loader from loading.io

AS HEARD ON WGIR-AM 610 NH Today with Jack Heath - Military Technology and the Al Baghadhi Raid [10-28-19]

Craig Peterson - America's Leading Technology News Commentator

Release Date: 10/28/2019

Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication. show art Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication.

Craig Peterson - America's Leading Technology News Commentator

First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...

info_outline
The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy show art The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy

Craig Peterson - America's Leading Technology News Commentator

Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...

info_outline
Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure show art Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure

Craig Peterson - America's Leading Technology News Commentator

Cyber security is no longer an option for small business owners – it's a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous cyber threats to small businesses and what steps you can take to stay secure. Ransomware Attacks Ransomware attacks are one of the most dangerous cyber threats to small businesses. Ransomware is malicious software (malware) that's typically delivered via malicious links or email attachments. Once installed on a network, the...

info_outline
Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI show art Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence Search Engines You Can Use For Free Today Robot Kicked Out of Court CNET and BuzzFeed Using AI Biden Signs Go-Ahead to Use Child Labor to Make E-Car Batteries The Biden administration has issued a 20-year ban on new mining claims in the upper Midwest's famed Iron Range, and it is turning to foreign supply chains as it pushes green energy projects. The move comes as the U.S. continues to rely on foreign suppliers for critical minerals used in wind turbines and electric vehicles. The ban is part of a broader effort by the White House to reduce reliance on imported...

info_outline
A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US show art A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US

Craig Peterson - America's Leading Technology News Commentator

A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers… Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security.  They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor...

info_outline
ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More show art ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More

Craig Peterson - America's Leading Technology News Commentator

ChatGPT's Technology Will Be Part of Everything This Year ChatGPT is a new text-generation tool trained on 40GB of Reddit's data. It can generate long passages of text virtually indistinguishable from human-written prose, which could have enormous implications for everything from customer service chatbots to fake social media accounts. The company behind ChatGPT is also working on ways to detect if the text was generated by ChatGPT or a human—though some experts worry about how bad actors could misuse this technology. The technology has generated random plot descriptions for video games to...

info_outline
Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports show art Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports

Craig Peterson - America's Leading Technology News Commentator

Google Ads were weaponized in a way that made them appear like any other ad – Allowed hackers to infect computers with malware via a single click. Hackers have weaponized Google Ads to spread malware to unsuspecting users by disguising them as regular ads. They do this by cloning the official websites of popular software products, such as Grammarly, Audacity, μTorrent, and OBS, and distributing trojanized versions of the software when users click the download button. This tactic allows hackers to infect users' computers with malware through a single click. Google Ads, also known as Google...

info_outline
The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google. show art The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google.

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence is changing the world. Right Now! In just a few years, it's possible that you might be chatting with a support agent who doesn't have a human body. You'll be able to ask them anything you want and get an answer immediately. Not only that, but they'll be able to help you with things like scheduling appointments, making payments, and booking flights—without any human intervention necessary. This is just one of the many ways that Artificial Intelligence will change our lives this year. We will see more businesses using AI technology to make their processes more efficient...

info_outline
Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you? show art Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you?

Craig Peterson - America's Leading Technology News Commentator

Privacy… Ring Cameras Hacked in 'Swatting' Scheme Critics and researchers say the Ring cameras are used to surveil gig economy drivers and delivery people and that they give law enforcement too much power to survey everyday life. The pair would hack people's Yahoo email accounts, then their Ring accounts, find their addresses, call law enforcement to the home with a bogus story, and then stream police's response to the call. Often, they would harass the first responders at the same time using Ring device capabilities. ++++++++ LastPass finally admits: Those crooks who got in? They did steal...

info_outline
Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized show art Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized

Craig Peterson - America's Leading Technology News Commentator

Craig Peterson  Insider Show NotesDecember 5 to December 11, 2022 China… Apple Makes Plans to Move Production Out of China In recent weeks, Apple Inc. has accelerated plans to shift some of its production outside China, long the dominant country in the supply chain that built the world’s most valuable company, say people involved in the discussions. It is telling suppliers to plan more actively for assembling Apple products elsewhere in Asia, particularly India and Vietnam, they say and looking to reduce dependence on Taiwanese assemblers led by Foxconn Technology Group. After a year...

info_outline
 
More Episodes

Welcome!

Good morning, everybody! It is a start to another week. I'm going to be very busy for the next two weeks. In fact, I'm going to be at a conference next week, all week. This week, I've got two new clients where we're visiting, we're setting up their businesses with compliance, security. You know, most businesses have compliance issues if they don't know it yet. I was on with Mr. Heath again this morning per usual and we talked about some of the technology behind this Al Baghadhi raid over in the sandbox, that of course, happened over the weekend. So here we go with Mr. Heath.

These and more tech tips, news, and updates visit - CraigPeterson.com

 

--- 

Automated Machine-Generated Transcript:

Craig Peterson 
Good morning, everybody! It is a start to another week. I'm going to be very busy for the next two weeks. In fact, I'm going to be at a conference next week, all week. This week, I've got two new clients where we're visiting, we're setting up their businesses with compliance, security. You know, most businesses have compliance issues if they don't know it yet. Oh my gosh. So it is going to be absolutely crazy. And I'm planning on doing some Facebook Lives this week, we'll see how this all works out. And I'm hoping to be able to do this master class on Friday about mobile device security. We'll see how this goes I imagine, I'll be able to get at least that done this week, as well as everything else I have to do like, put together the radio shows the guest appearances and take care of existing customers, right, man one of those weeks also putting up a new little website and just, you know, doing all kinds of stuff with my cybersecurity company anyways. And that's what that is. This morning I chatted with Mr. Jack Heath about some of the technology behind this Al Baghadhi raid over in the sandbox, that of course, happened over the weekend.

Jack Heath
All right. Joining us with some tech talk, I believe is Craig Peterson his show airs Saturday on these Iheart news-talk talk stations. Good morning, correct.

Craig Peterson 
It is. Hey, good morning. Did you hear about the technology tie into this al Baghdadi death this weekend?

Jack Heath 
No. But I imagine there's so much incredible technology. It's available to our military today. And it was an It was a very successful operation very, five months and planning. I think they tried it. They were going to go twice before and they went this time that one American soldier injured or hurt but tell us about the technology side because it was quite an operation of Rangers and Delta Force.

Craig Peterson
It really was and then as you pointed out to us Special Operations Command is had some standing plans and some of them called for the use of drones which the CIA and military have already used, of course, over there in Iraq and in Syria, Afghanistan, Pakistan, Yemen and elsewhere. But the other plans relied more heavily on certain armed forces. And in fact, that's exactly what they ended up doing. Now, there is a big difference in the how they were tracked down and in this case bag Daya he, there you go. He completely avoided the use of technology. They have gotten rid of the cell phones, the smartphones that have been used so many times in the past to track down his lieutenants as well and killed them. So apparently what happened here was that we got a tip from the wife of an Al Baghdadi aide, and one of the couriers as well that he employed. He was a long ways away from where the caliphate was, where he was guiding his troops, if you will, and that was a big surprise. So he Handy use more couriers. He had to have people going back and forth. Now, of course, those people are a lot easier to track than someone that is not using any technology. And then during the raid, or before the raid, actually, we had spies on the ground, checking things out. We of course had high altitude drones that were taking detailed pictures. And apparently, when we came in, of course, we had the gunships above the helicopters, fixed-wing aircraft that soften the target substantially. We tried to get them to come out. Have you seen this? You seen the video of the softening of the target, say that he really did soften the ground down there.

Jack Heath
Yeah, go ahead. Go ahead.

Craig Peterson

No, they really did. And they flew 70 miles all the way from this village, up to where he was his bodyguards, his love his children were spending the night and we did it at low altitude. Of course, our helicopters are able to make very, very little noise. If they Wearing on those special mufflers.

Jack Heath

Yeah, the stuff it's what they use in the in Pakistan when they went in and it's interesting Craig Peterson the Osama bin Laden raid in Pakistan same kind of low stealth-type chopper approach to choppers, in that case, the seals, they also the intelligence that went to that, because they did the same thing there were through careers. They were tracking the careers.

Craig Peterson 
Yes. Yeah. That makes a whole lot of sense. Because these guys are smart enough that if you go back to Iraq, and of course the you're the head of Iraq back at the time, it was no longer around. Yeah, yeah, exactly. There's little spider hole. But in that particular case, we were tracking him and his sons, because they were using these smart encrypted phones that we they didn't know but we had back doors to those phones using a Jupyter chip. And so we were able to track him down. We know exactly where he was what was going on. Which was what shocking all was really all about. We thought we had taken him out. Saddam Hussein and his sons right away, but we hadn't. So they have been learning over the years and they have been advancing some of their technology and and this tik tok app that's in the news right now, because it is owned by a Chinese company and apparently, tik tok, which our kids are using is being monitored by the Chinese is all kinds of problems there. But apparently, the terrorists are now using Tick Tock because of its ability to easily send messages and have them encrypted.

Jack Heath
Yeah, good stuff. Technology. Certainly in the military side, a lot of pieces have to come together for a raid like that to be successful. Thank you, Craig Peterson, enjoy your Monday. Hope you have a good one. Craig. com. Thank you, Craig.

Craig 5:52
Hey, by the way, if you want to sign up for these masterclasses, the easiest way is just go to Craig Peterson dot com slash master class. Do put it up on my homepage sometimes by click Craig Peterson dot com slash masterclass. These are the free classes that I'm putting on. They last a couple hours. Usually we get into a bit of a deeper dive, and I make sure I answer every one of your questions. None of these are available in replay. My goal here is to turn them into some paid courses, add some more content to them and things but you can attend for free if you are there for the live portion of the classes, and I think it's going to be Friday. But make sure you sign up you'll know more about it will be talking all about how to secure your mobile devices. Have a great day. We'll be back tomorrow. Bye-bye.

Transcribed by https://otter.ai

 

--- 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553