WEBVTT
1
00:00:00.080 --> 00:00:02.319
The topics and opinions expressed in the following show are
2
00:00:02.359 --> 00:00:03.960
solely those of the hosts and their guests and not
3
00:00:04.040 --> 00:00:06.919
those of W FOURCY Radio. It's employees are affiliates. We
4
00:00:07.000 --> 00:00:10.039
make no recommendations or endorsements for radio show programs, services,
5
00:00:10.119 --> 00:00:12.439
or products mentioned on air or on our web. No
6
00:00:12.560 --> 00:00:15.720
liability explicitor implies shall be extended to W FOURCY Radio
7
00:00:15.800 --> 00:00:18.559
or it's employees are affiliates. Any questions or comments should
8
00:00:18.559 --> 00:00:20.879
be directed to those show hosts. Thank you for choosing
9
00:00:21.000 --> 00:00:23.320
W FOURCY Radio.
10
00:00:29.039 --> 00:00:33.840
Welcome to to Ask Good Questions Podcasts, broadcasting live every Wednesday,
11
00:00:33.880 --> 00:00:37.719
six pm Eastern Time on W four CY Radio at
12
00:00:37.920 --> 00:00:41.520
w fourcy dot com. This week and every week, we
13
00:00:41.600 --> 00:00:45.000
will reach for a higher purpose in money and life,
14
00:00:45.359 --> 00:00:48.640
as well as a focus on health and wellness. Now,
15
00:00:49.200 --> 00:00:53.880
let's join your hosts, Banita Bell Anderson as together we
16
00:00:53.960 --> 00:00:57.280
start with Asking Good Questions.
17
00:01:01.359 --> 00:01:06.280
Hey, hello, and welcome to the Ask Good Questions podcast. Today,
18
00:01:06.560 --> 00:01:10.079
I am dressed in black to you know, I don't know,
19
00:01:10.400 --> 00:01:14.359
just be kind of in the mood for the topic today.
20
00:01:14.400 --> 00:01:18.359
We're going to be talking about identity theft and cybersecurity
21
00:01:18.680 --> 00:01:21.439
and a whole bunch of things that I am very
22
00:01:21.480 --> 00:01:24.480
concerned about making sure that you are up to speed
23
00:01:24.519 --> 00:01:27.959
on and you know what is up. I was actually
24
00:01:28.079 --> 00:01:31.239
talking to a daughter and a granddaughter earlier this morning,
25
00:01:31.280 --> 00:01:35.120
and my daughter was saying, Hey, you know, scam likely
26
00:01:35.239 --> 00:01:39.120
calls me all the time, and I said, you know what, Rachel,
27
00:01:39.719 --> 00:01:43.480
Scam likely calls me all the time too. So today
28
00:01:43.519 --> 00:01:46.000
we're going to get some answers on how to deal
29
00:01:46.079 --> 00:01:50.359
with those types of things. So I'd like to invite Robert.
30
00:01:51.079 --> 00:01:53.879
If I say this name correct, I want to say
31
00:01:53.920 --> 00:01:59.480
Italian Ceciliano. He can correct me. How am I doing?
32
00:01:59.640 --> 00:01:59.920
Robert?
33
00:02:00.079 --> 00:02:02.120
Did I butcher your last name?
34
00:02:02.480 --> 00:02:03.680
I was perfect? Did it good?
35
00:02:04.640 --> 00:02:06.760
I just want to go to Italia and the CID.
36
00:02:07.480 --> 00:02:10.039
It just sounds like you should be from Cyprus or.
37
00:02:10.080 --> 00:02:14.000
Something sicily sicily Yes.
38
00:02:14.759 --> 00:02:20.919
Well. Robert is a cyber security expert duh. He's a
39
00:02:21.000 --> 00:02:25.840
private investigator, he's a certified speaking professional, and he is
40
00:02:25.919 --> 00:02:31.840
the CEO of protect Now, LLC. And he is one
41
00:02:31.879 --> 00:02:37.840
of the nation's top trusted voices on cybercrime and identity theft.
42
00:02:38.240 --> 00:02:42.919
He's built this fantastic network and he's appeared on over
43
00:02:43.039 --> 00:02:48.919
five hundred television shows. He's a fierce advocate for personal
44
00:02:49.000 --> 00:02:53.560
and professional security, and he even has a certification program
45
00:02:53.800 --> 00:02:57.199
and he's the best selling author who strips away technical
46
00:02:57.400 --> 00:03:01.120
jargon so that you know, people can understand. Nobody does
47
00:03:01.199 --> 00:03:04.960
anything unless they understand and have, you know, some direction
48
00:03:05.080 --> 00:03:08.840
on how to do it right, right, So you want
49
00:03:08.879 --> 00:03:10.000
to add anything to that.
50
00:03:10.159 --> 00:03:12.360
Robert, No, that was great, thank you.
51
00:03:14.680 --> 00:03:17.319
Well, uh so tell me where you're coming from.
52
00:03:18.120 --> 00:03:21.560
I'm in Boston, Massachusetts, so just you know, yeah, yeah,
53
00:03:21.680 --> 00:03:25.439
and so everybody knows I have never ever poketaka in
54
00:03:25.520 --> 00:03:32.479
Havid yad ever. Yeah, no, I've had a wicked little
55
00:03:32.520 --> 00:03:33.879
bits in Fenway Park though.
56
00:03:33.960 --> 00:03:42.680
I really am okay, all right, I've unleashed a monster. So, Robert,
57
00:03:42.759 --> 00:03:45.960
we have some really important stuff, and I want this
58
00:03:46.199 --> 00:03:49.599
to be something where people take it serious and then
59
00:03:49.680 --> 00:03:54.199
go forward with some actions that they can take today
60
00:03:55.000 --> 00:03:58.319
so that they're safer because scam likely is calling me,
61
00:03:59.080 --> 00:04:01.599
and if they're called me and my daughter, I'm sure
62
00:04:01.639 --> 00:04:03.159
they're calling everybody else too.
63
00:04:03.680 --> 00:04:06.120
Yeah, that's so funny, scal like like it's called a
64
00:04:06.240 --> 00:04:07.560
I D. That's good. Yeah.
65
00:04:10.479 --> 00:04:13.159
So well, you're known as you know, like you know
66
00:04:13.280 --> 00:04:15.120
what I was saying, You're known as that as an
67
00:04:15.199 --> 00:04:17.439
expert in this. How in the world did you get
68
00:04:17.480 --> 00:04:18.439
into this kind of work?
69
00:04:18.959 --> 00:04:23.199
Oh, I've been involved in personal security since I was twelve.
70
00:04:23.959 --> 00:04:26.279
I was mugged in downtown Boston on I was a kid.
71
00:04:26.319 --> 00:04:28.639
I was with my little brother and five kids approached
72
00:04:28.680 --> 00:04:30.839
and they took our money, and that like kind of
73
00:04:30.879 --> 00:04:32.240
messed my head up a little bit, right, And that
74
00:04:32.319 --> 00:04:34.560
was like when I was twelve. And when I was thirteen,
75
00:04:35.600 --> 00:04:37.399
I was at summer camp and I met a young
76
00:04:37.519 --> 00:04:41.040
girl and you know, back then and we're talking like,
77
00:04:41.079 --> 00:04:44.040
you know, forty plus years ago, kids didn't really know
78
00:04:44.160 --> 00:04:46.800
what like sex was, right, But she said to me
79
00:04:46.879 --> 00:04:48.800
one day after camp, She's like, I think you should
80
00:04:48.839 --> 00:04:53.839
know that my mother's boyfriend raped me. And I was like,
81
00:04:54.240 --> 00:04:55.600
I looked at her face and I was like, I,
82
00:04:55.800 --> 00:04:56.920
you know, I don't know what to say. I don't
83
00:04:56.920 --> 00:04:58.959
what to do. And I go home and I say
84
00:04:59.000 --> 00:05:01.600
to my dad, Dad, what is rape? Because it had
85
00:05:01.639 --> 00:05:03.480
no idea what she was talking about, but I just
86
00:05:03.560 --> 00:05:05.319
knew it was bad by the way she said it.
87
00:05:05.839 --> 00:05:08.360
So from that point on, once you explained to me, right,
88
00:05:08.720 --> 00:05:12.160
dealing with my own multiple attack situation, what she'd gone through,
89
00:05:12.959 --> 00:05:15.360
personal protection became a primary focus of me at an
90
00:05:15.360 --> 00:05:17.879
early age. It just did. I mean, from that point on,
91
00:05:18.480 --> 00:05:20.920
I just started to consume everything that I could on
92
00:05:21.120 --> 00:05:24.040
the topic, on the issue. And then by like the
93
00:05:24.160 --> 00:05:27.839
mid nineties, I had my first computer, Like in nineteen
94
00:05:27.920 --> 00:05:32.480
ninety five, I had an IBM PS one consultant, which
95
00:05:32.560 --> 00:05:35.279
is like Windows three point zero with a one hundred
96
00:05:35.279 --> 00:05:37.439
and fifty megabyte hard drive. I was like one of
97
00:05:37.480 --> 00:05:40.519
the first people that I knew online, you know. And
98
00:05:40.639 --> 00:05:45.680
then early into that my computer got hacked. In the nineties,
99
00:05:46.399 --> 00:05:48.959
I suffered thousands of dollars in credit card fraud. And
100
00:05:49.439 --> 00:05:52.879
from that point on, I was like, personal security became
101
00:05:53.000 --> 00:05:56.839
something more than physical security. It became information security, it
102
00:05:56.920 --> 00:06:00.519
became identity theft, right, And this is in the mid nineties.
103
00:06:01.160 --> 00:06:04.839
So by nine to eleven I had been entrenched in
104
00:06:05.000 --> 00:06:08.000
personal protection, and right after nine to eleven I went
105
00:06:08.079 --> 00:06:10.279
full time with this. You know, I'd been in the
106
00:06:10.360 --> 00:06:13.600
trades prior to that. But after nine to eleven, like
107
00:06:13.800 --> 00:06:16.439
everything that I had been saying now at this point
108
00:06:16.879 --> 00:06:19.879
for close to a decade or more, began to resonate
109
00:06:19.920 --> 00:06:22.560
and make a lot of sense. And that time I
110
00:06:22.720 --> 00:06:27.639
have seen the evolution of cybercrime and personal protection at
111
00:06:27.680 --> 00:06:30.800
a level that like, it's just kind of out of
112
00:06:30.920 --> 00:06:33.759
control for most people, and most people don't know what
113
00:06:34.000 --> 00:06:36.480
to do, how to react to how to respond. But
114
00:06:36.879 --> 00:06:42.360
I do, and I provide that level of basic intelligence
115
00:06:42.439 --> 00:06:45.920
to my audience so that they are informed. And once
116
00:06:45.959 --> 00:06:51.560
you are for warned, you are for armed. And really,
117
00:06:52.000 --> 00:06:54.759
most of this stuff is pretty easy as long as
118
00:06:54.839 --> 00:06:58.879
you do the basics, understanding and recognizing risk as a
119
00:06:58.959 --> 00:07:02.439
matter of kind of taking it to heart, making sense
120
00:07:02.480 --> 00:07:04.199
of all of it, and doing something about it.
121
00:07:05.120 --> 00:07:10.720
Yeah, well, what you know going forward? What is it
122
00:07:10.839 --> 00:07:11.879
that words you the most?
123
00:07:13.000 --> 00:07:16.439
You know, I've been saying to my audience for thirty years. Listen,
124
00:07:17.079 --> 00:07:19.639
with all of this stuff that I talk about, don't
125
00:07:20.000 --> 00:07:25.279
worry about any of it, just do something about it. However, However,
126
00:07:25.959 --> 00:07:29.279
in the past year or two, with AI and deep
127
00:07:29.399 --> 00:07:33.199
fakes and voice cloning, I'm a bit worried, and I
128
00:07:33.680 --> 00:07:35.600
think that we should worry a little bit due to
129
00:07:35.680 --> 00:07:39.680
the fact that human beings are completely incapable of telling
130
00:07:39.879 --> 00:07:43.560
real from fake. When it comes to these fakes, the
131
00:07:43.720 --> 00:07:46.279
audio clones. Forget about it. There is nothing that you
132
00:07:46.360 --> 00:07:49.160
can do to prevent that. You can't really determine what's
133
00:07:49.199 --> 00:07:51.240
rail or fake, and then as far as the video
134
00:07:51.360 --> 00:07:55.600
clones you know, face overlay and so forth. The technology
135
00:07:55.839 --> 00:08:00.720
is there right now to perfect you know, basically video,
136
00:08:01.360 --> 00:08:04.439
but it's not readily available to the public. It's there,
137
00:08:04.839 --> 00:08:09.439
it's just not consumable when that is deployed, when it
138
00:08:09.560 --> 00:08:12.519
becomes available to everybody, to the masses, that's what it's
139
00:08:12.560 --> 00:08:15.639
going to be really difficult. So right now, the basic
140
00:08:15.759 --> 00:08:17.720
thing that you're supposed to do is kind of look
141
00:08:17.800 --> 00:08:24.319
at every single incoming call, email and phone call and deduce, Okay,
142
00:08:24.439 --> 00:08:27.560
what is happening here? Is this railer fake? What is
143
00:08:27.639 --> 00:08:30.480
the motivation on the person on the other end, Is
144
00:08:30.560 --> 00:08:35.480
my loved one really distressed or at issue? Or is
145
00:08:35.559 --> 00:08:39.159
this really an investment scheme or fraud?
146
00:08:39.360 --> 00:08:39.759
And so on?
147
00:08:39.919 --> 00:08:42.600
Like you really have to be critical in you're thinking
148
00:08:42.720 --> 00:08:43.360
going forward?
149
00:08:44.039 --> 00:08:49.639
Yeah are you? I'm just thinking if anybody's asking you
150
00:08:49.759 --> 00:08:52.240
to do anything on a phone call or an email,
151
00:08:55.320 --> 00:08:58.039
yeah you should do it. Exactly what you're saying, yeah, don't.
152
00:08:58.480 --> 00:09:03.320
Yeah. It really boils down to basic common sense like
153
00:09:03.519 --> 00:09:06.120
is your is your is your grandson really being kidnapped?
154
00:09:06.519 --> 00:09:09.200
Is your daughter really being kidnapped? Like all of these
155
00:09:09.360 --> 00:09:12.200
ruses and scams are designed to get your blood pressure up,
156
00:09:12.200 --> 00:09:14.840
They're designed to freak you out. There's some urgency to
157
00:09:14.919 --> 00:09:17.360
all of them. And then the other side of it
158
00:09:17.519 --> 00:09:20.600
is like some of them are revolve around loneliness, you know,
159
00:09:20.679 --> 00:09:24.000
getting your your your emotions all involved. Like if you're
160
00:09:24.120 --> 00:09:28.799
just paying attention, then you really shouldn't get scammed. It's
161
00:09:28.879 --> 00:09:31.200
kind of interesting and fascinating what they do and how
162
00:09:31.240 --> 00:09:34.159
they do it. But in the end, like we with
163
00:09:34.600 --> 00:09:37.559
life experience should be able to tell right from wrong.
164
00:09:38.320 --> 00:09:43.279
Yeah, right, Well, what would you say to someone who says, oh,
165
00:09:43.440 --> 00:09:46.200
this is scaring the crap out of me. I'm not techie.
166
00:09:47.240 --> 00:09:50.080
They're they're embarrassed about their tech skills. What would you
167
00:09:50.120 --> 00:09:53.240
say to somebody? Would you say, go back to what
168
00:09:53.440 --> 00:09:58.480
you just said about being aware and thinking about what
169
00:09:58.879 --> 00:10:02.039
is this relief? Maybe tech skills doesn't have anything to
170
00:10:02.120 --> 00:10:02.480
do with it.
171
00:10:02.840 --> 00:10:05.559
Well, the good news is first, the presentations that I
172
00:10:05.679 --> 00:10:07.360
deliver when I'm in front of a live audience, I
173
00:10:07.480 --> 00:10:11.639
don't speak tech. I don't do any technical jargon. Right,
174
00:10:12.120 --> 00:10:14.960
My presentations are jogging free and I just speak like
175
00:10:15.159 --> 00:10:17.960
you know, normal, like you and I having a conversation okay,
176
00:10:18.440 --> 00:10:22.360
and I don't provide any advice that would require any
177
00:10:22.440 --> 00:10:25.679
technical skills either. It's all basic one O one stuff
178
00:10:26.000 --> 00:10:28.279
like if you know how to log into email, if
179
00:10:28.320 --> 00:10:31.360
you know how to post an update to say Facebook,
180
00:10:31.720 --> 00:10:34.200
if you know how to send a text message. Like,
181
00:10:34.519 --> 00:10:36.720
that's all the basic administration that you need to know
182
00:10:36.840 --> 00:10:39.759
to do the majority of the cybersecurity stuff that you
183
00:10:39.919 --> 00:10:42.799
need to to make sure that the bad guys look
184
00:10:42.840 --> 00:10:45.559
at you as a tougher target. So it's all actually
185
00:10:45.600 --> 00:10:48.279
really simple. You don't have to be really even tech
186
00:10:48.440 --> 00:10:52.919
savvy or like some type of an engineer of sorts.
187
00:10:53.039 --> 00:10:55.919
You just have to use common sense and use your
188
00:10:55.960 --> 00:10:59.279
basic skills. It's like if you know how to bake
189
00:10:59.360 --> 00:11:01.879
a cake, then you know how to you know, follow
190
00:11:01.960 --> 00:11:04.000
a recipe and get all the ingredients with all the
191
00:11:04.080 --> 00:11:07.519
recipe and put it all together. Well, that's all security is.
192
00:11:07.720 --> 00:11:10.600
This is just a matter of following certain processes and
193
00:11:10.759 --> 00:11:13.399
engaging in certain habits. And once you do all these
194
00:11:13.440 --> 00:11:18.000
different things regularly, creating these habits, then again you've become
195
00:11:18.159 --> 00:11:22.879
a tougher target. It really is as simple as that, right, So, Robert,
196
00:11:24.759 --> 00:11:25.480
you turn.
197
00:11:25.320 --> 00:11:30.799
Yourself into the typical scammer from the criminal's point of view,
198
00:11:31.840 --> 00:11:35.879
walk us through a typical scam, so we understand how
199
00:11:36.320 --> 00:11:38.200
how they think and how they operate.
200
00:11:39.559 --> 00:11:46.080
So all the inbound communications email, phone, text, even in person. Right,
201
00:11:46.600 --> 00:11:51.639
bad guys have access to technology to scale their operations
202
00:11:51.720 --> 00:11:53.720
in such a way where they can send out millions
203
00:11:53.759 --> 00:11:57.399
of emails, millions of text messages, make millions of phone
204
00:11:57.480 --> 00:12:01.840
calls like simultaneously, right, and AI allows them to do that.
205
00:12:02.279 --> 00:12:05.919
And then once we react and respond, We respond to
206
00:12:05.960 --> 00:12:08.279
that text message, we respond to the phone call, we
207
00:12:08.440 --> 00:12:11.399
respond to the email. The idea behind all of those
208
00:12:11.480 --> 00:12:14.799
responses is that you now are engaging the criminal in
209
00:12:14.840 --> 00:12:18.000
such a way where you're saying things and putting words
210
00:12:18.080 --> 00:12:21.799
into texts and so forth that allow for a response,
211
00:12:22.120 --> 00:12:24.600
whatever that response might be, okay. So what they're looking
212
00:12:24.759 --> 00:12:28.159
for is for you to not know immediately that that
213
00:12:28.320 --> 00:12:31.639
inbound phone call, email, or text is a scam. So,
214
00:12:31.799 --> 00:12:34.759
for example, all of those wrong number of text messages
215
00:12:34.840 --> 00:12:37.240
that you get, they're all scams, every single one of
216
00:12:37.279 --> 00:12:39.720
them are a scam. But I got one yesterday this
217
00:12:39.799 --> 00:12:42.879
said like happy New Year, Robert, I hope you are
218
00:12:42.960 --> 00:12:47.559
doing well. I wish you a prosperous year. And then
219
00:12:47.600 --> 00:12:49.480
that was it, and then I looked at the phone
220
00:12:49.559 --> 00:12:51.840
number and I couldn't find it online. I looked it
221
00:12:51.919 --> 00:12:53.960
up in my email as somebody who I might have
222
00:12:54.000 --> 00:12:56.559
been in contact with and could have been in my email.
223
00:12:56.799 --> 00:12:59.360
I didn't know who it was, so I didn't respond
224
00:12:59.440 --> 00:13:01.879
to it, and I just deleted it because they didn't
225
00:13:01.919 --> 00:13:05.559
identify themselves. They said my name, certainly, but the phone
226
00:13:05.639 --> 00:13:08.320
number was not showing up anywhere in the web or
227
00:13:08.480 --> 00:13:11.759
in my inbox or on my phone either, So it
228
00:13:11.919 --> 00:13:14.320
was a scam. But they knew my name. But all
229
00:13:14.360 --> 00:13:17.360
I did was, ultimately, after the research, just delete the thing.
230
00:13:17.600 --> 00:13:20.399
I didn't respond with who's this, I'm sorry, I don't
231
00:13:20.399 --> 00:13:21.799
have you on my car. I didn't do any of
232
00:13:21.840 --> 00:13:24.320
that stuff. I just did my own research to find
233
00:13:24.320 --> 00:13:27.039
out do I know this person? And apparently I don't,
234
00:13:27.120 --> 00:13:30.120
so it's a scam. Now, if that person really was
235
00:13:30.200 --> 00:13:32.399
somebody that I knew, they would have shown up somewhere.
236
00:13:32.519 --> 00:13:34.600
They would have made more of an effort. They would
237
00:13:34.639 --> 00:13:37.279
have responded back to me and said, hey, this is
238
00:13:37.320 --> 00:13:39.600
this and so and so, But they didn't. It was
239
00:13:39.759 --> 00:13:45.080
just a robo text. Same thing with email. When the