Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:03):
Six thirty one. If if you have KRC the talk
station and Happy Wednesday, listen to Lunch Wednesday one week
from today Jim and Jackson the River and every Friday
at six pot thirty. We here from Interest i T's
Dave Hatter, who provides valuable information to listeners who are
willing to listen to it and heed his advice. Also
warns us about threats and concerns out there in the world.
(00:25):
That's what he's all about. And interest I T is
the business out there, the business courier says is the
best in the business for businesses who have computers. That's
everybody keep you out of troubles and do best practices,
and that's what it's all about. Dave Hatter. You're doing
a seminar empower You America dot orgs taking place seven
pm tomorrow evening. Log in or show up at empower
You Studio at Scarlett Oaks. That's three hundred Great Oaks Drive.
(00:47):
Dave Hatter, welcome back to the program.
Speaker 2 (00:49):
My friend, Hey Brian. Always good to be here. It
seems a little weird on.
Speaker 3 (00:53):
Wednesday, but you know, happy to talk about empower You.
Glad to his team invited me back again. This will
probably be like I don't have seventh eighth time I've
been out there.
Speaker 1 (01:02):
Yeah, and he said, you're one of the most popular
presenters on empower youth seminars. I know it's a very
well attended whether people show up in person or log
in from home, it's very well attended because of the
advice you hand out. And I want to emphasize this
because you know, every once in a while, I sometimes
want to interject on Fridays because you'll talk about some
tech thing that is beyond my understanding. You're like a
(01:23):
piece of God kind of a comment, like, wait a second.
You are going to use relatable examples and you're going
to be talking to non technical The pretext for this
is you're going to be addressing an audience that you
perceive to not have all of this technical background and
make things easy to understand and applications practical and easy
(01:44):
to adopt.
Speaker 2 (01:46):
Well, that's exactly right, Brian.
Speaker 3 (01:47):
And obviously, rather than trying to cram three different topics
into less than thirty minutes on the radio, we've got about.
Speaker 2 (01:54):
An hour and a half.
Speaker 3 (01:55):
You know, we're going to talk on cybersecurity stuff like
we always do. And I'm going to dig more into
the privacy side of things, because you know, that's an
important topic to me as well. But where we're at society,
with all the constant attacks and so forth we see
on the cybersecurity front, I generally tend to focus more
on that than privacy because I think there's more risks
to each of us as individuals, to our organizations and
(02:18):
to our society. And to your point, you know, I've
got a lot more time. I'll be there in person,
and I'm going to try to show as many real
world examples as possible. Like you know, I think we
talked about this last Friday. I've recently created a blog
post where as I get these ridiculous scammy texts, right,
and I'm sure you're getting them. I'm sure all your
listeners are getting them. The unique ones I will take
(02:41):
a screenshot of and dump them out on this blog.
So I'll walk through some of this and try to
explain not only why is this happening for reasons like
it's easy to spoof the phone number, it's hard to
look at the text and what it's legitimate, talk about
some of the social engineering behind what they're trying to
do and.
Speaker 2 (02:58):
You know what you should do about.
Speaker 3 (03:00):
Well, it'll be the same kind of things you and
I talk about all the time, but a lot more depth,
a lot more detail, and frankly, the ability to get
anecdotes from folks in the audience and to dive into
these things and more depth as well as at the
end try to say, Okay, here's all the things you
need to know to protect yourself against this, because you know,
I think, Brian, one of the most interesting things is
(03:22):
to not go to a presentation, seminar or whatever you
want to call it and listen to someone like me
thron on for an hour. It's to have people in
the audience talk about real world things that have happened
to them or someone they have.
Speaker 1 (03:34):
Yes, interactive, that's the greatest thing about the seminar you're
putting on. I mean, maybe someone's experienced a hack or
a relative or something, and you can address that specific
illustration as a way of explaining to people how to
avoid the situation altogether.
Speaker 2 (03:49):
Yeah, exactly.
Speaker 3 (03:50):
I love to hear those stories, and I think it's
more impactful on the other people there, because again, it's
not me telling you some story that supposedly happened, or
what I think might happen, or be afraid of this
or whatever else. Here's someone who's saying, this is the
thing that happened to me. And I'll tell you interestingly enough,
was doing some cybersecurity training for a client yesterday for
(04:10):
their employees and actually had someone in the room say
that their mother became a victim of one of these scams.
Oh there's fraud on your bank account. We're going to
fix it, you know, And and then she like, well,
we're going to need you to go to the bank,
and they actually sent an uberh my woman up, God
took took her to the bank and it was you know,
(04:31):
the bank teller realized something was wrong, called the Bone
County sheriff. The sheriff shows up, and you know, if
it weren't for that, possibly they would have stolen all
of this person's money.
Speaker 2 (04:40):
So when people.
Speaker 3 (04:41):
Say this is far fetched and it can't happen to me,
this doesn't really happen, or you know that sort of thing,
or that these people aren't that the people behind the crime,
right aren't professional con artists and they're not evil and
we'll do or say anything to get your money again.
I'll tell more real world stories like this, things I've
either seen or that someone has told me, because again,
(05:04):
my goal is for you to leave aware of all
the threats that you face out there, because sadly, there's
a lot of them, and then have some actionable, concrete
steps you can take to protect yourself, your family, your business,
and again our larger society since we're increasingly digital with
everythings that are connected. That's what I'm shooting for.
Speaker 2 (05:23):
And again, hopefully there'll be a lot of conversation.
Speaker 3 (05:25):
You know, I encourage people to ask questions along the
way or say, hey, you know that thing you said
right there, could you explain that in more details? So hopefully,
hopefully it's not just me talking the whole time. It'll
be a very interactive type of conversation. We'll get some
more real world stories, and there'll be lots of examples
of the kind of things that we see as a
business that I see and here talking to folks out there,
(05:48):
so that hopefully when you leave, you'll be a lot
better off intense of the ability to secure yourself.
Speaker 1 (05:53):
Then when you showed up, great, Now I want to
hold you over if you don't mind, I have a
couple of topics I want to find out if you're
going to address. But I also have this. I wanted
to get your reaction to the Secret Service dismantling this
weaponized SIMS farm that was designed to shut down the
entire New York City sell network and just kind of
sixty one five KRCD talk station Tomorrow night, seven pm
(06:13):
empower Youamerica dot org. Or show up at the empower
You Studio three hundred Great Oaks Drive. That's a Scarlet
Oaks campus and sit and listen to Dave Hatter give
you sound, easy to understand rational advice. Dave, initially, let
me just ask you. Are you going to provide a
handout written materials, a link to maybe some of the
links or ideas and concepts you discussed during the seminar
(06:36):
tomorrow night.
Speaker 3 (06:38):
Yeah, Brian, I'll have a PowerPoint Slidewek's got all this stuff,
including a bunch of links and resources for people at
the end, because I know there's no way anyone's going
to remember all the stuff right. And then I'll I'll
give that slide deck to the empower you team and
they can distribute it to anyone that wants.
Speaker 1 (06:54):
To fantastic, and I want to recommend folks follow you
or go to linked in and follow Dave because you
post things throughout the week that are very important in
great information. So another resource for people generally speaking on
matters technical. Now, I was curious to know. I am
so worried. You know, thankfully my children are adults, but
I'm sure they still deal with online content themselves. But
(07:16):
are you going to provide any information for parents to
protect their children from this dangerous and sometimes quite awful
online content.
Speaker 3 (07:26):
Well, I usually don't delve too much into the content
aspect of.
Speaker 1 (07:30):
It, but I like apps or ways that, you know,
the people can reg or at least follow what their
children are doing online or on their cell phones. I mean,
you know, like like spyware that you can use as
as a responsible parent, anything along those lines. I don't
want to put you on the spot and force you
to do it, but yeah.
Speaker 2 (07:47):
Yeah, that's fine.
Speaker 3 (07:48):
Here here's what I'll do. I'll bring it up and
ask if anyone is interesting that because you speak, you know,
this is a bunch of middle age to older people
that show up, and I just don't normally go down
that path.
Speaker 2 (07:59):
I'm more focused.
Speaker 3 (08:00):
On here's what you should do to protect yourself, your money,
your business, that sort of thing. So we can certainly
throw that in, you know, talk about printal controls from
the cell phone providers, software, internet.
Speaker 2 (08:13):
Providers, all that sort of thing.
Speaker 3 (08:14):
But yeah, I don't, I don't typically get too deep
into that.
Speaker 2 (08:17):
That's similar word to ask about it.
Speaker 1 (08:19):
All right, though, how about for personal privacy privacy protection?
Will you Are you going to explain or dive into
maybe vp ns and password managers, which comes up regularly
on the segment you do here. Good, Yeah, I.
Speaker 3 (08:31):
Would definitely cover that both of those things specifically. And
one of the things I'll do, Brian is talk about
because you know, a it's one thing for the software
platforms et cetera we use as a business and interust
then it's a different thing for the things I'm using
for my own personal stuff that's not business related. So
I have a slide and I'll talk about all the
(08:52):
different things like proton protons, VPN, the Brave browser, you know,
things that you can use that are free or low calls,
that are more privacy and security friendly than some of
the big tech platforms like Google, Chrume, you know, we
you know, I'm not a huge fan of Google, right,
and generally try to steer people away from their offering.
(09:12):
So yeah, I'll get into a lot of that sort
of thing again, talk about the stuff I'm using, why
I think it's better.
Speaker 2 (09:18):
Uh.
Speaker 3 (09:19):
And one of the big points I always try to
make during thing is you know.
Speaker 2 (09:22):
When it's over, you get the slide deck.
Speaker 3 (09:24):
And even if you don't come, you know they'll post
a slide deck.
Speaker 2 (09:26):
You can have it.
Speaker 3 (09:27):
I don't care because my goal here is to just
educate people. But you know, you don't have to take
my word for this stuff. There are sites like c net,
c n et or zd net, Zelta, Zeta, Deco, Delta Net,
Tom's Guide, PC magazine is Zoomer Reports.
Speaker 2 (09:44):
We have editors and experts that will talk about this.
Speaker 3 (09:47):
So what's the VPN?
Speaker 2 (09:48):
Why you need one? What's the best one?
Speaker 3 (09:50):
You can get all of that information online from reputable
sources if you know where to look. You don't just
need to have a nerdy bed like me.
Speaker 1 (09:56):
Right, and you didn't have a pencil in your hand
when he rattled off all but all the different sites
that will provide helpful information, you will put it in
your slide deck. So that's what I was open for.
Speaker 3 (10:06):
All right, it is correct.
Speaker 1 (10:07):
And moving away from the seminar again and Poweroamerica dot
org for all the details. Make sure you register. I
saw the Secret Service release this information. They seized three
hundred SIM servers and one hundred thousand SIM cards across
multiple sites. This happened in I believe it was in
New York, and they pointed out that this could have
disabled the entire cell phone network. Can you just give
(10:29):
me a general my listeners and me a general understanding
of what this is? And this is obviously a huge threat.
I doubt this is the only battery of servers and
simcards that could do this.
Speaker 3 (10:39):
Yeah, I think this is really disturbing, Brian.
Speaker 2 (10:42):
I don't know if you've seen.
Speaker 3 (10:43):
This started to hit the internet late last week. The
National counter Terrorism Center put out a release. It's not
hard to find this that you go look. NCTC supports
US law enforcement first responders by sharing intel product aimed
at deterring attacks by Al Qaeda. And there's sort of
a high level press release and then there's a document
(11:04):
that goes into more detail warning about possible terrorist attacks
on the homeland. Now, this came out late last week.
Is that a coincidence? Is this SIM thing related? I
don't know. Could this SIM thing be an example of
the sort of things that they're planning maybe? I found
this very disturbing when it hit the news. So SIM
means subscriber Identity module and it's basically a chip in
(11:27):
your phone that allows your phone to connect to a
cellular carrier's network for.
Speaker 2 (11:31):
EYES and T Mobile whatever.
Speaker 3 (11:33):
Right, So this Secret Service announcement came out I'm reading
directly from a posting on the United States Secret Service
website US Secret Service that's mail's imminent telecommunications threat in
New York Tri state area. It says three hundred co
located SIM servers and one hundred thousand SIM cards across
(11:53):
multiple sites. So basically, what they've built here is a
bunch of servers that have these SIM cards in apparently
one hundred thousand, so imagined one hundred thousand cell phones, gotcha,
one hundred thousand cell phones that are potentially sending out
the spamy texts that we just talked about. Want to
know why you're getting more of those? Well, it could
be because there's one or more of these sorts of
(12:16):
send server farms. Out there just spewing this garbage out
because it's easy and because this kind of capability exists.
But the real threat, as they mentioned, I'm going to
read to you directly from this, these devices can be
used to conduct a wide range of telecommunications attacks. This
includes disabling cell phone towers, enabling denial of service attacks,
and facilitating anonymous, encrypted communication between potential threat actors and
(12:39):
criminal enterprise.
Speaker 2 (12:40):
So if you had one.
Speaker 3 (12:41):
Hundred thousand of these things and you basically pushed a
button and they just started sending stuff.
Speaker 4 (12:47):
All the same time, denial of service attack right, all
at the same time, possibly millions or tens of millions
of messages being sent from these things, calls, made, messages, whatever,
overwhelming the segular network.
Speaker 3 (13:00):
And you know, for those of you who've seen the
Dark Night movie, if you recall like they you know,
set up a distraction while they do something else, you know,
could there be a terrorist attack and then this basically
shuts down the cellar network, or it shuts it down
in advance of that. I don't know, and I'm not
not predicting that. I'm just saying, when you see what
(13:20):
the National counter Terrorism Center is saying, and then you
find something like this conveniently near the U N conveniently
near the UN meeting where President Trump is going, and
the you know the ability of this to potentially brown
out or blackout critical services because everything goes to the
telecom network. Now, it's very concerning to me, and you know,
(13:43):
is this the only one out there?
Speaker 2 (13:44):
Well? Who knows?
Speaker 3 (13:45):
Because honestly, Brian, if you would have asked me a
week ago, is something like this possible, I'd have said, well,
I guess it's possible, but I've never heard of such
a before. And it shows you the creativity and potential
danger that these Harris type cells could create.
Speaker 1 (14:02):
It really is a frightening, frightening reality. Appreciate Dave Hatter
what you do, and I'm sure you're a seminar to
be well attended. I can't encourage my listeners enough. Seven
pm tomorrow evening. Empower Youamerica dot org is where you start.
Speaker 2 (14:14):
Dave.
Speaker 1 (14:14):
Thanks for your time today and I appreciate you doing
the seminar tomorrow night.
Speaker 2 (14:18):
Always my pleasure. Hopefully a bunch of people show up.
Speaker 3 (14:20):
Remember you can attend versally if you can't get out,
And I'll talk to you Friday.
Speaker 1 (14:25):
I'm looking forward to that already, Dave Hatter. Every Friday
here at fifty five caresee dot the talk station at
six point thirty. Take care, Dave,