Episode: 055
Title: The Military Cyber Professionals Association of San Antonio
Aired: October 14, 2017
Featured Segments: The Military Cyber Professionals Association of San Antonio
Synopsis:
Bret Piatt, CTR host, Shaun Herron, and Charles Hackett discuss the Military Cyber Professionals Association of San Antonio and talk about the work they are doing promoting cyber security education.
Follow Us & Stay Informed:
Bret Piatt (left), Shaun Herron (center), Charles Hackett (right)
Tweet us: @cybertalkradio, @bpiatt / Stream on iHeartRadio: Android or iOS
Transcript:
00:00:01 [Music] 00:00:07 from the dark web to your radio guy you 00:00:11 were listening to cyber talk radio on 00:00:12 news 1,200 00:00:14 WOA 00:00:17 [Music] 00:00:27 welcome to cyber talk radio I'm your 00:00:31 host Brett hi a 20 year internet 00:00:33 security veteran joined this week by a 00:00:36 couple of our wonderful military 00:00:39 personnel here stationed in San Antonio 00:00:42 we're here this week to talk about 00:00:46 military cyber professionals Association 00:00:48 of San Antonio and what this nonprofit 00:00:51 organization is up to so Shawn and 00:00:55 Charles thank you for agreeing to join 00:00:57 us this week and come here on the air to 00:00:59 talk about what MCP a is gonna do for 00:01:02 the city of San Antonio's this chapter 00:01:04 gets up and going here thanks Thank You 00:01:07 Brad so Shawn can you go and give a 00:01:09 little bit of your background how did 00:01:10 you get involved in the Air Force and 00:01:13 then why join in and start working in 00:01:18 your free time on the military side 00:01:20 professionals Association well I was 00:01:23 approached hey do you want to be 00:01:24 treasurer of the military cyber 00:01:26 professional association and I didn't 00:01:29 know much about it and it got explained 00:01:30 to me and we sat down at the line in the 00:01:33 Rose pub down here in downtown San 00:01:36 Antonio with a couple of guys from Ernst 00:01:40 & Young and they were the president and 00:01:42 vice president and they were like hey we 00:01:44 need a treasurer do you want to do this 00:01:45 and I was like sure so I came on board 00:01:47 as the treasurer did some work with them 00:01:50 we decided to reinvent ourselves a 00:01:52 little bit and then ultimately I rolled 00:01:54 into being the president of the mCP a 00:01:57 wonderful Anna how about you Charles so 00:02:01 I actually found em CPA when I was 00:02:03 stationed in Germany I used to be a 00:02:05 medic and kind of got tired of that 00:02:08 wanted something bigger and better so I 00:02:11 applied to cross train into this new 00:02:14 cyber career field the Air Force was 00:02:15 standing up and didn't really know what 00:02:18 I was getting into so I found a guy who 00:02:20 was in the career field already to 00:02:21 shadow while I was shadowing him he was 00:02:23 like hey check this thing out apply 00:02:25 online they can help you out you know 00:02:27 get you where you need to be so that's 00:02:29 why I got into it and then when I pcs to 00:02:31 Lackland Air Force Base 00:02:33 I met a Sean and he leaned over to me 00:02:36 and was like hey do you know what do you 00:02:38 know about em CPA have you ever 00:02:40 heard of them I was like actually I have 00:02:42 and then from that point on I was part 00:02:45 of the MC PA here excellent yeah so if 00:02:49 you're out there and you're listening 00:02:50 and you're thinking well maybe I want to 00:02:51 be part of this airforce cyber stuff and 00:02:54 you're not in the airforce today we had 00:02:56 a tech sergeant Ayami Baker on who's the 00:02:58 airforce cyber recruiter you can listen 00:03:01 to that on our website at wwlp.com as 00:03:05 well as on iTunes podcasts or pocket 00:03:08 caster pretty much any podcast service 00:03:10 that you try to look us up on out there 00:03:12 you can learn all about how the Air 00:03:14 Force if you go through and apply 00:03:16 they'll send you to training on all of 00:03:19 this so you don't even need to have 00:03:21 cyber skills you can just decide you 00:03:23 want to serve your country and you want 00:03:26 to be out there in cyber and if you go 00:03:29 through get accepted they'll send you 00:03:31 through to training and potentially even 00:03:33 straight into the reserves if you'd like 00:03:36 you don't even necessarily have to go 00:03:38 straight active-duty beyond just that 00:03:40 initial boot camp and the training 00:03:43 cycles so you can learn more listen into 00:03:45 tech sergeant Baker talk all about that 00:03:48 and learn about the over 1,500 openings 00:03:51 is cyber security is hot inside the 00:03:55 military it's a hot out there in the 00:03:56 private sector there's hundreds of 00:03:58 thousands to potentially millions of 00:04:00 openings and I'm talking about this 00:04:03 right now to lead into a little bit of 00:04:05 some of the stuff that MC PA has been 00:04:07 working on here in San Antonio over the 00:04:09 last month or so here leading up to them 00:04:13 joining us on the air today they've been 00:04:14 working on a camp for thirteen to 00:04:17 seventeen year old kids can you guys one 00:04:20 of you who's working on that one and 00:04:22 share a little bit more about what that 00:04:24 camps going on and how folks can look up 00:04:27 and learn more about it well if you go 00:04:30 to the mCP a website Mill cyborgs and 00:04:34 you look at the vision it says 00:04:35 professional networking and stem and as 00:04:37 the San Antonio chapter Charles and I 00:04:40 looked at each other and we said how are 00:04:42 we going to promote stem in San Antonio 00:04:45 so immediately we picked up a program 00:04:48 called coderdojo 00:04:49 and that was a great success get 00:04:51 instructors to teach can 00:04:53 you're coding whatever language they're 00:04:55 proficient in we get them to pick it up 00:04:57 get him a curriculum and start teaching 00:04:59 kids as it started getting bigger we 00:05:02 decided hey let's throw some more some 00:05:04 more topics in here 00:05:06 maybe do cybersecurity maybe do computer 00:05:10 networking maybe do robotics so we had 00:05:13 the coding and the robotics and the kids 00:05:17 like the robotics a lot too we literally 00:05:19 had them making remote-control cars that 00:05:20 had sensors on them and as they drove up 00:05:22 to the wall they would stop reverse and 00:05:24 turn around while using C+ coding to 00:05:28 interface and send commands to Arduino 00:05:30 boards so they could control those cars 00:05:32 and that was a big hey those kids liked 00:05:33 it a lot and then we started the 00:05:36 cybersecurity stuff and we called it 00:05:38 Ghost wire so we thought it was a cool 00:05:41 name just thought kids would think it 00:05:43 was awesome yeah and they step one is 00:05:45 name it a something cool so kids get 00:05:47 excited about it yep and so we started 00:05:52 the ghost wire and it's a hit - they 00:05:55 like coming down here in about malware 00:05:57 and behavioral characteristics of 00:05:59 malware and you know how to fix 00:06:01 grandma's computer I think one of the 00:06:03 favorite things the kids seem to like is 00:06:06 a social engineering we go through 00:06:08 exercises with them on that and they 00:06:10 they get to play both sides of it so 00:06:12 that's always fun for them yeah it's 00:06:15 good things for kids to get trained on 00:06:17 is the ones that are not getting that 00:06:20 cyber security awareness training 00:06:21 through a program like ghost wire elfs 00:06:24 are often ones that are out there on the 00:06:26 Internet they get taken advantage of 00:06:27 they get tricked or duped by these sites 00:06:29 you'll get a pop-up ad that says your 00:06:31 computers infected click here to save 00:06:32 yourself that's really a technical 00:06:35 version of social engineering you're not 00:06:36 talking to somebody on the phone but 00:06:38 you're in the computers not infected 00:06:39 until you do click on the pop-up and 00:06:41 then you've actually caused yourself a 00:06:43 problem where you thought you were 00:06:44 fixing it and it's designed for those 00:06:46 kind of 7 to 10 year old kids that can 00:06:49 read but don't yet have that social 00:06:51 engineering and security awareness 00:06:53 training to know that's actually a 00:06:55 hacker out there after you yeah and you 00:06:58 see that a lot too with these kids 00:06:59 clicking on things because they don't 00:07:01 you know they don't have the awareness 00:07:02 to realize what's going on so if there 00:07:05 watching videogame YouTube ads or some 00:07:07 of that nature they'll just click all 00:07:09 over everything if you can teach kids 00:07:12 not to do those things then you know 00:07:16 obviously yeah we make these things much 00:07:19 safer 00:07:20 so the yes social engineering aspect fun 00:07:22 I saw and some of the curriculum looks 00:07:23 like you guys get them Wireshark and 00:07:26 show them how to set that stuff up as 00:07:27 well oh yeah yeah yeah for our listeners 00:07:30 out there that don't know what Wireshark 00:07:32 I got some excited smiling nods in here 00:07:33 cuz you can have a good amount of fun 00:07:35 with that especially the kids again this 00:07:37 it lets them go and do some pretty cool 00:07:42 things on network so you share a little 00:07:43 bit about Wireshark and why that's fun 00:07:45 for the kids so basically what Wireshark 00:07:49 is is it allows you to see all the 00:07:50 traffic going on the network although 00:07:53 all the packets of data so you can pick 00:07:55 all those data packets apart and see 00:07:58 what they are see what's in them a lot 00:07:59 of stuff that goes across the internet 00:08:01 is what we call it in clear-text 00:08:03 so any Joe Schmo who has a packet 00:08:06 sniffer like Wireshark can read it and 00:08:07 so what we do exercises with kids will 00:08:10 throw passwords and stuff in clear text 00:08:12 and tell them hey you know go to this 00:08:14 website and as they're going to the 00:08:17 website we have other kids set up with 00:08:19 traffic sniffers on their laptops so 00:08:21 they're sniffing each other's traffic 00:08:23 then it's like okay you know we created 00:08:24 a username and login for you go ahead 00:08:26 and login and they they do that and they 00:08:28 see it and it's it's real cool for them 00:08:29 and you know they're excited because 00:08:31 they feel like you know they're doing 00:08:33 hacker stuff but in reality they're also 00:08:35 getting the experience where they're 00:08:36 seeing hey you know if I'm out on it 00:08:39 Starbucks you know anybody could steal 00:08:42 my password yeah I mean that's a good 00:08:45 one to talk to folks about it's why you 00:08:47 should always use the secure websites 00:08:50 it's that little S at the end of the 00:08:52 HTTP there in your web browser some of 00:08:55 them make the bar green some of them put 00:08:57 a little padlock up there but you should 00:08:59 be going to websites these days 00:09:00 everything should be HTTPS is not only 00:09:04 can those hackers use something like 00:09:05 Wireshark to sniff your traffic but 00:09:08 there's other tools called packet 00:09:09 injectors too where if you go to one 00:09:11 HTTP website somebody in the network can 00:09:15 potentially rewrite that session for you 00:09:17 and inject traffic that 00:09:18 didn't come from really the website it 00:09:19 might have come from that hackers 00:09:20 computer sitting on the Wi-Fi network 00:09:22 there with you yeah we like to take the 00:09:25 approach that we're not really teaching 00:09:27 kids how to sniff traffic in the public 00:09:31 libraries to get credentials and use 00:09:34 them we kind of showcase to teach about 00:09:37 password complexity how to make a super 00:09:40 simple password that could easily be 00:09:42 cracked that you need to put special 00:09:43 characters and stuff and follow those 00:09:45 policies and and that's really important 00:09:47 because they see that and then they 00:09:48 start to realize that hey maybe I 00:09:50 shouldn't make my password Kassie which 00:09:53 is the name of their dog or something 00:09:54 like that 00:09:55 yeah we had some problems too like 00:09:57 trying to showcase these examples 00:09:58 because a lot of sites are out there are 00:10:00 now HTTPS I really had to hunt around 00:10:02 and find one where we could find a field 00:10:04 where we could generate a user name and 00:10:06 password that wasn't HTTPS which is 00:10:08 really fantastic it's water but it was 00:10:10 difficult for the example we were trying 00:10:13 to show yeah yeah no that's good and yes 00:10:16 if you're a developer out there 00:10:17 and you have any forms or fields on your 00:10:19 website you're taking any user-generated 00:10:22 content input please HTTP but I mean 00:10:26 really even if you're just serving up 00:10:28 static content on the site HTTPS like 00:10:31 you'll go to cyber talk radio could we 00:10:33 serve that main page that just has the 00:10:36 information about the show on it without 00:10:38 HTTPS sure but we're using let's encrypt 00:10:42 which is a free SSL certificate service 00:10:45 so go you know let's encrypt org so 00:10:48 there's not even a it's too expensive to 00:10:50 make my web site secure these days it's 00:10:51 free literally doesn't cost you anything 00:10:54 more than a little bit of time at let's 00:10:55 encrypt org to secure that traffic out 00:10:58 there and keep the website safe with the 00:10:59 the program you've got going with the 00:11:02 the kids you mentioned the library so 00:11:05 you're running this at the san antonio 00:11:07 public library 00:11:08 oh yeah that's correct yeah historically 00:11:10 we go around and get any library that'll 00:11:13 let us sit in there and teach usually 00:11:16 there's not much resistance but where we 00:11:17 do get resistance is for the voting 00:11:19 polls and stuff like that so sometimes 00:11:20 we get kicked out of the way because you 00:11:22 know it's first-come first-serve so and 00:11:24 that's fair but um a lot of the 00:11:26 libraries here see us as a priority and 00:11:29 a need and not just to want because 00:11:31 we're providing a public service that's 00:11:33 important and I know that people realize 00:11:36 that we're doing this for a reason not 00:11:39 just to be good Samaritans or or some of 00:11:42 that nature ya know this is one of the 00:11:45 things I think that makes San Antonio 00:11:46 kind of truly a special places that 00:11:48 there are chapters of the mCP a and kids 00:11:52 have the opportunity to go learn 00:11:53 cybersecurity here through this or 00:11:56 through a number of different programs 00:11:58 we have almost as many CyberPatriot 00:12:01 teams even as a lot the city of Los 00:12:03 Angeles they're number one and there may 00:12:06 be three or four times the size of San 00:12:08 Antonio so kids get a lot of opportunity 00:12:12 here to learn cybersecurity and and with 00:12:14 programs like this maybe if they aren't 00:12:16 on a CyberPatriot team now they can go 00:12:19 there they can learn some things and get 00:12:21 to where they are able to join one 00:12:23 following season 00:12:24 yeah we try to make this more we do make 00:12:27 it 100 percent free for anybody who 00:12:29 wants to sign up if the kid has some 00:12:32 ambition to want to learn about 00:12:33 computers or cybersecurity or coding or 00:12:36 robotics we really try to nurture that 00:12:38 and grow that out and individual because 00:12:41 you know it's they're gonna be the ones 00:12:43 defending our networks in the future so 00:12:45 if you start them while they're young 00:12:46 and build them up there'll be better 00:12:48 cyber defenders in the coming years yeah 00:12:51 the other thing that I've recently 00:12:54 learned there Sharon what we teach them 00:12:56 of with their parents I met one of the 00:12:58 parents in one of the previous classes 00:12:59 and the mom was like oh yeah you know I 00:13:03 was on the computer you know I went to 00:13:05 do this thing and you know my son come 00:13:07 up and stopped me and that's why I think 00:13:09 that's another another big benefit of it 00:13:11 you're listening to cyber talk radio on 00:13:14 1200 W AI 00:13:16 we're talking about the military sniper 00:13:18 professional association if you missed 00:13:20 the start of the program and just turned 00:13:22 on your radio right now you can listen 00:13:24 to a rebroadcast or replay of this on 00:13:26 Tuesday it'll be up online on our 00:13:28 website at WWF or talk radio comm you 00:13:32 can also like us on Facebook or follow 00:13:34 us on Twitter and see when information 00:13:38 about programs gets posted or events 00:13:40 that we're having around the San Antonio 00:13:42 area we may even plan on taking 00:13:44 a trip up and meeting with some guests 00:13:47 in the Austin area soon so if you are 00:13:49 are from Austin and interested being on 00:13:51 the program you can go on our website 00:13:54 and let us know that you'd like to be a 00:13:56 guest of the show so Charles we were 00:14:01 talking military cyber professional 00:14:04 association for those that just joined 00:14:07 us here now in the radio can you give us 00:14:08 a little background on what's the the 00:14:12 number one thing from a mission for MC 00:14:15 PA the goal of the organization so the 00:14:18 organization's goal is a mentorship and 00:14:21 development of our nation's military 00:14:23 cyber forces and then also stem outreach 00:14:26 and so we fulfill that we do like 00:14:30 quarterly talks will invite a guest 00:14:32 speaker from the community usually we've 00:14:34 had guys from Symantec cyber guys from 00:14:37 USAA industry leaders I've had them come 00:14:40 out and talk to our military guys and 00:14:42 then we also have our STEM program so we 00:14:44 do our outreach into the community yeah 00:14:46 and so there's a San Antonio chapter of 00:14:49 this but this is a nationwide 00:14:50 organization or global yeah that's 00:14:53 correct 00:14:53 yeah so going back for the the history 00:14:56 of the organization when did it get 00:14:59 started and what was the the genesis of 00:15:01 that beginning so I think it all started 00:15:05 back in about 2010 2011 with Joe 00:15:08 Billingsley and my takeaway from it was 00:15:11 that hey you know there's a national 00:15:12 association for submarines there's a 00:15:15 National Association for radio there's a 00:15:18 National Association for this and that 00:15:19 and Joe Billingsley took his vision and 00:15:21 said I want to make a National 00:15:23 Association for military cyber 00:15:25 professionals and that's how that gets 00:15:27 started out so yeah this becomes one of 00:15:30 the growing career fields in our 00:15:32 military it makes sense for you to be 00:15:36 able to stay together and then as an 00:15:38 organized group be able to give back to 00:15:41 the cities that you're stationed in 00:15:43 absolutely and we're starting to work on 00:15:46 a new project because we're really 00:15:48 trying to hone in this professional 00:15:49 development because it's great to have 00:15:51 public speakers and everybody come and 00:15:53 hear what they have to say because they 00:15:54 say some amazing things 00:15:56 we that we've noticed that people really 00:15:58 like the tech talks to people come down 00:16:00 they want to hear nerdy things they want 00:16:02 to hear technical details about malware 00:16:05 or the recent hacker or whatever's going 00:16:08 on in the industry at the time but what 00:16:10 we want to do is make a new program an 00:16:13 offensive cyber range where we're gonna 00:16:15 bring people together to come in that 00:16:17 are MC PA members and we're 00:16:19 collaboratively to solve problems so for 00:16:22 example you know if you if your 00:16:25 background is clearly just you know 00:16:27 cyber defense but you've always wanted 00:16:29 to do offense we can come down and 00:16:32 create that environment and we can test 00:16:34 offensive skills just for fun and and 00:16:37 that's a really fantastic professional 00:16:39 networking opportunity because as we 00:16:42 invite people that come down you know 00:16:44 hey I'm working on this hack with this 00:16:48 person from route 9b hey I'm working on 00:16:50 this hack with this person from USA and 00:16:52 I'm working on this hack from somebody 00:16:53 else and in another business as they 00:16:57 work together you know that's that's a 00:16:58 personal resume so when that person 00:17:00 wants to transition out of the military 00:17:01 you know people are gonna say hey I know 00:17:04 that guy because we worked on an RSA 00:17:06 encryption problem or we worked on this 00:17:10 and we worked on that so that idea is to 00:17:12 bring people together to work together 00:17:14 on these problems and and and that'll 00:17:16 make the professional network happen 00:17:18 because I think that's a lot more 00:17:19 important than just having a resume that 00:17:22 face-to-face interaction and that 00:17:24 handshake and working together on 00:17:25 problems like that it's feels like a 00:17:28 no-brainer to me yeah and as you're 00:17:30 talking there one of the things we've 00:17:33 had some conversations with others in 00:17:36 the program about is there's 00:17:37 transitioning out of the military is 00:17:38 tricky for some folks because for a 00:17:42 couple of different reasons you do a 00:17:43 bunch of internal certifications where 00:17:46 you get training and but they're not 00:17:48 recognized industry certifications 00:17:50 necessarily and then the second is 00:17:52 there's a lot of blank spots on y'all's 00:17:54 resume right yeah yeah like a little bit 00:17:58 I was stationed in San Antonio and I 00:18:00 worked with computers you're like well 00:18:01 what else did you do with these 00:18:02 computers so I sat with the keyboard and 00:18:03 I typed on things so right yeah with 00:18:05 with that piece it makes it tricky for 00:18:07 folks to even go through and get an 00:18:09 interview but 00:18:09 because their resume gets sent in and 00:18:11 the robots 00:18:13 I call them robots but they're really 00:18:15 just poor keyword search machines don't 00:18:17 match up and and flag anything so that 00:18:20 you even get a call back to find out hey 00:18:21 wow these people really do know their 00:18:23 stuff and they've been working on this 00:18:24 for years and they are experts so right 00:18:27 you know for transitioning members that 00:18:29 are having a hard time realizing what 00:18:32 their capability is if you go to the 00:18:34 mill cyber org website Adam Tyra made a 00:18:37 post about what to say in your resume a 00:18:41 lot of military members put hey you know 00:18:43 I deployed here a lot of military 00:18:45 buzzwords and as they go to put their 00:18:47 resume forward it doesn't translate in 00:18:49 the business industry yeah so he laid 00:18:52 out a good way for somebody like you or 00:18:54 me or Charles to make that connection 00:18:57 and tailor the resume more towards being 00:19:00 in the private sector not having to get 00:19:03 dressed in the uniform every morning 00:19:04 correct yes yep that sector so if I was 00:19:08 at I'm a military cyber professional 00:19:10 either active duty now or in the 00:19:13 reserves or I've discharged or retired 00:19:17 how do I get involved in mCP a it so I 00:19:20 on the mill cyborg website you can just 00:19:23 go on apply and then they'll have a spot 00:19:26 where you can submit your dd-214 to them 00:19:28 if you're not military not a vet and not 00:19:32 a government employee and you want to 00:19:33 still be involved they do charge a 00:19:35 membership fee but for government 00:19:37 employees military members vets it's 00:19:39 free that's excellent 00:19:41 so then in the San Antonio chapter here 00:19:45 you said the organization started back 00:19:47 in 2010-2011 overall when did the San 00:19:50 Antonio chapter stand up I would say the 00:19:52 San Antonio chapter started up in 2014 00:19:55 and then we just at first we came 00:19:57 together and it was just a lot of meet 00:19:59 and greets and then we decided hey we 00:20:01 got a push forward we can anyone give 00:20:03 something new to San Antonio and that's 00:20:05 how we let into all these programs yeah 00:20:07 so we talked a little bit earlier in the 00:20:10 program about the boot camp you guys 00:20:12 have going on for kids right now the 00:20:14 Ghost Recon no it's not Ghost Recon 00:20:16 ghost wire ghost wire there's three 00:20:18 kinds of game the kids play right 00:20:19 correct yes okay 00:20:21 and so the the ghost wire the boot camp 00:20:24 for kids what uh are some other programs 00:20:28 for that you've done out there in the 00:20:31 STEM education you said that there's 00:20:32 been things going back through the years 00:20:34 before this ghost wire stuff happening 00:20:36 now right so we uh we also have 00:20:38 coderdojo 00:20:39 that was our first program that we 00:20:41 picked up which we just pair programmers 00:20:45 people that know how to code up with 00:20:47 kids we provide them a curriculum in 00:20:51 whatever language they know and then 00:20:54 they they teach the kids so Big Brothers 00:20:57 Big Sisters but instead of kind of how 00:20:59 to get through school and make a day the 00:21:01 you are learning not just life skills 00:21:04 you're learning coding skills here 00:21:05 absolutely absolutely and not just 00:21:08 coding skills but also with a 00:21:09 concentration on cybersecurity so we'll 00:21:12 stop and tell them hey look you have to 00:21:13 pay attention to your code because if 00:21:15 you write code with vulnerabilities then 00:21:17 you're working for a power plant 00:21:19 somebody could potentially use your code 00:21:21 to exploit that software and bring down 00:21:23 that power plant so we tie that info 00:21:24 yeah 00:21:25 and he's not joking when he says power 00:21:28 plants can go offline there's a one in 00:21:30 the Ukraine earlier this year they went 00:21:33 down about two hundred fifty thousand 00:21:34 folks were out of power for four hours 00:21:36 maybe eight hours a little bit rough the 00:21:40 data coming back out of that one if you 00:21:41 did want to hear more about those 00:21:43 industrial control systems and hacking 00:21:44 on that you can listen to the replay a 00:21:47 rebroadcast of cyber talk radio on our 00:21:50 website on youtube or on itunes podcast 00:21:53 and pocket casts look up industrial 00:21:56 control systems or ICS security and 00:21:59 we've got an episode there where we went 00:22:01 into some in-depth detail that's one 00:22:04 where you listen to that and then think 00:22:07 man yeah it's important that we're gonna 00:22:08 teach these kids to grow up and be safe 00:22:11 and secure coders because and we're 00:22:14 seeing a little bit of what this looks 00:22:16 like now with the natural disasters from 00:22:18 the Hurricanes where like Puerto Rico 00:22:20 may not have power for seven months and 00:22:22 you now have an uninhabitable island or 00:22:25 big section of the island which is kind 00:22:27 of terrible that like this can happen to 00:22:29 be a natural disaster potentially if you 00:22:31 take electricity plant offline this can 00:22:34 happen 00:22:34 the cyberattack and a hack as well and 00:22:37 electricity's gone for a while then the 00:22:40 water plant can't operate and if you 00:22:41 don't have electricity and you don't 00:22:43 have water it gets to be very difficult 00:22:45 to have a city and to have order so 00:22:48 keeping these industrial control systems 00:22:50 safe is important then there's lots of 00:22:53 good people there working on security 00:22:54 but as the drawback and this whole thing 00:22:58 it only takes one whole to get in and it 00:23:01 takes the defenders have to block every 00:23:03 single one of them so I like that you 00:23:07 brought that up that's for me personally 00:23:10 that's why this is so important I refer 00:23:13 to it as cyber 911 so I'd rather see 00:23:15 America ready for cyber 911 before it 00:23:18 happens as opposed to behave with a 00:23:20 massive attack that takes out our 00:23:22 infrastructure and be caught with our 00:23:24 pants down so we're getting ready to 00:23:26 take a break here at the bottom of the 00:23:28 hour for news traffic and weather if 00:23:30 you've just joined in you're listening 00:23:32 to cyber talk radio and 1200 W AI I'm 00:23:35 your host Bret Pyatt I'm joined by Sean 00:23:38 and Charles a two of our Air Force cyber 00:23:41 professionals here in San Antonio and a 00:23:43 members of the military sniper 00:23:45 professionals association here in San 00:23:47 Antonio helping military professionals 00:23:49 work together and help kids learn 00:23:52 cybersecurity and other STEM education 00:23:55 robotics and computer programming or to 00:23:59 help those military professionals 00:24:00 transition to the private sector after 00:24:04 they end their active duty with the 00:24:07 military so some great programs we're 00:24:10 going to go into some more detail about 00:24:12 this one we will see about how you get a 00:24:14 black belt and ghost wire how that 00:24:16 program is evolving this with kids and 00:24:18 education you got to make it fun you got 00:24:19 to set some goals you got to make it 00:24:21 entertaining and interesting for them 00:24:22 and then all of a sudden you will see 00:24:23 they can learn more than you ever 00:24:25 imagined so hang with us here through 00:24:28 news traffic and weather update at the 00:24:29 bottom of the hour and we will be right 00:24:31 back on cyber talk radio 00:24:36 [Music] 00:24:43 [Music] 00:25:15 welcome back to cyber talk radio 00:25:18 I'm your host Brett Pyatt a 20-year 00:25:20 internet security veteran if you're just 00:25:22 joining us after the news traffic and 00:25:24 weather update here at the bottom of the 00:25:25 hour I'm joined this week by Sean and 00:25:27 Charles two members of the US Air Force 00:25:30 that are also members of the military 00:25:32 cyber professionals Association of San 00:25:34 Antonio it's a nonprofit organization 00:25:37 here that helps military cyber members 00:25:40 network learn how to translate their 00:25:42 skills to the private sector work and 00:25:46 collaborate with private sector 00:25:47 companies in their areas on cyber 00:25:50 projects they also do a whole bunch 00:25:52 around STEM education to help us get 00:25:56 more folks involved in cyber security 00:25:58 this is a frequent topic on this program 00:26:02 because I could talk all sorts of 00:26:05 advanced cybersecurity kung-fu but if we 00:26:09 talk all that kung-fu and there's no one 00:26:11 out there that knows how to actually go 00:26:13 do anything with it it doesn't matter so 00:26:15 we have hundreds of thousands of cyber 00:26:17 security jobs posted today and I'm 00:26:19 really my belief is there's probably 00:26:21 over a million job openings it's just 00:26:23 many companies are so discouraged they 00:26:26 don't even bother posting one because 00:26:28 they know if they do they're not gonna 00:26:29 get qualified applicants so I'd like to 00:26:32 thank both of you for doing what you can 00:26:34 to help out and get these kids learn and 00:26:38 cybersecurity excited about it so this 00:26:40 next generation we can fill all of these 00:26:42 jobs is the world is going online much 00:26:46 more every day we're seeing attacks on 00:26:51 healthcare data information companies 00:26:53 they one of the big credit reporting 00:26:55 firms Experian had a very bad data 00:27:00 breach and attack here and this is 00:27:03 across all these areas this companies 00:27:05 that have money to spend they have a 00:27:06 they had a chief information security 00:27:08 officer some companies don't even have 00:27:09 one of those and they had one they had a 00:27:11 team and even in all those cases these 00:27:14 systems are big they're complicated and 00:27:16 processes are complicated and you don't 00:27:18 really have all the training you need in 00:27:20 every spot across there like we said 00:27:22 before the break it only takes attackers 00:27:23 one way to get in you've got to stop it 00:27:25 every single time guys as I'd mentioned 00:27:28 that kung-fu we had talked a little bit 00:27:30 about ghost wire before the break and 00:27:33 you mentioned kids are gonna get belts 00:27:35 so uh our current model with coderdojo 00:27:38 they get a little USB belts and then as 00:27:40 they go through courses they get 00:27:42 different colored belts what we're 00:27:44 actually moving to is we're moving away 00:27:46 from the belts to make it more aligned 00:27:48 with ghost wiring itself because we're 00:27:50 rolling all of our programs under ghost 00:27:52 wire so they're gonna get lanyards and 00:27:54 then as they complete courses they're 00:27:57 gonna get pins that correlate with the 00:27:58 courses they've completed so you know 00:28:00 kind of like the Boy Scouts of the Girl 00:28:02 Scouts you know with their sashes so 00:28:03 they'll show up you know they'll be like 00:28:05 oh look I have a pin for you know C++ 00:28:07 and C sharp when someone I have Java you 00:28:10 know and so I think that'll be cool for 00:28:13 them because it can that's how they can 00:28:14 showcase their expertise as opposed to 00:28:16 just you know a USB bracelet yeah yeah 00:28:20 and that ghost wire we're gonna call it 00:28:22 ghost wire Academy it's still gonna 00:28:24 follow the belt system that we were 00:28:26 following with coderdojo so for example 00:28:29 as we bring these kids in and we're 00:28:31 trying to get them exposed to cyber 00:28:33 security and computer hardening and OS 00:28:35 hardening we divided it up into 10-week 00:28:38 courses and then each one represents a 00:28:40 belt level so if your noob if you're 00:28:42 newbie if you're a if you're a new guy 00:28:47 and you're trying to learn cybersecurity 00:28:49 then we'll put you in the white belt 00:28:51 course and then as you get past that and 00:28:54 we do a little CTF then hey I'm ready 00:28:56 for the the yellow belt course and all 00:28:59 that academia builds on top of each 00:29:01 other so some of the things we learn in 00:29:03 the white belt course hey you know this 00:29:06 is how malware likes to behave you know 00:29:08 we got these pop-ups we know that hey we 00:29:11 probably really shouldn't be clicking on 00:29:12 the the fake antivirus ad that pops up 00:29:16 you know the kids will go through that 00:29:18 academia and come to that understanding 00:29:19 and now we're gonna put them in the 00:29:20 yellow belt class and they're gonna 00:29:22 start to do more advanced things like 00:29:24 hey let's really take a look at this 00:29:26 Wireshark that we were working with and 00:29:28 let's try to carve out some of the 00:29:29 things that we sniffed on the traffic 00:29:32 that we were looking at in the Public 00:29:33 Library so forth and so on 00:29:35 so it's meant to evolve kids to a 00:29:37 greater understanding of cyber security 00:29:39 and computer coding 00:29:41 and the robotics and the computer 00:29:44 networking to make them more robust as 00:29:47 adults as these kids go through the 00:29:51 academia and they and they learn these 00:29:52 things you know it creates a more aware 00:29:55 cybersecurity professional you know if 00:29:58 you take a cybersecurity professional 00:30:00 today and it's just been through the 00:30:01 academia 00:30:02 he or she will still be able to 00:30:03 recognize some of these vulnerabilities 00:30:06 that exist but if you have a kid that's 00:30:08 learned that all of his life he'll be 00:30:10 more able to pick up on it sooner and so 00:30:14 that's what we're trying to create that 00:30:15 that sharpened strength yeah I just I 00:30:17 had an epiphany the other day with this 00:30:21 the Big Apple announcement here recently 00:30:22 the the iPhone acts that it's it's been 00:30:24 10 years of iPhone so there's a whole 00:30:27 generation of kids out there that never 00:30:29 knew that you actually had keep physical 00:30:31 keyboards on phones like all they've 00:30:33 ever seen are these touchscreen things 00:30:34 so and most I mean everybody that's 00:30:38 under the age of 18 right now does not 00:30:40 know the world pre-internet they're like 00:30:42 what do you mean there wasn't it so for 00:30:47 many of us listening out here like 00:30:49 there's still that the life before the 00:30:51 internet and now this life with the 00:30:52 internet we've seen all that change but 00:30:54 for these kids growing up if they can 00:30:56 learn all this stuff these digital 00:30:58 natives will be able to just know 00:31:01 instinctively how to keep themselves 00:31:04 safe online and as they move into the 00:31:06 workforce how to help keep their either 00:31:08 country if they choose to join our armed 00:31:11 forces or they're a company safe if they 00:31:13 choose to go into the private sector in 00:31:15 the cyber security world so we've been 00:31:18 talking about some of this training and 00:31:19 the the aspects that makes a cyber 00:31:21 security professional and being that 00:31:24 we're here on the air in Texas if you're 00:31:26 listening to us on iHeartRadio outside 00:31:28 of Texas I'm gonna use a gun safety 00:31:30 example is we're broadcasting from 1200 00:31:34 W AI here in San Antonio right in the 00:31:37 heart in the middle of the state of 00:31:39 Texas so we can almost drive 600 miles 00:31:42 in any direction and we're still in the 00:31:44 state of Texas or at least it feels that 00:31:45 way maybe it's not 600 miles Louisiana 00:31:48 border but it might as well be through 00:31:49 Houston traffic 00:31:50 so with guns most families here in Texas 00:31:56 have a firearm and they kids as they're 00:31:59 growing up learn to be around guns to 00:32:02 learn how you have the safety on there 00:32:05 how they're appropriately locked and 00:32:07 stored away how you make sure that they 00:32:09 are not loaded when they are stored all 00:32:12 of those safety aspects around firearm 00:32:14 so that you can use them responsibly 00:32:15 whether you're going out to range to 00:32:18 shoot skeet or whether you're going out 00:32:20 to a ranch to go hunting or whether 00:32:24 you're keeping that weapon in the house 00:32:26 for personal family safety all of those 00:32:30 aspects you've got safety and ethics 00:32:33 training around that that gun so you 00:32:36 could choose to use that firearm for 00:32:38 acts that you're not allowed to do you 00:32:41 could decide when you're out there 00:32:43 hunting to shoot something you don't 00:32:44 have a tag to to go hunt ethically maybe 00:32:47 you get caught on that hunt maybe you 00:32:49 don't it's kind of this gray area and 00:32:50 like maybe some kids try it and they get 00:32:52 away with it or their parents go you 00:32:54 know what I'm just not gonna turn them 00:32:56 in for that and you get out there and if 00:33:00 they you had a bunch of kids that were 00:33:02 not supervised by adults they're gonna 00:33:05 be more likely because kids just have 00:33:07 not learned at the depth level and they 00:33:09 don't have the long-term thinking to be 00:33:12 able to understand the ramifications of 00:33:14 their actions so if you've got kids that 00:33:16 are curious and learning and already 00:33:18 into computers if they're out there on 00:33:20 the internet reading this stuff really 00:33:23 getting into a program like ghost wire 00:33:26 where they're going to be around trained 00:33:28 adults that have expertise in here and 00:33:31 can have the ethics conversations with 00:33:34 them and show them not only how to learn 00:33:36 these things but how to be responsible 00:33:38 with it and some of the ramifications of 00:33:40 their actions if they were to choose to 00:33:42 use the the knowledge that they learn in 00:33:45 a way that's not appropriate so I know 00:33:49 that ethics is something that you guys 00:33:51 hit on in the the program and teach 00:33:53 these kids the activities of what 00:33:55 they're doing and how this stuff needs 00:33:57 to be used really on the the defensive 00:33:59 side and the awareness side so I 00:34:02 appreciate you guys doing that 00:34:04 and trying to get as many the kids 00:34:06 through this as possible because it's 00:34:08 not difficult to go out there on the 00:34:10 internet if you're a parent and you're 00:34:12 listening to this and you're like well 00:34:13 my kids can't find hacking tools in the 00:34:15 Internet 00:34:15 well yeah go to Google the search engine 00:34:17 and type in hacking tools download and 00:34:20 well click on some of the links may or 00:34:23 may not be the best idea because you may 00:34:25 be getting yourself exploited there you 00:34:27 don't have the knowledge and expertise 00:34:28 but if you click around for a little bit 00:34:31 there's packages out there whether it's 00:34:32 a well known well published things like 00:34:35 Metasploit or many of these others 00:34:38 there's ways for folks to easily get 00:34:42 their hands on tools now that they don't 00:34:46 have the appropriate training and 00:34:47 understanding of what they're doing they 00:34:49 may even cause harm without meaning to 00:34:52 because again you're using these tools 00:34:54 and maybe you thought you were just 00:34:56 scanning a network and and looking at 00:34:58 something you thought you were scanning 00:34:59 your home network and you didn't really 00:35:01 know how to use it very well as you were 00:35:02 actually scanning somebody else's 00:35:03 network or then you thought you were 00:35:06 just looking at things but then you 00:35:08 actually realized you ran the exploit 00:35:09 and blue screens your computer so it's 00:35:12 getting in and getting training to learn 00:35:14 how these things work is important so 00:35:17 they can be learned and used responsibly 00:35:19 as we talk about the cybersecurity and 00:35:24 this cyber warfare this is where weapons 00:35:28 are moving they're moving from guns and 00:35:29 bombs to exploits and digital activity 00:35:33 so these things are dangerous just like 00:35:37 the other ones is we've talking off the 00:35:40 air during the break as mentioned 00:35:41 industrial control system hack in the 00:35:44 Ukraine and one of the hospitals there 00:35:45 went offline and like be in that 00:35:47 hospital people died from a cyberattack 00:35:48 so it was it not a physical bomb dropped 00:35:52 in the hospital no but it was a cyber 00:35:53 bomb effectively that got dropped on 00:35:56 that city in the Ukraine that cost 00:35:58 people live so these cyber security 00:36:00 skills and knowledge if not used 00:36:03 responsibly and ethically can cause harm 00:36:07 absolutely yeah and you know in in the 00:36:10 same capacity that a child will go out 00:36:11 and want to shoot with his father's gun 00:36:14 you know his father will teach him all 00:36:15 those ethics about holding 00:36:17 weapon and aiming and firing 00:36:18 appropriately you know we run the we run 00:36:21 kids through those ethics as well you 00:36:23 know kids aren't going out to do things 00:36:27 bad on the Internet 00:36:28 any kid that has inspiration or an 00:36:30 inclination to learn about electronics 00:36:32 or computers is naturally going to reach 00:36:34 out to the Internet cuz that's where all 00:36:36 the information is so as they're doing 00:36:38 that you know they're gonna learn about 00:36:40 buffer overflows they're gonna learn 00:36:42 about SQL injections they're gonna learn 00:36:44 about a lot of these common ways that 00:36:45 websites can get hacked and you know cuz 00:36:49 it's all over the place it's on YouTube 00:36:50 they can look wherever they wanted it 00:36:52 sans org there yes I'm Ted list that's 00:36:55 what here's the ten things to try first 00:36:56 Yeah right well more importantly so 00:36:59 they're probably going to turn to 00:37:00 YouTube and I don't know if you've ever 00:37:01 gone through YouTube and looked the way 00:37:03 a child would look but a lot of the kids 00:37:05 that are up there posting they're not 00:37:07 posting correct information they're 00:37:09 posting what they themselves have 00:37:10 derived from things that they've read 00:37:12 and so you know you're getting like 00:37:14 third and fourth effect YouTube videos 00:37:16 of misinformation yeah you know those 00:37:21 kids they go out and they reach out and 00:37:22 they try to get information and you know 00:37:24 they like hey I want to try this exploit 00:37:26 because I have a tutorial that I can see 00:37:29 online that's easy to follow and they 00:37:31 don't fully understand the consequences 00:37:32 of what you're doing like what you were 00:37:34 highlighting about with the with the 00:37:36 enumeration and nmap scanning and stuff 00:37:39 of that nature going out and trying to 00:37:40 scan networks you know when they're in 00:37:43 the ghost wire class we always put on a 00:37:46 concentration concentration on ethics 00:37:48 and we explain to them hey look some of 00:37:51 these things that you're doing they can 00:37:52 cause damage not just like immediately 00:37:55 but eventually or from another action 00:37:58 that could occur if you go out and you 00:37:59 scan this network and it misfires or or 00:38:03 malfunctions you know that could be 00:38:05 something that could possibly put 00:38:06 somebody's life in danger so you know 00:38:09 hacking is cool and fun and and and it's 00:38:12 it's fun to watch and it's fun to hear 00:38:13 about and stuff but when we concentrate 00:38:16 on the ethics of what you're doing and 00:38:18 why you need to learn to be a white hat 00:38:21 instead of a black hat I think that 00:38:22 carries a lot of weight with kids and it 00:38:25 gives them a sense of pride and 00:38:26 responsibility and what they're doing 00:38:28 yeah I think kids grow up they want to 00:38:30 be superheroes not supervillains 00:38:32 absolutely yes so we can show them the 00:38:34 path to being cyber superheroes and you 00:38:37 know I've had some kids in class where 00:38:38 they're like hey I think it would be 00:38:40 awesome to be a supervillain and you 00:38:43 know I kind of explained to him I'm like 00:38:44 well you know that does sound exciting 00:38:46 and fun you know but there are a number 00:38:49 of cyber security experts I have plenty 00:38:52 of time to pick apart what you did how 00:38:55 you did it and how to prove it was you 00:38:57 and you may outsmart four or five people 00:38:59 for a limited amount of time but 00:39:01 eventually you're gonna get caught and 00:39:03 exposed and FBI is knocking on your door 00:39:06 trying to figure out why the little 00:39:07 Jimmy try to hack into the NSA or that 00:39:10 the NASA website you know and it's it's 00:39:13 probably purely innocent just a test 00:39:15 concept but you know for those companies 00:39:17 that's a big deal yeah yeah if you take 00:39:21 that scanning software and start going 00:39:24 after your favorite dot mil or gov 00:39:28 websites yes will come knockin you're 00:39:32 listening to cyber talk radio on 1200 W 00:39:35 AI if you're joining us on the replay 00:39:38 via our website YouTube iTunes podcast 00:39:41 podcast thank you for listening in and 00:39:43 thank you for putting up with us as I 00:39:46 talk to our listeners that are out there 00:39:47 on the air and circle back on things 00:39:50 because if you wanted to circle back on 00:39:52 a topic you can always hit rewind or go 00:39:54 back a little slider bar in your browser 00:39:56 there but for those that may be in their 00:39:59 car and I just joined the program we're 00:40:02 talking military cyber professionals 00:40:03 association of San Antonio here about 00:40:06 how the military members if you're 00:40:08 stationed here and I want to get 00:40:10 involved in a professional organization 00:40:12 to work on your skills to collaborate 00:40:17 with some private sector partners or to 00:40:18 take some of those skills and help teach 00:40:20 kids stem and cyber you can get involved 00:40:25 and check it out searching for mCP a San 00:40:28 Antonio in your Google or Bing or 00:40:30 DuckDuckGo depending on how you like to 00:40:34 obscure your searches on the internet so 00:40:36 you guys have an annual event that you 00:40:40 do for capture the flag that I'd heard 00:40:43 that about absolutely yeah so what's the 00:40:45 story on that one so last year was our 00:40:46 first year doing it and we were just 00:40:49 looking for a way to raise money because 00:40:51 what we do we provide these services to 00:40:53 the community for free and then Shona 00:40:55 myself we're both active duty so we 00:40:57 don't have a lot of free time to go out 00:40:59 and you know make money other ways for 00:41:02 the for the nonprofit so we decided to 00:41:04 hold a CTF to try to raise funds to pay 00:41:06 for you know all the all the bracelets 00:41:08 and t-shirts and you know whatever else 00:41:10 the kids might need for during the 00:41:12 courses so we decided to host the CTF we 00:41:16 had some some sponsors hak5 gave us some 00:41:19 goodies to give away USAA gave us some 00:41:22 money 00:41:23 geek delet us use their event center 00:41:25 over here and oh yeah it was it was a 00:41:28 great time we had I think like 25 teams 00:41:30 total there was only like 18 people in 00:41:35 the actual event center and then we had 00:41:37 a number of the teams were remote no one 00:41:41 actually finished the whole CTF courtesy 00:41:45 of Paul Jordan he he broke that CTF and 00:41:47 uh it was pretty legit good yeah I like 00:41:51 it and uh so for those that are 00:41:54 listening and normally thinking for 00:41:56 nonprofits there's this a gala 00:41:58 fundraiser you're getting on a tuxedo 00:41:59 this is a much more fun and practical 00:42:01 hands-on fundraising activity yes so 00:42:04 they explain what I capture the flag is 00:42:07 for a listener that has never 00:42:09 participated in one before so basically 00:42:12 the the teams or individuals 00:42:15 I think everyone decided to be teams 00:42:17 they go through and they get points for 00:42:20 whatever questions they can answer so 00:42:22 it'll be basically computer based 00:42:24 puzzles some of them may be set up where 00:42:27 you have to actually break into a box 00:42:29 find the flag on the box and others are 00:42:32 going to be you have an encryption 00:42:33 algorithm and you have to figure out how 00:42:36 to crack it so there's a lot of 00:42:38 different variation and what we did 00:42:40 there yeah so logic games and puzzles to 00:42:42 figure out how to get through to some 00:42:44 piece of information that's stored 00:42:46 either on a USB stick or on a server 00:42:50 somewhere or on a website or right 00:42:52 depends on the the different CTF and 00:42:55 then what the object 00:42:57 are in that one but this is a where you 00:42:59 learn how to to go through all the the 00:43:02 different pieces of the computing 00:43:04 systems to get through and peel back the 00:43:06 layers of the onion until you reach the 00:43:08 information it sounds like on this one 00:43:09 the objective was not found so no one no 00:43:14 one made it all the way through did you 00:43:15 have a winning team that got the closest 00:43:17 we did we did I think they were there 00:43:19 was a QWERTY qwe rty yeah and they got 00:43:23 pretty far yeah I think they had one or 00:43:25 two flags left to find yeah they almost 00:43:27 made it they okay we made it pretty 00:43:29 difficult like you know we're not gonna 00:43:30 say hey I'll use cyber guys that are so 00:43:34 experienced come down and come to our 00:43:35 CTF and they just blast right through it 00:43:37 no we wanted to make it pretty hard and 00:43:38 difficult for them to get progress and 00:43:41 it worked yeah thanks Paul Jordan cuz he 00:43:44 pulled that off great yeah so uh and 00:43:46 QWERTY QW ERT why it sounds like a 00:43:50 complicated password it's not one you 00:43:52 should use 00:43:52 you could have never looked down at your 00:43:54 keyboard it's the characters up at the 00:43:56 top left so as we had talked a little 00:43:58 bit about the start of the program about 00:44:00 better passwords teaching kids to use 00:44:02 good passwords kids will do stuff like 00:44:04 QWERTY or is mentioned earlier their 00:44:06 dog's name or maybe whenever their 00:44:08 favorite video game character's name is 00:44:10 so these are things that should not be 00:44:12 passwords and you this is a one for the 00:44:15 parents listening out there as well or 00:44:17 just business professionals if you think 00:44:20 you're getting communication from a 00:44:22 trusted colleague or you're getting 00:44:23 communication from one of your children 00:44:25 it may or may not be your colleague or 00:44:27 your children if they're not using good 00:44:29 passwords and keeping their system safe 00:44:31 and secured so if you're getting asked 00:44:34 to shared sensitive information via a 00:44:37 text message or a online chat or an 00:44:42 email pick up the phone and call them 00:44:44 over voice it's much harder to spoof 00:44:46 that it's not impossible these days some 00:44:49 folks out there we were mentioned in 00:44:50 YouTube there's a video of President 00:44:52 Obama that was not President Obama so 00:44:54 that mean they've even faked a whole 00:44:56 video there he was not president at the 00:44:58 time when this video was fake but just 00:44:59 to show where the state of that that has 00:45:01 come true but for the average person if 00:45:03 you pick up the phone and call and do a 00:45:05 voice authentication did you really send 00:45:06 me this email that's pretty good the 00:45:08 ideal is if you don't have to share 00:45:10 some information over an online 00:45:13 connection without verifying in person 00:45:15 first that that they asked you for it 00:45:17 just wait until you actually see them 00:45:19 face-to-face because we're a long ways 00:45:21 away from being able to fake that so as 00:45:27 you guys did the CTF event last year if 00:45:30 the folks wanted to learn about when 00:45:32 this next one is or if they wanted a 00:45:33 volunteer to try to help set it up and 00:45:35 work the event next year where do they 00:45:39 find out about that from you know so our 00:45:40 website be the best best place to go em 00:45:44 CPA Tech sa org we're also having a 00:45:47 social event coming up on October 21st 00:45:50 at the Anchor Bar gonna be discounted 00:45:53 wings there 00:45:54 come sit beer interact with us we're 00:45:57 always looking for volunteers that know 00:45:59 how to code and don't mind teaching kids 00:46:00 I know plenty of programmers but the 00:46:03 minute they find out that I'm wanting 00:46:04 them to teach kids they're like yeah so 00:46:07 this is a basically it's a Big Brothers 00:46:09 and Big Sisters but instead of teaching 00:46:11 them life skills you can teach them 00:46:12 software development so if that sounds 00:46:14 engaging for you you want to help some 00:46:16 kids learn to code what time y'all going 00:46:18 to be out at the Anchor Bar so we're 00:46:20 gonna get there it starts at 4:00 p.m. 00:46:21 and it's gonna last until 7 p.m. so 00:46:24 there you go and uh where's this Anchor 00:46:26 Bar at here at San Antonio 00:46:28 alright the Anchor Bar is a 45 53 north 00:46:32 loop 1604 and that's sweet 11:33 you'll 00:46:35 see it out there yeah best wings I've 00:46:38 had yeah I was pretty good yeah yep we 00:46:40 wanted to bring people down and you know 00:46:43 and give back and say thank you for 00:46:44 being a member and here's some free 00:46:46 chicken wings and here's some of the 00:46:49 stuff that we're doing and if you want 00:46:50 to get involved let us know because we 00:46:53 definitely need help yeah and if we've 00:46:57 got folks listening that wanted to 00:47:00 donate money being a non-profit you guys 00:47:03 are buying t-shirts you said all these 00:47:04 different things so though they're ways 00:47:07 for folks that donate online or do they 00:47:08 contact you guys to put a donation or if 00:47:11 they show up the social can they drop 00:47:13 some in your baseball cap absolutely 00:47:15 yeah awesome yeah and we have a PayPal 00:47:17 account and all that stuff too so yeah 00:47:20 if you want to go ahead and go online 00:47:21 and reach out to the team there and then 00:47:24 they can take your donation to help get 00:47:26 the kids the badges and things that they 00:47:28 need to be able to move through the the 00:47:30 education programs absolutely because if 00:47:32 the kids complete the lesson and they're 00:47:34 like where's my pin you're like yeah 00:47:35 we're out of money this week to buy pins 00:47:37 yeah sorry little Johnny you don't get 00:47:39 your JavaScript pin yeah you're gonna 00:47:41 have to wait on that one until the next 00:47:44 fundraising drive so so I know we've 00:47:46 been talking about folks that are 00:47:48 cybersecurity professionals or expert 00:47:50 coders getting involved that is their 00:47:53 opportunity if I just want to help kids 00:47:56 succeed in this I don't happen to know 00:47:59 all these things yet myself can I help 00:48:02 and contribute absolutely so we uh we 00:48:05 gear our curriculum toward kids so 00:48:07 adults pick it up pretty easily so our 00:48:10 instructor assistants oftentimes they 00:48:12 don't know they're not experts in 00:48:14 programming or cybersecurity or robotics 00:48:17 they may know just a little bit or no 00:48:19 maybe no nothing at all that they pick 00:48:22 it up as we go through and then when the 00:48:24 kids ask questions they're like oh yeah 00:48:25 I understood that so there you go if 00:48:29 you're interested in helping out and you 00:48:32 like big brother big sister that sort of 00:48:34 programs and you want to give back to 00:48:36 getting our kids through to the learn 00:48:39 stem and get educated here make San 00:48:41 Antonio in our country a better place 00:48:42 you can do that with the NCPA xxi 00:48:45 they're gonna have a social out at the 00:48:47 anchor bar up off of 1604 you can also 00:48:50 check out their website and you'll be 00:48:52 able to listen to this program in full 00:48:55 online on our website WWF talk radio 00:48:59 comm on Tuesday we put up this episode 00:49:04 on all episodes the Tuesday after they 00:49:06 broadcast here over the weekend you can 00:49:08 also listen to all of our past programs 00:49:10 including if you're interested in what's 00:49:14 going on here in the Cyber Command out 00:49:17 there at the Air Force where both of 00:49:18 these gentlemen serve we had on Sheri 00:49:21 Hanson who was the executive director 00:49:23 the highest-ranking civilian 00:49:25 out there before she headed back to the 00:49:28 War College she's no longer here with us 00:49:30 in San Antonio but wishing her Seema 00:49:32 good luck here Ana and we've also had a 00:49:34 congressman we'll heard as one of our 00:49:37 four congressional members with a 00:49:38 computer science degree so thank you for 00:49:41 listening to cyber talk radio 00:49:43 [Music] 00:49:49 you