19 Burst results for "Cannon Beach Oregon"

"cannon beach oregon" Discussed on True Mysteries of the Pacific Northwest

True Mysteries of the Pacific Northwest

04:11 min | 8 months ago

"cannon beach oregon" Discussed on True Mysteries of the Pacific Northwest

"Storms during nineteen ninety seven ninety eight washed away tons of sand revealing hundreds of stumps the remnants of a sitka spruce forest. It's through a combination of carbon dating the counting of rings. That the date of the last cascade subduction zone quake took place. The earth's surface is made of southern manager plates and many smaller ones. The smaller place creator earthquakes for short duration of fourteen to forty five seconds. That may reach nine point five on the richter scale. They often take place what is called the fault line between these plates. Many people are familiar with the san. Andreas fault march. eleventh twenty. Eleven japan experienced a subduction zone. Quake that lasted more than four minutes. At nine point one. On the richter scale it was the fourth most powerful earthquake in the world since modern record of began in nineteen hundred the shade created a su- nami that reached a hundred and thirty three feet and muga six miles. Inland it move. Japan's main island of honshu eight feet shifted the earth on its axis between four and ten inches. This was an earthquake created by the shifting of the pacific plate finally to help put earthquakes in perspective the loma prieta quake that he will erupted the nineteen eighty nine world series in san francisco. California lasted fifteen seconds. The great san francisco earthquake of nineteen six was eight point six and lasted forty. Five seconds but japan's great earthquake of twenty eleven lasted over four minutes. Nine point one. On the richter scale based on data from oregon seed geographer patrick corcoran. Us gs alaska science center. True mysteries of the pacific northwest will now tour. The predicted minute by minute. Impact of a cascadia subduction zone earthquake on the oregon coast after three hundred twelve years. The cs z can no longer take the strain it ruptures a spot fifty five miles west of cannon beach oregon and quickly spreads alongs the seven hundred miles of its length from british columbia to mendocino california. The north american plate slips fifty seven feet to the south west sliding over the one fuca plate but remember. We're talking about a crushed more than fifty miles deep. The first movement sends a pressure wave that travels through the earth's crust at thirteen thousand miles an hour. It will reach the west coast in ten seconds. The leading edge will hit oregon's cannon beach and seaside thirty seconds later which portland and fifty seconds seattle in another fifty seconds at one point one. It's what seismologist. Call a full rip..

seven hundred miles California fifty seven feet ten seconds fifteen seconds eight feet fourteen san francisco Five seconds honshu Japan more than four minutes thirteen thousand miles an hou forty five seconds four more than fifty miles nineteen hundred fifty seconds a hundred and thirty three fee hundreds of stumps
"cannon beach oregon" Discussed on X96

X96

08:11 min | 1 year ago

"cannon beach oregon" Discussed on X96

"It's a 47 time to award round two of your boner and round two of the boner Voting is brought to you in part by an apple galette. And it's Tuesday. That means it's taco. Tuesday. A diversion eatery Get to $2 tacos with chicken Carney Asada Carne Edie's salmon or portabello, located at 5 35. North Third West. See the menu, a diversion eatery dot com. Ooh! Let's see. Boehner, candidate number one has disappeared here, but I think I've got a boner candidate number one was come on, fight back. That's the native Americans who When confronted by a violent woman yelling things at them and throwing punches at him refused to fight back, and it defused the situation quite handily, really. Boehner, candidate number two I made you go to Darby Shaw High School. A drunk driver busted after giving a fake named Will cop that he went to high school with And Boehner, candidate number three. Get out of my area. Sky down in Garfield County, who the only solution To chase people away from his driveway is to go out there with a shotgun as they come Teo, his neighbor's Airbnb, and apparently there's some confusion, but he'll go out there with a shotgun and chasing not anymore. He's been arrested. Cheryl won the diversion eatery gift card, and the winner was Boner Candidate number one. Come on, fight back. There you go. That's your winner of round two now goes forward Might be boner of the day depends on how well it does against the winner of round ones Voting. I'm gonna put them both together. At 9 20 this morning. That's when you will decide. Boner of the day with Boehner fights so get ready for that is taught there. Fallen in love with a, uh, part of the country that I also love. And I'm jealous of all of your beautiful pictures you posted from your trip. Todd Todd, Where'd you go? Well, you know, every year is my wife's birthday is on the 18th. So we we like to do a trip to Cannon Beach, Oregon, which is just beautiful. Right there along the Oregon Coast. You get all the glorious scenery. And everything, and we spent the whole year up to this point thinking. What are we gonna do? This I mean, is, you know in May In June. It was like I don't know if money is even a thing you could do. And are we crazy enough to do this? You know, with the way things go And I did some research and just kind of Don't like It would be okay. You know on for you needed it. We did like, that's a thing like if you ever need a vacation this year, right? And you know, and it costs money to do. Fortunately, my wife, she makes more than I do right now. So I gotta get a sugar mama. So she paid for her own birthday trip. Well, so so you decided to fly? What we did. What convinced you that it would be Okay to fly? Well, we fly on Delta. I have one of those The American Express Rewards cards so you could get points and you get, you know, reduced price tickets and so Just following what they've been doing. I felt like they were doing everything possible to make it safe experience. Uh, you know, they space out the seating. We did. We did first class. What you know, play your room as well. But that was half full like they really was only about halfway pact was the was the price of a lot lower than normal. No, no, it was everything felt like it was the same prize. But really, we used our points whatever. But It also coincided with when we booked this, and I had no idea that it was the opening day off. The Salt Lake International Airport. The brand new, right, So what's it like out there? So we we will, you know, and I was remember, they announced, you know that was going to get done This year, I thought really got that seems fast, but it's beautiful. And so we Work? Sure which gate It was. Our flight was going to depart from so the way it's set up right now. So there's one big new terminal when the baggage claim and the security just everything and then from there Is a brand new concourse, which is concourse A and that runs That's the whole new section, and then they still use some of the existing concourse is in the old airport. They're going to tear apart of it down, So there's a tunnel that connects you to those If you need a man Originally, it said. Our flight was going to come out of one of those. But then the morning of the gate updated. We were in a a concourse and its beauty it a spectacular It's huge. The passenger pickup and drop off area is Spectacularly improved. You don't have to Actually, When you're being picked up, you'll have to cross through the traffic anymore. You know, he always had passed in the crosswalk. It's all an overpass, so that doesn't impede traffic That's coming through that part of the airport, and they did a beautiful job like it is. It's nuts. And that new concourse we Took off from a gate that was kind of in the very beginning part of the concourse. Then we landed and came home on Sunday. We We're at the very end of it, so we got to walk. And I swear to God, it's like a mile long. It is massive and and all the different restaurants and things that were in it. It was really cool. So so ah, you had somebody drop you off you I was going to ask you about parking or that kind of thing. You know, we didn't experience that we were picked up and dropped off from by some friends and soon but that that even is better because the old one suck because You have to cross traffic to get picked up. Yeah, and then people have to stop for you, and it really makes the loading and unloading kind of traffic mentioned the You mentioned the restaurant You saw where they open where they all open and in Salt Lake City. They were the There's Ah, there's the squatters. There's Ah Cafe Rio out there. There's Just you know, all the all the stuff you'd expect, and they were open and it's brand new. The one thing they screwed up on if I'm gonna gripe a little bit about our billion dollar new airport In the bathrooms. The sinks are designed so that the faucet doesn't extend into the sink. Very far at all. You can't get your hand under the stream without like touching the dance stink O and hate that whoever did the sink design Should rethink that. It was bad. Maybe when they built the new The other new concourse is coming in the recent they're saying Rethink rethink the same caste tag. Rethink the sink. Camille says the terminals are so long and they didn't bother to add a tram to take people back and forth or moving sidewalks. Is that case so they do they have they have the moving the moving sidewalks through the concourse. You almost expect there to be a trams will because it is huge and like when we experienced, you know, landing at the very end of it, which by the way is amazing because they've got this huge window wall. You have this tremendous view of the valley. That's a pretty good hike from the very end of that, Of course, all the way all the way through. But they know for opening day I thought it was gonna be nuts. And they just had they had people stationed all over the place to help you. Find everything you need. Security was great that this new security area is massive, and it makes that so much better. You mean the say stuff And they have like this automated thing that brings the Lino you put your stuff in the little plastic tub. It has a lot of automatically send them back through. And then they pop up and you take one. And so it's It's cool, but the sinks really suck. I'm sorry, rethink the think Eso eso being in Cannon Beach was good. There wasn't but this is in Oregon's Eso weren't fires or anything other were and it was crazy when when we went, went there and landed in Portland..

Boehner Oregon Carney Asada Salt Lake International Airpor Cannon Beach apple Rethink Todd Todd Darby Shaw High School Airbnb Oregon Coast Ah Cafe Rio Cheryl Garfield County Portland Teo Salt Lake City Camille
"cannon beach oregon" Discussed on True Mysteries of the Pacific Northwest

True Mysteries of the Pacific Northwest

04:32 min | 1 year ago

"cannon beach oregon" Discussed on True Mysteries of the Pacific Northwest

"Today we're going to look at the Cascadia subduction zone, and what could be a mega quake the Pacific northwest subduction zone earthquakes have occurred every three hundred fifty years since six hundred BC with the most recent taking place January twenty six seventeen o one evidence for earlier quakes come from core samples taken from the. The Ocean floor, and from rings counted in the Ghost forest that I'll talk about a little bit later. The seventeen hundred quake caused several coastal regions, Washington and Oregon to drop sixty six feet, massive coastal storms during nine, hundred and ninety, seven, Ninety, eight, washed away tons and tons of sand, revealing hundreds of stumps, the remnants of a Sitka spruce forced. It is through. Through a combination of carbon dating an accounting of rings that the data, the last Cascadia subduction zone or C. S. Z. quake took place. The Earth's surface is made up of seven major plates and many smaller ones. The smaller plates creator earthquakes for short durations of fourteen forty five seconds at may reach nine point five on the Richter scale. They often take place of. Of Water call faultlines between plates March Eleventh Twenty Eleven Japan experience a subduction zone. Quite that lasted more than four minutes at nine point one on the Richter scale. It was a fourth, most powerful or quake in the world. Since modern recording began in nineteen, hundred shake created a Su- Nami, the reached a hundred and thirty three feet and mood six miles inland google. Google Japan's main island upon shoot, eight feet in shifted the earth on its axis between four and ten inches, this was an earthquake created by the shifting of the Pacific Plate finally to help put earthquakes in perspective, the long Prieta quake that interrupted the nineteen eighty nine world series in San Francisco. California lasted fifteen seconds the Great San Francisco earthquake of nineteen six was. was eight point six that lasted forty five seconds, but Japan's greater earthquake of twenty eleven lasted over four minutes at nine point, one of the Richter scale based on data from Oregon see geographer Patrick Corcoran and Usgs Alaska, science center kiss, missing mysteries will now tour the predicted minute by minute impact of Cascadia. Subduction Zone earthquake on the Oregon coast after three hundred twelve. Twelve years to see S Z could no longer take the strain it ruptures at a spot fifty five miles west of Cannon Beach Oregon and quickly spreads along the seven hundred miles of its length from British Columbia to Mendocino California. The North American plate slips fifty seven feet to the south. West sliding over the Wanda Fuca plate, but remember we're talking about across more. More than fifty miles deep, the first movement sons pressure wave that soapy way that travels through the Earth's crust at thirteen thousand miles an hour, it will reach the West Coast in ten seconds. The leading edge will hit Oregon's cannon beach and seaside thirty seconds later. It reaches Portland in fifty seconds his Seattle at nine point one is what seismologist call a full rip? Most cities can withstand a six point. Eight quake lasted about forty five seconds, but the difference between a forty second, and a four-minute quake has like the difference between a head on collision at four miles, an hour and forty miles an hour within three minutes shaking continues, the coast will drop from six to twenty five feet after five minutes. The worst is over for Portland and Seattle it will have suffered from ground liquefication Berlin will collapse, and they'll be gas fires citywide after six. Six minutes people seeking high ground to avoid the soon. NAMI will be impeded by debris driving. We'll be an impossibility at eight minutes. Nami will be about twenty five miles offshore. It approaches like an enormous high tide, but a flash flood speed leading edge will only be inches, but will increase to forty feet as predicted that the cascadia subduction zone quake would create twice the impact of Japan's great quake twenty eleven. Keep in mind the by the time you finish listening to this. There will have been earthquakes somewhere in the world. The Pacific

Cannon Beach Oregon Japan West Coast Portland Su- Nami Seattle Oregon San Francisco Google Sitka Patrick Corcoran Wanda Fuca Pacific Plate Washington California Mendocino California British Columbia Usgs Alaska
The Cascadia Subduction Zone

True Mysteries of the Pacific Northwest

04:32 min | 1 year ago

The Cascadia Subduction Zone

"Today we're going to look at the Cascadia subduction zone, and what could be a mega quake the Pacific northwest subduction zone earthquakes have occurred every three hundred fifty years since six hundred BC with the most recent taking place January twenty six seventeen o one evidence for earlier quakes come from core samples taken from the. The Ocean floor, and from rings counted in the Ghost forest that I'll talk about a little bit later. The seventeen hundred quake caused several coastal regions, Washington and Oregon to drop sixty six feet, massive coastal storms during nine, hundred and ninety, seven, Ninety, eight, washed away tons and tons of sand, revealing hundreds of stumps, the remnants of a Sitka spruce forced. It is through. Through a combination of carbon dating an accounting of rings that the data, the last Cascadia subduction zone or C. S. Z. quake took place. The Earth's surface is made up of seven major plates and many smaller ones. The smaller plates creator earthquakes for short durations of fourteen forty five seconds at may reach nine point five on the Richter scale. They often take place of. Of Water call faultlines between plates March Eleventh Twenty Eleven Japan experience a subduction zone. Quite that lasted more than four minutes at nine point one on the Richter scale. It was a fourth, most powerful or quake in the world. Since modern recording began in nineteen, hundred shake created a Su- Nami, the reached a hundred and thirty three feet and mood six miles inland google. Google Japan's main island upon shoot, eight feet in shifted the earth on its axis between four and ten inches, this was an earthquake created by the shifting of the Pacific Plate finally to help put earthquakes in perspective, the long Prieta quake that interrupted the nineteen eighty nine world series in San Francisco. California lasted fifteen seconds the Great San Francisco earthquake of nineteen six was. was eight point six that lasted forty five seconds, but Japan's greater earthquake of twenty eleven lasted over four minutes at nine point, one of the Richter scale based on data from Oregon see geographer Patrick Corcoran and Usgs Alaska, science center kiss, missing mysteries will now tour the predicted minute by minute impact of Cascadia. Subduction Zone earthquake on the Oregon coast after three hundred twelve. Twelve years to see S Z could no longer take the strain it ruptures at a spot fifty five miles west of Cannon Beach Oregon and quickly spreads along the seven hundred miles of its length from British Columbia to Mendocino California. The North American plate slips fifty seven feet to the south. West sliding over the Wanda Fuca plate, but remember we're talking about across more. More than fifty miles deep, the first movement sons pressure wave that soapy way that travels through the Earth's crust at thirteen thousand miles an hour, it will reach the West Coast in ten seconds. The leading edge will hit Oregon's cannon beach and seaside thirty seconds later. It reaches Portland in fifty seconds his Seattle at nine point one is what seismologist call a full rip? Most cities can withstand a six point. Eight quake lasted about forty five seconds, but the difference between a forty second, and a four-minute quake has like the difference between a head on collision at four miles, an hour and forty miles an hour within three minutes shaking continues, the coast will drop from six to twenty five feet after five minutes. The worst is over for Portland and Seattle it will have suffered from ground liquefication Berlin will collapse, and they'll be gas fires citywide after six. Six minutes people seeking high ground to avoid the soon. NAMI will be impeded by debris driving. We'll be an impossibility at eight minutes. Nami will be about twenty five miles offshore. It approaches like an enormous high tide, but a flash flood speed leading edge will only be inches, but will increase to forty feet as predicted that the cascadia subduction zone quake would create twice the impact of Japan's great quake twenty eleven. Keep in mind the by the time you finish listening to this. There will have been earthquakes somewhere in the world. The Pacific

Cannon Beach Oregon Japan West Coast Portland Su- Nami Seattle Oregon San Francisco Google Pacific Plate Sitka Patrick Corcoran Wanda Fuca Washington California Mendocino California British Columbia Usgs Alaska
Prediction

True Mysteries of the Pacific Northwest

04:54 min | 1 year ago

Prediction

"Welcome to kids Smith and mystery your host kid crumb today. We're GONNA look at several events that were predicted. And of course we'll start with our current pandemic predicted seventeen years ago by science. If you still believe in science and is this a first well of course not you can look back. A hundred years to the nineteen eighteen. Banish flu epidemic tremendous number of similarities. Between on then. And what's going on now but we're going to leave that behind. Don't look at earthquakes. Also predicted are subduction zone. Earthquakes have occurred every three hundred and fifty years said six hundred BC with the most recent taking place January twenty six seventeen o one evidence for the earlier quakes or predictions comes from core samples taken from the ocean floor. The seventeen hundred quake caused several coastal regions are both Washington and Oregon to drop sixty six feet. Massive coastal storms during the nineteen ninety seven and ninety eight storms washed away tons of sand revealing hundreds of stumps the remnants of Sitka spruce forest. It is through a combination of carbon dating and counting of rings. That the date of the last cascade subduction zone or C. S. Z. Quake place the Earth. Surfaces made up of seven major plates in many smaller ones. The smaller place creator quakes for short durations of fourteen to forty five seconds it may reach nine point five on the Richter scale. They often take place at what is called the fault line between plates March Eleventh. Two Thousand Eleven Japanese experience subduction zone quite that lasted more than four minutes at a nine point one. On the Richter scale it was the fourth most powerful earthquake in the world since modern record taking began in nineteen hundred to shake created a soon nami that reached one hundred thirty three feet and move six miles inland. It moved Japan's main island of Honshu. Eight feet and shifted the earth on its axis between four and ten inches. This was an earthquake created by the shifting of the Pacific Plate Vialli to help put earthquakes in perspective the Loma Prieta quake that interrupted the nineteen eighty nine world series in San Francisco. California lasted fifteen seconds. The Great San Francisco earthquake of Nineteen. Six was eight point six and it lasted. Forty five seconds but Japan's greater earthquake of twenty eleven lasted over four minutes at nine point one on the Richter scale based on data from Oregon. Siochana Oceana Graphic Person Patrick Corcoran and US GS is Alaska. Science Center true mysteries of the Pacific northwest will now who are predicted. Minute by minute. Impact of a Cascadia subduction zone earthquake on the Oregon coast get this after three hundred twelve years the CS is he could no longer take the strain. It ruptures a spot fifty five miles west of Cannon Beach Oregon and quickly spreads along the seven hundred miles of length from British Columbia to Mendocino California. The North American plate slips fifty seven feet to the South West sliding over the one to Fuca plate. But remember we're talking about a crushed more than fifty miles deep. The first movement sends a pressure wave that travels through the Earth's crust at thirteen thousand miles an hour it will reach the West Coast in ten seconds. The leading edge will hit cannon beach and seaside thirty seconds later it reaches Portland Oregon in fifty seconds at his Seattle at nine point one. It's what Size Malla. Just call a full rip. Most cities can withstand a six point eight quake last year forty five seconds. But the difference between a forty second and a four-minute quake is like the difference between a head on collision at four miles an hour and forty miles an hour within three minutes. Shaking continues the coast will drop from six to twenty five feet after five minutes. The worst is over for Portland and Seattle will have suffered from ground. Liquefication building collapsed gas fires citywide after six minutes. People seeking high ground to avoid the SU- NAMI will be impeded by debris and driving will be almost impossible at eight minutes to Sonoma will be about twenty five miles offshore. It approaches like an enormous high tide but flash floods speed. The leading edge will only be inches but it will increase to forty feet is predicted that the cascade subduction zone quake would create twice the impact of Japan's great quake of twenty eleven. Keep in mind that by the time you finish listening to this podcast. There will earthquake somewhere in the

Oregon Japan San Francisco Patrick Corcoran West Coast Portland Seattle Pacific Plate Vialli Cannon Beach Oregon Smith FLU Sonoma Fuca Plate California Science Center Size Malla Washington Alaska Loma Prieta
"cannon beach oregon" Discussed on KTAR 92.3FM

KTAR 92.3FM

01:42 min | 2 years ago

"cannon beach oregon" Discussed on KTAR 92.3FM

"Well she had insisted that she wanted to see the trial rules before she sent over the impeachment articles she never got to see though she never got a promise that she was gonna get witnesses in the Senate trial at so Republicans are saying look you're you know playing politics this is clearly political if you think that president Donald Trump as such a threat to the nation then you don't want to wait until the twenty twenty election but essentially what she did was wait ABC's and flared in Washington Russian meddling in the twenty sixteen election documented by the U. S. intelligence community conclusions rejected by the trump administration even today as White House national security adviser Robert o'brien was asked on A. B. C.'s this week broadcast of the president will call on the Russians to stay out of this year's race the idea that the president I'd states would would collude with the Russians I mean this is a partisan fantasy that spend level of flames which have been fan for three years now there's zero truth to it the issue put this administration at odds with U. S. intelligence and led to the president's impeachment there was a high surf warning near cannon beach Oregon a big wave swept the man and two kids into the water he survived his seven year old daughter did not his four year old son is missing Coast Guard petty officer leave I read that you have to respect the elements and know that there's no no telling what can happen the Coast Guard suspended the search for the missing four year old Texas governor Greg Abbott announced his state will no longer accept resettlement of new refugees Texas the first state to do so under new trump administration policy since twenty to Texas is resettle more than eighty eight thousand refugees that is second only to California Abbott says Texas is done more than its share it with refugees you're listening to ABC news.

Donald Trump ABC Robert o'brien B. C. president Oregon Greg Abbott Texas Senate U. S. intelligence White House officer California
"cannon beach oregon" Discussed on NewsRadio WIOD

NewsRadio WIOD

02:39 min | 2 years ago

"cannon beach oregon" Discussed on NewsRadio WIOD

"Cancer house Democrats huddle in the coming week to determine when to send the articles of impeachment against president trump to the Senate for trial speaker Nancy Pelosi says nothing the Senate can do can only impeach the president but from lawyer Rudy Giuliani's as Chief Justice John Roberts can exonerate Mr trump by throwing out the case as soon as the Senate trial begins not clear that Chief Justice Roberts will see it that way in all likelihood he will follow justice Rehnquist example from the Clinton impeachment doing more by doing less ABC's David Wright Russian meddling in the twenty sixteen election documented by the US intelligence community conclusions rejected by the trump administration even today as White House national security adviser Robert o'brien was asked on ABC's this week broadcast if the president will call on the Russians to stay out of this year's race the idea that the president I'd states would would collude with the Russians I mean this is a partisan fantasy that spend over the flames which have been fan for three years now there's zero truth to it the issue put this administration at odds with the intelligence community and led to trump's impeachment Texas governor Greg Abbott announced his state will no longer accept resettlement of new refugees first day to do so under new trump administration policy since twenty to Texas has recital more than eighty eight thousand refugees at second only to California there was a high surf warning at cannon beach Oregon a big wave swept a man and two kids into the water he survived his seven year old daughter did not and this four year old son is missing Coast Guard petty officer leave I read the apt to respect the elements and know that there's no no telling what can happen the Coast Guard suspended the search for the missing four year old retired pope Benedict the sixteenth stirring the pot co authoring a book reaffirming priestly celibacy as pope Francis is weighing whether to allow married men to be ordained to address the pre shortage you're listening to ABC news from the W. Y. O. D. twenty four hour traffic center I continue with a multi vehicle crash in Broward county it's on five ninety five he spent a four forty once got two right lanes blocked may want to stick with state ready for in Miami Dade County find overnight construction get the dolphin expressway shut down and it westbound I. Galloway and you'll find construction at Palm Beach county on the turnpike northbound at Atlantic Avenue two left lanes are blocked the next traffic update two thirty I'm Richard Lewis news radio six Dan WYO date the US plans to expel over a dozen Saudi service members after last month's deadly shooting at Naval Air Station Pensacola the man being expelled or not accused of helping the twenty one year old Saudi.

Miami Dade County Dan WYO Richard Lewis W. Y. O. ABC pope Benedict officer White House David Wright Clinton Rehnquist Naval Air Station Pensacola US Palm Beach county Galloway Senate Broward county pope Francis
"cannon beach oregon" Discussed on KOA 850 AM

KOA 850 AM

02:04 min | 2 years ago

"cannon beach oregon" Discussed on KOA 850 AM

"From ABC news I'm Richard cancer house Democrats huddle in the coming week to determine when to send the articles of impeachment against president trump to the Senate for trial speaker Nancy Pelosi says nothing the Senate can do can only impeach the president but from lawyer Rudy Giuliani's as Chief Justice John Roberts can exonerate Mr trump by throwing out the case as soon as the Senate trial begins not clear that Chief Justice Roberts will see it that way in all likelihood he will follow justice Rehnquist example from the Clinton impeachment doing more by doing less ABC's David Wright Russian meddling in the twenty sixteen election documented by the US intelligence community conclusions rejected by the trump administration even today as White House national security adviser Robert o'brien was asked on ABC's this week broadcast if the president will call on the Russians to stay out of this year's race the idea that the president I'd states would would collude with the Russians I mean this is a partisan fantasy that's been though the flames which have been fan for three years now there's zero truth to it the issue put this administration at odds with the intelligence community and led to trump's impeachment Texas governor Greg Abbott announce his state will no longer accept resettlement of new refugees first day to do so under new trump administration policy since twenty to Texas has resettle more than eighty eight thousand refugees at second only to California there was a high surf warning at cannon beach Oregon a big wave swept a man and two kids into the water he survived his seven year old daughter did not and this four year old son is missing Coast Guard petty officer leave I read the apt to respect the elements and know that there's no no telling what can happen the Coast Guard suspended the search for the missing four year old retired pope Benedict the sixteenth stirring the pot co authoring a book reaffirming priestly celibacy as pope Francis is weighing whether to allow married men to be ordained to address the pre shortage you're listening to ABC news can't when used time is twelve oh two Aurora.

ABC pope Benedict officer White House US David Wright Clinton Rehnquist Richard cancer Aurora pope Francis Senate cannon beach Oregon California Texas Greg Abbott Robert o'brien Mr trump
"cannon beach oregon" Discussed on NewsRadio KFBK

NewsRadio KFBK

02:39 min | 2 years ago

"cannon beach oregon" Discussed on NewsRadio KFBK

"Going shopping ninety eight Douglas Boulevard in Roseville please mention Pat wall sencha news ninety three point one K. F. local news breaking news traffic and weather BG Sacramento and we can get from Pollock pines from ABC news I'm Richard cancer house Democrats huddle in the coming week to determine when to send the articles of impeachment against president trump to the Senate for trial speaker Nancy Pelosi says nothing the Senate can do can only impeach the president but from lawyer Rudy Giuliani's as Chief Justice John Roberts can exonerate Mr trump by throwing out the case as soon as the Senate trial begins not clear that Chief Justice Roberts will see it that way in all likelihood he will follow justice Rehnquist example from the Clinton impeachment doing more by doing less ABC's David Wright Russian meddling in the twenty sixteen election documented by the US intelligence community conclusions rejected by the trump administration even today as White House national security adviser Robert o'brien was asked on A. B. C.'s this week broadcast if the president will call on the Russians to stay out of this year's race the idea that the president I'd states would would collude with the Russians I mean this is a partisan fantasy that spend over the flames which have been fan for three years now there's zero truth to it the issue put this administration at odds with the intelligence community and led to trump's impeachment Texas governor Greg Abbott announce his state will no longer accept resettlement of new refugees first day to do so under new trump administration policy since twenty to Texas has resettle more than eighty eight thousand refugees that second only to California there was a high surf warning at cannon beach Oregon a big wave swept a man and two kids into the water he survived his seven year old daughter did not and this four year old son is missing Coast Guard petty officer leave I read you have to respect the elements and know that there's no no telling what can happen the Coast Guard suspended the search for the missing four year old retired pope Benedict the sixteenth stirring the pot co authoring a book reaffirming priestly celibacy as pope Francis is weighing whether to allow married men to be ordained to address the pre shortage you're listening to ABC news and I heart radio station news ninety three point one KFBK California has plenty of experience with earthquakes so governor Gavin Newsom is sending a team of quick specialists supporter Rico which has been shattered by earthquakes big and small over the last two weeks the governor's office says the thirty one percent incident management team leave Sacramento for San Juan Sunday part of governor Newsom state.

David Wright Gavin Newsom Rico Sacramento San Juan K. F. Richard cancer Rehnquist Clinton pope Francis US White House officer pope Benedict ABC KFBK California governor Newsom Pollock pines
"cannon beach oregon" Discussed on WTVN

WTVN

02:06 min | 2 years ago

"cannon beach oregon" Discussed on WTVN

"From ABC news I'm Richard cancer house Democrats huddle in the coming week to determine when to send the articles of impeachment against president trump to the Senate for trial speaker Nancy Pelosi says nothing the Senate can do can only impeach the president but from lawyer Rudy Giuliani's as Chief Justice John Roberts can exonerate Mr trump by throwing out the case as soon as the Senate trial begins not clear that Chief Justice Roberts will see it that way in all likelihood he will follow justice Rehnquist example from the Clinton impeachment doing more by doing less ABC's David Wright Russian meddling in the twenty sixteen election documented by the US intelligence community conclusions rejected by the trump administration even today as White House national security adviser Robert o'brien was asked on A. B. C.'s this week broadcast if the president will call on the Russians to stay out of this year's race the idea that the president I'd states would would collude with the Russians I mean this is a partisan fantasy that spend over the flames which have been fan for three years now there's zero truth to it the issue put this administration at odds with the intelligence community and led to trump's impeachment Texas governor Greg Abbott announce his state will no longer accept resettlement of new refugees first day to do so under new trump administration policy since twenty to Texas has resettle more than eighty eight thousand refugees that second only to California there was a high surf warning at cannon beach Oregon a big wave swept a man and two kids into the water he survived his seven year old daughter did not and this four year old son is missing Coast Guard petty officer leave I read the apt to respect the elements and know that there's no no telling what can happen the Coast Guard suspended the search for the missing four year old retired pope Benedict the sixteenth stirring the pot co authoring a book reaffirming priestly celibacy as pope Francis is weighing whether to allow married men to be ordained to address the pre shortage you're listening to ABC news are you more than ten thousand in debt feel like you're on a never ending treadmill staying in one place and never getting ahead you feel like there is No Way Out.

cannon beach Oregon ABC pope Benedict officer White House US David Wright Clinton Rehnquist Richard cancer pope Francis Senate California Texas Greg Abbott B. C. Robert o'brien Mr trump
"cannon beach oregon" Discussed on New Jersey 101.5

New Jersey 101.5

02:53 min | 2 years ago

"cannon beach oregon" Discussed on New Jersey 101.5

"New Jersey's most listened to station to Jersey one at one point five news starts. report at this hour. cancel the south Plainfield Labor Day parade governor Murphy was scheduled to attend because they found destructive devices near the parade route fifty five year old Thomas Keiser of south Plainfield charged with possession of a destructive device for an unlawful purpose the town still plans to celebrate Labor Day in some way although they don't know yet what that celebration will be more on the story at NJ one one five dot com. Jersey may have the toughest school bus safety laws in the nation but they don't mean much of other drivers failed to do their part in protecting children be mindful of school buses stopping in front of you be mindful of kids walking waiting boarding or getting off school buses that's MBC chairs to full who says no meeting or appointment is more important than the kids safety. an arrest in a hit and run death of a man found on the lawn of brick township home late Sunday evening twenty eight year old Robert Beringer died at the scene it appeared he had been walking on the shoulder of drum point road when he was hit from behind by a work fan that fled with this is help police find the owner thirty seven year old Craig venter junior of born again. the gunman who killed seven people in a West Texas rampage called nine one one both before and after the shooting began officers killed thirty six rolled Seth a tour Saturday outside of busy does a movie theater after a spate of violence that spanned ten miles an FBI spokesman says a tort was on a long spiral of going down and had been making rambling statements about some of the atrocities that he felt that he had gone through what's so great about the garden state each week at this time we profile some of the individuals and groups that make the garden state such a great place to live spurred by his own cancer recovery and inspired by a cousins fight with multiple myeloma the Jersey guys taking part in a cross country bike ride Carlin bird and Chesterfield says the coast to coast for cancer bike ride which he is undertaking along with more than one hundred of his Bristol Myers Squibb colleagues isn't understandably personal journey for him even though the overall goal is to raise a million dollars for the V. foundation for cancer research we put the you know the names of the people on our back and we ride for them and it is very inspirational and it is just a great way to create awareness the writers will cover almost three thousand miles from cannon beach Oregon all the way into New Jersey to Long Branch starting tomorrow Burt's portion of the trip is about two hundred twenty five miles the sixth of seven legs from Indy to Pittsburgh Patrick Larry New Jersey one one point five news and if you have more good news about New Jersey let us know at NJ one one five dot com warmer and Rainier is the week goes on chief meteorologist stands arrows complete forecast coming up to Jersey fast traffic in one minute..

New Jersey Plainfield Robert Beringer Thomas Keiser Bristol Myers Squibb governor Murphy Craig venter multiple myeloma brick township Seth MBC Long Branch FBI chief meteorologist West Texas cannon beach Oregon Indy Patrick Larry Chesterfield Burt
"cannon beach oregon" Discussed on KOMO

KOMO

03:51 min | 2 years ago

"cannon beach oregon" Discussed on KOMO

"Contamination of ocean water the popular cannon beach oregon area swimmers surfers waiters being warned to avoid the water until that advisory is lifted los angeles has a lot of the same problems as seattle when it comes to the homeless crisis but on a bigger scale and with that comes across very tale komo's eric johnson joins us after just returning from l. a. and what did you discover when you were there eric look they have a lot of the very same problems that we have large numbers of homeless huge numbers of addiction but it's just on a much grander more epic scale and i'll give you an example skid row in the heart of los angeles is fifty three square blocks of abject misery and addiction and hopelessness fifty three square blocks the numbers in l._a. dwarf what we've seen here we all know how profound our own problems are in seattle in los angeles alone just within the city limits they have by latest count thirty six thousand homeless people in l._a. county fifty nine thousand by comparison king county has twelve thousand five hundred so think of the enormity of our of our problems here times at by four or five or in some cases ten and you you begin to see what's going on in los angeles but you noticed something else when it comes to disease as well yeah they are experiencing outbreaks of medieval diseases diseases that haven't really their heads since the middle ages draw dr drew pinski talk to me at length he is outraged he's furious they've they've had outbreaks of typhus typhoid fever cholera things you just don't hear about any more and he is deathly afraid he says he stays up at night because he is almost certain that bubonic plague is in place right now in the city of los angeles and if it isn't it will be by the end of this summer who is dr pinski game what's he doing about this dr pinski's practice for thirty five years he has he has a radio show down in los angeles he is screaming from the mountain tops and he says he feels like he's waving on a railroad track for the engine to stop because he knows the bridges out and he says i just feel like the engineers are giving me the finger and by the engineers he's talking about the mary suck in about the city council he's talking about the machine that hasn't gotten serious about addressing this and it's all about or a lot of it is about rats an army of millions of rats of infested city hall the l. a police department all of skid row and bonnet plague for instance it's not a magical mystery disease it's fleas biting rats and then getting on people and a guy named andy bales who is the c._e._o. of the union rescue mission he says this skid row is like a petri dish for disease and it's it's actually happening did that concern you because you know about the rat problem we've seen here in the camps absolutely if we don't look and that's why we went down there this is a cautionary tale this is stuff that is really happening this isn't make believe and all of the same conditions are in place here in seattle albeit not on as grand scale but they're still here and it is happening we have to learn from what's happening around us and i'm afraid that that's not happening it's it's certainly not happening in los angeles and can we see your special report tonight at six o'clock will also be posted online komo news dot com it'll be on my facebook page eric johnson komo and i'm just hoping that we can get ahead of some of the things that los angeles did not get ahead of komo eric johnson thanks eric komo news time three fifty insurance money update now here is brad smith the dow jump three hundred fifty three points.

los angeles seattle oregon thirty five years
"cannon beach oregon" Discussed on NewsRadio KFBK

NewsRadio KFBK

07:31 min | 3 years ago

"cannon beach oregon" Discussed on NewsRadio KFBK

"To ask you. The first one is it's you in fiber, optics, the other homegrown United States urban legend would consider getting together and putting together a movie about your exploits. And the things that you've done over the years. So that it's not lost history. I think it'd be very interesting. No. Yeah. He's fiber optic has a handle for a guy named Mark being. He was also a hacker who's also gone straight. And who is well known. I haven't talked in quite some time. But the good news is I might there. There might be a new release a news where there might be a new movie based on my book ghost and the wires. Being done. So hopefully that will come to fruition. But yeah, I respect and what he's done. And there was a Pryor movie about my exploits that wasn't true. It was it was not accurate at all call takedown. And now, hopefully, we can set the record straight and a feature film or short TV series will be done on goes in the wires. Yeah. What else? Do you have Jeff worse? The other thing is is a after PCS FTP site that I was looking for within the last week and a half or so I just got tired of jumping through the hoops and the side. So I said, well, you know, I'll just check out this FTP site and see if I can get it that way to their public access server. So I thought didn't FTC side for whatever the company was remember anymore. And I I had fat fingers and hit a wrong switch on there somewhere like an apostrophe or or whatever. And I ended up with websites that look interesting that wasn't what I was looking for. So I clicked on one of them. Then I got this nice little sign that said, this is a restricted access web server, and if you don't have access for this trip flying in prison term and all that. Well, you know, this is probably not semi wanna look at even though I had the files in front of me on my computer screen and access to the parent directory. So I started I clicked on another one interesting wasn't what I was looking for. But you know, what's this? John struck date shows using their server, and I got another government actress shine after about the third or fourth one I want, you know, some isn't that right here. I got off of it right away. So I was wondering if that kind of extra serve access to government servers is actually legal or not. I mean, if it's normal 'cause I've never run into it before. And I didn't realize it was dot gov that web server until I actually started looking at the addresses instead of the title. Well, it's quite strange. They'd have FTP access to a government survey these days right that that's a really odd. But if you don't have authorization to access computer, I'd stay away from it. I didn't down that path and it didn't work out too. Well for me back in those days. So make sure when you're actually seeing any system that you have authorisation I Kevin who is q. Why can't they find this group or this person queueing on Q? And I really yeah. They they post a whole bunch of stuff about the deep state Q A N O N. I heard of it. But I didn't actually. Mean look into it. I don't have the answer for you. Now. How can somebody go online and not be discovered where they're originating from? How do you hide that? Well, remember, we earlier in the show we talked about tour and Torres, you know, it's one of the mechanisms to access the dark web, but it's also a mechanism to maintain anonymity. People think towards one hundred percent safe. I would suspect intelligence agencies have techniques and tactics that could be used to unmask a user if you recall, I don't know if you recall this case of silk road, it was run by this guy named boss old bread. And he was so dependent. He bet his life on it. He essentially back his life that the US government would never be able to track the real IP address of the server and the eventually did buy software flaw in it and tracked it to Iceland and Allen. Fortunately, you sitting in prison for life without parole. She bet your life on it. There's always a way to be anonymous you, but that's one of the mechanisms if you're doing something, you're you're you're a straight shooter, you're doing something legal. You could always use tour to anonymous your activity elisa's back with us in Portland, Oregon. Hi, lisa. Careful clowns on the on the. We don't want those clowns. A couple of things there's a free app IOS and Google play. It's called true caller, and it's free. And I have that on my phone. I haven't had a stem call since may. Okay. Looking I. So I just wanting to know your thoughts on the the many shoes that keep washing up complete with intact. Matter of fact, we just had a tennis shoe washed up yesterday at cannon beach, Oregon. Inside his tennis becoming up on British Columbia and everything out there. Related to the dark web. Well, I don't know. I don't know if you can answer that Kevin. Yeah. I would have no idea there are. Our body parts of showing feats and. Lots of feet sometimes with shoes on believe it or not weird. Okay. At least that's worth checking into though, I think Kevin's not the one. But it's a great story. Joe on Long Island, New York. Go ahead. Joe? Hello, Kevin great show. I just heard in the last couple of days about people with credit cards and our wallets can actually have them hacked as a pedestrian by somebody walking nearby and that the selling wallets to help protect against us. Have you heard of this this apple that's possible? They have they have there's a little machine that they can scan through and grab it. Go ahead, grab what your credit card or some other or your proximity access card a credit card. They're not gonna be able to gain that data remotely unless it now. Some of those your credit cards have pay pass, but you'd have to get extremely close to a victim's credit card, but typically when we're doing physical security engagements, which means companies hire us to physically break in a lot of companies use access control cards, and you have to have a badger a car to get into the building. Well, one of our common techniques is we have devices are build devices were only able to get within three feet of a victim. And covertly read the information off the card that allows us to clone the card and gain access to the building as a particular victim, which is very common. We go to ten now in Alabama. Hello tin. Good morning. Sure..

Kevin tennis Oregon Mark United States Joe FTC Pryor Jeff Portland US apple John Torres Alabama
"cannon beach oregon" Discussed on WTMJ 620

WTMJ 620

08:41 min | 3 years ago

"cannon beach oregon" Discussed on WTMJ 620

"Well. Facebook was recently compromised this year and the bad guy. Well, what the what the people who are behind the attacks figure? It out is actually how to use what they have use not. Users user names and passwords, but there's a there's a technology that allows us to use tokens, and what the threat actors were able to do is use the tokens taking access to targeted Facebook users. So Facebook also has suffered compromise, of course, with the Cambridge Analytica. Issue that was you know, obviously in the press, and that's kind of huge news. So Facebook has some problems that they need to resolve Jeff in Santa Rosa, California. Jeffrey, you're on with us. Go ahead. Hey, George good here again. Thank you, sir. Welcome. Mr. Nick Mitnick, Kevin Mitnick, you are an urban legend. And I am very honored to be speaking with you tonight. And I have two things that I would like to ask you. The first one is if you in fiber optic homegrown United States urban legend would consider getting together and putting together a movie about your exploits. And the things that you've done over the years though, that it's not lost the history. I think it'd be very interesting. Yeah. You know? Yeah. Houston fiber optic has a handle for a guy named Mark being. He was also a hacker who's also gone straight. And who is well known. I haven't talked in quite some time. But the good news is I might there might be a new release news where there might be a new movie based on my book ghost in the wires thing gotten. So hopefully that will come to fruition. But yeah, I respect Mark. And what he's done, and there was a Pryor movie about my exploits that wasn't true. It was it was not accurate at all call takedown. And now, hopefully, we can set the record straight and a feature film or short TV series will be done on ghosts in the wires. What else do you have Jeff force? The other thing is is a. Yes. That I was looking for within the last week and a half or so I just got tired of jumping through the hoops and the side. So I said, well, you know, just check out this FTP site and see if I can get it that way to their public access server. So I didn't FTC side for whatever the company was remember anymore. And I I had fat fingers and hit a wrong switch on their somewheres. When like an apostrophe or whatever wants, and I ended up with websites that look interesting, but wasn't what I was looking for. So I clicked on one of them. Then I got this nice little sign that said, this is a restricted access web server, and if you don't have access for this. Defined in prison term and all that. Well, you know, this is probably not wanna look at even though I had the the files in front of me on my computer screen and access to the parent directory. So I started I clicked on another one interesting wasn't what I was looking for. But you know, what's this? On the start page shows us nurse server, and I got another government actress shine after about the third or fourth one. I might you know, some isn't that right here, and I got off of it right away. So I was wondering if that kind of extra serve access to government servers is actually legal or not. I mean, if it's normal 'cause I've never run into it before. And I didn't realize dot gov. The wet server until I actually started looking at the the addresses instead of the title. Well, it's quite strange. They'd have FTP access to a government survey these days right that that's a really odd. But if you don't have authorization to access computer, I'd stay away from it. I've been down that path and it didn't work out too. Well for me back in those days. So make sure when you're accessing any system that you have authorisation I Kevin who is Q on. Why can't they find this group or this person queueing on? Really? Yeah. They they post a whole bunch of stuff about the deep state Q A N O N. I heard of it. But I didn't actually chicken to look into it. I don't have the answer for you. Now. How can somebody go online and not be discovered where they're originating from? How do you hide that? Well, remember, we earlier in the show we talked about tour, and tore, you know, it's one of the mechanisms to access the dark web, but it's also a mechanism to maintain anonymity. Like people think towards one hundred percent safe. I would suspect intelligence agencies have techniques and tactic secretary used unmask tore user, if you recall, I don't know if you recall this case of silk road was run by this guy named boss old bread. And he was so dependent. He bet his life on it. He essentially bet his life that the US government would never be able to track real IT address the server and eventually did buy software flaw and tractor to Iceland and Allen. Fortunately, you sitting in prison for life without parole. Jeez. Bet your life on it. There's always a way that the anonymous you, but that's one of the mechanisms if you're doing something, you know, you're you're you're you're a straight shooter, you're doing something legal. You could always use tore to anonymous your activity. Lisa's back with us in Portland, Oregon. Hi, lisa. Hi, Dr J, V careful that's clowns on the on the were. We don't want those clowns. A couple of things there's a free app IOS and play. It's called true caller, and it's free. I haven't had a stem call since may. Okay. So I just wanting to know your thoughts on the the mini shoes that keep washing up complete with footing. Tact matter of fact, we just had a tennis you washed up yesterday at cannon beach, Oregon. Inside his tennis show coming up on British Columbia and everything out there. Got related to the dark web. I don't know if you can answer that Kevin. Yeah. I would have no idea. There are. Body parts of showing feats and lots of feet sometimes with shoes on believe it or not weird. Okay. Least that's worth checking into though. I think Kevin's not the one. But it's a great story. Joe in Long Island, New York. Go ahead. Joe? Hello, Kevin great show. I just heard in the last couple of days about people with credit cards and now wallets can actually have them hacked as a pedestrian by somebody walking nearby and that the selling wallets to help protect against us. Have you heard of this? That's possible. They have the they have there's a little machine that they can scan through and grab it. Go ahead, grab what your credit card or some other or your proximity access card a credit card. They're not going to be able to gain that data remotely unless it some of those your credit cards have pay pass. But you'd have to get extremely close to a victim's credit card. But typically when we're doing physical security engagements, which means companies hire us to physically break in a lot of companies, use access control cards. You have to have a badger a card to get into the building. Well, one of our common techniques is we have devices are build devices were able to get within three feet of a victim. And covertly read the information off the card that allows us to clone the card and gain access to the building as a particular victim, which is very common. Where are you going to ten now in Alabama? Hello tin. Sure. One about debit.

Kevin Facebook US Jeff Mark Oregon Santa Rosa Jeffrey George Mr. Nick Mitnick Cambridge Analytica Lisa California Joe FTC Pryor
"cannon beach oregon" Discussed on NewsRadio KFBK

NewsRadio KFBK

04:23 min | 3 years ago

"cannon beach oregon" Discussed on NewsRadio KFBK

"If you don't have authorization access, I'd stay away from it. I've been down that path and it didn't work out too. Well for me back in those days. So make sure when you're accessing any system that you have authorization I Kevin who is Q an on. Why can't they find this group or this person queueing on? Really? Yeah. They they post a whole bunch of stuff about the deep state Q A N O N. I heard of it. But I didn't actually chicken to look into it. I don't have the answer for you. Now. How can somebody go online and not be discovered where they're originating from how do you hide that? Well, remember, we earlier in the show we talked about tour and Torres, you know, it's one of the mechanisms to access the dark web, but it's also a mechanism to maintain anonymity. Like people will think towards one hundred percent safe. I would suspect intelligence agencies have techniques and tactics that could be used to unmask tore user, if you recall, I don't know if you recall this case of silk road was run by this guy named Ross old bread. And he was so dependent. He his life on it. He essentially bet his life that the US government would never be able to track the real IT address at a server and eventually did I. Software flaw and tractor to Iceland and Allen. Fortunately, you sitting in prison for life without parole. She bet your life on it. There's always a way that the anonymous you, but that's one of the mechanisms if you're doing something, you know, you're you're you're you're a straight shooter, you're doing something legal. You could always use tore to anonymous your activity. Elisa's back with us in Portland, Oregon. Hi, lisa. George careful that's clowns on the on the we don't want those clowns. A couple of things there's a free app IOS and Google play. It's called true caller, and it's free. And I have that on my phone. I haven't had a Sam call since may. Okay. So I just wanting to know your thoughts on the the mini shoes that keep washing up complete with intact. Matter of fact, we just had a tennis you washed up yesterday at cannon beach, Oregon inside his tennis becoming up on British Columbia and everything out there. Is that related to the dark web? Oh, I don't know. I don't know if you can answer that Kevin. Yeah. I would have no idea. There are feet. Parts of showing feeds and lots of feet sometimes with shoes on believe it or not weird. Okay. Least that's worth checking into though, I think Kevin's not the one. But it's a great story. Joe in Long Island, New York. Go ahead. Joe? Hello, Kevin great show. I just heard in the last couple of days about people with credit cards and our wallets can actually have them hacked as a pedestrian by somebody walking nearby and at the selling. Wow, it's to help protect against us. Have you heard of this is this? Oh, yeah. That's possible. They have the they have there's a little machine that they can scan through and grab it. Go ahead. Well, grab what your credit card or some other or your proximity access card credit card. They're not gonna be able to gain that data remotely unless it now. Some of those your credit cards have pay pass, but you'd have to get extremely close to a victim's credit card, but typically when we're doing physical security engagements, which means companies hire us to physically break in a lot of companies use access control cards mean you have to have a badger a card to get into the building. Well, one of our common techniques is we have devices are Bill devices were able to get within three feet of a victim. And covertly read the information off the card that allows us to clone the card and gain access to the building as a particular victim, which is very common. Where are you going to ten now in Alabama? Hello tin. Good morning..

Kevin US Torres Oregon Joe tennis Ross Google Long Island Portland lisa Elisa George Alabama cannon beach Iceland Allen I. Software
"cannon beach oregon" Discussed on News Radio 1190 KEX

News Radio 1190 KEX

12:32 min | 3 years ago

"cannon beach oregon" Discussed on News Radio 1190 KEX

"Eleven ninety A M K E X. Welcome back with Kevin Mitnick. Kevin does a company no quickly that they've been hacked. How did they find out? Usually when something bad happens. Like one of the users reports they've been hit with ransomware or some of their data is leaked or someone one of their defenders companies. Sometimes engage what they call blue teams, which are cybersecurity experts that are tasked with trying to find intrusions in the company's not working you detect something. That's how some of these major data breaches or figure it out through these defenders that were on the breach companies networks. So that sort of thing what's scary is in a lot of cases where you know, like, we're talking about critical infrastructure or even some big name enterprises. They realize when they go and look that they realize it, but there's already been a compromise. What do you see in store in two thousand nineteen and beyond in the world of hacking more sophistication, well spearfishing I think is on the rise. In fact, I. I don't know if you notice I'm the chief hacking officer of the company called know before that's K and oh WBZ four, and what our company is in over six hundred employees now, but are your security awareness training already at over twenty thousand companies, they get to see my face actually on training videos, and that sort of thing, and what what is really cool is we offer this simulated fishing platform. So companies could actually start phishing campaigns against their own employees testing getting ransomware. They'll get a message. Hey, you made a mistake. You know? Yeah. That sort of thing that's cool. All right back to the question for you. Because I look this up. And I I don't know if you did you ever have a g mail account. Did I ever? Yes. Because of my phone. No, okay. Because actually in the password databases, a George Noory gmaiLcom G dot com that had a leak password. I just wanted to make sure that wasn't me. But there's an impostor by probably stole my name. Right. Oh, I get it all the time. I tried to register at a lot of different public services like g mail, or whatever and people have already stolen my name. Let's go to j Minnesota welcome to the show. Go ahead. J george. Thanks for taking my call. Sure. Thing warning educational showing a great guest, Mr. Mitnick, it's an honor. I read your book the art of visibility, and it really opened my eyes. I mean, I worked in IT for ten years. And I was not prepared for the information that you revealed in that book, I feel like everybody should read this to understand, you know, the the simplest of things that they where they're vulnerable. And but I have a question. I'd just like to ask you, what do you think is perhaps one of the best or the best resource that you use for sting informed and up to date on emerging technologies and computer science. Well, when it deals with information security, I follow a lot of the experts on Twitter. So I think that's a really good resource. In fact, Twitter is able to give me a lot of the information like about let's say a security vulnerability or some new research has done. So I keep my ear close to the ground using Twitter as one of my primary resources, and of course, when somebody post the tweet links to some article, or maybe a data breach or some new exploitation technique or new technique of how a company could better or even a consumer could better defend themselves against the cyber attack. So that's what I personally use. Following me on Twitter by Twitter. Name is Kevin Mitnick three easy. And I read tweet a lot of the good articles that I find on Twitter. How vulnerable is Facebook. Kevin. Well. Facebook was recently compromised this year and the bad guy. Well, what the for the people who are behind the attacks figure it out? It's actually how to use. What they how do use not. User's user, names and passwords, but there's a there's a technology that allows us to use tokens, and what the threat actors were able to do is use the tokens they gain access to targeted Facebook years. So Facebook also has suffered compromise, of course, with the Cambridge Analytica. Issue that was you know, obviously in the press, and that's kind of huge news. So Facebook has some problems that they need to resolve Jeff in Santa Rosa, California. Jeffrey, you're on with us. Go ahead. Hey, George good here again. Thank you, sir. He wants to. Mitnick Kevin Mitnick's, you are an urban legend. And I am very honored to be speaking with you tonight. And I have two things that I would like to ask you. The other one is if you in fiber optic, the other homegrown United States urban legend would consider getting together and putting together a movie about your exploits. And the things that you've done over the years. So that it's not lost history. I think it'd be very interesting. Yeah. You know? Yeah. He's fiber optic has a handle for a guy named Mark being. He was also a hacker who's also gone straight. And who is well known. I haven't talked in quite some time. But the good news is I might there. There might be a new release a news where there might be a new movie based on my book ghost in the wires. Thing gotten. So hopefully that will come to fruition. But yeah, I respect Martin what he's done. And there was a Pryor movie about my exploits that wasn't true. It was it was not accurate at all take down. And now, hopefully, we could set the record straight and a feature film or short TV series will be done on goes to the wires. Yeah. What else? Do you have Jeff wars? The other thing is is a after PCS FTP site that I was looking for within the last week and a half or so I just got tired of jumping through the hoops on the side. So I said, well, you know, I'll just check out this FTP site and see if I can get it that way to their public access server. So I thought didn't FTC side for whatever company was remember anymore. And I I had such fingers and hit a wrong switch on there somewhere like an apostrophe or or Laver once and I ended up with websites dead. Interesting that wasn't what I was looking for. So I clicked on one of them. Then I got this nice little sign that said, this is restricted access web server, and if you don't have access for this. Supplying in prison term and all that. Well, you know, this is probably not semi wanna look at even though I had the flu the files in front of me on my computer screen and access to the parent directory. So I started I clicked on another one interesting wasn't what I was looking for. But you know, what's this? On the start date shows us nurse server, and I got another government access shine after about the third or fourth one. I want you know, some isn't that right here, and I got off of it right away. So I was wondering if that kind of extra serve access to government servers is actually legal or not. I mean, if it's normal 'cause I've never run into it before. And I didn't realize it was a dot gov that web server until I actually started looking at the addresses instead of the title. Well, it's quite strange. They'd have FTP access to government survey these days, right that that's a really odd thought if you don't have authorization to access computer. I'd stay away from it. I've been down that path and it didn't work out too. Well for me back in those days. So make sure when you're accessing any system that you have authorisation I Kevin who is Q and on. Why can't they find this group or this person queueing on? Really? Yeah. They they post a whole bunch of stuff about the deep state Q A N O N. I heard of it. But I didn't actually. Chicken mean look into it. I don't have the answer for you. Now. How can somebody go online and not be discovered where they're originating from? How do you hide that? Well, remember we earlier in the show. We talked about tour, and tore is, you know, it's one of the mechanisms to access the dark web, but it's also a mechanism to maintain anonymity. People think towards one hundred percent safe. I would suspect intelligence agencies have techniques and tactics that could be used unmask tore user, if you recall, I don't know if you recall this case of silk road, it was run by this guy named boss old Brit, and he was so dependent he'd better life on it. He essentially bet his life that the US government would never be able to track the real IP address of the server and eventually did buy software flaw and track the Thais land and Allen. Fortunately, you sitting in prison for life without parole. She bet your life on it. There's always a way that the anonymous you, but that's one of the mechanisms you're doing something, you know, you're you're you're you're a straight shooter, you're doing something legal. You could always use tore to anonymous your activity is back with us in Portland, Oregon. Hi, lisa. Be careful. Let's clowns on the on the we don't want those clowns. A couple of things there's a free app IOS and Google play. It's called true caller, and it's free. And I have that on my phone. I haven't had a Sam call since may. Okay. Salamat looking it out. So I just wanting to know your thoughts on the the many shoes that keep washing up complete with foot intact. Matter of fact, we just had a tennis you wash it yesterday at cannon beach, Oregon inside his tennis show coming up on British Columbia and everything out there. Is that related to the dark web? Oh, I don't know. I don't know if you can answer that Kevin. Yeah. I would have no idea. There are. Parts of showing feeds and lots of feet sometimes with shoes on believe it or not weird. Okay. At least that's worth checking into though, I think Kevin's not the one. But it's a great story. Joe in Long Island, New York. Go ahead. Joe? Hello, Kevin great show. I just heard in the last couple of days about people with credit cards and wallets can actually have them hacked as a pedestrian by somebody walking nearby and at the selling Wallich to help protect against us. Have you heard of this apple that's possible? They have the they have there's a little machine that can scan through and grab it. Go ahead, grab what your credit card or some other or your proximity access card a credit card. They're not gonna be able to gain that data remotely unless it now. Some of those your credit cards have pay pass. But you'd have to get extremely close to a victim's credit card. But typically when we're doing physical security engagements, which means companies hire us to physically break in a lot of companies use access control cards, and then you have to have a badger a car to get into the building..

Mitnick Kevin Mitnick Twitter Facebook US J george Jeff wars officer George Noory A M K E flu Joe Long Island j Minnesota Oregon
"cannon beach oregon" Discussed on Newsradio 1200 WOAI

Newsradio 1200 WOAI

12:08 min | 3 years ago

"cannon beach oregon" Discussed on Newsradio 1200 WOAI

"Welcome back with Kevin Mitnick. Kevin does a company no quickly that they've been hacked. How did they find out? Usually when something bad happens. Like one of the users reports they've been hit with ransomware or some of their data leak. There's someone one of their defenders companies sometimes engage what they call blue teams, which are cybersecurity experts that are tasked with trying to find intrusions in the company's not working they detect something. That's how some of these major data breaches or figure it out through these. Defenders that were on the breach companies networks. So that sort of thing what's scary is in a lot of cases where you know, like you were talking about critical infrastructure, even some big name enterprises. They realize when they go and look that they realize it, but there's already been a compromise. What do you see in store in two thousand nineteen and beyond in the world of hacking more sophistication, well spearfishing I think is on the rise. In fact, I don't know if you notice I'm the chief hacking officer of the company called know before that's k and WBZ four, and what our company is in over six hundred employees now, but are your security awareness trainings, already over twenty thousand companies to see my face actually on training videos, and that sort of thing, and what what is really cool is we offer this simulated fishing platform. So companies could actually start phishing campaigns against their own employees testing getting ransomware. They'll get a message. Hey, you made a mistake. You know? Yeah. That of thing. That's cool. All right back to the question for you. Because I look this up, and I don't know if you do you did you ever have a g mail account. Did I ever? Yes. Because of my. No. Okay. Because actually in the password database, a George Noory g mail genius dot com that had a leak password. I just wanted to make sure that wasn't that was dominated. But there's an impostor, but probably stole my name. I get it all the time. I tried to register at a lot of different of public services, like g mail or whatever. And people have already started. Name. Let's go to in Minnesota, welcome to the show. Go ahead. J george. Thanks for taking my call. Sure. Thing one in educational showing a great guest, Mr. Mitnick is an honor. I read your book the art of visibility, and it really opened my eyes. I mean, I worked in IT for ten years. And I was not prepared for the information that you revealed in that book, I feel like everybody should read this to understand, you know, the the simplest of things that they where they're vulnerable. And but I have a question. I'd just like to ask you, what do you think is perhaps one of the best or the best resource that you use for sting informed and up to date on emerging technologies and computer science. Well, when it deals with information security, I follow a lot of experts on Twitter. So I think that's a really good resource. In fact, Twitter is able to give me a lot of the information like about let's say a security vulnerability or some new research has done. So I keep my ear close to the ground using Twitter as one of my primary resources, and of course, when somebody posts a tweet links to some article or maybe a data breach or some new exploitation technique new technique of how a company can better or even a consumer could better defend themselves against the cyber attack. So that's what I personally use following me on Twitter by Twitter. Name is Kevin Mitnick three easy. And I re tweet a lot of the good articles that I find on Twitter. How vulnerable is Facebook. Kevin. Well. Facebook was recently compromised this year and the bad guy about what the what the people who are behind the attack figured out is actually how to use. What they how do you use? User's user, names and passwords, but there's a there's a technology allows us to use tokens and. What's the threat actors were able to do is use the tokens to gain access to targeted Facebook users? So Facebook also has suffered compromise, of course, with the Cambridge Analytica. Issue that was you know, obviously in the press, and that's kind of huge news. So Facebook has some problems that they need to resolve Jeff in Santa Rosa, California. Jeffrey, you're on with us. Go ahead. Hey, George good here again. Thank you, sir. He wants to. Mitnick Kevin Mitnick, you are an urban legend. And I am very honored to be speaking with you tonight. And I have two things that I would like to ask you. The other one is if you in fiber optic, the other homegrown United States urban legend would consider getting together and putting together a movie about your exploits in the thing that you've done over the years. Though that it's not like the history. I think it'd be very interesting. You know? Yeah, Houston fiber optic is a handle for a guy named Mark being. He was also a hacker who's also gone straight. And who is well known. I haven't talked to Mark in quite some time. But the good news is I there there might be a new release news where there might be a new movie based on my book goes to the wires. So hopefully that will come to fruition. But yeah, I respect marking what he's done. And there was a Pryor movie about my exploits that wasn't true. It was it was not accurate at all take down. And now, hopefully, we could set the record straight and a feature film or short TV series will be done and goes to the wires. Yeah. What else? Do you have Jeff force? The other thing is is a FTC. Yes. That I was looking for within the last week and a half or so I just got tired of jumping through the hoops and the side. So I said, well, you know, I'll just check out this FTP site and see if I can get it that way to the public access server. So I thought didn't FTC side for whatever company remember anymore, and I I had fat fingers and hit a wrong switch on there somewhere like an apostrophe or whatever wants, and I ended up with websites that looked interesting but wasn't what I was looking for. So I clicked on one of them. Then I got this nice little sign that said, this is a restricted access web server, and if you don't have access for this. Fine in prison term and all that. Well, you know, this is probably not some I wanna look at even though I had the the files in front of me on my computer screen and access to the parent directory. So I started I clicked on another one interesting. It wasn't what I was looking for it. But you know, what's this was on the start date shows us nurse server, and I got another government actress shine after about the third or fourth one. I, you know, some isn't that right here. I got off of it right away. So I was wondering if that kind of extra taxes to government servers is actually legal or not. I mean, if it's normal 'cause I've never run into it before. And I didn't realize it was dot gov that web server until I actually started looking at the the addresses instead of the title. Well, it's quite strange that they'd have access to a government survey these days, right that that's a really odd thought if you don't have authorization to access any computer, I'd stay away from it. I didn't down that path and it didn't work out too. Well for me back in those days. So make sure when you're accessing any system that you have authorization I Kevin who is Q an on. Why can't they find this group or this person queueing on? Really? Yeah. They they post a whole bunch of stuff about the deep state, Hugh, A N O N. I heard of it. But I didn't actually chicken too. Look into it. Now, how can somebody go online and not be discovered where they're originating from? How do you hide that? Well, remember, we earlier in the show, we talked about tour, and Tori is you know, it's one of the mechanisms to access the dark web, but it's also a mechanism to maintain anonymity. Like people think towards one hundred percent safe. I would suspect intelligence agencies have techniques and tactics used unmask a user if you recall, I don't know if you recall this case of silk road, it was run by this guy named boss oil bread. And he was so dependent. He bet his life on it. He essentially in life that the US government would never be able to track. The real I t address weather center, and he eventually did I. Software flaw and track Thais land and Allen. Fortunately, you sitting in prison for life without parole. She bet your life on it. There's always a way to be anonymous you, but that's one of the mechanisms you're doing something, you know, you're you're you're a straight shooter, you're doing something legal. You could always use to anonymous your activity Lisa's back with us in Portland, Oregon. Hi, lisa. Be careful. Those clowns on the on the west where we don't want those clowns. A couple of things. Is a free app. I o s and Google play. It's called true caller, and it's free. And I have on my phone. I haven't had a Sam call since. Okay. Looking out. I just wanting to know your thoughts on the the main issues that keep washing up complete with intact. Matter of fact, we just had a tennis you washed up yesterday at cannon beach. Oregon tennis coming up on British Columbia and everything out there. Got related to the dark web. I don't know if you can answer that Kevin. Yeah. I would have no idea there. Parts showing feeds and lots of feet sometimes with shoes on believe it or not weird. Okay. At least that's worth checking into though, I think Kevin's not the one. But it's a great story. Joe in Long Island, New York. Go ahead. Joe? Hello, Kevin great show. I just heard in the last couple of days about people with credit cards and that while it's can actually have them hacked as a pedestrian by somebody walking nearby and that the selling Wallich to help protect against us. You heard of this is possible. They have they have there's a little machine that they can scan through and grab it. Go ahead, grab what your credit card or another or your proximity access card credit card. They're not gonna be able to gain that data remotely unless at some of those credit cards have pay pass, but you'd have to be extremely close to a victim's credit card, but typically when we're doing physical security engagements, which means companies hire us to physically break in a lot of companies, use access control cards. You have to have a badger a car to get into the building. Well, one of our common techniques is we have devices are Bill devices were able to get within three feet of a victim. And covertly read the information off the card that allows us to claim the car and gain access to the building as a particular victim, which is very common when you go to ten now and. Alabama. Hello tin..

Kevin Twitter Facebook US J george Oregon Jeff Mr. Mitnick officer George Noory FTC Mitnick Joe Mark Long Island
"cannon beach oregon" Discussed on KOA 850 AM

KOA 850 AM

12:46 min | 3 years ago

"cannon beach oregon" Discussed on KOA 850 AM

"Welcome back with Kevin Mitnick. Kevin does a company no quickly that they've been hacked. How did they find out usually when something bad happens? Like one of their users reports they've been hit with ransomware or some of their data is leaked or someone one of their defenders companies. Sometimes engage what they call blue teams, which are cybersecurity experts that are tasked with trying to find intrusions in the company's not working you detect something. That's how some of these major data breaches where figure it out through these. Defenders that were on the breach companies networks. So that sort of thing what's scary is in a lot of cases where you know, like you were talking about critical infrastructure or even some big name enterprises. They realize when they go and look that they realize it, but there's already been a compromise. What do you see in store in two thousand nineteen and beyond in the world of hacking more sophistication, well spearfishing I think is on the rise. In fact, I I don't know if you notice I'm the chief hacking officer of a company called know before that's K and oh WBZ four, and what our company is in over six hundred employees. Now are your security awareness training already over twenty thousand companies they get to see my face actually on training videos, and that sort of thing, and what what is really cool is. We offer this simulated fishing platform. So companies could actually start phishing campaigns against their own employees testing getting ransomware. They'll get a message. Hey, you made a mistake. You know? Yeah. Yeah. That's that's cool. All right back to the question for you. Yeah. You 'cause I look this up. And I I don't know if you did you ever have a g mail account. Did I ever? Yes. Because of my phone's, no, okay. Because actually in the password databases, a George Noory g mail gmaiLcom that had a leak password. I just wanted to make sure that wasn't that was dominated. But there's an impostor, but probably stole my name. Right. I get it all the time. I tried to register at a lot of different public services like g mail, or whatever and people have already stolen my name. Let's go to j Minnesota welcome to the show. Go ahead. J george. Thanks for taking my call. Sure. Thing warning educational showing a great guest, Mr. Mitnick, it's an honor. I read your book the art of visibility, and it really opened my eyes. I mean, I worked in IT for ten years. And I was not prepared for the information that you revealed in that book, I feel like everybody should read this to understand, you know, the the simplest of things that they where they're vulnerable. And but I have a question. I'd just like to ask you, what do you think is perhaps one of the best or the best resource that you use for sting informed and up to date on emerging technologies and computer science. Well, when it deals with information security, I follow a lot of the experts on Twitter. So I think that's a really good resource. In fact, Twitter is able to give me a lot of the information like about let's say a security vulnerability or some new research has done. So I keep my ear close to the ground using Twitter as one of my primary resources, and of course, when somebody posts a tweet links to some article, or maybe a data breach or some new exploitation technique or new technique of how a company could better or even a consumer could better defend themselves against the cyber attack. So that's what I personally use. Following me on Twitter Twitter name is Kevin Mitnick three easy. And I read tweet a lot of the grid articles that I find on Twitter. How vulnerable is Facebook. Kevin. Well. Facebook was recently compromised this year and the bad guy. Well, what the what the people who are behind the attacks figured out is actually how to use. What they how do use not. Users user names and passwords, but there's a there's a technology that allows us to use tokens and. And what's the threat actors were able to do is use the tokens they gain access to targeted Facebook users. So Facebook also has suffered compromise, of course, with the Cambridge Analytica. Issue that was you know, obviously in the press, and that's kind of huge news. So Facebook has some problems that they need to resolve Jeff in Santa Rosa, California. Jeffrey, you're on with us. Go ahead. Hey, George good here again. Thank you, sir. Mr. Nick Mitnick, Kevin Mitnick, you are an urban legend. And I am very honored to be speaking with you tonight. And I have two things that I would like to ask you. The other one is if you in fiber optic, the other homegrown United States urban legend would consider getting together and putting together a movie about your exploits in the thing that you've done over the years. So that it's not lost to history. I think it'd be very interesting. Yeah. You know? Yeah. Houston fiber optic has a handle for a guy named Mark being. He was also a hacker who's also gone straight. And who was well known. I haven't talked in quite some time. But the good news is I might there. There might be a new release news where there might be a new movie based on my book coast and the wires. Got. So hopefully that will come to fruition. But yeah, I respect Mark. And what he's done, and there was a Pryor movie about my that wasn't true. It was it was not accurate at all call takedown. And now, hopefully, we can set the record straight and a feature film. More short TV series will be done on goes to the wires. Yeah. What else? Do you have Jeff force? The other thing is is a FTC FTP site that I was looking for within the last week and a half or so I just got tired of jumping through the hoops. And so I said, well, you know, I'll just check out this FTP side. See if I can get it that way to their public access server. So I talked in FTC side for whatever the company was remember anymore. And I I had fat fingers and hit a wrong. Switch on there. Somewhere is one of like, an apostrophe or whatever. And I ended up with websites. Did look interesting, but wasn't what I was looking for. So I clicked on one of them. Then I got this nice little sign that said, this is a restricted access web server, and if you don't have access for this. It's a fine in prison term and all that talent. Well, you know, this is probably not semi wanna look at even though I had the files in front of me on my computer screen and access to the parent directory. So I started I clicked on another one interesting wasn't what I was looking for it. But you know, what's this? Was on the start date shows us nurse server, and I got another government actress shine after about the third or fourth one I want, you know, some isn't that right here. I got off of it right away. So I was wondering if that kind of access access to government servers is actually legal or not. I mean, if it's normal 'cause I've never run into it before. And I didn't realize it was dot gov that web server until I actually started looking at the the addresses instead of the title. Well, it's quite strange. They'd have FTP access to a government survey these days right that that's a really odd. But if you don't have authorization access, computer, I'd stay away from it. I've been down that path and it didn't work out too. Well for me back in those days. So make sure when you're accessing any system that you have authorisation I Kevin who is Q and on. Why can't they find this group or this person queueing on? Really? Yeah. They they post a whole bunch of stuff about the deep state Q A N O N. I heard of it. But I didn't actually. To look into it. Now, how can somebody go online and not be discovered where they're originating from? How do you hide that? Well, remember, we earlier in the show we talked about tour and tourism, you know, it's one of the mechanisms to access the dark web, but it's also a mechanism to maintain anonymity. People think towards one hundred percent safe. I would suspect intelligence agencies have techniques and tactics that could be used to unmask tore user, if you recall, I don't know if you recall this case of silk road, it was run by this guy named Ross old bread. And he was so dependent. He bet his life on it. He essentially bet his life that the US government would never be able to track the real IT address of the server and eventually did I. Software flaw, and tracked it to Iceland and Allen. Fortunately, you sitting in prison for life without parole. Jeez. Bet your life on it. There's always a way that the anonymous you, but that's one of the mechanisms you're doing something, you know, you're you're you're a straight shooter, you're doing something legal. You could always use tour to anonymous your activity. Lisa's back with us in Portland, Oregon. Hi, lisa. Care careful. Those clowns on this on the we don't want those clowns. A couple of things there's a free app I o s and Google play. It's called true caller, and it's free. I haven't had a stem call since may. Okay. I'm looking. So I just wanting to know your thoughts on the the many shoes that keep washing up complete with intact. Matter of fact, we just had a tennis shoe washed up yesterday at cannon beach, Oregon. Inside his tennis coming up on British Columbia and everything out there. Got related to the dark web. I don't know if you can answer that Kevin. Yeah. I would have no idea. There are. Body parts have been showing feats and lots of feet sometimes with shoes on believing that weird. Okay. At least that's worth checking into though, I think Kevin's not the one. But it's a great story. Joe in Long Island, New York. Go ahead. Joe? Hello, Kevin great show. I just heard in the last couple of days about people with credit cards and our wallets can actually have them hacked as a pedestrian by somebody walking nearby and that the selling wallets to help protect against us. Have you heard of this is this? That's possible. They have the they have there's a little machine that they can scan through and grab it. Go ahead. Grab what your credit card or some other or your proximity access card credit card. They're not gonna be able to gain that data remotely unless there's some of those your credit cards have pay pass. But you'd have to get extremely close for victims credit card. But typically when we're doing physical security engagements, which means companies hire us to physically break in a lot of companies use access control cards, and then you have to have a badger a car to get into the building. Well, one of our common techniques is we have devices are build devices were able to get within three feet of a victim. And covertly read the information off the card that allows us to clone the car and gain access to the building as a particular victim, which is very common. Where are you going to ten now in Alabama? Hello tin..

Kevin Facebook Twitter Mr. Nick Mitnick US J george Jeff officer George Noory Joe Mark FTC Long Island Oregon
"cannon beach oregon" Discussed on KLBJ 590AM

KLBJ 590AM

12:22 min | 3 years ago

"cannon beach oregon" Discussed on KLBJ 590AM

"Welcome back with Kevin Mitnick. Kevin does a company no quickly that they've been hacked. How did they find out usually when something bad happens? Like one of the users reports they've been hit with ransomware or some of their data is leaked or someone one of their defenders companies. Sometimes engage what they call blue teams, which are cybersecurity experts that are tasked with trying to find intrusions in the company's not working they detect something. That's how some of these major data breaches where figure it out through these defenders that were on the breach companies networks. So that sort of thing what's scary is in a lot of cases where you know, like you were talking about critical infrastructure, even some big name enterprises. They realize when they go and look that they realize, but there's already been a compromise. What do you see in store in two? Thousand nineteen and beyond in the world of hacking more sophistication, well spearfishing I think is on the rise. In fact, I I don't know if you notice I'm the chief hacking officer of a company called know before that's k and WBZ four and what our company is in over six hundred employees now, but our security awareness trainings, already over twenty thousand companies, they get to see my face, actually, training videos, and that sort of thing, and what what is really cool is we offer this simulated fishing platform. So companies could actually start phishing campaigns against their own employees testing getting ransomware. They'll get a message. Hey, you made a mistake. You know in jeopardy. Yeah. Yeah. That sort of thing. That's cool. All right back to the question for you. Yeah. You I look this up. But I I don't know if you did you ever have a g mail. Account. Did I ever? Yes. Because of my phone's, no. Okay. Because actually in the password databases, a George Noory edgy gmaiLcom co dot com that had a leak password. I just wanted to make sure that wasn't nominee. But there's an impostor back probably stole my name. Right. So I get it all the time. I tried to register a lot of different of public services, like G mail, or whatever and people have already stolen my name. Let's go to in Minnesota, welcome to the show. Go ahead. J George, thanks for taking my call thing warning educational showing a great guest, Mr. Mitnick, it's an honor. I read your book the art of in visibility, and it really opened my eyes. I mean, I worked in IT for ten years. And I was not prepared for the information that you revealed in that book, I feel like everybody should read this to understand, you know, the the simplest of things that they where they're vulnerable. And but I have a question. I'd just like to ask you, what do you? Think is perhaps one of the best or the best resource that you use for staying informed and up to date on emerging technologies and computer science. Well, when it deals with information security, I follow a lot of the experts on Twitter. So I think that's a really good resource. In fact, Twitter is able to give me a lot of the information like about let's say a security vulnerability or some new research has done. So I keep my ear close to the ground using Twitter as one of my primary resources, and of course, when somebody posts a tweet links to some article, or maybe a data breach or some new exploitation technique or new technique of how a company can better or even a consumer to better defend themselves against the cyber attack. So that's what I personally use. Following me on Twitter by Twitter. Name is Kevin Mitnick three easy. And I re tweet a lot of the good articles that I find on Twitter. How vulnerable is Facebook. Kevin. Well. Facebook was recently compromised this year, and what the bad guy well for the for the people who are behind the attacks figured out is actually how to use. What they how do use not. Users user names and passwords, but there's a there's a technology that allows us to use tokens. And what's the threat actors were able to do is use the tokens taking access to targeted Facebook users. So Facebook also has suffered compromise, of course, with the Cambridge Analytica. Issue that was you know, obviously in the press, and that's kind of huge news. So Facebook has some problems that they need to resolve Jeff in Santa Rosa, California. Jeffrey, you're on with us. Go ahead. Hey, George good here again. Thank you, sir. He wants Mr.. Mitnick Kevin Mitnick's, you are in urban legend. And I am very honored to be speaking with you tonight. And I have two things that I would like to ask you. The other one is if you in fiber optic, the other homegrown United States urban legend would consider getting together and putting together a movie about your exploits. And the thing that you've done over the years though, that it's not lost the history. I think it'd be very interesting. Yeah. Ask you know. Yeah. He's fiber optic as a handle for a guy named Mark being. He was also a hacker who's also gone straight. And who is well known. I haven't talked to barking in quite some time. But the good news is I might there. There might be a new release a news where there might be a new movie based on my book ghost and the wires. Gotten. So hopefully that will come to fruition. But yeah, I respect market what he's done. And there was a Pryor movie about my exploits that wasn't true. It was it was not accurate at all take down. And now, hopefully, we could set the record straight and a feature film more short TV series will be done goes to the wires. Yeah. What else? Do you have Jeff force? The other thing is is a. Yes. Teepee site that I was looking for within the last week and a half or so I just got tired of jumping through the hoops on the side. So I said, well, you know, just check out this FTP site and see if I can get it that way to the public access server. So I thought then FTC side for whatever company was remember anymore, and I had fat fingers and hit a wrong switch on their somewheres wanna like an apostrophe or whatever lunch. And I ended up with websites that looked interesting but wasn't what I was looking for. So I clicked on one of them. Then I got this nice little sign that said, this is restricted access web server, and if you don't have access for this. Fine in prison term and all that talent. Well, you know, this is probably not something. I wanna look at even though I defy the files in front of me on my computer screen and access to the parent directory. So I started I clicked on another one interesting wasn't what I was looking for. But you know, what's this was on the start date shows us nurse server, and I got another government access shine after about the third or fourth one. I want you know, some isn't that right here, and I got off of it right away. So I was wondering if that kind of extra serve access to government servers is actually legal or not. I mean, if it's normal 'cause I've never run into it before I didn't realize it was a dot gov that web server until I actually started looking at the the address is instead of the title. Well, it's quite strange that they'd have access to a government survey these days right that that's a really odd. But if you don't have authorization to access even beater, I'd stay away from it. I didn't down that path and it didn't work out too. Well for me back in those days. So make sure when you're accessing any system that you have authorisation I Kevin who is Q an on. Why can't they find this group or this person? She went on. Really? Yeah. Post a whole bunch of stuff about the deep state Q A N O N. I heard of it. But I didn't actually. I mean look into it. I don't have an answer for you. Now. How can somebody go online and not be discovered where they're originating from? How do you hide that? Well, remember, we earlier in the show we talked about tour, and is you know, it's one of the mechanisms to access the dark web, but it's also a mechanism to maintain anonymity. Like people think towards one hundred percent safe. I would suspect intelligence agencies have techniques and tactics that could be used mask tore user. If you recall, I don't know if you recall this case of silk road was run by this guy named boss oil. But and he was so dependent. He bet his life on it. He essentially bet his life that the US government would never be able to track the real IT address of the server and the eventually did buy software flaw, then tracked it to Iceland and Allen. Fortunately, you sitting in prison for life without parole. G bet your life on it. There's always a way that the anonymous you, but that's one of the mechanisms of doing something, you know, you're you're you're a straight shooter, you're doing something legal. You could always use tore to anonymous your activity police is back with us in Portland, Oregon. Hi, lisa. George careful that's clowns on the on the west. We don't want those clowns. A couple of things there's a free app IOS and play. It's called true. Caller, three. My son. I haven't had a Sam call since may. Okay. Matt looking out. I just wanting to know your thoughts on the the mini shoes that keep washing up complete with footing. Tact matter of fact, we just had a tennis you washed up yesterday at cannon beach, Oregon inside his tennis show. Yeah. They becoming up on British Columbia and everything out there. To the dark web. Well, I don't know. I don't know if you can answer that Kevin. Yeah. I would have no idea there are. Body parts of showing feats and. Lots of feet sometimes with shoes on believe it or not weird. Okay. Lease that's worth checking into though, I think Kevin sought to one. But it's a great story. Joe on Long Island, New York. Go ahead. Joe? Hello, Kevin great show. I just heard in the last couple days about people with credit cards and that wallets can actually have them hacked as a pedestrian by somebody walking nearby and that the selling wallets to help protect against us. Have you heard of this is this? That's possible. They have they have there's a little machine that they can scan through and grab it. Go ahead, grab what your credit card or some other or your proximity access card a credit card. They're not going to be able to gain that data remotely unless it now. Some of those credit cards have pay pass, but you'd have to get extremely close for victims credit card, but typically when we're doing physical security engagements, which means companies hire us to physically break in a lot of companies use access control cards, and then you have to have a badger a car.

Mitnick Kevin Mitnick Twitter Facebook J George US Jeff George Noory officer Joe Long Island Minnesota Oregon FTC Jeffrey