librarypunk - 068 - Ransomware

Episode Date: October 4, 2022

This week Sadie is teaching Jay and Justin about cybersecurity. Phishing, bitcoin, CISA-lords, and more!  Readings https://www.bleepingcomputer.com/news/security/leading-library-services-firm-baker-a...nd-taylor-hit-by-ransomware/ https://publiclibrariesonline.org/2021/05/ransomware-attacks-at-libraries-how-they-happen-what-to-do/ https://www.spiceworks.com/it-security/cyber-risk-management/guest-article/why-are-small-businesses-suffering-for-steep-cyber-insurance-premiums/  Media mentioned: Demon core - Wikipedia  Line Goes Up – The Problem With NFTs Kevin Mitnick - Wikipedia  Kitboga - YouTube  CISA can’t definitively say if ransomware is getting better or worse | Cybersecurity Dive How the YubiKey Works | Yubico  Just Delete Me | A directory of direct links to delete your account from web services.  https://unroll.me/

Transcript
Discussion (0)
Starting point is 00:00:00 Okay, let's go. I'm telling you, Doc, they, them pussy is different. Ah, puffy is pussy. Just watch me. That was the wrong button. Interesting choice. I was like, that's not our great new theme. I like the ending of that.
Starting point is 00:00:45 It reminds me of the old Tsunami theme. We're just kind of cut out. I'm Justin. My pronouns are he and him. I'm Sadie. My pronouns are they, them. And I'm Jay. My pronouns are he.
Starting point is 00:00:54 We're not librarians tonight, apparently. Fuck, fuck that. It was just quiet. I didn't know. I was like, oh, are they waiting on me? Okay, hang on. It's Sadie's episode tonight. We're talking around somewhere.
Starting point is 00:01:09 Was there anything else we wanted to talk about, like, Italy? Liza does something cool. Yeah. Yeah, no, girl boss, Mussolini. The Lizzo thing was pretty cool. I wanted her to, after she did like the do-to-do-do to, like, smash it like a guitar. Yeah, that'd fucking roll.
Starting point is 00:01:30 That would have been like, couldn't do that twice. Call me a live, but I was, I got, I was touched. I don't even like, like, like, Lizzo that much. But I was like, oh, this is cool. People were, like, cheering in the audience for like, yeah, fucking libraries. And I was like, yeah. That was cool. Thank you, Lizzo, for doing better outreach and advocacy than anyone in our profession
Starting point is 00:01:49 has ever done ever. I did not hear about this. She got to play James Madison's, like, Crystal Flute. that like no one has ever heard been played before. Like I'm assuming that old bastard probably played it. But it's part of Library Congress's like big ass flute collection. And Carla Hayden was like, hey Lizzo, you should play the flute. And she did.
Starting point is 00:02:12 And they record some like behind the scenes of like touring and she got to practice with it. But they had like a librarian like bring it on stage at her show on Tuesday, which I'm assuming was in D.C. or something. I don't know. Yeah, I think she was coming to D.C. And Carla Hayden tweeted at her and was like, you should come try out our flute collection. Yeah. And so she, like, did a little run on the, on the crystal flute and did a trill and, like, started twerking with it.
Starting point is 00:02:43 And then was like, yeah, and like, lifted above her head and was like, thank you, Library of Congress for preserving history and letting me do this, like, really cool thing. And, like, was, like, hyping up, like, libraries and stuff. And the crowd was like, yeah. And I was like, yeah. So it was really cool. And she's also like, I'm going to steal it. Before she played it, she was like, I'm going to steal this. I'm going to steal the Declaration of Independence.
Starting point is 00:03:09 But with a flute, that'd be such a good movie. That should be like the National Treasure reboot is Lizzo stealing the fucking flutes. Nicholas Cage, are you listening? It could be a heist movie about flutes. Hell yeah. Get the American Animals guy to direct it. Yeah. That was like a good library thing finally that happened.
Starting point is 00:03:28 Yeah. Like I said, I mean, when she held overhead, I really thought, like, it would be really great. She just went shattered it into a million pieces. I saw someone say that she should have pissed in it. And I was like, yeah. It's not that kind of party. It's a concert. Not with that attitude, Justin.
Starting point is 00:03:45 I guess it's good that it was a crystal flute and not one of those, like, glass harmonicas that would give you lead poisoning from the same era. Because, like, glass all had lead in it. And so people. thought the glass harmonica drove you mad. But actually, it was because you would absorb the lead through your fingers while you played it. It was secretly the lead poisoning all along. The real treasure.
Starting point is 00:04:07 It's so weird how we've known lead is bad for you for like thousands of years. We're just like, put that shit in our paint. But what if we put it in our makeup, would that still be bad? What if we put it in exhaust fumes for everyone to inhale for a hundred? hundred years. And the dishes we eat off of. I love those radium dishes, though. People are like, I collect the radium dishes, and it's like it shows how radioactive they are.
Starting point is 00:04:36 I'm like, why would you do that? It's like, I collect demon cores. Open up and let the devil in, baby. Yeah, I'm a demon cord juggler. What's a demon cord? What's up? TikTok. It's a big uranium piece of ore that killed a guy because he, was doing tricks with it in the 50s,
Starting point is 00:04:58 and he accidentally had the two halves touch each other, and it hit him with so much radiation. He died, like, three days later. Oh, I thought you were, I thought it was going to be some, like, anime thing. No, it's a real thing that killed a lot of people. Yeah. I think he killed, like, everyone in the room. Not to laugh at the suffering, but I thought you were going to do some weeb shit.
Starting point is 00:05:19 Demon core would be a good anime where it's just 10 minutes long. Oops. Oops. Oops. All radiation. Yeah. Oops, all neutrons. Okay, we're talking about ransomware, which is a thing that people do. Yeah, because Baker and Taylor got hit and was down for like two weeks and couldn't take any orders.
Starting point is 00:05:46 And I think they might have been even like taking orders like via phone call and like paper. I don't know how archaic they had to get, but they were out of commission for like two whole weeks. The ransomware is something we talk about a lot in the Discord, but we haven't done an episode about it. Have we talked about it a lot on the Discord? It's like your biggest fear. You talk about it a lot. Oh, yeah, that's because it keeps me up at night. L.A. Unified School District got hit recently, too, just like a couple of weeks ago. And it's like one of the biggest ransomware attacks on like a public entity that's ever like happened.
Starting point is 00:06:23 They're the second largest school district in the country. apparently not going to pay the ransom and are partially back up on their feet. Apparently they figured out what was happening, went to do a massive password reset, got halfway through the password reset, and then realized that the bad actors were still in the system and just changed the passwords again. So they like started to do this whole massive thing and then got halfway through it and realized it was all for moot because then they were just changing the passwords on them again. So apparently for their like, what, like 60,000 students and employees and stuff to change their password, they have to go to an L-A-U-S-D campus to change their password because it's not possible.
Starting point is 00:07:10 Yeah. They can't do it off network. So for whatever portion of their network, they have backup and running. But yeah, this is the shit that keeps me up at night because it's pretty much an inevitability. People talk like it's something that only happens sometimes. but it's actually like super duper common. It just doesn't get a whole lot of publicity because nobody wants people to know
Starting point is 00:07:35 that their systems were cracked, basically. But yeah, like, Justin, you put this thing in here about the huge rise in attacks since COVID-19 because everybody went to working from home, and that's like a gigantic gap, especially with how fast so many people, or how fast so many organizations had to stand up outside stuff, like VPNs and all of that.
Starting point is 00:08:02 Just so much shit got missed. And so many places are still- And how do you even like force your employees to use VPNs, right? I mean, they can't access the shit they need to access unless they're on it. Sometimes. Sometimes. It depends on your setup. Like, that's how we have it set up in my work.
Starting point is 00:08:20 Like we can't get to the ILS. You can't, like, I can't log into any server. or run a handful of programs that, like, monitor stuff unless I'm on the VPN. So at least in my job, it's absolutely, like, critical. But yeah, so. I think I have to be on the VPN to be on my P account. I think. I'm not sure.
Starting point is 00:08:41 But that's like three levels of security. I never had to be on one at UNH when I was at home. Never. Because none of the stuff that I was, I wasn't working with. It was only if you were working with specific kinds of information or something. And I wasn't working with any of those. I had to get like two different signatures to get a P account itself. Like my university is pretty paranoid, which is good because I worked for a university that wasn't paranoid.
Starting point is 00:09:09 And I would just like find fishers in our system. And I would be like, hey, this person's name is Myra Fisher. I'm pretty sure it's a fishing account. Like this person does it because I knew everyone who works here. I'm like, I don't think this is a person here. And so they were like, oh, yeah, we'll do something about it, I guess. We'll block them. I was like, that's unsettling.
Starting point is 00:09:31 Yeah. Yeah, I'd say unsettling. L-A-U-S-D, I didn't realize how big they were. Is that why it was, I didn't realize that was why you put it in the notes. I read the article. I just didn't notice how big a deal that one was. Yeah, it's a pretty big deal because they're such like the second largest school district in the country. And also because as things have progressed,
Starting point is 00:09:53 the bad actors have alluded to not only wanting a ransom for to be able to decrypt the data, but also the ransom for not leaking all of the student data that they scraped before they encrypted everything. So it's like a double threat now, like of blackmail. You know, not only do you not have any of your shit, but you also now are going to, you know, have a massive breach of privacy and data breach, but they're not going to pay the ransom. Maybe you should explain technically for people who don't understand how a ransomware attack actually works because maybe people... And like what ransomware is, yeah.
Starting point is 00:10:38 Aren't aware, yeah. Yeah, good point. So ransomware at its most too long didn't read version is basically when a bad actor or, you know, malicious hacker or whatever gets on your network gets to your data. and then encrypts all of it. So nobody can access it anymore and then says, you need to pay me this much amount of money in Bitcoin, and I'll give you the decryption keys so you can have your shit back.
Starting point is 00:11:06 There are a lot of things that you can do to try to prevent, like protect yourself against it or what to do if it happens. So like having solid backups and not just one set of backups, but backups of your backups and backups of your backups offsite. And I think it's the 3-2-1 rule where you have three copies of your backups. Now I'm trying to remember. Like one of them is like two types of... Yeah, three copies of your backups on two different mediums and one off-site.
Starting point is 00:11:41 Although I don't think the two different mediums thing stands as much anymore because nobody uses like backup tapes. Or you could have like a drive versus the cloud maybe. Yeah, yeah. Or like offline backups are a thing too. Yeah. So like, you know, you have your backups stored somewhere, but that storage stays offline unless it's actively being backed up to. Yeah.
Starting point is 00:12:04 But yeah, some of that doesn't work as well anymore because a lot of the time, even cloud backups, if they're in the system long enough, they'll figure out how to encrypt the backups too. and one of the major things that IT always struggles with is testing backups. So you can have backups all day long, but if you don't know if those backups will actually restore shit to the state that you need, then you might as well not have a backup. But it's also tedious and time consuming. And a lot of IT shops let it absolutely fall by the wayside.
Starting point is 00:12:37 One of my previous positions, I was there for nine months. And then I realized that we had literally no backups, not a single backup, like our email server, our ILS server. Well, I think we had some scattered backups of our ILS server, but I was just like absolutely panicked because like how the fuck do you not have any backups, not even dated ones? I feel like John is going to listen to this episode and have a heart attack. So maybe we should like put a trigger warning for him specifically at the beginning of this episode.
Starting point is 00:13:09 Yeah. Hi, John. I should show this one to my dad because he used to work in IT as well. for like an internet company as well. So like double trouble. Yeah, but how that's kind of the end point of ransomware. And it always always starts with fishing. And it usually takes a lot of time.
Starting point is 00:13:31 It's not like all of a sudden we've been hacked and shit's been encrypted. Usually if it gets to the point where ransomware hits, they've been in your systems for weeks because it takes time to have. hack a system. You have to get credentials to get in and then you figure out how to get those credentials escalated and then, you know, put in your back door. So even if the initial malware gets caught, you could still find a way in and, you know, you have to data harvest. And this just, it's a very involved process, but a lot of it can also be automated. There are a ton of hacking tools out there that you can basically you don't have to have a whole lot of knowledge to do
Starting point is 00:14:15 like to run them. Bored teenagers can do a lot of this and I did a lot of shit as a bored teenager. I took down my middle school's website on accident. Oops. Luckily we had a backup and we got it back up. Like you as the teenager had the backup and put it back up? It was like saved in the browser cache. But yeah, we were we were just.
Starting point is 00:14:39 goofin. We were just, we were changing like the president, the principal's name to like Fidel Castro. And, and then we accidentally just did a oops. We don't know how this pirated version of Adobe works. And we hooked down the index. Dot php file or whatever we did. And then the next day my friend got questioned by the IT guy. And he was like, were you on the website yesterday around 5pm? And he was like, nope, don't know anything about it. Okay. Sure. We didn't try it again. Tell Castro.
Starting point is 00:15:13 Well, at my work, we've recently had somebody trying to hack the public computers. And to me, it's really funny just because you can sit there and see it happening. And you can, like, we could all tell that it was just somebody figuring out how to use these tools and how to do this shit. It was not somebody who does it professionally, I guess. So we're all just like, okay, we got to get this guy to stop doing this eventually because he's just, fucking up a whole bunch of our computers. But, like, nobody was actually, like, worried because it's, it's just a public computer and those things get beat to hell and reimagined and, you know, completely wiped and rebuilt,
Starting point is 00:15:52 like, all of the time. So. I probably do worse shit to my workstation, like, regularly just because I find something IT did to it annoying. This is why when you get fired, they close your email immediately. Yeah. Yep. if they know what's good for them.
Starting point is 00:16:09 Yeah. Yeah, I have full admin privileges on my work computer. Really, the only restrictions I have are the same restrictions that everyone has is that there are actually internet filters, even though I work at a university, which makes me sad. Because sometimes I'll be researching something for the homosaurus. And it's like, sex, band. I'm like, okay. We had like a Dell one that I hated because it would, it would all, it was extremely aggressive.
Starting point is 00:16:42 I think we have one at my current job, but like I almost never hit it. Yeah. It's got to be like an actually dangerous site to like pop up something. And then there's, um, for our email. And again, especially with with fishing, because it's mainly through email that the fishing happens is we have this thing called Mimecast. know if you've heard of it, Sadie. It like, you can set it to certain levels of, like, restriction and it will, like, quarantine things that, you know, don't fit what's allowed. And then you have the ability to, like, block it, allow it that one time or, like, permit it and, like, add the domain to the
Starting point is 00:17:23 safe cinder list, basically. Which means I get so many emails a day because I'm on, like, the Music Library Association listserv. And anytime it's a person I haven't added yet. It's so fucking annoying. But also we have it set that it like really doesn't like external email addresses. So even if it's a student or a new applicant emailing from a Gmail account, it will block it. That is one hyperactive email filter. Yeah. And so like I was actually glad that like, because I probably shouldn't have been applying to jobs with my UNA email address. But I was actually, after I learned that, I was glad I did because otherwise my emails may have gotten lost and stuff. Like, yeah, it was external, but it was at least a dot edu.
Starting point is 00:18:12 Whereas once I accepted the job offer and we moved to Gmail, shit kept getting lost, including my like ability to even get my account because of that filter. So it's my one frustration in life right now is mine cast. Otherwise, things are fine. But I fucking hate it so much. But I understand why. But that doesn't mean I like it. That's fair.
Starting point is 00:18:39 There are a lot of things. Sometimes you have to eat your veggies you don't like, you know. Exactly. Yeah. So that's kind of how ransomware works almost always starts with fishing. So like Kevin, have either of you heard the name Kevin Mittnick before? It sounds familiar. He was a, he was a hacker in the early night.
Starting point is 00:19:02 I feel like, who actually got caught, served time in prison, and then got out and immediately became a cybersecurity expert and now runs like a cybersecurity like education company and all of the shit. But he, the one that he has and runs is called No Before. And basically it's just like how to spot fishing. To me at least, it's like so obvious and easy. but that's because, like, I stay up at night thinking about these things. So I understand when other people, like, don't catch shit.
Starting point is 00:19:39 But it's always going to be people is the thing. We can build as much technology and apply it as much as possible, as much U.S. as possible. U.S. as possible. But, like, it's always going to come down to the actual people are always almost going to be the first breach that has, that leads to something like ransomware happening. Because it really depends on what they're after. They might be after money. They might, if they're a state actor, if they're like, you know, Russian sanctioned hacking group, they probably aren't going to care about ransomware.
Starting point is 00:20:10 They're going to go for, you know, proprietary information and stuff. So it varies a lot. But ransomware is almost always just like money motivated. One thing that I saw recently that I was like, oh, yeah, huh? That makes a lot of sense is that ransomware is actually a Bitcoin problem. because if Bitcoin had never taken off, cryptocurrency in general had never taken off, then there would be no way for these transactions to even be untraceable. So if you crack down on the financial side of things, you can make that shit stop a lot faster.
Starting point is 00:20:49 Like somebody quoted in the notes from one of the links that I put in there, but the Viagra thing, like 10, 15 years ago, it was like every email had Viagra in it and it was scamming, you know, individual people out of two or $300 at a time or whatever. And then there was this massive shift where things like ransomware and large ransoms started happening more often. And it was because they were able to trace down a lot of those Viagra spammers and scammers back to their financial institutions. and go to the financial institutions and be like, hey, you've got to shut this shit down or you're going to get, you know, I don't know, sued by the government or whatever.
Starting point is 00:21:35 You get, like, sanctioned and, like, other banks won't lend you money. So it doesn't even have to be, like, a government thing. It's just, like, other banks will stop dealing with you. They won't let you, like, they won't play nice with you anymore. They won't let you sit at the cool bank table anymore. And, like, with crypto and ransomware, that's also, like,
Starting point is 00:21:55 and I believe it's in Dan Olson's video. What is it? The line goes up. That's the title of the problem with NFTs. It talks about how like they talk about how secure like the blockchain and like the proof of whatever stuff is because they're thinking of man in the middle attacks, which apparently those soft, those securities are kind of effective against maybe. But what mostly happens is fishing and ransomware, which like where they're. They're invited in, basically. It's people pretending to, like, sell or barter or buy and stuff.
Starting point is 00:22:32 And then that ends up happening. So it's like they're also being, like, they're the problem. Like, they're the cause, but they're also being targeted by it. And, like, that's the huge flaw in that whole security system is that it's ignoring what the actual problem is and is completely ineffective against it because people are going to be people. I fell to a scam, like, last year. because I had put my name on a mutual aid list for my local area.
Starting point is 00:23:01 And apparently someone found it and was like, oh, hey, I saw that you were on like the mutual aid thing. Like, you know, could you give me some money for like diapers and stuff for my, my kid real quick? And I was like, yeah, sure. Like, how much do you need? Like, I just got paid. Like, how much do you need?
Starting point is 00:23:16 And they're like, oh, my God, thank you. I was like, yeah, great. And then like it keep happening every once in a while. And then like the stakes started getting higher. And also the number would change each time. time and I was like, why is your number changing? I was like, oh, it's Google phone. And I didn't know anything about like how Google phone numbers work. I'm like, okay. But it just like kept to the point where if I didn't answer right away, they'd start spamming my, like, calling me over and over
Starting point is 00:23:41 and over again, but never leaving a voicemail. And I just thought like, oh, this person is just like, doesn't have boundaries or anything. But I would feel bad because they like, I was like, how did you get my number? How do you know who I am? They're like, you're on the Dover Mutual A list. or not Dover, it was like the Seacoast mutual aid list. And I was like, oh, okay. Like, they obviously got to that somehow. But yeah, and then I was like, wait, am I being scammed? Because I'd given them, like, one time I gave them like over $100 in money because they were like, I'm in like a serious thing right now.
Starting point is 00:24:14 I was like, oh shit. Like, yeah, I'll help you. I have the ability to do that right now. Like, I just got my tax return or something. Like, yes, I'd be more than happy to like give you, do a mutual. aid. I was like, oh, shit, I think I'm getting scammed. It's harder when you don't know the person.
Starting point is 00:24:31 Because people with no boundaries like that exist. Yeah, exactly. Absolutely. Especially if you're desperate. Yeah. Yeah. But yeah, like, you know, as like savvy as I am, like my little like, oh, mutual aid bleeding heart got me, you know?
Starting point is 00:24:51 Yeah. Well, I mean, there's a reason shit like the Nigerian prince. and all of that stuff, like, works because, like, it's less about technical savvy and more about psychology and knowing how to, and, like, just being a good con man, because, like, that's what it basically comes down to. It's like, the types of fishing that I see all of the time at my job are previous or current employees' personal emails got hacked, but they had emailed somebody at their organization, either by, like, forwarding stuff to themselves, or, or, you know, not having access to their work email. So they email like a colleague from like their
Starting point is 00:25:31 personal email or whatever. And then all of those contacts get grabbed. And so now all of a sudden, you know, you have Betty from finance asking you if you can get her like emergency get her a Google play card for her nephew's birthday kind of stuff. And people are like, well, it's coming from, you know, Betty's actual address. So they fall for it. So there's that. And that. And that happens on social media, that happens in email, that happens in phone calls and text messages even, then there are we, you need to pay us right now. Like your account is past due, here's the invoice, you have to pay us right now where your service will be shut off.
Starting point is 00:26:16 And it's always like, it's the panic. If it's inducing you to panic, then you should probably stop and think about it for like just a split second, please. Or it's, you have an email waiting for you. So click this link and I'd like, we'll release the email to you. But what it's really doing is just harvesting your credentials when you plug it into like some rando web page
Starting point is 00:26:39 that is created to look like Microsoft Outlook login page, right? And those are the ones that like are the most common because they want your credentials, they want you to pay the money, and yeah, those are pretty much the things. They want your logins and they want your money. And no matter how they can get those, they'll figure out how to do it.
Starting point is 00:27:01 Or we recently had a rash of, oh, hey, I need to check. I need to change my bank for my direct deposit. It's almost payday. How soon can I change this if I send you this information? Can you like do it for me? And I got to the point where an employee actually lost a paycheck because it got pushed all the way through, and their paycheck went to a bank that wasn't theirs. And nobody realized that this had happened until after payday when the, you know, employee went,
Starting point is 00:27:35 why didn't I get paid? And they went, no, you got paid. So that shit happens a lot, too. And again, like, it escalates from like a couple hundred dollars to now, you know, going into thousands of dollars, whole entire paychecks. to millions of dollars with ransomware. It's not that the stakes are higher. They're just aiming differently, I guess is really kind of what it is. But yeah, those are super, super common avenues of fishing that I see tons of all of the time. And half the time, if your email filter
Starting point is 00:28:10 doesn't catch it, your users need to catch it. And if your users don't know how to contact you or what to look for, or they don't want to seem stupid because everybody in IT is mean to them, then they're not going to tell you what happened or they're not going to tell you everything that happened. Oh, I clicked this link or I downloaded this thing. I'm not going to tell you that it brought me to a webpage and I plugged in my credentials or it brought me to a web page and my computer did a weird thing afterward. You know, so there's a service sort of position there too.
Starting point is 00:28:46 And this is like, this is me back on my bullshit of IT actually being like a service in a lot of ways a service job. Because like if people don't trust you, they're not going to tell you the shit you need to know. And it's always going to be your users. So what's the best thing you can do? Make sure your users don't feel stupid for not knowing everything you know. I will probably just, I will probably stand on that soapbox for my entire fucking career. I'm not going to lie. Have you seen the, I think his YouTube name is Kit Boga.
Starting point is 00:29:19 He does scam baiting because his grandma, I think, fell prey to like a fishing like ransomware scam and lost a lot of money, like almost like all of her retirement or something, I think, because of it. And so now he goes and like fines where it be obvious, like especially like the IT scams and trolls. them for hours, sometimes days, and fucks with them. And he streams it so that he uses it as an educational thing to show people how like the types of methods. And like he'll do like he'll mute himself for them and be like they're doing this or like this is this kind of script they're using. So they're probably going to ask me for this or like that kind of stuff or like especially when it gets to the like, oh, let's go into your bank account and how they will go into the like block your screen from you, but he hasn't set up. He has like a special thing set up and how they go
Starting point is 00:30:21 into the browser like HTML and change it manually to be like, oh no, you transferred the wrong amount of money. Oh no. You have to send it all back now. It was accidentally $25,000. Oh no. and stuff like that. And then it gets to like the, you know, the gift card thing. He just starts fucking with him. Sometimes he'll like pretend to be like an old grandma
Starting point is 00:30:46 because they target the elderly a lot like in like in general. But yeah, it was interesting to sort of learn all of the different like psychological methods. Um, even out, even outside of like the tech methods, the psychological methods. Oh yeah.
Starting point is 00:31:03 Used in this kind of stuff. It's like classic con kind of stuff and the, term forward is social engineering in like IT because have either of you ever watched leverage? I have a friend who really likes it, so I know a little bit about it. Basically, they're like a group of con men and whatever. And like almost everything they do is some sort of social engineering, figuring out how to get somebody to trust you for a second. Shoulder surfing, like so much of it has nothing to do with technology. And they call it social engineering.
Starting point is 00:31:37 So it sounds fancy, but it is basically just knowing how to call on somebody. This is the show where they had a criminal consultant, and they were planning an episode, and the guy goes, you're basically a criminal gang now. Like, this is what criminal gangs do. Yes. Like, you don't need me anymore because, like, you've just mapped out a plan exactly the way I would do it. Yes. So it sounds like a good show. I watched most of it, and I really liked it.
Starting point is 00:32:05 And there was, like, a reboot personally. fan fiction for it, apparently. But yeah, going back to... I was just... I was so excited I knew something about TV because I never do. If it's not... I've watched the first ten episodes of Evangelion like ten times and I can never
Starting point is 00:32:21 finish it. So like I don't... I can never talk about TV shows. It's like the opposite of the American American animals like kids who were like, we're going to learn how to heist from watching movies. And meanwhile, this TV crew is like actually figuring
Starting point is 00:32:37 out how to plan a heist through fiction. On here on the notes, I'm assuming it was you, Justin, who put common targets and, like, email servers, and then there's domain controllers, which are basically control all of the logins and a bunch of the credentials and stuff for pretty much any Windows-based, like, network system. You know, data server is so, like, ILS databases or basically anything that has a personally identifiable information that a lot of like these hackers and stuff go for. But those are like the endpoint targets. The actual targets are always the people first. I guess is basically it. So it's like
Starting point is 00:33:19 you could know what systems are eventually going to get hit, but that's not prevention. It has to go through people first to get there. It has to go through people first to get there. So that's what that made me think of. And then yeah, there's the sort of the, the, the, double thread of both the data loss and the data leakage. And then not only with ransomware, does that affect like, you know, your budget because you're paying out a whole bunch of money. But if you choose to pay the ransom, but like, you know, you lose your reputation. You often have to report, you know, report certain kinds of data breaches to, you know, the government and you, you know, your operations are completely disrupted for weeks at a time. Like the
Starting point is 00:34:04 the pipeline ransom ransomware that happened a couple of months back that was a huge deal like those sort of critical infrastructure are giant targets for ransomware because they often have legacy systems
Starting point is 00:34:20 that use code that hasn't been changed or updated in 30 years and it's like almost impossible to move off of because changing like moving it on to a different software system would cut people's power and water off kind of thing. And it's much more embedded than like your sort of
Starting point is 00:34:42 personal computing environment is. So what's the term? Oh, I can't remember it now. But basically it's... Technical debt? Huh? No. Technical debt? Actually, I know what that is now. And that's a completely different thing. But there's a term for sort of the sort of critical infrastructure systems that work. They're basically like custom operating systems for very specific purposes. So like, you know, you go into a factory and it's like, we got some very specific tools for some very specific things.
Starting point is 00:35:16 It's that, but it's software. And a lot of times it's using code that nobody knows anymore. Hasn't been updated in a really long time. It's written in like Fortran or something. What is it? Colbalt, cobalt? Yeah. Yeah, basically you're so specialized that the dude who actually knew how to do anything with it retired 20 years ago and nobody's been able, like, it still runs so nobody dares touch it because it'll fall apart, right?
Starting point is 00:35:44 And then not only do you like whatever your business or, you know, thing is comes grinding into a halt, but a lot of times it's financial institutions. So, like, banks will use a lot of this kind of stuff. Y2K almost happened. Yeah, exactly. that kind of thing. And like it's just, it's such a giant target now that the U.S. government is actually starting to take cybersecurity seriously at a decent level. I was in one of those articles and it was like director of cyber and digital infrastructure.
Starting point is 00:36:19 I was like, why wouldn't you, what does cyber by itself mean? And like, is it a Greek word? Like, why would, it's just such a weird thing to be like, cyber. when as a millennial, that just means to jerk off on the internet. Basically. It's very funny to watch boomers talk about cyber, just as a noun. Was it the cyber security infrastructure, cyber infrastructure security administration? No, I mean, cyber security makes sense.
Starting point is 00:36:49 It was cyber and infrastructure manager. It wasn't like, it wasn't used as a prefix. It's whenever government officials use the word cyber. just like by itself. And everyone made fun of Trump for doing this. But this is like how government officials at the federal level talk. And they're just like, yeah, I'm the director of cyber. I'm.
Starting point is 00:37:10 Cyber what? Yes, exactly. What does that mean? Does it mean anything? What are you cyber security? Cyber infrastructure, cyber sex. I mean, cybernetics. Dildo Tel-Donics.
Starting point is 00:37:26 Is that what that was, Jay? The dildonics? Yeah, Dildonics, that's it. Ted Nelson being a Chad, yeah. Yeah. I watched the cyberpunk anime. Yeah, how was it? Which one?
Starting point is 00:37:40 The new one, the new cyberpunk anime that Netflix put out. It's good, but there's a time skip, and then it gets confusing. So, but there's a lot of nudity, which is good. I like naked people. It starts off really strong, but I think it suffers from not having a good critique of capitalism, which is the whole problem with the cypherpunk game that came out. And cyberpunk is a genre in general.
Starting point is 00:38:03 Yeah. Well, I think it started out kind of that way. I watched Johnny Nemonic the other day, though. And everyone's like, oh, this is such a great movie. This is why Keanu Reeves was put in the video game. I watched Johnny Nemonic. That movie doesn't make any fucking sense. I've never seen it. It's the most confusing thing. It's not
Starting point is 00:38:18 a good movie, but everyone's like, oh, this is like a cyberpunk classic. I'm like, it's not... It's not good. It's... Kianu's great. It makes no sense. The bunny is judging, yeah. Cost of cyber insurance. Okay, what's cyber insurance?
Starting point is 00:38:34 Okay, so cyber insurance is basically you buy insurance so that when ransomware eventually happens to you, you have money to either pay the ransom or have money for resources to recover from whatever sort of cyber attack has occurred. And yeah, it's basically like life insurance, but for your cybersecurity. Except cyber security is a constantly changing thing in which it is almost impossible to accurately gauge risks like, you know, insurance is supposed to do. And also almost impossible to gauge exactly how much of it is going on in real time because there aren't regulations about reporting. there aren't concise ways to
Starting point is 00:39:29 know how much of these kinds of things are actually happening. So Sissa, which I think is cybersecurity, infrastructure, fucking whatever.
Starting point is 00:39:41 It's a government thing. Sissa. They, like, honest to God, came out with a report recently and they were just like, we don't know whether or not ransomware is getting better
Starting point is 00:39:51 or worse. We literally just can't tell and where like the national security were the exact sort of administration that's supposed to know this kind of thing. And they don't. So how do you measure insurance for a risk that nobody can predict or foresee? So basically all of these, you know, different organizations or businesses and stuff are either not able to buy cyber insurance because they're not big enough to have a cyber insurance. because they're not big enough to have a cybersecurity program to begin with, or their cybersecurity insurance is so expensive and has so many stringent requirements
Starting point is 00:40:31 that it's cost prohibitive. And that's something that I've been seeing a lot, at least for the two libraries I have worked for in the past year or two. So does everyone have this? A lot of people. basically any major organization is going to have it. Who's more likely to be targeted a organization, like major organization with the money to be able to get this kind of protection or maybe smaller organizations that don't necessarily maybe have the budget to get this kind of insurance or something that might protect them against when this kind of stuff happens? That's part of what they can't really tell. But a lot of, yeah, the smaller organizations, small cities, small libraries, small counties,
Starting point is 00:41:20 basically anywhere that has an infrastructure that people rely on, but not enough of a budget to actually have Arthur, to actually have a good cybersecurity program already in place. So probably the smaller organization, kind of more likely. For the listeners at home, the reason why I say he went, oh, Arthur, is because Arthur, like puts his tail around my shoulders, like when you're in high school and you go to the movies on a date and you do a big stretch and then you put your arm around the shoulder. Arthur did that put with his tail. Just full body lean into Jay's back.
Starting point is 00:41:54 It was really cute. He's so cute. I loved him. But both of these libraries that I've worked for have had cybersecurity insurance requirements like go up so fast that it's actually like a struggle. Basically they're saying you have to use multifactor oftentimes. on all of these different systems, or we're not going to renew your insurance, which is a really bad position to be in.
Starting point is 00:42:20 But also, like, if you work for any sort of corporate thing, there's, of course, might be a little easier to figure out how to get your employees to use multifactor authentication when they're logging into the VPN or they're logging into their email or, you know, whatever. But a lot of our employees literally only log into a computer to check. their email and don't have a computer otherwise. So they're also not going to have a smartphone probably. Or if they do, they're not going to be able, they're not going to understand how do we use an authentication app, not to mention a lot of these sort of public entities also have
Starting point is 00:42:58 cell phone reimbursement. So if you use your cell phone for multifactor authentication to your workplace, they owe you money basically for using your personal cell phone for work purpose. And then, you know, If you use something like a UB key, which is like a USB key, those get lost. Which everyone should get. Which everyone should get. And then, you know, it's also training time because the sort of technical savvy of employees ranges so very widely. Like it's perfectly reasonable to expect your IT staff to be able to use multifactor authentication and reimburse them for that use for their personal cell phones because they check email.
Starting point is 00:43:42 or use a multifactor authentication app or, you know, all of this stuff that is pretty common. It's another thing to ask your part-time custodian who checks their email for 20 minutes every day and doesn't have a smartphone and doesn't have Internet at home and doesn't want it, quite frankly, to be able to navigate multifactor authentication. To be clear, if you can do multifactor authentication, especially on your personal accounts, please do it. It is actually one of the best stopgaps to bullshit happening to your personal, to stuff. So multifactor authentication is basically you have one of, you have two out of three things, something you know, something you have, or something you are. We all know passwords. That's always,
Starting point is 00:44:34 almost always the very first thing. And then the second thing is something you have. So like the way that like Google authenticator or Okta or all of these other. Apps work is you have your phone. You have the app on your phone. It's not the app itself. It's the fact that you have it on a device that you're not currently using to log into. So like it wouldn't be multifactor authentication if you were using an app on your computer that you also know the password to because it's just kind of redundant.
Starting point is 00:45:07 It's not a separate thing. So something you have or something you are, which is biometrics, which I think is completely absolutely fucking scary for any organization to get into. But there are things like Windows Hello or fingerprint scans, all kinds of stuff that is possible as that like third factor for multi-factor authentication. And that works really well in a lot of ways because that second check does stop a lot of things. So like your email gets hacked, somebody's trying to log into your bank, your bank forces you to use multifactor authentication. You get a text saying, hey, is this you?
Starting point is 00:45:48 If so, click on this or put in the code from your app and you go, that's not me. I'm not doing that shit. And so they can't get in. So to be clear, multifactor authentication is a good thing. It's just hard for organizations like libraries or like small cities or basically. anything that has a constrained budget to really get off the ground in any sort of fast fashion. And most of the time, these cybersecurity is like, we won't renew. These insurances are like, we won't renew your insurance next year.
Starting point is 00:46:22 So you would have anywhere from a year to less to implement these things for your entire organization, which is just a massive undertaking. And you're probably already stretched thin on your budget and your staff time anyways. Yeah, so cyber insurance keeps skyrocketing. The needs to or the requirements for cyber insurance keep skyrocketing. And basically, the thing that you need is money. You need to pay for new systems and new subscriptions. You need to pay for staff to learn how to do it or teach how to do it.
Starting point is 00:46:58 You need to pay for the hardware itself like Ubikis or whatever else it is. So it's just, it's escalating rapidly. and there's no clear way out. I guess I'm not really sure if I had a point with bringing this up, but it's just one of those things where I'm just like, how can capitalism sucks. I mean, and like the fact that it targets libraries,
Starting point is 00:47:19 because so often I feel like when you think of hacking and stuff, and I know this isn't technically hacking, I guess hacking's part of it. I don't know. But you think of hacking happening to organizations and people that have something worthy of being, hacked, like where the data or what you can do with whatever system you get into is, like, the point that's like, it's of value.
Starting point is 00:47:45 Whereas, like, if you think of library stuff, like, yeah, obviously there are potential, like, especially like any sort of financial security stuff in a library. But when I'm getting, you know, library, ALA, code ethics is going to get mad at me for saying this. Patron privacy is important. I would not share stuff. But also when I think of, like, a patron record. Like hopefully the most, that's probably like check out history, their address, which like, yeah, doxing's bad, but it's like, it's not like getting into a bank account.
Starting point is 00:48:15 Yeah. A library, I guess, is like, city. Yeah. There's shit there. And also like the types of systems that you have the access to if you hack like a city, whatever. But library, it's like it doesn't seem like it would be a target just because of the type of. information and systems that are there. But when money is the point, I guess it doesn't matter what the, you know, the bounty within
Starting point is 00:48:46 the systems might be. And if you know that it would be easy to get into the system because you might not be able to require the more strict security, because when you think about maybe the level of literacy is a bad word, but like, you. literacy and skill of these types of things that your average patron might have. I hope we're not giving people ideas. No, well, no, they already happen. Well, and part of the thing, too, is like with libraries, that sort of patron data that in a lot of ways is common addresses, full names, phone numbers, emails, etc. That is valuable in its own way because you can take that large
Starting point is 00:49:34 dataset, sell it. Oh, yeah. And that then fuels it even more because now, you know, this collection of personally identifiable personally identifiable information, that's at PII, gets sold. And then because they know that it's accurate information, it then gets used for more accurate breaches and attacks. So like if you don't know if this email and this person and this address are all the same thing and you're guessing, then it's easier to spot it as scamming than if you know all of those things align and you use that information to get somebody to trust you.
Starting point is 00:50:18 You know what I mean? So like you have. Yeah. Yeah. That makes the last thing. Oh yeah. No, I'm absolutely legitimately your bank because this is the address we have on file for you and this is the phone number we have on file for you. And you know, you're able to. You're able to. You're able to to cross-reference those data sets that are for sale and say, oh, well, yeah, you purchased this off of your credit card. Like, you may not know the actual credit card, like number, but you can correlate that data and be like, this is a credit card. This is a charge on your credit card that you had last year. And somebody will go, okay, well, nobody but my banquet, know all of that, which just straight up isn't true. It's like when you ever have had to do like a background check
Starting point is 00:50:53 software thing or even to like confirm like do like electronic check-ins for my doctor's appointments. Often one of the things that asks you is like which one of these addresses is like relevant to you or something. It doesn't necessarily have to be the one you live at now. But a previous one or the ones that are really annoying where it's like, this is like a financial one, but it's like when did you take out a car loan? Was it 2015 or 2016? I was like, I don't remember. I know I've had this car for a long time.
Starting point is 00:51:31 Well, and the thing is, with that information, you can get that off of credit checks. Yeah, exactly. So. But they've got five of those in a row, which are really weird. It's like, did you live at any of these addresses? It's like those fucking tweets that are like, you know, like the, what would your, like, stripper name or something to be able to be? But it would be like, yeah. What's your mother's middle?
Starting point is 00:51:54 It's, you know, it's your mother's middle name. And it's the street you grew up on it. It's the name of your first pet. Yeah. And it's your password. Yeah. And what's your social security number? What's that post going around on Tumblr?
Starting point is 00:52:07 It's like, I don't want to know about your taste of music. I want to know what was your mother's maiden name. I want to know what was the street you grew up on? I don't do small talk. What was your pet first pet's name? What's your password? But the multi-factor authentication thing is we've, we create, we started with duo authentication. I want to say in 2019, maybe 2020.
Starting point is 00:52:31 And now we have Microsoft authentication. And someone, there was an email that had to go out to everyone, which was like someone got into our system because someone approved a two-factor authentication that they weren't actually doing, which sounds crazy. But I get them all the time on my fucking phone. and I know my password hasn't really been breached. I change my password all the time. So someone's like still trying to change my password or something like that. And it's giving me multi-factor authentication all the time. But if someone did have my password and asked me for a multi-factor authentication,
Starting point is 00:53:08 and I just was saying yes to all of these things. I get them, you know, pretty randomly. Someone I supervised was like, why did I get a multi-factor authentication request I didn't send? I'm like, I don't know, man, it just happens. Like, don't say yes if it ain't you. Well, and last pass, which is like a password manager, they recently had a breach into their development environment, which then had a whole bunch of proprietary information stolen. That's how that, that's how they got in is because they had somebody changing. They had the credentials of somebody who had access into the development environment.
Starting point is 00:53:46 They had their credentials. They sent the multifamily. factor request, I forget exactly how it went. Like, we're able to intercept it and then change the password again. So basically, they were able to circumvent the multifactor authentication and then use that to get deeper until the development system and get the information that they wanted. And it had nothing to do with how strong their encryption and stuff was. Exactly.
Starting point is 00:54:10 And cybersecurity is like, it's about layers. It's about having a moat around a fortress with archers. on top kind of shit. Yeah, it's like an onion. It really is like there is absolutely no one thing you can do that will make you secure for a lifetime or even secure for two days. It's just as fast as we are finding ways to secure things. People are finding ways to undo it. So the very best thing that you can do is have a lot of ways to secure your information. But one thing I want to wanted to talk about too was, especially for any sort of public entity, security systems are massively expensive. When you buy like a hardware firewall, like an app appliance, which you
Starting point is 00:55:02 have to have to have any sort of like security over your internet traffic coming in and out of your network, not only do you have to pay for the hardware, you also have to pay for support and subscription for the hardware. So like you get, you're getting all of the latest updates to your antivirus signatures and all of that stuff. So there's a lot of ongoing costs on top of hardware costs, which hardware costs, a lot of them are covered by things like E-rate, which make it a lot easier for the compromise, for the filtering compromise,
Starting point is 00:55:37 which we have discussed many times. That's how they get you with the cop shit. That's how they get you with the cop shit. No, this is also how they get you with the cop shit. Because when you can get decent security systems or decent security help, A lot of the times it's coming from places like the Department of Homeland Security, which SISA is like under that umbrella. And they basically run all of a bunch of the infrastructure and election security stuff in the entire country. But how do they get their information?
Starting point is 00:56:09 They get it from fusion centers, which is cop shit. What's a fusion center? A fusion center is a... It's like some sailor moons stuff. Yeah, it is basically a multi-agency hub for things like the Department of Homeland Security, FBI, state, federal, local authorities, basically to compile all of their cop-shit data and surveillance data and be able to use it for cybersecurity purposes. But so much of that data is surveillance data. Like fusion centers are where bad shit happens, right? But at the same time, like, as a library, we get a ton of information from the state
Starting point is 00:57:02 fusion center on what IPs to block and what we should be watching out for. So it's like being a public entity and a lot of these services, too, are discounted or free for some sort of governmental entities. So like we can get, like libraries can get discounted network security, basically keeping track of things at the boundary between your like internal networks and the internet and keeping that traffic and being able to bounce off known like risks. So if it's coming from an IP or a URL that like is known to be like malware, they'll just bounce it and not let it through, which is great for your cybersecurity.
Starting point is 00:57:42 security, but that also means that the organization that is doing that for you has access to a record of all of your internet traffic that's coming into your network. It's like a constant, like, it's like a double-edged sort because you can get help from the government, but at the same time, place things like the Department of Homeland Security and libraries, you know, missions to be advocates for privacy are like in direct conflict with the exact kind of thing where you can get help. For the longest time at my previous job, ransomware keep me up at night. I had the phone number for the SISA Security Operation Center on a Post-it note on my monitor at work. Because if ransomware hit, there was no guarantee I would actually be able to look up that
Starting point is 00:58:30 phone number. And it's like you got to call your cybersecurity insurance. And then you got to call somebody to come help you out because you don't know how to do it yourself. Because you're just an IT administrator, you're not a cybersecurity forensics expert, and that's the kind of shit you need to know how bad the breach is, how long it's been going on, how to bounce back out of it, and how to recover. So when I think about... And that's not even necessarily a thing of like, oh, libraries don't have budgets so they have to outsource everything. Like, that's just like there's not that many people in the... It's not like every library can have their own like cyber forensics team, right? Exactly. And a lot of libraries, especially.
Starting point is 00:59:09 smaller ones will have like IT companies on call, especially if they don't have their own internal IT. But there are plenty of, are plenty of like cybersecurity firms out there that can do this stuff for you. They're just very, very expensive. So the ones that you can rely on are the ones who are taking cop shit data and giving it to you to protect yourself, like to protect your own network. Or if you're lucky you have one person who has an interest in this kind of stuff. And it's like, oh, yeah, the cyber forensics is like my thing. And they're just like willing to test out your systems for you. But you're not paying them any extra. Yeah. It's not. That's not enough. I can tell you hands down it for a library system,
Starting point is 00:59:58 you would have to be a gigantic library system because cybersecurity is like not even close to being a one-person job, even if your entire job was cybersecurity. So, like, my job encounter, like, cybersecurity is part of my job, maybe about a fourth of my job. So to actually have a full cybersecurity team, we would need like eight people. And we're a pretty large library system. And that's expensive because people with that sort of, there's a shortage of cybersecurity personnel. It is a traditionally high paying career path. So as a library, you're not going to be able to pay the same thing as, you know, I'm in Washington as Microsoft or, you know, any of those other tech firms. So you have to take what you can get out of an already diminished pool.
Starting point is 01:00:52 So if you have somebody on your team who's like, yeah, I'm really into pen testing and I'll run these scans and stuff for you, it's still just one thing. It's still just one thing. It's That's still just one aspect of the level of cybersecurity you would need to be able to say, like, yes, we have confidence that if this kind of thing happens, we could bounce back from it. And it's not even necessarily, we have a confidence we can prevent this because that's just straight up not possible. Part of the reason it keeps me up so night at night so much is because it, like, it's basically an inevitability. It is common. It's very common and it's very likely. So like when you're doing risk management or like risk weighing, an earthquake is high level of damage, not very likely.
Starting point is 01:01:40 Workplace shooting, high level of damage, not as likely. Ransomware, high level of damage, high level of likelihood. Has that ever happened at a place you worked at? No, not to that point. Places I know of a library system in the state of Washington who in the past couple of years got hit with ransom. kept it completely mum and paid the ransom. I only heard about that because I work library IT. One of my previous employers had a ransomware attack, not a ransomware attack, but a breach
Starting point is 01:02:14 start to happen and was able to remediate it. And very, very recently, a library county system in Washington was hit with ransomware, and it was something that was like talked about in the news. But for everyone that you hear about in the news, there's like, at least five more instances of it happened that didn't hit the news. So basically you have to approach ransomware as a sort of disaster planning. Like it has to be part of your disaster recovery plan, like for your backups and all that stuff. And that's all part of IT to begin with because if you hit with an earthquake, you have to have a plan on how to get your systems back up online for your outside backup system.
Starting point is 01:02:52 If the comrade sharks like eat the internet in the ocean, like what are you going to do? Exactly. And then but. I need a blaha. or I pronounce it. That's like the internet eating comrade sharks. Yeah. But like an earthquake doesn't damage your reputation.
Starting point is 01:03:07 You know what I mean? So if you get hit with ransom rates, high damage, high likelihood, also can completely obliterate the trust in the community that you serve if people don't understand exactly how common and devastating it can be. And how it probably has nothing to do with the security systems. It has very little to do with the security systems. Yeah. Because zero-day attacks happen.
Starting point is 01:03:35 Like literally the whole point of zero-day attacks is that you can't see them coming. Like nobody knows that it's out there until the attack hits, right? So that's why it keeps me up at night. That's why I say this all of the time. And I'm just like, I don't sleep over this is because it is incredibly high pressure in a sense. But it's also because I don't want this to happen to my community. Which, you know, kind of sounds cheesy. Like, of course, I'm thinking, like, about the community and the impact.
Starting point is 01:04:04 But, like, I feel like it's doubly so because I work in library IT. And we are, like, you know, try to be privacy advocates and try to have open access. And all of these things can't coincide together peacefully. And then, you know, you get dinged for having a ransomware attack happen kind of thing. Yeah. I do have a question based off of that. I know any time I've taught, like, you know, digital privacy and security info and stuff, especially when you get to threat modeling, there's always that, like, balance between having people take this seriously and that, like, there are indeed threats while also not freaking them out. So, yeah.
Starting point is 01:04:56 Like, obviously it's all bad, but like, I think there's maybe sometimes a difference between, like, a personal breach versus an institutional breach like that. Like, they both have their, like, seriousness. But, like, the degree to which, like, someone can connect with, like, what the risks are and stuff. Like, so I guess how would you say, like, how would you say that we should educate, both our librarian and library worker like colleagues, as well as our patron communities, about ransomware with the like, this is a threat. Please take this seriously while also not tinfoil hat freak out people. We're like, oh, no, I can't stop, but I'm not perfect.
Starting point is 01:05:42 Therefore, I shouldn't try. I'm already in too deep. That's the one I hear a lot with like passwords and stuff. Yeah, yeah. Yeah. So yeah, like you said, like it's very different on an institutional level. And this whole time I've been talking at an institutional level or trying to, partially just so maybe people understand that there is a difference. Because I feel like a lot of what we hear in the news and stuff about ransomware attacks and all of this stuff happens at this institutional level.
Starting point is 01:06:15 But then people sort of retroactively apply it to their personal, right? So there's like a factor of freakoutness there that just straight up doesn't apply to like an individual. Yeah. And so like I would think of those as different spheres, at least when I have like gone into privacy and security with like staff trainings or with providing resources to staff to provide to patrons towards sort of within IT orientation. like you have to understand the level that you're trying to speak at. So like this whole episode, I've been talking at like an IT level. Most of this stuff that keeps me up at night is not actually anything that most individual people need to worry about.
Starting point is 01:07:06 I'm worrying about it so people don't have to worry about it, right? And so, and this also just comes back to IT workers not treating their users like they're all stupid because you have to know how to teach well and separate out what's relevant to you from what's relevant to your staff person that you're trying to teach or the staff person that you're trying to teach who's trying to teach a patron because it does vary so wildly. So when I talk to staff, I try to, I try to approach it as practical as possible, I guess. when it comes to what staff can do to keep the institution safe when it comes to cybersecurity. So things like changing your password, you know, a lot of the sort of basics that we teach people,
Starting point is 01:07:59 but also things like I was just having a conversation about this with one of my coworkers, not sort of crossing your work and your personal domains. So if you use a password at work, the advice you'll hear from an IT person is don't repeat any of your passwords. Use a password manager. Don't repeat any of your passwords. It's completely unrealistic for your average person, right? But that's the advice an IT person would give you. So recognizing that that's not practical for your average user and then figuring out what is practical. So I would tell people, you know, if you reuse passwords, don't reuse them in work and in your personal life, have a set of passwords for your work life, a set of passwords for your personal life,
Starting point is 01:08:49 keep those separate and then reuse them within those domains as much as you want. And that not only helps protect the organization like the institution because a personal breach then gets filtered over into a workplace breach, but then it also protects the person because if your institution suffers a breach and those passwords get put out on, you know, the market, it's much less likely that your personal life will be breached through that avenue. Oh, that's a really good strategy. I hadn't heard of that one. And like there are tons of password strategies out there beyond, like the best thing
Starting point is 01:09:25 you can do is use a password manager and a unique password for everything. But there are other avenues to have better passwords that don't involve doing things the IT way. So like recognizing that and just being practical about what people can spot in fishing attempts. You know, like this is the number one way you can help us out. The rest of the advice, maybe not so relevant, but this is what you can do. You can learn how to spot fishing. You can not complain about having to change your password every three months. And a lot of that also pleads over into people's personal lives. So if you make it advantages for both things, I feel like they're more likely to take up those sort of tactics. So something like threat modeling is really
Starting point is 01:10:10 useful from that sort of angle because it helps them assess their own personal risks. You're just helping, like, trying to help them do that, but through, like, this is what we need you to do for threat modeling for the institution as a member of the institution kind of thing. And then with, like, staff who are then teaching patrons, a lot of that, I haven't done, like, a training for staff on how to, like, come across, like, how to teach these sorts of concepts to like patrons because patrons vary so wildly. You'll have the dude who insists absolutely insists. He talked to an IT person about this because you're being hacked right now, which is absolutely not happening. And then there's the person who, you know,
Starting point is 01:10:55 struggles to log into a computer kind of deal. And I would say there, it's just, it's about resources. It's about knowing how to guide your patrons to the correct resources. and if that means you take a sort of threat model approach to it to help the patron figure out what they are concerned about and what they need to guard against the most. Also, reminding them that because security is so concentric and has so many layers that even small things can really help. And I know we've talked about this with privacy stuff with like Callin and Allison and, you know, that sort of thing too. It's like literally any step you can take is a good step.
Starting point is 01:11:41 Even if you haven't changed your password to your main email in 15 years, changing it today is better than continuing to not change it. You're never like too far gone. You're never too far gone. You can recover, you know, like even if everything goes to shit and like you have identity theft happen or you have ransomware happen or you lose a thousand. $1,000 to a scammer, you can always reach a decent baseline. So much of it is like prevention. So like a lot like, you know, privacy, like the little bit of knowledge and action can go a really long way.
Starting point is 01:12:19 And asking questions, knowing who you can ask questions to, find your approachable IT person who can help explain things in a way that doesn't make your head catch on fire. Don't cross your personal and work domains. Learn how to spot fishing because that's good for. for both your institution and for you all the way through your personal life. Pay attention to font curning and email addresses. That too. Yeah.
Starting point is 01:12:45 Like, you really don't have to be a tech savvy person to be able to do a lot of the things that will help safeguard you against it. So, like, also one thing, just fucking update your apps and your computers, please. When Windows tells you that it needs to restart for an update, please don't push that shit off for six months. because every time, every month you push that off, there are more things in those updates that are vulnerabilities. Most updates are security related. Most updates are security related. Automate that shit as much as possible. Set your browsers to automatically update. Set your OS to automatically update. Please, dear God, keep up on your update. And that is, that's one thing I wish a lot of people would understand about IT, is that IT, is at its base about maintenance.
Starting point is 01:13:38 It's infrastructure and it's about maintenance. So technical debt, Justin, happens to be the idea that this is the debt that you take on to keep a system up and running. So like any sort of repairs that you, like, or fixes you have to apply to something, that's you making up for technical debt. And keeping things updated is the same way. It's a technical debt that you have to keep up on. So yeah, that's kind of what that means.
Starting point is 01:14:07 But yeah, for the love of God, please keep your shit updated. Or like, I know one thing that Allison has said is that like keep things updated and also remove what you're not using. Yes. Especially on your phone. Yes. Try to go through and delete old accounts you don't use anymore. If you can't delete them, at least change them to a gibberish password you're never going to use again. Do an audit of your digital life every once in a while.
Starting point is 01:14:32 that'll go a long way. And whenever a survey asks you, do you know what Doritos are? Say no. I've never heard of them. It's always lie to robots. Yes. Always lie to robots. What was it?
Starting point is 01:14:48 In a world where big data threatens to modify our lives telling online surveys, I don't know what Pringles are constitutes heroism. Keep up that junk data, people. I mean, that's a good point about when it asks you for, password hint questions of like what was your mom's maiden name, lie. And remember what lies you told. But don't put the actual answers in there because a lot of that is public, like even if you're not posting the answers on Twitter, a lot of this is publicly available information. Yeah. And if you're a public employee too. Especially if you're a public employee. Especially if you're a public employee. Like, you know, people not only can they FOIA that shit, they can also probably just find it if they spend an extra 10 minutes digging for it, right? not hard to find out what your mom's
Starting point is 01:15:34 middle, uh, made name was. I don't even get those kind of questions that, like, I haven't had to answer security question anymore. It's mostly like trying to remember what my general password is for my main email address and my last pass and my Apple account. They're all different passwords. I use bit warden. Please use any unique password for your bank account. I think it's probably just a gibberish thing. I know one thing my bank account doesn't, I don't see too many others. Instead of doing like security questions, it has a security image.
Starting point is 01:16:12 There's a website called Have I Been Poned? You can put all your email addresses into it and it'll email you if you're part of a data breach. And I haven't been in any of data breaches in a while. Some password managers will do that for you now as well. And also they can do an audit as to like when was the last time you changed this password and how many of your accounts have the same password and they'll like help you change it like they'll help you go through your password hygiene and stuff they're really they're really nice Firefox will also do the check for you use Firefox use bit warden use bit warden it's free and open source and not based in the
Starting point is 01:16:49 united states hold on there's there's another one host your own server of it if you want trying to find and it's free unless you want to pay for premium like if you want to use like ubi key you have to get the paid version but there's also like a family play So like, I had to switch to, I had to switch to last pass because my work because they blocked the password manager I was working. I was using before. My, uh, Longey and I bitch about it because I don't like it. But for our like two factor authentication and our single sign on are the same thing. We use one login, which you get like, you like log into it.
Starting point is 01:17:30 So it's more like a master password kind of thing and sends you a two. two-factor authentication if you're not in the IP range. And then you go in and then there's all these like titles, which you click. And then those have like a randomly scrambled password in them. But then like that's how you get in. So it's like a password manager, single sign on.
Starting point is 01:17:50 Because you can also like add accounts that aren't the ones created by the school. But I also don't like this because it makes it hard to like link to resources. And also it doesn't really. work a lot with like library systems that are expecting like easy proxy or you know open athens or something but the fact that like the two-factor authentication and the password manager which i don't use for that i still use but warden and are like single sign on they're all the same since it's one less thing for the students to have to download that's kind of the idea behind single song you're more likely to have the secure password if you only have to remember one yeah and it's like
Starting point is 01:18:33 like it's like their student account password and login and stuff. And that's what their one login is. I'm going to have to dig around and find it. But I know that there's a website where you can plug in your email and then it checks a whole bunch of really common websites and tells you whether or not you have an account on that website. Oh. Which is really useful for sort of doing a digital cleanup. Because like if you haven't touched your Coursera account in 10 years like I have, maybe I should go ahead and delete that. I completely forgot I had it. And there's one that will also help you delete. Like, maybe it's the same one, but like, not only will it check, but it'll tell you how to delete the account because sometimes it's not always obvious. Just delete me. Just delete me.
Starting point is 01:19:20 Just delete. Just delete. Just delete. Just on a live me. Just fucking end my shit. I'm going to make a service called Just End My Shit. There's a similar thing for you. for like in your email, like for like newsletters and shit that you get, like unroll.
Starting point is 01:19:38 that me or something where after time you have to pay for it, but at least you can like start for free. It will help you like unsubscribe from newsletters as well as like mailers and all sorts of stuff and that can also, you know, help. Also just keeps your email from being annoying. Yeah. Fellow transes out there who have done a legal name change. that doesn't even if you went did like your social security and whatnot that doesn't mean it got
Starting point is 01:20:09 changed everywhere um especially in like records and stuff so you might even if it sucks you might also want to check under your dad name for stuff if you ever have to do that i i have to do that sometimes especially like i still haven't changed my name on one of my credit cards because they won't let you do it online and i have ADHD so that that means it's not getting changed and um my birth certificate hasn't been changed. One, because I don't want to, but two, because I was born in Ohio, and apparently it's real hard to do it there. And, like, I haven't changed my name on my degrees or anything.
Starting point is 01:20:43 So, like, check both if you have, I mean, anyone who's changed their name, even if it hurts to do it. Just, like, rip it off like a Band-Aid. Yeah, but I have a whole one note full of useful digital security and privacy links. So hit me up if y'all, if anybody wants. Which like shout out to like Library Freedom Project and a ton of the guests on here. And like I didn't come across these on my own, I guess is what I'm trying to say. I made like a GitHub repo with a bunch of that I made when I was doing like in 2020 in the summer when like protests were happening.
Starting point is 01:21:25 There was like a local activist group that I did a little training for. and I made like a GitHub repo of like digital security and like protest security resources. So like GitHub repos because just markdown files and, you know, playing text to download and stuff. So that's also an avenue. But I know people hear GitHub and get scared. Okay. Well, we should go. It's been two hours.
Starting point is 01:21:51 Good night.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.