CyberWire Daily - Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]

Episode Date: September 2, 2025

Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are to...gether in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠, along with ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat. This one’s too good for audio alone — you’ll want to watch the full ⁠video⁠ edition to catch every spicy reaction, every laugh, and maybe even a few tears. So grab your milk, get ready to feel the burn, and come join us for this special hot take on Only Malware in the Building. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. Hey, folks, Dave here. If you want to watch this episode, well, you can check it out on our YouTube channel by going to YouTube.com slash at N2K Cyber. Enjoy the show. Why could we not have done the thing where they bake cupcakes? Oh, my God. So from N2K CyberWire, I'm Keith Milarski, Chief Global Ambassador at Q&Tel,
Starting point is 00:00:39 in retired former FBI agent turned cyber host, and today, your interrogation lead. Welcome to a special heat-infused edition of Only Mailware in the Building, where we're combining digital forensics with hot sauce tactics. Today, I'll be grilling, not just the wings, but our guests, as we turn up the heat, spice, and the scrutiny. The questions get hotter as the sauces do. And by the end, we might uncover some truce our guests didn't see coming.
Starting point is 00:01:12 You ready, Dave? No. Joining me at the table or two of our very own, Dave Bittner, host of the CyberWired Daily, hacking humans, caveat, and probably the most familiar voice in cybersecurity podcasts. And Selena Larson,
Starting point is 00:01:28 senior threat researcher at ProofPoint, expert in cybercrime, and a true hunter of the Internet's most elusive adversaries. Wow. I know. And a hunter of hot dogs. And a hunter of hot dogs. I love a good hot dog.
Starting point is 00:01:58 So we're going to start off just with a question in one that has no heat. So this is literally a softball. This is our baseline to establish what no heat is like. What no heat is like. Okay, so this is for me. The only heat, yes. Okay. The only heat coming is the question.
Starting point is 00:02:23 All right, I'm ready. All right. So this shouldn't be any problem at all. Oh, my gosh. That's delicious. All right. That's pretty good. It's quite tasty.
Starting point is 00:02:34 No sauce. Scoval Zero. So let's take a trip down memory lane. What was the first password you ever used? Was it something super basic like password one, two, three, or did you come up with something a little more creative? How have your password habits changed and evolved since? And be honest, do you still use the same passwords?
Starting point is 00:02:57 It might take you longer to remember this. Go ahead, yeah, because it was longer ago. Yeah, you have more time to think. Go for it. My first password, I think, was probably like my last name. I was very young on the internet coming up using AOL instant messenger and logging on to our little home computer. I honestly can't even remember really what it was, but it was probably something like that.
Starting point is 00:03:20 But a better fun fact is my first AIM screen name, which was P-I-T-A and then my name. which stood for pain in the posterior. Posterior, yes. So I still remember that very clearly, not my password though, but yes, definitely my password uses have changed. Do not use the same password as then or anywhere. And not that you admit it here in front of all of the listeners. Not in front of all of the audience, that's for sure.
Starting point is 00:03:49 But of course, no, it's gotten a lot better. Password managers, multi-backer authentication. Definitely not using that when I was a little teeny bopper. Bopper on my big bubble back. Well, I mean, I started with TRS 80 back in about 1980. Did they even have passwords then? Well, no, the computers didn't. I mean, you press the button and the computer came on.
Starting point is 00:04:13 There was no booting, there was no, you know. But we had dial-up modems, 300-bog dial-up modems, and we dialed into bulletin board systems. I don't know if you ever did any of that. Yeah, I did, yeah. BBS. BBS. So I wanted it, one user at a time, you know.
Starting point is 00:04:28 So it was great. It was fun. My first, I remember my first username was the highly original and clever Ziggy Stardust. Ah, yes. That was you? That was me. But I don't remember, on my password, I don't remember what my original password. It was probably something like appropriate for an 11 or 12-year-old boy.
Starting point is 00:04:52 It was probably something like, you know, Bowie's 60. 69. 69, dudes! I don't, but I do not still use that. Mine I remember vividly, so I remember going to the library and opening my first hotmail account. So I, this before I had my first internet computer at home. And in my first password, I was a big beetle fan. I still am, but it was 28 if, which was on the license plate on the Abbey Road.
Starting point is 00:05:22 So it was, it was, so I had a combination of, both letters and numbers in that. So that was a deep cut. Yes, it was. That's pretty clever. Sauce number one, hacked and hot. Scoville, 1,200. All right, here we go.
Starting point is 00:05:42 This is good. Okay. Mm-hmm. Okay, that's not, I can feel some heat coming. It's building, for sure. There's more coming, not, but manageable. This is something I would expect in a, like an authentic restaurant, you know,
Starting point is 00:06:04 like where they warn you that this is not actually for the Americans. It's a little, that's hotter than I expected. The heat is coming now. The aftertaste, it packs an after punch. And I'm worried because that was the- That was number one. As a cybersecurity expert, what is your personal tech
Starting point is 00:06:24 routine like when you wake up in the morning, do you go straight to checking if you've been hacked or do you start with a fresh cup of coffee? Is there any kind of ritual you have to make to make sure your digital life stays secure? That's a good question. I have an unhealthy addiction to my smartphone and my computer, so I immediately look at my phone as soon as I wake up my alarm clock and I look at it. But this is actually an interesting question because I feel like it's fundamentally about threat modeling, right? And we're thinking about how do you use technology? How do we use technology?
Starting point is 00:06:59 Are we always checking to see, you know, like, what is our risk level? And for us, I mean, I don't know how you feel, Dave, but I feel sort of, I'm very public. I'm out there. Oh, I'm out there. I am imminently findable. Yeah, yeah, yeah, yeah. On the Internet. Yeah.
Starting point is 00:07:15 And so I do kind of think that I'm a little bit more cautious about some of the stuff that I would post of, like, oh, where am I? What am I doing? And, you know, making sure that I do have all those things under control. But more importantly, I also talk to people who know me, who are my friends and family and make sure that they are also very secure. Because for public people, it can, you know, kind of be a little bit of a supply chain, I guess, your best is, you know? Some collateral damage, so to speak.
Starting point is 00:07:44 Exactly, exactly. But yeah, same thing. My phone is what wakes me up in the morning. So I'm on an iPhone. So the first thing it does is tell me everything, you know, hey, good morning. And I have my nickname and my phone is Your Majesty. So it says, good morning, Your Majesty.
Starting point is 00:08:02 Here's the weather and here's what it's going to be, right? I follow the very similar routine that you guys do as well. The one thing I do do is always checking my bank account in my credit cards for, you know, because it's not necessarily that they're going to hack my passwords that are going to, you know, and come into my accounts, but they may hack some. somebody where by credit card or something has been, so I'm always looking for those fraudulent charges, especially when I'm traveling overseas, because you never know whether there's a skimmer there or something like that. So I'm very hypervigilant on that. That's a great point, actually.
Starting point is 00:08:39 And then also using, you know, two-factor authentication. So even if they would get one of our passwords, just, you know, you don't have to worry. It's going to be much more difficult to get in. Sauce number two, threat levels. Scoval 26,500. Let's do it. Let's give it a shot. Down one, two, three. Mm-hmm.
Starting point is 00:09:05 Could taste. Mm-hmm. Time on time. That level, delicious. Yeah, two thumbs up. I think that was the best tasting one so far on that. I am sweating a little. You are a little, yes.
Starting point is 00:09:19 Thanks. All right, so as a cybersecurity pro, you're clearly about protecting yourself from malware. But have you ever had a moment where malware almost got you? Maybe an email attachment or a shady website that you almost clicked on, and how close did you come to a digital disaster? I got God. Yeah?
Starting point is 00:09:41 Yeah. I think we all have. Yeah. So for me, it was the classic, I got a text message from a good friend. that said, hey Dave, did you see this video that was posted of you? Oh no. That's all that said.
Starting point is 00:09:56 Yep. And I was like, no. I got to see what this is. Right, I got to see what this is. So I click through and it takes me to like a Facebook login page. And I logged in. Yeah. That was it.
Starting point is 00:10:10 That was the ball game. And so you got your Facebook hacked. I did. Yeah. I got it back. This is probably, this may have been 10 years ago. So I was a lot less vigilant back then, but at the same time, you know,
Starting point is 00:10:24 I just, I fell for it, hook, line, and sinker. They got me, got my ego, my curiosity, my fear of what could the, what video could this be? Yeah. And now also, because it came from a trusted source. So it was my friend who got hacked, and then they were spamming everybody on their, on their, you know, directory, their list of friends.
Starting point is 00:10:44 Yeah, that was one of the big techniques to do that. So, because now you think it's safe, it's coming, That's like my sister will send me stuff. I will never click on a link that she sends me anything. And I'll call her up, I'll be like, hey, did you just send me something? I want to, I'm not clicking on anything until you tell me it's safe. Yeah, yeah, that's a good trick though. But did anything happen?
Starting point is 00:11:02 No, I mean, I realized it quickly enough that I was able to salvage it and I, so I didn't actually end up losing anything. I did feel pretty stupid though. Well, so I think it's really important because, to your point, everyone has, has something that they could fall for. And we as cyber security practitioners have experienced something that might be bad or whatever. But I think the most important thing
Starting point is 00:11:24 that people need to do is not feel stupid. Yes. Because that is, you know, part of the hack is making you feel stupid. They prey on your brain. They're like are going after you emotionally. They're trying to hack your feelings. And you're, you know, like you were saying,
Starting point is 00:11:38 it played to your ego and your interest. And you're like, I want to see this video of me. And so I think that that's so important because that is, they tailor it to make you feel bad. My almost getting got, I don't think I, as far as I know, have never, like, fully been hacked. But scammers will oftentimes register phone numbers. It's like one letter or one number off of a real phone number. And so I was trying to book a flight.
Starting point is 00:12:03 And I was calling the airline. And I called the airline, but I mistyped the number. And so I was like one number off. It wasn't even clicking on it or wasn't like an attack that says, call this number to dispute it or whatever. I literally just mis-typed it. And then I call and whatever, and it went through the whole answering machine
Starting point is 00:12:21 and, like, this is the airlines and put in your information, put in your date of birth, put in your, all of this stuff. And then there was one thing that they had asked for that I was like, okay, this is weird. But yeah, but I, and then I just started putting in fake information. So I was like, oh, I want to see where this is going.
Starting point is 00:12:36 You're not getting this. Yeah, but then I said it was like, put in your passport information, put in your credit card information. And so, like, put in all the things that are like numbers that you can sort of like type in to get information. And it was all like automated.
Starting point is 00:12:47 I was like, wow, this is actually pretty good. Like, it could have got me. When I was working undercover, my job on the forum was to review any new malware packages that came out. And they really thought that somebody on my site was a Fed. So five people. And they were right. They were right.
Starting point is 00:13:04 They were right. And so what they did was at that time, there was like the control panel for the malware. And they backdoored it. So when it came in to get reviewed, Even though we took it off on like a, you know, like a, not on a production network, you know, on like a research network, and it was backstopped and everything like that, as soon as we executed the file, everything that was on the flash drive, which the analyst had some other things on the flash drive that were like templates of the NCFTA where I was stationed and it went right back to the bad guys. So, yeah, so there was like a little bit of a melancholy moment there where, you know, now all of a sudden they knew somebody worked at the NCFTA.
Starting point is 00:13:49 So we, at that time, we had it backstop to a company and all that. And then we heard a story that they were going to do this expose that one of the admins worked at the NCFTA and, you know, and I thought I was toast. But then what we ended up doing, we made some phone calls and we scrubbed the DNS, We scrubbed to who is, so when they did their expose, none of that stuff existed anymore. And then they were just like NCFTA template reports.
Starting point is 00:14:19 And like the other hackers were like, this is all made up because nobody would have these, you know, these documents there with hypos in it and things like that, because they were just, you know, templates and all that. So I was able to actually skate by, Wow. But that was probably the worst hack because that was my identity, you know,
Starting point is 00:14:37 And that was my, you know, my undercover identity, but we were able to make it through it. So patched it up and is that something that's commonly done in these forums is they'll sort of seed backdoor. Oh, yeah. Yeah, because that's the other, you know, they're always worried about, you know, are there feds or cops there on the forum? So they're always trying to docks people. And so I wouldn't trust anything, like a credit card checker or anything. like I would always make sure you're open, you know, any undercover guys out there, make sure you're opening up, yeah.
Starting point is 00:15:09 Or researchers, make sure you're opening it up in, you know, in a VM and a totally non-attributable network because they're going to backdoor it for sure. We'll be right back. And now a word from our sponsor, Threat Locker, the powerful Zero Trust Enterprise Solutions, that stops ransomware in its tracks. Threat Locker Protect is the core threat locker product focused on endpoint security, designed to prevent unauthorized software from running, control how applications interact, and manage access to storage devices.
Starting point is 00:15:50 Its building blocks are allow listing, ring fencing, and network control. Allow listing is a deny-by-default software that makes application control simple and fast. Ring fencing is an application containment strategy. ensuring apps can only access the system resources they truly need to function. Network control locks down access by port, source IP, or dynamically with ACLs, that automatically update as IP addresses change. Shut out cybercriminals with world-class endpoint protection from Threat Locker. And we thank Threat Locker for sponsoring only malware in the building.
Starting point is 00:16:34 Sauce number three, Scorchware, Scoble Units, 131,000. Right. Mm. Mm. Oh, there it is. Yeah, a little bit there. Starting. So, given your line of work, how often do you take a break from all things cyber?
Starting point is 00:17:03 things cyber. Now it's hitting me. Yes. Do you ever go on a digital detox or is it just impossible to turn off with so much going on in the cybersecurity world? And what is your strategy for really finding balance between staying on top of threats and taking a breather from your screens? Yeah. So I would say any person who works in this industry who says they know everything about everything is lying to you.
Starting point is 00:17:29 You know, I'm something of a scientist myself. Who can rhapsodize on things and, you know, can talk about everything and anything from fraud to, you know, botnets, to APT malware, to nation-state politics, to all these things, that's impossible. Like, one single person cannot stay on top of everything in cybersecurity. And I, for me, I have to be very mindful about the things that I can control and I know impact me in my job. And the things that are interesting to me, but I know that I don't feel responsibility. to be aware of what's happening because other people know way more about this than I do. And so for me, I really want to make sure that I'm staying on top of the stuff that I need to know about and then listen to podcasts like the Cyberwire for the stuff that I could, you know,
Starting point is 00:18:21 it's interesting to me, but maybe not necessarily impacting my work. But from a digital detox perspective, I do think it's very, because burnout in cybersecurity is so real. It's so prevalent. And I think that we are all under a lot of pressure, whether you work deeper or IT Help Desk or, you know, threat research. And so malware reversing, taking stuff from the dark web and downloading it. And so I do try and kind of go off a little, you know, less crazy on my phone and stuff.
Starting point is 00:18:52 But I read a lot of physical books. I love physical books because I do need a brain break. And I get my nails on a lot. And that takes a while. So I put my phone away, my computer away. and I don't, like, that's my, that's my self-care of trying to figure out ways of not being around the screen. Yeah, yeah. My scalp is sweating.
Starting point is 00:19:08 Yes, I was going to say. My nose is running. Okay, so the question was detox. Yes. Okay. What you're going to need after this. Yes. Absolutely.
Starting point is 00:19:22 So, you know, we joke around the office sometimes that, like, my job is, hi, I'm Dave Bittner, and here's today's bad news. news, you know, and so, and that can get to you after a while. And so my job, I'm spending a good part of my day hunting down the bad news and trying to decide, you know, trying to rank them, like what are the, because we do about 10 stories a day on each cyberwire podcast. So what are the most important 10 stories they're going to benefit our audience the most to know about? So I have to do that. But I think to your point, it's a really good one that I cannot be an expert on most of this stuff and so I rely on people like you you know I know who have specialties so I may not know the answer to something but I know
Starting point is 00:20:12 who does and so building those relationships and being able to call somebody up and ask them what does this mean you know I've done that with actually I've done that with both of you yeah so no how do you decompress I don't Listen to David Bowie. When I'm starting to feel it that I need some time off, I need to respect that. And even just sometimes taking a single day to do nothing, to go, you know, walk to go to a state park and hike or stay away. Like you said, put the phone down and just try to breathe and change my space and my mindset and all that kind of stuff. And I think like you were mentioned in our industry, especially doing, you know, GFIR, you're.
Starting point is 00:20:59 It's just pressure. And, you know, one of the things I always told, you know, my agents working for me, the people that work for me in EY, was that you can't, you could run a marathon or you can run a sprint. You can't sprint a marathon. And it's really important to really kind of pace yourself because otherwise you'll burn out very quick. And it's also like when, like if you're lifting weights, if you lift weights every day, you don't make gains. You need time to let those muscles grow. And it's a lot like that in our industry, I think,
Starting point is 00:21:30 that we just put a lot of pressure on ourselves because everything is a five-alarm fire, you know, not just these wings. You know, so it's really important for that. So some of the things that I try to do is, one is I don't bring a phone or a tablet in my bedroom. So it's like, so this way I go up there and I sleep and, you know, I don't have a TV in there. So it's just total decompression. And when I go on vacations, I like to go on cruises because you turn your phone off
Starting point is 00:22:00 because the Wi-Fi on the cruise is just crazy expensive. My glasses are steaming up. Well, before we do this next one, I'm going to put, I have to put my hair up. It's getting hot. Oh, is it? It's time. Oh, I see. It's time.
Starting point is 00:22:13 Okay, very good, very good. It's an extra layer that I don't need. Sauce number four. Only Maruga in the building. Scoval, one million. Oh. Oh. Oh.
Starting point is 00:22:28 What does that mean? It's a pepper. It's a very, very spicy pepper. I can't. Is it the scorpion pepper? Is that a separate one? I don't know if the moruga is the scorpion pepper. Okay.
Starting point is 00:22:38 It's a very spicy pepper. I've never had a maruga pepper. And so this would be interesting. Oh, we have to put extra on it? Yeah, just a little dab. Oh, my gosh. Well, that was a lot. So you probably don't have to do that much, but accidentally overboard.
Starting point is 00:22:50 I'm a dab off. No. Yeah, you can dab off by dab. Oh, look at that. All right. All right, okay. Wait. Only Maruga in the building.
Starting point is 00:23:00 Oh. All right. All right. Down the hedge. Cheers. Cheers. Cheers. Cheers, cheers.
Starting point is 00:23:08 All right. Three, two, one. Mmm. Mm. Very good taste. Yeah. That's good. Mm-hmm.
Starting point is 00:23:18 I'm waiting for it to hit. Okay. Yeah. Not bad. It's coming. Yeah, I can tell. Yeah, I can tell. It's building.
Starting point is 00:23:27 It's just a question of how much and how long. It's a, it's a. Oh, there it is. There it is. Oh, this one, yeah, this one did the longest. Yeah. It's a little. And now that it's there, it's staying.
Starting point is 00:23:38 Oh, wow. Okay. All right. Why could we not have done the thing where they bake cupcakes? Now, now it's. Oh, my God. The taste is good, but it's hot. It is.
Starting point is 00:23:53 Okay. It's hot. Do we have a couple more... Billion breathing fire. Do we have a couple more nuggets? Because I'm not quite done, Mr. Polarski. Okay. Oh no, not the FBI hat.
Starting point is 00:24:11 Ah! Oh, no. The tables are turned and I'll be asking the questions now. Oh, right. Mr. Interrogator. Oh, my gosh. Oh, my gosh. Oh, look at this.
Starting point is 00:24:23 You're representing. Yes. All right. In my previous career, I actually did some work with the FBI. Oh, I did not want to do that. We have another napkin. Did you touch your eyes? Maybe.
Starting point is 00:24:37 Oh my god, my eyes are watery. Okay. It's good. I'm so glad we're not doing 10 of these. Yeah. Oh, thank you. I am going to sweat through this hat. All right.
Starting point is 00:24:47 All right. So, Keith. Yes. Wait, do we need another nuggets? Yes. But I'm trying to move this along, so you know. Drink, drink, drink. All right. I'm ready, Dave.
Starting point is 00:25:02 All right, we're going to do one more round. Okay. With the really hot stuff. Of the real hot stuff. Yes. Wow. We can't go back. I love it.
Starting point is 00:25:11 I love it. No, this is great. This is wonderful. This is awful. All right. Oh, good God. All right. I'm ready.
Starting point is 00:25:21 I'm ready. I'll do a little more. This hurts. so bad. Uh-huh. Get it all there. Yeah. And not like a John Cougar song where it's hurt so good.
Starting point is 00:25:29 No, no, no. This is unpleasant. This is really unpleasant. Okay. Hey, Dave, why don't you be a podcaster? That'd be fun. Oh, yeah. We'll make funny videos and we'll have a good time.
Starting point is 00:25:38 That sounds like a great career. All right. It's flashing before your eyes. I know. Well, lots of things are. All right. Three, two, one. Cheers.
Starting point is 00:25:47 Cheers. Yeah. Okay. So. So. G, man. In your career with the FBI, in all your years of hunting down bad guys, what was the craziest thing you ever saw? What was the wildest thing that made you step back and go, is this, could this possibly be real with these numb skulls that I'm chasing around the world?
Starting point is 00:26:16 Okay, I'm taking this hat off because, oh, I'm going to eat this first one. There's one extra. There's one left. Dull things. I know there were some crazy personalities. Wasn't there a guy with the cats? There were guys with cats. Like exotic cats, right?
Starting point is 00:26:36 Yeah, so that was Bogachev, the game over Zeus. Oh, yeah. So he was very unique in that, you know, he had these exotic cats. Was it like a lynx or like a... Yeah, yeah. It was like, yeah. Like, links or like a bobcat. A bobcat, there we were.
Starting point is 00:26:53 you know he had uh thank you thank you so much uh yeah yeah so i'm going slow in this dave yeah well how's your brain yeah it's it's going good yeah my eyes have stopped watering so uh yeah i mean i i guess like the the the funniest things is that uh their their wives and girlfriends always never met a camera that they didn't like so So we had... Like me. Yeah. So we had a thing like, you know, you've heard in like the intelligence community, you heard
Starting point is 00:27:31 of like UMIT, which is like UMIT intelligence or SIGAN. And so we had a thing which we called Wagint for WISE and Girlfriends Intelligence. So, you know, just seeing what they would be posting all the time and, you know, just going, and you just saw crazy stuff, a lot of stuff not safe for work. So you could just kind of imagine some of those. but you know they would post where they were which was always great for us because then you knew what they were doing so yeah so that that's the best I can come with the clarity of my head right now so how are you I'm good this is great
Starting point is 00:28:08 this is great for me yeah I'm doing better now I'm dying here guys but the fact that you doubled down and we went for two so so we're gonna talk our first computers what was the first one you own that you use that sparked your love for tech. Was it a bulky desktop from the 90s or something else entirely? And then was there a specific moment when you thought, okay, this is, I'm hooked on tech. So I will enter. Go ahead. You have a thing about me. I didn't like technology when I was growing up. I didn't like it. I like, you know, all millennials had our, you know, MySpace and AIM and everything. And
Starting point is 00:28:47 I like did the marquee scroll so stuff could go across my MySpace page. And I was like, I'm a hacker. But I didn't really like technology, and I was kind of whatever about it. I really wanted to be, I was a journalist, so I really wanted to be a journalist, I wanted to be a writer, wanted to, you know, be a person with that does words and not numbers. And then I went to San Francisco, and I was doing a job interview in San Francisco, and they're like, well, it was for technology reporter jobs, and it was like, well, you know, what do you know about, or like, what do you know about technology? And I'm like, nothing.
Starting point is 00:29:18 But you know what I do know about the news? And in San Francisco, technology is the news. And so I very quickly became, got up, caught up to speed. And then I was like, wow, I let it. And then I really like cybersecurity and privacy. And so I was like, I'm almost entirely self-pought. I haven't really, I've done some trainings, but not a ton. But now I love it.
Starting point is 00:29:38 But now I love it. But my first computer was the, like, bubble Mac. Okay, yeah. I think it was a teal, like the teal bubble Mac. I had to share it with my siblings. Look at a Mac. Yeah, yeah. Yeah, we had designated, like,
Starting point is 00:29:50 you know times and things you could do and and I think I just had just missed that you can't use the phone and the computer at the same time yeah my sister had that but then I had them oh we had to know what about you did I'm sorry I didn't hear a single word you just saw the first time I laid hands on computers was I went to like a They had like a special summer camp, summer school kind of thing. And they had TRS80 Model 1s, which are like some of the original 8-bit computers. So that's where I learned how to like program basic. And I loved it.
Starting point is 00:30:32 I loved it so much. So then I saved up money because I had a paper route. And I bought a TRS-80 color computer. Yeah. I could hook up to a cheap TV and I had a cassette recorder and all that original stuff. And you know, the thing is when you're 11 or 12, like you don't have any money. But the thing you have is time. Yeah.
Starting point is 00:30:52 So I would spend all summer long just like all night, you know, whatever. And I programmed all my own stuff and eventually got a modem. And that opened up a whole other world of phone freaking and... You were a freaker? I was. Wow. Love it. Did you freak?
Starting point is 00:31:08 I did not. Yeah. I did not. I got into it a little bit later when I got into college. So, you know, they had these Apple computers, you know, at college. So you kind of got into that and just... started out with, I wanted something easier than a typewriter to type my stuff, and then it kind of went from there. And then one of my roommates would always play on a computer,
Starting point is 00:31:29 you know, you'd play like Leisure Suit Larry or, you know, things like that. You know, so just kind of go in and from the games. And then finally, you know, when Windows 95 came out with the Start Me Up campaign, that's kind of when I got that first internet computer, which was a gateway computer back in those days. And I think, I can't even remember. I remember like the hard drive was probably like two gigabytes, maybe three gigabytes, something like that. And you had that, you know, very fast, 28-bit modem, dial-up, you know, which was crazy. And then, you know, when I was at the FBI, I did more, like, offensive stuff. So, because I worked counterintelligence and espionage for my first seven years.
Starting point is 00:32:09 And then I was like, well, this Internet thing I don't think is going to be a fad. You know, I think it's not going to go away. So I transferred over to Cyber Division. And then I had a really great, I was like you, I wasn't formally trained, but I had a great agent. His name was Tom Grasso, and he was kind of like my Yoda, you know, that he just could take time and would show me how to do everything. And, you know, from that, it just kind of took off.
Starting point is 00:32:33 Oh, that's great. Yeah, yeah. Yeah, and that was, you know, pretty, like, big Internet where everything is just accessible at any time. Right. And so you're just kind of curious as like, you know, what is going on over in East Germany? What is going on in just, you know, even in the UK, It's just a lot different for sure.
Starting point is 00:32:51 Yeah. Well, all right. Dave, Selena, we just took on the wings of death, and now there's nothing left here. Nothing to do right now, but to just roll out the red carpet for this camera, this camera, and this camera. Yeah. I'm good.
Starting point is 00:33:09 Yeah. Yeah, and I also let's look. I would invite all of our listeners. Yes, please. First of all, first of all, try some pawn sauce. It'll make your brain rattle. And you'll be very happy
Starting point is 00:33:21 and tell some fun stories with your friends. But more importantly, tune in wherever you get your podcast to Only Mower in the building. N2K Network, Cyberwire, the great cast and crew here. Actually in the building, only crew in the building.
Starting point is 00:33:37 Very exciting. And we've survived. We survived. We thrived. We thrived. Tune in to Only Mower in the building. Day's not over yet. Day's not over yet. All right.
Starting point is 00:33:49 He did it. That was a blast, guy. malware in the building. Visit Threatlocker.com.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.