Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Well, good morning, and welcome back to Carolina Focus, our
public affairs show heard every Sunday on Mixed one oh
seven nine, Sports Radio ninety two to seven WFNC, and
News Talk eleven ten WBT. Always available as a podcast
over there at WBT dot com. Along with Sharon Thorsland,
I'm ed Billick. Let's continue our discussion on cybersecurity right
(00:22):
here on Carolina Focus.
Speaker 2 (00:23):
Welcome back to Carolina Focus. I'm Sharon Thorsland.
Speaker 3 (00:26):
Well.
Speaker 2 (00:26):
Today we are focusing on cybersecurity and keeping children safe
when they are online, be that social media, phones, computers,
even video games. Our guest is Tom Arnold. He is
a cybersecurity expert with decades of experience in the field.
He's written a series of books called The Digital Detective,
aimed at helping parents keep their kids safe online. Tom,
(00:46):
before the Break, you were telling us about the dangerous
kids can run into online even when they're doing something
really as seemingly harmless as playing a video game. You're
explaining things that people need to be on the lookout
for when kids are playing games online, and knowing what
to be aware of, knowing how to spot if someone
starts asking you for personal information, that's even just even
including like your name or where you live and stuff
(01:08):
like that, not just driver's license or other documents that
we might think of.
Speaker 3 (01:12):
That's right, that's right, and you know reminding you know,
you may like see this this avatar with you in
games all the time. And you know, the most common
tradecraft that's used to try to convert people is just
to slowly ask them things, to try to get them
to give you things, even if it's completely irrelevant. I
(01:35):
just want you to give me something, give me something. Here,
I'm going to give you something too. Now you're going
to give me something. And again on the internet, nobody
knows you're a dog, okay. And that's a very very
common tradecraft that's used by, you know, someone who's trying
to cruise and recruit.
Speaker 2 (01:56):
Okay, that's it seems like with kids, you just sort
of have to make them realize that that can be
like that kind of sketchy behavior when you think it's
just normal. But what how is it like how can
you get kids to understand that or to realize that
is there like some particular red flag they should look
(02:16):
at or if is it just basically saying, if somebody
asks you anything personal, that's your red flag.
Speaker 3 (02:21):
Well yeah, and again that question from personal is anything
outside the scope of the game. Okay, okay, it is
where I'm going because, like I said, the de baiting
method is to ask you know, you know, something as
simple as what color is your hair? Something like that.
(02:41):
Now that's or to bait them with, oh yeah, I
like to go to in and out burgers? Do you
like in and out burgers? Those are common little lines
and if it's not in the scope of the game,
they shouldn't answer.
Speaker 2 (02:57):
Okay, Now should like parents tell their kids, like if
they have a situation like this, and like your grants,
I went to his parents and said, hey, they asked
me this alert them to alert the parent. Is that
the best thing to do? Or just get out of
the gate? Or okay?
Speaker 3 (03:14):
Absolutely, And again this has to be a safe area
in a lot of situations, if the child or or
young teenager brings something to the parent, it's got to
be a safe area. They cannot get in trouble. Even
if they screw up, they cannot get in trouble, is
my point. Okay, banning the game it isn't going to work. Okay,
(03:40):
ergo The example of the kid that you know built
this Facebook page. They will find a way around. Okay.
You don't want them being sneaky peets. Okay, you don't
sneaking around on the internet. This is a bad place
to do that. Okay. You want that absolute trust a
lot of If they bring you something, it can be
(04:03):
a learning moment. Okay. Uh. And if they said, you know,
I was asked this question and a couple others, and
I answered the questions, is there any way mom and
Dad can I get the information back in the answer,
it's now a learning moment.
Speaker 2 (04:19):
Okay, know you.
Speaker 3 (04:21):
But you gotta be careful and don't give anything else. Okay.
And especially if they have given information and somebody posts
a deep fake and says, here's a picture of you
without clothing on ha ha ha. You posted this, I'm
(04:42):
going to post it for everyone on the internet to
see it. Unless you do something. Oh wow, they need
to go to mom and dad now, okay, and the
police need to get involved now.
Speaker 2 (04:55):
Because that kind of stuff is just almost impossible to
back backtrack, isn't it.
Speaker 3 (04:59):
Want exactly like them. That's the problem with deep fakes. Wow,
they're little brains. They're thinking, did I actually do that
did I actually take that picture? Did someone snap a
picture of me in my bedroom? I mean that's sort
of what's going through their minds. Okay, And yes, the
reaction by the parents initially is absolute panic. Okay, again,
(05:25):
we're in the safe space. Okay, it's not the kid
at that point. Now the parent needs to educate again
and say we have to get the authorities involved. And
my clock is now bonging in the background.
Speaker 2 (05:41):
Sorry or not, I can't even hear it.
Speaker 3 (05:42):
So oh good, So the lava layers really good?
Speaker 2 (05:48):
You're good, You're good. Well, what are are there any
other tips or advice that you think people that are
listening to this right now that what they need to do.
Besides I mean, clearly it sounds like reading your books
would be the number one place to start. But any
other tips or resources or things like that that people
should be aware of that you think are most important.
Speaker 3 (06:09):
There's a large amount of resources online for parents on
these topics, yes, and I don't have in front of
me a few right now. But I think one of
the key things is make certain you're using the privacy
controls on the game. Make certain as a parent, whether
it's a game, whether it's the iPad settings whatever that
(06:31):
they understand those privacy settings and specifically you know, so
things like advertising to young children is you know, illegal
in several countries. Okay, So knowing those privacy settings on
the systems and knowing that you're going to set up
(06:53):
the privacy controls in the game and have to sort
of educate yourself on the privacy controls and how to
actually set up all those up. Those are still really important. Okay.
We don't want low hanging fruit causing leakage of information
to someone.
Speaker 2 (07:10):
Okay.
Speaker 3 (07:11):
Helping the kids set up their account basically teaching them
how to create a strong password and how to set
up their account on the game and where on the system,
because a strong password is usually very hard to remember.
Speaker 2 (07:31):
Okay.
Speaker 3 (07:32):
Another key problem is if the password gets obtained, someone
might find access to the kid's account and begin doing
things online with the kid's account that really isn't the
kid all right? The kid might discover this later on,
Hey wait a minute, I never posted those chats, I
(07:52):
never posted pictures, I never posted any of this stuff.
You know, what's happened, And so knowing how to react
to that, whether it's contacting the game that says, hey,
the account's been compromised, take it off line, kill it
or whatever. That's going to require the parents intervention to
actually do that specifically. But if they create a strong password,
(08:17):
you know, and it's a large password that has upper
and lower case and numbers and even some symbols, these
can be really complex to maintain. So I think one
of the learning things is when they have to log
into an online game is making certain they know where
a password vault is whatever tools. There's tons of tools
(08:38):
out there. Apple has their tools, and you know, everybody's
got tools in this area as to where that password
is actually stored on the system so that the kid
doesn't have to try to remember it. It's when you
remember the password that we start getting into this sort
of problem where the account can be taken over and
potentially used. And especially if you're dealing with a chat
(09:02):
session with you know, friends online okay, and you know
you've got your five buddies online with you and you
all know them, right, but somebody takes over your account
now they're online with your friends.
Speaker 2 (09:18):
So it's just like a ball gaining steam rolling downhill.
That things can just be more.
Speaker 3 (09:23):
It really can be and and the reality is, you know,
my objective is not to create fear. No, my objective
is just to try to say you have to be
educated as to what it is you're doing with these things. Okay, okay, yeah,
and these systems. It's like if I was talking to
you as an adult and we were talking about your
(09:44):
bank account access, same thing. Okay, that sits out there.
It just we're applying this to a much younger person,
if you would, as they as they go online. So
it's not to create fear. We're talking about all the
bad things that can happen. We're talking about some stories
about bad things that you know have been expressed to
(10:05):
me specifically. But the reality is, yes, those things do happen.
Are our objective here is hey, parents, you really have
to sort of pay attention, okay, and you really have
to kind of get yourself educated. You may not be
able to use the game because the game itself may
(10:26):
require a lot of tactical tactle activity that you just
are sort of incompetent with because you don't do it
all the time. You've got better things to do with
your time specifically, right and absolutely, yeah, and you know,
for the teens, I guarantee you. The teens think they
know way more than their parents with regards to all
(10:49):
things cyber.
Speaker 2 (10:51):
Wow.
Speaker 3 (10:51):
Okay, okay, and so establishing and maintaining that communications line
is important. And that's why I said making certain anything
cyber or anything technical is an absolute safe space. Absolute
that's that's okay, is the key thing. So that's what
I would tell you.
Speaker 2 (11:10):
Okay, Wow, this is such a massive amount of stuff
out the information out there. So it seems like your
books are just a great way for parents to and
kids to learn. So tell us the names of the
books again and where people can can purchase them if
they'd like.
Speaker 3 (11:29):
So, the first book is out. It's called The Digital Detective,
First Intervention. It's available in Amazon. It's also available at
the Barnes and Noble not on the shelves though, because
I won't pay for the shelf space, but Barnes and
Noble online as well as Barnes and Noble ordered in
(11:52):
the store. It's also available as an electronic book from
Apple's bookstore.
Speaker 2 (12:00):
Okay, perfect. And then the second book is to be
out soon.
Speaker 3 (12:05):
Yeah, Well, the publisher has said that I have to
finish it by the end of October. I'm saying maybe
the first of the year.
Speaker 2 (12:12):
Okay, okay, and that's a little deeper dive the heavier topics. Okay, yep, Okay. Well,
this has just been a wealth of information, and I
so appreciate you taking the time to join us today
and try to keep everybody informed about what's out there
in the world.
Speaker 3 (12:29):
Yep. And I thank you very much for having me on, Sharon.
I'm sure the listeners at WBT Radio Carolina will enjoy it.
Speaker 2 (12:39):
We've been speaking with Tom Arnoldy as a cybersecurity expert
and author of the Digital Detective series books to help
parents keep their kids safe online, giving us all sorts
of great information to do just that. Everyone stay with us.
We've got a lot more coming up here on Carolina Focus.
Speaker 1 (13:01):
And no keeping our theme alive here on this Sunday
on Carolina Focus, Let's pull in our cybersecurity expert, Teresa Payton.
She always says good advice and information for all of
us right here on Carolina Focus.
Speaker 4 (13:20):
News Talk eleven and ten, do a nine to three
WBT and on the DOUBLEBT hotline. Here she is once
a week. We talked to her and a lot of
people across the country do as well. You see her
on CNBC The Today Show, Good Morning America, Fox and Friends.
Teresa Payton, our cybersecurity expert, founder of Forderless Solutions, Good
(13:41):
morning to you.
Speaker 5 (13:43):
Good morning. It's great to be with you, and it's
great to be in Charlotte, which almost felt like it
wasn't gonna happen last night. I was delayed almost three hours.
Oh gosh, Chicago.
Speaker 4 (13:53):
Well if you like rain, If you like rain, welcome
to Charlotte.
Speaker 6 (13:56):
Yeah, a little soupy outside.
Speaker 4 (13:59):
So I've a lot of things to talk to you
about this week, but this is one to begin with.
And you know, we actually from time to time have
been known to use a Reddit list or two on
this show. Yes, we like Reddit. It's a very useful
at times. Reddit is blocking the Internet Archive from AI scraping.
AI scraping. I know you just finished speaking at a
(14:21):
conference where AI came up left and right, and it
really does wherever you go, and understandably so, but what
is AI scraping and and why should we be concerned
with that as it relates to the Internet Archive.
Speaker 5 (14:34):
Sure well, I mean, so AI scraping. There's spots calling
the Internet all the time and they were doing it
before we had chat gpt to look for information to
give people results, but also the collect information, so just
almost like copy paste, think of, I don't know, automated plagiarism,
so to speak. But the thing about the Internet archive
(14:56):
is that is the way back machine. It is the
machine that takes pictures of the Internet and stores it
and preserves it like a copy you sort of a
historical record. And Reddit said though they felt like the
archives wayback machine might have been also grabbing information not
just for historical purposes, but for training purposes. And so
(15:19):
they are not going to allow the wayback machine to
crawl and post detailed pages, comments and profiles. All they're
going to allow it to do is take a picture
of what's on the reddit dot com home page, so
it'll just be archiving insights, but not all the things
that people said about it. So very interesting move by Reddit.
Speaker 6 (15:40):
Well it sounds like it's a privacy move by Reddit,
just trying to protect the privacy of the people who
utilize those chat boards.
Speaker 5 (15:47):
No, you're right, bet then that could be, and it
they could have had the whole Reddit user baseing, Wait
a minute, this doesn't seem fair. But again, I would
tell everybody posters, beware, if you put it out in
the digital universe, just assume delete doesn't mean delete unless
it was really important to you, and then it probably
will be lost in some computer crash and the Internet
(16:08):
never forgets.
Speaker 3 (16:09):
Well.
Speaker 6 (16:10):
I know that you said that you were in Chicago
for the last couple of days and AI came up.
But Chicago and the state of Illinois in the news
speaking of AI. Illinois has actually banned AI therapy as
some states begin to scrutinize chat bots. And you sent
us an article about these human AI relationships that are
(16:31):
just no longer science fiction. People are now using AI
in place of person to person contact, including things like
therapy sessions.
Speaker 5 (16:40):
Yeah, and again this is sort of we just don't
really have the regulations around this. So it's one thing
if you're using AI, you have a doctor and they're
recommending we're going to use this program that we have
trained as a doctor's organization who's going to help you
with therapy, so that you can have twenty four by
(17:01):
seven access. It's another thing when you create your own
chat personality and chat bot and then you're conversing with it,
and we're starting to see different articles come out. You know,
there was another there was a man looking for sort
of healthy advice and he removed salt from his diet
and was using some other alternative and he's actually very
(17:22):
sick right now. So we have to be very careful
here because just because it sounds authoritative, friendly, conversational, like
a person that's you know, your best friend always on demand,
doesn't mean that it's healthy and that it's good for us.
And that lack of regulation that we have in this technology,
it's really creating a real problem.
Speaker 6 (17:43):
There was just an article that popped up about AI
making up body parts trying to diagnose. This was a
neurological diagnosis, but actually making up body parts. And it's
kind of along the lines of what you and I
have talked about before with AI coming up with a
way to lie just to sound like it has an answer,
(18:04):
and in this particular case, it was being used to
diagnose but made up a part of the brain that
didn't exist.
Speaker 5 (18:11):
Yeah, this this one was This one was a really
rough one because this is actually something where Google was
creating a healthcare AI that you know, we don't need
to pick on Google, like all of the different platforms
are having these issues, and doctors were testing it out
and it was making up a body part that doesn't exist.
You're right, and I think that one of the things
(18:34):
people need to remember as they're interacting with tools like chat, GBT,
grock claud. You know, whatever your choice is that you're using,
is the way the engineers have created the technology. It
is supposed to give you an answer, and so in
trying to get to that, you know, the end of
(18:54):
the computer loop, so to speak, the computer program in
designing to give you an answer. It is not really
trained by most of the engineers to say, you know,
I'm sorry, I just don't know. Can you ask me
a different question? You know, back in the days, remember
when we would do Google searches. That sounds so quaint,
Beth and bo, but you would try to find something
(19:14):
or and then it would be like error you know,
linkd not sound you know, sometimes search gets it wrong
and we would see it so spectacularly when we get
an error message. Well now it's as if you know,
these JENAI programs don't want to admit that they could
be wrong, and so they just make something up in
the end just to give you an answer.
Speaker 4 (19:34):
Let me roll back just for a second before we
say goodbye. And you mentioned the Internet Archive, and I
brought it up, and then you said the Wayback Machine.
And I think we've touched on this once before, but
I think it's one of those things where somebody might
be driving along saying where exactly is the Internet Archive?
Speaker 3 (19:50):
Is it in a.
Speaker 4 (19:51):
Room with padlocks on it at the Smithsonian, you know?
Is it physically somewhere? And who decides that is the
Internet Archive? You know, and using the Internet since what
nineteen ninety five ish, and it's just so commonplace. But
then where's the server for the whole thing? And if
somebody goes in and flips the switch off, then we
all go dark. I know that's not how it is,
(20:13):
but then again, how is it?
Speaker 3 (20:15):
Well?
Speaker 5 (20:16):
You have to wonder sometimes with sort of the ups
and downs of technology, you know, I often think of
that scene and airplane where he you know, unplugs the
h airport.
Speaker 3 (20:26):
But it is.
Speaker 5 (20:27):
If anybody's interested in finding the Wayback Machine, also known
as the Internet Archive, you can go to web dot
archive dot org and you will find the nonprofit there.
Speaker 1 (20:39):
So there it is.
Speaker 4 (20:40):
It actually is more of a physical thing than we thought.
And then we thought. So that's why we love talking
to Teresa. The the incredibly complex questions and then questions
like where is the internet? And you know, how long
will it take me to drive there? All right, it's
good to talk.
Speaker 5 (20:55):
To you well, Beth and Bow. By the way, the
Wayback Machine has over nine and forty billion web pages
saved over time, so it's take you a while to
get through it. But Beth and bo, it's always great
to be with you and be safe out there.
Speaker 7 (21:15):
I'm Nick Craig, Good morning to you. Earlier this week,
at Governor Josh Stein's office announced that North Carolina received
a four million dollar grant for workforce re entry training
for incarcerated individuals, with the governor saying in a press
release quote, when we prepare people leaving incarceration for success
(21:36):
in the workforce, we all benefit. With support from this
new grant, North Carolina can continue to build a strong workforce,
improve re entry outcomes, and provide people with real opportunities
for a second chance. This funding is part of the
fifty is part of a fifty two million dollar grant
(21:56):
in funding from the United States Department of Labor's Pathway
Home Grant program, which was announced earlier this year, back
in February. The funding goes towards organizations that provide re
entry services to incarcerated individuals before their release from state
correctional facilities or county and local jails. Grants enabled organizations
(22:20):
to partner with employers to provide participants with training and
industry recognize credentials, helping them successfully transition into the workforce
and back into their communities. According to Brian Hamilton, the
founder of Inmates to Entrepreneurs, he told Carolina Journal quote, congratulations,
(22:41):
a nice press release for politicians. As far as I'm concerned,
this is four million dollars more added to the federal debt.
The challenge is not a lack of skills. It is
that the judiciary involved people for being habitually locked out
of the hiring system because companies that such as failure
to appear. The Division of Workforce Solutions DWS at the
(23:05):
North Carolina Department of Commerce is serving as the lead
grant recipient and they are going to be responsible for
overseeing North Carolina's Pathway to Reentry project. DWS will partner
with three local Workforce Development Boards Charlotte Works, Foothills WBD,
the North Carolina Department of Adult Corrections will also collaborate
(23:28):
with these partners to support the initiative. The grant will
fund a comprehensive program to help people leaving prison rebuild
their lives and to rejoin the workforce.
Speaker 1 (23:39):
The entire segment can be heard over there at the
Carolina Journal News Hour on WBT dot com. All right, folks,
that doesn't for this Sunday, have a great week. Talk
to you all next time on Carolina Focus.