1 00:00:00,200 --> 00:00:01,400 Speaker 1: Well way new warning. 2 00:00:02,040 --> 00:00:05,880 Speaker 2: Iran and its proxies are very likely planning attacks on 3 00:00:05,920 --> 00:00:09,479 Speaker 2: the United States, not hardcore terrorist attacks as we saw 4 00:00:09,480 --> 00:00:11,399 Speaker 2: in nine to eleven. I mean that's all possibility. Look 5 00:00:11,440 --> 00:00:13,240 Speaker 2: what happened in Austin, Texas, which was more like a 6 00:00:13,280 --> 00:00:16,840 Speaker 2: lone wolf, crazy dude, but still again that's terrorism. I'm 7 00:00:16,880 --> 00:00:20,600 Speaker 2: talking about cyber attacks. Are you prepared, as Willie would say, 8 00:00:21,040 --> 00:00:23,840 Speaker 2: for attacks on American soil? Found the killing of Kamene? 9 00:00:24,480 --> 00:00:26,560 Speaker 2: So what does that look like for you? We hear 10 00:00:26,560 --> 00:00:29,120 Speaker 2: about these large scale tax all the time. Maybe I 11 00:00:29,120 --> 00:00:31,720 Speaker 2: don't know, you can't shop on Amazon, maybe your Twitter 12 00:00:31,760 --> 00:00:34,560 Speaker 2: feed goes down for a little bit. What actually would 13 00:00:34,600 --> 00:00:40,560 Speaker 2: happen and what might happen? Chris naiheis of Vigilant Cybersecurity 14 00:00:40,680 --> 00:00:44,080 Speaker 2: in Cincinnati. He's the CEO again to talk about it, 15 00:00:44,159 --> 00:00:46,159 Speaker 2: and this is probably the main concern, which would be 16 00:00:46,159 --> 00:00:47,360 Speaker 2: cyber So are you at. 17 00:00:47,200 --> 00:00:49,760 Speaker 1: Def con one right now? How deep? How high a 18 00:00:49,840 --> 00:00:51,919 Speaker 1: level of deaf con are you right now? Chris? 19 00:00:52,640 --> 00:00:56,040 Speaker 3: Like a Con two too, you know, but you gotta 20 00:00:56,080 --> 00:01:01,040 Speaker 3: have awareness, you know, ultimately you want to ever operate in 21 00:01:01,160 --> 00:01:04,319 Speaker 3: dufton one even in your regular everyday lives because your 22 00:01:04,360 --> 00:01:07,960 Speaker 3: brain just gets tired to that and you just degrade 23 00:01:08,000 --> 00:01:09,800 Speaker 3: over time. So sure, you want to be in heightened 24 00:01:09,840 --> 00:01:12,120 Speaker 3: state awareness. And that's where we are right now, just watching, 25 00:01:12,560 --> 00:01:15,760 Speaker 3: watching everything. You know, you're always watching intently anyway, just 26 00:01:15,760 --> 00:01:17,480 Speaker 3: because you never know when someone's going to try to 27 00:01:18,080 --> 00:01:20,959 Speaker 3: creatively do something here in the United States, But you 28 00:01:21,000 --> 00:01:23,600 Speaker 3: know now it's it's just being aware that you know, 29 00:01:23,800 --> 00:01:26,520 Speaker 3: more likely there's an imminent threat that's happening. 30 00:01:26,680 --> 00:01:29,440 Speaker 2: We've often talked about a cyber nine to eleven coming 31 00:01:29,520 --> 00:01:33,680 Speaker 2: we saw now with AI and other other sentence means 32 00:01:33,760 --> 00:01:37,399 Speaker 2: is that we have faced crisises before, but we always 33 00:01:37,440 --> 00:01:39,440 Speaker 2: talk about like the big one, whether it's an earthquake, 34 00:01:39,480 --> 00:01:41,440 Speaker 2: whether it's a terrorist a physical terroist attack. 35 00:01:41,480 --> 00:01:42,919 Speaker 1: This would be more digital one. 36 00:01:43,560 --> 00:01:46,199 Speaker 2: Is that more likely now with this or less likely 37 00:01:46,240 --> 00:01:48,520 Speaker 2: because well we're on guard more on guard? 38 00:01:48,520 --> 00:01:51,360 Speaker 3: I guess yeah, So I think I think with this one, 39 00:01:52,000 --> 00:01:54,880 Speaker 3: when you look at you know, the big one, right 40 00:01:56,160 --> 00:01:58,360 Speaker 3: that would be coming from more of like a nation 41 00:01:58,480 --> 00:02:03,000 Speaker 3: state like China or Russia. They're not really going to 42 00:02:03,040 --> 00:02:06,520 Speaker 3: do those things unless they just decide day to just 43 00:02:06,640 --> 00:02:08,680 Speaker 3: make a consorted effort to just take out the United 44 00:02:08,760 --> 00:02:10,480 Speaker 3: the entire United States, because it would. 45 00:02:10,280 --> 00:02:12,240 Speaker 4: Be a direct active war and it's very coordinated. 46 00:02:12,280 --> 00:02:15,720 Speaker 3: It would take multi nations to do it in this case, 47 00:02:16,560 --> 00:02:20,080 Speaker 3: at least right now anyway, because it's all about time 48 00:02:20,280 --> 00:02:26,639 Speaker 3: and positioning. You know, I don't the the adversaries from 49 00:02:26,680 --> 00:02:29,960 Speaker 3: like you know that you know, Iran et cetera. They 50 00:02:30,000 --> 00:02:32,440 Speaker 3: do have the uh you know, when you look at 51 00:02:32,560 --> 00:02:36,560 Speaker 3: Iran or Hamas or or the Taliban, et cetera, they 52 00:02:36,680 --> 00:02:41,760 Speaker 3: have the technological ability to do these same types of attacks. 53 00:02:41,880 --> 00:02:44,040 Speaker 3: It doesn't take long to do it. You can learn 54 00:02:44,040 --> 00:02:47,320 Speaker 3: on YouTube. But on top of that, Iran was funding 55 00:02:47,560 --> 00:02:50,840 Speaker 3: the development of very intense, very good tools in Iran 56 00:02:50,960 --> 00:02:53,760 Speaker 3: use those. What they were doing though, is giving those 57 00:02:53,800 --> 00:02:58,520 Speaker 3: the terrorist organizations and training them up. And so whereas Russia, 58 00:02:58,560 --> 00:03:02,240 Speaker 3: where China has had a lot hunger to position themselves 59 00:03:02,240 --> 00:03:03,959 Speaker 3: in our water systems and things like that just like 60 00:03:04,000 --> 00:03:06,079 Speaker 3: beauty to them, uh and and. 61 00:03:06,120 --> 00:03:08,080 Speaker 4: Put hooks in there. Uh. 62 00:03:08,160 --> 00:03:11,560 Speaker 3: These you know, Ran and these terrorist organizations haven't had 63 00:03:11,639 --> 00:03:15,560 Speaker 3: that same length of time, but they but guaranteed from me, 64 00:03:16,760 --> 00:03:20,679 Speaker 3: you know, quote unquote cyber sleeper self standpoint, they've embedded 65 00:03:20,680 --> 00:03:24,560 Speaker 3: themselves in certain places that are considered them strategic and 66 00:03:25,320 --> 00:03:27,440 Speaker 3: you know we're we're at war, and I think in 67 00:03:27,480 --> 00:03:30,360 Speaker 3: the United States a lot we think the war's over there, 68 00:03:31,400 --> 00:03:35,240 Speaker 3: and generally that does happen, but cyber enables the war 69 00:03:35,280 --> 00:03:36,400 Speaker 3: to come here really quickly. 70 00:03:36,560 --> 00:03:37,320 Speaker 1: Yeah, it makes sense. 71 00:03:38,360 --> 00:03:41,880 Speaker 2: So Iranian process, give me a sense of things that 72 00:03:42,080 --> 00:03:46,160 Speaker 2: may have happened in a layman's terms, that Iran or 73 00:03:46,200 --> 00:03:48,160 Speaker 2: their proxies have done to us in the past. 74 00:03:48,680 --> 00:03:50,320 Speaker 1: What type of cyber attacks have we seen. 75 00:03:50,240 --> 00:03:52,040 Speaker 4: That we know? Well? 76 00:03:52,120 --> 00:03:54,520 Speaker 3: So the and that's the that's the hard part, right, 77 00:03:54,640 --> 00:03:57,360 Speaker 3: is attribution. Knowing that they're the ones that have actually 78 00:03:57,360 --> 00:04:01,880 Speaker 3: done this. We've had more military type approaches or hats 79 00:04:02,080 --> 00:04:06,600 Speaker 3: in to get data, uh, defense defense type approach where 80 00:04:06,920 --> 00:04:11,320 Speaker 3: they've passed into defense organizations. There's not there has not 81 00:04:11,400 --> 00:04:16,000 Speaker 3: been a attributed you know, critical infrastructure takedown in the 82 00:04:16,120 --> 00:04:18,960 Speaker 3: United States by Iran, and I think that was intentional 83 00:04:19,080 --> 00:04:21,400 Speaker 3: because they knew if we attributed that back to them, 84 00:04:21,560 --> 00:04:23,160 Speaker 3: we would just have destroyed them. 85 00:04:24,320 --> 00:04:26,160 Speaker 4: But see, the thing that's happened. 86 00:04:25,839 --> 00:04:29,360 Speaker 3: Now is you know, just like you know President Trump 87 00:04:29,360 --> 00:04:32,960 Speaker 3: said yesterday, if he's assassinated, he has instructions for us 88 00:04:33,000 --> 00:04:37,359 Speaker 3: to annihilate, you know, ran the same thing happens there. 89 00:04:37,520 --> 00:04:39,760 Speaker 3: You know, if you know for them, you know, if 90 00:04:39,800 --> 00:04:44,200 Speaker 3: the Iopola was taken out, guaranteed there's instructions to sleep 91 00:04:44,279 --> 00:04:47,559 Speaker 3: or cells to do certain things, you know, after he's gone. 92 00:04:47,760 --> 00:04:50,080 Speaker 3: And so that's the part that you have to be 93 00:04:50,080 --> 00:04:53,200 Speaker 3: aware of now, is that there would be instructions already 94 00:04:53,240 --> 00:04:57,160 Speaker 3: in play, whereas it wouldn't have been there before because 95 00:04:57,160 --> 00:04:59,640 Speaker 3: they wouldn't wanted to do it because we weren't at war, right, 96 00:05:00,040 --> 00:05:01,520 Speaker 3: And that's the thing we just need to be aware. 97 00:05:01,839 --> 00:05:04,159 Speaker 2: We know Iran uses fake hacker groups as a front 98 00:05:04,200 --> 00:05:06,320 Speaker 2: so they can attack people that are officially taking credit. 99 00:05:06,440 --> 00:05:10,080 Speaker 2: Kind of mentioned that, but can't then Russia, China or 100 00:05:10,120 --> 00:05:12,200 Speaker 2: pretty much any other nation state do that to us 101 00:05:12,240 --> 00:05:13,800 Speaker 2: to try and make it look like it's Iran and 102 00:05:13,839 --> 00:05:15,560 Speaker 2: not them and use this as an opportunity. 103 00:05:15,680 --> 00:05:16,440 Speaker 1: Is that going to happen? 104 00:05:16,520 --> 00:05:18,800 Speaker 4: They absolutely can. And that's why I was going back 105 00:05:18,800 --> 00:05:19,520 Speaker 4: to attribution. 106 00:05:20,279 --> 00:05:23,480 Speaker 3: It's really easy to make you look like someone else, right, 107 00:05:23,520 --> 00:05:24,240 Speaker 3: I mean, anybody. 108 00:05:24,360 --> 00:05:25,560 Speaker 4: That's why we all have VPNs. 109 00:05:25,640 --> 00:05:27,680 Speaker 3: Right, we jump on a VPN, we can make it 110 00:05:27,680 --> 00:05:29,400 Speaker 3: look like we're coming from Arizona, or we can make 111 00:05:29,400 --> 00:05:31,279 Speaker 3: it look like we're coming from Poland, right, And so 112 00:05:32,000 --> 00:05:35,039 Speaker 3: you know, there's when you get into a very high 113 00:05:35,120 --> 00:05:39,080 Speaker 3: level advanced attackers. They're not just doing a VPN, they're 114 00:05:39,120 --> 00:05:42,240 Speaker 3: going through VPN dark web, a system they hacked in 115 00:05:42,279 --> 00:05:45,120 Speaker 3: another country back to another one, and they've got multiple 116 00:05:45,200 --> 00:05:49,120 Speaker 3: layers feet and so yeah, they absolutely can. Now, one 117 00:05:49,160 --> 00:05:53,080 Speaker 3: of the things that you find with tracking hackers is 118 00:05:53,440 --> 00:05:56,920 Speaker 3: at the end of the day, there's still the poining code, 119 00:05:57,040 --> 00:05:58,599 Speaker 3: and so a lot of times you can look into 120 00:05:58,600 --> 00:06:01,279 Speaker 3: that code and you can see the way that someone 121 00:06:01,360 --> 00:06:03,800 Speaker 3: writes or maybe they must spell something the same time 122 00:06:03,960 --> 00:06:06,400 Speaker 3: in the same way, or they write the scene uh 123 00:06:06,520 --> 00:06:09,160 Speaker 3: you know, uh, you know, the same type of code, 124 00:06:09,360 --> 00:06:11,760 Speaker 3: and when that happens, then you can say, okay, well 125 00:06:11,760 --> 00:06:14,000 Speaker 3: I know it's that person. But but still even if 126 00:06:14,040 --> 00:06:16,640 Speaker 3: they are, you can you know, Russia could say give 127 00:06:16,680 --> 00:06:20,200 Speaker 3: me an Iranian uh you know of malware and then 128 00:06:20,720 --> 00:06:22,560 Speaker 3: just duplicate it and make it look like you Ran. 129 00:06:22,720 --> 00:06:27,040 Speaker 3: So yeah, we have to be really careful in the response. Absolutely. 130 00:06:27,120 --> 00:06:27,480 Speaker 1: Yeah. 131 00:06:27,520 --> 00:06:29,840 Speaker 2: So when we talk about Ran retelling a cybertext, what 132 00:06:29,880 --> 00:06:31,680 Speaker 2: does that actually mean for an ordinary American? Are we 133 00:06:31,720 --> 00:06:34,040 Speaker 2: talking about, you know, your phone and your network going dark, 134 00:06:34,120 --> 00:06:37,279 Speaker 2: your bank account getting drained, the light's going out, what happened. 135 00:06:38,200 --> 00:06:40,279 Speaker 3: Yeah, I think all of those are on the table 136 00:06:41,360 --> 00:06:44,680 Speaker 3: when you look at again, just just deposing them against 137 00:06:44,760 --> 00:06:47,359 Speaker 3: a Russia or a China, they're going to be less 138 00:06:47,400 --> 00:06:51,960 Speaker 3: apt to do attacks against the United States, right, just 139 00:06:52,000 --> 00:06:55,200 Speaker 3: like where lesser thing to do it. So then when 140 00:06:55,240 --> 00:06:57,320 Speaker 3: you and and the reason for that is because we 141 00:06:57,400 --> 00:07:02,520 Speaker 3: operate under rules primarily. And one thing that you know 142 00:07:02,560 --> 00:07:05,240 Speaker 3: I talked about before, there's a book called Unrestricted Warfare 143 00:07:05,640 --> 00:07:08,080 Speaker 3: that came out of the PLA and a couple of 144 00:07:08,120 --> 00:07:10,800 Speaker 3: generals wrote it, and what they said was the only 145 00:07:10,840 --> 00:07:13,640 Speaker 3: way to take out the United States is to operate 146 00:07:13,720 --> 00:07:16,280 Speaker 3: on a different rules that than they do. And what 147 00:07:16,320 --> 00:07:19,600 Speaker 3: they realized is that the United States, in any real, big, 148 00:07:19,720 --> 00:07:23,680 Speaker 3: large nation has to operate off of some rules, and 149 00:07:23,800 --> 00:07:26,400 Speaker 3: those rules wrap around what you would do to people 150 00:07:27,160 --> 00:07:30,440 Speaker 3: or what you would do to infrastructure, because mass outages 151 00:07:30,480 --> 00:07:34,200 Speaker 3: can cause you know, significant widespread issues and even though 152 00:07:34,240 --> 00:07:36,560 Speaker 3: to people start and invest and things like that. So 153 00:07:37,200 --> 00:07:40,200 Speaker 3: when you look at Iran, where you look at a 154 00:07:40,320 --> 00:07:44,520 Speaker 3: terrorist organization, they don't have rules, right, and so it's 155 00:07:44,520 --> 00:07:48,880 Speaker 3: a very unrestricted warfare and we're really not playing on 156 00:07:48,880 --> 00:07:52,240 Speaker 3: the same level playing field. That's why you know, when 157 00:07:52,240 --> 00:07:54,360 Speaker 3: you look at why can navy fields do the things 158 00:07:54,440 --> 00:07:58,880 Speaker 3: navy fields do is because they operate differently than. 159 00:07:58,800 --> 00:08:01,200 Speaker 4: A larger you know a lot of larger army does. 160 00:08:01,360 --> 00:08:03,480 Speaker 3: Sure, Sure, and so the same thing here. They're they're 161 00:08:03,520 --> 00:08:06,920 Speaker 3: smaller groups, they're more targeted. They can get into into 162 00:08:07,120 --> 00:08:10,520 Speaker 3: into places that others can't. And and so when it 163 00:08:10,560 --> 00:08:13,400 Speaker 3: comes to what should we be worried about, I don't. 164 00:08:13,440 --> 00:08:15,800 Speaker 3: I wouldn't say be worried, but I would say be 165 00:08:15,880 --> 00:08:19,000 Speaker 3: prepared that you know, you could lose. They could take 166 00:08:19,000 --> 00:08:21,400 Speaker 3: out a water system for for two weeks, they could 167 00:08:21,480 --> 00:08:25,560 Speaker 3: take power down for four and and I would prepare 168 00:08:25,600 --> 00:08:29,560 Speaker 3: for this, not running to the stores and grabbing tons 169 00:08:29,600 --> 00:08:31,200 Speaker 3: of you all the bread off the shelves, but I 170 00:08:31,200 --> 00:08:35,760 Speaker 3: would over time as as just in your family, just 171 00:08:36,240 --> 00:08:38,440 Speaker 3: have some extra food that would last maybe a week 172 00:08:38,520 --> 00:08:42,360 Speaker 3: or two, has some extra water, because it's it's eminent 173 00:08:42,480 --> 00:08:45,440 Speaker 3: something's going to happen down the road that will take 174 00:08:45,440 --> 00:08:46,760 Speaker 3: out for services. 175 00:08:46,800 --> 00:08:48,199 Speaker 1: Here we we love in Cincinnati. 176 00:08:48,240 --> 00:08:50,640 Speaker 2: All they have to do is somehow is create the 177 00:08:50,640 --> 00:08:53,120 Speaker 2: illusion that we might get snowfall like a classic. 178 00:08:56,280 --> 00:08:58,240 Speaker 1: We'd be riding like hair is on fire. 179 00:08:58,320 --> 00:09:02,120 Speaker 2: He's the CEO of Cincinnati based vigil and cybersecurity Chris 180 00:09:02,120 --> 00:09:04,000 Speaker 2: and I Heights on the Scott Sloan Show seven hundred 181 00:09:04,000 --> 00:09:07,680 Speaker 2: WLW is Google and the government there at Google's top 182 00:09:07,720 --> 00:09:10,920 Speaker 2: cyber threat analyst said, Iran will absolutely respond with a 183 00:09:10,920 --> 00:09:13,800 Speaker 2: cyber attack. We talked about stuff they've done in the past. 184 00:09:13,840 --> 00:09:18,280 Speaker 2: You mentioned our infrastructure, Chris, I believe it was a 185 00:09:18,320 --> 00:09:20,240 Speaker 2: couple of years ago, three years ago maybe that Iran 186 00:09:20,280 --> 00:09:22,920 Speaker 2: and hackers got into water treatment plant computers in the US. 187 00:09:23,480 --> 00:09:25,320 Speaker 2: Could you take us back how that happened and what 188 00:09:25,360 --> 00:09:28,480 Speaker 2: does that tell us about how vulnerable our basic infrastructure is? 189 00:09:28,559 --> 00:09:31,160 Speaker 2: And are we better at protecting it now than we 190 00:09:31,200 --> 00:09:31,960 Speaker 2: were three years ago? 191 00:09:33,240 --> 00:09:35,480 Speaker 3: Actually, we're not better at protecting it now than we were. 192 00:09:35,920 --> 00:09:38,480 Speaker 3: We're actually worse than we were. I would you know, 193 00:09:38,520 --> 00:09:41,800 Speaker 3: I would say I was even that seven eight years 194 00:09:41,800 --> 00:09:44,800 Speaker 3: ago we were in a better position to protect than 195 00:09:44,840 --> 00:09:49,360 Speaker 3: we were than we are now. Right because a lot 196 00:09:49,360 --> 00:09:54,880 Speaker 3: of the cyber the cybersecurity industry has reduced effectiveness. Uh 197 00:09:54,960 --> 00:09:58,480 Speaker 3: and and and I would I would actually say because 198 00:09:58,520 --> 00:10:02,760 Speaker 3: of margin, right and so, and the other part of 199 00:10:02,800 --> 00:10:07,040 Speaker 3: it is that you know, is that companies have put 200 00:10:07,080 --> 00:10:10,040 Speaker 3: a lot of their things in the cloud, right, and 201 00:10:10,640 --> 00:10:14,320 Speaker 3: so because they've done that, they've removed a lot of 202 00:10:14,320 --> 00:10:20,679 Speaker 3: the security at their physical locations. 203 00:10:18,520 --> 00:10:20,040 Speaker 4: When we went to work from home. 204 00:10:20,640 --> 00:10:25,160 Speaker 3: In a lot of cases, now the attacks are more widespread, 205 00:10:25,480 --> 00:10:28,840 Speaker 3: so it's a lot harder to find. So are what 206 00:10:28,880 --> 00:10:31,080 Speaker 3: we would call in the industry an attack footprint. 207 00:10:31,880 --> 00:10:34,480 Speaker 4: It got way way big. Where it used to be. 208 00:10:34,520 --> 00:10:37,960 Speaker 3: Just at your office, now it's at everybody's home and 209 00:10:38,000 --> 00:10:40,840 Speaker 3: so it's a lot harder. Or it's in the cloud, 210 00:10:40,880 --> 00:10:42,880 Speaker 3: right so it's a lot harder to detect those things, 211 00:10:42,920 --> 00:10:45,680 Speaker 3: and a lot of organizations have made the decision to 212 00:10:45,760 --> 00:10:50,080 Speaker 3: remove the very security that could detect these things right now, 213 00:10:50,480 --> 00:10:53,640 Speaker 3: like even AI attacks, it's a lot easier to detect 214 00:10:53,640 --> 00:10:56,200 Speaker 3: AI attacks because we had a lot more data years ago, 215 00:10:56,720 --> 00:10:59,800 Speaker 3: but because companies have removed a lot of this security 216 00:11:00,120 --> 00:11:02,360 Speaker 3: local location because they said, hey, data is in the cloud, 217 00:11:02,880 --> 00:11:06,120 Speaker 3: well now it's up there. The other thing that's interesting 218 00:11:06,200 --> 00:11:10,200 Speaker 3: today is that now we have a lot of people 219 00:11:10,320 --> 00:11:16,360 Speaker 3: using the cloud as part of their everyday business operations. 220 00:11:16,600 --> 00:11:18,920 Speaker 3: And if you haven't noticed over the last which I'm 221 00:11:18,920 --> 00:11:21,959 Speaker 3: sure you have, or the last week, Claud has gone 222 00:11:21,960 --> 00:11:25,040 Speaker 3: out you know a few times, well, when you know 223 00:11:25,280 --> 00:11:28,040 Speaker 3: that Claud is being used by the US government to 224 00:11:28,080 --> 00:11:32,560 Speaker 3: do AI targeting and things like that. Now those technologies 225 00:11:32,960 --> 00:11:36,800 Speaker 3: become targets by the attackers, right, and so I look 226 00:11:36,920 --> 00:11:38,920 Speaker 3: look at where the missiles have been going for a rand. 227 00:11:39,040 --> 00:11:43,880 Speaker 3: They've been going to aws locations in Dubai, right, They've 228 00:11:43,880 --> 00:11:47,120 Speaker 3: been hitting radar systems. So if you build your entire 229 00:11:47,200 --> 00:11:51,280 Speaker 3: operations of your company around a specific technology, and that 230 00:11:51,400 --> 00:11:54,280 Speaker 3: technology is also used by the US government, it's going 231 00:11:54,360 --> 00:11:57,920 Speaker 3: to be attacked, right, and you're gonna have autes. No, 232 00:11:57,960 --> 00:11:59,200 Speaker 3: it makes sense, makes sense. 233 00:12:00,080 --> 00:12:04,679 Speaker 2: Experts are flag and energy, water, transpormission, banking, telecommunications as 234 00:12:04,679 --> 00:12:06,520 Speaker 2: you just did, as priority targets. If you had to 235 00:12:06,520 --> 00:12:08,839 Speaker 2: pick the single most vulnerable sector in the US right 236 00:12:08,880 --> 00:12:12,800 Speaker 2: now for a cyber attack from the Iranians or their proxies, 237 00:12:12,800 --> 00:12:13,280 Speaker 2: what it would be? 238 00:12:13,360 --> 00:12:13,880 Speaker 1: What would it be? 239 00:12:13,920 --> 00:12:14,199 Speaker 4: In one? 240 00:12:15,840 --> 00:12:18,319 Speaker 3: You know, I would uh, I would say, if I 241 00:12:18,679 --> 00:12:21,360 Speaker 3: were to be the attacker, I would go after water. 242 00:12:23,160 --> 00:12:25,480 Speaker 3: Electricity is one thing, but we're not in the winter 243 00:12:25,640 --> 00:12:29,360 Speaker 3: right now, and so you know, it's it's not like 244 00:12:29,400 --> 00:12:31,040 Speaker 3: it's going to take heat out. You know, no one's 245 00:12:31,040 --> 00:12:33,680 Speaker 3: gonna you know, uh, you know, freeze, freeze to death. 246 00:12:33,720 --> 00:12:36,120 Speaker 3: At this point, I would. 247 00:12:35,880 --> 00:12:36,440 Speaker 4: Go after water. 248 00:12:36,720 --> 00:12:39,560 Speaker 3: And so, and I would say both are electrical grid 249 00:12:39,640 --> 00:12:43,320 Speaker 3: and our water system are both you know at risk. 250 00:12:43,760 --> 00:12:45,800 Speaker 3: We we do know they were physical attacks. I mean 251 00:12:45,880 --> 00:12:48,120 Speaker 3: remember uh, you know, I think they attributed that back 252 00:12:48,360 --> 00:12:53,480 Speaker 3: to RAND when people were firing rifles at transformers out 253 00:12:53,960 --> 00:12:56,520 Speaker 3: you know. Now, I think water is the first thing 254 00:12:56,600 --> 00:12:59,560 Speaker 3: I think the I think water. I think electricity follows 255 00:12:59,559 --> 00:13:02,719 Speaker 3: water though, because if we're without electricity here in the 256 00:13:02,800 --> 00:13:06,000 Speaker 3: United States for you know, ninety days, we we have 257 00:13:06,040 --> 00:13:07,679 Speaker 3: a we're gonna have a really really bad problem. 258 00:13:07,840 --> 00:13:10,000 Speaker 2: Is that possible that they can shut down at least 259 00:13:10,040 --> 00:13:12,840 Speaker 2: you know, we have several grids here, but shut things 260 00:13:12,880 --> 00:13:16,280 Speaker 2: down and to make that big an impact, Oh for sure. 261 00:13:16,280 --> 00:13:17,840 Speaker 3: I mean if you look at if you look at 262 00:13:17,840 --> 00:13:20,880 Speaker 3: the electrical grid, I mean remember years ago, uh, that 263 00:13:21,040 --> 00:13:24,319 Speaker 3: circuar breaker pops in the northeast and it took out 264 00:13:24,520 --> 00:13:27,040 Speaker 3: you know. And I think, you know, somewhere like New Hampshire, 265 00:13:27,080 --> 00:13:31,080 Speaker 3: someone that pick out the right all the way to Canada. 266 00:13:31,120 --> 00:13:34,280 Speaker 3: So yes, I mean there are there are very if 267 00:13:34,280 --> 00:13:35,679 Speaker 3: you think about it, you know, a lot of a 268 00:13:35,679 --> 00:13:37,840 Speaker 3: lot of our grid is held together with you know, 269 00:13:38,080 --> 00:13:41,160 Speaker 3: the proverbial you know, surge protector with a bunch of 270 00:13:41,160 --> 00:13:43,760 Speaker 3: stuff plugged into it, and so you know, if you 271 00:13:43,920 --> 00:13:46,680 Speaker 3: take out one of those facilities, and yeah, it does 272 00:13:47,080 --> 00:13:49,240 Speaker 3: the other. The other risk to it too is that 273 00:13:49,800 --> 00:13:53,920 Speaker 3: a lot of actually almost all of our us you know, 274 00:13:54,040 --> 00:13:56,840 Speaker 3: big transformers that you see when you're driving around. Those 275 00:13:56,920 --> 00:13:59,040 Speaker 3: can't just be driven down the street. They have to 276 00:13:59,080 --> 00:14:02,440 Speaker 3: be flown in. And where they come from is China, 277 00:14:02,880 --> 00:14:05,680 Speaker 3: and China has like a two to three year you know, 278 00:14:05,760 --> 00:14:08,480 Speaker 3: backlog on this if they even decide they're going to 279 00:14:08,480 --> 00:14:11,839 Speaker 3: give us anymore. So you know, if those things get 280 00:14:11,840 --> 00:14:13,240 Speaker 3: taken out, it's not like you have two or three 281 00:14:13,240 --> 00:14:15,760 Speaker 3: of them. We have one, right you know, in certain areas, 282 00:14:15,800 --> 00:14:18,480 Speaker 3: So if that gets taken out, it could be a 283 00:14:18,520 --> 00:14:21,440 Speaker 3: significantly long time before this come back on. But I 284 00:14:21,480 --> 00:14:24,520 Speaker 3: would say from a cyber standpoint, I would say our 285 00:14:24,680 --> 00:14:27,320 Speaker 3: water is the most vulnerable, and we already know that. 286 00:14:27,360 --> 00:14:28,920 Speaker 3: You and I talked about that a few you know, 287 00:14:29,160 --> 00:14:30,880 Speaker 3: and I think what last month is about two hundred 288 00:14:30,880 --> 00:14:33,800 Speaker 3: and fifty of our water districts are known to have 289 00:14:34,760 --> 00:14:38,600 Speaker 3: attacks in it and right now and you know that 290 00:14:38,640 --> 00:14:41,400 Speaker 3: they can't get out. There's a big news article on that, 291 00:14:41,800 --> 00:14:43,800 Speaker 3: and you know, we just we have to. 292 00:14:43,800 --> 00:14:45,400 Speaker 1: Do so so when that's happens. 293 00:14:45,600 --> 00:14:49,000 Speaker 2: Not probably when Chris and I heis when a major 294 00:14:49,040 --> 00:14:51,200 Speaker 2: cyber attack hits critical in for church, let's say water 295 00:14:51,840 --> 00:14:54,640 Speaker 2: power good, whatever it is, What is the government's actual 296 00:14:54,680 --> 00:14:56,840 Speaker 2: response going to look like? And is it a credible 297 00:14:56,840 --> 00:15:00,400 Speaker 2: deterrent that makes around maybe think twice before paulling trigger. 298 00:15:02,600 --> 00:15:03,440 Speaker 4: That's that's the thing. 299 00:15:03,520 --> 00:15:06,120 Speaker 3: So one I think are there's an internal response, and 300 00:15:06,240 --> 00:15:08,240 Speaker 3: I think that's something FEMA keeps praty close because you 301 00:15:08,280 --> 00:15:10,560 Speaker 3: don't want to let you know your attackers know what 302 00:15:10,600 --> 00:15:11,680 Speaker 3: your responses are going to be. 303 00:15:11,720 --> 00:15:12,720 Speaker 4: And I think that's why. 304 00:15:14,040 --> 00:15:17,520 Speaker 3: I think, you know, as what the US is, you know, 305 00:15:18,040 --> 00:15:20,200 Speaker 3: you know, I would say, you know, kinetic or you know, 306 00:15:20,880 --> 00:15:24,280 Speaker 3: you know, direct attack action will be I think it 307 00:15:24,280 --> 00:15:27,480 Speaker 3: would be pretty swift. I mean, you know Donald Trump 308 00:15:27,720 --> 00:15:30,840 Speaker 3: is you know, he's he's big on making sure he 309 00:15:30,560 --> 00:15:31,960 Speaker 3: he fights back pretty hard. 310 00:15:32,360 --> 00:15:33,360 Speaker 4: You know, you can see that. 311 00:15:33,680 --> 00:15:34,480 Speaker 1: Our response will be good. 312 00:15:34,480 --> 00:15:36,480 Speaker 2: I just wonder how prepared right to get everything back 313 00:15:36,560 --> 00:15:37,880 Speaker 2: online here Stateside? 314 00:15:37,920 --> 00:15:38,080 Speaker 4: Really? 315 00:15:38,560 --> 00:15:40,040 Speaker 1: What what the operation looks like? 316 00:15:40,680 --> 00:15:40,880 Speaker 4: Yeah? 317 00:15:40,920 --> 00:15:43,280 Speaker 3: See, I think that's I think a good way to 318 00:15:43,320 --> 00:15:46,440 Speaker 3: look at that is, well, what happens when uh, you know, 319 00:15:46,600 --> 00:15:49,320 Speaker 3: snowstorm hits right, and I take down tons of things. 320 00:15:49,600 --> 00:15:52,880 Speaker 3: You can see what that response looks like. Think about 321 00:15:52,920 --> 00:15:56,760 Speaker 3: that response, but you know which is pretty good, right. 322 00:15:57,160 --> 00:15:59,960 Speaker 3: But those responses are because you know, if it's something 323 00:16:00,040 --> 00:16:02,040 Speaker 3: happens in Florida, they're bringing all the trucks from all 324 00:16:02,040 --> 00:16:04,840 Speaker 3: over the United States down to Florida. I don't think 325 00:16:04,920 --> 00:16:09,120 Speaker 3: we have the enough trucks and people to go fix 326 00:16:09,200 --> 00:16:11,600 Speaker 3: all of these things. And that's where I would say this. 327 00:16:12,040 --> 00:16:14,120 Speaker 3: If there's anything I would tell people in the United 328 00:16:14,160 --> 00:16:17,080 Speaker 3: States is you know, you said, how are we better 329 00:16:17,120 --> 00:16:20,640 Speaker 3: prepared now than we were before? You know, there's a 330 00:16:20,680 --> 00:16:22,960 Speaker 3: technological aspect of that, and then there's. 331 00:16:22,800 --> 00:16:23,920 Speaker 4: A people part of that. 332 00:16:24,440 --> 00:16:26,760 Speaker 3: And I would say it is something like this happened 333 00:16:26,760 --> 00:16:30,280 Speaker 3: in the fifties for the sixties. I think people were 334 00:16:30,280 --> 00:16:32,800 Speaker 3: a lot more self sufficient and they knew how to 335 00:16:32,840 --> 00:16:35,640 Speaker 3: take care of themselves, right, I think, and I'm not 336 00:16:35,680 --> 00:16:37,680 Speaker 3: saying that we don't as an as a society know 337 00:16:37,760 --> 00:16:39,280 Speaker 3: how to take care of ourselves. But we don't have 338 00:16:39,360 --> 00:16:41,800 Speaker 3: to do that in our everyday lives. You know, we 339 00:16:41,840 --> 00:16:43,560 Speaker 3: don't have to think about power, we don't have to 340 00:16:43,600 --> 00:16:44,360 Speaker 3: think about water. 341 00:16:44,720 --> 00:16:45,960 Speaker 4: I'll tell you this this story. 342 00:16:46,320 --> 00:16:49,520 Speaker 3: I was just reading this on Twitter this guy that 343 00:16:50,800 --> 00:16:52,920 Speaker 3: he posted this up and he said he had been 344 00:16:53,000 --> 00:16:56,880 Speaker 3: driving by this water main break for like four weeks 345 00:16:57,480 --> 00:16:59,680 Speaker 3: and like, I mean, water is showing the street. And 346 00:16:59,760 --> 00:17:02,480 Speaker 3: so he calls water department and he goes, hey, do 347 00:17:02,520 --> 00:17:05,359 Speaker 3: you guys know about this wire may break? And they 348 00:17:05,400 --> 00:17:09,960 Speaker 3: said no, we don't, and uh, and so what had happened? 349 00:17:10,520 --> 00:17:12,440 Speaker 3: You know, he thought about it later and he thought, 350 00:17:12,960 --> 00:17:16,280 Speaker 3: I bet all of these people, thousands of people drive 351 00:17:16,320 --> 00:17:19,399 Speaker 3: by us every day, including him for four weeks, just 352 00:17:19,440 --> 00:17:23,000 Speaker 3: thought somebody else was going to call. And and that's 353 00:17:23,040 --> 00:17:26,240 Speaker 3: where for us as Americans, you know, you know, one 354 00:17:26,240 --> 00:17:28,200 Speaker 3: thing that's always been a strength of ours is we 355 00:17:28,320 --> 00:17:32,400 Speaker 3: come together. And so if something were to happen, which 356 00:17:32,680 --> 00:17:35,320 Speaker 3: I believe it will eventually, whether it's small or big, 357 00:17:36,600 --> 00:17:39,199 Speaker 3: don't rely on the guys in the trucks to just 358 00:17:39,240 --> 00:17:42,440 Speaker 3: go fix things, right Like, we gotta we gotta start 359 00:17:42,480 --> 00:17:45,720 Speaker 3: getting back to where we we go help each other 360 00:17:46,000 --> 00:17:49,840 Speaker 3: and we we really come together as Americans and we 361 00:17:49,920 --> 00:17:53,480 Speaker 3: bring these things back online in whatever way we can together. 362 00:17:53,680 --> 00:17:56,239 Speaker 2: It sounds like Chris that that back in post nine 363 00:17:56,280 --> 00:17:59,320 Speaker 2: to eleven. If you see something, say something, we've we've 364 00:17:59,320 --> 00:18:02,679 Speaker 2: got to rebrand that imaging for today makes a lot 365 00:18:02,720 --> 00:18:03,080 Speaker 2: of sense. 366 00:18:03,600 --> 00:18:03,840 Speaker 4: Chris. 367 00:18:03,880 --> 00:18:07,360 Speaker 2: I Heist the CEO of Vigilant Cybersecurity here in Cincinnati. 368 00:18:07,840 --> 00:18:10,119 Speaker 2: You've been warned about what Iran is most likely to do. 369 00:18:10,240 --> 00:18:13,800 Speaker 2: Seem more cyber than it is physical terrorism hitting America's 370 00:18:13,800 --> 00:18:15,480 Speaker 2: homeland here, Chris, all the best. Thanks for jumping on 371 00:18:15,520 --> 00:18:16,400 Speaker 2: this morning. I appreciate it. 372 00:18:16,480 --> 00:18:17,800 Speaker 4: Thanks good Damen, take care. 373 00:18:17,840 --> 00:18:19,960 Speaker 2: We got to get a news update in and quickly 374 00:18:20,000 --> 00:18:22,200 Speaker 2: more to follow her. We got that's going to rain 375 00:18:22,240 --> 00:18:25,399 Speaker 2: for the next thirty years. Did I just blow the forecast? 376 00:18:25,440 --> 00:18:25,959 Speaker 2: I thought I did. 377 00:18:25,960 --> 00:18:27,639 Speaker 1: Anyway, I'll find up. I'm right here in seconds on 378 00:18:27,680 --> 00:18:28,760 Speaker 1: seven under WLW. 379 00:18:28,960 --> 00:18:32,400 Speaker 2: Mel's Auto Glass is a clear choice for your autoglass repair, replacement, 380 00:18:32,480 --> 00:18:36,760 Speaker 2: and recalibration needs. Call Mels first at five one, three, five, six, three, 381 00:18:36,800 --> 00:18:38,040 Speaker 2: seventy seven, seventy one