Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:03):
All Henry, Welcome to the XI Zone, a place where
fact is fiction and fiction is reality. Now here's your host,
Rob O'Connell.
Speaker 2 (00:30):
Welcome back. Your dreams were your ticket. Uh, Welcome back
to that same old place that you laughed about. Well,
the namies have all changed since you hung around, but
those dreams have remained and they turned around. Dot been
(00:54):
aga dot.
Speaker 3 (00:57):
Where we need job.
Speaker 2 (01:01):
Tascuse. We got him on spun. Welcome bad, Welcome back,
Welcome back.
Speaker 4 (01:09):
Welcome and welcome back to our number two of the
X On. My name is Rob McConnell, coming to you
from the broadcast center of the x ON Broadcast Network
and on your hometown radio, Classic twelve twenty streamed around
the world on Classic twelve twenty dot ca A. We're
going to be talking about cybersocial identity and personal protection
this hour. My guest is Robert Cisleano and he's appeared
(01:34):
on CNN, Fox News, CNBC, MSNBC, ABC World News Tonight.
Let me see Good Morning America at the New York Times,
Wall Street Journal, Time Magazine, Fortune, Forbes, Entrepreneur, and many others.
The website is Safe for Me, Safer dot me, s
A f R dot M e. N. Robert, Welcome to
(01:56):
the XON, sir.
Speaker 3 (01:58):
Good good day to you. Thank you so much for
the opportunity.
Speaker 4 (02:01):
It's our pleasure. This is a big problem these days,
cybersocial identity and personal protection. How did you get involved
in this.
Speaker 5 (02:08):
Robert Oh, I've been engaged in personal protection really ever
since I was a kid. My story is kind of
an evolutionary, you know process. At the age of like twelve,
I was with my little brother and my dad let
us get in the train and we went into downtown
(02:29):
Boston to do some shopping. And you know, back then
you could do that and not really worry about it.
Speaker 3 (02:35):
And we got off the train in.
Speaker 5 (02:37):
The center of downtown Boston and five kids approached us
and demanded that we give.
Speaker 3 (02:43):
Them our money.
Speaker 5 (02:45):
I was really not prepared for that, and I, you know, refused,
and they beat me up and they took my money,
and I go home all kind of beating up. My
dad sees what happened, and he sat my brother and
I down and explain to us that, you know, those boys.
He made us watch like the Mutual of All MAHA's
(03:06):
Wild Kingdom, right, which was a PBS show on you know, animals,
And I'm watching like the lion attack the antelope and
the planes of the serengetti. And my dad said to us,
he says, see that antelope, that that's you and your brother.
See see the lion, that's the boys. And he said,
(03:29):
like it always has been, it is and I always
will be like that. And your job is to recognize
who's the predator. And you need to understand that you're
always going to be looked at as being the prey,
and so you need to understand personal protection and self defense.
So he got us into karate and kickboxing and and
we learned how.
Speaker 3 (03:48):
To protect ourselves.
Speaker 5 (03:50):
And over the years, I started to see like young
women in my life that had been sexually assaulted. Okay,
and here I am, I'm just a teenager and a
young teenager, and I know girls that had been you know, raped,
and mind you, like I'm fifty five, and so this
is what're going on, like you know, forty plus years ago,
(04:12):
and we didn't have conversations about sexual assault back then,
like it just wasn't a thing that discussed, Like we
didn't even know about sex, never mind rape. And so
I kind of like asked my dad, like what is
going on here? And I got, I got the birds
and the bees conversation enforceable rape in the same dialogue,
(04:33):
And so at an early age, you know, having this
knowledge all had a very profound effect on the way
I viewed the world. And so from that point on,
like it just became a mission for me as a
teenager to teach all those around me what they needed
to know in regards to personal protection. So from from
my own victimization to seeing other people victimized and now
(04:57):
knowing that, like, somebody's got to do something about this,
or having a sense or a feeling that like I
felt like I needed to do something, and really.
Speaker 3 (05:04):
From that point on it just became a focus and
a mission.
Speaker 5 (05:07):
And then over the next like fifteen years or so,
my small business got hacked in the mid nineties, and
it just like everything just kind of came together in
such a way where there wasn't anybody doing anything about
it to my knowledge, and I just felt like my goal,
my mission when it came to personal protection was not
(05:29):
just physical violence in the real world. It was all
it became, you know, in the virtual world as well,
you know, and that became like preventing hacking and identity
theft and it just kind of evolved over the course
of you know, ten fifteen years and here we are,
you know, forty years later, and this is what I
(05:50):
do explanation.
Speaker 4 (05:52):
Robert is a security expert and private investigator with thirty
years of experience, a number one best selling book author,
and I'm a on com of five books, and the
architect of the CSI Protection Certification, a cyber Social Identity
and Personal Protection security awareness training program. He is a
frequent speaker and media commentator, and he's the CEO of
(06:15):
s A f R dot me and the head trainer
at Protection Now LLC. Robert, How has the the Internet
changed our personal security? And what do we need to
do about it?
Speaker 3 (06:32):
Yeah, so this there's a bunch of things going on there.
You know.
Speaker 5 (06:35):
The the World Wide Web is just that it's it's
it's worldwide and it's open to everybody. And so what
you post, what you like, what you share, what you
put out there, it's available for.
Speaker 3 (06:52):
Everybody to see.
Speaker 5 (06:54):
And so there are a number of implications, uh, in
regards to.
Speaker 3 (07:01):
Your information being out there. Right, so we know there
are what we call.
Speaker 5 (07:07):
Information brokers that sell our data, right, and then of
course the social media, this Facebook to Twitter, the LinkedIn
and all of these sites.
Speaker 3 (07:18):
We you and I are the actual product.
Speaker 5 (07:21):
You know, the majority of these sites, like the social sites,
are free for us to engage in, right, But we
are the actual product.
Speaker 3 (07:28):
We are what's for sale.
Speaker 5 (07:30):
And so your name, your address, your phone number, your
email address, right, what you like to eat and consume
in shows you like to see, in music you listen to,
and pretty much anything and everything about you is all
being compiled and disseminated and categorized and being.
Speaker 3 (07:52):
Sold and marketed.
Speaker 5 (07:54):
And that has a number of privacy implications, and in
some cases at all also has security implications as well.
And those are two very different things, you know, Privacy
being like what people know about you and how they
can exploit that data and invade, you know, your personal privacy,
(08:14):
or exploit that data and actually physically invade you and
your data in such a way where they can steal
your identity or.
Speaker 3 (08:24):
They can even burglarize your home, you know.
Speaker 5 (08:28):
And so knowing all of that, knowing the informations out there,
knowing that everything you put out there is being looked
at and used and potentially abused in some way, should
make you pause before you actually engage and put it
out there to determine how could this be used against
me in a number of different.
Speaker 4 (08:46):
Ways, Robert, how is artificial intelligence going to work when
it comes to the brokering of personal data and the
implication it might have on hacking in the future with computers.
Speaker 5 (09:00):
So right now, what I'm seeing in the initial stages
of it is that.
Speaker 3 (09:08):
We know chat GPT right yeah.
Speaker 5 (09:11):
Uh, chatpt is a well known you know brand at
this point, and there's also what's called fraud GPT and
fraud gpt is is is also a brand.
Speaker 3 (09:21):
Uh.
Speaker 5 (09:21):
It may not be an incorporated brand, but it's a brand. Uh,
and it is one that it is one that is
being sold and broken on the dark web. And so
right now, studies show that there are as many as
two hundred right now, and there could be very more
as as as as of the show. Websites or brokers
(09:45):
or companies or service providers that are providing AI based
tools to commit fraud. So, for example, AI based tools
that might create fake AI voice clones, fake AI video,
(10:06):
fake email, or phishing emails, all designed to con vince
you and I to give up that user name in
past Coode to fork over our credit card information. They
pose as FBI, CIA Secret Service, uh you know, whatever
whatever your version of the I r S might be,
(10:29):
and so forth, and they are designed to trick us
to give up our personal information to.
Speaker 3 (10:37):
Provide them a wire transfer and so forth.
Speaker 5 (10:41):
And that right now is happening as we speak. And
just over the past six months in Hong Kong, a
company exec was was was convinced that he was speaking
to fellow employees at another regional division and ultimately wired
(11:06):
twenty five's the equivalent of twenty five million dollars.
Speaker 3 (11:10):
Wow, yeah, that just happened.
Speaker 4 (11:14):
Holy cow.
Speaker 3 (11:16):
Yeah yeah.
Speaker 5 (11:16):
And now think of it like this, you know, just
think if you are contacted by what you think, are
you know colleagues, Yeah, okay, and and via email or
even via telephone, and you know, and they in the
voice of the colleague sounds like your you know colleague
over the phone, and then they send you off a
(11:38):
follow up email right which you know, as all the
the markers of it's your colleague, like, the signature looks right,
the email address looks pretty much right, like everything about
the email looks like at your colleague. And based on
the phone call you just received from them, that was
their voice.
Speaker 3 (11:55):
You're like, yeah, this is my colleague.
Speaker 5 (11:57):
And then the colleague says, hey, let's set up a
zoom because we've got like some significant transfers that we
need to make you know. And in that process, right,
they set up a zoom call.
Speaker 3 (12:10):
And that zoom call.
Speaker 5 (12:12):
Right, video obviously, and the faces and everybody you're looking
at is everybody who you know to be your colleagues
now based on a phone call, based on an email,
and based on video where you're actually looking at the person. Yeah,
(12:33):
you know what this person looks like. You would do
what that person requested, because why wouldn't you.
Speaker 4 (12:40):
Okay, listen, Robert, I've got to take a break here.
Please stand by. This is very interesting and dexonation. This
is going to be one hour you will not want
to miss. Our guest this hour is Robert cis Liano,
and we're talking about personal security, social security, cyber security,
and personal protection. We'll be back on the other side
(13:03):
of this breakast. The exon continues right here on the
Xcell Broadcast Network on your hometown radio Classic twelve twenty
around the world on Classic twelve twenty dot CAF.
Speaker 2 (13:13):
We got him on the spot welcome back, Welcome back,
Welcome back, Welcome back, Welcome back, Welcome back, welcome back.
We always could spy.
Speaker 6 (13:43):
Amna Jins of Barl Queens, Baby Pop Salesmans.
Speaker 4 (14:14):
Welcome back everyone. Our guest is Robert Ciciliano and we're
talking about cyber crime, social identity and personal protection and theft.
And Robert, before we went to the break, you were
telling us that you know that if some if you
receive an email from somebody that you know, and you
check the email address and it looks like the legitimate one,
(14:37):
the signature on the email looks like the legitimate one,
and not only is this done, but then there's a
zoom meeting set up and you look at these people
and you hear these people and to the best of
your knowledge, these are the people that you work with.
Now you've received the email, you've received the request, you
(15:00):
you've done the chat, and are you telling me that
this is all fraud?
Speaker 7 (15:07):
M hm.
Speaker 5 (15:08):
That's what's that's what that that is what has happened.
That is what is happening, and that is what is
going to continue to happen. That is coming at a
high rate. So all the technology that we enjoy today
UH is evolving.
Speaker 3 (15:26):
Faster than.
Speaker 5 (15:30):
We as I guess, the consumer, the consumer public are
capable of understanding in a way where we are unable
to differentiate what's real and what's not. And that's a
(15:52):
huge problem because we've become so accustomed, over the course
of our lives.
Speaker 3 (16:00):
To believe what shows in the mail.
Speaker 5 (16:04):
And then eventually, as we had television, we believe what
we see on TV, and as we have radio, we
believe what we hear in the radio, and as we
have telephone, we believe what we hear in the telephone.
Speaker 3 (16:17):
And now with the Internet, you.
Speaker 5 (16:18):
Know, we've certainly learned that there are all kinds of
frauds and scams, that you're not supposed to believe what
you receive via email or via chat, and that not
everybody is who they say in online dating, and and
all of that is like all lessons that we learned
through pain if we get scammed or defrauded or or
(16:38):
betrayed or lied to and so forth.
Speaker 4 (16:40):
Right, yep, but go ahead, ai, oh.
Speaker 5 (16:44):
Man with AI you can like growing up, my mother
said to me, you know, believe nothing of what you hear,
m h in half of what you see, okayat and
now you can almost believe nothing of what you hear
and nothing of what you see. And I'm not you know,
(17:04):
spreading fear, uncertainty, in doubt. This is happening and it's
awesome and it's awful all at the same time.
Speaker 4 (17:14):
You know, there's been the Nigerian Prince scam, email scam,
and the number of email scams are crazy. Then you
get the telephone calls. It's a robotic voice that says
it's the Canadian Revenue Service. They've done an audit. You
owe them so much money. Or the grandparents scheme where
they get somebody to they call up, representing themselves as
(17:37):
a member of law enforcement and they tell the people
that their grandchild has been arrested and they need so
much money in order to basically make bail. And these
are all different schemes. And I'm telling you, I was
a cop before I did broadcasting. Back then, our biggest
thing was bounce checks. You know, we didn't have the
(18:00):
technology that we have today. And I can only imagine
the amount of caseload that the Internet has actually dumped.
On the lapse of federal, local and municipal police forces
as well as you as a private investigator.
Speaker 5 (18:16):
Yeah, and that caseload just keeps piling up. And the
majority of the time, you know, local law enforcement they
can't even they don't even bother dressing. They'll fill out
a police report and that's the extent of it, because
you knowine, not out of one hundred times it's crossing
state lines and it's out of the uridis, out of
(18:37):
the jurisdiction, and beyond that, you know, it goes to
federal whatever that might be. And even with federal they're
not even approach, they're not even dealing with anything unless
there's been losses in excess of one hundred thousand dollars.
And even then, if it's an individual, they're usually not
going to follow up on it. If it's an entity,
(18:58):
they might and and really the only follow up that
they might do is to see if the if that
particular crime is related to other crimes and if it
can help them connect the dots to a larger organized
entity that's responsible for for a variety of different frauds.
And and even then, uh, it might be uh, you know,
(19:21):
perpetrated from Russia then what or China?
Speaker 3 (19:25):
Now what nothing, there's nothing, You're not gonna get any
cooperations from Russia or China, of course not so.
Speaker 5 (19:30):
So you you end up having you know, millions to
billions of dollars and losses for consumers that you just
have to, you know, suck it up.
Speaker 3 (19:39):
There's nothing that they can do. Uh, and there's no reimbursement.
Speaker 5 (19:43):
They might they might sue somebody, you know for the
depending on where that transfer of cash might occur. And
uh and ultimately, you know, it gets tossed out of
court because the judge finds the consumer, you know, just
they made a mistake.
Speaker 3 (19:58):
Uh.
Speaker 5 (19:59):
It just gets uglier and uglier by the day. And
the primary issue here is is is not the technology.
It's not the advances in technology. The fundamental issue that
we have here is that human beings, you and I
we trust by our nature. And it is that fundamental
(20:23):
trust that we are born with, that we possess, that
we that we that we live by. You know, as
an as an interdependent species, you and I require that
we trust one another.
Speaker 3 (20:37):
We we need that in order to survive as a species.
Speaker 5 (20:41):
Without fundamentally trusting each other as a species, we would
we would falter, we would eventually dissipate, we would not
pro create, We would not function, we wouldn't be able
to get out of the house interact, we would eventually
die off.
Speaker 3 (20:58):
You understand that, like you, that you perfectly do so
so so not trusting each other. Not trusting each other.
Speaker 5 (21:06):
Is actually a learned behavior, right when when when we
are young, something happens when we are young, generally, like
it could be like, you know, four or five, six,
seven years old, you're playing with another with another child,
and that child hits you, That child hurts you, that
child takes something from you, and you are in physical
(21:26):
pain or you've been betrayed, and you cry and you
are hurt emotionally, whatever it might be. And and and
you learn that Johnny is not to be trusted. So
next time you see Johnny, you're like, whoa, I gotta
stay away from Johnny. He's like a mean little kid.
And and we we learn through that physical pain, through
that that hurt, through that betrayal, that some people aren't
(21:46):
to be trusted. But here's the deal, we still want,
in need to trust others. And even though we know
that Johnny is to be trusted, sometimes we may still
give Johnny the benefit of the doubt, you know, and
when he does it again we're like, Okay, I'm done
with Johnny, you know, but still we want to trust Johnny.
(22:07):
And the point of all this is that throughout life
we pretty much trust everyone in every situation that we're in,
including when the phone rings and an email comes in,
and when you get a text message, and when you
visit a website, and when you get something in the mail,
and when somebody knocks in your door, and so there
(22:28):
are so many opportunities for those who are really not
worthy of our trust, and those who are not worthy
of our trust, those who are look at about ninety
by my calculations, about ninety seven percent of the world's population,
ninety seven percent of the world's population are worthy of
our trust. And then about three percent three percent we
(22:50):
would consider social.
Speaker 3 (22:52):
Path psychopath and hardcore narcissist.
Speaker 5 (22:55):
And those are the people that do not experience empathy, sympathy, guilt,
or remorse, meaning that by their nature they are just bad,
by their nature not to be trusted, and they capitalize
on the other ninety seven percent as a way to
make their living, as a way that to function, as
(23:17):
a way to get what they want, to fulfill their
needs throughout their entire lives, and we still give them
the benefit of the doubt.
Speaker 4 (23:23):
This must be easy picking for members of organized crime.
Speaker 3 (23:27):
Oh yeah, and they understand that.
Speaker 5 (23:31):
Ninety seven percent are going to open up the email,
They're going to click the link, they're going to download
the file, They're going to respond to the to the voicemail.
They're going to engage because we want in need. Nobody
wants to get in trouble. Everybody wants to help. Everybody
wants to do what they're supposed to do. When somebody
in authority, FBI, CIA, Secret Service, whoever it might be, right, CRS,
(23:53):
what however it might be, responds to us or calls
us or connects with us, we are going to do
what we are told to do because we don't want
to get in trouble.
Speaker 3 (24:05):
You know.
Speaker 4 (24:05):
But where does it come to a point where consumer
be aware?
Speaker 5 (24:10):
Right now, yesterday, ten years? You know, it's always consumer
be aware. And that's fundamentally what I teach and the
message that I provide is be aware. And it is
ultimately your responsibility. It is my responsibility. Your government's not
there to protect you, you know, law enforcements not there
(24:31):
to protect you. They're just not They don't protect When
the phone rings, you're on your own. When the email
comes in, you're on your own. When you get that
text message, look at it's you are on your own.
And so when consumers begin to wake up and understand that, yeah,
it is up to me to protect myself from predators, thieves,
(24:57):
violence and theft, whether it's in the physical or virtue world,
that's when you begin to recognize risk effectively. And most
people don't.
Speaker 4 (25:09):
You know, it's a hard world out there, and I
think I love what you're doing because you're out there.
You're saying, listen, there are ways, but you have to
take affirmative action in order to protect it. I will
help you all I can, but at the end of
the day, the responsibility is yours. Robert, please stand by
(25:29):
you and I have to take a break at the
bottom of the hour and excellanation. Our guests this hour
is Robert Ciciliano and his website is s A f
R dot m E.
Speaker 3 (25:43):
How do you say it to have Robert, it's a
say for me, s A F R dot m E.
Speaker 4 (25:49):
Now, for all of our listeners in Canada, there is
a place where you can go to see the latest
scams report the latest scams, see what law enforcement is doing.
And the site is by the Canadian government. It's called
the Canadian Anti Fraud Center. The Anti Fraud Center collects
information on fraud and identity theft. They provide information on
(26:13):
pasting current scams affecting Canadians and they say, if you
think you've been a victim of a fraud or a
scam reported, all you need to do is go to
any of the search engines and check for Canadian Anti
Fraud Center. And Robert and I will be back on
the other side of this break as the xone continues
from our broadcast center and studios in Saint Catharine's, Ontario, Canada,
(26:37):
on the XON Broadcast Network and your hometown radio Classic
twelve twenty streaming at Classic twelve twenty dot ca.
Speaker 8 (26:43):
Amnagins of bar Queenium.
Speaker 9 (27:10):
Cool late night, so long ago, when arms not so strong,
you putting to moming, never seen us so blue and black.
We're not run LT's see we've seen each other in
the dreams. Be lacking new to me? You look back
you me yeah longer, girl said with a smile. You
(27:40):
have to love me and let's get out. But try
to understand stand try to trid understand them a magic.
Speaker 3 (27:58):
Winter. Thanks.
Speaker 4 (28:00):
If you've been defrauded by telephone, by Internet, by somebody
knocking at your door, or by one of the many
fraudulent websites out there, that you've been conned or deceived
out of your hard earned money, there is a place
where you can go. It's called the Canadian Anti Fraud
Center here in Canada. It's sponsored by the Canadian Association
of Chiefs of Police as well as the Government of Canada.
(28:23):
And Robert, thanks very much for joining us. At what
age or how do we start teaching our children to
be aware in this new iPhone age?
Speaker 3 (28:35):
Yeah, so, you know, look at I am.
Speaker 5 (28:42):
A dad, I've got a fifteen year old, I've got
an eighteen year old. And my kids didn't get their
first phone until they were fourteen, okay, And I still
think that that's even a little too young, right. And
the reason why they even got a phone at fourteen
(29:02):
was because they were getting on the train and going
into Boston and we needed, you know, to maintain connection
with them, certainly, and the iPhone provided GPS, and it
just it gave us, like really some really good insight
as to their location, and it allowed us to texting
and just a great communication tool.
Speaker 3 (29:21):
And certainly, you know, you and I didn't have GPS
as a kid, and you know, none of that was necessary.
Speaker 5 (29:27):
But we are in a different world, and so we
made that investment in them and taught them right and wrong,
and you know, and still no social media, Like they
were not allowed to have social media on those devices,
not until they turned sixteen.
Speaker 3 (29:44):
And so the eighteen year old has social media, but
the fifteen still does. The fifteen year old still doesn't.
Speaker 5 (29:50):
And that's because they have access via their digital devices
to way more than they should.
Speaker 3 (29:57):
You know, you know, you and I didn't have access
to way more than we should when we were in
our teens.
Speaker 5 (30:03):
And their brains just aren't capable of absorbing all the
information that's coming at them and all the stimuli and
all of the back and forth and all the nastiness
that goes on in the digital realm. And I've read
all the books and all the studies and all the
white papers and the blue screens. For our kids is
(30:26):
just messing with them in a number of different ways.
Suicide's gone up dramatically, and it's just it's not good.
And so I and and all that said, I receive
a communication from a friend, you know, somebody who I
grew up with, who has a ten year old, and
she says, she, you know, because of what I do.
Speaker 3 (30:45):
She reaches out to me and she says, so, what.
Speaker 5 (30:48):
What software do I put on my iPad, you know,
for my tent on my daughter's iPad, so that like
I can monitor.
Speaker 3 (30:56):
What she does.
Speaker 5 (30:57):
And I says, well, My response was, why does your
ten year old have an iPad? Like, what's the point
of that?
Speaker 8 (31:05):
You know?
Speaker 3 (31:06):
And and and what I see over and over and
over and over.
Speaker 5 (31:09):
Again is that parents are using digital devices for their
kids as a babysit exactly, and they don't really understand
the implications of what's going on there, you know, they
don't understand how like that that.
Speaker 3 (31:25):
The way the games in the in the in the
websites and everything else social media is is is built.
Speaker 5 (31:33):
It's wired to get you to interact in such a
way where it affects like chemicals in your body, your psyche,
you know, your doorphins like it. It's it's designed to
get you to react, It's designed to addict you.
Speaker 3 (31:51):
And if if parents don't recognize that as an.
Speaker 5 (31:55):
Adult in their own lives, and how they gravitate towards devices,
and how they gravitate towards social and how they gravitate
towards the likes, and how they can't stop checking their phones,
and what do you think is doing to a kid exactly?
Speaker 4 (32:10):
You know, my wife and I go out and she'll say,
do you have your phone on with you?
Speaker 3 (32:15):
Well?
Speaker 4 (32:15):
No, you're the only person that I really am interested
in hearing from, and you're sitting beside me in the car.
Why would I bring my phone?
Speaker 5 (32:22):
Yeah, you know, and unless you're in a business where
you need to be on call, why is it that
you need your device with you?
Speaker 3 (32:34):
Twenty four to seven.
Speaker 4 (32:35):
That's right here in Ontario. Do you want to hear
something really stupid, Robert, I'm listening here in the province
of Ontario, the Minister of Education said no more cell
phones in the classroom or in schools. A lot of
parents said, yes, finally, get back to learning, get back
to teachers teaching. And now there's a group of parents
(33:00):
that are starting a class action suit against the government
Ontario for infringing on the rights of their children to
have iPhones in school.
Speaker 3 (33:10):
Yeah, and it's those parents that really don't have a
clue right now.
Speaker 5 (33:14):
My the the the elementary schools that my kids went
to didn't and they went to private.
Speaker 3 (33:21):
School didn't require required no phones, no phones, no phones allowed.
Speaker 5 (33:27):
Okay, the public schools they allowed the kids to have
the phones in their lockers. Uh and and and and
some of them, you know, allowed locally allowed the private
kids to have schools in the private I'm sorry, phones
in the classroom too.
Speaker 3 (33:43):
And uh.
Speaker 5 (33:44):
And from my perspective and from what I've been told
and what I've observed and everything else that i've you know,
what I'm privy to, it's messy.
Speaker 3 (33:52):
It's it's it's messy, and there's a lot of problems.
And uh.
Speaker 5 (33:57):
And the school and where where where my kids went
to school, not as many problems, not as messy, like
just not as much drama, not as much.
Speaker 3 (34:04):
Distraction, you know.
Speaker 5 (34:06):
And it is all that messiness and all that distraction
and all that bullying and all that everything that the
kids use against each other and what they're addicted to,
that is just causing a lot of problems. And if
you're not paying attention to those problems, then you're part
of the problem.
Speaker 4 (34:26):
When I was young, Robert and I was going to
high school. We had a dress code. All the boys
had to wear gray flannel pants, white shirts with the
school colored tie, black shoes. The girls wore uniforms as well.
I think it was a gray skirt and white blouse
and a sweater school colors. There was no competition to
(34:54):
see who was wearing the best running shoes, or who
had the best this, the best thought or the other thing.
And if you needed to call home, you didn't need
a cell phone because Mum and Dad always made sure
you had a dime on you, and God help you
if you spent that dime on anything on a call
to call them at home. Where did we go wrong?
(35:16):
Where do you think that society went wrong?
Speaker 3 (35:20):
Well, you know, we we live in a capitalistic society, and.
Speaker 5 (35:27):
You know, we've got all these companies that are kind
of pulling at us and offering all these various you know,
I guess, technologies and conveniences and toys and everything else,
and and and we, as you know, humans gravitate towards
(35:47):
shiny and new, and so as all of this is
introduced into.
Speaker 3 (35:53):
Our lives and into our culture, we just consume and
that changes the way we do things. You know. I mean,
there's certainly the bicycle change the way.
Speaker 5 (36:04):
We do things, and then the car change the way
we do things, and then the factories changed the way
we do things. And of course, you know, the Internet
changed things dramatically, and we continually have these new normals, right,
and these new normals aren't necessarily good for us, And
(36:26):
we don't necessarily recognize how this new normal is detrimental
to our well being until it's a bit too late,
you know.
Speaker 4 (36:36):
Yeah, well, I think it's a little bit too late
when you go into a restaurant you've got a mom
and dad and maybe two or three kids, and they're
all playing with their iPhone or they're all too busy
with their iPhone in order to sit down and actually
talk and have a conversation with their children at a dinner.
Speaker 5 (36:51):
Yeah, and we haven't even talked about the privacy and
security implications of any of this.
Speaker 4 (36:55):
We've talked about it, I know, And I think it's
very important for us to talk about the sick purity implications.
So how do we take what you do, your expertise,
and how do we how do we get people to
better understand the dangers.
Speaker 3 (37:14):
I think the parents need to kind of slow down.
They need to slow down. They need to look at.
Speaker 5 (37:21):
The fact that you know, their twelve year old daughta
is in her bedroom at you know, ten to eleven
o'clock at night, whether they realize it or not, she's
potentially communicating with somebody. And that's somebody that she's communicating
either is or isn't what he or she says they are. Yeah,
at a minimum, at a minimum, that's what you need
(37:43):
to begin, you know, and that the the Internet allows
for a tremendous amount of inanimity. And so if you
are not privy to what's going on in your twelve
year old daughter's bedroom at eleven o'clock.
Speaker 3 (37:56):
At night, and you think she's just sleeping, maybe she is,
maybe she isn't.
Speaker 5 (38:04):
And you know, this is not me like trying to
instill fair uncertainty in doubt in people.
Speaker 3 (38:11):
I am, unfortunately the guy on the.
Speaker 5 (38:13):
Six o'clock news that's talking about what happened in this
neighborhood to this family as a result of you know,
they're not paying attention to their daughter's digital devices and
then something really bad happened. And the reality of it
is is that you know, I did a study with
McAfee anti virus not too long ago, right, and that
(38:36):
study boiled down?
Speaker 4 (38:39):
Yeah, where are you there? It looks like it looks
like we just lost Robert Craig. Can you please try
and get him back? And what we'll do is we'll
go to our commercial break because it was pretty well timed.
Speaker 3 (38:51):
Craig.
Speaker 4 (38:52):
Robert Cisliano is our guest. We're getting Robert right back
as we speak. And this is wait a sec, what's
going on here? Hey Robert, welcome back?
Speaker 3 (39:03):
Hey show what happened at my apology?
Speaker 4 (39:07):
No, no problem were We just decided to go to
a break, So if you could stand by, we'll be
right back after this very short break. In exponation. Our
guests this hour is a Robert Ciciliano and we're talking
about cyber security, social identity and personal protection. And his
website is sa fr dot me. This is the X Zone.
(39:29):
I'm Rob McConnell and once again, if you'd like to
contact the Canadian Center for the Canadian Anti Fraud Center,
just go to any search engine and type in Canadian
Anti Fraud Center. It's jam packed with information, tells you
what the latest scams are, what to look out for,
(39:49):
how to protect yourself and of course if you need me,
you can actually file a report there. The X Zone
a place where people dared to believe and dare to
be heard. We'll be back on the side of this
very short break as we wrap up this hour here
in the X Zone from our broadcast center and studios
in Saint Catherine's, Ontario, Canada, on the X Zone Broadcast
Network and on your hometown radio, Classic twelve twenty and
(40:13):
streamed around the world on Classic twelve twenty dot c
Don't go.
Speaker 9 (40:16):
Away cold late nights so long ago, when i'ms not
so stream? Bad boss, what's a wall?
Speaker 2 (40:41):
What will you send some roamcome for you?
Speaker 8 (40:49):
Mean?
Speaker 5 (40:50):
What's you going to do?
Speaker 7 (40:57):
Bad boss?
Speaker 3 (40:58):
Bad boys? What's it going to do? What's he going
to do when they come for you? Bad voice?
Speaker 9 (41:03):
Bad voice?
Speaker 3 (41:04):
What's he going to do?
Speaker 4 (41:05):
What's he going to do when they come explanation and
Robert Ciciliano is our very special guest this hour, And
once again, Robert, thanks very much for coming on and
for doing the great work that you do. Are we
still issuing the mass of fraud and identity identity theft
from people who are having their information taken from their
(41:29):
credit cards, magnetic stripping by people who or the RF
chip by people who actually have the RF chip readers.
Does that still going on or have the banks and
all the credit institutions been able to foil that?
Speaker 3 (41:44):
Yeah?
Speaker 5 (41:44):
So the chip card, right, the chip card, if you're inserting,
there's a few things going on here. If you're there's
three different, three to four different technologies in your credit
cards these days.
Speaker 3 (41:57):
Uh Now, First of all, I personally.
Speaker 5 (42:00):
Don't worry about credit card fraud, meaning like if my
card gets compromised, you know, my bank card gets compromised,
my credit card gets compromised. I'm not worried about that,
meaning like I'm paying attention to my statements. I'm monitoring
my transactions. I get what's called push notifications. So push
notifications mean every single time there's a charge or a
(42:22):
transaction of any kind regarding my bank card, regarding my
credit card, I get a either a pop up via
my mobile like an app like an American Express app
or Bank of America app or whatever it might be,
and that lets me know that this has just been
a charge. I get a pop up, or I get
a text message, or I get an email like I
get some type of a notification in real time with
(42:42):
all of my charges. Okay, So with that I react
or respond if there's a problem, meaning like if I
don't recognize that charge or that withdrawal or that transferad
up the case might be, I will contact that entity
and say, hey, that wasn't me.
Speaker 3 (42:58):
Okay.
Speaker 5 (42:58):
So push notification are the best resource tool to you know,
I guess, mitigate whenever fraud occurs, because you can't prevent
card fraud. You can't, like, there's no way to stop
somebody from using your card if they have access to it,
and they get access to it via you know, a
(43:19):
point of sale that has a skimming device, and ATM
that has a skimming device, a data breach where some
a retailer or you know, they have a massive leak
of their information and millions.
Speaker 3 (43:32):
Of credit cards with thousands of credit cards are leaked.
Speaker 5 (43:34):
So all of that risk that you face every time
you use your card is there, and the only way
to mitigate it is with push notifications or just pay
attention to your statements via the web, you know, log
in every day or every month or whatever it might
be a way for your paper statement whatever it might be. Okay,
So that's like the protection aspect of things, like you
(43:57):
can't protect yourself, but you can mitigate it. Set up pushifications,
check your statements, pay attention to that stuff, and you're
good as far as like, how does the fraud occur?
Speaker 3 (44:05):
Right?
Speaker 5 (44:05):
So that the cards themselves, You have the card which
has a chip these days, right, that's that's the default
of the de facto.
Speaker 3 (44:16):
Method of reading the card these days. Now, do you
guys still have the magnetic strip.
Speaker 4 (44:23):
On some cards?
Speaker 3 (44:24):
I believe, Yeah, So in the US we still have
the magnetic strip on all of our cards.
Speaker 5 (44:31):
So all the point of sale terminals still still read
the magnetic strip, but primarily they.
Speaker 3 (44:39):
Would prefer you insert your cards. So it's reading the
chip right now.
Speaker 5 (44:44):
The chip can't can't be compromised, The chip can't be
read by a skimming device, the chip can't be decrypted,
and the chip can't really be hacked, and and the
card itself can't be compromised, meaning you can't clone a
(45:06):
tip card. Okay, but what you but what is still
extremely vulnerable is the magnetic strip. The magnetic strip is
no more secure today than it was twenty years ago.
And the magnetic strip, if it is skimmed either at
an ATM or at a point of sale, which is
which is still a real problem.
Speaker 3 (45:25):
And I've actually commented on the media on.
Speaker 5 (45:28):
TV just three times in the past two weeks where
Walmart and various supermarkets in the area have all been
compromised and and and they are at the cards that
are at risk are generally the ones.
Speaker 3 (45:44):
That are swiped opposed to inserted. Okay.
Speaker 5 (45:47):
So that magnetic strip is the data is in plain
text and it can all be read by a skimming device,
and that information can be burnt onto a blank card
and or the data itself.
Speaker 3 (46:02):
The sixteen digit card number, the.
Speaker 5 (46:06):
CVV code, and the actual expiration date, all of that
data can be read via the magnetic strip and then
used in a virtual or online transaction.
Speaker 3 (46:18):
Okay.
Speaker 5 (46:20):
And so there's the risk there which requires you to
really pay attention to your statements. And then beyond that,
you have the RFI D, the radio frequency identification technology,
which is which is tap to pay right or wave
to pay, and that is equally or it's a step
down from the actual chip encryption, but it is for
(46:45):
all intents and purposes equally as secure, meaning you're going
to have a hard time decrypting the Tap to pay.
Has there been situations where r FID has been compromised. Yes,
are the sleeves that you might get and insert your
card into a sleeve that that is designed to prevent
(47:09):
your tap to pay or your RFID from being read
provide a bit more security.
Speaker 3 (47:15):
Certainly, am I worried about that? Not at all.
Speaker 5 (47:18):
I'm not worried about tap to pay or why wireless
RFID being compromised on my card because the likelihood of
it being compromised is really, really slim. It takes a
tremendous amount of effort to get that data. Really, it's
the magnetic stript that's the little hanging fruit. And as
long as you're inserting your card, paying attention to your
statements using r f I D or the tap to pay,
(47:41):
you should be good.
Speaker 4 (47:43):
How safe are using websites such as Amazon and Team?
Speaker 3 (47:50):
So?
Speaker 5 (47:50):
I am you know a consummate shopper, you know, like
anybody else that like likes a bargain or likes to
find the best price.
Speaker 3 (48:02):
I'll bounce between eBay and Amazon and Timu and all
other sites that you know. I'm I don't call myself cheap.
Speaker 5 (48:10):
I call myself definitely frugal, you know, with a with
a with a fifteen year old and an eighteen year old.
Speaker 3 (48:17):
I've got expensive you know, mouths to feed.
Speaker 5 (48:19):
Yes, And I learned about something called Lulu Lemon not
too long ago, which is a retailer that sells one
hundred and forty dollars leggings, and apparently my daughters with
those two and so I'm always looking for a bargain.
That being said, whenever I enter my data on any
of these sites, I'm okay with it, you know, and
(48:40):
keeping in mind that it's your ultimately, it's your credit
card that's at risk. And like I said, I'm not
worried about credit card fraud now. I'm just paying attention
to my statements and I'm getting push notifications. So in
the end, as long as I am being made aware
in real time of these charges and I refute or
potentially refer unauthorized charges if it's unauthorized, then I'm good.
(49:03):
And that's really all you need to be concerned about
in regards to your cards and your card data.
Speaker 3 (49:10):
Just pay attention.
Speaker 5 (49:11):
But studies do show that not out of ten people don't,
and that's where the risk is. If you are not
on top of your charges in real time. Do you
really know of all the different places where you use
your card at the.
Speaker 3 (49:26):
End of the month.
Speaker 5 (49:27):
Are you going to recognize the name of all the
merchants at the end of the month. And the names
of the merchants don't always reflect the places in which
you shopped or the restaurants that you visited. So that's
one of the other benefits of monitoring your transactions in
real time.
Speaker 4 (49:44):
Robert, we have about three minutes left, and in your opinion,
what are some practical tips to engage in personal protection.
Speaker 5 (49:52):
Well, for one, you know, password management is a big deal.
So when it comes to personal protection as it relates
to your data and your dollars and your identity, password
protection is huge. Password management is huge. And that means
number one, never using the same passcode twice. And when
I do my presentations in front of a live audience,
(50:14):
and I do those, you know, fifty sixty times a
year to large you know, audiences of one hundred to
one thousand people, and I say to them, and I
ask them at the very beginning of my presentation, show
of hands, and I raise my hand because I know
what my answer is. Going to be how many of you,
by show of hands, can honestly say that you are
using a different passcode for pretty much.
Speaker 3 (50:33):
All of your online accounts.
Speaker 5 (50:35):
And when I ask that question, generally less than ten
percent of the audience raises their hand, which means ninety
percent or ninety plus percent of the audience is using
the same passcode across multiple accounts. And that is the
proverbial kiss of death, because there I have been about
one hundred and fifty billion records compromised in the past decade. Okay,
(51:00):
and those one hundred and fifty billion records, those are
my records, those are your records.
Speaker 3 (51:04):
It's all of our sensitive information.
Speaker 5 (51:06):
It's our credit card data, it's our usernames, it's our passcodes.
And if your pastcode DA singular is compromised on one
of any ten accounts that you possess, all ten accounts
are now vulnerable because your username, say, being an email address,
and your passcode being whatever that passcode is for all
(51:27):
of your accounts is now in the hands of criminals
and they just log into your accounts. You have to
use a password manager in order to manage all the
different accounts that you have.
Speaker 3 (51:39):
In creating a different passcode for all of your various accounts.
Speaker 5 (51:43):
Password management really is the worst thing about us when
it comes to our digital security, and because we're just
so lazy about it, or we don't even know a
password manager exists, or we're scared the password manager.
Speaker 3 (51:55):
Is going to get compromised.
Speaker 5 (51:56):
But in the end, really it's the password manager that
you need in order to manage your digital life, in
your digital identity.
Speaker 4 (52:03):
As happens when I have a great time with a
guest that goes by so fast. Robert, thank you so
much for being on the show tonight. I hope that
I have the pleasure of talking to you in the future,
and please keep the great work up. And thanks for
being there for us and bringing all this information to light.
Speaker 3 (52:18):
My ap pleasure.
Speaker 5 (52:19):
Thank you so much.
Speaker 4 (52:20):
Take care of yourself, Robert, and explanation if you'd like
to get more information about our guests this hour Robert Cisliano.
His website is SAFR dot me. Now once again for
the Canadian Anti Fraud Center. All you need to do
is go to your Google or whatever browser you use
and just type in Canadian Anti Fraud Center. Well, let
(52:42):
me see. Also, the X Chronicles newspaper is available with
our compliments at www dot x chronicles dot net. So
until tomorrow night, my friends. As always, time goes by
so fast when we're having five and that's why we're
here Monday through Friday from ten pm until midnight from
(53:05):
the x Stone Broadcast Network studios in Saint Catharine's, Ontario, Canada,
right here on your hometown radio, Classic twelve twenty and
streaming at Classic twelfth twenty dot CA. You can also
go to xedbn dot net and check out the other
fine programming in that we produce, and it's all there
for your entertainment with our compliments. So until tomorrow night,
(53:27):
remember always keep your eyes to the sky and your
heart to the light. Good night everyone, let you out
into the world.
Speaker 7 (53:37):
Closing Time, Turn all of the lights on over everyboy
and every girl. Closing Time, One last call for alchem
also Finisher, Wisty of Beer. Closing Time and I