victories, right. That's the typical knee-jerk reaction. That's the simple reaction. Who wants killer robots right? I thought Arnold Schwarzenegger demonstrated that to us quite nicely with Terminator. Who wants Skynet? Nobody. Well, I guess somebody does, but most people absolutely don't. While a senior adviser to NATO by the name of Sandro Gatien has come out with some really great statements and I absolutely agree with him. 

[00:20:35] Here's a quote straight from him. This isn't a NATO adviser "these naive hippie developers from Silicon Valley don't understand. The CIA should force them to work on this development". Now, he is also the founder of the digital society Institute at this Berlin-based business school called ESMT. But, he came up with some very critical device. And what's really good about this is it's bringing to light a schism, about the future development of artificial intelligence for military purposes. On the one side, you have people who believe the pursuing the development of military AI'S is going to lead to an unstoppable arms race, and frankly, I'm kind of on that side. On the other side, people like Gatien believe that the AI arms race has already begun and that Pearl Hibbett Dean AI research for military purposes will not lead to peace but will give the upper hand to authoritarian systems. Now, that's a good point. So, he's saying if the West wants to stay in the lead, if we want to survive, we need to unify around a concerted strategy. quote another quote from him "Within most military and intelligence organizations, it's a real concern and it's bound to be a much larger concern". So, we've got machine learning tools that are being spread already amongst military devices and we have the Chinese. Now, according to Al Scandia, who's an expert in Chinese military strategy, there is a strong belief that machine learning is going to provide an essential tool, in the Chinese building their military strategy far beyond ours. 

[00:22:33] So, we're talking about superiority across the entire electromagnetic spectrum. So, that means faster more insightful AI. It could enable one side to enhance communications, situational awareness other forces, disrupt degrade or deny the adversaries. Think about some of these things we've talked about before, where you have clouds of AI controlled, little things, like the about the size of a bee, that can swarm and kill someone. What would happen if the Chinese had this technology, and they decided to take out the President of the United States? Think about what just happened in Venezuela. Where a couple of drones flew close to their Presidente and blew themselves up. What would happen if one of these matters to land on the President and work its way around? And we're seeing some of this AI type technology, already being used to try and break its way through firewalls, and other things. So, by having these hippies controlling some of the leading AI technologies, saying no, no, no, we're not going to do it. And allowing now the Red Chinese communists, who are trying to develop their AI technology, for military purposes. How are we going to be able to defend ourselves? How will we be able to defend our allies? How will we be able to keep up our NATO commitments? We could very, very quickly, fall behind in this new arms race, and have these other countries like China particularly selling some of this technology.

[00:24:18] Think about that. If some of this AI technology gets into the hands of terrorists, and they use it against us in our large cities, etcetera. Think about what would happen there. All right, we're not going to have time today to get into these other articles. But, I want to encourage you to go online. We've fixed all kinds of problems with the Web site at Craig Peterson dot com, right now or just straight has news on it things from the show, security news. We're going to be enhancing that, we'll be starting to post some of my webinars up there, and things. But, right now, we fixed the bugs we had. So, you can find the articles we just talked about online. Plus, the ones we didn't get to today. So, how to properly check your internet speed. I've got articles there that are going to tell you all of the details of the different apps, and different Web sites you can go to. How accurate they are and in what ways are they accurate. And that includes for some of us, that have ISPs, you may be questioning are we getting what we're paying for. And, by the way, maybe this is no surprise, but you using your ISP speed test may not be the best way. How to block and report spam calls and text messages. Things are getting worse. More than doubled since last year. Some really good hints and tips in there, including a couple of surprising ones. 

[00:25:46] At least, there's a price and the people I was talking to about them. So, you might find them surprising, as well. And Google. They are recording your location, even when you tell it not to and that's for anything, including iOS devices. If you have Google software on them. So check it out online. Craig Peterson dot com. Lots of great articles up there. And, if you have any feedback, any questions, you can just e-mail me at Craig Peterson dot com or one of the simple things to do is just go ahead and text me. You can do that right now, if you're at the gym or wherever. I love to get feedback! What do you like about the radio show? Tell me specifically, what did you like about today's show? Just text me, 8 5 5 3 8 5 55 53. Any questions, any anything. 8 5 5 3 8 5 55 53. I hope you have a great week. Be safe, out there. Pay attention to what's going on, and if you're a business owner please, please, please, please, UP your security, and I can give you some great pointers on that. I have all kinds of special reports I can share with you. Again just text. Have a great day. We'll be back Monday morning with Jack Heath, and of course, posting that on my Web site, and on iTunes, SoundCloud, Stitcher of everywhere and even tune-in. Take care. Bye-bye.

 ---

Related articles:

*ALERT: New, major problem with WiFi*

Hippies Are Going To End Up Killing Us All! How China Will Win The Deadly Race For AI Weapons

Election Systems Are So Insecure, That Even An 11-Year-Old Changed The Results Of Florida’s Presidential Vote.

Looks Like Google Is Always Recording Your Location -- Even When You Tell It Not To

Spam Phone Calls Are Up 100% In 6 Months -- How To Block And Report Spam Calls And Text Messages

Hacked Satellite Systems Could Launch Microwave-Like Attacks, Expert Warns

How To Properly Check Your Internet Speed

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 22, 2018

Find out how one hacker stole millions as Craig discusses SIM hacking and trends at this year's DEFCON with Ken and Matt

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

3 Trends Hackers At Black Hat And Defcon Are Watching

How A Hacker Allegedly Stole Millions By Hijacking Phone Numbers
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/15/2018

Security Secrets We Learned At Blackhat And Defcon

 

Craig Peterson:[00:00:00] Hey, Good morning, Craig Peterson, here. I had a conference yesterday well actually a webinar. And I was running it. And my guest for the FBI InfraGard's program on the Webinar was a gentleman from Black Ops partners. Now, Black Ops partners is an intelligence firm. They deal a ton with various types of intelligence and they provide information to the government, to businesses, and NGOs all of those people. They had a bunch of warnings for us yesterday, some of that stuff I really can't share with you at this point. But we do know about what's been going on out in Vegas with the Black Hat conference and with DEF CON. So, this morning with Ken and Matt I kind of loaded them up with articles on security and some of the things we need to be very cautious with. Things are boards of directors need to be paying more attention to than most of them are. And, things that you should be paying attention to including I don't know. Ever heard of sim hijacking. Well, I explain that this morning and how this could cause you to lose a ton. Including it already did, One guy lost five million dollars, because of it. So, here we go with Ken and Matt. 

[00:01:25] Were back again and it is that time of the week again, 738 on a Wednesday means time for Craig Peterson on deck. Craig how are you this morning. 

[00:01:34] Hey, good morning gentlemen. Doing just fine.

[00:01:37] So, now Craig now can they steal information from our love our online accounts through voicemail.

[00:01:45] Yeah listen a surprising. I assume you guys know what two-factor authentication is, right. 

[00:01:52] I do. I wouldn't bet on that. 

[00:01:57] It's hard to say, what it's called. 

[00:02:00] Most of us now are have started using something called two-factor authentication where in most cases we're using our phones and we're getting a text message. So, for instance, you're logging in from a new location, a new browser, etc. and the Web site's going to pop up and say I'm not sure I've seen this device before so, I need to verify you, and in most cases, it sends you a text message. So, that text message comes into your phone and it's got a number and you type that number into the Website and now it knows it's you. Well, we just had a conference going on in Vegas and there were two of them they run back to back every year in August. There is Defcon and there's black hat. These are where there's all kinds of fun games. For instance, they're talking in these conferences about hacking and how to hack in and leads basically to help the good guys understand how the bad guys are getting in, OK. And they have games like well the normal one, spot the Fed. So, they are in a conference talking about something and they try and figure out who the people in the room are that are from the federal government so, that's kind of a fun game. 

[00:03:17] Another big one this year, was hack the voting machines and we'll have to talk about that next week a little bit. But, we had an 11-year-old win this year on the hack of the voting machines, just to show you how great these things are. But in this case, we had a presentation about using that text message type functionality to get into almost any account including WhatsApp and Signal, even. But, your standard accounts from Microsoft and Apple and Google. What they did in order to hack these accounts was they figured Oh well wait a minute now they're going to send a text message. Wow. These places all we're talking with all of your major vendors will all give you the option to call you on the phone. So, all the bad guy has to do if he's targeting you is go ahead and hack your voicemail account. Well, how would you hack your voicemail account? Well, they run a little program and the programs available online that will call your voicemail. Now, you guys I assume you both use voicemail to some degree right.

[00:04:27] As much as I hate it, Yes. And how many digits is your pin? You have to type in a pin right. 

[00:04:33] No, actually no I don't. I have Verizon and I have the visual voicemail thing to call in. 

[00:04:41] I think when I used to call anything I just portion of it talks me. I've got to I've got to I've got an app in my phone that does. Yeah, but when I used to call it it was like four digits, I think. All right. I might have an iPhone Ten I push it and it talks to me. But, I also see that message as well.

[00:05:02] I noticed when you push, Matt, he talks to you too.

[00:05:05] But, anyway here's a couple of problems that are inherent in this system. One is if you call into your voicemail and your voicemail automatically starts talking to you, right, giving you your messages etc. It's probably using your caller ID and that is easily faked. So, for instance, if I wanted to find out messages that came in the Ken Altschuler all I need is a phone number and I can get his voicemail. If you're using an app for your voicemail you may be a little bit safer. But even if you have a pin on your voicemail account, does it back off? So, for instance, Ken when you had your iPhone what was your previous on a, 7.

[00:05:48] Yes.

[00:05:50] So, when you had your iPhone 7 and knew you had to type in the code on the front of your phone and you made a mistake you'd have to re-enter it. 

[00:05:59] Correct, Yeah. And, Matt the same thing with you right with Right. Yeah. So, we make a mistake. It gives you the chance to do it again. Did you notice that it backs off? 

[00:06:11] So, every time you make a mistake you may get ten tries. But the first two tries are right away. Then third try it's going wait a couple of minutes so forth to try it's going to wait many minutes. And by the time you get to the 10th try, it can be as long as a week. That's called an incremental backoff. And the idea is if you've only got a four character or four-digit PIN it's going to take them at least a year or two or three to break in if they're able to do it. So, that's incremental backup. Does your voicemail have that? Well, it turns out most of them don't. So, if they can get your phone number if they're targeting you. And remember the FBI is warning us that they're targeting small businesses and I have another one last week that I was talking to that was targeted. But, if they're targeting you, this little program just sits there and keeps trying pins because most voicemail systems do not back off. So, within a few minutes, the hacker has your voicemail and has the ability to get into it. So, all they have to do is go into your account, online. 

[00:07:20] say forgot my password have it use the voice option. Call it to leave a message on your voicemail with a new pin. The hacker now has full access to your account because they already hacked your voicemail using an automated system. So, there's something more to think about our voicemail systems. Most of them are really bad when it comes to this. Now some of the professional stuff is good, it does a good job but you might want to think twice before using your phone and SMS text messaging. Think twice before using text messaging as your two-factor authentication method, Google Authenticator, and there a company called Duo. If you're really paranoid, like I am because I got to take care of my customer's data right. Use things like Yubi keys. There's a lot, and of course, you can see a lot of this up on my Web site. I've got this article up there for people. We're talking to Craig Peterson as we typically do at this time every Wednesday. 

[00:08:22] Craig speaking of being paranoid about my phone ruining my life. Apparently, a hacker has stolen millions of dollars by hijacking phone numbers I guess 40 victims or so five million dollars. Tell us about this. 

[00:08:35] Yeah, isn't that something you know when you get right down to it we're just confident with our technology, Right. It's like Matt you were saying last week, yeah. There may be vulnerabilities in Android, but you're using it, right. The same thing with having an Alexa in your home or a Google home etc. etc.. This technique came out again here. This is a this is a 20-year-old who is from Boston and he has hacked about 40 different victims that they know of. There were probably some accomplices involved, but this is a different technique called Sim swapping. And, again what happens is they're able to redirect and not your voicemail in this case but your entire phone number etcetera, etcetera to a third party phone. So, this has been happening more and more. We've got alerts out on this. You have to be careful with here. It works for any provider. This is a provider thing AT&T, T-Mobile, Verizon. If they can defraud the carrier into switching your phone number to the different SIM card they can pull off the scam. In this case, it was about five million dollars in cryptocurrencies that were stolen by this guy. So, five million bucks not so bad for 20-year-old although he stole it and it's going to be very bad for him because he ended up in jail you know getting charged and down in New York City. Yes, and may He did a bunch of this stuff so you may get transferred to a different district. But, all would all of the entrepreneur knew whose money cryptocurrency was stolen in this case was his phone stopped working and he didn't notice it until later in the day and then he called up they tracked it down. The FBI got involved. But if your phone stops working you may think you may want to hop on it really quickly and not just think your phone broke. That's the bottom line, there.

[00:10:44] We're on our Craig Peterson our tech guru. You can always go to Craig Peterson dot com and get all of the information first. So, so you know we talk about terrorism and all these horrible things facing America. But, do most people fear are most intelligence agencies authorities fear a cyber attack is that the worst thing that could happen to America.

[00:11:05] Yeah, this is interesting. I ran webinars yesterday for the FBI. Their Infragard program. And I had on the head of Black Ops partners. Now, this is a company that provides a lot of intelligence for the government, for private industry, et cetera and that's all very interesting stuff and it was fun talking to a great guy. But, again there's a lot to be aware of. And, we've got to get boards of directors aware of this stuff. And on top of it. Because, we are talking now about crippling cyberattack that can happen. Now, this is scary because again all levels of government are warning about this but, a well executed cyberattack could knock out the electric grid, shut off power, compromise vital government systems, financial data. We've got General David Petraeus. He's a former CIA director saying this is a quote "What worries me most is the cyber equivalent of a weapon of mass destruction fall into the hands of extremists". "They'd be very difficult to deter and the willingness to blow themselves up on the battlefield and take us with them says a lot". Now, China has been hacking us for a long time. Microsoft yesterday just announced that they had found Russian involvement, where they were pretending to be various U.S.

[00:12:35] based political party sites. In other words, Microsoft caught and stopped the Russians from pretending they were the Democrats and pretending they were the Republicans. They're equal opportunity offenders. This is going to continue. This is the next battlefield. And, as of yesterday BlackOps Partners was talking about this. This is the typical unconventional warfare. Rights were really big. They're really small. Sun Tzu, The Art of War. They have ways of attacking us, they can frankly cripple us. So, we've got to continue to improve. We are improving security with things like power stations. But your business has to improve your cybersecurity. We've got to step up. We need to pay attention even as consumers, because things will get critical, right. Three days after our computer systems go off-line there will no longer be bread in the grocery stores etc., etc. You going to have to go out fishing off the coast to get your food all by yourself. It's very scary, and I can't emphasize this enough, I know we speak about it all the time, but it's very real, very real Ken. We've been talking to Craig Peterson, our tech guru who joins us on Wednesdays at this time to give us an eye on technology.

[00:13:59] Craig thanks so much. We will talk to you again next Wednesday. Hey, take care guys. Bye-bye. We're going to take a quick break here.

[00:14:06] By the way I should mention, if you are interested in getting involved with the FBI InfraGard program go to InfraGard.org or I N F R A G A R D dot Org. Lots of great information you'll be getting some of it's a little bit of inside information that is not shared with the general public. It is not like top secret stuff or anything. But it's important stuff to know. So, check it out Ifraguard dot org. Take care. Have a great rest of the week and I'll be back with you on Saturday. Although, I am starting to try and get this posted my radio show when, I prerecord which I've been doing lately. I try and get it up on Friday, so, keep an eye out for that. We can podcast as early as Friday and you can get there from Craig Peterson dot com slash iTunes, make sure you subscribe. Give me a rating 5-star. I hope, Take care.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 21, 2018

Do you know that you can scare burglars off with Alexa's new skill? 

Learn more about this amazing skill as well as more information on hackers seizing your accounts via voicemail as Craig discusses it with Jim Polito.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Ever left your lights on a timer to scare off burglars? Now you can use your Alexa


Hackers can seize practically all your online accounts, and it’s your voicemail’s fault
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/21/2018

Tripping To Italy - Hackers Seizing Accounts Via Voicemail - New Alexa Skill Scaring Burglars

Craig Peterson: 

[00:00:00] Hi, Craig Peterson, here. I was on this morning with Jim Polito. I don't know if you know it or not, but he is doing this guided tour. Actually, it's a professional firm that's doing it and they go over to Italy in March. That would be kind of fun to go over there with them. So, we talked a little bit about that. Did you know hackers can seize practically all your online accounts, and it's your voicemails fault? Well, I talked in detail with Jim about that this morning. Also, that new Alexa skill that's designed to fake arguments and scare off the stupid or burglars. So, here we go with Jim Polito. 

[00:00:36] He's one of the most popular guys we have on the show. He is our tech talk guru, and he is Craig Peterson. Good morning, sir. 

[00:00:46] Hey, good morning. You know that trip to Italy it sounds fantastic. I went to the home page there on iHeart radio for the radio station. I clicked through and I looked at some of the pictures. Now, I've got to say there's probably a lot of people who have never been over to Europe and I have. I don't know if you've been over there before. 

[00:01:03] I've been to England and to France, but I've never been to the to the motherland, you know for me, Italy or Ireland my other motherland. 

[00:01:15] Well, People were afraid about the language and I got to say if you are in these places, especially with a tour group like this where you've got a professional tour, it is fantastic because everybody that you're with of course speaks English, right they are all from our area. And the tour guides speak English and people in the cafes are speaking English. And that was always a concern of mine because I only speak French and English, so Italy I have problems. 

[00:01:42] I have problems because you're a Canadian. 

[00:01:46] Craig. Yeah, exactly. It was funny, I was up in Toronto for a wedding here last weekend one of my nieces got married and I started speaking French, because I knew my sister speaks French and she went to French high school like me and one of my sons speaks French and I just assumed that I'm in Canada everybody speaks French but I've forgotten no. This is Ontario.

[00:02:10] They don't speak French don't, they don't. That's frankly Craig I like Ontario better. Oh, Did I say that? I know. Just kidding. No. Right. Right. But they still have to have everything bilingual there. I mean I do. I just love when I'm in Canada and you look at the packaging and they have the language police you know like it's in English. It's got to be in French. Same size same font. You know, it's even worse.

[00:02:41] And in Quebec, did you know that you could not you couldn't move your business with a name that sounded like it was English. Yeah. And in fact it was so crazy, Jim, that they had stop signs in Quebec and now stop is a valid French command to stop. But the language police in Quebec decided it didn't sound that English didn't sound French enough so they changed them all to Arret and then pass the language police said you know really that's bad grammar so, they changed them all back to stop thinking of the tens of millions of dollars just came up some silly of waste. 

[00:03:15] A complete waste of time. Kerry is telling me well, there's folks in Italy who speak French too in northern Italy. 

[00:03:24] You're right don't worry about it people if you're thinking about going, Go. You are going to enjoy this. The language isn't going to be an issue. You'll have the time of your life. The only drawback is I heard this Polito character is going to. You know I'm going to be.

[00:03:40] You're going to have to be with me. You don't have to room with me. You know, my poor wife is going to have to do that. You don't have to room with me. 

[00:03:48] But the food will all be gone.

[00:03:51] I'll be gone. No, I promise not to eat all of the continental breakfast at the hotel before we start the day. I promise. So. anyway. hey, you've got some great stuff for this us this week. And, I want to get to the one that really caught my eye. I want to start with this, OK. 

[00:04:10] Hackers can seize practically all of my online accounts and it's my voicemails fault. This one scares the heck out of me. What's going on here Craig?

[00:04:21] Yeah, this is a real problem for people. We're aware that hackers try and get into our accounts, right, just normally. So. a lot of people have been talking about two-factor authentication. Now, do you use that at all? Jim, are you familiar with that. 

[00:04:37] Yeah, I do now because remember was it was it Instagram that had the big hack. And, they said hey you should go to two-factor identification and, I said all right I don't want somebody posting stuff on my Instagram account. 

[00:04:51] Exactly. So, that's one type of two-factor authentication is where you might give them your phone number and they text you, right. And that's probably the most common and it's very hackable, frankly. 

[00:05:06] But, if they want to go after you, right, there they're not going to cast a wide net and pick you up because of the text messages. But, if they are going after you and we're finding out now the FBI is coming out with all kinds of warnings about this that small businesses are being specifically attacked more and more.

[00:05:26] But, if you give them your phone number and them be you know the Facebook, Microsoft, Google, etc. Give them your phone number where they can text you. Here's where the problem starts coming in. Now, many of us use WhatsApp or we use signal. Signal is a great app for communication right back and forth and a keep your data safe it's all encrypted. And, with those as well many people have given their phone number. So, here's what hackers are doing. There is a big conference out in Vegas, here just about a week or two ago. Two of them. There's Black Hat and Defcon. And, at these conferences, they were talking about the new techniques the bad guys are using. Well, what they're doing now is, these places including Whatsapp and Signal have your phone number and, they give you the option if you want to verify that it is you. Yeah, I did forget my password. Yeah. Give me a new password. They have the option of calling you on the phone to see where this is going. 

[00:06:31] Ok. Yes. 

[00:06:33] So, all you have to do, now were protecting many of our systems but how many offices are protecting their voicemail system. So, here's what happens. All you have to do this takes about 30 seconds to as much as three or four minutes. All they have to do is say OK, I'm targeting this financial planner, OK. This company over here and they know what the phone number is for that company. So, they find that number within that company that's going straight to voicemail and then they know the person's extension they might want to get to. They then have a little program that keeps calling that number and, it calls it, it gets into the voicemail system and it just sequentially tries to all of the passwords, because of voicemail systems don't have a limit on how many times. 

[00:07:26] Oh that's right. My my my my iPhone right. You try 10 times you're locked out. Right. Right. Right. 

[00:07:35] Yeah. Gets longer right. So you do the first few times or correct the third time that way a and then it's five minutes. So, they don't go back and try. It's a week later. OK. It's time and you out. Voicemails, don't do that. He demonstrated here on the stage over at Defcon, that he could brute force almost any voicemail system in the world. And, he was ensuring the calls were straight to voicemail. All automated right he didn't have to do anything. And then we went to the Web site, did a password reset process, using call me feature.

[00:08:09] It called him. Now, these systems that are calling you to reset your password and verify it's you. The systems will leave you a voicemail with the new password. 

[00:08:21] So, you have to do is go there. The hacker, all they have to do is go there and get it.

[00:08:26] You already have the voicemail password, right. Now you have a secret code, you are in the account and boom there it is. Yeah ok. 

[00:08:34] Not good. We're talking with our good friend Craig Peterson tech talk Guru the end of this segment. We will give you a number you can text my name to. And he'll provide you with this information plus more, standard data and text rates apply. 

[00:08:47] Ok. There is more work around here Jim. OK. go ahead. 

[00:08:51] Well you can use don't use your SMS as your phone number for verification. There are other ways to do this. You can use things like Google Authenticator. There's another app called Duo. There's also things like Yubi keys. Ok. It's getting complicated at this point. But, if you have any money to protect, you might want to pay attention, if you send me a note or write something up and send it off to you.

[00:09:17] Excellent. All right, Craig quickly I do have my lights on timers at my house to make it look like there is somebody home or to protect from burglars. Also, have lighting around the perimeter to make sure that a night nobody sneaks up to the house. But, you're saying that Alexa can take care of this for me. 

[00:09:37] Yeah, this is kind of cool. Alexa has the ability to learn what it calls news skills. So a skill can be, for instance, I Heart Radio has skills and many other Web sites. Now there's hundreds of thousands of these things. My wife made a skill for Alexa to drill one of our grandkids in some of that history lesson stuff. So, it's really cool. Alexa has a new skill called away mode, and what you can do is go into your Alexa app on your phone. Look for the skill called away mode instead of turning on your lights and turn them off or making noises. 

[00:10:14] Alexa can do by the way right. 

[00:10:17] It is. It has real and completely ridiculous conversations. These were penned by comedy writers from Saturday Night Live, It's Always Sunny in Philadelphia and others. There's a really kind of cute thing that it's doing, for instance, the gems are a couple has a breakup while also trying to watch TV two average guys discuss what's unique about themselves, so they can start a Podcast. Emergency PTA meeting to discuss memes, fidget spinners and other teen fads. And, this is my favorite, Jim, conversations from a book club where no one discusses a book, and a mom walking her daughter through Ikea assembly over the phone. 

[00:11:01] So. So the burglar comes in the House. Oh, there's somebody in there. There's people in there talking. There's a guy. I mean as opposed to the old they used to have those things it was a recording of a barking dog, people would have, you know. And that was supposed to scare people away, but now you had a conversation, of course. I think if the burglar sticks around long enough if it's that much of a joke, now they might not get the joke because people do have absurd conversations like that.

[00:11:30] I get to read this quote here. Hand me the rule book. No, the rule book that's the rule and reference no. Learn to play guide. 

[00:11:38] That's the quick reference. That's pretty good.

[00:11:42] Now that's realistic, that's realistic.

[00:11:46] Having done that. You know what else is realistic. Craig Peterson offers you all this information for free. He doesn't go and sell your name. He doesn't give you away to hackers. He does it all for free. 

[00:11:59] All you have to do is text my name, Jim to this number 8 5 5 3 8 5 55 53. That's 8 5 5 3 8 5 55 53.

[00:12:12] That's right. Standard data and text rates apply. And then if there is ever an emergency like a massive hack. Guess what your on Craig Peterson's list to notify and he won't try to sell you anything, won't annoy you, Craig. That was a great segment. And what do I say? Oh yes.

[00:12:30] Avoir. 

[00:12:34] Thanks, Craig.

[00:12:37] Bye. bye-bye. Bilingual. Craig Peterson okay. Don't go anywhere. A final word.

 

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 20, 2018

 

Do you use your voice as part of your security?  It is an option in some situations.  Listen in as Jack and I discuss what we learned from the two big security conferences held last week in Vegas.

These home assistants are becoming quite popular.  Today, Jack and I talk about a new skill for the Alexa home assistant.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles

Hackers can seize practically all your online accounts, and it’s your voicemail’s fault

Ever left your lights on a timer to scare off burglars? Now you can use your Alexa

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/20/2018

Audio Hacking and Alexa skill that may stop Burglars.

Craig Peterson[00:00:00] Hey, Happy Monday to everybody. Craig Peterson here. This morning, I spoke with Jack Heath about a couple of different things. We've got a new skill from Alexa. Do you have one of these things? You'll probably end up seeing and maybe ultimately on Siri, or on one of the other devices like the Google home. But, this is used to protect your house that's really quite cool and an innovative way to do it. Who thought the comedy writers over at Saturday Night Live, and It's Always Sunny in Philadelphia, would be able to help protect your house. So, anyhow we have them coming up. We also have a couple of different things from the Black Hat conference and DEFCON. Three tips and trends that you really need to be watching when it comes to your security, and in this case audio hacking. Who knew that they were doing that? That's a bit of a surprise, isn't it.

[00:00:54] Here we go with Jack this morning. Joining us now the Autofair listener line with some tech talk and perspective, Craig Peterson. His show airs Saturday mornings, right after movers and shakers, he joins us on the Autofair listener lines. Good morning, Mr. Craig. 

[00:01:08] Hey, good morning Jack. We've got a few interesting stories today. You have a unique voice. You recognize my voice. It's a pretty typical thing. We all can use voice recognition to identify each other. Did you know that your bank is probably using that as well Jack when you call in? They're picking up the voice.

[00:01:31] I do know that some of these scams I've heard of, and I am not talking about your bank. 

[00:01:34] But, some people try and get your voice like they call your cell phone and say Is this Craig Peterson and you'll say yes what's your name. You'll see Craig Peterson, Craig Peterson and they'll take that word, Yes and your name and they'll try and use it to prove certain things where the voice is kind of part of your security. 

[00:01:49] Yeah, it is. And, in fact, what's happening is the banks are using something called voice I.D. now, to verify customers. So, when you call in you know they go through that anti-fraud thing where they are trying to get your Social Security number. Parts of it and other things to verify you are who you say you are. Well, they're also analyzing your voice while you're doing that. So, the next time you call in that voice I.D. and voice print if you will can be used to help verify you. Well, we just have a couple of really big conferences out in Vegas, called Black Hat and Defcon, and these are the conferences where all of hacking techniques are discussed by the good guys and the bad guys. And, for cybercriminals now they are looking at how they can spoof some of these voice-based services. 

[00:02:41] And, they really are providing quite an enticing target. So, we're seeing some major changes now in how the bad guys are going to hack us. We've got mobile, mobile devices are moving up the list of the attack vectors. 

[00:02:56] We've got the internet of vulnerable things, basically all of our TV's and now refrigerators and stoves etc. They're all getting hacked and audio hacking is now a thing. It's really kind of a scary thing when you get right down to it because of some of these hacking techniques.

[00:03:14] You have no idea that you've been hacked until your bank accounts been emptied. We got another really interesting thing out there, Jack. You have one of those Alexa things in your house. 

[00:03:27] I do not. I'm not saying other people don't in the house, but I don't, and I do not use it, but I know more and more people are talking to this thing all around the house. Hey, who won the Red Sox game? Or did they lose last night? Hey, you know what's the weather today? And you got this thing talking to you. I tend to try not trying to become too dependent on technology.

[00:03:45] Well, they are handy. There's no question about that, and we know about some of the problems they've had previously.

[00:03:51] David, are you, Hold on Craig. Are you like a subscriber? Yea, Google home. Google home. 

[00:03:59] Yeah, Same basic thing. And, of course, we're talking about these devices that go in your home or office wherever they might be that are constantly listening to what's being said, And then they have an activation word that you use now and they wake up basically and they send the audio up to the internet where it is recorded and we have a number of cases of police department having subpoenaed the records those audio recordings of those devices are making. Well, there is a new skill Alexa has the ability to have new programs new apps if you will installed on them, And in the Alexa world, these are called skills. And, who is doing this skills are absolutely funny, they're hilarious. Again, Jack to you and I probably over the years we've got those little light timers that you put on your lamps so that when you're out on vacation it looks like someone's home.

[00:04:55] Right. I'm sure yeah, you've done the right to light traps Yeah, yeah. 

[00:04:59] Well, Here's a new skill for your Alexa. It's called away mode and instead of lights and maybe even some noises like leaving your TV or radio turned on. Now, you can keep your home safe by having the Alexa play these lengthy audio tracks. I like the real and completely ridiculous conversation. So, you watch your way mode and the Alexa is going to play one of these seven audio tracks that were put together by some comedy writers already Saturday Night Live. It's Always Sunny in Philadelphia and others. So, here's some of the gems Jack that you can play in your home. Couple has a break up while trying to watch TV, Two average guys brainstorm what's unique about them so they can start a podcast, an emergency PTA meeting to discuss memes, fidget spinner's another teen fads, and more, Really, really funny including I love this one, a mom walking her daughter through Ikea assembly over the phone. So, these things are designed to make it sound like there's a real conversation going on in your home. And, to keep the burglars out. Kind of an interesting twist on the Alexa technology. Now

[00:06:13] Just a quick question going back to what you were mentioning about you know wanting to subpoena some of the audio. Have they been successful in doing that? Or are Google and Alexa kind of being like Apple is, where they want to unlock a phone, they won't give you any information, subpoena or no subpoena.

[00:06:29] No, they have been successful. Subpoenas have been served and they have been fulfilled. So, the company that Amazon for instance or Google have provided the audio. But what's interesting is that the cases that I'm aware of David, and Jack have not actually yielded any real results. Because what they're doing is they listen for the wake-up word. For instance, you might say Alexa or google home or whatever the word is you have programmed, they listen for that word and then the audio from a few seconds before that word for about 30 seconds, give or take, is sent up to the cloud. So, unless you're having a fight and threatening to kill someone or whatever it might be and you're asking, maybe you're you know like the old Siri where can I hide a body. At the same time, there is nothing that stored up in the cloud from these devices. So, yeah they have honored them, but they really haven't really yielded any results.

[00:07:29] Craig, make it a good Monday. Thank you very much, Craig Peterson, with some tech talk and tech perspective. Thanks, Craig. Thanks, Jack. All right some of the other stories that are trending. 

[00:07:39] Quick reminder if you have any questions or comments send them directly to me 8 5 5 3 8 5 55 53. I had quite a few actually over the weekend. I was surprised for my Saturday show 8 5 5 3 8 5 55 53 and by the way, we're trying to get the Saturday show if I'm pre-recording it, up so that it's available on iTunes by Saturday, as well as Soundcloud etc. etc. Let me know what you think about that, too if you think that's a great idea. Take care. Thanks again. Bye-bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 17, 2018

 

Cyber attacks are getting more sophisticated and are being perpetrated on everyone and more often than ever before.  Today we are going to discuss Security and Two-factor authentication schemes and what you can do to protect your self.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/018/2018

Two Factor Authentication. Security and Highlights from Defcon Conference

Craig Peterson: [00:00:00] Hi, there everybody, Craig Peterson here, and as usual I've got a ton to talk about. We've got a special report about America's greatest threat. They're calling it a hurricane for cyber attacks. We've got an interesting hacker out there, who has allegedly stolen millions of dollars by hijacking phone numbers and in turn asking kids parents to send some money. Isn't that something. Another trick here. Your Voicemail. Did you know that hackers are seizing practically all online accounts just using your voicemail? We'll tell you how some practical security here for the prudent American, great little article that came out in medium, we'll be talking a little bit about that. Everything you want to know about VPN's but didn't want to ask. In fact, I had a request from one of our listeners this week about the VPN stuff because he's heading out of the country. I love this new Alexa skill, I've been playing a lot with my Alexa. You know about the timers, that people have been using for years to make their lights go on and off while they're out of the house. Well, listen to what you can do with your Alexa. And three trends that hackers, a Black Hat and DEFCON are watching. Did you know that just happened to hear about a week ago? So here we go. Of course, you're listening to Craig Peterson, right. So, we're playing around with some different things, let me know what you think? We've got some different bumper music and beds and things, and you'll hear some of the same stuff we've always been using, as well today. But, you know it's been years since we changed any of that stuff so, we'll just let it go for now, OK. So, our special report, to start things off here today. 

[00:01:51] We know about the security vulnerabilities, we've seen the vulnerabilities, we know what's up, and many of us have been hacked, right. Have you been hacked? You may not even know it. But almost every computer that's online that's running Windows has been hacked. If you've been online for more than a year. Well, what is ahead when we go forward? What are we looking at here? I did a really interesting interview this week for the FBI for their Infraguard program. It's with a company called Black Ops partners, and you might want to look them up. They've got just a ton of cool information. It's headed by the guy who started IBM Corporation's whole security division, which is really kind of neat here. He's won the cybersecurity excellence award, and everything else. So, he and I were talking about cybersecurity 3.0 and where's it going. What should we be doing? And, you know it's really interesting when we get right down to it. But, the bad guys are out there. They are coming after us, and they're coming after us in a big way. We've known that right. We've we know the Russians are coming after us. We know the Chinese, in fact, this customer I just picked up. We've been cleaning things up, and just yesterday we installed a brand new Next-Generation Firewall filter and Security Operations Center support for him. 

[00:03:19] And, this is just a small family-owned company. But, he had been compromised. They were able to get past his firewall, he had a great firewall. Yeah, yeah, yeah, I've heard that story before, and the bad guys got past it and got into his accounting system, found all of his clients, and managed to steal hundreds of thousands of dollars. It's just crazy what happened. He ended up going over to China. To try and find out. So, can we get our money back because the money got transferred over to China? Tens of thousands of dollars later and, of course, now there's lawsuits and legal fees involved and it's pretty crippling. So, that's not surprising, right. It's just like President Trump going out and saying something crazy on Twitter, right. We're used to hearing that new thing that he says out there, but it is not going to change our opinion about President Trump, right. If you had a pro-opinion, you have one after if you had an anti-opinion, you have the same one after, right. That's not going to change things. What changes things is a surprise. What changes things is wow, that's just not what I would expect. And if you had another President in there that didn't normally do the types of things President Trump does, you would be surprised maybe your opinion would change when he did something on Twitter that just shocks everybody in the whole nation or the whole world, 

[00:04:48] right. You kind of get used to it. Well, here's the big picture. The bad guys aren't just going after your money. They're not just trying to get at your clients, and not just trying to get that information. It turns out that the bad guys include nation-state actors. It's not just some kids in the basement somewhere over in Ukraine that is trying to hack in now. And, we're talking about the risk here of a crippling cyber attack. The Homeland Security secretary, Kirsten Nielson said just this last week, that the U.S. is in crisis mode comparing the dangers of a massive attack to a Category 5 hurricane looming on the horizon. You heard that right. Category 5 hurricane, and there is no graver threat to the United States. An interesting article that I posted up on my Web site by Axios. You can find it there. They've got some quotes from General David Petraeus. He's the former CIA director, and he's quoted as saying, what worries me most is a cyber equivalent of a weapon of mass destruction falling into the hands of extremists who would needless to say be very difficult to deter because of their willingness to blow themselves up on the battlefield and take us with them. Leon Panetta, of course, who was President Obama's former CIA director. 

[00:06:20] Quotes and On and on and on. But, the bottom line here is we not only have to protect our businesses from these bad guys that we're familiar with, that have been out there for a very long time, but in fact, we've got to protect our businesses from the nation-state actors, as well. Now, I know the FBI has been working closely with businesses to try and secure our infrastructure and headway is being made there. But, it's shocking to me more and more as I get into it, how many hospitals, clinics, doctors offices, small banks, et cetera don't have what's needed. And, they are part of the critical infrastructure. So, again looking into the FBI Infragard, if you're involved with one of these businesses and see if you can't join up if you can pass the Infragard background check and start getting some of this information firsthand that I'm providing and other people are providing to the Infragard members. It is so critically important. And if you're a regular business guy is, I'm just a business regular guy, What do people care? Think about losing everything. Think about your retirement caught up in the business. What's going to happen if that's all stolen from you? And that's what's going to happen, by the way, it's guaranteed. It's going to happen. It's happening every day. And you've got to reconsider your whole security infrastructure. 

[00:07:55] You've got to work with the company that knows what they're doing, and just a funny note here. I've got to add this in. I got an e-mail this week that came from a mailing list that I'm on, and they were promoting this two thousand dollar course, become a managed security services provider in six weeks. And, you know I have to chuckle because people have a hard time differentiating, right now. How would you differentiate between my company, Mainstream, and one of these guys that six weeks later puts up a shingle, saying yeah I'm a security services provider, right? And I started adding up the hours. And this is the part that really shocked me. Of course, it helps to be a little bit older and having done this for a long time. I have more than 100,000 hours in the I.T. business doing network related stuff including security. Personally, me personally. This isn't our company has a combined 20 years. Me personally, 100,000 hours and I have I just laughed when I saw this. Are you kidding me? People are going to be out there peddling themselves as security providers when all they have is a couple of certifications under their belt and a six-week course. Oh, man anyhow, so now let's go over to our next topic here. 

[00:09:33] Well, we kind of started out by talking about hackers and what they're doing. We've got a new problem up there, pretty darn big problem. frankly, and this is a phone hijacking now. 

[00:09:45] You know I've told you before that these two-factor authentication schemes that are using your phone where they send you a text are not terribly secure, right. In fact, they're not secure at all. Well, this is something that's just a little bit different. We've got an article here from Motherboard, talking about California authorities who are saying, that a 20-year-old college student has hijacked more than 40 phone numbers and stolen five million dollars, including some from cryptocurrency investors. Wow. OK, wow is all I have to say here. Here's what's happening this guy Joel Ortiz, he's a 20 year old from Boston. He's alleged to have hacked these victims, using some accomplices who are unnamed, at least as of yet. And, this is the first reported case against someone who's allegedly used a technique known as Sim swapping. So, in Sim swapping so, you know you get a phone, you have an unlocked phone you have a sim that Sim has your contacts and other stuff on it. And, that sim also was used to authorize you to the cellular network. So, now that's what you use to identify your phone, right. So, when someone calls your number it uses the sim, to identify you. That's how that all works. With sim hijacking what happens is they basically steal your sim. Now, they don't even have to have access to your sim. All, they have to do is trick your provider. You know like AT&T, T-Mobile, Verizon, and whatever trick your provider into transferring the target's phone number to a SIM card that's controlled by the bad guy. So, once they get that phone number and there's ways to do this, this is really, well documented where they will call up and pretend they're your wife, or your husband or even you.

[00:11:52] And, so many of us are posting information online that makes it possible for them to be able to very easily impersonate you. So they know your wife's name your kid's names your dog's names where you work where you were born where you graduate from college. So, they can pass the so-called anti-fraud stuff when they call up the provider. So, once they get your phone number the bad guys are using it now to reset your passwords and break into your online accounts. Because remember I was saying that using a text message is not true two-factor authentication. In some cases even working, if you do have a separate type of two-factor authentication. And, its called a port-out scam. It's relatively easy to pull off, it's become widespread and that is where they say, yeah I am transferring my phone number from T-Mobile to Verizon, just as an example, right. And, you arrange for that. You're transferring your phone number and when you do that, you have to have a new sim. In many cases you have to, in this case, you'd have to have a Verizon type sim. And, obviously, you'd have to be working on the frequencies Verizon uses et cetera but easy enough to pull off. So, this guy Ortiz was arrested at the L.A. International Airport was on his way to Europe. He apparently had a Gucci bag that was part of a recent spending spree that, of course, they seized because they're alleging that it was financed by some of these scams. He's facing 28 charges, 13 counts of identity theft, 13 counts of hacking, and two counts of grand theft, according to a complaint that was filed. They're going after some of his co-conspirators apparently they have access to millions of dollars in cryptocurrency. 

[00:13:50] And the interesting quote in here, that I'm not going to quote because it is full of all kinds of nasty stuff. OK. So it's interesting. Think about that. There's a sim swapping community that's out there on the dark web, where people are swapping the information back and forth. At least three of the attacks that happened, he stole more than a half million from a cryptocurrency entrepreneur including a million he'd crowdfunded and an initial coin offering. And, you know I am absolutely against putting money into these things. I don't look at them as an investment. I look at them as highly, risky. It goes on and on. So, bottom line DO NOT tie it to your phone, into authentication for any of these Web sites. Use some of these some of these apps that are out there like Duo or Google authenticator, if you want to learn more about it let me know I'd be glad to put together a special little free mini-course on it, as to how to do all of that. But, that's what we do. We go even further. We not only use those types of apps, we have physical keys that we have to use in order to get on to certain Web sites. In fact, we're expert witnesses right now in a case involving a managed services provider, that they obviously they didn't go to the six week course or they would have known better, who messed up, and wow, major stuff, can't really talk about the case, but similar type of thing that happened with this other client, that we were talking about that we just picked up. It's happening every day. Now, you've got to pull up your socks and pay attention. All right. So, let's get on to the voicemail and how that ties into all of this as well. 

[00:15:46] Well, remember I was just saying that if you use your phone for authentication, where they send you a text message to make sure you, because you're logging into a new browser or you're logging in from a place that they're not familiar with, right. So, they'll send you a text message and then you enter that code in. Well, the same type of problem exists with your voicemail. Your Google, your Microsoft, Apple, WhatsApp, signal account, they all have an Achilles heel. Now, Signal is interesting because it is designed to keep things secure. WhatsApp is supposed to keep things secure, not as secure as Signal does. But, here is the weakness, and that weakness was disclosed this last week again in Vegas. In case you weren't aware of it, there was the Black Hat conference. And at that people were talking about different ways to hack, new things they found, Defcon as part of that, right. One right after the other, these two conferences out there in Vegas. So, this particular one was by Martin Vigo. He was over at the Defcon convention, and he explained how he managed to reset passwords for a whole bunch of different types of online accounts. So, he took advantage of the weakest link in the security chain which is. believe it or not, your voicemail. 

[00:17:17] So, what he did was he requested a password reset on some of these services, like WhatsApp, because you have the option of requesting you receive a call with the reset code. So, that's more than just receiving a text, it's actually a phone call. So, people think OK, well that's safe right.

[00:17:40] Well, no it's even worse than getting a text message because all he had to do was hack the voicemail account first. 

[00:17:49] How does he do that? Well, he just wrote a little script that just brute force attacked the passwords. All right. Most people are using a four-digit password. And most of the voicemail systems don't have incremental backoffs, where they time out. You know where you get it wrong the first time you have to wait five seconds, you can try again, if you get it wrong three times you have to wait five minutes. Yet are wrong again. You might have to wait an hour etc.. No, no. They just let you hack, hack, hack, hack, hack, hack, hack. And, in fact, he did get access to the account's password reset codes. And, ultimately he got control of the account itself because they sent a reset code via voicemail called up your reset code as 1 2 3 4, and he had previously hacked that voicemail account, and many people it's easy to find. I was on again research for this case, where we are acting as a consultant to the law firm and we may end up on the stand, as an expert witness. But in that type of a situation, all that has to happen is you go to the website, you can find that person's password, you can be again password reset information by just finding what is their phone number. Because people are posting their personal cell phone numbers on websites, or they're posting their business work number on the website. Then I get it right. You 

[00:19:22] Want people to be able to contact you. But in this case, he got into all of these accounts and he was able to reset them because he got the password via voicemail reset. 

[00:19:32] Oh man, some of the stuff just never ends does it? All right. So let's talk a little bit about practical security. Got a lot of kids going back to school. 

[00:19:47] You've got college kids, of course, going back to school. We just had a client bring in a hard disk that was being used for backup. You know one of those pluggable USB drives and guess what it had failed and apparently, their daughter's dissertation was there on that hard drive. And so we took it apart, the case and everything and it looks like it's actually a problem with a hard disk itself might be the voice call. You can hear clicking. So, hopefully, that's what it is it's only going to cost about five thousand dollars to get that a hard disk fixed. We're going to send it out to a lab. We don't actually do that in-house right. Let the experts deal with it. So, guess what doctoral dissertation. Because the machine went south and the backup wasn't working. We hear that all the time. It's incredible. That's why you have multiple layers of backup as well not just one backup. Because in this case her machine failed and she didn't realize her backup wasn't working. Oh man. Anyhow it's really distressing when that happens to you. We've got kids now that are starting to get involved with politics for the 2018 election cycle, the same thing is going to be true with the 2020 cycle. We've got of course harassment hate campaigns. There's doxing going on. Russian hackers going on, and these same people that have been involved in trying to disrupt our elections, are going to be busy again this year and in 2020. 

[00:21:24] So, anyone who touches sensitive confidential documents, financial records, voter data, you have to protect yourselves. And you might not have thought about that when it comes to these kids, that are working as volunteers may be in election offices that are out there, right. Their favorite candidate left, or right, or center, whatever they might be. 

[00:21:47] There is a ton of bad advice out there because most of the security folklore that's out there in the I.T. industry really is wrong. It can be even dangerously incorrect. The security world five years ago, today, It's not the same thing, right. So, there are a few things you have to do. I've got a special report. You can no longer get it on my Web site. But it's all about passwords, PASSWORD managers. I give some reviews in there we have some links to using them if you want to find out about password managers e-mail me or just send me a text 8 5 5 3 8 5 55 53, send me a text asking for it. I'll send you the PDF. 

[00:22:33] I think it's like five or six pages, it's pretty detailed pretty in-depth, I'll send to you. It's something I use with my clients. But, you can you can get that from me. But number one user password manager again if you missed it 8 5 5 3 8 5 fifty-five fifty-three. So, anyhow you've got to generate passwords. Get a security key, a Yubi key is probably one of the better ones out there. But, be careful of using the security keys make sure you know what you're doing because you could break your computer completely if you lose the key. OK. It's kind of crazy but you know Yubi key is out there. There's a lot of other things there. Chrome browser has some really good extensions. HTTPS Everywhere is a good extension to use it. You can enroll Google's advanced program protection and a good article and Medium that I have put my Web site Craig Peterson dot com. You can go there and read up a little bit more. Well only got a few minutes left so, let's kind of whip through these last few things for this week again you will find all of this and more in the newsletter. Now, we sent out the newsletter on Thursday this week as opposed to Saturday morning. 

[00:23:51] We want to see if that's a little better if you guys pick it up that way. I think a lot of people are subscribed to their work e-mail address, which means you might not notice it when you come in on Monday morning. So, if you check your e-mail you'll see it's from me at Craig Peterson dot com. All of these articles with direct links to them so you can find out more. We also have special offers, from time to time, like a couple of months ago we offered that password special report, as well. But a VPN is very important. We use them all the time. We have our own VPN. And, the whole idea behind it is you have a tunnel, hopefully, a secure tunnel. Be careful where you are going, when it comes to VPNs. Geo-blocking is a good thing to get around with a VPN, but as I mentioned at the beginning of the show I have a client that is heading over to Europe and he was asking about VPNs and what he might want to do what he should do. So, I got good advice on that as well. I know I can send you more information. There's a cool new Alexa's skill. 

[00:25:02] Is really really neat. It's plain these fake stupid arguments to make people burglars think that you're at home.

[00:25:10] Ok, so one of them is an emergency PTA meeting to discuss Memes, fidget spinner's, and other teen fads. There's another one where couples having a breakup while also trying to watch TV. Another one-two average guys brainstorm what's unique about themselves so, they can start a podcast about that. Oh man. There's another one that they can play where they have conversations from a book club, where no one discusses the book. A mom walking her daughter through Ikea assembly over the phone, a stay at home mom losing her mind, and an argument over a board game. Very cool you can. You can find those for Alexa. Great article in Slashdot. You'll find it on my Web site and cool for burglars keep them out of your home. Three trends that the hackers a black hat and DefCon were talking about and what they're watching. Mobile devices have moved up the list. The Internet of valuable things, IoT has become very, very big deal. I should do some special stuff on some of this for people and audio hacking. It is now a thing. So, you can find all of this and more details. CRAIG Peterson dot com check your e-mail if you're on my list. Also, I've been trying to send it out via a massive few are on my text list, a link I send out to everybody with this week's articles but you'll find all of this. Craig Peterson dot com, any questions any requests. Just text me. I've been answering people all week long and fact to getting more and more every week 8 5 5 3 8 5 55 fifty-three and I'll send you I'll put on my text list and let you know about current events what's happening and little reminders about the show and stop 8 5 5 3 8 5 55 53. Have a great week and we'll be back again next week and I'll be sure to let you know if anything big is hitting the fan during the week. Take care. Bye-bye.

 ---

Related articles:

Hackers can seize practically all your online accounts, and it’s your voicemail’s fault

Practical Security for the Prudent American

Ever left your lights on a timer to scare off burglars? Now you can use your Alexa

Special Report: America’s Greatest Threat Is A Hurricane-Force Cyberattack

How A Hacker Allegedly Stole Millions By Hijacking Phone Numbers

Everything You Wanted To Know About VPNs (But Didn’t Want To Ask)

3 Trends Hackers At Black Hat And Defcon Are Watching

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 15, 2018

 

Is someone spying on your through your computer?  Listen in as Ken, Matt and I discuss how it can happen.

Omarosa!  Yes, Matt asked me about this and we discussed how these recording work and the problems with them.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Is anyone spying on your computer? How do you know?

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/15/2018

Computer Spying. Does Recording Conversations Kill Free Speech?

Craig Peterson: [00:00:00] Hi, Craig Peterson here. I don't know. Did that get political, this morning? I guess you'll have to decide. I don't think every discussion where people disagree is political, right. You could agree or disagree with me on economics. You could agree or disagree with me on policing strategies. Does that mean that it is political? I don't think so. I think we've gone far too far on the political realm. This morning when I was talking to Matt, it was interesting because he was asking about technology and some of its effects here. And I took all of that and I really ran with it this morning. So, there were a couple of quick, one actually kind of quick question before that where Ken Altshuler was asking a little bit about the computer spying on us. So, I did talk a little bit about that at first but then, Matt Gagnon and I talked about a subject that is going to change the world. Has changed the world. Does that make it political? Am I wrong for having brought this up, or what do you think? Let me know 8 5 5 3 8 5. Fifty-five fifty-three. Am I wrong doing this, right? So, many people, you know I get fed up, when you get Hollywood or you get musicians out there with political stands and there are obviously political, right. You're going out against President Obama or President Trump, and you're just slamming them for things that are where there is nothing to it. That's political. Where is that line? This is a really interesting problem, and something obviously I'd thought about because I was able to respond to Matt and I love to know what to think. Anyhow here we go this morning with Ken Alschuler and Matt Gagnon then up in Maine on WGAN a.m. 560 and FM 1 0 5 5 and I guess there's a couple of repeaters as well. Anyhow here we go. Thanks, for listening. 

[00:02:12] It's that time again. It is a Wednesday at 738 which means Craig Peterson is joining us, as he typically does. Give us an eye on technology, Sir. How are you this morning?

[00:02:20] Hey, that's me, doing good.

[00:02:23] So, I'm sitting here working on my laptop and sometimes it's a little light up, on the top and I keep thinking somebody is looking at me. Am I just being paranoid? 

[00:02:34] Braggers, somebody play that somebody still looking at me. 

[00:02:39] Well, in your case, yes, your just being paranoid. Who would want to? Exactly, yeah spying on computers is a problem.

[00:02:47] You guys remember the L.A. Unified School District and the problem they had with their laptops. 

[00:02:54] I actually do not. No, what was it? 

[00:02:57] Ok. Well, it turned out that the laptops were issued by the school district two students had spyware on them and some of the young ladies would have their laptops open in their bedrooms, while they were getting changed et cetera. And apparently, some of the IT people in the L.A. Unified School District decided that it might be kind of fun to watch. And that's kind of the long and short of it. That happened maybe what now a couple of years ago, and the whole thing obviously backfired, and I think they pulled back all of these laptops. But, Ken it's not unreasonable to be concerned about that. You've got the actual spying where you're talking about a camera that might be on. And, even though the computer has a little light that comes on when the camera is activated, that's not 100 percent positive indication that light that the camera is in use or is not in use. In other words, there are ways particularly with Windows computers, not so much with Macs. There are ways to have the camera active, but not have a light on. And, we're not going to go into details here but it is a concern. There is a lot of people that are concerned about it. The employers may be spying on them while we were at work or in the case of an L.A. County unified. Maybe these school district people spying on the kids while they had their computers at home. Now, in both cases usually what you end up seeing, is people are are saying, hey listen we're just trying to track these laptops so, we know where they are. So, they don't get stolen. But, there are some real privacy concerns there.

[00:04:45] So, there's a great article that I found on Popular Science that posted it up on my Web site, that talks about how to secure your systems, not just from the camera watching you but all of the software that might be on your computer that might be spying on you. Because we know we've got more and more activity by the Chinese the Russians the North Koreans and others to try and get into our computer. So, this article goes through and talks about the layers of security that you have to have. Bottom line, this is not the world that was even just five years ago. Things are getting more complicated. You and I are getting caught in the crossfire, between these countries that are out there trying to come after the United States, and just having an anti-virus isn't enough. So, this article goes through talks about some of the different layers of software you should have, A it gives you some links so you can buy some of the software. But bottom line, if you're a home user it's going to cost you two to three maybe four hundred dollars a year for the software, that you should have on your computer. Now, that's a huge jump from you know where we were before where you were using free anti-virus although it does have a link to some free antivirus software. There's more to it than that. And if you're a business you should be spending about a hundred fifty dollars, a month on software and services to keep your computers up to date and to keep them secure. It's a much, much, different world out there, Ken.

[00:06:26] Craig Peterson, our tech guru, joins us at this time every Wednesday to give us an eye on technology. So, Craig, I'm going to go a little rogue here and I'm going to ask you about Omarosa because I'm not sure if this is even a question, Craig but I just want to talk about it. So, she's recording, secretly people in the White House, not just the president, but you know aides, who are having certain discussions and she's clearly you know running around just trying to get as much leverage as possible, in the event she got fired, which she did. It's kind of weird new world we live in, isn't it? I mean you know I have an app on my phone. I almost never use it. But just in case I have an app on my phone, that will record my phone calls, right. So, that I can have that kind of thing recorded. Usually, I would use it for something, I want to keep notes or something but, I mean I can absolutely see that being you know almost a weapon when you call somebody up in hope that they say something crazy, that you can then have on recording and then use it against them later. Then you know you can have a pen that has a recording device on it, you can have you know any number of devices now, that have this type of thing on it. 

[00:07:30] How do we live in a world like this, especially if you live in the White House and work in the White House? And, be secure that anything can ever be, sort of, private, ever. 

[00:07:43] Matt, That's is a good question right? We just had the governor on, you know you've got senators on, you've got all kinds of people on the radio, when you're calling into a radio station, There is a basic assumption you are being recorded, but you're right the rest of your life isn't. And we mentioned that whole two-party consent thing before on the show, I think it was even last week, there's 15 states in the country. I think it is about 15, that have two-party consent laws, which means you can not record the other party if they are in a two party consent state. Now, let's get to an interesting way to look at it. For instance, Washington D.C. is a single party consent for that district area, which means that all would have to happen as one person says I'm going to record this conversation by themselves and they start recording, and it's all legal. But let's say Omarosa is there in Washington D.C. and the President is in Florida. Well, Florida is a two party consent state. So, what happens to them is she has committed under Florida law a felony by recording the president. 

[00:08:57] So, if he was calling her from the golf course in Mar Lago or something. Yeah, yeah, yeah, exactly.

[00:09:03] She's in serious trouble if that was the case. But what we're talking about is a little higher level than that. You know Omarosa, he brought her into the White House. I was a huge fan of The Apprentice. It was just so much fun. It was fascinating seeing how they approach marketing problems and things, right. She was the villain on The Apprentice. And, from what I've heard on these tapes you know I think the White House is certainly just fine. They're in the clear. But I don't know that Matt. What do you do? You could potentially have a device that is set up to make sure there's nothing around you electronic, you could go that far. There are some devices that are out there. There is a case for your phone for your iPhone and that iPhone case monitors what your iPhone is doing as far as the broadcast goes, or the electronic sounds, if you will coming out of it so talking to the data on the cell towers talking to the voice on the cell towers. So, you know hey listen wait a minute, there's something going on with my phone but Matt you can't be certain anymore. Now, you have to be careful and you know what that's going to do. This is the same problem we have with the fascist movement. Where you have fascists out on the street beating people who disagree with them. And, that is people just are watching what they're saying and that means you can't have an honest discussion. You and I cannot disagree on some subject. 

[00:10:42] You can never I can never risk saying something offensive anymore so everybody's so guarded that nobody's actually exploring any issues, anymore. Nobody's, actually getting into depth on anything. 

[00:10:52] Yeah, the opposite is what we need right. Exactly. We need we need to protect the type of speech that offends us more than any other type of speech. And when we're talking about one party or two party consent laws and states under the federal government any federal agency it's always considered to be one party so they can prosecute in the federal system with one party. So, what can happen is the police are investigating. They've got an informant they say Mr. informant, I want to call up your drug supplier and let's get them on tape. So, the feds can do that in any state. However, in a two-party consent state, they can use that, in court, if it goes down to the state courts. Law enforcement prefers a single party because they really don't have to get much permission when it comes to recording. You know my feeling on this I think that in the performance of their public duties that officers, you know police officers all the way down through town clerk et cetera, it should be legal to record them. But, in this day and age shouldn't you should assume you are being recorded, right. How many times have we seen a news broadcast, and there's 50 people with their iPhone and Android smartphones up videotaping something that's going on? Even in a two-party consent state. That has to be the assumption, and I don't know what to do.  It's bad, it's not good. I think, frankly, to have a single party consent in most cases I think both parties should consent. And, I think we've got to stop saying all speech is political because it's not. We have to stop beating people with medieval weapons like clubs with nails coming out of them when we disagree with them.

[00:12:51] The left has gone, far too far, and when we're talking about this whole thing, we know when it comes to the right when it's when it's too far. When someone is being racist it's too far. When someone is like David Duke it's too far. But there's very few of those people, and everyone on the right rejects that type of speech. And, we see that every week. When is it too far on the left? When they cross the line? You know the Antifa movement is out there. They're wearing black masks and black clothes et cetera. And, they are shutting down free speech whenever possible. They're breaking windows, cars, setting fires. Is that too far? I don't hear most of the media talking about that. And because they are stopping the free speech we are in a sad, sad, position in this country. So, this I put this all in one bucket Matt because I think it's all very, very related. We're concerned now, about what we say back in the day someone could be yelling the N word all day long and assuming they weren't a rapper. You could reasonably assume that they were racist. Right now the racist can hide. And they do hide and the free speech is certainly still, kind of there. But I think everyone's being careful. You have to watch it. You know you can be a teenager, teenagers do stupid things, right. You're not an adult really until you're well into your 30s, most people. Those stupid things you said, are going to show up when you apply for a job because people the first thing the hiring managers get to do is search for you online. So, this is a huge problem and I don't know where it's going to end up. 

[00:14:44] Matt, Craig Peterson, our tech guru joining us every Wednesday. We'll talk to you next week. 

[00:14:51] Take care gentlemen. Thank you, sir. All right, we're going to a quick break here.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 14, 2018

Do you use Facebook?  Do you want them to have your bank account information?  Listen in as Jim and I talk about what Mark Zuckerberg has in mind for Facebook and you.

Computers watching you? Yes, but good news if you listen in Jim and I will discuss an article that you can use to guide you through the process of protecting your security.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Is anyone spying on your computer? How do you know?

Facebook wants to know your bank balance and track your accounts

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/014/2018

Zuckerberg Wants Your Bank Account Information. Keeping Your Computers Safe From Spying.

Craig Peterson: [00:00:00] Hi, Everybody Craig Peterson here. Today, I spoke with Jim Polito, and we talked about a couple of different things. One that we talked about was how to tell if someone else is spying on you, via your computer. A Really, great article referred to in there and went into some detail about Mark Zuckerberg what he's trying to do in the financial arena. Did you know he's trying to get access to your bank account? Yeah. He's, you know, he's been in trouble. Stock down 20 percent. You saw that right. A couple a few weeks ago. Well, this is his answer to getting more eyeballs on his site, for a longer period every day. So, here we go. 

[00:00:46] He is the man you need at your side to protect you in cyberspace. I am talking about our tech guru Craig Peterson. Good morning, sir. 

[00:00:59] Hey. good morning Jim. Quite the morning. 

[00:01:01] Yeah, it is. A lot of news, lots of stuff going on, but hey, I always turn to you. In times of uncertainty. So, Facebook. wants to look at my bank account. Whoa Whoa well good luck. Good luck there.

[00:01:21] No no no they can't.

[00:01:25] They can look into my but they look into my bank vault. Hello. Hello. Anybody, anybody. Yeah. No, Facebook wants to see our bank accounts. What is this?

[00:01:38] Well, Jim they can handle negative numbers, so. You know they might be a problem, I don't know. 

[00:01:49] You know. I don't know I'm sure you follow this a little bit but, Facebook about two weeks ago had a massive dive. Their stock sank more than 20 percent. And the reason for that was fewer people are using it and, in fact, Facebook CFO came out and said that they're expecting revenue growth rates to continue to decelerate in the second half. So, they're saying hey listen our growth is going to decelerate, the hard numbers are showing their users are leaving, and there's a lot of people that attribute that to the fact that Facebook was spying on people, Right. And, that's a that's a bit of a problem. So, Facebook is presented right now with some really interesting dilemmas. How do they get people to stay on their site? Now, I want you just think back a little bit. Think back five years, maybe ten years to your use of the computer. What was on your home page? I mean when you first run your web browser.

[00:02:50] What site came up? Google.

[00:02:53] Yeah, it would be Google or AltaVista. I'll tell you not yet. Yep yeah yeah. And there were some others out there Yahoo, of course, is kind of a portal, and some people had America Online et cetera. 

[00:03:10] Today, what do people have? Well, when opening the browser I don't know what do you have? What does Danny have? 

[00:03:17] Well, I still have Google here, because I'm going to start searching. I'm going to start doing things. But, other people here who use this same computer if they're login is still here on this computer, in the studio. Guess what some of them it's Twitter. Some of them it's Facebook. They go right there. I mean they don't they don't mess around, they're right there, that's their landing page. 

[00:03:42] And, that's where the value is. Because now you are going to that Facebook page or that Google page, etc.. That's what they want to control. Many people have YouTube now, as their home page, in fact, that trend right now. 

[00:03:59] Does Danny saying he does. Yeah, he as YouTube as his homepage. 

[00:04:05] Exactly. The trends are showing that number one is that Google out there online the number two search engine is YouTube which is owned by Google. And, then, of course, you have facebook etc.. So, right now the top sites are Google and Facebook depending how you want to look at it, Right. But, YouTube is about to pass Facebook. If these trends continue. Wow 

[00:04:30] Mark Zuckerberg, Yeah, they've got a real problem. Ohh Zucky. 

[00:04:38] One of the things Mark is Looking at that is he wants to be involved not just as your home page as to how you start your Internet experience but, he wants to be on the financial side too. So, he's been playing with block technologies. Think of bitcoin, for instance, he wants Facebook to be a currency, as well, that you use online.

[00:05:02] And a step towards that. Now, he has come out and Facebook is saying, hey listen we want to have your bank information. We actually kind of want to be your bank right. 

[00:05:16] Isn't it enough that Jeff Bezos has my bank information. It's true. Is Zuckerberg going to have it too? What does Elon Musk want it now, after him? 

[00:05:27] Well, he's been approaching Amazon, Google and J.P. Morgan Chase, Bank of America, and others and he's saying hey listen we want to move the financial services from the ATMs to Facebook. And, of course, Facebook could make more money in the process. People would spend more time there. They could send the money through Facebook, they could pay their bills. The bills would come right into Facebook, so, Facebook would become essentially the clearinghouse even more than an ATM. Now everybody is still kind of talking with Facebook. The banks are not sure if they want to do this. Bank of America has said forget about it. It's not going to happen. But, that's the next step for Facebook, if Zuckerberg gets his way. 

[00:06:15] Wow. Makes sense. Taking over the world. We're talking with Craig Peterson, our tech guru, and at the end of this segment we're going to give you a phone number and if you text my name Craig we'll get you this information with a lot more detail and a lot of other information and he will not annoy you. He will not try to sell you things. It's all just good information helping you too, to not be so alone in the in the outer space that is cyberspace. All right I want to get quickly to the computer. 

[00:06:45] I'm looking at it, but it's looking back at me. Whose in control of that. 

[00:06:53] And, yes we do we know about the L.A. County, the L.A. Unified School District, and how they were spying on girls getting dressed in their bedrooms because they had their laptops open. We know that can happen, and in that case, they have specifically installed, kind of like spyware on your on their computers. Now, there are ways to stop this. I've got a great article up on my site. And, I've been thinking maybe it's time to do another webinar, where we walk people through how to do this themselves. I've got a great article on my site from popular science where they go through and talk about it. It's no longer good enough to have an antivirus, right. McAfee himself, John McAfee the founder of McAfee, which of course makes hantavirus products said, McAfee, is the worst thing for viruses we have. We have Nortons Symantec, saying essentially the same thing. Right. You can't just have one anymore. It has to be layered. It has to be like an onion or maybe an ogre if you're familiar with Mike Myers movie, and you have to have all these layers. So this goes through it, you know, including things like AVG free maybe Windows Defender or malware bytes, Avast. There's a lot of them out there, spy search and destroy. It is no longer enough, to just sit there with an anti-virus product. We have we have another business client we just picked up, Jim. And it was just absolutely insane and this client called us after they had already lost 180 thousand dollars to a business. 

[00:08:42] E-mails compromise OK. 

[00:08:45] And, I would love it if we could stop it right. Great to come in after the fact and clean up, I can charge more. Right. Right. You know do it right the first time. Some of the software I'm talking about costs here's a few bucks. OK. It has this is popular science that has links to buy these things. But you know for an average business, to have everything you need including all of your software updates all the stuff that makes sense. You know, it's going to cost you north of 100 maybe 150 dollars a month per computer to do it right. And if you don't do it right, I can tell you a horror story after horror story. It's not enough to have anti-virus, anymore. And that's true for home users, so if your home user. Have a look at this article from my site. If you're a business user. Have a look at this article from my site. And remember this is not good enough. You've got more money at risk and more liability because in the Commonwealth you could really get in deep trouble with fines, and in some cases, even jail time. If any personally identifiable information gets out. gets out. 

[00:09:57] It's a big deal. That is a big deal and it's great that we have you on our side folks, Craig Peterson will provide you with this information. And again he's not going to try and sell anything to you. And, if there's ever a big crisis like a hack or breach. He gets notice out to people and tells them what to do. So, if you text my name, to this number 

[00:10:19] 8 5 5 3 8 5 55 53 that's 8 5 5 3 8 5 fifty five fifty three. He will send you this information in more. Standard data and text rates apply. 

[00:10:33] Fantastic. Craig, always a pleasure to have your expertise. 

[00:10:38] Hey thanks, Jim. Take care.

[00:10:39] You too. Bye-bye. When we return a final word Thursday's.

[00:10:44] Now for those that are interested if you want to reach out to me. Find out more about how to secure your business or maybe you want me to do another one of those free webinars, kind of walking through it. Let me know. Just text me again that same number 8 5 5 3 8 5 55 53. That really is my number. This is one of those services. And let me know. Thanks. Take care. Have a great day. We'll be back tomorrow bye-bye.

 ---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 13, 2018

 

Did you have a Lava Lamp when you were younger?  Listen in as Jack and I discuss how those crazy devices are providing high tech security.

Do you wear a fit bit or other fitness tracker?  Today Jack and I discuss some of the reason that the Military is putting a kobash on their use.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles

Fitness trackers are dangerous. You know that, right? Finally, the Pentagon woke to the dangers and restricts the use of fitness trackers, other devices

Lava lamps as a cryptographically secure source? How a bunch of lava lamps protect sites from hackers

 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/13/2018

Military Dangers of Fitness Trackers. Lava Lamps for High Tech Security

Craig Peterson[00:00:00] Hey, Good Morning to everybody out there. Craig Peterson here. We've got a couple of things that we talked about this morning with Jack Heath. One is the dangers of fitness trackers. Yes indeed, these things are dangerous, particularly, if there might be a predator after you. And we talked about the comeback of lava lamps. How lava lamps are being used for security. Who knew that it was such a high tech thing. I love those. I got to get them to get a lava lamp here. Those things are so cool. All right. So, here we go with Jack Heath covering what today most of New Hampshire and parts of Maine and Vermont and Mass and it's fun I enjoy being on with Jack even though it's usually a quick hit. As we bring in Craig Peterson, our tech talk guy on Monday morning Craig's show airs on Saturdays on the weekends here.

[00:00:51] Craig joins us now to us finds Craig. It's not really, I guess it's, I don't call it high, high, tech but have heard about in Southern California Have you ever heard of these bird electric scooters. There all kind of skateboard scooters. have you seen these things? No, I haven't. So, they just kind of like motorized little scooters, basically not like a motorcycle be kind of stand on it and it's electric cars about 10-15 mph. For whatever reason but why are you surprised, because it's southern California. People who don't like him anymore. Basically, throwing them out in public places and even throwing them into the ocean or burning them. Because that's what you do if you live in Southern California, I guess. If you've had enough of the bird scooter. I'm looking it up right now online.

[00:01:35] But yeah that's dangerous, isn't it?

[00:01:38] Not only for the "I love the big call for the environment" and they throw them into the ocean. OK. What else is what's going on in the high tech world. 

[00:01:49] This is really something that. I'll have to look at this. Oh, we've got a few things that are kind of funny. One is a flashback and, of course, here remember lava lamps, Right.

[00:01:58] So, David has one. David's using words like, Swell, in his traffic reports, he's going retro. These things are very cool.

[00:02:07] You know the 60s and 70s, I remember them I always wanted one. They had a bit of resurgence here in the 90s. One of the problems that we have in the computer world is, how do you generate truly random numbers? Because, computers, of course, are kind of running in lockstep and it's it's hard to generate random numbers and we need these random numbers in order to keep things secure. Because what we're doing, Jack, is we are using them to do public key exchanges in order to keep things safe. So, every time you go to a Web site and it's a secure site there are these massive random numbers that are used, in order to keep that session secure. So, because computers aren't great at this, what's happened is one of these computer companies that do some of the security out there CloudFlare has decided that they are going to use a special kind of random number generator. They have 100 Lava lamps that are sitting there in the foyer. And these things are completely unpredictable. You've got the oil, water, wax moving around in them and so they have a camera watching these 100 lava lamps and how they're moving randomly and they're using that in order to secure the websites help to secure the internet. Who thought lava lamps would be used for some of this high tech security. I thought that was pretty cool.

[00:03:38] Yeah, well you know everything comes around, right. Everything you know just when you think have it's gone it will make a comeback right back to you. 

[00:03:48] What else is going on?

[00:03:50] Well, get the big thing I've talked about a few years ago that these fitness trackers. We had some bad guys down in New York City in Central Park who were putting out receivers on trees and so they were using these because the fitness trackers are broadcasting our phones are pinging and being pinged. So, they were using these little receivers they put up on trees to track women, where they were running in the park. And when they were running in the park and the whole idea behind it was to assault specific women. They could track them. Well fast forward a couple of years and we started having even more questions. You know we've got something called heat maps that are showing a lot of activity in different areas and many people are using these fitness trackers to compete with other people. So, you can keep track of your run, how fast you're going, where you went. Hey, I went ran the same area faster than you did, even though you don't even have to run together. It's just all recorded and compared on the Internet. So, problem have now and I checked this out myself. Is that you can go to some of these Web sites, see where people are running, where most people are running, and you can see where our military personnel are running the perimeter of the bases, of airstrips of some of the towns there are in, including secret bases overseas all because of the use of fitness trackers. They have to GPS whether or not it's a device on your wrist or on your phone. And now the Pentagon has finally started restricting the use of these fitness trackers. Because some of our secret bases have been revealed, again. You know the technology not quite thinking it at all way through. Thank goodness, now the Department of Defense has kind of wised up to this stuff.

[00:05:50] All right good stuff Craig, on a Monday morning make us think about that on the fitness side in terms of who's seeing what. Thank you, Craig.

[00:05:57] Thanks, Jack. Bye-bye.

[00:05:59] All right another top college.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 11, 2018

 

Have you heard of random number generation?  Well, listen in today as I tell you about the unique method that the company CloudFlare is using.

The military finally sees my point of view on Fitness trackers. If you have been listening for a while you will know that I discussed this a year or two ago, but just recently the Military has begun to agree with me and has now recommended judicious use on bases.

Would you trust Facebook with your financial information?  Listen in as I explain what Mark Zuckerberg wants banks to do?

What is the effect of social media on our kids?  Listen in as I discuss some of the latest research on this subject.

Are your suppliers serious about their security? Today, I will tell you about what can and did happen to a company and what it could mean to you.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/011/2018

Lava Lamp Security. Fitness Trackers. Social Media and Mentality. Two Factor Authentication.

Craig Peterson: [00:00:00] Hey, Good Morning, everybody. Everyone is listening around the world its really kind of cool to see some of these stats. We've got people in Ireland, of course, the U.K., in France, and Belgium, and Canada. Just really all over the world, Australia and Russia, it's very cool. So, welcome, of course. this is Craig Peterson. We've got a lot of stuff to talk about today. One of the things I think is so cool we're going to talk about is lava lamps, and you might be asking yourself what does that have to do with technology? Isn't that from like the 60s or 70s? This is very, very, cool what's happening with lava lamps. One of the world's top security companies says social media is giving children the mentality of 3-year-olds, and it isn't just kids that are having these problems. Facebook is trying to expand, and part of that expansion is trying to find out what your bank balance is. The Pentagon. This is so long overdue, they are finally restricting the use of fitness trackers and we'll tell you why these two-step or two-factor authentication schemes have some major major holes. If they're using your cell phone, we'll tell you why, and how you can get around that, and keep your bank and other information secure from places, not just Facebook. Computer viruses, yes they do cause major problems and they've just hit one of the big companies when it comes to tech. And that is Apple. We'll tell you how Apple is affected by this massive virus, and how to make sure no one is spying on your computer.

[00:01:40] If that's of interest to you, or if any of these articles are, you can text me right now I'll send you a link to them. My Number 8 5 5 3 8 5 55 53. That's 8 5 5 3 8 5. Fifty-five fifty-three. Let me know what articles are of interest to you. We will send you a link to that. And this one, making sure people aren't spying on your computer actually has links directly to some of the software. So, here we go stick around. We're going to spend a little time on this lava lamp thing because I think this is absolutely phenomenal. There are a number of companies out there, of course, and their only purpose in life is to help you in business and government with security. And that's something I've been doing for almost 20 years. Of course, for my business clients is really making sure their networks and computers are safe secure and working, Right. You don't want to put in some massive security system and not be able to get your work done, Right. Putting everything in a vault - is that really going to fix your problem and turn off the power. No, no, it's not. So, we have to walk this line between security that is functional and useful and security that is just going to get in your way so much that people are going to resent it and not use it. Just like last week I was on the radio, and with Matt Gagnon and Ken Altshuler.

[00:03:12] But, anyways with Matt and I explained some of the major problems that are happening right now with smart TVs. These smart TVs are using Android and I explained why it's a problem, what they're doing, how they're watching us, monitoring us how bad guys are using the information. And he shrugged his shoulders well whatever I don't care. I'm still going to use my android stuff. And, I just had to shake my head. Now I understand that some are, just so useful. And, in fact, for the first time ever I have an Amazon Echo in my house and I've never had one before. There have been major security problems but this tech has been out there now for a couple of years. They've gotten rid of some of the problems. Locally the machines figure out when you're calling their name their wakeup word that I am not going to use right now. But for Amazon or Apple et cetera. So, it isn't streaming up to the cloud like they did when they first came out. Now Apple didn't do that. But we're not going to get into any of those details right now. So, that's been a major security problem for me. And now that problem solved I have it in the house and I am finding it just to be amazing, really useful, really fun. And bottom line, I'm so glad I did it. You know I got this little Amazon Echo and it's unfortunate, that Apple's fallen behind Amazon is beating them like crazy, like a rented mule, right. 

[00:04:41] Amazon's beating Apple because the Apple stuff is more expensive, it's harder to tie in. Amazon, now from your Echo you can control basically anything in your home. There's devices that attach into it. It's just phenomenal what they've been able to do. They've made it extremely useful and the price point is fantastic. In fact a bit of a side note. A study came out that said basically Amazon can give these Amazon Echo devices out for free, and still make money, because the average person that has these things is spending over 400 dollars a year with them on Amazon. And you can use them also to order things, it just makes life so much simpler for you. So, you know problems, problems, problems, but it's all security related. We have to watch what's going out from our homes, from our offices, what's coming in, and how do you do that. Well, this one particular company called CloudFlare does it with lava lamps. Now you remember these things. There is a guy from Britain who came up with them and what was his name. Edward Walker, I think Edward Craven Walker that is it. So his lava lamp made it into the late nineties cultural comeback but he didn't see what happens now because inside the San Francisco offices of Cloudflare they have 100 lava lamps on shelves. So, there the right on top of each other shelves. It's really kind of cool. And of course the lava lamp. Think about what's in it there you've got I think it's oil and water and wax and it heats up and it swirls randomly and it's really kind of peaceful to look at. 

[00:06:24] I've always enjoyed lava lamps. Make a nice little present. I had one or two more recently that ended up breaking and I didn't have. Remember they used to have a light bulb underneath them and that's what was used to heat it up. Nowadays, they're not used in the light bulbs but if you think about the patterns in the lava lamps, they are continually changing they're continually morphing. And when the light comes in from the outside window and heats up or the temperature in the room rises or drops these are all factors that influence what that lava lamp is going to do. What the wax inside and that's what you're typically looking at is going to do. So, they figured at CloudFlare. How about we just put hundred of these things up and get them running. We'll put them in the lobby and then we will put cameras, shoot video of these lava lamps and use that as kind of a random number generator because random numbers are pretty darn hard to generate just in general. So, you can use things you can use background radiation and that's been used for a long time it is really, rather random. We can't predict any of that type of radiation, the background radiation. But they figured this is probably just as good maybe even better. So, they are watching these things. 

[00:07:48] Any change in the video, causes a change in the random number generation, and what used to maneuver or manipulate, it is called a salt and it uses all of that. So, if you're walking in their lobby you're part of that randomization if the sun's coming in as part of the randomization. 

[00:08:10] Now, they've taken a couple more things that aren't there in that lobby so, it can't really be hacked and can't be predicted. But it is really, really, cool because there's never twice the same scene. It's virtually impossible, statistically impossible with 100 of these things running so, really kind of cool and it's super-powered way to generate these cryptographic keys. I'm just, I'm tickled pink because it's just such a real cool way of doing it. OK. Next, here we're going to talk about kids and social media. Now, what we know about kids, right. We've we've been kids, were around kids some of us have kids, grandkids and kids like to play with things. When I was young we used to go outside, and we'd get kicked out of the house if we were in the house. We'd have to go outside and we'd play and we'd have just a gas. And in the summer living up in Canada up north up, in Canada, it would barely get dark at night. And so we'd be out playing. I remember kicking the can, I've shared this story before at about 10 o'clock at night 10:00 11:00 o'clock and we think it's just Twilight it's starting to get dark and probably should think about going home and my mom coming out and finding us and getting upset because we were out so late. 

[00:09:34] Well, I didn't have a watch. Did you expect for me, right? Well, kids love social media. They love playing video games and when we're talking about kids here we're not just talking about really young kids. I know a lot of 30-year-olds that play a lot of video games, and to me, that's such a waste of time. But anyways, that's me right. I'm a much older generation. Well, there's an interesting thing that came out this week in The Daily Telegraph over in the U.K. where Baroness Susan Greenfield. Now, she's the former director of the Royal Institute of Great Britain, said that social media and video games have left children unable to communicate with one another and unable to think for themselves. Children who have been raised around these devices, much worse than when we were raised, and we had some TV, right that we were plopped in front of. But, these kids are constantly looking for something to distract from and she's predicting that and "here's a quote "I predict that people are going to be like 3-year-olds, emotional risk-taking, poor social skills, weak self-identity, and short attention spans." Now, that's really something since.

[00:10:52] Look at her background here. She's a senior research fellow at the University of Oxford. She has supported her claims by looking at a study that was conducted by psychologists a few years ago at Virginia and Harvard Universities. She found that students are she didn't But, these studies found that students who would prefer to give themselves an electric shock, they'd prefer to give themselves an electric shock than to be left alone to think without distraction for 10 minutes. That's just crazy. She went on to say and this is an interesting article. Daily Telegraph they require a subscription. But, the study says. According to Her, people need a constant stimulation from their environment. Every single moment that implies they are no longer able to be left to contemplate their own thoughts. And that's something I've had to do many times, right. Think about your thoughts. There's a digital detox expert also out there she's the author of Stop staring at screens and her name is Tanya Goodin and she's claiming that reducing the use of digital devices can offer significant benefits to children. I could not agree more with Baroness Greenfield she tells the independent. A study from UCLA found that children who had all digital devices removed from them for a week were better able to read nonverbal communication and others than a group of children who carried on using screens.

[00:12:19] And so think about this when you thinking about your kids or grandkids or maybe even yourself. This is a real problem. What's the first thing you do in the morning, right? How many times have we heard this test? The first thing you do in the morning. The last thing you do at night if it has anything to do with touching your smart device there is a problem and we've got to deal with that problem.  As humans, we've got to deal with each other. Now many people are saying while over time we're just going to have our brains hardwired directly into some of these machines, we're not going to have to communicate with other people, we're not going to really have to think for ourselves. I don't buy any of that. People buy things from people, and you have to understand people, you have to have relationships with people, you have to have a relationship in order to build a family, have a family, right. We've got to watch this and we've got to watch it with our kids. All right let's talk about Mark Zuckerberg and what he's up to here? what does this all about? He wants to know our bank balances. Wow. 

[00:13:28] Well, we know Mark Zuckerberg has been out there trying to make money.

[00:13:31] You saw a couple of weeks ago a massive plunge in the market value of Facebook, their stock went down. What was it 20 percent or so? Really, really big. And Facebook has announced that they expect over the foreseeable future. Bottom line here that they are going to continue to lose eyeballs, so people are starting to leave Facebook. They're not paying as much attention to it. And I think that really when you get right down to it they've done it to themselves in so many ways and started complaining a couple of years ago when they made a massive change to their programs, where the programs were at that point, starting to not show you articles from people you follow even though you wanted to see what they had to say. And frankly, it's just gotten worse and worse. So, I would expect just like every other big company Facebook's finally going to fall out of favor here, at some point. So, they've also struggled with some concerns about data privacy. You certainly heard about that, and what happened when he had to testify in front of Congress. We also know what happened with the Obama campaign getting the information on pretty much every user in the world. But, certainly, the Obama campaign from Facebook got information on everyone in the United States that was likely voter. And, then how the Trump campaign got some information on tens of thousands. Nowhere, near what Obama's campaign had. But by that time people were sensitized to it, right. 

[00:15:06] Obama didn't get any criticism for it. But I think that even though he did a much much worse thing people just weren't paying attention, much worse than what Trump had done in the 2016 election campaign. So, now people are sensitized to it we don't want it to happen again. And, yet there are some other articles in the news this week, who won't be really touching on but they are talking about how Facebook is having major problems trying to identify, who it is that is putting out these fake news, and ads out on their Web site trying to influence campaigns. Now, used to be pretty easy you'd look at an ad and the wording would be bad, the grammar would be bad, There might even be spelling mistakes, and you say this is this is obviously fake. Now, they're going to regular U.S. based Web sites and just stealing the copy from those putting them into the ads. I don't think things are going to improve much in the 2018 or 2020 cycles, because the bad guys are just getting better at hiding, and you know where they are, and what they're doing. When we're looking at Facebook it has become entrenched. Many of us are paying a lot of attention to it. I am involved in a few different groups on Facebook and we're helping each other out with things and I help people with security problems and stuff. In fact, I had a closed group that really I know we had about almost 300 odd people in it.

[00:16:33] And I just plain didn't use it. So, I shut the group down and maybe we'll bring it back to life at some point. But what we're talking about right now is Facebook, and where they want to go, because Facebook has warned analysts that active users could decline, the number of active users could decline and the amount of time they're using it for the foreseeable future. And they also came out with another announcement which was Facebook is planning on tying into your bank accounts. And even though they lost 20 percent in one day from the first problem, the second announcement drove shares up about four and a half percent. So, they approached apparently some large banks, Bank of America said forget about it. We don't want it. We don't want to have anything to do with this. Other banks are taking a kind of a wait and see type of an attitude which I think is a really good way to do it. Facebook is saying we want to integrate your bank accounts into messenger so that you can check your bank account balances. You can send money to receive money. They really want to be in that financial business. Now we talked about that before and how Facebook has been experimenting with blockchain technology, in an attempt to do a few things, solve a few problems, one of which is they want to be involved in every transaction. And one of the things they're asking the banks for is what are you buying.

[00:18:06] So, if you have a credit card, a bank account, checking account whatever you're using to buy things they want to know everything you're buying so, that they can offer you ads for that category of stuff. Do you want Facebook to have that? We've already got privacy concerns with Facebook, right, Do you know about those. Those have been high in the news we know about hackers trying to get into all the systems out there. Do we really want another area of exposure? You know I I really don't know. OK, fitness trackers why you may not want to use one. And finally, why the Pentagon has finally come out and said, No. We talked about this a year maybe two years ago. You know we have people using the fitness trackers that they're really kind of cool. And they have GPS built into them. Some of them some of them use your cell phone to get the GPS so you can track your runs, right. That makes sense. Easy to do. It's kind of fun to do. You can compete with other people. So, hey I did that same run as you did. I did it faster. You can keep track of how much exercise that you've had how far you even walk to right there not necessarily only for running, but here's the problem. We have had cases, for instance, down in New York City down in Central Park where the bad guys, in this case, potential rapists and others, have been tracking the movement of cell phones and the movement of fitness trackers. 

[00:19:48] So, they know who was running by a tree, for instance, So, they'll have the little receiver up there listening for the Bluetooth signature or the Beacon or the Wi-Fi signature or the beacon. And, that's obviously a real problem. That's a problem I think everyone should be concerned about if you're using the fitness trackers. Well, there's another one the military has, that we talked about well over a year ago, and that is some of these fitness trackers are uploading all of your data all of your runs to a Web site up on the cloud. Now, that's kind of interesting, right. So, you can see a global heat map I pulled it up I shared it with you guys a year or more ago. It's published by the GPS tracking company called Strava. S T R A V A and they use the satellite information that they're getting from these fitness tracker companies, in order to track where you. So, heavily populated areas are going to be well lit. But, when we're talking about the war zones like Iraq or Syria they're showing scattered pockets of activity, which could denote military bases or government personnel using fitness trackers, as they're moving around because the locals there are not using them. So, it's a reasonable assumption. And, so I use that data you can go into the heat map yourself and have a look at it and I was able to see circles right on Oval's really running along airstrips at air bases, running around the perimeter of bases, on the inside walls or even outside the walls. 

[00:21:29] So, you could see where the military personnel were. Now, we have some secret bases and those secret bases were outlined, as well by this GPS information from these heat maps. So, the Pentagon has come out now with a policy, finally, that was obtained by The Associated Press and it stopped short of banning fitness trackers or these other electronic devices that can be linked to cell phone apps that can do the exact same thing. But, it didn't ban them but it did say these devices presented a significant risk to military personnel. So, those capabilities must be turned off in certain operational areas. So, under this new order, the military leaders in different areas have the ability to use their discretion to figure out whether or not troops under their command can and should to use GPS function on their devices. And, that's obviously going to be based on the security threat in those areas are on that base. Good. Good article. Interesting article a lot of different opinions out there. Well, we're not going to be able to get to the two-factor authentication stuff and how texting you a login code, just isn't enough. We're not going to be able to cover this computer virus that's crippled iPhone chip maker out there. The big guy the number, one contract manufacturer of chips in the world. 

[00:22:51] Yeah, they got a virus right. What would happen to you? I betcha this has hurt the Apple stock, right there. But, you know they got back online because they had the right stuff in place, even though they got infected in the first place. And, then I think maybe the most important article is something you're going to have to read. And this is how to make sure no one is spying on your computer. Great article. You'll find it on my Web site. Craig Peterson dot com or as I mentioned the very beginning if you have any questions at all. Go ahead and text me. You can call, as well, but texting will get through. Phone calls are going to probably end up in voicemail 8 5 5 3 8 5 55 53 I answer all of the questions. We go directly. This is my number 8 5 5 3 8 5 55 53. More than glad to help you out, but this article goes through some of the software that you probably should be using for yourself to protect yourself. And if you'd like me to put together a special little master class on that I'd be glad to do that. We've done them before free webinars. Let me know more than glad to do one for you guys who are listening, right now. But you have to let me know you'd like to see it and then I'm more than glad to spend a few hours in putting it together and online with you.

[00:24:15] I think actually the last webinar, took me out a week to put together. But let me know 8 5 5 3 8 5 55 53. Have a great week and we will be back with you again next week. And, usually Monday Tuesdays and Wednesdays I release a podcast as well so keep an eye out for that. Craig Peterson dot com slash iTunes or just search for me in iTunes or SoundCloud or wherever you get your podcast. Take care. Bye-bye. 

 ---

Related articles:

Is anyone spying on your computer? How do you know?

Fitness trackers are dangerous. You know that, right? Finally, the Pentagon woke to the dangers and restricts the use of fitness trackers, other devices

Do websites send you a text message to verify it’s you logging in? Well text authentication isn’t enough to keep your accounts secure

Facebook wants to know your bank balance and track your accounts

Social media is giving children mentality of three-year-olds, warns researcher

Lava lamps as a cryptographically secure source? How a bunch of lava lamps protect sites from hackers

Could your business’ suppliers lack of security cripple your business? Apple just found out…

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 8, 2018

 

The whole world can be watching you while you watch on your Smart TV or while you are on your way home on an Uber ride. Are they allowed to do this, and how do we know if we are being recorded?

Find out more on CraigPeterson.com

---

Related Articles:

How to Stop Your Smart TV From Tracking What You Watch

Ridesharing live streams on Twitch raise privacy worries (update: Uber cuts access)

Russian Hackers May Have Penetrated US Electricity Network and Could Turn Off Power, Officials Say
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/08/2018

Uber Privacy - Smart TV Surprises - Russian Grid Hacking

 

Craig Peterson: [00:00:00] Hi guys. Craig Peterson here I was talking with some Maine as this morning up in Maine. Actually the stations cover mostly southern Maine but I guess are some repeaters that go up to the center of the state. So if you're listening from Maine here to my podcast send me a shout on shambled. I'd love to know how far north it ends up going. So this morning I spoke with Ken and Matt we talked about Uber and the problem with drivers videotaping you while you are in your uber smart TVs some of the problems behind those and a couple of things more included something I think they found very surprised. I think you will too and it will change the way you look at some of the technology out there. So here we go.

 

Matt Gagnon: [00:00:46] We're back again and this time on a Wednesday 738 means it's time to talk to Craig Peterson our tech guru joins us now. Craig are you okay. Good morning. Doing good. How are you guys.

 

Ken Altschuler: [00:00:57] No complaints at all you know every day we talk about the Russians the Russians turn off our electricity now.

 

Craig Peterson: [00:01:05] Oh man maybe that's what happened last year. My father went out of my house and storms. Did you guys have that boy crazy last night. Yeah. All of this is from a story from the Wall Street Journal here last week. And what they're saying is that yes indeed apparently hundreds of rhetoric's station. You know these guys that control the grids the various grid points have been hacked by the Russians and it's kind of interesting when you look at it and look at what's happening right now with Iran and the potential of them trying to hack cash and what are they trying to do. What's the ultimate goal and obviously the goal is kind of similar to what they were doing during the election that is just really kind of confuse everybody and everything that's going on. But they could shut down our power grid and we've seen problems with that before. But I've got some good news here gentlemen that is you first of all you know I work with the FBI the infrared guard program I run their webinars. And the good news is that our power grid nationally is improving their security quite substantially. There's been a big effort in trying to get the Russians out of the grid out of our water supply because we remember those are all computer controlled as well. They're called it controls but really tighten it all up. So hopefully knock on wood we're not going to know that the Russians are coming for us because all of a sudden we all lose power. But I have my strong suspicions that last night it was probably more due to some sort of a storm that might have come by than the Russians.

 

Matt Gagnon: [00:02:53] We're talking to Craig Peterson our tech guru who joins us at this time every Wednesday to talk about the world of technology and Craig I've got a smart TV, am I smart though I don't know how smart it is it might be a little too smart if you know what I'm saying. So is it tracking what I watch and is it telling anybody what it is that I watch?

 

Craig Peterson: [00:03:10] Yeah it's interesting because it's not that it's not just smart in that way a lot of these smart TVs are crazy smart. And when I say crazy smart I think you're about to be very surprised because first of all these smart TV's most of them are running a version of the Android operating system and Matt. You know what I think about Android. I do. OK. They're running a version of Android and they have built into them things like they might have Netflix Hulu etc. and I assume your TV has something like that as well?

 

Matt Gagnon: [00:03:46] He does. Yeah.

 

Craig Peterson: [00:03:48] And the idea is pretty obvious I think to everybody that if you're using your smart TV you've connected to the Internet so that you can stream the programming and the TV monitors that you're on Netflix for instance. And that's kind of a given. Obviously you can know you're on Netflix because it's running Netflix for you right? But these smart TVs are using some specialized software that goes further than that and it can monitor what you're watching on TV. Now it's interesting how it does because these smart TVs can be hooked up to gaming systems and Matt you're of the age. You probably got some sort of an x box or something right?

 

Matt Gagnon: [00:04:30] I do. Mostly for my son. Oh yeah I got time to play video games good.

 

Craig Peterson: [00:04:36] Come on. What was interesting about it is that it monitors not just what channel you're on or what inputs like that but it actually watches what you're watching. So some of these TVs can tell that you're playing as certain video game how long you're playing it for. We talked before about some of this Martini's having cameras built two of them and they have facial recognition software so they can see who's watching the TV. They know what games you're playing up there on the TV and it's used for marketing and you know that it's probably OK. Right. If I'm going to buy a car I don't mind seeing car commercials because I like to figure out what's going on. It's annoying when i get car commercials when I'm not going to buy a car for another ten years. So from that standpoint it's all pretty reasonable from a marketing standpoint. But where it gets really really concerned is you know a week doesn't go by we're not talking about some hack or another. Right. So what happens when our TVs are hacked and they have been hacked and they're hacks going on right now and the TVs have all this information about us and let's say those hackers might want to know when you're on vacation when you're not home when the kids are home alone so that they can come in and burgle your home or even worse we're putting these smart TVs into our businesses into the lobbies into the cafeteria areas and they are being hacked.

 

Craig Peterson: [00:06:11] So the bad guys can watch to see when there's someone there in that building and businesses have been broken into and have things stolen because the hackers knew what was there because of these cameras in them so you might want to opt out of this viewing information service that's on your TVs. They're in. It's in their Samsung. That's in your Sony is algae's videos all of these TVs many others. You can turn them off and even if you have a Roku and external Roku there can be problems. My general advice and what I do is I use Guess what an Apple TV but I also have a Roku on one of my TVs but I use an Apple TV it's the safest. Apple is not selling any of this information. I make sure it's all turned off on my smart TV. And in fact I do not connect the TV to the Internet. So there is no way for it to get hacked and there's no way for that information to get out of it. So if you're if you're really concerned you might want to do what I do and I don't know maybe I'm a little paranoid but I've just seen these hacks happen just too frequently.

 

Matt Gagnon: [00:07:22] You're never going to get me to care about that. I'm going to do it anyway. I'm going to go home today. I'm going to put Netflix on the wall streaming from my phone.

 

Craig Peterson: [00:07:30] Yeah. It's a matter of days it's just so easy to do. Right? But I got to tell you I picked up another client last week a small business. They had two hundred thousand dollars stolen from them and it had to do with this type of stuff where the information is just too easily available and the bad guys found it and used it again. And it's a small business. They don't have a whole lot of money I think they have 10 employees. And the business is probably going to go under. Now this is a guy that 10 in my age and he's been building this business his whole life his businesses his retirement. That's what he's counting on. And now it looks like they're going completely out of business. So you know there are concerns about it but you're right man. You know who's going to make a change. It's just it's so darn convenient.

 

Ken Altschuler: [00:08:23] We're talking to Craig Peterson our tech guru by the way you can go to Craig Peterson dot com. You want to get all his vital information on a newsletter and e-mails and all that kind of stuff. So before we let you go right cheers I'm still a fan of Uber but I don't really have any. I mean people live streaming me when I'm riding in the back of the Uber?

 

Craig Peterson: [00:08:44] Well it's mainly two party consent state. When it comes to recording No I don't I don't remember. OK.

 

Ken Altschuler: [00:08:50] It's just one party. It's one party.

 

Craig Peterson: [00:08:53] So here's the trick. Here's what's been happening Uber drivers many of them have been live streaming because they've they've got their phone up on the dashboard. They're using it in order to get the directions to pick up rides et cetera et cetera. Right. Well some of these guys and gals are also live streaming now. They're saying that it's for their safety. And I can see that right. You're picking up who knows. This is true for taxi drivers as well. Who knows who's getting into the back of your taxi or your Uber. So they're live streaming streaming and then some of these people are using the service called twitch which is designed exactly for that for live streaming and they are going one step further than just having their wife husband significant other whoever it may be wanting for safety purposes. Right. I can kind of understand that. So it's on in the background on some TV in the House and we're making sure everything's OK. Or maybe it's being recorded for playback in case something nasty happens later on. But apparently some of these Uber drivers according to the St. Louis Post Dispatch have been broadcasting hundreds of trips on Twitter Twitter I should say they have now been explicitly obtaining consent from the passengers and they are charging for the Twitter feed. One of these guys is reportedly making 500 bucks a month extra by people paying him to watch the live streams. So this this is a little weird that this is a problem with single party state where only one person has to give consent in order to have a recording occur. I personally think that any public servant in the line of their duty should be recordable even in a two party state. But this is a matter of concern that some of these guys are putting stickers on their window like in Missouri. They are. Most of them have a little sticker saying that this may be monitored for safety for passenger and driver safety but it's announced just a little creepy to me. And you should be aware of it. So don't do anything in the back of the Uber seat. You see that too. Maybe wouldn't want broadcast.

 

Matt Gagnon: [00:11:18] Good advice for all. Thanks. Craig Peterson our tech guru joins us at this time every Wednesday to give us an eye on technology. Craig appreciated again we'll talk to next week.

 

Craig Peterson: [00:11:27] Hey, gentlemen. Take care. Bye bye.

 

Matt Gagnon: [00:11:30] All right. Break time.

 

Craig Peterson: [00:11:31] Hey thanks again to everybody that listens to this podcast. I've got finally everything in place. Almost four for the security packages we've been talking about for the last year. We've been working with some of our vendors with the client to get the business class the authority of business class security together and make it affordable for the small medium business marketplace and we're getting close on that. So make sure you are on my mailing list or you find out about it. We're going to have some free classes on security associated with this and this offer I think is going to be fantastic. Everybody that we've offered it to so far has gone for Solloway it's going to be good. It's going to be great. Well let me tell you it's going to be huge. So make sure you're my mailing list you can find that. Craig Peterson dot com. Have a great day. We will be back on Saturday as we have my weekly radio show when we post on that as well usually goes up Saturday about the same time that the radio show airs. So you can listen to it in the same place listening here which is of course iTunes or SoundCloud or Tune In or almost anywhere except I heart. I don't get that. I Heart Radio stations and they still don't have me on their streams. Anyhow, have a great day. Talk to you later. Bye bye.

 ---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 7, 2018

Do you know your SmartTV is tracking what you're watching and the video games that you play as well?

Learn more about how to stop this from happening from Craig as he speaks with Jim Polito about SmartTVs, the Russians hacking our power grid, and how he is finally able to sit on his back patio and enjoy it.

Find out more on CraigPeterson.com

---

Related Articles:

How to Stop Your Smart TV From Tracking What You Watch

Russian Hackers May Have Penetrated US Electricity Network and Could Turn Off Power, Officials Say

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/07/2018

How To Keep Mosquitoes At Bay - Russian Hackers In Our Power Grid - Stop SmartTV Tracking

 

Craig Peterson: [00:00:00] Hey good morning everybody. Getting ready to do my rest of my day today. It's been a real fun time lately. You know shutting down some of the bad guys I guess. I guess I shouldn't be happy about that but I am. I love it because all of these poor people write these business people who've been building their businesses their life savings tied up in it and they get stole and being able to help them out in fact we've got a new client that's an attorney who's hired us for an insurance company because a company did fall prey to one of these hacks while in this case it was a business email compromise and about hundred thousand dollars in cash was stolen. It's absolutely incredible and so now you've got all the insurance guys fighting with each other as to who's going to pay what for what. But being able to stop the bad guys before it even happened that makes my day. And even if I have to come in afterwards and clean up and make sure it doesn't happen again. Wow. In fact I found out this week because we were of course we're working with some of the top people in the industry when it comes to security. But I found out this week that we are the only company that they are aware of who has not had any of their clients hit by ransomware. Isn't that amazing. So that made me feel really good. None of my clients. Wow. How long has it been now. Twenty five years. I think that I've been very focused on security. We haven't been hit by anything at all or our clients and none of them hit by ransomware.

[00:01:37] So I guess that's really good I should feel good about myself. That's kind of my goal in life right now is to stop it right here I am staring down retirement trying to figure out what should I be doing here when I retire and came to realize that in fact I can help other people who are just like me who have their businesses who have been building their businesses who really want their businesses to survive and do well and be a retirement for them and maybe even pass it on to the family because my business is basically a family business as well. So that doesn't make me feel really good. And we've picked up from 1 to 3 or 4 6 6 new clients in the last month. So it's been a very busy time anyhow. Today this morning I got to speak with Jim Polito one of my favorite appearances on radio and this morning with Jim we talked about how I am now able to go sit on my back patio and enjoy it. How's that for a change. We talked a little bit about the Russians and what's happening in the power industry with them and kind of you know what we're doing to defend ourselves. I think that's a really important thing frankly for everyone to understand because these Russian hackers you know could be devastating. And then how to stop your smart TV from tracking what you're watching and the video games you're playing. So all of that and more with Jim and here we go.

[00:03:05] Here is our good friend and his weekly segment that is very very popular. He is our tech talker to tell you about my friend Craig Peterson. Good morning sir.

[00:03:21] Good morning. Do you like this weather.

[00:03:24] Well I know it's basically killing you. You may have to be hospitalized if it gets above 60 degrees. Craig Peterson goes in the shower.

[00:03:35] I've been inside for the most part. But you know what I did this year Jim I did something I've never done before and I've been talking about it forever and ever never ever. And that is we we have a patio out back here. The house it's really nice it's all nice.

[00:03:50] Brick patio and we've had it now for probably 15 maybe 20 years and I never go outside because I get eaten alive. Yeah.

[00:04:01] And I I've been debating back and forth. You know I've the technology out there and I've tried a few things like those little things that make sound just keep mosquitoes away and they didn't seem to do much good. But this year for the first time ever we bought mosquito magnet. Now I didn't want to buy one because the mosquito magnets to read about them online and they fail. You know actually yeah it's somewhere item right. So it is good for three out of maybe five years and it's not cheap it's a few hundred bucks. But I put one out at the beginning of June I think it was and I followed all of the directions right as to be downwind and everything. And I did all of that. And I this year for the first time ever have sat outside on a patio in the evening even when the mosquitoes are usually out and I haven't had any problems.

[00:04:58] It is called Hundert if not thousands of flies will the beginning yeah and hundreds and hundreds of mosquitoes. This is the first ever cell technology that's been around for a while but I've been reluctant to use. I got to say wow I am impressed. I know there is no light. It's not like Jim. I don't get paid for mentioning things on the air. No I know that. Yeah but I was just really impressed or a little word of advice if you've got the same problem as me and you maybe you want to sit outside in this weather I don't get it.

[00:05:35] But it may be one side. This thing has been amazing.

[00:05:40] What's the name of it again.

[00:05:43] It's called a mosquito magnet magnet. And they were bought by another company a few years ago and so I wasn't sure you know what to call it going to be like. And you put an LP tank on it. But you know have your barbecue. Right. And a little 20 pounder and that lasts about three weeks and it goes through. I wanted to doing this and basically burning the gas to make carbon dioxide which is what makes you scratch them.

[00:06:12] Yeah exactly. And then there's a little you and you've got to do this. I try it without. But there's a little scent packet that you put inside of it and it's bait and it really drives him right to it. So the carbon dioxide brings him in from a distance. They get close they smell the bait. They go in for the bait. And then there's a slight vacuum that's running all of the time and they get sucked into it and into the trap.

[00:06:40] And you have to keep it running at all times. Just keep it. You do. OK. So that will clear your area because what you're getting around do is you know that you know you want to clear your area. Mosquitoes aren't going to travel very very far. Their life cycle is not long may need standing water to breathe right and like. So you basically set that up and you cleared out the Peterson backyard.

[00:07:08] It takes two or three weeks and it Yeah it's pretty much cleared out and you're right. Mosquitoes who knew this right are territorial and so they don't go very far. As you said and they don't has been it has been a life changer Jim and it's ending with a blackflies.

[00:07:26] Early on in the season you know and I get these welts from back blackflies to yeah almost like a bees thing.

[00:07:35] So it was wonderful wonderful wonderful. So next year I think the Peterson family may get one for the front yard as well walk out the door and you get eaten alive. The front door right now I can sit on the patio.

[00:07:50] I like that. Craig some see look at that and doing an endorsement even though he's not being paid for it and giving you advice so always giving us advice. I want to ask you about something important here. Russian hackers may have penetrated the U.S. electricity network and could turn off power. I read a little something about this but I want to get it from you which basically means talk about war you don't need a missile you won't need a tank you will need a gun. All you'd have to do is come into the United States and shut off all of our power.

[00:08:27] And believe me that would be a lot worse than dropping an atomic bomb on a major city and harder to trace right away with this. This is a report that came out of the Wall Street Journal last week. And there have been debates you remember of course the 1984 blackout. I mean had 2004 back to back in the 80s up in Quebec.

[00:08:51] But there were questions whether or not that was a hacker and most of the security community we seem to think that in fact it probably was a hacker and they didn't mean to bring down the electric grid but that's what happened. But right now the Wall Street Journal is reporting that a group who is known as dragonfire energetic bear now interject has been doing all kinds of nasties lately but they've gained access to many of our power grid centers. Now they're talking about hundreds of them that they have gained access to and they're using the standard tools that you know were constantly seeing in businesses these spear phishing e-mails business e-mail compromise right watering hole attacks and they're tricking victims into it. But it is absolutely crazy what they're able to do out there and what could happen that they really could turn off the power. I got a grandkid here.

[00:09:48] Hi Susan.

[00:09:52] I like that shirt and R2 D2 shirt on here. CATHERINE Not me. That's pretty cool.

[00:09:59] So so yes think about all of the people who are who are dependent on electricity of days like today. And you know with the heat we really have death.

[00:10:09] If we don't have air conditioning we get the heat waves all the time.

[00:10:14] So look you know you use. You can make a living out of going to companies and saying here here's what you need to do to protect yourselves. Please give me some hope and I know in other industries you haven't been able to do that. Give me some help that they're really working on this to try to reach.

[00:10:34] Yeah they really are from this particular problem. They really are working on it. There are all kinds of controls that electrics that are electronic that are all over the place. These are called skater's systems and they are upgrading them. They are adding security to them. The plants themselves are upgrading the systems now. You know I work with the FBI and the unforgotten program right which is an infrastructure program they have and I I know myself because I've run webinars for the FBI on this topic. So all of these guys are very engaged in this and I think this problem is going to be pretty much fixed within the next year or two. But you know opening salvos of war could well use this type of stuff with a hack and they shut down power grids they shut down power acts. I mean that water facilities and stuff but you know they could do an incredible amount of damage to us. We have to use these types of techniques against other countries before we certainly use them with Iran in their centrifuge programs. This is the future. However this problem is being actively worked on.

[00:11:46] So that is good news which I agree with Craig Peterson. Craig I just want to get something very quickly from you before we have to wrap up. How do I stop my Smart TV from tracking what I watch. And why do I want to do that.

[00:12:02] Yeah most aren't aware of that but if you have a TV that has built into things like maybe Netflix Hulu or whatever yeah you and I have most of those TVs including Sony for instance. They're running Google's Android operating system in the TV. OK. And that's a problem to begin with because we know about Android vulnerabilities but in most of them I've got it up on my Web site. You can go there all of the major brands are covered by the TVs smart TVs don't just know that you're on Netflix. They don't just know that you are playing a video game on an external box right so you've got your x box or whatever it is they actually watch the content they can figure out what game you're playing and are streaming to the TV. So they've got all of this information but you can go in on all of these TVs and turn it off. You have to go to your setting and use the user agreements and other things all the details are up on my Web site. But you should opt out of it. Now in some cases you're going to have to turn off the smart TV function which I think is a great idea.

[00:13:13] Anyways I use always an external box like a little rogue who use my Roku you don't use the stuff that's already embedded in the TV.

[00:13:24] Exactly because when was the last time that this software update on that. Did you ever apply a patch to your TV.

[00:13:31] No. No. Actually now that I think of it. No I have not.

[00:13:36] Who does is right. And most of these TVs people don't even hook up to the Internet or they may so the quick and easy workaround.

[00:13:44] Pull the plug on the TV spots on the Internet side.

[00:13:48] Ok but then all of your special smart TV functions are going to go away if you do turn off the internet on it by using the external box that gets updates that you know is safe and the safest by far of course is the Apple TV although it's the most expensive as well.

[00:14:05] You said that. See this is all great stuff. We have from mosquitoes all the way up to your smart TV and you can get more of it. Well right. Because next Tuesday our friend Craig Peterson will be back.

[00:14:19] But if you text my name to this number 855-385-5553. That's 855-385-5553.

[00:14:33] Craig Peterson will send you a weekly update after his segment with all the information we discussed. Plus a whole bunch of other stuff. And then when there's some type of hack some type of a big problem guess what your friends list and he will send you that information yes and sell your name. He doesn't pester you. It doesn't do anything like that. Standard data and tax rates apply. This is a great thing to get on board with Craig as usual a great segment and I look forward to talking with you next week.

[00:15:03] Hey thank you. Take care camera.

[00:15:05] All right. Mosquito Magnet mosquito magnet.

[00:15:09] No money has exchanged stands but Craig Peterson brought to you by the mosquito man. Thanks Craig. We'll see you next week. All right. Don't go anywhere. Final word when.

 ---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 6, 2018

 

Have you ever taken an Uber?  Listen in as I talk with Jack about what some Uber drivers are doing, and why it can land them in some legal trouble.

What do you think about drones flying overhead? Today Jack and I discuss the reason that airspace is tightly controlled over certain political events and other venues.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles

Ridesharing live streams on Twitch raise privacy worries (update: Uber cuts access)

A Day of Violence and Confusion

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/06/2018

Uber drivers live streaming rides. Drone Assassination Attempt in Venuezula.

Craig Peterson[00:00:00] For those who are listening, and who wonder how I normally get my radio interviews out here. The simple way is I just take the live stream, of course, Craig Peterson, here, and iHeart Radio has terrestrial, as well as, of course, now apps and streaming audio that you can listen to. So, I'm on the terrestrial radio stations, well the station I was on this morning took a lightning strike over the weekend, a direct strike. So, a lot of their systems were down. So, today we were talking and I was recording my side of the conversation, today, so, you'll get to hear Jack Heath, in this case, being the caller, as it were, and me in the studio. So, it's kind of fun to listen to. This morning we talked about a couple of different things. We talked about what happened with that drone attack, that attempted assassination, which is a really big deal. Of course, as drones are in the news and it gets pretty dangerous, and you know when you think about sporting events and what could happen there. And, we also took a few minutes and talked about Uber. Uber drivers are making a few extra bucks, and it turns out maybe at your expense. So, here we go with Jack. Oh, one more thing. As you listen to me talking, and to Jack responding to Jack at the very, very, beginning, and then you'll hear this. Yes, That's what the stations send to me, or I need to let them know that their audio is on and you're on the air. So, listen for that. OK, here we go with Jack. 

[00:01:38] Well, joining us for some tech talk perspective our regular contributor Craig Peterson on the Autofair listener lines on this Monday morning and he joins us. 

[00:01:45] Craig, Good Morning, sir. Hey, Good Morning. Have we got audio? There we go. Good morning, Jack. 

[00:01:51] Were kicking up, high tech. 

[00:01:53] Mother Nature always is the boss, as you know, we had a lot of strong systems, Friday, Friday night. 

[00:01:59] Back in our studios, in downtown Manchester, they took a direct hit as they say. 

[00:02:04] So, a lot of the electrical computer and digital stuff is being tested, but we're getting back to normal. In a lot of areas some interesting weather, but what's going on in the tech talk world. 

[00:02:12] Yeah, it's interesting too, when you're talking about getting struck by lightning because there is so much power in the lightning. It's been over 100 years since there has been serious work on lightning. But, did you realize Nikola Tesla was really big into trying to harness the power that came from lightning? Of course, that static electricity, it's a little more difficult to manage. But, while talking about a source of power we've got a few things people are worried about out there right now, Jack. For instance, we've got Uber and Lyft and I assume you've used those before, correct. 

[00:02:49] Uber, yes. 

[00:02:49] Yeah, well they're kind of the same. Uber tends to not treat their drivers quite as well as Lyft does, at least according to the drivers I've spoken to. Well, it turns out that there is something going on here. New Hampshire is a two-party consent state when it comes to recording. That means both parties have to agree, to being recorded. There are other states out there, however, that are not two party states and apparently what's been happening is that some Uber drivers have been live streaming. Now, when you get in the car you can see they've got their phone up on the dash. Typically, they're using it as a GPS or are using that to accept riders and to kind of meter everything, if you will, almost like a taxi. Well, some of these guys and gals, apparently, have been using live streaming software such as twitch, to now live stream the whole trip. Now, if you're a driver on Lyft or Uber and you're out there using your car, you don't really know who's getting in your car. So, some of these drivers are saying they're doing it for safety purposes, so their family, for instance, can be watching the live stream on Twitch while they're driving around and they know that the drivers are safe, right. Their family or their friend is safe. But, some of these guys, according to the St. Louis Post Dispatch, are being paid for the stream, in other words, twitch lets you charge people to watch, and they've had people like this one guy who was making five hundred dollars extra a month by live streaming. He was charging on twitch and your ride, whether you knew it or not, is now being sent and, paid for by these people that want to watch you in the back of the Uber car. I don't get it. There are legality issues with this, again depending on where you live, written all over it. 

[00:04:50] Yeah, yeah. Oh. Now, did you hear about Venezuela. In Caracas, Venezuela, President Nicolas Maduro I haven't gotten much verification, but I guess apparently, there was an assassination. 

[00:05:02] that he survived with drones, that were packed with explosives, during a live TV speech did you hear about this. 

[00:05:09] I did. I saw the video, in fact, of this whole thing going down. And, he was doing the speech, of course, Venezuela is a socialist country and is on the verge of complete collapse. 

[00:05:20] And, so right behind Venezuela. 

[00:05:23] Yeah, exactly. All of these guys out there, it has never worked and never will, but that's a different story. So, people are trying to kill, as has always been the case right. The President of a country whether they're left or right or center. It's always happening. And, in this case, you're absolutely right. The video shows him giving his speech, the military in front of him, I mean tons of military. This was an honor. In fact, of their military, he was giving this speech and in come, apparently two, and, this is just absolutely amazing, frankly, but, two drones, and they blow up you can see him look up, to the side, and then all of a sudden people start running the military parade that was in front of him completely disbanded, ran off apparently some of the military personnel were injured. I think it was nine or ten of them. He seems to be just fine. He is now very upset because it was, apparently, an assassination attempt that was, somehow didn't wasn't pulled off quite right. Why didn't they bring them closer, before they blew them up? But, it's a real problem and shows why the Secret Service is controlling all of the air now around the President. And, we have equipment that can be used to jam those drones as they're trying to come in, as well as, knock them out of the sky. There's some pretty cool guns, that are designed to do just that bring those drones down if they are threatening someone.

[00:06:55] Interesting, yeah. And I. Wasn't I wasn't stunned or shocked when I saw that, because I understand, you know technology's not going away, but you know you think of sporting events and all that, and these drones that are buzzing around and you know when you see and you're wondering you know who's flying them around. 

[00:07:13] It seems a little bit, a little bit odd, in how to regulate or keep an eye on them. Not, that I'm a regulation guy, but sometimes you need to know what's up there. 

[00:07:20] It's difficult. It's tough. Remember, it was a Black Sunday? You remember that movie from the 70's, a big football game and they were going to use a blimp. 

[00:07:30] Yep, Not a new idea. 

[00:07:32] Good memory. Well you know that's nothing. It all just comes around. It all just comes around. Craig, Thank you. You make it a good one and stay cool today on this Monday.

[00:07:41] Take care. Thanks, Jack.

[00:07:44] And in case you're wondering how it ends. That's how it ends. Right. They hang up on your but. It's radio. The listeners don't, the listeners don't get to hear that. Now you did, right. That might be the first time for many people who are listening to the podcast. That's how it works when I am calling into a radio show. Now, TV is a little bit different but, we're not covering that today. All right, well have a great day, and we'll probably be back tomorrow, hopefully. Jim Polito is going to be on, and I'll be on with him and we'll be talking about some of the latest in technology news. Have a great day, and enjoy the rest of the summer. It is going by quickly. Bye-bye. 

 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 4, 2018

Have you seen the Samsung S9?  Listen in to hear what Craig thinks about it and if it is worth getting.

I don't know about everyone in this audience -- but many of you I am sure love to learn and so do I.  Today, I am going to tell you about a new Google learning venture.

Have you ever taken an UBER or a LYFT?  I am going to tell you about what some drivers are doing and why?

More news out of Google! I am going to tell you how Google has prevented phishing in its facilities.

There is so much to talk about that I ran out of time so be sure to check out the related articles below.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/04/2018

Samsung S9 Struggling. Free online business courses from Google. Ridesharing live stream dangers. Google Titan Security key.

Craig Peterson: [00:00:00] Hey, Good Morning everybody. Craig Peterson, here. We've got another show this next half-hour or actually 25 minutes. We'll see what we can squeeze in. But, we're going to talk about your smart TV how to stop it from tracking what you watch and what video games you're playing. Did you know they track that as well? Russian hackers, a little bit more about them and what they apparently have already done that most of us just plain aren't aware of. Google, Now, I've talked about this a little bit before but they've got their own security key. We've got an update on that, and why you should consider that, right. Ridesharing. Did you know you might be live streamed? It depends on the state that you're in 

[00:00:42] There are people that are paying to watch people taking rides in Uber and Lyft. These free online courses from Google may help you boost your career. And why is Samsung's Galaxy S9, their brand new flagship phone, struggling so badly? So, here we go 

[00:01:09] On the front lines and ahead of the trends in business and consumer technology speaking with the top minds and creators behind the products and ideas that help to drive our everyday lives.

[00:01:19] Dean Kamen is joining us now. He's the inventor of the Segway and the founder of US First. Steve Forbes, I appreciate what you do with Forbes magazine for all these years. It's one of my first go to places. We're going talk right now with the guys and gals behind Siri and we're joined right now by the director of Digital technology. We're joined right now by the CEO of Ebates, Kevin Johnson, on air for more than 15 years.

[00:01:43] Over 20 million podcast downloads. This is Tech Talk with Craig Peterson. 

[00:01:53] Hey, everybody. By the way, if you get my e-mail I send out a weekly with hot items of the week. All of these articles are available to you. There is no chance of getting to them all today, right. But, all of these articles are available you can just click through it'll take you to my website at Craig Peterson dot com. You'll get a summary and then if you want to read more you can click on the read more link at the bottom and that will take you to the original article that I am quoting. Of course, many times these articles are written by me or a member of my team. In which case you, you're gonna see the whole thing right there, and you don't have to hit the read more button. Well, Samsung you know has been selling phones and smartphones for a while and their success came when they switched to the Android operating system. Android, the number one worldwide, as far as installed units go, for mobile device operating systems. Also, the number one world-wide worst operating system for a mobile device if you want security. So I know people who love Android, they've just become hooked on it. They know it well, they don't want a change, and they just kinda of sit there with their fingers in their ears and they say I can't hear you. Can't Hear you NAH NAH NAH NAH

[00:03:12] And they're still using Android, I just don't get it right. So, for my customers, I always advise them don't use Android. Use Apple use iOS, iOS two years ago was finally approved by the federal government for military use. You're not seeing that with your standard Android phone that you're buying at the local retailer. So, if you want security, stay away from Android. But, that doesn't answer the question here about Samsung. Samsung, of course, they are probably, if you're going to buy an Android phone, they're probably the best ones to buy them from. Huawei has out a new phone that's got some really great camera features on them. But, we also know that they're blocked from the U.S. market, at least a large part of it, because the government, now won't buy them, won't use them won't sell them in the NEX/PX on base. Because of potential spying problems that were revealed in Huawei designs and chipsets.

 

[00:04:16] You might also remember on the show we talked about how they had more than, I think, it was north of a billion dollars worth of fines, which is a pretty hefty fine if you ask me. So, Huawei's kind of out of the market, here. You've got some others, HTC, I'm trying to think of some of them over the years. A few of them are actually out of business, now. Samsung's it, right. They're the big guys, South Korean outfit. They make pretty decent hardware. So, what's happening now? Obviously, the sales are not what Samsung or its investors were hoping for. They added some cool little silly things if you ask me. Which Apple did too, right. You saw with the release of the iPhone 10 you know these emojis'. That will take on some of your facial expressions on iOS. Which is just stupid really. Really, that's going to sell more phones. Who buys a phone for that. Well, Samsung did much the same thing, and they were pretty jazzed about it, right. They have images that look like you, which I think is really kind of cool, but it's no reason to spend eight hundred bucks on a phone. If you asked me, or twelve hundred bucks if you get a fully loaded iPhone Ten. The electronics division over at Samsung just said, that they "had lower than expected sales of the flagship Galaxy S9" and that's the main reason because it wasn't just the nine but their overall profitability was hurt badly because people just aren't buying them 

[00:05:54] You know it gets to a point, where you're good enough, right. Do I really need to spend money on another device? And, the answer to that is, probably no. I usually wait for two major releases before I buy a new one. So, like right now, I have an iPhone 8. Before that, I had an iPhone 6, and the iPhone 6 I was using, my wife now uses because she's just plenty happy with it, doesn't need any of the newer features, or you know that new speed or memory stuff that I tend to use. You'd expect that right. Yeah, that's it. That's the reason that's why I got a table saw for Christmas last year. But, you know the newer phones are faster, I can run the newer apps on them so I can test them out. And I have more security stuff because I do use it with some of the clients that I have and there's some information I don't want to get out. So, this handset the S9 was launched in February, and some of the critics are praising these new camera tricks. You know really, really, really, super slow motion.

[00:06:59] What? What's that going to buy you? Are you going to buy a phone because it has super slow motion, really? I don't think I've ever used slow motion on my phone or any of my video cameras. Would you use that? I don't understand it. Here, but anyways despite the speculation in the S9 sales have been the weakest since the Samsung S3. Samsung still not disclosing any of the real numbers and they have a 20 percent revenue drop in the division. Why, are they struggling to stand out? Well, frankly the physical differences between the 8 and 9 are almost nonexistent. Which makes you wonder about Apple? So, many people complaining about that. You know the top center of the apple screen where they've got the camera. So there's this little divot, at the top and people make fun of it. In fact, Samsung came up with some ads making fun of that feature on the iPhone. But, it looks different, doesn't it? It makes it visibly different. Well, there's not much of a difference between the S8 and the S9 as far as looks. A little bit of a difference in the position of the fingerprint sensor. They have a dual aperture lens, which is you know kind of cool. But if you're not a photography geek. Why would you care?

[00:08:22] There just isn't the differentiation.

[00:08:25] We've got the Chinese rivals, also out there, and frankly I think one of Samsung's biggest problems is they're paying too much attention to Apple. All right there's a lot of innovation in the Android space, I'll give you that Samsung's always been able to outspend their competitors on marketing. But I think they're just focusing too hard in trying to, really overstep Apple. And what Apple's doing in the U.S. market. And even with some of the criticism, Apple's been having lately, it just doesn't make sense, it's not worth all of the effort all of the trouble. Samsung, just go ahead and make a difference come up with a really great device that everybody wants and Why don't you let Apple start chasing you for a change. So, on the S9 verdict isn't probably worth your time or your money.

[00:09:23] Hey, if you're looking to learn a little bit more, an uptick your job and your earning potential 

[00:09:30] It's always been around learning, hasn't it. I don't know that it's necessary to have a college degree. I certainly don't think it is in many, many, careers. I think most of the H.R. people are just taking an easy out, by looking for that checkboxes, says yeah you've got a master's or a bachelor's degree. I think they're taking the easy way out. It's you know I think it's kind of insane. What matters are the skills? What skills are you bringing? Oh, you've got five years experience fighting malware on large networks using great Cisco hardware and software and you've been providing tech support. And everybody says wonderful things about you. Well, that's worth way more than a bachelor's degree, that's worth way more than even a certification from one of these companies like you know the Cisco certifications. But you know what are you going to learn in them. This is a good opportunity for you, you'll find these links up on my Web site. Craig Peterson dot com.

[00:10:31] I've got a link to a great article from Inc. magazine. You'll find it online there, as well. But, they've got a class on getting your startup started. Now, all of these classes they're called Class central. They're all pretty darn basic. And, you know if you ask me, a lot of stuff so basic. So, I don't know maybe it's advanced to you, but it's really aimed more at startup people. People who are just learning. So, this particular course on getting your startup started is going to help you with your mission and vision statement. Find mentors team members. Find financing for your business. Pitch deck to try and get customers or VCs on board. By the way, I would advise getting customers. You need people paying you money, once you have people paying you money, then you can go and find your investors. Frankly, I think that's a way that should work in most cases. I never cheated and went to VC or angel route. But it's a self-paced course takes about three weeks. They've got another one, on App Marketing. If you've got the best idea for the app store or Google Play store. Wow, this is going to be great for you, right. Apps, I don't know there's not that much money in them anymore, unless you are making apps that are aimed at a particular company's internal customers.

[00:11:51] You know their supply chain, but an app marketing course, so you can learn about creating and launching an app. It sounds like can be pretty useful for anybody doing online marketing. So kind of any business owner might want to take this. It's about a two-week course, again from Google. App Monetization. This is a course is targeted at people who want to create apps or some free online content and have it generate income. But, depending on how much you know, it might not be very useful again. It's kind of a beginner thing if you're out of school and you're thinking about maybe making apps, it's a free thing, about a month is what it takes. Product Design. You've got a great idea for a product, that can help you with your idea, create a mock-up design, and quickly connect with potential customers. Check with them to see if your product can be viable. And, of course, the only real test, I go right back to this is, someone gives you money, because people will say they're going to buy it, but they don't, OK. So, it's a good thing to check out, to ask and get a little direction 

[00:13:01] But, if you can get people to pay you money, even before you develop your product, you'll be much better off. In fact, there's a company. What's it called G.T. Solar I think is the name in Merrimack. It was founded and he made he grew some chips for silicon wafers and things in order to make solar panels. And, he was able to fund his company, entirely, from his customers. So his customers were going ahead sending him a few bucks and that few bucks then went the extra mile, frankly because he had his customers fund him as he built all of his systems out. Product Design. Strengthening your LinkedIn network and brand. Again, this is part of the entry level grow with Google curriculum. So, if you're seasoned already as a networker or LinkedIn user it might not be great for you. But these courses and a lot more if you're thinking about doing a little entrepreneurial thing with the market doing so well. The economy doing, so well. Check it out you'll find links to this up on my Web site. Craig Peterson dot com. Look in today's email. It'll be right there for you. You can just click right through and find out anything that you might need, right there.

[00:14:22] Hey, did you hear the news out of New York City this week, if you are a cab driver or wannabe cab driver and you may be doing something for Uber Lyft. Make a few extra bucks with your car. It's really kind of a nice thing. There have been some instances where bad things have happened with Uber and Lyft but I've had bad things happen with regular cabs, as well. Well, in New York City, apparently they passed a new ordinance, that is basically going to ban Uber and Lyft from their streets. We're not going to go into that right now, that's not part of this show. But, you might have a hard time finding Uber and Lyft next time you're in New York City because of that. Well, what we're going to talk about are called live streams. Now, there are a few kinds of cool sites, out there, that you can use in order to live stream. Twitch is one of them T W I T C H and we use it with US Robotics. I don't know if you're familiar with that, great program, if you're not involved. Make sure you get involved and you'll find them online. I think it's us first dot Org. I know they changed its name but anyways I think you can still get their US first dot Org. They use twitch in order to broadcast these competitions that are held all over the world which is really, really, cool.

[00:15:47] I love that thing. Well, when you step into one of these ride-sharing cars, do you realize that you might be on video? Now up on the dashboard, there's usually the little smartphone right and might be Android it might be iOS. And on that, they're running the app from Uber or from Lyft, and that app is tracking where they're going that lets them say you'll pick up this rider and lets them score the rider after, the fact, right. It lets you do all of these things. So, you know there's one other thing that's been happening, you might not have expected. And that is that some of these guys, apparently, have been live streaming on Twitch. So, you get in the car and the whole ride is live-streamed. Now, I can see one side of this, which is it's a safety factor for the driver, because now it is out, in the ether, his wife or her husband or family, whoever can watch it at home make sure everything looks safe everything's good. And, from that standpoint, I think that's really kind of a neat safety feature. Depending on which state you're in, that may or may not be legal. There is something called two-party consent, and that means that both people who are being recorded need to give permission. And, it needs to be explicit permission. Now, I record people all the time from my radio show from my webinars.

[00:17:20] You know, the FBI webinars I do, all of these things. So, all of that is legit because they know they're being recorded, right.I even will say, OK we're going to start recording now, just so I have that. Well, in this case, this particular guy Jason Gargack, I guess it is. He's an uber and Lyft driver and he's been broadcasting apparently hundreds of trips on twitch without explicitly obtaining consent. Now, he's taken steps to protect passengers, so he mutes addresses moderating lewd chat comments, at least some of the customers said they wouldn't have entered the car or if they knew they were being live streamed. And it's certainly possible to identify some of the passengers based on the details that are there in the archived videos. But, he's asserting that the streams are legal. He's in Missouri. Missouri has a one-party recording consent law which means you only have to have one person who consents to the recording. Now, I personally go back and forth on this I think of it's a public official in the performance of their public duties or under the color of law. I think it should always be recordable. Always. It's a public official whether it's a town clerk, a police officer, a fire hydrant inspector, a federal agent, doesn't matter that should be recordable without the consent of the public official. And, many times you see that happening even in two-party states where you have a whole bunch of people out there with video cameras on their smartphones videotaping a police officer in the performance of their duty.

[00:19:07] Right, you see that sort of thing fairly frequently. Well, in many cases it's illegal in my home state, here. It's illegal to do that as well. So, what's happening here? Well, Missouri allows him to record other people without their consent. He has a sticker on his car that tells passengers that they're consenting to be recorded if they enter the vehicle and he describes it, as for security. Now, that's the part I mentioned earlier I think that kind of makes sense, right. Well, here's where things get a little bit fuzzy. Apparently, he is charging some people to get his live stream. Now, his live stream remember is going out on twitch and twitch does allow you to sell access to a stream. So, apparently, there are at least according to one report he's been charging five bucks or more a month. He's got more than 100 paid subscribers. It's really interesting. Uber had shut off his access to the driver's app while it "evaluates his partnership". So, even though live streaming might be legal in Missouri, Uber guidelines bar any kind of inappropriate or disrespectful behavior including comments on appearance. So, who knows, right. Twitch wasn't commenting on it. But, you can find this article up on my Web site as well. OK, so, one more article here for today and this is about security coming out of our friends at Google.

[00:20:52] Now, Google has been using this technology in-house here for a while. And, remember they have tens of thousands of employees and they have not had a single case of a successful phishing attack since they started doing this. That's pretty darn cool, frankly. Google has been following the standard that's out there. It's called The FIDO's specification. But here's the bottom line. It's a key, it's a USB key. It has some smarts in it and it allows a web page to authenticate you. It allows your laptop to authenticate you. Your desktop to authenticate you. So, you have to use this key in order to get your machine to allow you to log in. They've had this by the way since 2014, so that's pretty substantial that FIDO specification. And Google has been supporting it the Google accounts have. So, this titan key is something Google has now released. Anyone who is using their cloud services, the Google Cloud Services, has first dibs on it. You can go out and get it. I've had a couple of my clients now asking about it because they've been following my weekly e-mails and I've been kind of hinting that this is going to be coming and we're probably going to use a different kind of key here. The, you know, the Google Key is now quite yet.

[00:22:20] And some of these other ones are well supported as well. Also, follow the FIDO log in specs. So, we're starting to move some of our customers over. We're already using some of this technology including, DUO, which by the way, I think it was Google just bought this week. So, that's kind of cool, we're once again going to be ahead of the game in keeping our stuff secure. But, this is all available you can check it out Google's advance protection program. I've got a link to all of this up on my Web site. Craig Peterson dot com. And, of course, it's also in this week's newsletter, which you can sign up for also at Craig Peterson dot com slash subscribe. We've got subscriptions open, again. Well, there's other stuff we didn't get to today. You might want to check out. We've got Russian hackers. Looks like they may have penetrated hundreds of U.S. based, electrical grid networks. That's a very big deal. Apparently, they could turn off the power, at will, and cause some major havoc here. A lot of victims. This is bad. Your smart TV may be tracking you. If you have a smart TV and you can tell because they have built into them things like YouTube or Netflix or right your Hulu access to those TVs not only track what you're watching because it's easy enough for them to know, but they have a special software that's built into them and did you know even know this existed?

[00:23:49] It's called automatic content recognition, by SAMBA TV, usually. And, this automatic content recognition even recognizes video games that you're feeding into the TV and tracks your use. So, I've got a very detailed article from the New York Times that's up on my Web site Craig Peterson dot com. You can go there and have a look, it's got instructions for all of the major smart TV brands and what you can do to turn that off. I think it's important to do, although, you know the marketing side of it, I can see it's a great thing. I personally would rather only see ads for cars, when I'm looking to buy a car right. Well, they show me things that I'm interested in. But, the problem comes in when the bad guys get their hands on this information. This stuff's eminently hackable. It's been hacked before, it will be hacked again. So, be very, very, careful. You'll find it all. Craig Peterson dot com. Hope you have a great week. We'll be back next week with more. Until then if you have any questions just text me directly 8 5 5 3 8 5 55 53. How many people do you know to give you their phone number? That's me 8 5 5 3 8 5 55 53 with any questions at all, during the week have a great week. Take care. Talk to you next week. Bye-bye. 

 ---

Related articles:

---

How to Stop Your Smart TV From Tracking What You Watch


Russian Hackers May Have Penetrated US Electricity Network and Could Turn Off Power, Officials Say


Ridesharing live streams on Twitch raise privacy worries (update: Uber cuts access)


Google announces its own security key for stronger logins


These Free Online Courses From Google Will Boost Your Career No Matter What Business You’re In


Why is Samsung’s Galaxy S9 flagship struggling?
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 1, 2018

 

How big can companies get?  Listen in as Craig, Ken and Matt discuss how big some companies have gotten and what eventually happens.

Do you want a plastic gun?  Yea, No!  Craig dispells the hype and hysteria on Plastic guns and why it is a big nothing burger.  

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

 

---

 

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/01/2018

3D Printed Plastic Guns.  The Future without Google and Apple.

Craig Peterson: [00:00:00] Hey, Good Morning everybody! This morning I was on WGAN and affiliate stations in the state of Maine with Ken and Matt and they were getting kind of teased because some people are saying they're just a comedy show, in fact, it was, I think, a sheriff in northern Maine that said that you guys are just a comedy show, because they were they were talking about a body that was found with a knife in the chest. So, they were postulating that it was murder, right? And, so the sheriff said, "Well you can't say it's a murder, just because there was a knife in the middle of his chest." And, so he said they're just a comedy show and don't pay attention to them. So, this morning I was kind of teasing them because we talked about two very, very, serious subjects, but I had to rib them here on the old comedy show thing. So, this morning we talked about these 3D printed guns. What's the technology behind this? Where is it going? How is this going to change our lives? And, frankly, will it end up changing our lives? Apple just received a trillion dollar valuation. What's happening? I discussed life after Apple and life after Google. Have you thought about life after Google? What's that going to mean to everybody because we're counting on it right now, right? Everybody uses Google. Number one search engine by far in the world. I think I kind of surprised them with my answers, there. So, anyhow here we go with Ken and Matt this morning you're going to love this, I think. 

[00:01:29] All right Craig Peterson back again as he is always is at 738 on a Wednesday. Craig, How are you this morning? 

[00:01:36] Hey doing good. Hey, why aren't koalas actual bears? Yeah, they meet all the qualifications. That's a dead joke. Well, this is a comedy show, was a comedy show, and I have to start with that. 

[00:01:51] Well done. And, in fact, because of that I've got a special sound effect for you. 

[00:01:57] Well done sir. 

[00:02:00] So, so, I just got news and I want to ask you about this because Apple's approaching a value of one trillion dollars 

[00:02:10] Wow, isn't that amazing? To get right down to it. Trillion here, a trillion there, right. Many governments don't have that kind of value.

[00:02:20] Yeah, it is absolutely amazing. They are well on their way to being just an absolute record breaker. But, we've seen this sort of thing before, right. We've got Google out there who is just incredibly valuable. Google has become a verb, but I don't think Apple's a verb, yet. It's still a noun, but Google has become a verb. We're all using it, like 95 percent of searches worldwide, are done on Google. Then there was IBM in the 70's, of course. I've got to bring them up, Microsoft, Microsoft was so not afraid of Apple. They went ahead and helped to fund Apple. They invested in Apple back in the day. Nowadays, of course, IBM is nowhere near the powerhouse it was. Microsoft is nowhere near the powerhouse that they were, and Apple and Google are both going to end up going by the wayside. It's just it's inevitable, and when you're talking about Apple and the trillion dollars worth of value it is just crazy. But, think about Google here now, we can see maybe somebody taking over from Apple, right. Matt, you use a Samsung phone if I remember correctly. Correct. And, a very good possibility that Apple just isn't going to be in the lead. But, can you imagine Google not being here any longer?

[00:03:47] Well no, but you know in 1998, I didn't really imagine AltaVista being gone either. So, you never know.

[00:03:53] Yeah exactly. So, what will the world after Google look like? How about right now? Right now, you if you wanted to find out what book Ken Altshuler had written, where would you go to find his books? You'd probably go to Amazon right. Or come on his show or comedy show.com. Amazon is the place to go, Right now. It is the search engine when it comes to books. It's become the search engine when it comes to trying to find things for your home. When you're talking about smaller items. Amazon is already taking over from Google. The whole concept of e-commerce purchasing, online. So, Google is already starting to fall by the wayside. Look at our mobile devices whether it's an Android or an Apple device. Who owns the advertising on that? It isn't Google. The ads in our online or smart mobile devices, just aren't working anymore. So, it's not going to be long before Apple goes by the wayside because there will be something better. Steve Jobs is the guy that drove all of the apple products that have become what we're appreciating and loving today.

[00:05:11] He's gone. What's going to continue on? Apple's already been stumbling. Google is already stumbling out of first place. It is really not first place when it comes to going online to buy something. We've got a huge Chinese outfit that's out there, called Alibaba, who is competing with Amazon to become the world's biggest retailer. You know Ken that what this boils down to is the companies that we know today and just count as part of our lives. It's just, just so inevitable that they're not going to be here forever and are going to go by the wayside. And, even though Apple's looking great right now and you know, already, I love their products right. We are the only tech, my company is the only ACN, the apple consultors network, the official Apple business guys, here in the Northeast, Framingham, is the next closest one to where I'm at right now. So, it's a different world. It's going to change. And I hope you're making some money off of these stocks but don't count on them always, being in this envious position that they're in right now 

[00:06:24] At least we'll always have 8-track tapes at least we have that.

[00:06:27] And you can listen to those forever. They just keep replaying it until you play them the fifth time and then they break. But that's a different story.

[00:06:35] Craig is on our tech guru joins us at this time every Wednesday for an eye on technology. Craig, I know this isn't you know this is not on our list of stuff to talk about today, but I do have to ask you about this whole printed gun thing, and the 3-D printing industry in general, right. I mean it's sort of a new concept to a lot of people, who are following this, and you know, the blueprint. Yeah, yeah, it's been on the news about 7000 times this morning. So, you know I don't know exactly what I'm asking you here outside of perhaps just what your thought is on the whole 3D printing craze, in the first place, and what you think the future of it looks like when laws are trying to, you know outlaw certain objects, like a gun, or restrict them in some way. But, anybody could simply print anything. What does that mean for the future?

[00:07:21] This is huge for the future. Imagine the day that instead of having to go to the car dealer to get the part that you just broke on your dashboard, because you were laughing so hard listening to WGAN comedy show in the morning that you can just go and print up at home. This whole thing with these printed plastic guns is a complete misnomer, right now. It is hysteria that just absolutely crazy. Here's what happens right. Your standard 3D printer that's out there is printing something with plastics. Well, consider the quality of a piece of lego. So, if you have a gun that you want to fire, do you really want to barrel, breech, etc. being made out of Lego. The answers no. You can make anything that would fire, once. We learned that from the original Star Trek series, you know it's going to blow up. It's not going to fire very well and it's not going to be accurate etcetera, etcetera. You need metal you need a barrel you need a breach to contain that explosion that happens when that the primer goes off. And, then the main powder goes off, to push that projectile which is also metal down the barrel and out. So, what we're talking about here, in reality, are what is called, the lowers of the gun. So, the parts of the guns that are already being made by manufacturers out of plastics for lack of a better term, but be made out of plastic, those parts you can already print. You cannot print a gun that's going to be an effective long-term, here. 

[00:09:06] If you have a machine shop, however, you can make a gun. And part of what's going on here is they are selling basically a small metal machine shop as well, along with this. So, going forward. Let's talk law right now. We have the same problem we've always had with technology and that is the laws are always staggered behind. And, we all know that. The laws are going to take a while to catch up. And, whenever they do these preemptive type laws without understanding where the technology is going they always mess up. So, I'm a little worried about that. But for now, anyways guns that are quote printed at home unquote are not a huge, huge, deal you can already make some of those lower pieces out of a piece of wood if you're good at woodworking, OK. So, let's not go crazy. But your bigger question, Matt has to do with where is it going right ultimately, Right? And, ultimately we are already seeing Houses, printable houses being made. In fact, there is a company that makes the machine right now that can be taken to a place, say where there was just a massive hurricane they need to build hundreds of thousands of houses. You set the machine down and it has arms that go out and build all of the walls up and can actually build a structure there, in place. Now, that's not terribly efficient. But, there are other printers that will print your house you've seen modular homes before, of course, where yeah they come out and the walls are all there. They just basically put it together like legos on site.

[00:10:50] While there are companies that are already doing that with printable houses. So, they'll print parts of the structure in order to get them out there. Where will we be 10 years, 20 years from now? We already are seeing many of the UPS stores with these printers, there. Right now it's kind of a fad, a cool thing, people are printing fun little keychain things. But ultimately, almost everything's going to be printed like this. You know car dealers will not be what they are today because we're going to have direct to consumer car purchases. And, if you need a new part you are going to take it to a car shop, so that it can be fixed, but they will be printing parts right there. And some of those parts will be metal parts because, in 10 or 20 years, we probably will be able to efficiently print metal that can withstand forces. I don't think we'll be printing engines or gun barrels anytime soon. But, the basic parts of your car that are metal will be printable, right there in the shop. It is really going to change almost everything in our lives, particularly since we already have some leading-edge technology that can print electronic circuits. So, think about that, you could put potentially print, an entire computer in another 10 to 20 years right there, maybe even in your home, and have very specialized equipment. So, it it's kind of cool. I'm excited for the future here, but for now this whole gun thing is a substantial amount of hysteria.

[00:12:32] Our tech guru, Craig Peterson who joins us every Wednesday at 738 Craig Peterson dot com if you want to get all the information firsthand. 

[00:12:40] Thanks Craig, talk to you next week. Hey, gentlemen take care. 

[00:12:44] And by the way, Where do generals keep their armies? Where? In their sleevies? Sleevies? Sleevies? Armies, his arms, where does he keep his arms. Sleevies? For a comedy show, you guys are a little slow on the uptake.

[00:13:04] The problem may be we may need to find another tech guru too,  OK.

[00:13:16] Hey, hey, hey, wait-a-minute guys. What did you think, I write Dad jokes. I get it, but I felt that one was kind of funny. Anyway, let me know what you think.

[00:13:26] Any time, any questions 8 5 5 3 8 5 55 53 8 5 5 3 8 5 55 53. Take care guys. Have a great one.

 

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

1