WWL>Topics>>1-9 6am Bob Mitchell, how did the Russian hacks happen?

1-9 6am Bob Mitchell, how did the Russian hacks happen?

Jan 9, 2017|

Bob in for Tommy Tucker. Bob talks to Justin Cappos, Assistant Professor in the Computer Science and Engineering Department at NYU, about the Russian hacks.

Related Audio:

  1. Tommy, emotional call w/listener whose wife suffers from chronic pain

    Audio

    Tue, 28 Mar 2017

    Tommy talks to Kevin in Metairie about his wife's need for medication to cope with constant, chronic pain.

  2. Tommy, NO has more drug-related deaths than homicides

    Audio

    Tue, 28 Mar 2017

    Tommy talks to WWL-TV reporter Meg Farris about a new report that New Orleans had more drug-related deaths than homicides.

  3. Tommy, should we raise taxes to fully fund TOPS?

    Audio

    Tue, 28 Mar 2017

    Tommy talks to State Representative Cameron Henry about the current state and the future of TOPS.

  4. Tommy, is Obamacare imploding?

    Audio

    Tue, 28 Mar 2017

    Tommy talks to David Howard, Professor in the Dept. of Health Policy and Management at Emory University, about the state of Obamacare going forward.

+

Automatically Generated Transcript (may not be 100% accurate)

Now Bob natural for Tommy talkers WWL. I yum I've Berman dot com at 6 Leavitt good morning David morning a little chillier than I expected. Year. I thought. We was supposed to start warming up this morning not to Smart but at a later round. Manuel walked out of the house and some ligament on Google back and get my sweater IDR same thing Santa had to get code got it can't and it was so cold over the weekend. I had some friends in from Chicago they came to New Orleans out of that work out. Oh you mean Friday night yet you're gonna go to recorders about the most miserable. Weather i.'s senior in years it was just awful and saying that my buddies die with him some other present with them all social. I didn't leave them like hanging in the wind. But fortunately probity. I got a text message saying if you live in saint Tammany parish duke knocked it on the streets after dark. On less it is an emergency are okay gave me a great. Sure there aren't so a I've I've played that hard yeah caucus I remember you're talking about going down and you Pittsburgh's right in the right preservation hall of all of god couldn't of picked a worse tonight but. The alerts lately so yeah all right so that it didn't get ago no they went they quietly at some other and to live in New Orleans. I. OK so they were all going as three couples sort of real well you bailed out I today are absolutely I could urge you to take it off night. Here's what's coming up on our WWL talk table. We'll show we're going to be talking about. The traffic cameras were going to be talking about that terrible shooting in flora and president elect Donald Trump says he wants his administration to develop a plan. And the first by any days to aggressively combat. And stop cyber attacks. Well what exactly is I cyber attack will point out right now just examples. Assistant professor in the computer science and engineering department at NYU Justin thank you for getting up so early in being with us this morning. Certainly. Not first of all when it comes to action for us laypeople continue to decline exactly what I hacking is. Share it basically win. Some person goes and there are people she's. Making computer system is something that he owner designer system was intending for two days. Column so typically what you do that you you'd find ways to trick computer to doing something such let me read email poster creed or. Into our practice out you're not supposed to install op where you're not so that pack your symbolic against. Now every hacked is not successful correct. Note or. Now when you when you watch movies on TV you watch a spy movies they. Go into a room and they I've been a couple of names. And then at the third time I look around the room NC. A picture of guy with a black patents and must be the password type in black cat they make it seem like chat in his very very easily visit. There are techniques that that worked out pretty well you'd need a tremendous amount of skill usually to get most parts of computer. Arm but there are things. Even out of every day people have perhaps figured out how to view. Up from time to time that you know wait to go and get on some wireless network or were they like that so could just like. Just like you know it would be hard. Tune you know hard to steal things from certain com banks are certain people house's or whatever else there's also been that are not protected very well. And even kind of probably people can be quite good act which is sometimes what you CDs. You know these these young kids who were able ago and breaking and then and still teacher different organizations deepened that they don't how much training or media much knowledge. The cousin of the ball all the stores are sold computer geek who's in his basement had you figure fell out of the cipher big got to cover government computers now. As well as a person as an end of the visual computer over what can you do to prevent your home computer from the impact. What is there's a lot of different things so. Are using at Patrick manager uses. Is that really could bring to eat. Armed people out of accounts that you out on a site that you care. Hope to keep people out of your email and another thing because what that will do. Is this has a unique strong pats were her site the U log in Q. And one of the ways that people get themselves a lot of trouble is used that thing over and over and over again. Bombed your your home computer. You wanna keep updated with the latest bird saw where so whenever use he would come and tell you you need to do it opera update. Are you should be applying those software update. Who. The that's one of the best thing to do the way to think about software update is it's like the main actor telling you that hey. We we you know we found a problem that hackers are able to use to get into your computers and we want exit. So you need to do that you should be dabbling for all legally from reputable sources that don't use any. Calm you know don't be Gil again and to achieve these sites to download a half a world thing like that. Sure besides. A. Yeah that they've promised something freer without you know kind of appropriate. Deputy U not having papers something going on this site like that but you're in big that they can't spend sometime incredible. A little something also that which may make it. Just that how can we tell. World hack attack comes from. Well there's a lot of different information so when you go to law complicated it act in this certainly come back a lot of parts. What happened is is that you often end up leading kind of little fingerprints. Around that a lot of information about you. Some of the some of them are. Things like that cool techniques that you use and and there are things like servers. And software. That Altman to be common but you don't. Rewrite throw everything away much like you know specific burglar might use the same tools that they used over and over and over again rather than every time. Inventing absolutely new techniques to break into the news. So how can we tell the (%expletive) computer to connect. How can you took your computers attack so is it is part of a little difficult to tell there is sometimes awkward thing you can do. You you will perhaps see suspicious programs running. Or are other things like this but it is actually very difficult to tell them. Our most companies in fact don't know that they had someone go break into the system and killed more than six months after app. Exactly as this. Oh Phishing is when someone goes in need they handle it that's something. You're webmail account is honorable people. You'd have to reset your password. Quick that link. It things like that would ago and 800 emailed me Q in a future acute giving out we're all awkward isn't it hacker control over your computer. I'll and that was one of the techniques that would used your I'm that was easily in the depths than others to launch attacks against the anti. Now of course Donald Trump landed on the DMZ is security that it was too weak any truth to that at all. Well think it is obviously true that it was we cannot that they were negated by the Russians or getting a lot of other places as well and and frankly it. Very very hard to. Bad a system like this. So you could make the same criticism against. You know thousands of companies you could make it against the opium ops of personal management which was preached by Chinese attackers which old. All the very sensitive information about every one in the US for security clearance. Almost like crown jewels of personal records for the government so. Our you know I I think that there's enough blame to go around they're I. I think it's actually Kurt mark to have a system like that with a lot of volunteers that use the system and make it secure. Is is any system totally packing proof. You know if you go to your cases and let. Disconnect everything else and drop it in the middle the notion that pretty hard to break into. But in reality you can't really make it hacking group just like he may get a bank impossible rot you can just make it so that the amount after its network. I was a telling my producer and shortly before the show happen to me about a month ago like get an email that says it's from Chase Bank. It looked just like choice bank of the logo had everything perfect. And they were updating in my account and they needed me to verify and type in my Social Security number and my account lumber. And my first thought was this doesn't sound right choice would know Michael number and I've. Took deal work did not do it called choice and they said no that's fishing who's on a good example. Yeah that accurate example. And I think you know many people are seeing these more so you really have to be cautious and you beat it. So it's a good idea if the you do things like. I'm you know don't you know would be seen Melanie think it is for entries will go on Chase's website. And Google their phone numbers from there and then go and give them call it would sound like he's acting like what you do. I did just go ahead of the mean about it. Thank you for being part of the show as well. It touched ocean cut post assistant professor in the computer science and engineering department at NYU. Well if you wanna doubled to call its 260170. Of the overhead on your computer hack. Donald Trump after meeting with a top intelligence people of our country. Well he agrees. And accept the fact that it was Russia. Who was of the one that hacked the election. Try to influence the election with Hillary Clinton. But basically he's saying it's gross negligence by the Democratic National Committee that that that little wild but hacking to take a tumble blamed on them. And he says having a good relationship with Russia is a good thing that not a bad thing only stupid people or food pools with regular is that bad. We have enough problems around the world about yet another one. This is when I'm president Russia will respect thus far more. The and they do bill. Well do you agree at all with the Donald Trump that. Russia with Indian president is going to respect ocelot more. You can call me at 26 year old -- seventy another thing I picked up from the coach David fact I was talking to our last guest abolish those were talking about. Hacking computers morning now. Publishes a picture this is you see this it's by movies. Or in movies world. The good guys trying to get some information all the bad guys computers figure and you've got meat now working. First off from the couch ideas like that I think Bob might have now I can look for this they go into the office usually offices dark and they hit the computer screen. And it's as password. And all password outline on Avant. On the one and number two and then. If you fail the third time it freezes the computer correct. And watched the guy looks around the room. And he sees a picture of guy and his dog. And it says something like all celebrating and fight those seventh birthday are hot that's the password Ido finals seven. And it works and it works every time. Always on the third. Scene that's all right we'll keep watching them or like I wrote it's too early to seven. We're gonna go to Paul Paul thank you for calling WWL how are you this morning. Morning call Bob I would be out go. A million dollars though. We'd. Started looking borne out. In the header of the email. And talk about how to know your computers being attacked right. Like right now and it will be about being hat but more like someone trying to. This outlook pat your actual account and password yeah. That that outlook email about the integrity and they're being there are trying to match your email. Why putting in like say yeah I don't hate the united that the magic. Oh hello there but it will take but then. Actually the community to help it under the name and email there's even a special in its right. Some gun club ideologues. Only want one thing and one thing you should always do if view. Do not know where that emails coming from that spot from someone you don't just don't open appreciate you calling Paul today. The contest begins do you love that scene in the movie Jerry Maguire and always a Shelby and MIA. But you can win 1000. Dollars an hour remotely contest here on WWL. It's easy to play is either win. Was remote code worked weekdays ripe for the toppling our news at 7 AM. 11 AMP opium and poppy means we part of about ten minutes away. From that first. Money work 7 AM 11 AM 2 PM and 5 PM. Then checks that were 27288172881. Every weekday oral if you listen nationwide when 1000 girls don't forget to listen weekdays. Right before 7-Eleven. To implied take home. Remotely 1000 dollars from Smart radio in our common WW we'd never charged for text. But individual plan text and downwards to applaud and please Bill Clinton probably read a a couple problem a text messages of long. About respect I believe Russia will will respect us as most reliably that Mexico hold April wal. Well yes they will respect us more because nobody respects a welshman. All right 260 point 87 you can text via an 878 page seventy Donald Trump after meeting with top intelligence people. He's still not really pointing the finger at Russia he accepts. That Russia did the acting. He blamed on gross negligence by the Democratic National Committee. He's of the Republican National Committee has strong defense of why they went about hack them. And he said that again and again that does not mean in any way that this effect of the election. He went honestly haven't and a relationship with Russia is a good thing not a bad thing only stupid people are fooled you would think it's bad. He said we have enough problems were all the world vote yet another one. When I am president Russia will respect us for more than they do now in both countries will perhaps work together to solve. Some of the many great and pressing problems and issues. Of the world and that brings us to our Bill Gates and ready John gore opinion poll. Donald Trump accepts that hatched in Russia should he punished Russia or extend an olive branch let me. Sealer on line polls running right now WWL dot com 41%. Say punish Russia. And 59% say it's done the Albert what are usually extend the olive branches little 10 listeners response. A text. Here's one hour sworn enemy Russia campaign for this person prone to win the election. This factual warning flags waving in front of everyone can you say puppet. Trump says he wants his administration to develop a plan and its first ninety days to aggressively combat and stop cyber attacks. Trumps of the nation's government's. Organization association. All need to strengthen their cyber security efforts he adds that security methods tools and tactics should not be a public discussion. That will benefit those who seek. Us harm. I agree with that you know I don't think there's an important. Telling people things that you were doing. To take in. Protect. Your computer like you. Would not go on line you would not announce plans that you have to upgrade your security I don't think that the country should do the user now on next hour. We're going to be talking about that horrible situation. That happened and floor five people are dead. Eight people injured. After a shooting at the Fort Lauderdale Hollywood airport the incident happened a row 1 PM. And the lower level baggage claim of terminal two for audio from the government. To simply had his gun checked. You can't carry it on the plane so we had a check the luggage. And grabbed his luggage. Went in the bathroom. Of his gun out. Loaded with ammo and began shooting and with interest and here's interest in his passengers. Can bring their firearms and ammunition if they are checked in luggage and not carried the capital play and however. Even things like sparklers have trotted packed out for fourth of July celebration or strictly prohibited by the airline's no exception. And what I find interesting here passengers. You have leadership who confiscated. The fourth take up issues. In the name of security but you can still check firearms in your life is now do you think that in the future. Can you imagine under any circumstance. Where are. We're gonna start banning people from packing their a you know putting guns in their luggage and and ship and where they're going. Mean what happens if if you a while ago on a permit. And you went from one state to the other. You can't can't bring your go on with him. You think we should extend that you do you think that's going to happen the I don't know what more we can possibly do. To prevent these things from my own personal opinion. Is a person wants to do if they're going to do evil element no matter what you do. So do you think as we go into the future would you be in favor of a band. We'll check in weapons on an airline mean right now we all complain about the long security Owens. And some of the invasive methods used by the screen complain about that all the time. So what more are you willing to do for the sake of safety talk about that next hour right here on WWL.