Smashing Security podcast #460: Never knock on the door of a nuclear submarine base and ask for a selfie

Hacking stories and cybersecurity insights.

Graham Cluley
Graham Cluley
@

 @grahamcluley.com
 / grahamcluley

Smashing Security podcast #460: Never knock on the door of a nuclear submarine base and ask for a selfie

A disgruntled data analyst decides that the best response to losing his contract is to steal the entire company payroll database and demand $2.5 million in Bitcoin – signing his extortion emails from a company called “Loot.”

Meanwhile, two people drive up to the entrance of the UK’s nuclear submarine base at Faslane and politely ask if they can have a look around. Tourists? Spies? Something in between?

Plus: Female Muslim punk rock group, and a little red book that might save your sanity in a post-truth world.

All this and more in episode 460 of the “Smashing Security” podcast with cybersecurity veteran and keynote speaker Graham Cluley, and special guest Jenny Radcliffe.

0:00
0:00 0:00
0:00
Show full transcript
TranscriptThis transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Graham Cluley

It was so fascinating because you were looking up and you think, how can they, how can they be earning that much? And there's two people doing the same job but vastly different salaries, and one of them may be much better than the other in your point of view.

Jenny Radcliffe

Can I hazard a guess, Graham? Was the one not being paid as much by any chance a woman? I'm just wondering. Wild stab in the dark.

Unknown

Smashing Security, Episode 460: Never Knock on the Door of a Nuclear Submarine Base and Ask for a Selfie. With Graham Cluley and special guest Jenny Radcliffe. Hello, hello, and welcome to Smashing Security, Episode 460. My name's Graham Cluley.

Jenny Radcliffe

And I'm Jenny Radcliffe.

Graham Cluley

Jenny, welcome back to the show. Always a delight to have you. Now, you're normally in your executive podcast penthouse suite, aren't you? But you're at a different location today.

Jenny Radcliffe

I am. I had to travel at the last minute, Graham, so apologies if there's a little bit of background noise that there wouldn't normally be.

Graham Cluley

Well, such is the life of a human hacker, I suppose. Always on a mission. That is what you do though, isn't it? You are about the social engineering, you are about breaking into buildings, less so with sledgehammers and JCBs and more with your brain.

Jenny Radcliffe

Well, it's been known. Yes, more and more about assessing physical infiltration and ransomware insider threat for clients. So sometimes you have to dash away quite quickly. And unfortunately today I had to do that just in front of our podcast, but hopefully we can hear each other and all will be well.

Graham Cluley

Well, thank you very much for taking the time to join us today. Before we kick off, let's thank this week's wonderful sponsors, Meta, ThreatLocker, and Vanta. We'll be hearing more about them later on in the podcast. This week on Smashing Security, we won't be talking about how hackers paid to make a malicious link a top Google search result for people hunting for Claude AI plugins. You'll hear no discussion of how cyber attackers crippled breathalyzer devices in the United States used to test people with drink driving convictions before they can drive their cars. And we won't even mention how Chinese hackers are posing as a cybersecurity firm to steal millions of dollars of cryptocurrency. So Jenny, what are you going to be talking about this week?

Jenny Radcliffe

Well, I'm going to be talking about the fact that two people walked up to the UK's nuclear submarine base and tried to get in.

Graham Cluley

Oh, maybe that's what's keeping you busy today. Have you had a— we'll find out later on. And I'm going to be talking about a disgruntled contractor who thinks he's found the perfect way to get what he deserves. All this and much more coming up on this episode of Smashing Security. Right, before we go any further, ThreatLocker is one of our sponsors this week, and they want to talk about something specific this week, Joe. They want us to talk about DAC.

Joe

DAC? Is that duck?

Graham Cluley

Well, no, Joe, it's not duck. DAC, it stands for Defence Against Configurations.

Joe

That is a shame. I ducks. What does this do?

Graham Cluley

Well, you know how most cyberattacks don't actually start with some sophisticated piece of malware? They start with a misconfigured setting or a drifted policy or an exposed endpoint that nobody noticed.

Joe

And when you've got hundreds of endpoints, keeping on top of all that manually is basically a full-time job in itself.

Graham Cluley

Well, it is a full-time job and it's an impossible one. So ThreatLocker built DAC to solve exactly that problem. Every day it runs deep checks across every endpoint in your environment, scanning operating system settings, application settings, as well as your ThreatLocker policies allowlisting and ring-fencing.

Joe

Every endpoint every day.

Graham Cluley

Yes, every endpoint every day. And everything that's misconfigured comes back to one dashboard, categorized, prioritized with clear steps to fix it.

Joe

Before an attacker finds it first.

Graham Cluley

Exactly. And you can verify alignment across frameworks like CIS, NIST, HIPAA, ISO 27001, so it's useful come audit time too.

Joe

That's actually rather elegant. Spot the gap before someone crawls through it.

Graham Cluley

That is ThreatLocker's whole philosophy, really. Don't wait for a misconfiguration to become a breach. And you, gentle listener, you can try DAK for free for 30 days at threatlocker.com.

Joe

That's threatlocker.com. And thanks to ThreatLocker for supporting the show. And remember, if your security's in a flap, DAK's got your back. Unlike an actual duck, which would just quack and waddle off.

Graham Cluley

Hey Joe, you know, the other day someone contacted me on LinkedIn and they said, who's this Joe guy?

Joe

Oh yeah.

Graham Cluley

They said, we haven't properly introduced him. And they were worried you were an AI. Now I'm thinking, now you've actually quacked like a duck on the podcast, surely no deepfake Joe could possibly do that?

Joe

No.

Graham Cluley

Now, Jenny, it's tough out there. There's a cost of living crisis going on. Many people are finding they haven't got very much money in their pockets and the prices are going up. It's tough, isn't it?

Jenny Radcliffe

It really is. Everyone's feeling it, Graham.

Graham Cluley

Yeah, we're all feeling the pinch. And I've got a lot of sympathy for people who are working out there who feel that they may be being underpaid. You know, the billionaires are making all their money and not necessarily sharing it around. Pay equality, salary transparency, it's important. And if you've just been told your contract isn't going to be renewed, I think it's pretty understandable that people would feel hard done by. You know, people would think, oh, for goodness sake, it's so hard getting a job. I was doing this work and now it's come to an end. What is a bit less understandable, though, and harder to think is justifiable, is stealing your company's entire payroll database.

Jenny Radcliffe

Sorry, it's not funny, Graham, but my goodness me. Go on.

Graham Cluley

Yeah, it's not good, is it? And then, not just taking the database, but then threatening to leak everybody's salaries unless this company wires you $2.5 million in bitcoin.

Jenny Radcliffe

I mean, we've all had bad days in work. There's times when we don't like our bosses and our colleagues, but this guy took it to the extreme, right?

Graham Cluley

He absolutely did. His name is Cameron Currie, 27 years old, from Charlotte, North Carolina. And until recently, he was contracted as a data analyst at an international tech firm headquartered in Washington, D.C. Now, joining the dots, it doesn't take a lot of effort to work out who this is when you come to read the court documents. We can work out that the company he was working for was a software-as-a-service company called Brightly. Formerly called School Dude.

Jenny Radcliffe

Okay.

Graham Cluley

Which made— they decided to get a bit more corporate, I suppose.

Jenny Radcliffe

Yes.

Graham Cluley

They were acquired by Siemens in 2022. What they do is they provide asset management software to over 12,000 schools and public institutions around the world.

Jenny Radcliffe

Okay. Right.

Graham Cluley

So far, so straightforward. He's working as a data analyst. He's contracted there. And his contract was only supposed to last 6 months. And it started in August 2023. And he was— usual kind of deal. He was given a laptop, access to the company network.

Jenny Radcliffe

Oh no.

Graham Cluley

Access to sensitive HR and payroll files.

Jenny Radcliffe

A mug with the company logo, everybody's login details.

Graham Cluley

Yeah, he's got it all. And it meant that he could access things like base salaries and bonuses and performance data and personal details. Sensitive information. I mean, I remember, oh golly, this would have been about 30 years ago when I was in a fairly junior position in the cybersecurity company I was working for. And I found out the HR department had left on the company network, not behind a password, but in a publicly accessible directory, a spreadsheet with everybody's salary in it.

Jenny Radcliffe

Yeah, we've all found them, Graham. We've all found it. And then you become disgruntled if you're not at the top of that spreadsheet, sort by column G. Oh my goodness.

Graham Cluley

I mean, it was so fascinating because you were looking at people and you think, how can they be earning that much? And there were these injustices. I mean, I wasn't just looking for myself, but other people just thinking there's two people doing the same job, but vastly different salaries. And one of them may be much better than the other in your point of view.

Jenny Radcliffe

Can I hazard a guess, Graham? Was the one not being paid as much by any chance a woman? I'm just wondering.

Graham Cluley

Sometimes.

Jenny Radcliffe

Wild stab in the dark.

Graham Cluley

I say sometimes, often, of course, that is the case. So sensitive information that this guy had. What's perhaps surprising is that he didn't wait until he was told his contract was coming to an end before he started stealing this sensitive information, this data which he had access to. He started removing files without authorization as early as August 2023, the very month he started the job. So, it wasn't that he had lost the job or was about to leave his position. He was doing it from the beginning. It's like he went to the company with a plan in the first place.

Jenny Radcliffe

You see different breeds of insider threats. Sometimes that's the plan, I guess.

Graham Cluley

I suppose so. And anyway, on December 5th of that year, the company told his recruitment agency that his last day would be December 15th. So, 10 days later, by December 10th, he'd worked his very last shift. And would you know, the very next day, December 11th, he'd created a new Microsoft Outlook account under the name of Lüt.

Jenny Radcliffe

Now, can I just say?

Graham Cluley

Yes.

Jenny Radcliffe

That is a cool name for your burglar. That's such a great handle.

Graham Cluley

Lüt. It is cool, isn't it?

Jenny Radcliffe

It's a bit of a tell though, if someone's looking for you.

Graham Cluley

Yes, it does give it away a little bit. It's not like—

Jenny Radcliffe

Swag.

Graham Cluley

Swag is a great-sounding word as well. Over the following 6 weeks, he was sending emails. He sent more than 60 emails to company employees and execs. I mean, that's quite a lot of emails. That's practically a Mailchimp newsletter campaign. And he sent these emails, which looked kind of official. They had the subject line, "Loot data leak, DocuSign agreement attached." As you roll out your salary statements, we would like to share your organisation's salaries with everyone in the company because salary transparency is crucial as the cost of living rises. So we and our partners aim to ensure that everyone is being paid accordingly, providing employees with the leverage they deserve while also adhering to federal government regulations."

Joe

Yeah.

Graham Cluley

It's quite an approach, isn't it? It's not saying I'm here to blackmail you. And he sent them contracts via DocuSign. So, these settlement agreements, and he demanded $2.5 million. He's saying, we are partnering with your company. And they were even set up so he said, look, your passwords to access DocuSign they're going to be the same as your employee ID number. So he's reduced the friction as much as possible to let these people sign these things. So, you said, kind of professional, obviously very crooked, but kind of professional. And then there were follow-up emails saying, urgent, 24 hours to respond.

Jenny Radcliffe

Classic.

Graham Cluley

Yeah, yeah, exactly. You know, you need to respond now. Don't think about it, just respond. There was another one where he said he'd be sending salary information to every VP via LinkedIn.

Jenny Radcliffe

Again, classic authority ploy, credibility play. Yeah, yeah.

Graham Cluley

Right.

Jenny Radcliffe

Ticking boxes, social engineering here. Yeah, I'll give him some marks.

Graham Cluley

He threatened to set up interviews for underpaid female employees with the Equal Opportunities Commission to help them file a class action lawsuit, which in some ways you kind of think, good for him.

Jenny Radcliffe

Well, again, but using, you know, so sort of, it gives someone a cause and a way to support a cause.

Graham Cluley

Yes.

Jenny Radcliffe

And that's another social engineer. I just wonder if you'd seen one of my keynotes. That's terrible, isn't it? I hope not. Go on.

Graham Cluley

And there was another one where he did what we talked about already, talking about disparity. You know, one worker was told they weren't receiving a bonus while everyone else on their level was. So you can imagine the problems that would cause. And then on December 18th, 2023, which is a famous date in the history of data breaches, because that was the date when the SEC introduced new laws on cyber incident disclosure. What they did was they required publicly traded companies to report breaches within 4 days. So on that day, the very day that law came in, he sent emails saying there was a new SEC law. You either have to report your breach or we will with the SEC. So he's using that as extra pressure leverage.

Jenny Radcliffe

It's on the surface of that, that sounds very kind of professional, but the minute that you give that a moment's thought, And it's all in block caps and lots of exclamation marks.

Graham Cluley

Yes, oh my God.

Jenny Radcliffe

So he's getting a bit impatient now. you think, hey, that's not a thing. Yeah.

Graham Cluley

You've got to use block capitals, haven't you? Obviously. Quite entrepreneurial, I think. That's what sometimes impresses me about the cybercriminals is, you know, if only they used their entrepreneurial skills, their imagination sometimes in a good legitimate cause, maybe the economy would be in a better place.

Jenny Radcliffe

Maybe.

Graham Cluley

So, in January, it's become more like a hostage situation where he's holding the data and he says, final warning, all in capitals, demanding bitcoin by 5 PM the same day. He's threatening to send pay gap emails every 2 hours until the company has complied and paid up. And he says, extremely firm, extremely firm. You've been— what? Yes, he misspelled extremely twice. So crimes against spelling as well. But yeah, he's saying I can save your company stock if you just pay up $2.5 million. Otherwise, this amount of money I'm demanding is going to increase every month by $100,000. So, a bit of a pickle the company found itself in. Do you think they should have paid up?

Jenny Radcliffe

No, because, you know—

Graham Cluley

Yes, I agree with you.

Jenny Radcliffe

Because it's quite amateurish, this. And it doesn't seem to be at first, but the minute you give it a bit of scrutiny, particularly with that $2.5 million in order to save company, each subsequent month and carrying a further $100,000. As soon as you see that, you know that this is likely an insider and likely one person because a more organized group doesn't go for six figures, basically.

Graham Cluley

Yeah. So the company, it seems, approached the FBI quite rightly, you know, bring in the authorities when something like this happens. They did end up paying $7,500 in bitcoin. And I assume that was done to try and help the authorities trace where the money might be going to maybe help secure a conviction as well.

Jenny Radcliffe

I completely agree. Yeah, definitely.

Graham Cluley

Now, unfortunately for Cameron, his operational security was not that watertight. So some things we teach companies about how to be more secure and individuals how to be more secure, he wasn't putting into practice himself.

Jenny Radcliffe

No.

Graham Cluley

So, he had a Coinbase account to do his cryptocurrency transactions. And of course, if you create an account on somewhere like Coinbase, they're going to ask you, well, who the hell are you? You know, provide some ID papers. And he used his own personal details to verify. Bless him, you know.

Jenny Radcliffe

Think it through, Cameron, come on.

Graham Cluley

So, he used his own details and debit cards which he linked to his account. They belonged to his mother and sister.

Jenny Radcliffe

Who I'm sure were delighted.

Graham Cluley

They would have been. They would have been, absolutely. So the FBI, they turn up at his apartment in late January 2024. Apparently they were searching the place. And while, actually, while the FBI was searching the place, he sent a few more threatening emails to the company saying he would publish all the data if he was arrested.

Jenny Radcliffe

Come on, he's a legend

Graham Cluley

Come on now. So, yes, he was arrested. And last week, and this is what I'm talking about now, last week he was convicted. And the thing is, he's not a sophisticated hacker, is he? He's not a nation-state hacking group member. He's not a member of a ransomware cartel.

Jenny Radcliffe

at this point.

Graham Cluley

He is a contractor who had legitimate access to sensitive data, which he chose to abuse. He abused that trust and tried to extort money from his workplace. And this is such a common problem.

Jenny Radcliffe

He's a menace to society.

Graham Cluley

There's so much focus on outsiders rather than insiders.

Jenny Radcliffe

Yeah. Yeah. I mean, this is an area that in what we do is just huge and growing all the time because particularly, Graham, as technology, you know, quote unquote replaces jobs.

Graham Cluley

Yes.

Jenny Radcliffe

The remaining humans have access to more and more data. And if you've got a bit of imagination, and if your own morality isn't that great, we do see things like this happen, and more creatively with less access than Cameron here had as well. So yeah, it's just that we don't hear a lot about these things really. This one is good because we've got a lot of detail.

Graham Cluley

We do have a lot of detail. I think a lot of times these things can either be hushed up or the company itself doesn't quite discover how it was all happening, but quite often it will be the person that they, for legitimate reasons, gave a password to or granted too much access to an employee who then was able to cause the problem. So, however good your perimeter defenses are, however patched your systems are, however many layers of multifactor authentication you've deployed, if the person sitting at the keyboard has decided to steal from you, it's difficult to stop them. It's not straightforward.

Jenny Radcliffe

I mean, one of the things that I've advised in the past is, you know, we really do need to get to know our people. And that means you need to get to know when people are behaving peculiarly.

Graham Cluley

Right.

Jenny Radcliffe

So, in the same way that technology detects, you know, breaks from patterns. And the same way that we've got all the kit to show when someone is doing something unusual, technically, online, we should really be observant of our employees and notice when someone is breaking a pattern or behaving strangely. So, from a human sort of point of view, at line manager level, a team level, we really do need to know our people, and that does mean following up things like references and really talking to people that they've worked for before as well. Otherwise, it is going to be difficult to detect these things, but it is sometimes possible. I think we miss that bit out.

Graham Cluley

Right, before we crack on any further, Joe and I want to take a moment to tell you about one of today's sponsors, Vanta.

Joe

We've got a question for you. What's the thing that keeps you staring at the ceiling at 2 AM when it comes to your company's security?

Graham Cluley

Is it wondering whether you've actually got the right controls in place? Whether one of your suppliers has been quietly compromised? Or is it the truly soul-destroying one? Why on earth are we still running our entire security program out of a spreadsheet?

Joe

If any of that hit a little too close to home, that's where Vanta comes in. Vanta takes all that tedious manual security grind— chasing down evidence, wrestling with questionnaires, updating the same cells for the thousandth time— and automates the whole thing.

Graham Cluley

Their trust management platform keeps a continuous eye on your systems. It pulls everything into one central place and keeps your security program audit-ready around the clock. Yes, it uses AI, but the genuinely useful kind— flagging risks, streamlining evidence collection, and slotting into the tools your team already relies on. The upshot of this is you move faster, scale without the usual headaches, and maybe, just, just maybe, actually get a decent night's sleep.

Joe

Sounds lush. Find out more and get started at vanta.com/smashing.

Graham Cluley

That's vanta.com/smashing. And a big thank you to Vanta for supporting the show. Jenny, what's your story for us this week?

Jenny Radcliffe

So Graham, my story this week concerns— On Thursday the 19th of March, at 5:00 PM at night, 17:00.

Graham Cluley

Right.

Jenny Radcliffe

Two people apparently drove up to the entrance of His Majesty's Naval Base Clyde, which everyone calls Faslane, and asked if they could have a look around. Now, this is significant for a couple of reasons, because it's, this base includes the UK's four Vanguard-class ballistic missile submarines. No, they're the ones that carry Trident missiles, which—

Graham Cluley

This is the nuclear submarines, isn't it? Yes.

Jenny Radcliffe

It's the UK's nuclear submarine defence. The actual missiles are stored down the road, I believe, which is probably fortunate, a co-port. But obviously that's not great, doing that. But the timing of this is significant because as we know, there is a conflict in the Middle East at the moment. And the two people who've driven to the entrance have been identified. One is apparently an Iranian man and the lady he was with is a Romanian woman. And so that's really why this is kind of, the timing seems significant and it's kind of got more attention with some of our less scrupulous press immediately saying these are Iranian spies without any real knowledge of that. 'Cause one would think that if you wanted to break into a nuclear base, you probably wouldn't just drive up with the car and ask the guards on the door if you could have a quick look around. You know, we think it might be a museum, a point of interest, in fact, on the Clyde. And could we go and do it? No, you know.

Graham Cluley

You might though. I mean, I'm thinking particularly in this sort of Instagram generation, you might say, look, I just want to get some selfies done. Could you let me through, please? Because I just want this for my social media.

Jenny Radcliffe

No, is it a museum? 'Can I get a shot?' Yeah. With the camera.

Graham Cluley

It's a submarine. How cool is a submarine?

Jenny Radcliffe

How cool is that?

Graham Cluley

You know, can I get a bit closer?

Jenny Radcliffe

Now, the truth is, Graham, we don't really know what's going on here. Right. We don't, you know, they were immediately arrested by the looks of things. And are being charged on Monday, 23rd. So, they're going to court on that day. So, we don't really know, and there's no more comment other than, they seem to drive off, this is their nationality and age, and there are charges. So there's an investigation they're not going to comment on. But it really piqued my interest as someone who does in fact specialise in physical infiltrations, because I've been asked—

Graham Cluley

Yes, you do have something of a history, don't you, Jenny, of getting into places you shouldn't be necessarily able to get into.

Jenny Radcliffe

Mm-hmm. And I do, and, you know, talk about it, help prevent it happening.

Graham Cluley

Yes. Yes.

Jenny Radcliffe

But one of the questions that I get asked all the time is, does physical infiltration matter anymore?

Graham Cluley

Right.

Jenny Radcliffe

In this digital world, can't everything be stolen remotely? And why would it matter? And, you know, it does matter. So one of the things to understand is this is taken so seriously, even if it fails, even if it turns out to be, you know, couple of tourists who thought it was, I don't know, a naval museum or something. Because the most sensitive systems are often not online. You have to physically access the systems in order to steal things, in order to do things. And so, when I'm asked, oh, does physical infiltration matter as much anymore? It does, depending on how sensitive the data is. It does matter. If you've got very sensitive data, it probably isn't all online anyway. You have to physically access them, or going back to our friend Cameron, or use insiders. And if someone is already inside, there are so many possibilities in terms of security breaches. You know, you can steal things, you can sabotage things. If you think of what happened with Palestine Action Group in Brizenorton just a few months ago, they sabotage planes. It can be very serious. Those planes could then have, you know, the theory being those planes could have malfunctioned, they could have hit our service people, et cetera.

Graham Cluley

Yes, they'd been terrible if they'd been covered in some red paint, wouldn't they?

Jenny Radcliffe

Yes, but it could have malfunctioned in some other way, Graham.

Graham Cluley

Okay, alright, okay.

Jenny Radcliffe

And I wanted to check with you, 'cause you will know this, but if I remember rightly, wasn't Stuxnet infected USBs?

Graham Cluley

Yes, Stuxnet did, absolutely. But I believe they use 5¼-inch floppy disks on these nuclear submarines. I think they're so old, they actually have these really old floppies. They probably don't have a USB port.

Jenny Radcliffe

Well, I have friends who would tell me that exactly, probably at a later date. But in terms of intelligence gathering, everything else, physical intrusion is very serious because, if someone ever manages it, the consequences can be far more serious than even a cyberattack and more immediate. So my interest is piqued. I am looking forward to finding out whether or not this is two people who thought it was some sort of museum, or whether it was in fact two tourists who unfortunately managed to pick exactly the wrong place and exactly the wrong time to attempt to take a selfie by a nuclear submarine?

Graham Cluley

Birdwatching. That's the excuse I would always give. That's why I've got the long lens camera and the binoculars and—

Jenny Radcliffe

You just wanted to see the steeple of Salisbury Cathedral. What's wrong with you?

Graham Cluley

Oh my goodness.

Joe

Yeah.

Jenny Radcliffe

Yeah.

Graham Cluley

It is interesting, isn't it? But I think it is, again, a timely reminder that not all threats approach your organization via the same route. And we can focus far too much on defending certain perimeters and maybe not the physical perimeters. Right. Let's take a moment to talk about one of today's sponsors, Meta. So picture this. You need to set up a network for a new office. Suddenly you're juggling ISPs, floor plans, hardware configuration. Oh, what a headache. It's basically a second job.

Joe

Ah, yes. The classic experience of paying a contractor to arrive on the wrong day at the wrong address to install the wrong thing.

Graham Cluley

Right. Well, Meta's entire pitch is this. What if that just wasn't your problem?

Joe

Huh. Tell me more.

Graham Cluley

They are a network as a service company. They are genuinely end to end. You hand them a physical address and a floor plan and they handle everything. They sort out the ISP, they design the network, they show up on site, they rack their own hardware. Not reselling someone else's kit, and they get the whole thing running.

Joe

So I don't have to spend 45-odd minutes on hold with a company whose hold music is a 15-second loop of pan flute that I've committed to heart.

Graham Cluley

No, you don't. And once you're up and running, you get a single dashboard covering monitoring, management, security, VLANs, firewall, DNS security, SD-WAN, all of it. Full visibility and control. None of the tedious legwork.

Joe

Oh, that sounds actually useful. But what's the catch?

Graham Cluley

No catch, Joe. Just a subscription model with no nasty surprises. They've even got a hardware buyback program if you've already invested in kit from another vendor.

Joe

Very sensible. Where do we send people?

Graham Cluley

Go to meter.com/smashing. Go on, do it right now. Take a look.

Joe

That's meter.com/smashing. Thanks to Meta for supporting the show.

Graham Cluley

And welcome back, and you join us for our favorite part of the show, the part of the show that we like to call Pick of the Week.

Jenny Radcliffe

Pick of the Week.

Graham Cluley

Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. It doesn't have to be security-related necessarily. Now, Jenny, I've known you for a long time. What I don't really know about you though is what kind of music are you into?

Jenny Radcliffe

Ah, okay. I must say, and this probably comes as no surprise, I'm kind of a bit of a metal fan. So maybe the AC/DC, you know, that type of thing. But I also like some sort of medieval choral stuff from Germany.

Graham Cluley

Oh, la-di-da! Okay.

Jenny Radcliffe

I know.

Graham Cluley

The odd little madrigal played on your lute?

Jenny Radcliffe

Mm-hmm. I see.

Graham Cluley

Wonderful. Okay, well, that sounds a lot of fun. That's not particularly my bag. My bag tends to be Joni Mitchell, The Beatles, maybe a bit of jazz, some crooning, something that. Girl groups from the '60s.

Jenny Radcliffe

Oh.

Graham Cluley

What I'm not such a fan of is punk music. So I remember when that came out as a young lad, I just thought, what's that terrible racket happening on Top of the Pops? What's up with all this spitting and shouting and lack of melody? And I just, I had a bit of a problem with it. I'm a gentle soul. I think we all know that. But maybe I've had something of a revelation because, as listeners may remember, some weeks ago now, I was extolling the virtues of a Channel 4 TV show called We Are Lady Parts. Are you familiar with We Are Lady Parts?

Jenny Radcliffe

I am familiar with We Are Lady Parts.

Graham Cluley

Right. Did you We Are Lady Parts?

Jenny Radcliffe

Absolutely. Great show.

Graham Cluley

Excellent. Fantastic. I think more people need to see We Are Lady Parts. It's a comedy about an all-female Muslim punk band. And I really enjoyed it a lot. And after watching the series, I've been listening to their music because the people who appeared in the TV show did, it seems, form an actual band, learnt how to play instruments, and their music is on Spotify.

Jenny Radcliffe

Awesome.

Graham Cluley

So I've been— I don't know if this is the right way to put it or not, but I've been kind of into Lady Parts ever since. And most mornings— Most mornings in the shower, I've been enjoying the We Are Lady Parts band. So I want to give them another plug because I've been listening to them on Spotify. So even if you haven't seen the TV show, you can enjoy this band because I think they're great. And they've got songs "Voldemort Under My Headscarf," "Bashir with the Good Beard," "Ain't No One Gonna Honor Kill My Sister But Me." And it's all delivered in this punky, thrashy style. And I have to say, it's a great way to start my morning and energise myself up for the battles ahead. And I've greatly enjoyed it. And so my recommendation is go and listen to We Are Lady Parts. Go and check out their songs on Spotify. Other streaming services are available, of course. And that is my pick of the week.

Jenny Radcliffe

Awesome.

Graham Cluley

Jen, what is your pick of the week?

Jenny Radcliffe

Well, my pick of the week is a book, an actual physical book, ladies and gentlemen, that I'm recommending that we all read.

Graham Cluley

Wow. Very impressive.

Jenny Radcliffe

But don't worry or panic. It's quite a small book, right? It's a pocket book.

Graham Cluley

All right. Yes.

Jenny Radcliffe

It's only 144 pages and they are— it's big font and it's a small book and it's called—

Graham Cluley

You're going to be telling me next there are drawings in it to try and make it easier for me.

Jenny Radcliffe

Well, because there are people who just will raise their eyebrows at the thought of even picking up a book these days, I guess.

Graham Cluley

Okay.

Jenny Radcliffe

It's called "On Disinformation," and it's by Lee McIntyre, who's a prof in the States.

Graham Cluley

Ah.

Jenny Radcliffe

It's a brilliant book because it puts the case forward very sort of easy to read. So it's one to give to teenagers and people who really don't want to read too much and just want something easy.

Graham Cluley

Right.

Jenny Radcliffe

It's a USA perspective written before the 2024 election. And what he talks about is basically a little bit of history about disinformation. So not misinformation, not mistakes, disinformation that is deliberately being put out there to get you to believe a lie for whatever reason, political, social, whatever. But in this world at the moment, it can feel sometimes like we're drowning in this and there's nothing we can do about people who believe this disinformation, why it's there. And he gives a little history of all of the methodology of leading people to believe lies for a cause. Links it all back to things like 1920s Soviet campaigns and things like that. Brings it right up to date to the point just before the election in 2024. And it's looking at a crystal ball. It's amazing. But what he does is he talks about the need for algorithmic transparency in social media. And he shows how the tactics haven't really changed, argues that it's urgent and necessary to try and fight this disinformation and think more critically. But here's the thing that I thought was wonderful. He gives you 10 ways to do it as a single person, 10 ways that you can actually understand how disinformation is disseminated, how it works, and what you can do as a person to try and combat it in your own community, in your circle of friends and family. And I just thought it's so short, it's really easy to read, it's well written, and it gives you some background, some examples of what social media platforms can do to combat disinformation and why they should be doing it. And then how you can sort of sit in the pub and kind of argue against someone who believes something that is not true and that they're being led astray, whether that's political or something else. And so in that short pocketbook of 144 pages, you really get a sort of a masterclass, but an easy one, in how to combat some of the things that are sort of going wrong in the media, the world, and online. And I thought it was very easy to read, very nice approach, given that it actually gives you some action points at the end. So, On Disinformation by Lee McIntyre. It's a little red book, which is not why I like it, but it's a little red book and it's available everywhere. And I really recommend it. It'll take you no more than an hour or two to read. And it's a great thing. And I would recommend, can I just say, actually buying the physical book and holding a book in your hand and putting a little red book in your pocket because there is something kind of grounding and real and unusual about that these days. I found that quite nice as well. So there you go. That's my pick of the week.

Graham Cluley

That's fantastic. I mean, this is actually a practical how-to book. It's not just saying, oh, there's a bloody awful problem out there. It's actually saying, and this is what you can do to help protect yourself against it.

Jenny Radcliffe

Yeah.

Graham Cluley

And maybe help others as well.

Jenny Radcliffe

Yeah. Teach you to argue the point for the truth in the pub. Which I think is something that we all need occasionally, right? Okay. You have sold me, Jen. I will put a link in the show notes and other listeners can check it out as well. Best way to do it at the moment is just to look for me on LinkedIn. And I'll update things shortly. I've got big news coming up soon. So at the moment, things seem a bit quiet, but that's because things are noisy elsewhere. But follow me online and I'll update everyone shortly as to what I'm up to. And of course, Smashing Security is on social media as well. You can find me, Graham Cluley, on LinkedIn or follow Smashing Security on BlueSky or Mastodon, all kinds of places. And don't forget to ensure that you never miss another episode. Bye-bye. You've been listening to Smashing Security with me, Graham Cluley. And thanks so much to Jenny Radcliffe for joining us this week and to this episode's sponsors, ThreatLocker, Vanta, and Meta.

Host:

Graham Cluley:

Guest:

Jenny Radcliffe:

Episode links:

Sponsored by:

  • ThreatLocker – Start your free trial and book a demo of ThreatLocker today to see how you can implement Zero Trust in your environment.
  • Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
  • Meter – Network infrastructure for the enterprise. Get a free personalised demo.

Support the show:

You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.

Join Smashing Security PLUS for ad-free episodes and our early-release feed!

Follow us:

Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.

Thanks:

Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and hosts the popular "Smashing Security" podcast. Follow him on TikTok, LinkedIn, Bluesky and Mastodon, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.