LPRC - CrimeScience – The Weekly Review – Episode 85 with Dr. Read Hayes, Tom Meehan & Tony D’Onofrio

Episode Date: December 23, 2021

Omicron Variant is Spreading Fast! In this week’s episode, our co-hosts discuss LPRC Kickoff on Jan 19th in NY, 2017 Predictions: Did they really come true?, 10 Security Mega Trends for 2022, Contin...uation of Last Weeks Largest Cyber Vulnerability Conversation, and Myths and Misconceptions of Cyber Security. Listen in to stay updated on hot topics in the industry and more! The post CrimeScience – The Weekly Review – Episode 85 with Dr. Read Hayes, Tom Meehan & Tony D’Onofrio appeared first on Loss Prevention Research Council.

Transcript
Discussion (0)
Starting point is 00:00:00 Hi, everyone, and welcome to Crime Science. In this podcast, we explore the science of crime and the practical application of this science for loss prevention and asset protection practitioners, as well as other professionals. We would like to thank Bosch for making this episode possible. Take advantage of the advanced video capabilities offered by Bosch to help reduce your shrink risk. Integrate video recordings with point-of-s sale data for visual verification of transactions and exception reporting. Use video analytics for immediate notification of important AP related events and leverage analytics metadata for fast forensic searches for evidence and to
Starting point is 00:00:35 improve merchandising and operations. Learn more about extending your video system beyond simple surveillance in zones one through four of LPRC's zones of influence by visiting Bosch online at boschsecurity.com. Welcome, everybody, to another episode of Crime Science, the podcast from LPRC. This is the latest in our weekly update series and joined by co-hosts Tom Meehan and Tony D'Onofrio and our producer Diego Rodriguez. And we'll take a kind of a swift look around the globe here at what's going on. And just before recording, we were talking about what's going to happen with the Omicron. And of course, everybody's monitoring hospitalizations, particularly serious ones, sort of critical care, ICU type admissions and treatment for COVID-19 versus infections and infection rates,
Starting point is 00:01:28 particularly because so few people are being tested evidently as a rate as compared to months ago, as well as the subclinical infections, which we saw before, the asymptomatic infections are very, very low, mild symptoms that may seem to characterize this latest version of the coronavirus called COVID-19. So if it turns out that there's a fair amount of infections, that's one thing, but there's a very low rate of serious disease in part because it's just the virus itself. And we've talked about this in the past. The virus's job is to viral, to go viral and to reproduce.
Starting point is 00:02:13 And if it kills the host, um, or inhibits the host so much that the host can infect other humans, in this case, that's not good for the virus. It's not spreading. So the, the idea is that, uh, using some kind of logic, if you will, that, you know, that's not good for the virus. It's not spreading. So the idea is that using some kind of logic, if you will, that that's how the successful virus is. It makes you just sick enough to spread it to somebody else so it can keep going. It doesn't want to hurt or kill you. So we'll have to stay tuned and see what happens. We're still between six and 800,000 Americans alone that have died. And they believe by and large from COVID-19 or in large part because of COVID-19.
Starting point is 00:02:53 So it's a very serious disease for some of us. We're also looking at, you know, as far as the National Retail Federation, the NRF big show coming up in that second week in January. Most of us are scheduled to be there to even present. LPRC kickoff, of course, is scheduled to be there, hosted by Bloomingdale's at their flagship store on that January 19th from 8.30 to 12.30. But what's all that look like? We're wondering now, since the Omicron seems to be spreading pretty rapidly, particularly in the New York area, will that have peaked and passed to a certain extent waned, or is it set to peak then? Those are those kinds of questions in mid-January.
Starting point is 00:03:39 Here we are in late to middle December, so it may give some time for that type of progression and allow the conference to go forward as stated. But who knows what attendance will be like. Normally tens of tens of thousands of people, a lot of excitement, energy, looking forward to it. So we'll have to see how that goes. It looks like there are, it's really particularly interesting, a lot of science around
Starting point is 00:04:08 how many SARS-CoV-2 infections are asymptomatic, you know, at least subclinical, just almost non-detectable that there is, that you are infected. I myself get tested frequently at the University of Florida. I'd kind of started not doing it so much like everybody else then started doing it. I felt a little funny the other day. I went through my routine test, nothing. So, you know, because you're hearing these mild symptoms. And so I just felt, you know, kind of off for a day. And that was sort of it.
Starting point is 00:04:41 So it wasn't, but it turns out it was not SARS-CoV-2. sort of it. So it wasn't, but it turns out it was not SARS-CoV-2. There's on the therapy side, another malaria drug that's showing progress. And so we'll stay tuned to that. So you're seeing more and more drugs that are coming out of different types of testing that look fairly promising for either stopping the spread within our bodies, replication, slowing it down, purging it. There's all these different modes or mechanisms of action there. We're seeing, too, you look at the data. We just talked a little bit about the low symptoms potentially here with Omicron,
Starting point is 00:05:21 which, by the way, has now been reported by the who anyway in over 89 countries and that just gives all of us an idea of how rapidly how rapidly this particular variant has spread around the world but south africa who was where we really started hearing this it was one the first to really sequence and learn about the this new variant and a lot about the mutations that occurred. Over 50 we've learned and talked about prior, but they also have seen their hospitalization rate plunge at the same time as infections have risen. So we're hoping that these are all good signs that this is where some virologists and epidemiologists were talking about even at the beginning of 2020 or mid-2020, that really this is the type of virus, like different strains of
Starting point is 00:06:13 influenza, that become, as they call it, endemic, where it's an annual occurrence. It spreads throughout the population, depending on exposure and the health of the person, and then again, population depending on exposure and the health of the person, and then again, vaccination. So annual flu vaccines, annual different types of vaccines, you might see this annual or biannual even, we don't know yet, coronavirus vaccine. At this point, you know, we know that there's 100 billion humans have been vaccinated with relatively few, almost none. As far as the side effects, they're extremely serious. There are those. And if you're one of those or any of us are that serious to those that are loved ones,
Starting point is 00:06:56 but we're talking about thousands compared to billions. And so we'll have to stay tuned versus we know with the actual viral infection, it's more serious. So they're looking at different types of AI that are helping detect more rapidly. We've heard of dogs that can sense the infection and all these types of things to look at. They're also, I've seen more research on, is this a respiratory virus or not? It seems to be some scientists are arguing and physicians that it's more of a platelet, um, disease than it is a lung tissue disease. And that's why there are these effects, um, in our brain sometimes with the loss of, or
Starting point is 00:07:42 changes in sense of, of taste and smell, different bleeding episodes, some of the cardiac effects that are there from the coronavirus and so on. So those types of testing, that type of research, that type of science brings the implications around what we need to do about it. So that's part of what we're looking at when we look at the science here. And that's why some of the neurons that are affected by COVID do threaten some people's brains because it's a platelet disease rather than a respiratory. But the platelet, again, brings the implications for new vaccine strains. And we see now at this point, there's still around 110 vaccine candidates,
Starting point is 00:08:27 in addition to the couple dozen that are already out there in emergency use or full use authorization because of the testing. So you're going to see those that affect different ways, affect our bodies and the virus and so forth. Again, at the end of the day, and all the testing that's gone on, the vaccine still makes those of us that become infected less likely to get serious disease. That was always the intention, rather than reduction in infection, which would be a nice goal. And so we're hoping that of the follow-on 100 plus that are already in human clinical trials, that one or more of those might help us provide more infection protection in addition to serious disease from infection. So another study we just saw that Omicron affects 70 times faster than any other
Starting point is 00:09:22 strain, even Delta plus. So we can see it's just very, very infectious, more, more microns evidently, or more particles. And then we talked about how it seems to more readily attach and more rapidly spread and things like that than other ones. So it's interesting to understand why a person might become infected versus from a load or inoculum, an onboarding of some of these particles in another strain that we've seen prior to this. And there have been multiple studies about why this is going on. So I think we talked about the LPRC and what's coming up here. With the kickoff, again, January 19th, if all holds firm from 8.30 to 12.30, reach out to operations at lpresearch.org to register. It's open to all LPRC members, solution partners, and retailers alike. Again, we've got about 110 person limit right now, just because the space that we
Starting point is 00:10:26 have available. And Diego informs us that we're between 80 and 90 registrants already. So we anticipate blowing past that number. But again, as concerns about the Omicron version and so on around there, that may dampen the attendance or cause us to alter our plans completely. So who knows anymore? The Ignite, again, right now, the LPRC Ignite Winter Planning Meeting is scheduled for Gainesville, Florida on campus. And that would be right now in the February 16th time range. And again, for more information or to register for that as an LPRC leader member, then that's again at operations at lpresearch.org. We continue to have some stellar visitors in here.
Starting point is 00:11:17 We've talked about we had the top LPAP decision makers, including Chief Security Officer from Verizon Global, CVS, others, several more are scheduled in. So we're excited to be engaging with so many top leaders as we go through this wild and zany 2021 now into 2022. We've got some new researchers joining our team. We're excited about that. Very excited. We'll have our largest and actually most trained research team in the history, the 21-year
Starting point is 00:11:51 history of the LPRC by mid-February of 2022. So a lot of exciting things happening, and stay tuned. So if I might, I'll head over to friend and colleague Tony D'Onofrio. And Tony, if you can kind of fill us in on everything you're learning and what we need to do. Thank you very much, Reid. Great updates both on COVID and what's happening to the LPRC. And I'm looking forward to all those upcoming events. So this week, I'm going to go on two topics.
Starting point is 00:12:19 One, I'm going to start with the NRF, which just issued an update to their predictions that they made back in 2017. And how many of those predictions actually came through? So from NRF, their number one prediction was machine learning will revolutionize retail. And the reality, according to their article, is that while it's been five years since NRF called that out, companies are still wrestling with the capabilities of machine learning and AI. Recent Gartner reports found that 85% of artificial intelligence and machine learning projects fail to deliver on objectives. Only 53% make it to prototype and production. Their second prediction was no silos for retailers or boundaries or channels.
Starting point is 00:13:10 The biggest challenge they saw back then is ensuring, and they see that today also, is ensuring consistent experience across all those channels. The update is that shoppers emerged from only two years of drinking from our five higher holds of digital commerce interaction. They are looking to retailers to deliver somewhat different experiences in their physical stores. And consumers still won't tolerate excuses about desperate systems
Starting point is 00:13:42 that don't sync or lack inventory transparency, much as we said five years ago. The third prediction was bet on bots and conformational commerce. That was a bold statement in 2017, but it turns out we nailed it. Conversational commerce technology has enjoyed a meteoric rise of 400% since 2017. In addition, the percentage of customers who have daily interactions with chatbots has risen by nearly 40% from 2018-2020 in the U.S. By 2025, the chatbot market is expected to hit $102 billion. The next prediction is out-of-the-box collaboration. That also did happen. 2020 opened to a plethora of unlikely collaboration.
Starting point is 00:14:36 No one has foreseen. Albertson, for example, partnered with 17 companies to offer part-time employment to otherwise furloughed staff. And DSW partner with Hy-Vee to offer footwear on the supermarket website and provide buy online, pick up in store services. Next prediction, time to tune in to TV shopping. It's fair to say they missed this one. Live shopping is coming, but it's coming very slow. Live shopping on Facebook and Instagram is starting to gain some steam. Macy's, Ulta Beauty, and we already all announced live stream sessions during the holiday. And Walmart said that they would host 30 live streaming events before the end of the year,
Starting point is 00:15:25 but it is slow and it's late from 2017. Next prediction, social commerce will gain attention and investment. Just last month, Inc. Magazine reported that social commerce generated approximately $475 billion in revenue in 2020, representing a 40% increase. Businesses of all sizes are finding that social commerce is not a competitor to e-commerce. It's just an extension. And the final prediction they made back in 2017, one-click payments nearly ready for
Starting point is 00:16:02 prime time. They are coming, but they're coming again, slow. Payment networks, including American Express, Visa, MasterCard, and Discover didn't roll out until the end of 2019. So the way they summarize the article is ultimately our ability to protect what was in the cards for retail in 2017 was equivalent to a full house in poker, not four of a kind and certainly not a straight flush. If yet, if one wagered a bet, they would have done reasonably well. So most of the prediction came true, but some took a lot longer to get there.
Starting point is 00:16:38 And let me close this week with some really interesting insights in terms of what's happening to the security industry. Every year, the Security Industry Association publishes their 10 megatrends that they see in security for the new year. So here are the 10, and this is the sixth year in a row that they've done that. Here are the 10 security megatrends for 2022. Number one is artificial intelligence. It was the same last year.
Starting point is 00:17:09 AI investment for security companies is exploding. When they first did the survey in 2019 on this specific topic, less than 2% said that R&D investments were tied to AI. In 2020, that percentage went up to 3%. But sometime in the last year, in the peak of COVID, what started the number is now raging as a fire investments in AI for security, with 13% of companies saying that all their R&D investments are tied into AI opportunities. Number two, and this one is near and dear to Tom's heart, mega trend for 2022 is cybersecurity.
Starting point is 00:17:51 In the previous year of tracking this benchmark question, SIA found that 2% of the respondents said cybersecurity was never a discussion point. Today, no one says that it's not a discussion point. So it's top of mind of a lot of different folks. While a year ago, cybersecurity discussion were often part of the conversations, 52% of the time. Today, that frequency is up to 62% of the time. So what Tom brings up every week, very valuable, is a mega trend for the security industry in 2022.
Starting point is 00:18:24 is a mega trend for the security industry in 2022. Number three, supply chain assurance. 98% of companies in the industry invest more time and focus in supply chain than they did in pre-pandemic. More than half saying they are giving their supply chain a lot more focus. Number four, service models in the cloud. 50% of data is now stored in the cloud. According to Statista, 98% of companies had at least one cloud data breach in the past 18 months. Number five, workforce development.
Starting point is 00:18:56 37% said that worker shortages would be a factor most likely to impact their business ability to grow in 2022. And that's actually been all over the news on worker shortages. Number six, increase interoperability. In 2030, $108 billion is the predicted market value for smart buildings, IoT, endpoint electronics and communication market up from $55 billion in 2020. Number seven, data privacy. A year ago, only 53% said they often had privacy conversation with customers. Unfortunately, that conversation has actually increased dramatically with that number increasing in subsequent years. Number eight, security as prop tech. Loosely defined prop tech is any technology related to how buildings are
Starting point is 00:19:55 managed and used, and even bought or sold or rented. $9.7 billion is the amount of new funding and prop tech sector attracted just in the first half of 2021. Number nine, expanded intelligence monitoring. Expanded intelligence monitoring of public data services is already common, but companies and service providers are more regularly exploring reaches of the deep web and dark web to identify emerging threats and investigate stolen data. Again, a subject that Tom brings up almost every week. And number 10, the last megatrend for 2022 in security is health and sustainability. The pandemic left an indelible imprint upon security and safety. And while the initial response has been to install security solutions that
Starting point is 00:20:47 limited the need to touch, which could detect fevers, the conversation has expanded much more from those early days. And there's a lot more focus now on safety and security going forward. So those are the 10 mega security trends for 2022. And with that, let me turn it over to Tom. Well, thank you, Tony. And you set me up for a couple of different things today. And I'm going to talk a little about some cybersecurity risk.
Starting point is 00:21:14 And last week, I taped, we all taped individually. And it was the week after the Log4J vulnerability was discovered. So it was the weekend after. So that was that weekend and then we taped on a Tuesday. So we have some more information about arguably the most prolific and damaging vulnerability to ever be disclosed. And I say that with a certainty of at least as long as I can remember, I've never seen anything that is far reaching as log4j. So just to give kind of a high level overview of what it is, is log4j or log4shell, either one that you want to hear about, is a part of an open source Java and Apache code. So JSON, if you hear that, Java or Apache code, that affects literally
Starting point is 00:22:08 hundreds of thousands of software platforms. It's even hard to nail down what it affects. And that's what makes this vulnerability so different than others is normally when we talk about a zero-day vulnerability, it's specific to one operating system or one facet of an operating system. So you'll hear there's a vulnerability and Microsoft patches it and, you know, it solves the Windows vulnerability. Even a web based or a browser based vulnerability is usually a lot narrower than this. And when the reports came out, I actually had a birthday party for my daughter, was kind of unplugged on the weekend and had a very early morning flight as I shared the last week's podcast. And there were hundreds and hundreds of posts and really hundreds of thousands of posts and
Starting point is 00:22:57 hundreds of articles about how the internet was on fire. And this was the most significant vulnerability in years. And today, unfortunately, I'm here to report that I actually think even that was probably an understatement. Basically, what this allows is anybody that uses that code is susceptible to a fairly easy exploit and an exploit that anybody with moderate, even intermediate skills could Anybody with moderate, even intermediate skills could expose and get in and remotely execute code via this exploit. And what's unknown today is all of the different ways that this is being taken advantage of. I took some time because I was traveling all week and took a look at Central Europe, Russia and China. central Europe, Russia, and China, the amount of scans increased by off the charts percentages to try to find this exploit. And to date, what we're seeing mostly is that some of the execution of
Starting point is 00:23:54 malicious code has to do with crypto mining. But the challenge here is that we don't know where it ends and where it starts. And it's really the biggest challenge here is that this open source of code, it affects millions of devices. And it could be a video game systems, corporate systems, really anything that uses this code. I know Amazon web service was running 24 hours a day to fix this.
Starting point is 00:24:24 So for everybody that's listening, and we say it repetitively, I can't stress this more than I've ever stressed it, is take a look at everything that you can update and patch and do it. The unfortunate part here is that the bigger softwares will be easy to patch, but us as everyday users, there'll be vulnerabilities that we don't know about. The companies that may not even be in existence anymore or acquired that really make this challenging. And this is one that my prediction will never go away, quite honestly. It will last for several years is what most cybersecurity experts are predicting, that this is a very, very long tail.
Starting point is 00:25:03 My professional opinion is it'll never fully be eradicated because of the depth that it has. So when you think about Microsoft making a public statement that affected Minecraft, just think of that. Their vulnerability affects literally anything. And then LDAP, which is a type of Active Directory. An Active Directory for the listeners is what we use to get on. Usually it's called something referred to as single sign-on. So if you work for a company and you go on and you sign on to your PC and you use that password and username for multiple things, it's often Active Directory. There are newer versions, but LDAP, which is probably the most common that we would see throughout the industry also is affected.
Starting point is 00:25:47 So the login pieces of most modern computers and this is not, you know, this does not discriminate between OS. So anybody, this can affect a Mac. This can affect anything that uses that JavaScript. So I don't know that we'll talk a lot about it. We'll probably give updates because I don't think the narrative is going to change. There is no silver bullet here. This just reminds us of the importance of protecting ourselves and really making sure that we're patching as much as possible. This is going to be one of those things that I think will outlive most vulnerabilities. And when we talk about Internet of Things devices, and on this podcast, we talk so much about the fact that as we adopt
Starting point is 00:26:32 them, it's important to make sure that when you're buying an Internet of Things device or retailers buying any type of hardware to put into their stores, that you're buying it from a reputable company that has a history so that when something like this happens, you're sure that there'll be a patch available. And I know just in speaking to some of my retail friends and former colleagues that they're starting to realize that there are some systems that they use that are no longer supported that have this vulnerability, which basically means they have to be you know considered end of life and removed because this vulnerability exists to date um the maliciousness of this vulnerability really has not come to fruition it's been cryptocurrency i think um the wall street journal uh cryptocurrency miners sorry i think the wall street journal
Starting point is 00:27:21 talked about the the Defense Ministry being affected. So think of that, you know, that they were they had the effect from this. And then Tony mentioned AI, you know, and he talked about artificial intelligence. One of the challenges with this exploit or this vulnerability today is as we adopt artificial intelligence to automate processes. And I want to just oversimplify this. Artificial intelligence at its core is just replicating human behavior. That's the start at its core. Obviously, machine learning and all these other things make it a lot more advanced. But what the bad guys are doing is they're using artificial intelligence to create bots to replicate human behavior and literally trying to attack this vulnerability by the hundreds of thousands per day with actually no human interaction. So as we adopt AI,
Starting point is 00:28:11 and as we use AI, so do the bad guys to take advantage of us. So rule of story here is to patch and get this patch quickly. I wanted to just switch gears a little bit, still talking about cybersecurity, but towards the end of the year, I generally make predictions and write some articles and I'm working on my trends, cybersecurity, what to expect. And then I wanted to just talk about myths and misconceptions, because I think with related to cybersecurity, I think with COVID, we thought of a lot of things. One of the myths and misconceptions is cybersecurity is all about what the newest technology and the newest software, very much like all the listeners on the podcast, they probably know is that a lot of it's basics.
Starting point is 00:28:51 You know, some of the things that we, from a cybersecurity standpoint that we did 20 years ago, still work using good cybersecurity hygiene. So one of the biggest myths is that I have to have the latest and greatest. And using the patch example is patching software has been since the beginning of time. It's really important to remember that. Another big cybersecurity myth is too much security diminishes productivity. That isn't necessarily the case. If it's managed correctly and you're looking at the balance of what the right amount of cybersecurity is, it doesn't have to diminish
Starting point is 00:29:27 productivity if it's implemented correctly and you're working with your teams. That's one of the big misconceptions that I, even myself, would use to fall into the scheme of thinking that this was too much security and it would slow things down. You can build insecurity features that integrate seamless with your system and processes and policies. This requires a lot of work. Another huge myth, and we talk about it a lot on the podcast, is cybersecurity and cyber attacks only happen from outside. We know that more than 60% of the data breaches, and this number fluctuates, and it has for the last 10 years between 60% and 85%, depending on what survey you do, happens within the four walls of your organization, whether it be from a contractor, a business partner, or an actual employee. not necessarily nefarious in nature, but the bulk, more than half, and I would say it's probably closer to that eight to 10, 80% than the 60% based on all the things I've seen happen from some
Starting point is 00:30:33 side of insider interaction. Access and opportunity is what allows people to take advantage of cybersecurity. Very, very, very similar to all the things that we talk about here with physical security. Access and opportunity are the keys, and lack of supervision is the third pillar of the cybersecurity piece, and that supervision could be human-driven or computer-driven. Cyber security experts often talk about big retailers and banks being targets. talk about big retailers and banks being targets. We know today that that's not necessarily the case. Cyber security affects all of us. And one of the things that's important is that larger businesses, while they have a bigger target, they also have bigger budgets for security. So your small to mid-sized businesses, academic organizations are at just as much of a risk, if not more.
Starting point is 00:31:27 And a recent survey showed that only about 14% of mid-sized businesses were actually prepared for a cybersecurity incident. And then I'll finish up with just two more here. You know, one of the other things is antivirus, any malware and intrusion software is enough to protect you. That's just a piece of the puzzle. It's one of those things, again, I love to relate to the Laws of Intervention Research Council.
Starting point is 00:31:52 It's never one thing. It's a combination of things, and it's generally driven by people, process, and technology. The same in the cybersecurity world. There is no magic bullet. There is no magic pill that you can take. There isn't one piece of software. It is a combination of things that come together. One of the, and I'll round it out with this, and this goes directly to physical security. Cybersecurity is too expensive. The cost
Starting point is 00:32:19 doesn't create an ROI. And this is one of the things in our space that we talk about all the time. Everybody wants to create an ROI and that's obviously what you need to do when you're in a business. Unfortunately, with cybersecurity or security instances, there is a level of avoidance that's needed because the true cost of a cybersecurity incident, much like a physical security incident,
Starting point is 00:32:41 is much more than the financial liability. You have brand reputation, you have resources to build. So a lot of times when you're talking about making a cybersecurity investment, you cannot take that traditional ROI argument of my potential loss as X. You have to think of the actual cost of the solution based on what a successful attack looks like when you take into consideration brand, reputation, downtime, and customer impact. And those are really hard things from a financial standpoint to create an ROI. And then the same things we talk about all the time here that we're on this podcast here is if it was just one equation it'd be very very
Starting point is 00:33:27 easy and then last but certainly not least and I feel like this is the broken record as we talk about COVID and the new variants is there is a rash of bad guys trying to take advantage of the new variants spreading misinformation misinformation, as well as selling new therapeutics online, both on the free web and the dark web. And I think what you'll also see, and I'm gonna not talk about it in detail today, is we're starting to see a rash of arrests and terminations related to fake vaccination cards.
Starting point is 00:34:01 So I think there was 14 reports last week of somewhat prominent individuals and actually, unfortunately, quite a few first responders were listed in that 14. I think nine of them were police and firefighters that used fake vaccination cards to get around the mandate and how unfortunate that is that people are now at that stage. So we continue to see that grow. And we'll monitor that. I think as the variants spike, you start to see a lot more of the folks trying to take
Starting point is 00:34:34 advantage of that, as well as people trying to buy fake vaccination cards and negative test results. If you do a quick search on the internet today, it takes no more than about 10 seconds to find out how you can print a template or buy a fake vaccination card and even buy a fake test that much like the diploma mills were years ago, you can actually verify the test. So there's these websites that are set up to look like urgent care facilities. You go, you buy your fake test for $100, and then you get a verification for that test for four days where someone actually calls in
Starting point is 00:35:11 and someone answers the operator. So as we always say, with any unfortunate situation, there are people that take advantage of it. With that, I will turn it back over to Reid. All right, well, thanks so much, Tom, for all that information. Thank you, Tony. Amazing insights. And I know that we all appreciate you guys spending a lot of time pulling together from
Starting point is 00:35:33 a lot of sources, excellent information. Everybody is so busy these days and the convenience is amazing. So I want to kind of wrap up by everybody stay safe out there. Look us up, lpresearch.org. Get a hold of our team and let us know if you have interest in getting in here to Gainesville or you want to do a Zoom or a Teams call and do a virtual walkthrough of all our labs, the capability, the projects we're working on. But on behalf of the LPRC, this team, I want to thank everybody. Have a safe and happy holiday season. and valuable information at lpresearch.org. The content provided in the Crime Science Podcast is for informational purposes only
Starting point is 00:36:27 and is not a substitute for legal, financial, or other advice. Views expressed by guests of the Crime Science Podcast are those of the authors and do not reflect the opinions or positions of the Loss Prevention Research Council.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.