back to indexFamily Retreat Seminar: Cyber Security

00:00:00.000 |
Welcome to Cybersecurity and Internet Safety for Kids. 00:00:07.000 |
Why don't we go ahead and pray and then we'll jump into the seminar today. 00:00:16.000 |
Father, we thank you for just the opportunity to talk about some practical things that parents 00:00:23.000 |
deal with, that we deal with for God's sake in this world. 00:00:27.000 |
Lord, as we've been encouraged by anchoring to Christ, I pray Lord God that you continue 00:00:33.000 |
to motivate us to look at things Lord God would spiritualize, that you give us much 00:00:39.000 |
wisdom as we try to raise our kids in awareness, but most importantly Lord God that we pray 00:00:46.000 |
that we can have just the opportunity to share the gospel with them that they can come to 00:00:54.000 |
So with all the challenges that we face in this world I pray that we glean some wisdom 00:01:00.000 |
from today's seminar and may you use it for your glory as in all things that we do. 00:01:11.000 |
Alright, so the genesis of how this class kind of happened, you might be thinking like 00:01:19.000 |
how did this come out of a seminar for anchoring to Christ? 00:01:24.000 |
So there were some moms in our Sprouts ministry that wanted some kind of information on how 00:01:31.000 |
to make the internet usage for their kids safer. 00:01:34.000 |
So that was the genesis, that was talked about months ago and then the opportunity came where 00:01:40.000 |
a seminar topic was discussed, hey maybe Elder Joe can talk about cyber security. 00:01:46.000 |
Now you might wonder like Elder Joseph Jett, how's that have anything to do with cyber? 00:01:54.000 |
I'm a detective with the Oregon Police Department. 00:02:01.000 |
I basically, I'm on a FBI cyber crime task force for the last five years. 00:02:10.000 |
Maybe not specifically dealing with some of this, but for the most part, everything technology 00:02:18.000 |
related to computers, internet, that's what I do. 00:02:22.000 |
This is an interesting quote, technology is only technology to those who were born before. 00:02:27.000 |
So case in point, maybe some of you guys are old enough to understand this video. 00:02:40.000 |
You have four minutes to dial that phone number. 00:04:24.000 |
If you look confused, you have to lift the phone if you're too young to understand. 00:04:44.000 |
Some current trends, some risks of devices and social media, and then what to do with those things. 00:04:53.000 |
So being naive is not your calling as a believer. 00:04:56.000 |
We're not expected to just let the world kind of dictate how we process the Internet and cybersecurity. 00:05:04.000 |
So Matthew 10, 16, 17 says, "I'm sending you out like sheep among wolves. 00:05:10.000 |
Therefore, be as shrewd as snakes and as innocent as devils. 00:05:14.000 |
Be on your guard and you'll be handed over to local councils and be flogged and sent to the guards." 00:05:19.000 |
So obviously not directly related to cybersecurity for the disciples back then, 00:05:24.000 |
but this is the principle that the world is after us. 00:05:35.000 |
"In the way you used to live, when you followed the ways of this world and of the ruler of the kingdom of the air, 00:05:40.000 |
the spirit who is now at work and those who are disobedient, remember, we have an enemy." 00:05:47.000 |
Spiritual insight and where we're taught connects us to evaluating physical world applications. 00:05:52.000 |
So when we think of how we function in the world, we've got to think with a biblical worldview. 00:05:57.000 |
So how does a biblical worldview dictate how we respond and how we protect and how we use the Internet? 00:06:07.000 |
So why do we need to talk about cybersecurity? 00:06:13.000 |
So everyone recently, the Capital One, the hack, I think it was a billion or 200 million accounts were exposed. 00:06:25.000 |
This is just an example of just what's going on, not even in the Christian world, everybody. 00:06:38.000 |
So this is a good example of just the background of what the Internet is. 00:06:44.000 |
Anyone know what the dark web is? You've heard of it, right? 00:06:48.000 |
So anyone know what the deep web is? Have you heard that term? 00:06:56.000 |
Surface web, like the example says, is an iceberg, the tip of the iceberg. 00:07:00.000 |
Google, what you can see on regular websites. 00:07:03.000 |
Deep web is kind of like everything you log into, your Gmail account, everything with a password and user, a username and password. 00:07:11.000 |
And then if you've watched the news, you know about the dark web. 00:07:17.000 |
Illegal stuff, drug trafficking, all the bad stuff we don't even talk about. 00:07:25.000 |
If you think about how much drugs are being purchased on the Internet through the dark web, the scale is pretty big. 00:07:33.000 |
And me and law enforcement, we're way behind the curve for that. 00:07:37.000 |
And then obviously, they'll sell your information on the dark web. 00:07:46.000 |
Name, social security, date of birth. That's the three keys. 00:07:50.000 |
If I have that, I can open lines of credit in your name. 00:07:54.000 |
That's basically the gateway to your identity. 00:07:57.000 |
So obviously, this is something that's very prevalent in the news. 00:08:02.000 |
And who's ever had their credit card compromised? 00:08:10.000 |
So when we talk about phishing, so obviously, this is a church retreat. 00:08:18.000 |
How many of you guys from your companies know about phishing? 00:08:28.000 |
So the difficult part is if you see this on a link, what do you notice? 00:08:49.000 |
So all of these websites are legitimate, but they can be illegitimized easily. 00:09:00.000 |
So this is something that a warning you might get when someone's accessing your passcode. 00:09:06.000 |
If you follow our Facebook page, this is an e-mail from Jason Choi. 00:09:14.000 |
Google is trying its best to try to figure out, okay, this might be a phishing scam. 00:09:22.000 |
But you have to understand, any kind of link, there's a possibility it's going to take you, 00:09:29.000 |
and there's multiple different problems with that. 00:09:36.000 |
American Airlines sends you an e-mail saying, "Oh, can you confirm this travel ticket you have?" 00:09:44.000 |
It goes to the American Airlines website, log in, and then put in your information. 00:09:58.000 |
So the challenge with what I had to kind of whittle down what to talk about. 00:10:07.000 |
There's a lot of time after this if you want to ask questions. 00:10:15.000 |
Okay, ransomware is basically you click on a link, and it encrypts all your drives. 00:10:21.000 |
So it's basically--they want ransom because you don't get your data. 00:10:25.000 |
All your pictures, they've encrypted it, and they have the key. 00:10:29.000 |
They won't give you the key unless you pay them. 00:10:31.000 |
So all your family photos--this is more on the commercial side in businesses. 00:10:36.000 |
All this critical data gets encrypted for functioning of business, and they can't function. 00:10:43.000 |
So a lot of businesses will wind up paying thousands of dollars for that key. 00:10:49.000 |
Spear phishing is basically the idea of sending the CEO of a company or an employee an email, 00:11:00.000 |
Doxing is the idea of basically politicians right now, they basically get doxed, 00:11:08.000 |
meaning hackers will go in and release all of their personal information on the Internet, 00:11:12.000 |
where they live, who their family members are, and all that. 00:11:26.000 |
Identity theft, and then obviously your data is already out there. 00:11:32.000 |
If you're a part of the Equifax, that's a billion. 00:11:35.000 |
So all of these things are out there in the open. 00:11:43.000 |
So when you think about cyber threats, these are typically--you have the activism, 00:11:57.000 |
Oh, that's the secret, like spy stuff, terrorism, and then nation states. 00:12:04.000 |
For us normal people who are living day to day, we don't get most of this. 00:12:10.000 |
It might just probably be the crime, the guy who's hoping to send you an email and you click on it. 00:12:22.000 |
The user is going to want to click on that video. 00:12:30.000 |
We are inquisitive in nature of how we do things. 00:12:34.000 |
So we won't press, "Oh, what's this big--it has a little Play logo. 00:12:46.000 |
First step, I live in a world of cynicism and skepticism because people lie to me when I work. 00:12:55.000 |
So whenever you deal with any kind of what we call PII, you have to be skeptical. 00:13:03.000 |
People who answer the robo calls and say, "Hey, you need to send money," or the IRS is going to come after you. 00:13:14.000 |
"Go to 7-Eleven, go buy some gift cards, and scratch it off and tell me over the phone." 00:13:26.000 |
Hopefully you haven't done it, but people fall for it daily. 00:13:33.000 |
They're talking to the--to basically the criminal, saying, "Which one should I buy?" 00:13:39.000 |
And they're taking it from the 7-Eleven or Target or wherever. 00:13:46.000 |
Typically, people who fall for that really don't know anything about technology. 00:13:56.000 |
So that same password--who uses the same password? 00:14:20.000 |
So basically, one of those passwords is probably floating out there. 00:14:25.000 |
So part of my job right now is to hack into computers of criminals, right? 00:14:31.000 |
And hopefully their passwords are floating around. 00:14:34.000 |
So right now, I have a--I'm actually working on one right now that's--we're trying to get 900 billion passwords right now. 00:14:42.000 |
So it takes--900 billion, it'll take 15 days to try 900 billion. 00:15:01.000 |
Basically, it's a program that you--basically, it's a vault, right? 00:15:07.000 |
All you need is one master password that is too strong, and then it builds passwords for you, like long 15-character ones with uppercase, lowercase, symbols, and whatnot. 00:15:21.000 |
But these are good for just your security overall. 00:15:25.000 |
If you use the same password for all your banging, then that gets compromised, and the likeliness of it might be higher for you because it's compromising your--in your bangs and whatnot. 00:15:40.000 |
So this is--this is probably even more secure than hard passwords, right? 00:15:45.000 |
When you log into Google, you get a text message, like, "Hey, what--I think Chase does it right now," if you have that on, right? 00:15:53.000 |
So that--basically, you need a password, and you need a physical device. 00:15:58.000 |
So authentication is the problem in cybersecurity. 00:16:01.000 |
So they want to be able to authenticate that way. 00:16:07.000 |
So let me tell you what Internet of Things is. 00:16:09.000 |
Basically, everything that's not a computer or your phone or a tablet, basically your washing machine, your refrigerator, your IP cameras, your thermostats, all of those devices are called Internet of Things. 00:16:27.000 |
So this is the next generation of what's going to get hacked. 00:16:30.000 |
So because the security is not tight on this stuff. 00:16:35.000 |
Because there hasn't been a--like, you've heard of those baby monitors getting hacked, right? 00:16:40.000 |
And the male's voice starts speaking into this--like, if you watch the news, don't watch the news. 00:16:47.000 |
But they can hack those things, so be careful with those. 00:16:55.000 |
These are the things we typically think of when we're talking about Internet devices. 00:17:00.000 |
So, the crucial question, when is the right time for a phone for your kids? 00:17:10.000 |
What age did you give a mobile device, for those of you who have given, and why? 00:17:25.000 |
Our parents had to just, like, go out and play for the best, right? 00:17:29.000 |
Nowadays, it's like, you've got to have your phone on you. 00:17:37.000 |
So, those are the things, the challenges that we have. 00:17:49.000 |
But those are the worst-case scenarios, right? 00:17:58.000 |
You've got to think of social media like a public restroom. 00:18:01.000 |
You don't just, you know, you don't put out information that's private in a public restroom, okay? 00:18:14.000 |
There's, like, people reacting to this, so I've got to kind of qualify it. 00:18:17.000 |
They do bleep it out, but, you know, we're at a church retreat, so there's nothing, like, too hard. 00:18:25.000 |
Hi, I'm Jack Vale, and I want to see how easy it would be to get personal information from complete strangers. 00:18:31.000 |
And while I'm at it, of course, freak them out a little bit. 00:18:33.000 |
Keep in mind, when you watch this video, I got all of this information just by searching their personal social media posts. 00:18:40.000 |
And I got it by searching for the closest Twitter, Instagram, and other social media posts to my current location. 00:19:04.000 |
I know it's weird, but I have to shout it out to see if I'm right, and in that case, I was right, so. 00:19:21.000 |
Yeah, I know. I was just going to say happy birthday. 00:19:25.000 |
Someone in your family is referred to as pop. 00:19:33.000 |
Happy birthday to you too, because I know you were actually, I should have said it to you because you're 80 before. 00:19:37.000 |
I know, I'm just like, hey, it's been like seven weeks now or something. 00:19:46.000 |
Like a little white curly dog. Sort of like a little white dog. 00:19:56.000 |
It goes on for a long time. You guys have a lot of, basically, most of you use Instagram, Facebook, log it down to friends only, right? 00:20:05.000 |
But your kids, when they get older, when they start social media, if you don't talk to them, they might make you public. 00:20:12.000 |
So social engineering. What is social engineering? 00:20:16.000 |
Basically, it's basically tricking people into giving your information. 00:20:20.000 |
These robocalls, that's what social engineering is. 00:20:24.000 |
They're tricking you to worry about something. 00:20:32.000 |
Okay, so I can't call my kid, so do I trust this? 00:20:40.000 |
Kids use social media, so they post about personal information, vacation. 00:20:48.000 |
It's okay if they're all your friends, but if it's on public, then what? 00:20:53.000 |
You escape the location of your backpacker, right? 00:20:56.000 |
You're giving too much personal information out to the internet. 00:21:01.000 |
So beware of that when they're using social media. 00:21:05.000 |
The challenge is, if your kids are more technical than you, raise your hand. 00:21:14.000 |
The parents who have older children who are dealing with this, they are more technical than you. 00:21:26.000 |
How easy is it for a pedophile to pick up an underage child using social media? 00:21:31.000 |
I made a fake profile on Facebook posing as a 15-year-old boy. 00:21:35.000 |
With the parents' permission, I friend requested three girls ages 14, 13, and 12 years old. 00:21:40.000 |
I've been talking to these girls for the last three or four days, and today we're supposed to meet up. 00:21:44.000 |
What we found in this video is shocking and something everyone should see. 00:21:47.000 |
Be sure to watch until the end and use what we've learned in this video to better educate your friends and family.