Thứ Sáu, 30 tháng 6, 2017

Waching daily Jun 30 2017

Great news everyone!

– Some of the biggest players for Democratic fundraising from the November 2016 campaign

are back in Washington – working to make their voices heard on key legislation.

Some of Hillary Clinton's best fundraisers – some of whom raised hundreds of thousands

of dollars have turned themselves into prominent lobbyists in Washington and they have wasted

NO time going after the Republican agenda… by….

Ummm… wait… they are supporting the Republican agenda?

That's right – the elites of the left are essentially the same elites on the right.

According to a report from The Intercept last week – have gone to work lobbying on behalf

of companies like AT&T, New York Life, and UnitedHealth.

People like Steve Elmendorf, who raised $341,000 for Hillary's campaign, and Heather Podesta,

who brought in $407,000 are working to undo the Obama administration's rule that required

financial planners to act in their client's best interests – instead of simply working

for profits.

Elmendorf is also working to help UnitedHeath undo key portions of the Affordable Care Act.

Several other prominent fundraisers are working to fight net neutrality practices.

And of course – we already know the Democratic Party's love affair with GoldmanSachs.

But, perhaps the worst of the defections are donors that are now throwing extreme amounts

of money into the McCain Institute – yes John McCain's foundation.

People like the Rothschilds, the company Teneo, and yes – even George Soros are funding

McCain now, after being major Clinton donors.

Look, I'm not saying this to rail on Hillary or her campaign.

But, if you think for one minute that there is a significant difference between corporate

democrats and corporate republicans, then you are sorely mistaken.

Trump ran and won preying on America's fears of their corporate overlords.

Think about that, people are so afraid of the corporately-owned government that they

elected a billionaire that simply gave even MORE of the government to corporate interests.

But that's the point – even when we think we are fighting against the things ruining

our country, we are simply perpetuating them.

Most, not all, but most of our elected officials don't give a damn about what is best for

you, the American people.

Sure, they will raise hell in front of the cameras and vote fiercely on party-line bills.

But ultimately, we are the ones getting screwed.

We have completely lost control of our government.

Democrat or Republican, they are fighting to protect the rights of special interest

groups, not the populous.

They fight to protect banks, defense contractors, chemical companies, and insurance companies.

Sure, the two sides will put up an argument saying they are going to make a difference.

They'll talk about better healthcare or tax reforms, but the whole while – what

we end up with is a watered-down solution that really doesn't change much, meanwhile

the rich get richer and we are left with the burden.

That's the real problem – if we lived in an alternate universe, where Hillary would

have won the Presidency, we could still be looking at Net Neutrality vanishing, the ACA

being neutered, and big banks being deregulated.

The only difference is that Clinton would have surrounded her policy moves with popular

left-leaning speech.

Trump and Clinton are the same entrée – the only difference is the side dishes.

But, this is it – corporate politicians, the American people are starting to see behind

the curtain.

We can only hope that we are able to enact change swiftly – before more damage is done.

For more infomation >> Key Democratic Fundraisers are Now Pushing the Republican Agenda - Duration: 4:25.

-------------------------------------------

Buddy Thunderstruck - The New Sheriff (S1 Ep8) - Duration: 2:26.

Buddy Thunderstruck has made a fool out of me for the last time.

You say that a lot.

Maybe I'm not meant to be a cop.

So I'm taking an online test to find my real dream job.

"Do you like working outside?"

Yes.

"Do you like pumping gas?"

Yes.

Look at that!

It says my dream job is pumping gas.

Well, okie-dokie then.

Hoisenberry, I hereby resign!

You are the new sheriff of Greasepit! Ow!

Wow!

I'm gonna be the toughest sheriff ever.

Freeze.

Put your hands up.

Uh, okay, how does one do that?

Uh, it's easy.

It goes like this.

Whoa!

Ooh.

Aah.

Uh-oh, it's the cops.

Oh, it is on.

Yeah!

Okay, he's not chasing us.

Sorry to interrupt, but where is Sheriff Cannonball?

Cannonball works at Ziel's now.

Ow!

He made me, ow, sheriff.

You "sheriff?"

The town's doomed!

Robby's totally owning you.

Ow!

Crime cannot just run rampant.

More importantly I want my car chases back.

Don't you worry your cute little face, we'll get Cannonball to be sheriff again.

Hang in there.

Thanks.

Aah!

Ah, man, the job is simple.

Pump gas, fix cars, and turn away all the ladies that come asking for Old Leroy.

There's only so much of me to go around.

Absolutely, sir.

Well, good luck.

Let's make him so angry that he flips out on us paying customers.

Bosses hate that!

Oh, no, no, no, no.

You deadbeats ain't comin' around and messing things up for me here.

You're in the service industry now, pal.

Pump some gas and pump some air in my tires you pump jockey.

Ew!

Cannonball!

Man!

That was not me!

You are gross, man!

Now check the oil, Mr. Farty Butt.

I'm gonna tear off your head, hollow out your skull, and use it as a dishwasher-safe

decorative bowl!

For more infomation >> Buddy Thunderstruck - The New Sheriff (S1 Ep8) - Duration: 2:26.

-------------------------------------------

Ki.nh H.oàng khi Sống Chung với Gia đình Bố Mẹ Chồng Phát Hiện ra điều này ... - Duration: 1:03:53.

For more infomation >> Ki.nh H.oàng khi Sống Chung với Gia đình Bố Mẹ Chồng Phát Hiện ra điều này ... - Duration: 1:03:53.

-------------------------------------------

Kamen Rider Blade THEME SONG /仮面ライダー剣 OP cover by atsuki - Duration: 4:35.

Tatta hitorikiri kimi no sonzai ga Itsuka sekai no subete kaeru darou

Koko ni aru mo no wa kibou? zetsubou? Round Zero hajimatteru

Shiranai to iu tsumi to shirisugiru wana Ugokenaku naru mae ni ugokidasou

Kaze ni mekurareta card Uranau you ni warau

Mayounai hazu mo nai soredemo ashita wo sagase

Mekurumeku unmei Koware sou na jidai ni

Kirifuda wa kimi no naka... togisumasareta yuuki ni shite BLADE BRAVE

Arashi sugisatte asa ga kuru basho Nanimo kawaranai hodo odayaka demo...

Chizu mo tokei sae imi wo motanai Round Zero arukidashita

Nani ga shinpo shitatoshite kawaranai mo no Taisetsu na kotoba dake katare your mind

Koware sou na mirai wo Mamoru no wa dare na no?

Mushinai de torimidashite jibun ni tadori tsukeba ii

Kono sekai no Mystery Tokiakasareru toki

Dare datte taisetsu na kotae wo mitsukeru tame no message BLADE BRAVE

Shiranai to iu tsumi to shirisugiru wana Ugokenaku naru mae ni ugokidasou

Kaze ni mekurareta card Uranau you ni warau

Mayounai hazu mo nai soredemo ashita wo sagase

Mekurumeku unmei Koware sou na jidai ni

Kirifuda wa kimi no naka... togisumasareta yuuki ni shite BLADE BRAVE

BLADE BRAVE BLADE BLADE BRAVE BLADE

For more infomation >> Kamen Rider Blade THEME SONG /仮面ライダー剣 OP cover by atsuki - Duration: 4:35.

-------------------------------------------

Cyberattacks: The Weapon of Choice of Criminals, Terrorists and Spies - Duration: 49:02.

- Hello everyone

and thank you for joining us.

Tonight we're gonna learn that increased

reliance on the internet exposes us to threats

such as identity theft

and malware outbreaks

along with software and business attacks

which ultimately affect us all.

Tonight's speaker is William Ebersole

known by everyone as Billy.

I've known Billy for 15 years

and he has been a friend

to the Pennsylvania College of Technology

and has provided support

and guidance for our students.

Billy has been a special agent

along with the Federal Bureau of Investigation

for over 21 years.

He served in the Newark

and Philadelphia field offices

and has completed multiple overseas assignments.

Billy is a member of the Child Exploitation Task Force

for north central Pennsylvania.

He is also our local InfraGard coordinator

which is an FBI alliance

with academia

and private industry

designed to promote cybersecurity awareness.

Billy is a licensed attorney and CPA,

a certified fraud examiner,

and is now teaching at Penn College

as an adjunct instructor

in accounting department.

Billy frequently presents on behalf

of the FBI on topics such as

active shooter, weapons of mass destruction,

and cybersecurity.

Tonight's presentation will raise awareness

of the need to maintain sound cyber

security practices at home

and at work.

Let's welcome Billy.

(applause)

- Good evening everyone

and thank you.

Tonight we're gonna talk about cybersecurity.

And it's an important topic to me

for a variety of reasons.

Not just because of my position with the FBI

but also because I had my records

breached a couple years ago

through a hack on the office

of personnel management.

Now, before we get into the presentation proper,

I require because of my position to make

a couple disclaimers.

One of which is tonight we're gonna talk

about my opinions,

not the FBI's opinions

or the US government.

And number two,

tonight we're gonna talk about

a couple different hacks

from different countries.

And by no means do we mean to imply

that one particular country, ethnic group,

or religious group is responsible

solely for criminal activity.

It's something that affects us all

to include everyone here in the United States.

Now, we're gonna talk about why cybersecurity

is important.

We're gonna talk about the areas that we're vulnerable

and then we're gonna talk about

what we can do to protect ourselves.

And as we'll see,

it doesn't have to be a technical resolution.

In fact, I'm not a technical person.

We'll have a discussion about some behavior

modifications called cyber hygiene

and that'll help us be safe

in a computing environment.

Now, as I said a couple minutes ago,

my records were hacked.

It was personally identifiable information

that was compromised, PII.

And Professor Bock had talked about that

in her Colloquia

and how it's important.

When we talk about PII

we talk about our name,

our date of birth,

our social security number,

and other unique identifiers.

And we use this information

to file our taxes,

we use it to get loans,

we use it sometimes for healthcare treatment,

and we use it for travel.

And when that information gets compromised,

it could potentially affect us

in all of those arenas.

So, after my records were hacked,

I thought well let me embark

on some kind of journey

to figure out what I can do

to protect my records

and ultimately what I can do

to help protect the community

in my position with the Bureau.

Now, those of you who are in the 50 something

generation should remember that iconic

early 1980s movie called War Games.

And who could forget that digitized voice

that came across the screen

and said shall we play a game?

Now, that's Hollywood's depiction

from many years ago

of a hacker.

And within that depiction we have

a high school student who inadvertently

triggers some events that might lead

to global thermal nuclear war

between the US and Russia.

And he did it with only a few keystrokes.

And that's the representation of Hollywood

which is not accurate.

As I began my journey,

I found a very good book

called Cybersecurity

and Cyberwar

What Everyone Needs to Know

and it's by PW Singer

and Alan Friedman.

And that's gonna bring up some very important

points in our discussion tonight.

The most salient point that Singer

and Friedman brought up for me

was that safe computing is more about

a behavioral change than implementation

of new and sophisticated technology.

So, before we get into the presentation,

we have to kind of define a couple of items

that we think are important.

And the first one is the internet of things.

And that is the term that applies to the billions

of consumer devices that are hooked up to the internet.

For example, a security camera in your home

is hooked up to your smartphone.

Or perhaps your refrigerator has

a camera inside it

and while you're shopping you can check

on your smartphone to see what kind

of groceries you need

and what kind of groceries you

don't have in your refrigerator.

These consumer devices are built

with efficiency in mind.

They're not built with safety

and security in mind.

The more devices that we have hooked

up to the internet,

the more cybersecurity incidents we're gonna happen.

When you connect to the internet

we refer to that as an attack surface.

And everywhere that you have an attack surface

is somewhere a hacker can penetrate.

And so, we want to talk about minimizing

our attack surfaces out there.

Now, the internet of things has done

an awful lot of good

and I don't mean to cast aspersions on it.

It's done a tremendous amount of good

in the area of medical technology

and it helps our physicians

and other medical professionals

take care of us from a distance.

But there's been a lot of phobia

in that area

and that phobia hit a high point

back in 2007 when then vice president

Dick Cheney had the wifi on his pacemaker

turned off because he was afraid

a hacker could get in

and alter the pacing of his pacemaker

and potentially get patient information.

Now, thankfully the Food and Drug Administration,

the medical profession,

and private industry

has done a lot to help minimize that type

of risk in the medical area.

But there's another area with

the internet of things that I want to talk about.

And I think it's important to us

in the Marcellus Shale region.

And that is a SCADA system,

supervisory control and data acquisition system.

These are computers that form part

of what we call a cyber physical system.

And by that I mean,

you have a computer that controls

a physical process.

So, you will see SCADA systems

on nuclear plants,

on dams,

on the electric grid,

and even on pipelines.

Now, with regard to a SCADA system,

they're particularly vulnerable.

One of the reasons is,

many folks who implement them

in private industry don't change

the default passwords

that they get from the manufacturer.

That vulnerability is so notorious

that in January of 2016,

a team of Russian scientists published

the top 100 passwords for SCADA systems

on the internet in the hopes

of getting the manufacturers

and other members of private industry

to change those passwords.

Another reason these are more vulnerable

is because more often now

they're hooked up to the internet of things.

So that the remote pipelines can

transmit data to a host system

perhaps say down in Houston Texas.

And finally,

many of these systems are designed

to last for a long time.

And what happens when you have a particular

system for a long time?

You have to replace various component parts.

And unfortunately,

the component parts aren't always compatible.

They're not always from the same manufacturer.

So, what happens is,

the inability to do a blanket

or comprehensive patch or update

to the security of any particular system.

And we'll talk about pipelines a little

bit more in the presentation.

Now, I want to talk about the internet.

And frequently you will see the internet

depicted as an iceberg.

On the top, on the surface,

is what we call the surface web.

That's where we go.

We use Google and other types of search engines.

So, if we wanted to look up Penn College,

we can do a Google search for Penn College

and that web page's index

so that Google could pick it up.

Underneath the surface web,

it's estimated that the internet

is about 500 times as big.

Part of that is the deep web.

And there's not anything necessarily bad

about the deep web.

It's just set apart,

it's a little bit different to get to,

you use a different type of search engine.

And it's where academics

or private industry

or maybe even the government

store voluminous amounts of records.

A subset of the deep web

is called the dark web.

And for government agents,

that's where we have a concern.

It's estimated that about 80% of the traffic

going to the dark web

is comprised of pedophiles.

And that has our attention.

Now, the deep web

and the dark web are a little bit different.

You get to them in a different area.

But for tonight's discussion,

we'll consider it somewhat of a subset

of the deep web.

Now, we have Bitcoin

and there's been a lot about Bitcoin in the news.

It's a type of cyber or cryptocurrency.

And I wanted to explain that term

for a minute.

This may seem foreign

but Bitcoin and other cyber currencies are digital.

They don't have tangible form like a $5 bill

or a quarter.

It might seem odd to us

but we've been using that form of currency

for a long time.

If you go to a hotel

and you stay a couple nights,

you get hotel points.

And perhaps after a year or two

you might build enough nights

to get a free night's stay

at whatever chain you choose.

Those hotel points have some type of value

from an economic perspective

but they're not necessarily something

you would trade each

and every day in normal locations.

With regard to Bitcoins,

they're entirely digital.

And it's part of a process.

They're created through a mining process

in a volunteer network of computers

and they're being used more and more

somewhat here in the United States.

But by design,

they're made to be secret.

It's very difficult to detect

the origin and transactions

in Bitcoins cause they don't go through banks

like a normal financial transaction would.

And there's a reason why our folks

on the dark web will use cryptocurrency

like Bitcoins.

And this is an example of a ransomware message.

This is a message you might get

on your computer screen if you've been compromised.

And basically the attacker is telling you

if you don't pay us,

in this case $200,

we're gonna encrypt all your files

and you won't be able to decrypt them.

Now, it purports to be from the FBI

and it's telling you that we've identified

child pornography on your computer

as well as some other types of unpleasantries.

I can assure you, number one, the FBI,

if we suspect you have child porn

on your computer,

we won't be emailing you about it,

we will be showing up at your residence.

And number two,

if we suspect you have child porn,

we will not be asking you to pay

the paltry sum of $200.

There'll be much more significant consequences.

But this is a message you will see on your computer

screen if you're hacked.

And what the folks want to do

many times is have you pay in Bitcoin

because it's a little bit more difficult

to track the finances when the payment's

made in Bitcoin on the internet.

Not only are computers susceptible to ransomware

but also smartphones

and potentially smart TVs

which would be a very big tragedy

in my household.

Another thing we want to look at

is what's called advanced persistent threat.

Unlike what we saw in the movie War Games,

an APT is gonna be state sponsored

or state acknowledged, state supported.

Or it will be part of a very sophisticated

criminal ring.

Advanced persistent threats are not

your high school hackers.

They are folks who are focused.

They're not going into a system willy nilly

and trying to take all kinds of records.

They're going in for a very precise reason

and we'll talk in a minute.

I think a lot of that is financial in nature.

They are persistent which means they maintain

their presence in your system

for a long time.

We have seen APTs last in a system

for over four years.

They're motivation,

it could be the gathering of intelligence.

Not just say military intelligence

but from our perspective financial intelligence.

And finally,

are these folks sophisticated?

The folks who use the advanced

persistent threat malware?

Well sometimes they are but not always.

Time after time,

one of the most significant

and successful techniques is spearfishing.

And that's where you get that unsolicited email

which says perhaps you're getting some free software

or maybe the answers to your test,

or some free music

and all you gotta do is click

on this document.

And when you click on that document

a file begins to execute

and your computer is now compromised.

This is one of the single most successful

techniques in the hackers quiver.

And the reason why is because it works.

These folks are very good at crafting

the email and getting your attention

and not appearing to be hackers.

Now, we want to talk about the onion router.

As I said before,

the dark web is accessed a little bit differently

than you would do a Google search

or go to the deep web.

And one of the ways you can access it

is through the onion router.

And that's basically free software

that you can download from the Tor project

install it and you can go

and communicate through a volunteer network

of computers.

You're not gonna be communicating

through particularly like a server here

as we have in Penn College.

That communication that you will use is encrypted.

And it's encrypted like an onion.

There's multiple layers

and as the communication goes

from computer to computer to computer

it is slowly removed

hence the analogy towards an onion.

Now, Tor itself isn't all that bad.

It was developed by the United States Navy

and it was given an award a couple years ago

for outstanding free software

because it facilitated the communication

of over 20 million people who live

in repressive countries

and don't have access to the internet

like we have here in the United States.

But to a federal agent,

Tor suggests the presence

of something potentially nefarious.

Not always,

but sometimes it could lead,

for example,

to a pedophile.

It could lead,

for example,

to a person who's buying drugs

on the internet.

And one of the famous cases,

which was originally worked in this area,

was called silk road.

And the investigative task force

was down in Baltimore area.

Basically a young man put up

a marketplace on the dark web

and in about a year and a half

almost two years he serviced

over 100,000 customers.

Folks went there to buy drugs and poisons,

to get murder for hire,

they bought prepackaged malware

that they could use against someone.

And after a period of time,

the entire government at all levels

came together and took down the silk road.

Silk road was accessed using the Tor browser.

Now, when we talk about cyber crime,

we look at the computer in one of two manners.

Number one,

the computer is the instrument

of the attack.

Or number two,

the computer is the victim of the attack.

In recent memory,

our most significant cyber crime case was Target.

Over 100 million people had their personally

identifiable information compromised.

40 million debits and credit cards

were compromised.

Some incredible litigation

in a variety of venues.

What most folks didn't realize

is Target wasn't the initial point of compromise.

There was an HVAC company here in Pennsylvania

and unfortunately an employee

unwittingly opened up on a spearfishing email

and that released the virus.

This HVAC company was providing

climate control services for all

the stores nationwide.

And the attackers were able basically

to get into the Target system

through a back door.

Now, Target went out

and had Verizon the phone company do a study.

And Verizon does an awful lot

with data breach investigations.

And Verizon found a number of issues

but two of which are important tonight

because they come under the rubric

of cyber hygiene.

They found that Target was using

weak or default passwords.

And another issue they found

was that Target wasn't updating

their security software.

And we're gonna talk about the importance

of that in a minute.

But another researcher found that Target

put an awful lot of information online

to help the vendors

with the best of intentions.

But that the attackers were able

to use that information

and learn about Target's internal systems.

When we had the Colloquia,

The Good, the Bad, the Ugly Social Media,

one of the lessons that we learned

was sometimes we put too much information online.

So, as we talk about cybersecurity

and the need for passwords

and patching,

we also want to be very considerate

as to how much information we put online.

And remember that that stuff stays online forever.

Now, when we talk about terrorism

we talk about the use or threatened use

of force to advance some type of social, political,

or religious agenda.

Most folks,

when they talk about terrorism,

what comes to mind is some kind of violent action,

an explosion, a shooting, a sniper,

things along those lines.

In Bruce Willis' movie Live Free or Die Hard,

some of the opening scenes depicted

a terrorist group that wanted to eliminate

a particular victim so they rigged

the victim's computer

to blow up once log in credentials were entered

and ultimately the victim was killed.

Thankfully Singer and Friedman have pointed

out that no one has died from a terrorist

attack directly linked to a computer.

Now, Doctor Sinclair, in her Colloquia,

talked about social media

being used to facilitate propaganda

for terrorists groups.

I want to talk tonight about facilitation

and about planning as aspects of terrorism.

Ardit Ferizi is a very unfortunate case

and it's a very recent case.

At 21 years of age,

he hacked into a US base server.

It was for a retail outlet

and Ferizi got the personally identifiable information

of 1300 government employees.

Employees of both the civilian

and military side of the government.

Ferizi got this information,

he put it on the line

and he sent it to Junaid Hussain

who was an ISIS recruiter over

in the United Kingdom.

And basically they put it online

as a cyber hit list

or these are the targets that some

folks may want to take advantage of.

The personally identifiable information

was the government employee's name,

potentially addresses,

and other relevant data.

Fortunately, it was taken down

and Ferizi was arrested.

This past September,

very unfortunately,

Ferizi was given 20 years in jail

as a 21 year old man.

So, he has the best part of his life

he'll be spending behind bars

in a federal situation, a federal prison.

Hussain was subsequently killed

in an air strike.

Out of that investigation,

one of these postings was developed.

And it's public source information

and I wanted to bring it to our attention.

"We are in your emails

"and your computer systems

"watching and recording your every move.

"We have your names and addresses.

"We're in your emails

"and your social media account."

And, again, this is an admonishment

from a prior Colloquia,

The Good, the Bad, and the Ugly.

We are putting way too much information online.

In fact, in 2003 US forces were covered

in Al Qaeda training manual.

And within that training manual,

there were indications to new adherents

that 80% of what you will need

to effectuate an attack

you can find lawfully online.

You don't need to hack in to get it.

Now, another area that we want to talk about

is our infrastructure.

And this comes under the rubric

of terrorism and planning.

Singer and Friedman noted that between

2011 and 2013 there was a 1700% increase

in the scanning of the computer systems

associated with our critical infrastructure

like pipelines,

and the water companies,

and the electrical grid.

And the scanning is nothing more

than a digital attempt

to identify vulnerabilities

in someone else's system.

In the Marcellus Shale region,

we have 17 pipeline projects

that will be completed within

the next year or two.

Approximately 17 and a half billion

cubic feet of natural gas

will be moved every day

from this region

to local power plants,

to ships where it's gonna be taken overseas.

And a significant cyber attack

or an attack that will shut down

an entire company's traffic

will cost an approximate $8.5 million per day.

Now, I don't mean to imply

that what we have to worry about here

is a physical assault on the pipeline.

But about 50% of the cyber attacks

in the energy arena target the SCADA systems.

And what's significant about the SCADA systems?

Well, it could be a back door

into your information technology systems.

And that's where the attackers can get

what I call intellectual property.

The vendor list,

a significant process,

a customer list.

This is information that is very important

to our private industry counterparts.

I didn't want to cause too much unrest

when I talked about the pipelines

and I thought we would look at a rather

heinous example where some hackers hit

an electric grid.

This was in December of 2015.

In fact, it was December 23 of 2015.

Hackers hit three electric companies

in the Ukraine.

The result of the hack affected 225,000 people,

spread out over about two dozen substations.

So, basically over 200,000 people

were without power for a couple days.

What made this attack even more heinous

was the attackers followed up

with a second cyber attack.

And what they did was a distributed denial of service

attack on the electric companies phone system.

So, what that meant is they had a network

of computers sending meaningless data

to the phones for all the electric companies involved.

So, any time you called after your power went out,

you would get a busy signal.

And that caused a lot of anxiety.

But then again after two or three days

it was up and running.

And thankfully our private industry counterparts

prepare for this type of activity each

and every day.

Now, when we talk about cyber espionage,

what we're talking about is using a computer

to unlawfully gain the intellectual property

of someone else.

Now, we talked about Verizon

and Verizon did a study of the 2015 hacks

and they published this study in 2016.

And what Verizon found was over 80%

of the confirmed attacks in 2015

had some type of financial

or economic espionage motive.

And they also found out that 83%

of the hacks in 2015 could have been prevented

by employing a patch which

was readily available at the time of the hack.

And about 60% of the attacks

involved a default, a weak, or stolen password.

Now, when we talk about hackers who are interested

in the energy arena,

what comes to mind is the night dragon malware.

And this is just a graphic representation.

But the night dragon was designed years ago

to penetrate financial institutions

and steal financial information.

But the developers of night dragon realized

it was like a Swiss army knife.

It had multiple uses,

it could work in multiple arenas.

The night dragon is a thief.

The night dragon is not a destroyer.

You deploy night dragon

to develop information

not to shut down someone's computer,

not to shut down their network,

and not to deface their website.

The night dragon is credited

with stealing billions of dollars

in intellectual property

from the Defense Department,

the defense industry,

IT industry,

and also the energy industry.

Now, we've talked about some of the threats.

Whether it's a crime,

a terrorist group,

or a spy.

And in particular,

I think the areas we want to be concerned about

are protecting our infrastructure

and also protecting our company's

intellectual property.

Because they work hard

and their efforts are certainly part

of our national security fabric.

I'm not a technical person.

But there are ways we're gonna talk about

called cyber hygiene that will help us

protect a wide variety of our resources

from some of the threats we talked about tonight.

Number one, passwords.

We want to have strong passwords.

And notice I didn't say long passwords.

Cause you know what happens when people

have long passwords?

They write 'em down.

And then they get the yellow sticky note syndrome.

That means they have a fabulous password

that's on a yellow sticky note

which is posted on their monitor

and everyone can see it.

So, you want to avoid the long passwords

but you want to have a strong password.

Which means you use uppercase, lowercase,

maybe a number or two,

and you also want to use a special sign

like a pound sign or a dollar sign.

And you want to change your passwords frequently.

The NSA recommends that we change passwords

about every 90 days

and that we don't use the same password

in a two year period

or a three year period of time.

Now, another thing you want to do with your network

is count your devices.

So, if you go home tonight

and you have your own little network,

and you know you have a laptop,

an iPad, a wireless computer,

you want to go in and check your network

to make sure that you just have three devices.

And that you don't have a neighbor

or someone driving by using your wifi.

If you have an extra device,

you have an extra attack surface.

And really this is an issue

for the least common denominator.

So, whichever device has the least security

that's the device that'll get compromised.

So, you would hope that your network

is secure but maybe that person

from the neighborhood who's invading

your network doesn't have the same level

of security as you do.

And another thing you want to do

is configure your devices.

So, when you buy that new router,

you come home,

you change the default password.

And make sure that you have a unique password

because these folks know the technology

and they know the manufacturing passwords

that are installed.

You also want to limit what you put

on the internet.

As I said a couple times,

and as was discussed in a prior Colloquia,

we want to make sure that what's out there

is an accurate representation

and cannot be used against us.

And, in particular,

social media.

Another thing we want to do is watch our children.

I am convinced that anyone under the age of 18

should not be alone with a computational device.

As Professor Bock said,

I'm part of the child exploitation task force.

We deal with online predators

and these subjects are as savvy

and as manipulative as any serial

killer I've ever come across.

They are master manipulators

of circumstance and people.

And we don't want our children exposed to that.

Another thing we want to do is update and patch.

And you see there a quick message on the screen

that it's time to update your phone.

That's a very frustrating message to get

especially when you're trying to dial

make a quick call

and get done with your business.

There is a reason why software manufacturers do patching.

When a software manufacturer identifies

what's called a zero day exploit,

where it's a defect in the software

that has not been known before,

the software manufacturer wants to protect you.

So, they develop a patch

and they get it out right away.

And the reason why they want it out right away,

is because the bad guys,

the hackers,

are looking for zero day exploits.

Which they will take advantage of

or they will sell on the dark web

to someone else to take advantage of.

And finally,

what we want to do is repeat.

We want to do all of these steps

over and over again.

Having a secure network tonight,

does not guarantee next month

that you'll have a secure network.

So, you want to make sure

you update your patch,

you change your passwords,

and you follow good computational practices.

Now, I did a little research quick

to find the top passwords for 2016.

With the idea we want to avoid all

of those in 2017.

Because they're already well known

in the hacking community.

And I put a couple of these here tonight

to talk about 'em real quick.

Number one, password.

Or any logical combination thereof,

like password1234, password6789.

Definitely one you want to avoid.

Number two, 123456,

or any logical combination thereof, like 654321.

Another one, letmein.

Way overused in 2016.

My personal favorite,

trustno1.

And finally, gwerty.

Anybody know where that password comes from?

(inaudible)

The text on the top part

of the keyboard with your left hand.

Now, Singer and Friedman talked about

the value of information sharing.

In 2008, there was a study where a number

of IT security firms came in

and looked at a number of banks.

In particular, the bank's exposure

to spearfishing emails.

And at the end of the study,

the IT firms concluded that if they were able

to share all of their information

with all of the banks,

they would have collectively saved about $330 million.

And that is just in the arena

of dealing with spearfishing emails.

Now, here at Penn College,

we host InfraGard

which is our form,

on the federal government level,

of sharing information.

We have manufacturers,

we have healthcare,

all the aspects of private industry,

the banking industry,

and also the government.

And we are having a security seminar June 2

here at the student servicing center.

And I would encourage all of you

if you have information

or you want to learn about this arena,

to come out on June 2

where will openly discuss issues.

A lot of times folks are a little bit

concerned about sharing security issues

with the government

because they don't want to get into trouble.

But this forum here

which is facilitated by Penn College,

is very useful

and it's a non-judgemental forum.

And it's also a great way

to meet a potential new employer.

Now training is another thing

that Friedman and Singer brought out.

And I've been very lucky over the past several years

not only to be part of the accounting department,

but also to be part of the IT department

on their advisory board.

We have a wonderful information security

assurance program and our students

are graduating getting tremendous jobs.

They're some of the best equipped

in the arena

and that is something for this school

to be very proud of.

It is projected by the year 2020

that we will need 1.4 million students

who are technically competent

in the arena of cybersecurity.

However, only about 400,000 of those graduates

will meet that standard.

And what does that say to me?

Well, the rest of us,

we need to engage in a little bit of cross training.

So, whatever our major is,

whatever our background is,

whether we're in school or out of school,

we need to learn some of the basics

about cyber hygiene.

Protecting our passwords,

updating our passwords,

and making sure that we employ those patches.

Now, as I transition into the next part

of the presentation,

I just wanted to let you know my references here

are posted they're part of the PowerPoint.

It was a very interesting study

for me to engage in

and if any of you especially the students

want to follow this type of academic pursuit,

certainly feel free to access these resources.

(applause)

- On the subject of password requirements,

do you feel that websites that require certain

links or certain characters in their passwords

are causing more of a problem with security

since they're expecting those characters

for those websites' passwords?

- Well, that's kind of a broad question.

We'd have to look at the individual websites

and don't forget in my capacity

I can't say what's a good practice

or not a good practice per say officially.

But I think it's up to the individual website

and how they implement that protocol.

- Can you speak specifically to a cyber hygiene

in light of the current precedence

on leaks of domestic intelligence programs?

- Well, I don't know that both would be related.

Cyber hygiene is going to prevent someone

from accessing your information.

When you're talking about that other area

with leaks and all of that,

that's a little bit far afield because

you're talking about an intent.

And that becomes a crime.

And in addition to that,

if there's something that's pending investigation,

or prosecution I wouldn't be able to talk about it.

But I see the cyber hygiene as something

that we can all use to protect ourselves.

When it comes to the leaks,

that's another arena because you stepped

over a criminal line there.

- You talked about like a joint effort

to close down the silk road.

And you also talked about the protection

of children over the internet

which I completely agree with.

Current statistics show like over 52%

of men currently watch pornography.

Why hasn't there been like a co-joint effort

to at least a percentage of pornography websites

by the US government?

- Well, the US government would investigate

acts of a criminal nature.

And pornography is not considered a crime

in and of itself.

The depiction of minors in bondage,

being tortured,

in sexually explicit positions,

being raped,

that is considered a crime in this country

and that's where our resources are directed.

- A pattern that I've noticed

is that a lot of people with social media

are putting updates as to what they're doing

every three to five minutes it seems like.

And generally speaking I'm always trying

to tell friends of mine that they need

to stop doing that.

Is there any advice that you have that

I could offer to them to try

and convince them to stop giving so much information?

- With regard to social media,

you have to remember,

number one it's out there

and it's gonna be out there forever.

Even if you think it's deleted.

Number two,

all of us will go on to apply for jobs.

And more and more not just in the government

but private industry

is looking into social media

before they hire someone

or before they promote someone

to a key position.

So, you want to make sure

that you present the most professional

image of yourself on social media.

I know Congress is looking to pass legislation

for any federal agent who keeps

a security clearance every five years you have

to turn over your social media

log in credentials

and our security squad will take

a look at it to make sure that

you've engaged in proper activity.

So, I would say from an economic standpoint,

you want to make sure you're

a viable candidate for employment.

Cause it's a tough market.

Don't let something crazy on social media

knock you out of the picture.

- Sidebar, in addition you also want

to take a close look at the privacy policies

of that site.

And check through what you want released

to the public.

So, that's something else you can do

and also it's good to try to educate your friends

cause that's another job we want you to do

is share this information

to your friends and family.

- So, there are children who have grown up

their entire life being online.

So, it's just kind of accepted

for them to do whatever.

Do you think schools should have a more active

role in telling them how much

it will impact them later on in life?

- Yeah, I think schools should.

And I can tell you,

I had an eye opener about a month ago

with my son.

We were talking to him about internet safety

and I think it was in the context of Minecraft

or something like that,

and he told my wife,

I'm not putting my date of birth in there,

I'm changing it by a year

and a month.

And this is someone in elementary school.

So, I think our schools are realizing

the importance of that.

And giving the kids some of the tools

they need to stay safe.

- What would be your response

to someone who says I have nothing

to hide and therefore they don't

use strong cyber hygiene?

- Well, that would be a mistake.

And it's also job security for myself

and Professor Bock.

It's not what you want to hide,

it's what you want to protect.

So, if they get ahold of your name,

your date of birth,

and your social security number,

they're gonna go out

and take out credit cards in your name.

They're gonna take out student loans in your name.

They're gonna travel in your name.

They may commit a crime in your name

and then the local police department

issues an arrest warrant in your name.

And if you get caught running through

a traffic light or a stop sign

it will take someone like me

a day or two to straighten out

what should be in your name

and what should be in the criminal's name.

And that typically is a day or two

while someone's in jail.

So, I would say even if you don't think

you have anything to lose,

your credit, your credit score is invaluable.

Protect it.

- So, I wanted to ask since you were talking

about the dark net and everything,

and you were discussing about how silk road

was closed down.

But there have been many reiterations

of silk road ever since the main one was shut down

and there's also tons of other illicit

marketplaces on the dark net,

such as assassinations, drugs,

child pornography, things like that.

Basically what I wanted to ask is

do you think it's at all possible

that all of this could be eradicated?

Or will there always be something

of this type existing online

just because of the anonymity provided

by Tor and just how difficult

it is to track these individuals down?

- I don't think we'll ever eradicate it all.

I think we can give best efforts

and typically law enforcement resources

are directed at the worst offenders.

And with silk road,

the founder was Ross Ulbricht

who had some connection to this area years ago.

But there was some murder for hire

allegations that surfaced rather quickly

and that's what caught

the government's attention very quickly.

So, certain websites

and certain marketplaces will garner

the government's attention

a whole lot quicker than others.

- Alright, so you talk a lot about

our government doing things for this and that.

What are other large countries

and states doing to help with this?

And is there any enemy states that

we're working against on this topic?

- Well, that's a very good question

and we do have quite a few partnerships out there.

The United Kingdom is a tremendous ally.

I have worked personally with various

governments over in Eastern Europe

because a lot of that comes

from that particular region.

If you look online

and you Google search the term hackerville

that will take you to a very specific

town in Romania where they just

do incredible amounts of targeting

in particular US interests.

We do get cooperation from a wide variety

of governments and that's consistent

with any other criminal enforcement.

Whether it's drugs, terrorism,

or the hacking,

it's dependent on a government by government basis.

And yes, some do cooperate more than others.

- You talk a little about the dark web

and policing things on there

and I understand a little of the operations

involved in that are involving multiple countries

and things that are pretty much globally illegal

but what do you do about things are legal

in other countries?

For instance,

where it's hosted but not in America?

- Well, you're gonna be judged by the laws

of this country if you are in this country

and you're engaging in activities that will

not be legal in this country.

For example,

we will have folks that travel

to certain countries

to engage in with sex with minors overseas.

That is specifically illegal,

Congress has passed statues

and it is enforced.

So, even though you haven't committed

the conduct here,

Congress has realized your activity

is extremely problematic

and they will not tolerate it.

So, there might be specific statutes

that address a variety of concerns.

But also we're gonna be looking

at what you're doing on US soil, as well.

- In the context of default passwords

and usernames from vendors,

do you think vendors are doing enough

to inform users that they have to change

their usernames and passwords?

Or do you feel like they're actually

educating their users enough

or do you think that falls onto the consumer?

- I think there should be more vendor education.

I think Professor Bock agrees.

- We were just,

when he showed that 10 top passwords,

if you were just to go home

and Google default passwords,

nothing fancy,

you'll see lists of default passwords

for all types of devices

that are used in networking,

home devices, routers, switches.

So, they're out there

and there's no big secret.

So, it's a good question.

- Any other questions?

- How do you feel about Anonymous?

- How do I feel about Anonymous?

It's job security for me

and many of my coworkers.

I do not agree with any vigilante.

At the time where we distrust our government

and we take law enforcement action into our own hands

we get a corrupted result.

So, I would disagree with vigilantism.

- Thanks, Billy.

Appreciate the time.

Want to offer another idea with regards

to cyber hygiene.

We can take the time and the effort

to put in good strong passwords

but we don't aways know what the websites'

and the different locations that we're going to

actually or how they use that material.

So, one of the things that I've gotten

in the habit of doing

is I use a neutral password

that I know is a temporary password

and I will immediately request a return on

my forgot my account.

And I see if they send it back

to me in clear text.

Because if they're sending my password

back to me in clear text,

they're probably abusing

the rest of my private information, as well.

And I don't walk away from those sites,

I run.

So, take a look at how you have

to reset a password

and that will often give you

an idea of how that website

is manipulating your own data

or their data that they're using.

- Very good.

- In terms of the OPM breach,

I had my PII compromised, as well.

Have we seen the,

it was supposed Chinese hack,

have we seen them use any

of the PII gathered in that breach?

- Thankfully I have not seen it.

There are some movements where

they've allegedly arrested some.

I'm not familiar with that aspect of the case.

But when you compromise that volume

of data the next logical question becomes

how do you use it?

How do you exploit it?

Are you capable of exploiting it?

So, I think there might be some success

with the exploitation

but the follow up

and the ability to use it

in a logical manner might be

hampered somewhat there.

That's my own suspicion.

- They offer a little identity theft

protection on the back end.

Still offer that I know of.

So, but you should be vigilant, too,

and check your credit scores

and some other things

that you can see in the background

to see if things have changed.

- So, I'm not sure if this is directly connected

but what are your thoughts on SJ Res 34?

The bill signed today by Trump

allowing ISPs,

they no longer need consent to sell consumer data

or browser history.

- That would be a little bit frustrating.

I was not aware that passed.

But it would be frustrating

and it may be in contravention

of other federal statutes,

like Gramm-Leach-Bliley

where financial institutions have

to have your permission to do it.

So, we'll see how far that goes.

- Just to touch up on that, too,

because I was reading about this

this morning.

I think the issue for Congress

with that was their argument was that FCC

overstepped their authority when they

tried to institute the rules.

So, that Congress' argument was that that

has to happen through Congress.

- Separation of powers argument.

- Yep.

- So, it's great to have difficult passwords

and numerous passwords

but there's so many websites out there

nowadays it's hard to remember those.

So, I've started using a password manager.

What are your thoughts on that?

Cause while it uses a very strong password

to access the manager,

and they're stored supposedly securely,

it does put all your eggs in one basket.

- It does seem like a very good idea.

It's recommended by a wide variety of folks.

It's something I may implement

on my end, as well.

- So, following up with Brad there,

and using a password locker,

I've came into the use of,

I have one or two or three very secure passwords

and then I add in kind of an encrypted

form of the website that I'm on.

So, for example,

for Facebook,

I might take out all the vowels

and use my secure password.

- Not anymore.

- That wasn't what I use,

but that was just an example.

Would you condone that type

of password protection?

- That sounds pretty good.

But one thing I'll tell you watch

is make sure you're not mixing.

So, if you have passwords for work

keep them separate for personal passwords.

So that if you have a compromise at work

your personal info is not compromised.

So, just near the (inaudible),

keep 'em separate.

- Again, I'd like to give Billy

a round of applause

for a wonderful job.

(applause)

For more infomation >> Cyberattacks: The Weapon of Choice of Criminals, Terrorists and Spies - Duration: 49:02.

-------------------------------------------

Hair Loss Treatment at Home in Urdu | Gunjay Pan Ka ilaj Mumkin Gharelu Cheezo Se - Duration: 2:59.

For more infomation >> Hair Loss Treatment at Home in Urdu | Gunjay Pan Ka ilaj Mumkin Gharelu Cheezo Se - Duration: 2:59.

-------------------------------------------

Louis The Child - World On Fire feat. Ashe - Duration: 2:56.

For more infomation >> Louis The Child - World On Fire feat. Ashe - Duration: 2:56.

-------------------------------------------

UNA PERCEPCION ASTROLOGICA DE LA REALIDAD por Carolina Capmany - Duration: 1:00:51.

For more infomation >> UNA PERCEPCION ASTROLOGICA DE LA REALIDAD por Carolina Capmany - Duration: 1:00:51.

-------------------------------------------

BVRNOUT - Take It Easy (feat. Mia Vaile) (Lyrics) - Duration: 3:19.

I was so sure of our love

I never thought of any reason, a doubt about us

And now I'm right back at the start

Half way through a bottle baby, and nothing's enough

I thought that I could keep it low

Take it easy, take it slow

We ended up just like before

So take it easy, take it easy

I thought that I could keep it low (keep it low)

Take it easy, take it slow (take it slow)

We ended up just like before

So take it easy

And you know how to forget

All the wrongs in every reason why we've changed

And there's a storm inside my head

It's getting me in trouble baby, and I can't break away

I thought that I could keep it low

Take it easy, take it slow

We ended up just like before

So take it easy, take it easy

I thought that I could keep it low (keep it low)

Take it easy, take it slow (take it slow)

We ended up just like before

So take it easy

For more infomation >> BVRNOUT - Take It Easy (feat. Mia Vaile) (Lyrics) - Duration: 3:19.

-------------------------------------------

K-nai's hideout | #07 | مخبأ كي-ناي - Duration: 4:01.

You can get your InspireMe Crate from www.inspiremecrate.com

You'll find different options available on their online store

Don't forget to read what's included in each create before choosing yours

Prepay options are available too (shippings rates aren't included here)

Or you can buy the digital version of their booklets and print it yourself instead of the crate

For more infomation >> K-nai's hideout | #07 | مخبأ كي-ناي - Duration: 4:01.

-------------------------------------------

Braco invites you to participate in the III World Conference of Peace and Light - Duration: 6:45.

For more infomation >> Braco invites you to participate in the III World Conference of Peace and Light - Duration: 6:45.

-------------------------------------------

Running with Keepers by Two Steps From Hell (Piano) - Duration: 3:01.

Hey audience!

I hope you enjoyed Running with Keepers from Colin Frake - Asclepius, the second in a series

of books written by Nick Phoenix (of Two Steps From Hell) with music by Thomas Bergersen

and some additional tracks by Nick.

I'll be reading the Colin Frake books on the way to Finland, which is where I'm going for

the next month.

I'll be performing in a show (details in description!) featuring arrangements of music by my favourite

band, Nightwish, and I've done lots of Nightwish arrangements on this channel before (check

my playlists!).

Even though I'll be away, I've still got a video coming out every week on this channel

so look out for more Two Steps From Hell.

If you liked this video, give it the thumbs up and be sure to subscribe and I'll see you

in the next one.

See ya!

For more infomation >> Running with Keepers by Two Steps From Hell (Piano) - Duration: 3:01.

-------------------------------------------

ULTRASEVEN THEME SONG /ウルトラセブン OP cover by atsuki - Duration: 2:44.

Sebun Sebun, Sebun Sebun Sebun Sebun Sebun Sebun Sebun Sebun

Harukana hoshi ga furusato da

Urutora sebun faitaa sebun

Urutora sebun sebun sebun

Susume! gniga no hatemademo Urutora ai de Spark!

Sebun sebun sebun Sebun sebun sebun

Moroboshi dan no na wo karite

Urutora sebun hiirou sebun

Urutora sebun sebun sebun

Taose! hi wo haku daikaijyuu Urutora biimu de Strike!

Sebun Sebun Sebun Sebun Sebun Sebun

Mirakuruman No Nambaa Da

Urutora sebun, Es Da Sebun

Urutora sebun, Sebun Sebun

Mamore Bokura No Shiawase wo Urutora Hoku De, Attack!

For more infomation >> ULTRASEVEN THEME SONG /ウルトラセブン OP cover by atsuki - Duration: 2:44.

-------------------------------------------

"I Am Iron Man" (Tony Stark) - Duration: 2:18.

For more infomation >> "I Am Iron Man" (Tony Stark) - Duration: 2:18.

-------------------------------------------

MONSTER LEGENDS - Ingvar's Bodyguard Level 1 - 35 - Duration: 8:20.

For more infomation >> MONSTER LEGENDS - Ingvar's Bodyguard Level 1 - 35 - Duration: 8:20.

-------------------------------------------

Towkio - Drift - Duration: 3:14.

♪ WATCH ME DO THE DASH ♪

♪ I AIN'T SCARED HIT MY GAS ♪

♪ THEN I SKRT SKRT ♪

♪ DRIFT, DRIFT, DRIFT ♪

♪ (WELL WHY WAIT) ♪

♪ PEOPLE FEELINGS GETTING HURT ♪

♪ WHEN I HIT EM WIT THAT CURVE ♪

♪ SHADES ON SKRT ♪

♪ DRIFT, DRIFT, DRIFT ♪

♪ YEAH I SPLASH EM WIT THAT SWAG ♪

♪ I'M MEAN I'M UP ♪

♪ I GIVE EM SHIT THAT THEY CAN BUMP ♪

♪ NOW CATCH THAT SWAGGER FROM THAT ♪

♪ DRIP, DRIP, DRIP ♪

♪ BUT WHO'S THEM ♪

♪ I DON'T KNOW THEM ♪

♪ YOU KNOW I WILL NOT PRETEND ♪

♪ MY ONLY FRIEND THE ATM ♪

♪ HE TELL ME ♪

♪ CHK CHK CHK CHK ♪

♪ JUST A KID AT MY COUSIN CRIB LIKE DA FRESH PRINCE ♪

♪ WRIST IN DA POT EATIN RAMEN LIKE IT'S RUTH CHRIS ♪

♪ NOWADAYS IT'S WHO'S MAN'S ♪

♪ EVERYBODY TRYIN BUILD YOU ARE NOT MY FAM ♪

♪ BITCH I'M OUT THAT JAM SKRT DRIFT ♪

♪ SEE THEY THIRSTY FOR THAT JUICE SO TAKE A SIP ♪

♪ I SWEAR I GOT IT YEA I HIT EM WITH THAT DRIFT ♪

♪ 'CUZ THEY BE REACHING ♪

♪ I SEE ZOMBIES ♪

♪ THEY BE ON ME, THEY BE ON ME ♪

♪ NOW THEY KNOW JUST WHO I AM ♪

♪ THINK I GOT EM ALL CONVINCED ♪

♪ BITCH IT'S TOWKI BET THEY FINALLY CAUGHT MY ♪

♪ DRIFT, DRIFT, DRIFT ♪

♪ TOWKIO ♪

♪♪♪

♪ TOWKIO ♪

♪ DRIFT, DRIFT, DRIFT, DRIFT, DRIFT, DRIFT ♪

♪ NOW THEY CATCH MY ♪

♪ DRIFT, DRIFT, DRIFT ♪

♪ NOW THEY CATCH MY ♪

♪ ARIGTO GOZIMA TOWKI TOWKI TOWKI SAN ♪

♪ ARIGTO GOZIMA TOWKI TOWKI TOWKI SAN (SKRT) ♪

♪ ARIGTO GOZIMA TOWKI TOWKI TOWKI SAN ♪

♪ ARIGTO GOZIMA TOWKI TOWKI TOWKI SAN ♪

♪ I SAY WATCH ME DO THE DASH ♪

♪ DEN I SKRT ♪

♪ DARK TINT YOU CAN'T SEE ME THRU THE GLASS SWERVE ♪

♪ DRIFT, DRIFT, DRIFT ♪

♪ I SAY OOH SHE BAD HOPE SHE LET ME CRACK ♪

♪ I MIGHT SMASH I MIGHT NO LOOK PASS THE ASSIST SKRT DRIFT ♪

♪ I SAY I WAS JUST A SHORTY ♪

♪ I WOULD WHIP THE 10 SPEED LIKE AN AUDI ♪

♪ WASN'T WIT ME TRAPPING OUT THE ALDIS ♪

♪ NOW THEY WANT ME LIKE A BOUNTY ON ME ♪

♪ YEAH I'M DOIN NUMBERS ♪

♪ DOIN MATH LEFT CLASS ♪

♪ NEVER LOOKIN BACK ♪

♪ NOW I ONLY SEE THE DASH BOARD ♪

♪ PASSPORT START COLLECTING STAMPS ♪

♪ YEA CALL ME WORLDWIDE ♪

♪ YUNG TOWKI THEY KNOW JUST WHO I AM ♪

♪ GETTING BOOKED AT FESTIVALS ♪

♪ WE USED TO HAVE TO HOP A FENCE ♪

♪ NOW I GOT EM ALL CONVINCED ♪

♪ AND I CAN FINALLY SAVE MY BREATH ♪

♪ YEA IT'S TOWKI, YEA IT'S TOWKI ♪

♪ THINK THEY FINALLY KNOW ♪

♪ THEY FINALLY CAUGHT MY ♪

♪ DRIFT, DRIFT, DRIFT ♪

♪ TOWKIO ♪

♪♪♪

♪ TOWKIO ♪

♪ DRIFT, DRIFT, DRIFT, DRIFT, DRIFT, DRIFT ♪

♪ NOW THEY CATCH MY ♪

♪ DRIFT, DRIFT, DRIFT ♪

♪ TOWKIO ♪

♪ NOW THEY CATCH MY ♪

♪ ARIGTO GOZIMA TOWKI TOWKI TOWKI SAN ♪

♪ ARIGTO GOZIMA TOWKI TOWKI TOWKI SAN (SKRT) ♪

♪ ARIGTO GOZIMA TOWKI TOWKI TOWKI SAN ♪

♪ ARIGTO GOZIMA TOWKI TOWKI TOWKI SAN ♪

For more infomation >> Towkio - Drift - Duration: 3:14.

-------------------------------------------

Jak być RECENZENTEM gier - Duration: 18:07.

For more infomation >> Jak być RECENZENTEM gier - Duration: 18:07.

-------------------------------------------

Bắt lỗi tiếng Anh Asia's Next top Model - Duration: 4:13.

Hey

As you can see, I've become inspired by my new favorite show

Asia's next top model

Now this is a show about models with both beauty and English problems

So let's help these lovely young ladies fix some of their grammar and pronunciation mistakes

because grammar and pronunciation are important

because after all I would rather marry an ugly woman a perfect grammar

than a model uses the wrong verbs

so listen carefully because the show fixed the girls' mistakes for them in the subtitles

but they're still not saying things correctly

today we'll focus on two things: verb and pronunciation

let's take a listen to our first model uses the present perfect tense incorrectly

I never gone Malaysia before, I'm so excited

Now, she might be hot but she 's also wrong

She said I never gone to Malaysia before I'm so excited but let's do it correctly

repeat after me I've never been to Malaysia before I'm so excited

good job

let's keep going

how long have you been modeling

I've been work ..um three four years

I've been worked three four years oh girl

okay let's fix this

instead she should say I've been working

she means modeling for three or four years

so we fixed the verb and also add in a preposition and a conjunction

so that it makes perfect sense

now let's work on pronunciation

I got at home I feel the competition gets more interesting

here we have our Vietnamese model too

maybe you know her

she made the pronunciation mistake here

that is very common with Vietnamese learners

and that is to forget the "s" sound so she said "interesting" instead of interesting

It is something to keep in mind any time you speak English

but I have only one big close friend with me is Laila

okay so two little problems there

two didn't get the "y" sound in "really" and "s" sound in "close"

so it should be I have one really close friend is Laila

two - girl I can cheer you if you need help

no no now fail fail fail

fail fail fail okay no no make sure with this word at the end with the "l" sound

here it's all about the "l" sound make sure we get the "l" sound

love love love fail fail fail

if I don't finish the challenge I want to go home

so this last example is all about any sound specifically " and "

so what she should say something like this

if I don't finish the challenge then I will have to go home

all right your turn, you practice that

so this final example all about final ending sound specifically " and "

so instead of "finish" make sure you say finish

instead of "challenge" make sure we say challenge

okay that's it for today

thanks for watching and I hope you enjoyed it

and also try not to watch too much Top Model

because I know watching just what episode may be pretty stupid

and remember subscribe if you haven't already

and if you want to sound more fluent in these top models

register for the course right here or do it in the description below

on the course is where you can instantly and automatically check your pronunciation progress

so thanks for coming we'll see you again soon

For more infomation >> Bắt lỗi tiếng Anh Asia's Next top Model - Duration: 4:13.

-------------------------------------------

Dread Pitt & Yung Fusion - The Mission - Duration: 3:03.

I'm in the Cayman Islands wilding

While Im Bussing up the silence I'm denying all vaginas who be

claiming that they rhyming

Buss up in it like the Bando

Way too much to handle

I should let you know I know my haters really fans though

Wow, why the hell you mad

I'm just being me mess around and break the bank

She might shake it on the dash

Had her screaming like the mask

Way ahead you niggas

Lived your future in my past

Whip it like a flip phone

Oh she love the... bone

All you niggas big band wagons on my shit noo

You can hop up off that

I just got my sauce back

So way out my mother loving mind

I think I lost that

I'm on my 007 yeah there is no telling yeah

What do I might do next what I might have in here

What I might have in here

I'm on a mission and no one can stop me

You must be tripping, tell Roger to copy

I'm on a mission and no one can stop me

You must be tripping, tell Roger to copy that (Let's go!)

Mama raised a millionaire

Self-made winner here

Nigga you a copy of a copy build a bear

I only fear the fear of fear and that's not in here

You couldn't even say you balling even if you had pair

Watch out, donuts like the cop house

So much time in music man I swear I never clock out

Turn x and o's to knock out

Make em wanna tap out

Now they tryna find me kinda like the trap house

I Just had to flip mode

I be hella lit, stove

Whip it hella loud you can feel it from the sixth floor

All my Caribbean girl shake it like it's disco

I just had to lay it down for this show

Không có nhận xét nào:

Đăng nhận xét