Episode: 055


Title: The Military Cyber Professionals Association of San Antonio


Aired: October 14, 2017


Featured Segments: The Military Cyber Professionals Association of San Antonio


Synopsis:

Bret Piatt, CTR host, Shaun Herron, and Charles Hackett discuss the Military Cyber Professionals Association of San Antonio and talk about the work they are doing promoting cyber security education.


Follow Us & Stay Informed:


Bret Piatt (left), Shaun Herron (center), Charles Hackett (right)


Tweet us: @cybertalkradio, @bpiatt / Stream on iHeartRadio: Android or iOS


Transcript:


00:00:01 [Music]
00:00:07 from the dark web to your radio guy you
00:00:11 were listening to cyber talk radio on
00:00:12 news 1,200
00:00:14 WOA
00:00:17 [Music]
00:00:27 welcome to cyber talk radio I'm your
00:00:31 host Brett hi a 20 year internet
00:00:33 security veteran joined this week by a
00:00:36 couple of our wonderful military
00:00:39 personnel here stationed in San Antonio
00:00:42 we're here this week to talk about
00:00:46 military cyber professionals Association
00:00:48 of San Antonio and what this nonprofit
00:00:51 organization is up to so Shawn and
00:00:55 Charles thank you for agreeing to join
00:00:57 us this week and come here on the air to
00:00:59 talk about what MCP a is gonna do for
00:01:02 the city of San Antonio's this chapter
00:01:04 gets up and going here thanks Thank You
00:01:07 Brad so Shawn can you go and give a
00:01:09 little bit of your background how did
00:01:10 you get involved in the Air Force and
00:01:13 then why join in and start working in
00:01:18 your free time on the military side
00:01:20 professionals Association well I was
00:01:23 approached hey do you want to be
00:01:24 treasurer of the military cyber
00:01:26 professional association and I didn't
00:01:29 know much about it and it got explained
00:01:30 to me and we sat down at the line in the
00:01:33 Rose pub down here in downtown San
00:01:36 Antonio with a couple of guys from Ernst
00:01:40 & Young and they were the president and
00:01:42 vice president and they were like hey we
00:01:44 need a treasurer do you want to do this
00:01:45 and I was like sure so I came on board
00:01:47 as the treasurer did some work with them
00:01:50 we decided to reinvent ourselves a
00:01:52 little bit and then ultimately I rolled
00:01:54 into being the president of the mCP a
00:01:57 wonderful Anna how about you Charles so
00:02:01 I actually found em CPA when I was
00:02:03 stationed in Germany I used to be a
00:02:05 medic and kind of got tired of that
00:02:08 wanted something bigger and better so I
00:02:11 applied to cross train into this new
00:02:14 cyber career field the Air Force was
00:02:15 standing up and didn't really know what
00:02:18 I was getting into so I found a guy who
00:02:20 was in the career field already to
00:02:21 shadow while I was shadowing him he was
00:02:23 like hey check this thing out apply
00:02:25 online they can help you out you know
00:02:27 get you where you need to be so that's
00:02:29 why I got into it and then when I pcs to
00:02:31 Lackland Air Force Base
00:02:33 I met a Sean and he leaned over to me
00:02:36 and was like hey do you know what do you
00:02:38 know about em CPA have you ever
00:02:40 heard of them I was like actually I have
00:02:42 and then from that point on I was part
00:02:45 of the MC PA here excellent yeah so if
00:02:49 you're out there and you're listening
00:02:50 and you're thinking well maybe I want to
00:02:51 be part of this airforce cyber stuff and
00:02:54 you're not in the airforce today we had
00:02:56 a tech sergeant Ayami Baker on who's the
00:02:58 airforce cyber recruiter you can listen
00:03:01 to that on our website at wwlp.com as
00:03:05 well as on iTunes podcasts or pocket
00:03:08 caster pretty much any podcast service
00:03:10 that you try to look us up on out there
00:03:12 you can learn all about how the Air
00:03:14 Force if you go through and apply
00:03:16 they'll send you to training on all of
00:03:19 this so you don't even need to have
00:03:21 cyber skills you can just decide you
00:03:23 want to serve your country and you want
00:03:26 to be out there in cyber and if you go
00:03:29 through get accepted they'll send you
00:03:31 through to training and potentially even
00:03:33 straight into the reserves if you'd like
00:03:36 you don't even necessarily have to go
00:03:38 straight active-duty beyond just that
00:03:40 initial boot camp and the training
00:03:43 cycles so you can learn more listen into
00:03:45 tech sergeant Baker talk all about that
00:03:48 and learn about the over 1,500 openings
00:03:51 is cyber security is hot inside the
00:03:55 military it's a hot out there in the
00:03:56 private sector there's hundreds of
00:03:58 thousands to potentially millions of
00:04:00 openings and I'm talking about this
00:04:03 right now to lead into a little bit of
00:04:05 some of the stuff that MC PA has been
00:04:07 working on here in San Antonio over the
00:04:09 last month or so here leading up to them
00:04:13 joining us on the air today they've been
00:04:14 working on a camp for thirteen to
00:04:17 seventeen year old kids can you guys one
00:04:20 of you who's working on that one and
00:04:22 share a little bit more about what that
00:04:24 camps going on and how folks can look up
00:04:27 and learn more about it well if you go
00:04:30 to the mCP a website Mill cyborgs and
00:04:34 you look at the vision it says
00:04:35 professional networking and stem and as
00:04:37 the San Antonio chapter Charles and I
00:04:40 looked at each other and we said how are
00:04:42 we going to promote stem in San Antonio
00:04:45 so immediately we picked up a program
00:04:48 called coderdojo
00:04:49 and that was a great success get
00:04:51 instructors to teach can
00:04:53 you're coding whatever language they're
00:04:55 proficient in we get them to pick it up
00:04:57 get him a curriculum and start teaching
00:04:59 kids as it started getting bigger we
00:05:02 decided hey let's throw some more some
00:05:04 more topics in here
00:05:06 maybe do cybersecurity maybe do computer
00:05:10 networking maybe do robotics so we had
00:05:13 the coding and the robotics and the kids
00:05:17 like the robotics a lot too we literally
00:05:19 had them making remote-control cars that
00:05:20 had sensors on them and as they drove up
00:05:22 to the wall they would stop reverse and
00:05:24 turn around while using C+ coding to
00:05:28 interface and send commands to Arduino
00:05:30 boards so they could control those cars
00:05:32 and that was a big hey those kids liked
00:05:33 it a lot and then we started the
00:05:36 cybersecurity stuff and we called it
00:05:38 Ghost wire so we thought it was a cool
00:05:41 name just thought kids would think it
00:05:43 was awesome yeah and they step one is
00:05:45 name it a something cool so kids get
00:05:47 excited about it yep and so we started
00:05:52 the ghost wire and it's a hit - they
00:05:55 like coming down here in about malware
00:05:57 and behavioral characteristics of
00:05:59 malware and you know how to fix
00:06:01 grandma's computer I think one of the
00:06:03 favorite things the kids seem to like is
00:06:06 a social engineering we go through
00:06:08 exercises with them on that and they
00:06:10 they get to play both sides of it so
00:06:12 that's always fun for them yeah it's
00:06:15 good things for kids to get trained on
00:06:17 is the ones that are not getting that
00:06:20 cyber security awareness training
00:06:21 through a program like ghost wire elfs
00:06:24 are often ones that are out there on the
00:06:26 Internet they get taken advantage of
00:06:27 they get tricked or duped by these sites
00:06:29 you'll get a pop-up ad that says your
00:06:31 computers infected click here to save
00:06:32 yourself that's really a technical
00:06:35 version of social engineering you're not
00:06:36 talking to somebody on the phone but
00:06:38 you're in the computers not infected
00:06:39 until you do click on the pop-up and
00:06:41 then you've actually caused yourself a
00:06:43 problem where you thought you were
00:06:44 fixing it and it's designed for those
00:06:46 kind of 7 to 10 year old kids that can
00:06:49 read but don't yet have that social
00:06:51 engineering and security awareness
00:06:53 training to know that's actually a
00:06:55 hacker out there after you yeah and you
00:06:58 see that a lot too with these kids
00:06:59 clicking on things because they don't
00:07:01 you know they don't have the awareness
00:07:02 to realize what's going on so if there
00:07:05 watching videogame YouTube ads or some
00:07:07 of that nature they'll just click all
00:07:09 over everything if you can teach kids
00:07:12 not to do those things then you know
00:07:16 obviously yeah we make these things much
00:07:19 safer
00:07:20 so the yes social engineering aspect fun
00:07:22 I saw and some of the curriculum looks
00:07:23 like you guys get them Wireshark and
00:07:26 show them how to set that stuff up as
00:07:27 well oh yeah yeah yeah for our listeners
00:07:30 out there that don't know what Wireshark
00:07:32 I got some excited smiling nods in here
00:07:33 cuz you can have a good amount of fun
00:07:35 with that especially the kids again this
00:07:37 it lets them go and do some pretty cool
00:07:42 things on network so you share a little
00:07:43 bit about Wireshark and why that's fun
00:07:45 for the kids so basically what Wireshark
00:07:49 is is it allows you to see all the
00:07:50 traffic going on the network although
00:07:53 all the packets of data so you can pick
00:07:55 all those data packets apart and see
00:07:58 what they are see what's in them a lot
00:07:59 of stuff that goes across the internet
00:08:01 is what we call it in clear-text
00:08:03 so any Joe Schmo who has a packet
00:08:06 sniffer like Wireshark can read it and
00:08:07 so what we do exercises with kids will
00:08:10 throw passwords and stuff in clear text
00:08:12 and tell them hey you know go to this
00:08:14 website and as they're going to the
00:08:17 website we have other kids set up with
00:08:19 traffic sniffers on their laptops so
00:08:21 they're sniffing each other's traffic
00:08:23 then it's like okay you know we created
00:08:24 a username and login for you go ahead
00:08:26 and login and they they do that and they
00:08:28 see it and it's it's real cool for them
00:08:29 and you know they're excited because
00:08:31 they feel like you know they're doing
00:08:33 hacker stuff but in reality they're also
00:08:35 getting the experience where they're
00:08:36 seeing hey you know if I'm out on it
00:08:39 Starbucks you know anybody could steal
00:08:42 my password yeah I mean that's a good
00:08:45 one to talk to folks about it's why you
00:08:47 should always use the secure websites
00:08:50 it's that little S at the end of the
00:08:52 HTTP there in your web browser some of
00:08:55 them make the bar green some of them put
00:08:57 a little padlock up there but you should
00:08:59 be going to websites these days
00:09:00 everything should be HTTPS is not only
00:09:04 can those hackers use something like
00:09:05 Wireshark to sniff your traffic but
00:09:08 there's other tools called packet
00:09:09 injectors too where if you go to one
00:09:11 HTTP website somebody in the network can
00:09:15 potentially rewrite that session for you
00:09:17 and inject traffic that
00:09:18 didn't come from really the website it
00:09:19 might have come from that hackers
00:09:20 computer sitting on the Wi-Fi network
00:09:22 there with you yeah we like to take the
00:09:25 approach that we're not really teaching
00:09:27 kids how to sniff traffic in the public
00:09:31 libraries to get credentials and use
00:09:34 them we kind of showcase to teach about
00:09:37 password complexity how to make a super
00:09:40 simple password that could easily be
00:09:42 cracked that you need to put special
00:09:43 characters and stuff and follow those
00:09:45 policies and and that's really important
00:09:47 because they see that and then they
00:09:48 start to realize that hey maybe I
00:09:50 shouldn't make my password Kassie which
00:09:53 is the name of their dog or something
00:09:54 like that
00:09:55 yeah we had some problems too like
00:09:57 trying to showcase these examples
00:09:58 because a lot of sites are out there are
00:10:00 now HTTPS I really had to hunt around
00:10:02 and find one where we could find a field
00:10:04 where we could generate a user name and
00:10:06 password that wasn't HTTPS which is
00:10:08 really fantastic it's water but it was
00:10:10 difficult for the example we were trying
00:10:13 to show yeah yeah no that's good and yes
00:10:16 if you're a developer out there
00:10:17 and you have any forms or fields on your
00:10:19 website you're taking any user-generated
00:10:22 content input please HTTP but I mean
00:10:26 really even if you're just serving up
00:10:28 static content on the site HTTPS like
00:10:31 you'll go to cyber talk radio could we
00:10:33 serve that main page that just has the
00:10:36 information about the show on it without
00:10:38 HTTPS sure but we're using let's encrypt
00:10:42 which is a free SSL certificate service
00:10:45 so go you know let's encrypt org so
00:10:48 there's not even a it's too expensive to
00:10:50 make my web site secure these days it's
00:10:51 free literally doesn't cost you anything
00:10:54 more than a little bit of time at let's
00:10:55 encrypt org to secure that traffic out
00:10:58 there and keep the website safe with the
00:10:59 the program you've got going with the
00:11:02 the kids you mentioned the library so
00:11:05 you're running this at the san antonio
00:11:07 public library
00:11:08 oh yeah that's correct yeah historically
00:11:10 we go around and get any library that'll
00:11:13 let us sit in there and teach usually
00:11:16 there's not much resistance but where we
00:11:17 do get resistance is for the voting
00:11:19 polls and stuff like that so sometimes
00:11:20 we get kicked out of the way because you
00:11:22 know it's first-come first-serve so and
00:11:24 that's fair but um a lot of the
00:11:26 libraries here see us as a priority and
00:11:29 a need and not just to want because
00:11:31 we're providing a public service that's
00:11:33 important and I know that people realize
00:11:36 that we're doing this for a reason not
00:11:39 just to be good Samaritans or or some of
00:11:42 that nature ya know this is one of the
00:11:45 things I think that makes San Antonio
00:11:46 kind of truly a special places that
00:11:48 there are chapters of the mCP a and kids
00:11:52 have the opportunity to go learn
00:11:53 cybersecurity here through this or
00:11:56 through a number of different programs
00:11:58 we have almost as many CyberPatriot
00:12:01 teams even as a lot the city of Los
00:12:03 Angeles they're number one and there may
00:12:06 be three or four times the size of San
00:12:08 Antonio so kids get a lot of opportunity
00:12:12 here to learn cybersecurity and and with
00:12:14 programs like this maybe if they aren't
00:12:16 on a CyberPatriot team now they can go
00:12:19 there they can learn some things and get
00:12:21 to where they are able to join one
00:12:23 following season
00:12:24 yeah we try to make this more we do make
00:12:27 it 100 percent free for anybody who
00:12:29 wants to sign up if the kid has some
00:12:32 ambition to want to learn about
00:12:33 computers or cybersecurity or coding or
00:12:36 robotics we really try to nurture that
00:12:38 and grow that out and individual because
00:12:41 you know it's they're gonna be the ones
00:12:43 defending our networks in the future so
00:12:45 if you start them while they're young
00:12:46 and build them up there'll be better
00:12:48 cyber defenders in the coming years yeah
00:12:51 the other thing that I've recently
00:12:54 learned there Sharon what we teach them
00:12:56 of with their parents I met one of the
00:12:58 parents in one of the previous classes
00:12:59 and the mom was like oh yeah you know I
00:13:03 was on the computer you know I went to
00:13:05 do this thing and you know my son come
00:13:07 up and stopped me and that's why I think
00:13:09 that's another another big benefit of it
00:13:11 you're listening to cyber talk radio on
00:13:14 1200 W AI
00:13:16 we're talking about the military sniper
00:13:18 professional association if you missed
00:13:20 the start of the program and just turned
00:13:22 on your radio right now you can listen
00:13:24 to a rebroadcast or replay of this on
00:13:26 Tuesday it'll be up online on our
00:13:28 website at WWF or talk radio comm you
00:13:32 can also like us on Facebook or follow
00:13:34 us on Twitter and see when information
00:13:38 about programs gets posted or events
00:13:40 that we're having around the San Antonio
00:13:42 area we may even plan on taking
00:13:44 a trip up and meeting with some guests
00:13:47 in the Austin area soon so if you are
00:13:49 are from Austin and interested being on
00:13:51 the program you can go on our website
00:13:54 and let us know that you'd like to be a
00:13:56 guest of the show so Charles we were
00:14:01 talking military cyber professional
00:14:04 association for those that just joined
00:14:07 us here now in the radio can you give us
00:14:08 a little background on what's the the
00:14:12 number one thing from a mission for MC
00:14:15 PA the goal of the organization so the
00:14:18 organization's goal is a mentorship and
00:14:21 development of our nation's military
00:14:23 cyber forces and then also stem outreach
00:14:26 and so we fulfill that we do like
00:14:30 quarterly talks will invite a guest
00:14:32 speaker from the community usually we've
00:14:34 had guys from Symantec cyber guys from
00:14:37 USAA industry leaders I've had them come
00:14:40 out and talk to our military guys and
00:14:42 then we also have our STEM program so we
00:14:44 do our outreach into the community yeah
00:14:46 and so there's a San Antonio chapter of
00:14:49 this but this is a nationwide
00:14:50 organization or global yeah that's
00:14:53 correct
00:14:53 yeah so going back for the the history
00:14:56 of the organization when did it get
00:14:59 started and what was the the genesis of
00:15:01 that beginning so I think it all started
00:15:05 back in about 2010 2011 with Joe
00:15:08 Billingsley and my takeaway from it was
00:15:11 that hey you know there's a national
00:15:12 association for submarines there's a
00:15:15 National Association for radio there's a
00:15:18 National Association for this and that
00:15:19 and Joe Billingsley took his vision and
00:15:21 said I want to make a National
00:15:23 Association for military cyber
00:15:25 professionals and that's how that gets
00:15:27 started out so yeah this becomes one of
00:15:30 the growing career fields in our
00:15:32 military it makes sense for you to be
00:15:36 able to stay together and then as an
00:15:38 organized group be able to give back to
00:15:41 the cities that you're stationed in
00:15:43 absolutely and we're starting to work on
00:15:46 a new project because we're really
00:15:48 trying to hone in this professional
00:15:49 development because it's great to have
00:15:51 public speakers and everybody come and
00:15:53 hear what they have to say because they
00:15:54 say some amazing things
00:15:56 we that we've noticed that people really
00:15:58 like the tech talks to people come down
00:16:00 they want to hear nerdy things they want
00:16:02 to hear technical details about malware
00:16:05 or the recent hacker or whatever's going
00:16:08 on in the industry at the time but what
00:16:10 we want to do is make a new program an
00:16:13 offensive cyber range where we're gonna
00:16:15 bring people together to come in that
00:16:17 are MC PA members and we're
00:16:19 collaboratively to solve problems so for
00:16:22 example you know if you if your
00:16:25 background is clearly just you know
00:16:27 cyber defense but you've always wanted
00:16:29 to do offense we can come down and
00:16:32 create that environment and we can test
00:16:34 offensive skills just for fun and and
00:16:37 that's a really fantastic professional
00:16:39 networking opportunity because as we
00:16:42 invite people that come down you know
00:16:44 hey I'm working on this hack with this
00:16:48 person from route 9b hey I'm working on
00:16:50 this hack with this person from USA and
00:16:52 I'm working on this hack from somebody
00:16:53 else and in another business as they
00:16:57 work together you know that's that's a
00:16:58 personal resume so when that person
00:17:00 wants to transition out of the military
00:17:01 you know people are gonna say hey I know
00:17:04 that guy because we worked on an RSA
00:17:06 encryption problem or we worked on this
00:17:10 and we worked on that so that idea is to
00:17:12 bring people together to work together
00:17:14 on these problems and and and that'll
00:17:16 make the professional network happen
00:17:18 because I think that's a lot more
00:17:19 important than just having a resume that
00:17:22 face-to-face interaction and that
00:17:24 handshake and working together on
00:17:25 problems like that it's feels like a
00:17:28 no-brainer to me yeah and as you're
00:17:30 talking there one of the things we've
00:17:33 had some conversations with others in
00:17:36 the program about is there's
00:17:37 transitioning out of the military is
00:17:38 tricky for some folks because for a
00:17:42 couple of different reasons you do a
00:17:43 bunch of internal certifications where
00:17:46 you get training and but they're not
00:17:48 recognized industry certifications
00:17:50 necessarily and then the second is
00:17:52 there's a lot of blank spots on y'all's
00:17:54 resume right yeah yeah like a little bit
00:17:58 I was stationed in San Antonio and I
00:18:00 worked with computers you're like well
00:18:01 what else did you do with these
00:18:02 computers so I sat with the keyboard and
00:18:03 I typed on things so right yeah with
00:18:05 with that piece it makes it tricky for
00:18:07 folks to even go through and get an
00:18:09 interview but
00:18:09 because their resume gets sent in and
00:18:11 the robots
00:18:13 I call them robots but they're really
00:18:15 just poor keyword search machines don't
00:18:17 match up and and flag anything so that
00:18:20 you even get a call back to find out hey
00:18:21 wow these people really do know their
00:18:23 stuff and they've been working on this
00:18:24 for years and they are experts so right
00:18:27 you know for transitioning members that
00:18:29 are having a hard time realizing what
00:18:32 their capability is if you go to the
00:18:34 mill cyber org website Adam Tyra made a
00:18:37 post about what to say in your resume a
00:18:41 lot of military members put hey you know
00:18:43 I deployed here a lot of military
00:18:45 buzzwords and as they go to put their
00:18:47 resume forward it doesn't translate in
00:18:49 the business industry yeah so he laid
00:18:52 out a good way for somebody like you or
00:18:54 me or Charles to make that connection
00:18:57 and tailor the resume more towards being
00:19:00 in the private sector not having to get
00:19:03 dressed in the uniform every morning
00:19:04 correct yes yep that sector so if I was
00:19:08 at I'm a military cyber professional
00:19:10 either active duty now or in the
00:19:13 reserves or I've discharged or retired
00:19:17 how do I get involved in mCP a it so I
00:19:20 on the mill cyborg website you can just
00:19:23 go on apply and then they'll have a spot
00:19:26 where you can submit your dd-214 to them
00:19:28 if you're not military not a vet and not
00:19:32 a government employee and you want to
00:19:33 still be involved they do charge a
00:19:35 membership fee but for government
00:19:37 employees military members vets it's
00:19:39 free that's excellent
00:19:41 so then in the San Antonio chapter here
00:19:45 you said the organization started back
00:19:47 in 2010-2011 overall when did the San
00:19:50 Antonio chapter stand up I would say the
00:19:52 San Antonio chapter started up in 2014
00:19:55 and then we just at first we came
00:19:57 together and it was just a lot of meet
00:19:59 and greets and then we decided hey we
00:20:01 got a push forward we can anyone give
00:20:03 something new to San Antonio and that's
00:20:05 how we let into all these programs yeah
00:20:07 so we talked a little bit earlier in the
00:20:10 program about the boot camp you guys
00:20:12 have going on for kids right now the
00:20:14 Ghost Recon no it's not Ghost Recon
00:20:16 ghost wire ghost wire there's three
00:20:18 kinds of game the kids play right
00:20:19 correct yes okay
00:20:21 and so the the ghost wire the boot camp
00:20:24 for kids what uh are some other programs
00:20:28 for that you've done out there in the
00:20:31 STEM education you said that there's
00:20:32 been things going back through the years
00:20:34 before this ghost wire stuff happening
00:20:36 now right so we uh we also have
00:20:38 coderdojo
00:20:39 that was our first program that we
00:20:41 picked up which we just pair programmers
00:20:45 people that know how to code up with
00:20:47 kids we provide them a curriculum in
00:20:51 whatever language they know and then
00:20:54 they they teach the kids so Big Brothers
00:20:57 Big Sisters but instead of kind of how
00:20:59 to get through school and make a day the
00:21:01 you are learning not just life skills
00:21:04 you're learning coding skills here
00:21:05 absolutely absolutely and not just
00:21:08 coding skills but also with a
00:21:09 concentration on cybersecurity so we'll
00:21:12 stop and tell them hey look you have to
00:21:13 pay attention to your code because if
00:21:15 you write code with vulnerabilities then
00:21:17 you're working for a power plant
00:21:19 somebody could potentially use your code
00:21:21 to exploit that software and bring down
00:21:23 that power plant so we tie that info
00:21:24 yeah
00:21:25 and he's not joking when he says power
00:21:28 plants can go offline there's a one in
00:21:30 the Ukraine earlier this year they went
00:21:33 down about two hundred fifty thousand
00:21:34 folks were out of power for four hours
00:21:36 maybe eight hours a little bit rough the
00:21:40 data coming back out of that one if you
00:21:41 did want to hear more about those
00:21:43 industrial control systems and hacking
00:21:44 on that you can listen to the replay a
00:21:47 rebroadcast of cyber talk radio on our
00:21:50 website on youtube or on itunes podcast
00:21:53 and pocket casts look up industrial
00:21:56 control systems or ICS security and
00:21:59 we've got an episode there where we went
00:22:01 into some in-depth detail that's one
00:22:04 where you listen to that and then think
00:22:07 man yeah it's important that we're gonna
00:22:08 teach these kids to grow up and be safe
00:22:11 and secure coders because and we're
00:22:14 seeing a little bit of what this looks
00:22:16 like now with the natural disasters from
00:22:18 the Hurricanes where like Puerto Rico
00:22:20 may not have power for seven months and
00:22:22 you now have an uninhabitable island or
00:22:25 big section of the island which is kind
00:22:27 of terrible that like this can happen to
00:22:29 be a natural disaster potentially if you
00:22:31 take electricity plant offline this can
00:22:34 happen
00:22:34 the cyberattack and a hack as well and
00:22:37 electricity's gone for a while then the
00:22:40 water plant can't operate and if you
00:22:41 don't have electricity and you don't
00:22:43 have water it gets to be very difficult
00:22:45 to have a city and to have order so
00:22:48 keeping these industrial control systems
00:22:50 safe is important then there's lots of
00:22:53 good people there working on security
00:22:54 but as the drawback and this whole thing
00:22:58 it only takes one whole to get in and it
00:23:01 takes the defenders have to block every
00:23:03 single one of them so I like that you
00:23:07 brought that up that's for me personally
00:23:10 that's why this is so important I refer
00:23:13 to it as cyber 911 so I'd rather see
00:23:15 America ready for cyber 911 before it
00:23:18 happens as opposed to behave with a
00:23:20 massive attack that takes out our
00:23:22 infrastructure and be caught with our
00:23:24 pants down so we're getting ready to
00:23:26 take a break here at the bottom of the
00:23:28 hour for news traffic and weather if
00:23:30 you've just joined in you're listening
00:23:32 to cyber talk radio and 1200 W AI I'm
00:23:35 your host Bret Pyatt I'm joined by Sean
00:23:38 and Charles a two of our Air Force cyber
00:23:41 professionals here in San Antonio and a
00:23:43 members of the military sniper
00:23:45 professionals association here in San
00:23:47 Antonio helping military professionals
00:23:49 work together and help kids learn
00:23:52 cybersecurity and other STEM education
00:23:55 robotics and computer programming or to
00:23:59 help those military professionals
00:24:00 transition to the private sector after
00:24:04 they end their active duty with the
00:24:07 military so some great programs we're
00:24:10 going to go into some more detail about
00:24:12 this one we will see about how you get a
00:24:14 black belt and ghost wire how that
00:24:16 program is evolving this with kids and
00:24:18 education you got to make it fun you got
00:24:19 to set some goals you got to make it
00:24:21 entertaining and interesting for them
00:24:22 and then all of a sudden you will see
00:24:23 they can learn more than you ever
00:24:25 imagined so hang with us here through
00:24:28 news traffic and weather update at the
00:24:29 bottom of the hour and we will be right
00:24:31 back on cyber talk radio
00:24:36 [Music]
00:24:43 [Music]
00:25:15 welcome back to cyber talk radio
00:25:18 I'm your host Brett Pyatt a 20-year
00:25:20 internet security veteran if you're just
00:25:22 joining us after the news traffic and
00:25:24 weather update here at the bottom of the
00:25:25 hour I'm joined this week by Sean and
00:25:27 Charles two members of the US Air Force
00:25:30 that are also members of the military
00:25:32 cyber professionals Association of San
00:25:34 Antonio it's a nonprofit organization
00:25:37 here that helps military cyber members
00:25:40 network learn how to translate their
00:25:42 skills to the private sector work and
00:25:46 collaborate with private sector
00:25:47 companies in their areas on cyber
00:25:50 projects they also do a whole bunch
00:25:52 around STEM education to help us get
00:25:56 more folks involved in cyber security
00:25:58 this is a frequent topic on this program
00:26:02 because I could talk all sorts of
00:26:05 advanced cybersecurity kung-fu but if we
00:26:09 talk all that kung-fu and there's no one
00:26:11 out there that knows how to actually go
00:26:13 do anything with it it doesn't matter so
00:26:15 we have hundreds of thousands of cyber
00:26:17 security jobs posted today and I'm
00:26:19 really my belief is there's probably
00:26:21 over a million job openings it's just
00:26:23 many companies are so discouraged they
00:26:26 don't even bother posting one because
00:26:28 they know if they do they're not gonna
00:26:29 get qualified applicants so I'd like to
00:26:32 thank both of you for doing what you can
00:26:34 to help out and get these kids learn and
00:26:38 cybersecurity excited about it so this
00:26:40 next generation we can fill all of these
00:26:42 jobs is the world is going online much
00:26:46 more every day we're seeing attacks on
00:26:51 healthcare data information companies
00:26:53 they one of the big credit reporting
00:26:55 firms Experian had a very bad data
00:27:00 breach and attack here and this is
00:27:03 across all these areas this companies
00:27:05 that have money to spend they have a
00:27:06 they had a chief information security
00:27:08 officer some companies don't even have
00:27:09 one of those and they had one they had a
00:27:11 team and even in all those cases these
00:27:14 systems are big they're complicated and
00:27:16 processes are complicated and you don't
00:27:18 really have all the training you need in
00:27:20 every spot across there like we said
00:27:22 before the break it only takes attackers
00:27:23 one way to get in you've got to stop it
00:27:25 every single time guys as I'd mentioned
00:27:28 that kung-fu we had talked a little bit
00:27:30 about ghost wire before the break and
00:27:33 you mentioned kids are gonna get belts
00:27:35 so uh our current model with coderdojo
00:27:38 they get a little USB belts and then as
00:27:40 they go through courses they get
00:27:42 different colored belts what we're
00:27:44 actually moving to is we're moving away
00:27:46 from the belts to make it more aligned
00:27:48 with ghost wiring itself because we're
00:27:50 rolling all of our programs under ghost
00:27:52 wire so they're gonna get lanyards and
00:27:54 then as they complete courses they're
00:27:57 gonna get pins that correlate with the
00:27:58 courses they've completed so you know
00:28:00 kind of like the Boy Scouts of the Girl
00:28:02 Scouts you know with their sashes so
00:28:03 they'll show up you know they'll be like
00:28:05 oh look I have a pin for you know C++
00:28:07 and C sharp when someone I have Java you
00:28:10 know and so I think that'll be cool for
00:28:13 them because it can that's how they can
00:28:14 showcase their expertise as opposed to
00:28:16 just you know a USB bracelet yeah yeah
00:28:20 and that ghost wire we're gonna call it
00:28:22 ghost wire Academy it's still gonna
00:28:24 follow the belt system that we were
00:28:26 following with coderdojo so for example
00:28:29 as we bring these kids in and we're
00:28:31 trying to get them exposed to cyber
00:28:33 security and computer hardening and OS
00:28:35 hardening we divided it up into 10-week
00:28:38 courses and then each one represents a
00:28:40 belt level so if your noob if you're
00:28:42 newbie if you're a if you're a new guy
00:28:47 and you're trying to learn cybersecurity
00:28:49 then we'll put you in the white belt
00:28:51 course and then as you get past that and
00:28:54 we do a little CTF then hey I'm ready
00:28:56 for the the yellow belt course and all
00:28:59 that academia builds on top of each
00:29:01 other so some of the things we learn in
00:29:03 the white belt course hey you know this
00:29:06 is how malware likes to behave you know
00:29:08 we got these pop-ups we know that hey we
00:29:11 probably really shouldn't be clicking on
00:29:12 the the fake antivirus ad that pops up
00:29:16 you know the kids will go through that
00:29:18 academia and come to that understanding
00:29:19 and now we're gonna put them in the
00:29:20 yellow belt class and they're gonna
00:29:22 start to do more advanced things like
00:29:24 hey let's really take a look at this
00:29:26 Wireshark that we were working with and
00:29:28 let's try to carve out some of the
00:29:29 things that we sniffed on the traffic
00:29:32 that we were looking at in the Public
00:29:33 Library so forth and so on
00:29:35 so it's meant to evolve kids to a
00:29:37 greater understanding of cyber security
00:29:39 and computer coding
00:29:41 and the robotics and the computer
00:29:44 networking to make them more robust as
00:29:47 adults as these kids go through the
00:29:51 academia and they and they learn these
00:29:52 things you know it creates a more aware
00:29:55 cybersecurity professional you know if
00:29:58 you take a cybersecurity professional
00:30:00 today and it's just been through the
00:30:01 academia
00:30:02 he or she will still be able to
00:30:03 recognize some of these vulnerabilities
00:30:06 that exist but if you have a kid that's
00:30:08 learned that all of his life he'll be
00:30:10 more able to pick up on it sooner and so
00:30:14 that's what we're trying to create that
00:30:15 that sharpened strength yeah I just I
00:30:17 had an epiphany the other day with this
00:30:21 the Big Apple announcement here recently
00:30:22 the the iPhone acts that it's it's been
00:30:24 10 years of iPhone so there's a whole
00:30:27 generation of kids out there that never
00:30:29 knew that you actually had keep physical
00:30:31 keyboards on phones like all they've
00:30:33 ever seen are these touchscreen things
00:30:34 so and most I mean everybody that's
00:30:38 under the age of 18 right now does not
00:30:40 know the world pre-internet they're like
00:30:42 what do you mean there wasn't it so for
00:30:47 many of us listening out here like
00:30:49 there's still that the life before the
00:30:51 internet and now this life with the
00:30:52 internet we've seen all that change but
00:30:54 for these kids growing up if they can
00:30:56 learn all this stuff these digital
00:30:58 natives will be able to just know
00:31:01 instinctively how to keep themselves
00:31:04 safe online and as they move into the
00:31:06 workforce how to help keep their either
00:31:08 country if they choose to join our armed
00:31:11 forces or they're a company safe if they
00:31:13 choose to go into the private sector in
00:31:15 the cyber security world so we've been
00:31:18 talking about some of this training and
00:31:19 the the aspects that makes a cyber
00:31:21 security professional and being that
00:31:24 we're here on the air in Texas if you're
00:31:26 listening to us on iHeartRadio outside
00:31:28 of Texas I'm gonna use a gun safety
00:31:30 example is we're broadcasting from 1200
00:31:34 W AI here in San Antonio right in the
00:31:37 heart in the middle of the state of
00:31:39 Texas so we can almost drive 600 miles
00:31:42 in any direction and we're still in the
00:31:44 state of Texas or at least it feels that
00:31:45 way maybe it's not 600 miles Louisiana
00:31:48 border but it might as well be through
00:31:49 Houston traffic
00:31:50 so with guns most families here in Texas
00:31:56 have a firearm and they kids as they're
00:31:59 growing up learn to be around guns to
00:32:02 learn how you have the safety on there
00:32:05 how they're appropriately locked and
00:32:07 stored away how you make sure that they
00:32:09 are not loaded when they are stored all
00:32:12 of those safety aspects around firearm
00:32:14 so that you can use them responsibly
00:32:15 whether you're going out to range to
00:32:18 shoot skeet or whether you're going out
00:32:20 to a ranch to go hunting or whether
00:32:24 you're keeping that weapon in the house
00:32:26 for personal family safety all of those
00:32:30 aspects you've got safety and ethics
00:32:33 training around that that gun so you
00:32:36 could choose to use that firearm for
00:32:38 acts that you're not allowed to do you
00:32:41 could decide when you're out there
00:32:43 hunting to shoot something you don't
00:32:44 have a tag to to go hunt ethically maybe
00:32:47 you get caught on that hunt maybe you
00:32:49 don't it's kind of this gray area and
00:32:50 like maybe some kids try it and they get
00:32:52 away with it or their parents go you
00:32:54 know what I'm just not gonna turn them
00:32:56 in for that and you get out there and if
00:33:00 they you had a bunch of kids that were
00:33:02 not supervised by adults they're gonna
00:33:05 be more likely because kids just have
00:33:07 not learned at the depth level and they
00:33:09 don't have the long-term thinking to be
00:33:12 able to understand the ramifications of
00:33:14 their actions so if you've got kids that
00:33:16 are curious and learning and already
00:33:18 into computers if they're out there on
00:33:20 the internet reading this stuff really
00:33:23 getting into a program like ghost wire
00:33:26 where they're going to be around trained
00:33:28 adults that have expertise in here and
00:33:31 can have the ethics conversations with
00:33:34 them and show them not only how to learn
00:33:36 these things but how to be responsible
00:33:38 with it and some of the ramifications of
00:33:40 their actions if they were to choose to
00:33:42 use the the knowledge that they learn in
00:33:45 a way that's not appropriate so I know
00:33:49 that ethics is something that you guys
00:33:51 hit on in the the program and teach
00:33:53 these kids the activities of what
00:33:55 they're doing and how this stuff needs
00:33:57 to be used really on the the defensive
00:33:59 side and the awareness side so I
00:34:02 appreciate you guys doing that
00:34:04 and trying to get as many the kids
00:34:06 through this as possible because it's
00:34:08 not difficult to go out there on the
00:34:10 internet if you're a parent and you're
00:34:12 listening to this and you're like well
00:34:13 my kids can't find hacking tools in the
00:34:15 Internet
00:34:15 well yeah go to Google the search engine
00:34:17 and type in hacking tools download and
00:34:20 well click on some of the links may or
00:34:23 may not be the best idea because you may
00:34:25 be getting yourself exploited there you
00:34:27 don't have the knowledge and expertise
00:34:28 but if you click around for a little bit
00:34:31 there's packages out there whether it's
00:34:32 a well known well published things like
00:34:35 Metasploit or many of these others
00:34:38 there's ways for folks to easily get
00:34:42 their hands on tools now that they don't
00:34:46 have the appropriate training and
00:34:47 understanding of what they're doing they
00:34:49 may even cause harm without meaning to
00:34:52 because again you're using these tools
00:34:54 and maybe you thought you were just
00:34:56 scanning a network and and looking at
00:34:58 something you thought you were scanning
00:34:59 your home network and you didn't really
00:35:01 know how to use it very well as you were
00:35:02 actually scanning somebody else's
00:35:03 network or then you thought you were
00:35:06 just looking at things but then you
00:35:08 actually realized you ran the exploit
00:35:09 and blue screens your computer so it's
00:35:12 getting in and getting training to learn
00:35:14 how these things work is important so
00:35:17 they can be learned and used responsibly
00:35:19 as we talk about the cybersecurity and
00:35:24 this cyber warfare this is where weapons
00:35:28 are moving they're moving from guns and
00:35:29 bombs to exploits and digital activity
00:35:33 so these things are dangerous just like
00:35:37 the other ones is we've talking off the
00:35:40 air during the break as mentioned
00:35:41 industrial control system hack in the
00:35:44 Ukraine and one of the hospitals there
00:35:45 went offline and like be in that
00:35:47 hospital people died from a cyberattack
00:35:48 so it was it not a physical bomb dropped
00:35:52 in the hospital no but it was a cyber
00:35:53 bomb effectively that got dropped on
00:35:56 that city in the Ukraine that cost
00:35:58 people live so these cyber security
00:36:00 skills and knowledge if not used
00:36:03 responsibly and ethically can cause harm
00:36:07 absolutely yeah and you know in in the
00:36:10 same capacity that a child will go out
00:36:11 and want to shoot with his father's gun
00:36:14 you know his father will teach him all
00:36:15 those ethics about holding
00:36:17 weapon and aiming and firing
00:36:18 appropriately you know we run the we run
00:36:21 kids through those ethics as well you
00:36:23 know kids aren't going out to do things
00:36:27 bad on the Internet
00:36:28 any kid that has inspiration or an
00:36:30 inclination to learn about electronics
00:36:32 or computers is naturally going to reach
00:36:34 out to the Internet cuz that's where all
00:36:36 the information is so as they're doing
00:36:38 that you know they're gonna learn about
00:36:40 buffer overflows they're gonna learn
00:36:42 about SQL injections they're gonna learn
00:36:44 about a lot of these common ways that
00:36:45 websites can get hacked and you know cuz
00:36:49 it's all over the place it's on YouTube
00:36:50 they can look wherever they wanted it
00:36:52 sans org there yes I'm Ted list that's
00:36:55 what here's the ten things to try first
00:36:56 Yeah right well more importantly so
00:36:59 they're probably going to turn to
00:37:00 YouTube and I don't know if you've ever
00:37:01 gone through YouTube and looked the way
00:37:03 a child would look but a lot of the kids
00:37:05 that are up there posting they're not
00:37:07 posting correct information they're
00:37:09 posting what they themselves have
00:37:10 derived from things that they've read
00:37:12 and so you know you're getting like
00:37:14 third and fourth effect YouTube videos
00:37:16 of misinformation yeah you know those
00:37:21 kids they go out and they reach out and
00:37:22 they try to get information and you know
00:37:24 they like hey I want to try this exploit
00:37:26 because I have a tutorial that I can see
00:37:29 online that's easy to follow and they
00:37:31 don't fully understand the consequences
00:37:32 of what you're doing like what you were
00:37:34 highlighting about with the with the
00:37:36 enumeration and nmap scanning and stuff
00:37:39 of that nature going out and trying to
00:37:40 scan networks you know when they're in
00:37:43 the ghost wire class we always put on a
00:37:46 concentration concentration on ethics
00:37:48 and we explain to them hey look some of
00:37:51 these things that you're doing they can
00:37:52 cause damage not just like immediately
00:37:55 but eventually or from another action
00:37:58 that could occur if you go out and you
00:37:59 scan this network and it misfires or or
00:38:03 malfunctions you know that could be
00:38:05 something that could possibly put
00:38:06 somebody's life in danger so you know
00:38:09 hacking is cool and fun and and and it's
00:38:12 it's fun to watch and it's fun to hear
00:38:13 about and stuff but when we concentrate
00:38:16 on the ethics of what you're doing and
00:38:18 why you need to learn to be a white hat
00:38:21 instead of a black hat I think that
00:38:22 carries a lot of weight with kids and it
00:38:25 gives them a sense of pride and
00:38:26 responsibility and what they're doing
00:38:28 yeah I think kids grow up they want to
00:38:30 be superheroes not supervillains
00:38:32 absolutely yes so we can show them the
00:38:34 path to being cyber superheroes and you
00:38:37 know I've had some kids in class where
00:38:38 they're like hey I think it would be
00:38:40 awesome to be a supervillain and you
00:38:43 know I kind of explained to him I'm like
00:38:44 well you know that does sound exciting
00:38:46 and fun you know but there are a number
00:38:49 of cyber security experts I have plenty
00:38:52 of time to pick apart what you did how
00:38:55 you did it and how to prove it was you
00:38:57 and you may outsmart four or five people
00:38:59 for a limited amount of time but
00:39:01 eventually you're gonna get caught and
00:39:03 exposed and FBI is knocking on your door
00:39:06 trying to figure out why the little
00:39:07 Jimmy try to hack into the NSA or that
00:39:10 the NASA website you know and it's it's
00:39:13 probably purely innocent just a test
00:39:15 concept but you know for those companies
00:39:17 that's a big deal yeah yeah if you take
00:39:21 that scanning software and start going
00:39:24 after your favorite dot mil or gov
00:39:28 websites yes will come knockin you're
00:39:32 listening to cyber talk radio on 1200 W
00:39:35 AI if you're joining us on the replay
00:39:38 via our website YouTube iTunes podcast
00:39:41 podcast thank you for listening in and
00:39:43 thank you for putting up with us as I
00:39:46 talk to our listeners that are out there
00:39:47 on the air and circle back on things
00:39:50 because if you wanted to circle back on
00:39:52 a topic you can always hit rewind or go
00:39:54 back a little slider bar in your browser
00:39:56 there but for those that may be in their
00:39:59 car and I just joined the program we're
00:40:02 talking military cyber professionals
00:40:03 association of San Antonio here about
00:40:06 how the military members if you're
00:40:08 stationed here and I want to get
00:40:10 involved in a professional organization
00:40:12 to work on your skills to collaborate
00:40:17 with some private sector partners or to
00:40:18 take some of those skills and help teach
00:40:20 kids stem and cyber you can get involved
00:40:25 and check it out searching for mCP a San
00:40:28 Antonio in your Google or Bing or
00:40:30 DuckDuckGo depending on how you like to
00:40:34 obscure your searches on the internet so
00:40:36 you guys have an annual event that you
00:40:40 do for capture the flag that I'd heard
00:40:43 that about absolutely yeah so what's the
00:40:45 story on that one so last year was our
00:40:46 first year doing it and we were just
00:40:49 looking for a way to raise money because
00:40:51 what we do we provide these services to
00:40:53 the community for free and then Shona
00:40:55 myself we're both active duty so we
00:40:57 don't have a lot of free time to go out
00:40:59 and you know make money other ways for
00:41:02 the for the nonprofit so we decided to
00:41:04 hold a CTF to try to raise funds to pay
00:41:06 for you know all the all the bracelets
00:41:08 and t-shirts and you know whatever else
00:41:10 the kids might need for during the
00:41:12 courses so we decided to host the CTF we
00:41:16 had some some sponsors hak5 gave us some
00:41:19 goodies to give away USAA gave us some
00:41:22 money
00:41:23 geek delet us use their event center
00:41:25 over here and oh yeah it was it was a
00:41:28 great time we had I think like 25 teams
00:41:30 total there was only like 18 people in
00:41:35 the actual event center and then we had
00:41:37 a number of the teams were remote no one
00:41:41 actually finished the whole CTF courtesy
00:41:45 of Paul Jordan he he broke that CTF and
00:41:47 uh it was pretty legit good yeah I like
00:41:51 it and uh so for those that are
00:41:54 listening and normally thinking for
00:41:56 nonprofits there's this a gala
00:41:58 fundraiser you're getting on a tuxedo
00:41:59 this is a much more fun and practical
00:42:01 hands-on fundraising activity yes so
00:42:04 they explain what I capture the flag is
00:42:07 for a listener that has never
00:42:09 participated in one before so basically
00:42:12 the the teams or individuals
00:42:15 I think everyone decided to be teams
00:42:17 they go through and they get points for
00:42:20 whatever questions they can answer so
00:42:22 it'll be basically computer based
00:42:24 puzzles some of them may be set up where
00:42:27 you have to actually break into a box
00:42:29 find the flag on the box and others are
00:42:32 going to be you have an encryption
00:42:33 algorithm and you have to figure out how
00:42:36 to crack it so there's a lot of
00:42:38 different variation and what we did
00:42:40 there yeah so logic games and puzzles to
00:42:42 figure out how to get through to some
00:42:44 piece of information that's stored
00:42:46 either on a USB stick or on a server
00:42:50 somewhere or on a website or right
00:42:52 depends on the the different CTF and
00:42:55 then what the object
00:42:57 are in that one but this is a where you
00:42:59 learn how to to go through all the the
00:43:02 different pieces of the computing
00:43:04 systems to get through and peel back the
00:43:06 layers of the onion until you reach the
00:43:08 information it sounds like on this one
00:43:09 the objective was not found so no one no
00:43:14 one made it all the way through did you
00:43:15 have a winning team that got the closest
00:43:17 we did we did I think they were there
00:43:19 was a QWERTY qwe rty yeah and they got
00:43:23 pretty far yeah I think they had one or
00:43:25 two flags left to find yeah they almost
00:43:27 made it they okay we made it pretty
00:43:29 difficult like you know we're not gonna
00:43:30 say hey I'll use cyber guys that are so
00:43:34 experienced come down and come to our
00:43:35 CTF and they just blast right through it
00:43:37 no we wanted to make it pretty hard and
00:43:38 difficult for them to get progress and
00:43:41 it worked yeah thanks Paul Jordan cuz he
00:43:44 pulled that off great yeah so uh and
00:43:46 QWERTY QW ERT why it sounds like a
00:43:50 complicated password it's not one you
00:43:52 should use
00:43:52 you could have never looked down at your
00:43:54 keyboard it's the characters up at the
00:43:56 top left so as we had talked a little
00:43:58 bit about the start of the program about
00:44:00 better passwords teaching kids to use
00:44:02 good passwords kids will do stuff like
00:44:04 QWERTY or is mentioned earlier their
00:44:06 dog's name or maybe whenever their
00:44:08 favorite video game character's name is
00:44:10 so these are things that should not be
00:44:12 passwords and you this is a one for the
00:44:15 parents listening out there as well or
00:44:17 just business professionals if you think
00:44:20 you're getting communication from a
00:44:22 trusted colleague or you're getting
00:44:23 communication from one of your children
00:44:25 it may or may not be your colleague or
00:44:27 your children if they're not using good
00:44:29 passwords and keeping their system safe
00:44:31 and secured so if you're getting asked
00:44:34 to shared sensitive information via a
00:44:37 text message or a online chat or an
00:44:42 email pick up the phone and call them
00:44:44 over voice it's much harder to spoof
00:44:46 that it's not impossible these days some
00:44:49 folks out there we were mentioned in
00:44:50 YouTube there's a video of President
00:44:52 Obama that was not President Obama so
00:44:54 that mean they've even faked a whole
00:44:56 video there he was not president at the
00:44:58 time when this video was fake but just
00:44:59 to show where the state of that that has
00:45:01 come true but for the average person if
00:45:03 you pick up the phone and call and do a
00:45:05 voice authentication did you really send
00:45:06 me this email that's pretty good the
00:45:08 ideal is if you don't have to share
00:45:10 some information over an online
00:45:13 connection without verifying in person
00:45:15 first that that they asked you for it
00:45:17 just wait until you actually see them
00:45:19 face-to-face because we're a long ways
00:45:21 away from being able to fake that so as
00:45:27 you guys did the CTF event last year if
00:45:30 the folks wanted to learn about when
00:45:32 this next one is or if they wanted a
00:45:33 volunteer to try to help set it up and
00:45:35 work the event next year where do they
00:45:39 find out about that from you know so our
00:45:40 website be the best best place to go em
00:45:44 CPA Tech sa org we're also having a
00:45:47 social event coming up on October 21st
00:45:50 at the Anchor Bar gonna be discounted
00:45:53 wings there
00:45:54 come sit beer interact with us we're
00:45:57 always looking for volunteers that know
00:45:59 how to code and don't mind teaching kids
00:46:00 I know plenty of programmers but the
00:46:03 minute they find out that I'm wanting
00:46:04 them to teach kids they're like yeah so
00:46:07 this is a basically it's a Big Brothers
00:46:09 and Big Sisters but instead of teaching
00:46:11 them life skills you can teach them
00:46:12 software development so if that sounds
00:46:14 engaging for you you want to help some
00:46:16 kids learn to code what time y'all going
00:46:18 to be out at the Anchor Bar so we're
00:46:20 gonna get there it starts at 4:00 p.m.
00:46:21 and it's gonna last until 7 p.m. so
00:46:24 there you go and uh where's this Anchor
00:46:26 Bar at here at San Antonio
00:46:28 alright the Anchor Bar is a 45 53 north
00:46:32 loop 1604 and that's sweet 11:33 you'll
00:46:35 see it out there yeah best wings I've
00:46:38 had yeah I was pretty good yeah yep we
00:46:40 wanted to bring people down and you know
00:46:43 and give back and say thank you for
00:46:44 being a member and here's some free
00:46:46 chicken wings and here's some of the
00:46:49 stuff that we're doing and if you want
00:46:50 to get involved let us know because we
00:46:53 definitely need help yeah and if we've
00:46:57 got folks listening that wanted to
00:47:00 donate money being a non-profit you guys
00:47:03 are buying t-shirts you said all these
00:47:04 different things so though they're ways
00:47:07 for folks that donate online or do they
00:47:08 contact you guys to put a donation or if
00:47:11 they show up the social can they drop
00:47:13 some in your baseball cap absolutely
00:47:15 yeah awesome yeah and we have a PayPal
00:47:17 account and all that stuff too so yeah
00:47:20 if you want to go ahead and go online
00:47:21 and reach out to the team there and then
00:47:24 they can take your donation to help get
00:47:26 the kids the badges and things that they
00:47:28 need to be able to move through the the
00:47:30 education programs absolutely because if
00:47:32 the kids complete the lesson and they're
00:47:34 like where's my pin you're like yeah
00:47:35 we're out of money this week to buy pins
00:47:37 yeah sorry little Johnny you don't get
00:47:39 your JavaScript pin yeah you're gonna
00:47:41 have to wait on that one until the next
00:47:44 fundraising drive so so I know we've
00:47:46 been talking about folks that are
00:47:48 cybersecurity professionals or expert
00:47:50 coders getting involved that is their
00:47:53 opportunity if I just want to help kids
00:47:56 succeed in this I don't happen to know
00:47:59 all these things yet myself can I help
00:48:02 and contribute absolutely so we uh we
00:48:05 gear our curriculum toward kids so
00:48:07 adults pick it up pretty easily so our
00:48:10 instructor assistants oftentimes they
00:48:12 don't know they're not experts in
00:48:14 programming or cybersecurity or robotics
00:48:17 they may know just a little bit or no
00:48:19 maybe no nothing at all that they pick
00:48:22 it up as we go through and then when the
00:48:24 kids ask questions they're like oh yeah
00:48:25 I understood that so there you go if
00:48:29 you're interested in helping out and you
00:48:32 like big brother big sister that sort of
00:48:34 programs and you want to give back to
00:48:36 getting our kids through to the learn
00:48:39 stem and get educated here make San
00:48:41 Antonio in our country a better place
00:48:42 you can do that with the NCPA xxi
00:48:45 they're gonna have a social out at the
00:48:47 anchor bar up off of 1604 you can also
00:48:50 check out their website and you'll be
00:48:52 able to listen to this program in full
00:48:55 online on our website WWF talk radio
00:48:59 comm on Tuesday we put up this episode
00:49:04 on all episodes the Tuesday after they
00:49:06 broadcast here over the weekend you can
00:49:08 also listen to all of our past programs
00:49:10 including if you're interested in what's
00:49:14 going on here in the Cyber Command out
00:49:17 there at the Air Force where both of
00:49:18 these gentlemen serve we had on Sheri
00:49:21 Hanson who was the executive director
00:49:23 the highest-ranking civilian
00:49:25 out there before she headed back to the
00:49:28 War College she's no longer here with us
00:49:30 in San Antonio but wishing her Seema
00:49:32 good luck here Ana and we've also had a
00:49:34 congressman we'll heard as one of our
00:49:37 four congressional members with a
00:49:38 computer science degree so thank you for
00:49:41 listening to cyber talk radio
00:49:43 [Music]
00:49:49 you