loader from loading.io

2021-03-22-wgir-why is the biden administration changing tune about foreign hackers

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Release Date: 03/24/2021

Google FLoC, AI Gemini, and Election Integrity: Protecting Digital Democracy show art Google FLoC, AI Gemini, and Election Integrity: Protecting Digital Democracy

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Welcome to today's episode where we dive into the rapidly evolving world of technology and its impact on privacy, history, democracy, and consumer behavior. Join us as we explore the implications of Google FLoC cookies on online privacy, the dangers posed by AI Gemini in altering historical narratives, the role of technology in ensuring election integrity, and the influence of platforms like Temu on the online shopping experience. Google FLoC Cookies: Understand how Google's FLoC technology is reshaping online privacy and targeted advertising. Dangers of AI Gemini Changing History: Discover...

info_outline
Solar Storm Apocalypse? Myth or Reality? Protect Your Grid (and Life) show art Solar Storm Apocalypse? Myth or Reality? Protect Your Grid (and Life)

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Have you ever considered the impact of a powerful solar storm or an unexpected Electromagnetic Pulse (EMP) on our way of life? This article dives deep into the resilience of our electric grid in the face of these potential threats, exploring the concerning "what ifs." Solar Flares and EMPs: Disrupting Our Connected World Solar Flares: These are massive eruptions of energy from the sun's surface. A powerful enough solar flare can induce electrical currents in our power grids, potentially causing widespread blackouts and damage to transformers. Electromagnetic Pulses (EMPs): These are bursts of...

info_outline
eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks show art eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

  Chris's $10,000 smartphone hack is just one instance of a concerning trend of cyberattacks. Today, we're delving deep into eSIM technology, a game-changer in mobile privacy and security. Cybersecurity Concerns: The rise in hacking incidents highlights the urgent need for robust cybersecurity measures, especially in the mobile space. eSIM Technology: Exploring the intricacies of eSIMs reveals both their potential and the security challenges they present. Online Privacy: With eSIMs becoming more prevalent, understanding their impact on online privacy is crucial for users. Combatting...

info_outline
Disappear Online: Expert Tips for Digital Cleansing! show art Disappear Online: Expert Tips for Digital Cleansing!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

  In today's digital age, our online presence can become cluttered and overwhelming, affecting not just our digital identity but also our cybersecurity and privacy. Let's delve into the expert secrets of digital cleansing to ensure a safer and more secure online journey: Understanding Digital Clutter: Learn how digital clutter impacts your life and why it's essential to tidy up your online presence. Cybersecurity Concerns: Uncover the risks posed by unchecked emails, unused accounts, and shares, and how they can compromise your cybersecurity. The Importance of Online Privacy:...

info_outline
Defend Your Digital Domain: Transforming Home Networks for Cybersecurity show art Defend Your Digital Domain: Transforming Home Networks for Cybersecurity

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Is your home Wi-Fi a potential cyber threat? Let’s bolster your network's defenses! Here's what you'll find in this guide: Privacy Concerns: Understand the risks associated with a vulnerable home network and the importance of safeguarding your personal information. Wi-Fi Security: Learn how to secure your home Wi-Fi network to prevent unauthorized access and protect your devices. Smart Devices: Explore the security challenges posed by smart devices and how to mitigate these risks effectively. Network Segregation: Delve into the concept of dividing your home network for...

info_outline
Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats show art Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Have you ever paused mid-message, wondering who might be lurking in the digital shadows? I've delved deep into the realms of online privacy, spam prevention, encryption, and the intricacies of organizing your digital life to keep your conversations secure. Join me on this thrilling journey through cyberspace as we unravel the secrets of safeguarding your chats. Here's what you'll discover in our expedition: Privacy in the Digital Age: Uncover the nuances of online privacy and learn how to navigate the digital landscape confidently. Combatting Cyber Threats: Dive into the world of...

info_outline
Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution! show art Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Ever find yourself drowning in a sea of spam emails? πŸ“§ Fret not! I've got the perfect solution to not only declutter your inbox but also fortify your online privacy and cybersecurity. πŸ›‘οΈ Introducing the ultimate guide to digital clean up, with a focus on plus addressing for enhanced privacy and organization. No more sifting through unwanted emails – this guide is your ticket to a streamlined and secure email experience. πŸ“₯ Here's what you'll find in this comprehensive guide: Privacy Reinforcement: Learn how plus addressing can act as a shield, allowing you to...

info_outline
Online Advertising Transformed: Google's Move Beyond Cookie Dependency show art Online Advertising Transformed: Google's Move Beyond Cookie Dependency

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hold onto your hats, tech enthusiasts! πŸŽ©πŸ’» Get ready for a seismic shift in the digital landscape as Google bids farewell to cookies, ushering in a new era where privacy is more than just wishful thinking. Say goodbye to the cookie craze! πŸͺ🚫 In my latest deep dive, "Digital Clean Up: Navigating Google's Game-Changing Shift in Online Advertising," I'm unraveling the intricacies of this groundbreaking move and what it means for all of us navigating the vast realms of the internet. πŸŒπŸ” Here's what you can expect in this enlightening journey: Advertising Evolution: Explore...

info_outline
Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics show art Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore...

info_outline
Boost Online Privacy: A Cyber Spring Clean show art Boost Online Privacy: A Cyber Spring Clean

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Is your digital realm resembling a messy attic? Files overflowing like forgotten knick-knacks, an inbox resembling a confetti blizzard, and social media feeds choked with digital dust bunnies? Fear not, fellow data denizens, for spring cleaning season has arrived – and this year, we're reclaiming our online peace of mind! But unlike dusting cobwebs and decluttering drawers, taming our digital wilderness requires a different arsenal. Forget brooms and vacuum cleaners – we're talking AI-powered assistants, data-detective hounds, and even a digital shredder for those long-dormant devices...

info_outline
 
More Episodes

Craig Peterson: [00:00:00] Good morning, everybody Craig Peterson here. And I was just talking with Mr. Chris, Ryan about some of the impact that we are beginning to feel with the remote hackers, right? Was this China was this Russia. And I thought it was interesting because Chris was obviously going online and. Doc going some of these different topics that we were talking about and 19 administration officials that were saying things that I don't think were true, frankly.

[00:00:36] So here we go with Mr. Chris Ryan.

[00:00:39]Chris Ryan: [00:00:39] The program right now, Craig Peterson, host of tech talk here on news radio 610 and 96.7, which airs on Saturdays at 11:00 AM, actually 1130, Craig, how are you?

[00:00:52] Craig Peterson: [00:00:52] I am doing fine. And yeah, there's only one right lane.

[00:00:55] Chris Ryan: [00:00:55] Thank you. Thank you at score another one for Chris.

[00:00:59] He's not just sucking up to me because I'm the host. He is legit in this circumstance. Craig, I got a lot of important things to talk about with you and I want to start with what the United States is doing in regards to cyber attacks reportedly against Russia and retaliation for what Vladimir Putin has done in regards to election interference.

[00:01:17] And also. Some of the cyber attacks that they've perpetrated against this country. What's the latest on this. And what do you see as being the state of play?

[00:01:25]Craig Peterson: [00:01:25] There have been outages of course, here in the us and a lot of them attributed to just us making mistakes. So a lot of people businesses that are running parts of the internet that.

[00:01:37] Did the wrong thing. So remember, again, the internet is not run by one organization. It isn't run by the federal government. It is a whole bunch of networks that are connected together. Now that said, we have seen some major strikes against outs here in the U S from both. Russia. And from China, frankly, China has been much, much worse at this, but the Biden administration has decided to really try and single out Russia.

[00:02:07] In fact, president Biden came out and criticize them and said, we are going to retaliate. We had a problem in Russia where the Russian main Russian government websites were shut down and they went off the air is that as he sent them down on purpose and we've seen similar things before. So Chris, I suspect we have been involved.

[00:02:30] Chris Ryan: [00:02:30] Yeah, the Biden administration, according to Yahoo news is preparing a series of aggressive cyber attacks on Russia. I'm in a major shift in tactics designed as a warning shot to rival powers. They are saying that they're not going to target civilian structures or networks, but the hack will instead serve as a direct challenge to Vladimir Putin and his cyber army, according to the telegraph.

[00:02:56] Craig Peterson: [00:02:56] Yeah, but the one to really worry about is China. I, there's this whole Russia thing has really gone overboard here. All of the. Real cyber experts are saying that China's the big one. We just had two major attacks that attacked and compromised tens of thousands of businesses here in the United States, as well as government agencies, as well as our schools, stealing our information, grabbing bank account information, personal information, personal health information.

[00:03:26] And none of that is attributed to Russia. It is entirely including the federal government Homeland security and the FBI it's entirely attributed to China. But yeah, it looks like we've done a little saber rattling, according

[00:03:41] to what the American government has said, the agencies believe that the attack was the solar winds attack was actually perpetrated and they have traced.

[00:03:50] Back to the Kremlin and this is going to be retaliation for that. So you do not believe that's the case. You believe it is China.

[00:04:00] Yeah. Most of what we're seeing with solar winds is actually originated with Microsoft and Microsoft office three 65 system, and more particularly with Microsoft exchange servers and apparently. Both countries, there's all, some others have been involved in this. No, I don't say that it was not Russia at all, because there is some evidence that they were involved in it, but the most dramatic stuff has been caused by China has been coming from China.

[00:04:29] Now I've got to explain one other thing here. Sure. The reason there are questions about this isn't because people are trying to hide things or cover up or blame a country that had no involvement. The reason it's so hard to figure this out entirely is we don't know where it really originates. No, we can track down a little bit.

[00:04:50] We know, okay. There's an IP address that came from, but that IP address was someone's home computer that had been compromised and as part of a bot net, and then that home computer, if we get our hands on it, we can see, Oh, that was compromised from this machine in India. Oh. And that compromise came from here or there, the way we tell.

[00:05:10] Whether or not a machine has been compromised from a certain place is by looking at how it was done. And I've worked with the FBI on these cases before. And so I can tell you what we're looking at is a fingerprint. What tools did they use? How did they use them once they got into the network?

[00:05:29] How did they spread? And it is easy enough. For the Russians or the Chinese or the North Vietnamese now to come in and do something just as though they are someone else. And it's much like these people that commit crimes and they, the police look at it and say, okay, this has the same ammo.

[00:05:52] Motorcyle Rhonda, is this other crime? Therefore they're probably related. That's what we're doing here, Chris. So there's no hard and fast rules that this was, or was not Russia on. And you're talking about one specific part of one specific tack. We do know most. Countries were involved. And we do know that China has been doing most of this over the last really 15 years,

[00:06:20] Chris Ryan: [00:06:20] U S national security advisor, Jake Solvan who's from New Hampshire was a part of the delegation that met with the Chinese in Alaska.

[00:06:27] And that wrapped up over the weekend. It began with a very tense. Standoff between the two nations, which was supposed to be a photo op and instead they engaged in, as you referenced before, or some saber rattling between the two sides. And I'm interested in what your takeaways were from that. As Mr.

[00:06:46] Sullivan has continually. Said that traditional sanctions are not going to be what the Biden ministration uses in these circumstances. And there's going to be different elements as the United States. Again, looking at the cyber side of things in regards to attacks and and following up from previous attacks, perhaps perpetrating new ones in a new type of response.

[00:07:11] Craig Peterson: [00:07:11] Yeah, there are many options available. We do in every branch of the armed services, have people who are not just there to defend, but to attack. And we are continually looking into that. Of course, the NSA we've seen before for tools that were offensive. Cyber warfare tools we've seen them used. And we just saw China here last week, how Tesla, but it cannot be selling cars in China because it has seven cameras and it has all of this other computer equipment.

[00:07:44] And they think that we might be using it to steal information. Of course, Elon Musk came out and said, no, that's not the case. But that's the sort of thing we really could be doing. If we wanted to do it, you can be sure we're probing their networks. You can be sure we're into them as much as we can be. So how we resigned, it's hard to say, but there are a lot of options available and we have been shooting around the corners in shutting down power plants in Russia, in shutting down some of the infrastructure in China an hour.

[00:08:20] Fingerprints are all over those things, just like it was in Iran with those centrifuges that were being used reportedly to make nuclear fuel for bombs. We have a record of doing this sort of thing. Preston. So in saber rattling might well be backed up by something. That's a very, obviously from the UK.

[00:08:41] Chris Ryan: [00:08:41] And I think it has to be, I think that talk particularly in the current world, climate only goes. So far and it has to be followed by reciprocal action where we'll be seen as just being talk. Craig, thank you so much. And I look forward to chatting again next week. Take care, Chris. That is Greg Peterson.

[00:09:01] He hosts tech talk on news radio six, 10 and 96, seven Saturdays at 11:30 AM.