All Episodes

September 26, 2025 • 30 mins
U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
So, Dwayne, I just got back from Dubai.

Speaker 2 (00:03):
Oh wow, Yeah, that's awesome.

Speaker 1 (00:05):
I was offered forty camels for my wife. I usually
smoke Marlboros, but hey, it deal's a deal, you know.

Speaker 2 (00:13):
I don't even I don't know what say.

Speaker 1 (00:26):
Hey, welcome back at Security this week. I'm Carl Franklin.
That's Dwayne Laflatt. Patrick Hines is in an undisclosed location
right now and can't make it to a microphone, but
he'll be back next week. So episode two O four.
How you doing, Dwayne?

Speaker 2 (00:41):
I'm awesome? How are you?

Speaker 1 (00:42):
Carl? Wait a minute, is that awesome in the Dwayne way?
Or is that? Oh?

Speaker 2 (00:46):
It is? Is that it is? It's been it's been
a lot of hacking this week. So it's been it's
been awesome on top of awesome.

Speaker 1 (00:51):
Okay, that's good. All right, Well we have a few
stories here. The first one we're going to get into
is a Jaguar Land Rover hack. Right, so it stalled
smart factories, outsourced cyber security, and supply chain woes.

Speaker 2 (01:09):
Yeah, so this this one, this one's interesting. So according
to a few articles here, they're actually uh, they were
shut down because of a cyber event ransomware attack on
the land Rover Jaguar facility. Everybody in that area, this
is in the UK has been asked to kind of

(01:29):
stay home and not come into the facility for I
think it was up to three weeks and they were
losing sixty seven million dollars a week wow because of
the shutdown.

Speaker 1 (01:38):
Geez.

Speaker 2 (01:40):
What's interesting about it is taking like digging into I
always love like, hey, how did it happen?

Speaker 1 (01:46):
Right?

Speaker 2 (01:47):
How did somebody get in? Was this somebody clicked on something?
They shouldn't have somebody plug something then they shouldn't have whatever.
The Government of the UK and has been getting involved
in checking out and helping Aguar land Rover, which if
I remember correctly is owned by top To Motors out
of India. Okay, out of double checked that, but I'm

(02:08):
pretty sure. So they've been trying to help out and
at this point they're being very tight lipped about how
the ransomware was deployed. But it looks like a prior
breach from a while ago, actually from earlier in twenty
twenty five from a group called Hellcat actually had an

(02:30):
infos steeler that was stealing credentials and they're speculating the
Internet is now speculating that these are actually old credentials
that were used to gain access and they weren't they
weren't rotated. So we're gonna we're get more details later though.

Speaker 1 (02:47):
This info Steeler, is it software or hardware?

Speaker 2 (02:49):
Usually software, so it's and it can be downloaded in
a bunch of different things. It could be you haven't
updated your system and your browsing website and you know,
you get your browser gets infected. It could be you
install the piece of software. It could be you downloaded
a Steam game. Well, so showing yeah, exactly. So there's

(03:10):
a lot of different ways that these infostealers work, and
then they just lay dormant and wait for you to
you know, let's say I install Actually this is a
legitimate thing. We see a fair bit. Let's say we
have kids and those kids use our computer to download
Steam games and whatever, and when they do, when I
if an infostealer gets onto the box, then at that

(03:32):
point when I log into work right where I'm opening
out my email or whatever, just checking it on the weekend,
those credentials are stolen and then I'm kind of in trouble.

Speaker 1 (03:43):
So, yeah, so does the does it like phone home,
does it report those credentials back to someplace.

Speaker 2 (03:51):
Yeah, they do, so typically what will happen is it
will not only report back phone it phones home and
and there are different channels the phone home. We've seen
some really interesting things in the past for what we
call command and control communications. We've seen where it just
makes a web request, right, make a web request out
to an SSL you know site, so it's all encrypted.

(04:15):
That's important because if I'm running inspection at the firewall layer, right,
which most people aren't at home. I am, but most
people aren't at home where you're inspecting all of the
Internet traffic that goes out of your house. So they'll
run it over to an SSL connected back end so
you can't read that it's encrypted, and they'll send command
and control. That's pretty straightforward, just like communicating web sockets

(04:36):
to a remote web server, right, not a big deal. However,
we have seen the same style of command and control
over DNS. Right. So let's say you make a request
to resolve you know, some long server name dot hacker
dot com. Yeah, right, and that's some long server name
is actually base sixty four encrypted data. So when it

(05:00):
goes to hacker dot COM's DNS server. They take every
host name and they decrypt it and they go, okay,
now I can see who you are, right, So that's
another way to expeltrate data or expeltrait use it dns's
command and control. There are some that actually open up
Gmail accounts, so you'll have, you know, somebody on the
remote side will send an email to a Gmail account.

(05:20):
That Gmail account all of the ransomware we'll be opening.
That Gmail account will read that email and it'll be
a command for them to run, and then they'll post
something back in the drafts on that Gmail account so
that it's not sending emails back and forth. Yes, there's
all sorts of really weird ways to communicate back and forth,
and you'll get those usual names of passwords.

Speaker 1 (05:38):
So I think a subtangent of this story is how
do we as parents contain our kids PCs, laptops, whatever,
so that they're safe, but not just safe for them,
but you know, safe from us, Like how can like
you said, I would never let my kid just open

(06:03):
a tab in my browser and you know, here go
play this online game. Not that I haven't, but I
would never knowing what I know now I would never
do that, so but at the same time, I want
those kids to have PCs on the Internet so that
they can do their stuff. Is the key to sever

(06:23):
the nerve between the Internet and the local network, so
something on their computer can't reach out and touch someone.

Speaker 2 (06:31):
Yeah, that's I mean, that's a great point. And I
get asked this a lot. Here's what I've done, right,
because I have actually I have kids who have who
have interned at the Cybersecurity Company and no ways a
round system. So wow that I may have a little
bit more of a security set up than most. But
normally what I would do is you have different wireless
networks at your house, right, and we've always talked about

(06:54):
isolating IoT. Right, have your your TVs and your printers
and your whatever on a different network because you never
have control really over that firmware. Right, A lot of
the access points have the ability to do not only two,
but three or four wireless networks.

Speaker 1 (07:09):
Now they do.

Speaker 2 (07:10):
Yeah, yeah, so I will have one that's a straight
up IoT network. I have one that is the quote
unquote family network, and it's the kids the Kids network,
and then I have one for all of our critical
devices and for me, I also have a work network,
so our critical devices are like my wife's laptop computer
and that's sort of stuff where she does finance, and
I don't need people on that same net printers absolutely. Yeah.

(07:32):
But then also what I'll do is I'll allow them
a little bit of leeway on their computer. Right, so
like maybe they have administrative privileges so they can install
things because if they crush their computer, hey, it's not
hurting anything on my network. And b well they're going
to learn how to rebuild it. Right. So ye are
those are some of the things all some of the

(07:53):
things I'll do. Hey, look at you. Here's here's a
USB kego rebuild your computer. Ye, so get to learn
go ask chat GPTO right.

Speaker 1 (08:03):
Yeah, okay. So next, Fortra warns of max severity flaw
in go anywhere m FTS license servelet.

Speaker 2 (08:13):
Yeah. So this one's interesting. You know what's funny is
Carl and I were talking about this one before the show,
and I was like, I think we've done this one.
We've done this one. This is this is forda net.
It's a de serialization bug. We've done this one. It's like, Dwayne,
you got to read it a little closer. It's not
Forda net. It's for TRA and I was like, oh,
for track, So I started looking at it and sure enough,
it's still a de serialization bug. So very similar to

(08:36):
the Forda nets we were ones we were talking about
before where they actually have assigned object dot get objects
string that they're de serializing, but it's this is this
is go Anywhere, Go Anywhere's Fortra licenseed device. So if
you are running Fortra Go Anywhere and it is prior
to version seven dot eight dot four or seven dot

(08:59):
six dot three, you want to make sure that you
can go and patch, that there is a patch for it.
The CVE on this is CVE twenty twenty five, one
hundred and thirty five. That's one zero zero three five, okay,
And an attacker with a validly forged license response signature
would be able to de serialize an attacker controlled object

(09:22):
leading to remote code execution. So all that means is
if they can get a valid license from there, they
can then sign if you will, their own objects and
have those objects get de serialized into a remote code executions.
That's a little bit danger, so be careful, Go.

Speaker 1 (09:36):
Patch, Be careful, Go patch couldn't have said it better myself.

Speaker 2 (09:39):
Go patch.

Speaker 1 (09:40):
Okay, airport's latest government must say if Russia behind European
airport cyber attack chaos, Libdems demand And you can tell
because they said Libdems that we're talking about the UK.
We don't have that word over here, we don't. We're
just we just say damn liberals. Yeah. This website is

(10:02):
kind of strange because it's like a series of blog
posts and they go, you know, in descending orders so
or yeah, descending orders. So you've really got to start
at the bottom and work your way up if you
want to read this particular one. But we're this is
in sky dot com. But we're going to find another
link that's a little less uh info spastic.

Speaker 2 (10:25):
Yeah, actually there's a there's a good BBC one we'll post.
But okay, so what's interesting here is there were several
airports affected where they had issues getting the people who
were flying their bags. Baggage drop right system as well
as checking systems were down right all across the board

(10:48):
because of this cyber attack. Yeah, but what's weird is
usually like you to attack Southwest dot com right and
Southwest would have issues and that kind of sucks for Southwest,
but everybody else was okay. And in this case, there
there was a lot of issues across support like the
entire airport, and it wasn't a single airport right, Oh yeah,
there were all sorts of airports across the UK that

(11:08):
had this issue.

Speaker 1 (11:09):
I know.

Speaker 2 (11:09):
British Airways did a great job in I read an
article where they actually didn't experience well, they experienced the
issue but didn't have any issues with their flights because
they switched over to a backup system which was more
of a manual system for getting people baggage and checking
them in. So good for them for having a backup
system and being able to deploy it. But what happened

(11:31):
is the airports all use a system called MEUSE and
that MUSE system was compromised at Collins Aerospace. Once it
was compromised there, it caused issues kind of in that
for every airline using it in that area. What that

(11:51):
MEUS system does is it allows different airlines airline companies
to work together on baggage claims and check ins and
that sort of stuff. I haven't I personally haven't used
the mu's system, but it is you know, you think
to yourself. Like, there's plenty of times I've had an

(12:11):
American Airlines flight cancel and I'm standing at the gate
and I go up to the American Airlines agent and
I'm like, what do I do? And they start typing
away and they go, oh, there's a continental flight in
an hour going out to the same place. Go there, right,
And they're not searching the internet, right. They have an
internal system that all those airlines share details and data
and can move customers back and forth and that sort

(12:33):
of stuff. So my assumption is that's what this mus
system is is it allows all of these airlines to
work together for baggage shop and work together for check ins,
and they had to unfortunately, they're switch over to doing
it manually. If anybody's ever remembered.

Speaker 1 (12:49):
The manual at ten paper, right, that's true.

Speaker 2 (12:53):
They hold the bag up and go whose bag is this?
You throw it at them?

Speaker 1 (12:59):
Really had a number, there's four nine seven four.

Speaker 2 (13:03):
Ah, that's not my bag. Oh, so Needless is saying,
you know, I really hope nobody lost a bag during
that time, because chances are you're never gonna find it.

Speaker 1 (13:11):
But yeah, I was at my chiropractor the other day
and he said, yeah, you hear about this, and I said, yeah,
I hear all about it, and he says, you know
the horrible thing. I'm flying to Heathrow tomorrow and I'm like, no,
you're not. I guess again.

Speaker 2 (13:28):
You mean you're spending a lot of time at the airport, right, Yeah?

Speaker 1 (13:32):
Yeah, all right. So now we have the Sky News
and we also have one from Metro dot co dot UK.
So between those two you should be able to get
the skinny.

Speaker 2 (13:43):
Oh yeah, and I think we'll probably hear more about it.
My guess is we'll hear more about the attack vector
and that sort of stuff. I haven't seen a lot
of that announced yet, but if we hear it, we'll
let you know.

Speaker 1 (13:53):
All right, this is a good place to take a break.
We'll be right back after these very important messages or
not or not, And we're back.

Speaker 2 (14:03):
It's where we never left.

Speaker 1 (14:07):
It's security this week, and I'm Carl. It's Dwayne Patrick
is on furlough somewhere in an undisclosed location and was
not able to make it to the microphones. So let's
continue on here. Cisco warns of iOS zero day vulnerability
exploited in attacks. Our old friend Cisco I still what happened.

Speaker 2 (14:30):
I still love how Apple hasn't told Cisco they have
to change the word iOS, like, I'm sorry, you can't
use that, that's ours, even though Cisco was using the
term iOS way before Apple was Yeah, yeah, iOS for
Cisco was like the nineties, and Apple didn't show up
until like two thousand and seven with iOS something along
those lines.

Speaker 1 (14:50):
So, however, it's a capital I.

Speaker 2 (14:52):
Yeah, so fright, it's a capital I and then in
a capital OS. So this particular iOS is a Cisco
operating system. This one, This one's interesting. It is an
attacker can exploit of this particular vulnerability by sending a
specially crafted S and MP packet. So S and MP

(15:14):
is one of those if you remember the days of
Archie and Veronica and Gopher and exactly right. SNMP was
this simple simple network management protocol SNMP.

Speaker 1 (15:32):
Yeah.

Speaker 2 (15:32):
What it allowed you to do is you could make
a call to a port one sixty one that was
open on a device and it could be a TV.
While at the time it wouldn't have been a TV.
It would have been a switch or something along those lines,
or a normal computer could be running SNMP and you
could make you could see the configuration. You could say, hey,
well how are you configured. So let's say we're in

(15:53):
a massive network and we have thousands of devices. I
could run SNMP scanner and be like, just tell me
all the configuregurations of all of our switches. Yeah, and
it would pull all the configus out read only. And
then if I have the right community string and with
S and MP three the right password, I could actually
write to the configuration and say, oh, change your network

(16:15):
mask or change whatever you want.

Speaker 1 (16:17):
Sounds very powerful.

Speaker 2 (16:18):
It is. It's actually a really neat protocol. It's very lightweight.
But then there's there's a lot of really kind of
cool things you can do with S and MP. They
you have used to be able to create these S
and MP what are called SNMP traps, and you could say, oh, well,
if I don't know if CPU usage is over a
ninety five percent on this device, shoot off an SNMP

(16:42):
packet and we'll have a gatherer just looking for these traps.
So now you have this sort of network monitoring layer.
So S ANDMP has been around a really long time
and it does all sorts of great things. But what's
interesting about it is a they've upgraded the security on
it a little bit. There are now passwords with writing
to the configurations. Most of the devices don't put anything

(17:05):
in the configurations that's sensitive. So like if I pull
my printer, I've an HP printer. If I pull that
printer over port one sixty one, I can see what
type of ink it has and all that other stuff,
but I'm not going to get like the Wi Fi
password right pulling that information out.

Speaker 1 (17:21):
It's almost like finger. Remember finger another protocol that was
mostly for Coca Cola machines.

Speaker 2 (17:27):
Finger It always felt weird though, when you're like, hey,
how do you know I was on the network? I
fingered you?

Speaker 1 (17:33):
Right?

Speaker 2 (17:33):
Okay, that's odd but weird. Yeah, finger Finger was such
a word.

Speaker 1 (17:38):
It started as a protocol in college, and I can't
remember what college it was, but there were soda machines
located on specific floors of specific dorm.

Speaker 2 (17:46):
You weren't joking about the soda machine, Oh.

Speaker 1 (17:48):
Really, this is story. And so they wrote a protocol.
They installed the little finger server in the coke machine,
and they wrote a little protocol so that they could
query it and see how many grape sodas, how many
root beers, how many you know, tabs, because that was
probably a popular soda back then, tabs, you know. So
from their dorm room, they could actually just see what

(18:11):
the inventory was in all these soda machines, so they
didn't have to run across the campus and up three
flights of stairs to find out they're out of root beer.

Speaker 2 (18:17):
So, you know what I said, I've always told people
the most interesting innovations come from lazy developers. Yes, absolutely,
I'm like, you know what, I I don't feel like
walking two flights of stairs. I know I will have
a robotic arm climb the stairs for me and check
and come back.

Speaker 1 (18:32):
And then those projects are abandoned once the developers get married.

Speaker 2 (18:39):
True story, True story, you spent.

Speaker 1 (18:42):
So much time on the stupid program. Just get your
butt off the chin the machine. Yeah, you know, I'm
the first joke, And that joke may be giving the
impression that you know, somehow I resent my wife for anything,
and I don't. She is the best, the best human,

(19:04):
that's the best.

Speaker 2 (19:08):
Yes, and she puts up with Carl, which means she
has amazing.

Speaker 1 (19:11):
Patients patients of a saint's right anyway.

Speaker 2 (19:17):
So anyway, so in this particular issue, uh, there's a
way to craft the S and MP packet that if
you're a normal user, you can cause like a low
low priv user on the wrong community string type thing,
you can cause a denial of service. If you have
access to the high priv community strings, then you can

(19:38):
at that point actually execute commands. So this is definitely
go patch it. It's important. Most of this isn't going
to be available over the internet anyways, so people would
have to be on the local network, so I kind
of downgrade it a little bit, but there is a patch,
Go patch.

Speaker 1 (19:54):
If visibility was built into the protocol. Has this been
an exposed security flaw for a long long time.

Speaker 2 (20:01):
Well, that's a good question. I don't think so. They
obviously haven't come out with like totally what the breakdown is.
But from what I'm seeing here, one of the flaws
that was fixed was actually a JSON cross site scripting
style flaw, right, so that's fairly new. And the other

(20:22):
flaw was a buffer overrun but more in a lot
of their newer controller sort of features. So I don't
think this has actually been around too too long, but
I don't know yet, don't quite.

Speaker 1 (20:32):
Yeah, Well, go patch anyway, go patch go. Okay, now
you you said something about Steam. Steam is the place
where people download games, and this one particular game, Block Blasters,
was infected and it downloads malware disguised as a patch.
So not it's like the coupdi gras and that hey,

(20:54):
you should patch for security reasons exactly, and then the
patch drinks the malware.

Speaker 2 (20:59):
Yeah, that's no good. This one's this is our This
might be our fourth. This is either our third or
our fourth story about Discord. Not sorry, not Discord. Actually
the story came from Discord, so I'll be handing out
some more lock picks here shortly, because a couple of
our stories came from Discord users. But this story. We've

(21:21):
seen this about three times now where we see a
Steam game, and a lot of times the Steam game
is free, which is an unusual on Steam, right because
they have micro purchases and all sorts of other things.
So it's a free Steam game where you can download
it and play it and that sort of stuff, and
you're asolutely right. What's interesting about Steam is you don't
actually typically get the choice to decide whether you patch

(21:43):
or not. The game auto patches the next time you
play it, which sounds awesome right from from a security
this week standpoint, like, that's what we want. We want
auto patching. We don't want you running what was it,
Call of Duty? The last time we saw.

Speaker 1 (21:56):
There was a yeah I think so.

Speaker 2 (21:57):
Yeah, there was a way to buffer overflow the lobby
and take over somebody's computer. We don't want you playing
that game. Once a patch comes out, we want that
patch out there. But the problem with this one is
there was an infos stealer, right, a trojan infostealer that
was going out and grabbing information about crypto wallets you
may have, right, and honestly, I'll tell you right now,

(22:19):
if you have a crypto wallet and information on it,
a password should be locked down, a password manager, yeah, right,
and the wallet should be offline if you can put
it on multi.

Speaker 1 (22:30):
Use lockers or whatever.

Speaker 2 (22:31):
Yeah, exactly. The folder, yeah yeah, just keep them completely secure.
There's no need to just have them kind of sitting around. Yeah,
because this, this will happen, But we're going to see
more of these attacks because as crypto is getting higher
and higher and higher, Right, attackers, you're now starting to
focus more on stealing the crypto than either mining it

(22:54):
or getting it through ransomware. Wow right, so.

Speaker 1 (22:56):
Wow, So was the maker the pass the same individual
or group that made the game or was it? Like
if and if that's so, then are we you know,
is the game maker liable for that? Like what happened?
You know what I would think would happen, was you know,

(23:19):
there was a GitHub repo or something where somebody found
a problem and said here, I've uploaded a patch and
that was the thing that had the malware in it.

Speaker 2 (23:29):
Well, so it's interesting. It's not really clear yet and
Steam will have to So I actually am a Steam creator.
I actually have stuff I've written and I have on
Steam and have thousands of subscribers and all that stuff.

Speaker 1 (23:42):
Wow cool.

Speaker 2 (23:42):
So when I go to post my and actually, interestingly enough,
it's in a game where you can write ce sharp
in the game, like real c sharp wow in the game,
and the game runs it in a sandbox. And I
have been doing my darness to find my way to
break through that sandbox. There's actually a couple of ways
to do it. But anyways, which I'm not doing in
my as all my subscriptions go down, I'm not.

Speaker 1 (24:05):
Doing it would be even more awesome.

Speaker 2 (24:07):
Twain, Yeah, just jump out of the sandbugs. So I
do know when posting content though to the workshop, I
do all of my files do get scammed? Now, does
that mean that the automated they're also usually available within
a couple of minutes? Does that mean the automated what
they call static analysis. Is that static analysis actually smart

(24:29):
enough to pick up some pretty crafty malware? I don't
know that it is right. You always have to do
static and dynamic analysis, and in this case, I think
the static analysis probably misses this.

Speaker 1 (24:39):
So okay, so don't play block blasters.

Speaker 2 (24:43):
No, no, maybe avoided for a little while.

Speaker 1 (24:45):
All right, So here's our top story. The US Secret
Service dismantled an imminent telecommunications threat in the New York
tri state area that's New New Jersey and Connecticut. And this,
if they hadn't have caught it could have been absolutely
horrible or awesome in Dwayne's.

Speaker 2 (25:06):
Mind, Yeah, or awesome or awesome, depending.

Speaker 1 (25:09):
On how you look at it.

Speaker 2 (25:09):
Right, what happened here, this one is super interesting. So
the Secret Service, I don't know if they got tipped
off or how they got tipped off the right now
it is an active investigation. Actually, we'll have the link
to Secret Service dot gov to the article specifically for
this and the agent in charge of the New York
Field office is like, there's a video of him kind
of giving a rundown of all the details. But in

(25:33):
this particular case, there were more than three hundred what
they call co located SIM servers, and there's a picture
of these. They kind of look like wireless routers, but
what the SIM server has the ability to look like
a cellular tower, right, So there's all sorts of ways
to actually take over the telecommunications area in that area.

(25:58):
I don't know, we've talked about I believe stingrays maybe okay.

Speaker 1 (26:02):
Refresh our memory though. Those are things that emulate sell
sell points.

Speaker 2 (26:07):
Yeah, yeah, exactly. They're things that emulate cell towers. They
used to be about the size of a buick. You
would put them in the trunk or you know, the
back seat, and it was pretty big and you had
a pretty short area, maybe a couple miles, but you
could look you would look like a cell tower and
everybody'd route through you. Now there's protections in your phone
that A don't want you to connect to that cell tower,

(26:28):
and if you do, are going to try and encrypt
the data that's going through that tower and do frequency
homping and all this other good stuff. But the tower,
the quote unquote tower, the fake tower, the stingray is
going to force your phone to downgrade its protections. Oh hey,
I'm the cell phone tower. I don't support the latest
and greatest. Can you just downgrade? Most phones will do that, right,
So that's generally bad and the user doesn't then know

(26:49):
unless they're really kind of paying attention to the screen.

Speaker 1 (26:53):
And it's the older protocols that are the vulnerable protocols.

Speaker 2 (26:56):
Right, yeah, exactly. There are some weird five five G
side channel attacks. Wait, yeah, I can talk about that. Well,
Patrick's not here I can talk about that, so wait,
there's the never mind. I won't go into any of those.
But needless to say, there are some attacks on later networks.
It's they're not as prevalent. So in this particular one A,

(27:18):
not only could they spin up and look like cell towers,
but they also had one hundred thousand SIM cards active,
so they could legitimately look like one hundred thousand users
at any point in time doing something. And according to
the Secret Service, like I said, they're kind of holding
a lot of this type to the vest. Not only
were they in a particular in New York, but they

(27:40):
were very close to where the UN meetings are happening,
and there was a lot of communications with foreign nationals
actually live and happening on those those listening devices. So we'll,
I'm sure hear more about this. Absolutely go to the
Secret Service article we have the Secret Service dot gov.
There's some really cool pictures. Uh, if you want to

(28:01):
see what what does a SIM farm look like? Yeah,
you'll see they they kind of look like massive wireless
access points.

Speaker 1 (28:09):
Uh, it's like a candy store. Yeah, right, literally looks
like sheets of candy.

Speaker 2 (28:15):
Do you remember those those buttons on paper. It kind
of reminds me of that, like those like little candy
buttons on paper. Yeah, but needless say, yeah, there's a
lot of tech in that that one room. I think
the guy who is running is probably sterile though.

Speaker 1 (28:29):
It is probably because there's it's just so much MS
stuff happening there.

Speaker 2 (28:33):
Right, But the racks of those that is such an
awesome picture, Just racks and racks and racks of these
these co located SIM towers. Yet, right, they do so
good on the Secret Service and and honestly, whichever divisions
of you know, secret societies outed this because this is

(28:55):
pretty awesome. Is a good find. A lot of this
can be harder to detect, especially if it's turned on
and then turned off relatively quickly. To identify them, we
the United States government, we do have some listening stations
around major cities that can triangulate bad EMF to a

(29:18):
particular location, so we can see these things. It's not like,
oh my god, we got to mobilize six guys and
have them have you know, antennas pointed in different areas
and like cross it off on the map. We don't
do it anymore.

Speaker 1 (29:30):
In the black helicopters we're telling down the building yeah
not needed, yeah, or we just they're like there's always
listening stations where like hey, that signal came from over there.

Speaker 2 (29:39):
But it's still it's not as easy to detect these
things as you'd think. So yeah, yeah, all right, it's
all I got, Carl, that's it.

Speaker 1 (29:47):
All right, Well, that's that's all I got too. I
guess that means we're we're out of time, and that's
it for security this week this week, and join us
next week for security this week.

Speaker 2 (29:55):
Next week, which will be our last week before the
week that we're in Orlando that week live live ye,
so looking forward to that.

Speaker 1 (30:01):
And then we want to see you. We want to
see you at Universal Yes, all right, take care, thanks
you next time. Bye bye bye m.
Advertise With Us

Popular Podcasts

Stuff You Should Know
Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

CrimeLess: Hillbilly Heist

CrimeLess: Hillbilly Heist

It’s 1996 in rural North Carolina, and an oddball crew makes history when they pull off America’s third largest cash heist. But it’s all downhill from there. Join host Johnny Knoxville as he unspools a wild and woolly tale about a group of regular ‘ol folks who risked it all for a chance at a better life. CrimeLess: Hillbilly Heist answers the question: what would you do with 17.3 million dollars? The answer includes diamond rings, mansions, velvet Elvis paintings, plus a run for the border, murder-for-hire-plots, and FBI busts.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.