Tag: Kevin Freeman

Obama’s Last Minute Damage | The Russians are Coming

Obama’s Last Minute Damage | The Russians are Coming

Show 7-01 Summary: Russian hacking or Obama trying to do as much damage as he can on the way out the door? Obama grabbed another 1.8 million acres in Utah and Nevada — can this be undone or is it another victory for the U.N. enviro-nazis? Plus, the Russians are coming! Did the Russians actually do any hacking or didn’t they?

All Stations Stream Live!
11:00AM Saturday: KUIK (Portland) | KBKR (Baker City) | KLBM (La Grande)
7:00PM Sunday: KAJO (Grants Pass)

Click the mic to download the show! (Shows are available by Mondays at noon)
To download the show, right-click the mic, then “Save Link As…” or use the handy player below

Air Dates: Jan 7 & 8, 2017 | Rep. Ken Ivory (R-UT) & Kevin Freeman

Welcome to our 2017 kickoff show as we watch President Obama packing up and getting ready to leave White House while President Trump prepares to take control.

As if to cause whatever trouble he can on the way out, in true community-organizer fashion, two big things have happened during the remaining days of Obama’s presidency.  First was his most recent land grab of over 1.3 million acres in Utah, adding to the half a billion acres he’s already taken out of state control.  And second is the last gasps of politicization of intelligence agencies as they muddle through whether Russia hacked files that may or may not have impacted on the elections.

Obama’s Land Grab

We start with Rep. Ken Ivory (R-UT) who discusses what it means to have Obama seize yet more land for the federal government, the difference of national forest status to national monument, and all the rights removed from people being able to access the land for any use.  In Oregon we know firsthand the painful reality of having so much land removed from tax rolls with some counties having no resources to pay for school funding. Over the next two weeks remaining to Obama’s powers of pen and phone, will Malheur Forest and Siskiyou Crest National forest be added to the list of national monument designations?

Russians Hacking or Not?

Putin releases the identity of the Russian hacking spies who influenced the electionWe’ll also be talking about the alleged Russian “hacking” and whether it did, in fact, influence the elections. Agencies are alleging that they have proof the Russians did hand off hacked material to WikiLeaks. We talk to Kevin Freeman about the truth of all this, as well as the politicization of our intelligence agencies and how it’s gone wild under President Obama.  This is the president whose intelligence agencies told the American public that ISIS wasn’t to be  worried about and in the weeks before the “Arab Spring” that the Muslim Brotherhood was essentially a civic organization and nothing to worry about.

We’ve watched as Obama used our spy agencies to push political agendas rather than giving us, the people, the straight scoop—or do what they were designed to do: defend the U.S. from outside attacks. Are their solutions to “de-politicizing” our intel agencies? Don’t miss the steps we need to take.

Links & Further Information

Ken Ivory (Segments 1–3)

Kevin Freeman

 

Cybersecurity in the Trump Administration

Cybersecurity in the Trump Administration

Show Summary: With cybersecurity increasingly important, America dodged a bullet when we did not elect Hillary Clinton, the FBI-certified techno-nincompoop. This week, we take a look ahead at cybersecurity in the Trump administration, the challenges and opportunities.

All Stations Stream Live!
11:00AM Saturday: KUIK (Portland) | KBKR (Baker City) | KLBM (La Grande)
7:00PM Sunday: KAJO (Grants Pass)

Click the mic to download the show! (Shows are available by Mondays at noon)
To download the show, right-click the mic, then “Save Link As…” or use the handy player below

Air Dates: Nov. 25 & 26, 2016 | Kevin Freeman

Did you catch that article on the Drudge Report earlier this week about how Donald Trump’s son in law, Jared Kushner, used a tremendous amount of data mining and social media analysis and lean-startup business principles to win the election—throwing out the old model of campaigning, which Hillary used. So much for that whole not having a ground game bit.

We are in a new era. So many of the NeverTrump people I spoke to thought he’d lose because the Never Trumpers  looked at things through the old way of thinking. Didn’t have a ground game. Wasn’t spending on ads. Trust the polls.

It’s like when the telephone started taking off . People’s mindset still existed around the telegraph and land stations and a host of messenger boys to relay messages. But why do that, when you can directly speak to people? And before that, why rely on the post office and the pony express that takes days for a message to get there when you can get a message there in minutes over the telegraph? Each era brings a disruptive force that makes the previous obsolete. As we go forward in the Trump administration, keep that in mind — we are in the dawn of a new era. We stand at the edge of new era, a new way how the govt operates and  business – and gets out of the way to unleash the power of business. And that’s exciting

And that brings me around to today’s topic. Technology and security is the new field of business — and the new battlefield.

Two hundred years ago, whoever controlled the waterways controlled the world. In today, some hacker 19-year-old in Brazil can without ever leaving his bedroom. ISIS. Russia. China. You name it. They can all wipe out the  equivalent of the Erie Canal. They can steal customer information, take over bank accounts. They can shut down websites or millions of lanes of traffic, steal corporate secrets, or worse, steal our national security secrets.

Now, just a few weeks ago, Obama has handed over the  controls of internet—the 21st century waterways—to foreign countries.

Fortunately, the adults have taken over. We talk with Kevin Freeman, a world-renowned expert in cybersecurity and financial terrorism. What will cybersecurity look like in the Trump Administration? Kevin should know, since he’s been advising the Trump transition team.

Tune in to get an inside look at what’s happening behind the scenes with the Trump transition team—and to hear some rather frightening capabilities of our enemies and their targets. Hint: it’s not just computers.

Links Mentioned

Related Links

  • Be sure to check out our previous shows with Kevin Freeman on the archives page

Resources to Protect Yourself and Family

  • Be sure to have a supply of food on hand, a minimum of two weeks would be best but you can buy a month’s worth or more of dehydrated food. See Wise Food Storage or My Patriot Supply for food options.
  • Water is hard to store so look to buy a water purification system (consider that you may not be able to boil water). You can find many options out there but a $16 LifeStraw could literally be a lifesaver
  • EMP Protection: one of the best things you can do to protect yourself against an EMP is to store drinking water, food, and other survival items (e.g., heating/cooking sources, and home-protection). Consider that it could take weeks at a minimum for vital systems to recover and probably years to fully recover.
  • Protecting your electronic devices… If you have no other options, or need something quick while you build a better option, an old microwave apparently can be used as a makeshift Faraday cage but it not as reliable as a true Faraday cage
  • A better option is to make a Faraday cage out of a metal trash can
  • EMP cover – this is a unique lined, multi-layer “envelope” that you can slip electronics into
Economic Warfare and Financial Terrorism – How the 2008 financial meltdown could happen in 2016

Economic Warfare and Financial Terrorism – How the 2008 financial meltdown could happen in 2016

Air Dates: February 13 & 14, 2016 | Kevin Freeman

Click the mic to download the show! (Shows are available by Mondays at noon)
To download the show, right-click the mic, then “Save Link As…” or use the handy player below

On the morning of Sept 11, 2008, John McCain and Sarah Palin were leading Obama and Biden in the polls by quite a bit. But by the end of the day, it saw the largest spike in short-selling in market history, ushering in the financial meltdown of 2008. Was it just some rogue day-traders? Or, as McCain thought at the time, was it an outright attack on our markets, perhaps by Russia and China? The end result was that not only did it set back the American financial markets, cause trillions of dollars of paper value to disappear in a matter of days, plunge thousands of Americans home-owners into bankruptcy, and hamstring our economy—it dramatically affected our 2008 presidential election.

What’s especially concerning is how similar the economic conditions of 2008 are to now—in 2016. Is history about to repeat itself? Have any of the vulnerabilities that ushered Obama into office been fixed?

Economic Warfare and Financial Terrorism

Over the last two weeks, there have been some very troubling headlines, including one that has nearly escaped notice: the sale of the Chicago Stock Exchange to a Chinese-owned company. But this week on Drudge and other sources, there have been headline after headline of trouble in the stock markets — not just here in the U.S. but all across Europe. US and EU stock markets are off to their worst starts since the 1930s. Is history going to repeat itself? And can capitalism survive? Could all of this be a coordinated attack? And why?

Join us this week for a fascinating story of another type of warfare between modern governments: economic warfare and financial terrorism. Get a look at the weapons used and techniques used to deploy them.

On this week’s show, you’ll learn:

  • Was there an attack in 2008 on the U.S. stock markets?
  • What’s been done to prevent another one?
  • Why did the Chinese buy the Chicago exchange — and does it create any vulnerabilities?
  • The latest economic tool is “negative interest rates,” what impact can and will this have on the markets?
  • Are the same conditions from 2008 collapse happening now in 2016?
  • What about all those foreign donations to Hillary Clinton?

Links Mentioned

Related Links

  • Be sure to check out our previous shows with Kevin Freeman on the archives page

 

Why Hillary’s Private Server was such a Glaring Security Risk

Why Hillary’s Private Server was such a Glaring Security Risk

This past weekend on I Spy Radio (Show # 5-32), we had the pleasure of interviewing James Hirsen of Headline Hollywood and Kevin Freeman, one of the world’s leading experts on economic warfare and financial terrorism. (See his site, secretweapon.org and his blog, Global Economic Warfare.) Plenty to choose from on what to write about for this Monday Morning wrap-up, no doubt the new insights on Hillary’s private email server (1) practically leaped out at both me and my ever-astute producer. So what did we learn?

Hillary’s Deleted Emails

There’s been a lot of talk—a lot of talk—about Hillary’s private email server, especially her 30,000+ deleted emails. And, sadly, all that talk has led to pretty much more talk and more discussions but almost no actions.  And by that, I mean no jail time. (Kevin’s thoughts on that very issue are ’round about the 43:50 mark).

But all that talk and suspicion focuses almost entirely on the content of Hillary’s emails—especially the deleted ones. Or on what she has or has not turned over. Yet. Or on topics like Benghazi. Or whether she was giving political favors to big Clinton Foundation donors. And while all of that is important, it turns out that the contents of Hillary’s emails may not be the most damning part of this story.

Hillary’s Private Server

At this point, pretty much everyone except Hillary condemns her use of a private email server for her official State Department business—with the possible exception of Bill. (Maybe it’s just me, but do you ever get the sense that if there was even a slim chance that throwing Hillary under the bus would make him popular, Bill would it in a heartbeat? And if there was a gorgeous young intern on the bus, he’d back it up and hit her again—”Watch me get some air, honey.” But I digress.)

Anyway. Here too, the discussion on Hillary’s private server has been missing an important point. To date, the discussion has largely focused on the fact it allowed her to circumvent the law, lack of transparency, and to some extent the lack of security. Perhaps the reason the important point is skipped over is that it gets a little technical. So let me expand on an analogy I used on the show to help illustrate this.

Before we go any further, use the player here to enjoy some Medieval mood music. You’ll see why in a moment.

Behind the Castle Walls

Bird's eye view of Windsor Castle
Windsor Castle, showing the towers and inner keep

Imagine you’re the Queen of the State Department and you want to get a message to King Obama. Okay, I admit; so far this still sounds a lot like real-life Washington but hang in here.

There you are, holed up are in the Chancellor’s Tower at Windsor and you need to get a message to the King over in Keep (that’s the inner most part of the castle). No problem. Rather than walking all that way and up and down all those, literally, stone-cold stairs, you scratch out your message, hand it to a courier who, forthwith, runs it to the King over in the Keep. The advantage here is the courier remains safely behind the castle walls at all times. There’s that moat and the towers, the armed guards and so even if someone did get behind the walls, it’s a safe bet they’d find their rears at the business end of a pike real soon.

This is what Hillary email should have looked like had she used the government server. Everything stays, as it were, behind the castle walls. But that’s not what she did.

Hillary’s Private Server: The Drunken Messenger

Hillary's messenger stopping along the way
Hillary’s email messenger stopping along the way

Back again to our analogy. Let’s say you’re Queen Hillary, safely behind the castle walls up in the Chancellor’s Tower and you need to dispatch a message to Sir William of Chappaqua in another castle a few states over. You once again scratch out your message and hand it to your messenger. Except this is where it gets very different.

The way email works is this: when you send your email, it goes out into the world but before it gets to its final destination, it’s more like the old Pony Express than something out of Star Trek. Your email doesn’t get sent through some subspace channel directly from your computer to the recipient’s computer. Instead, just like the Pony Express, the mail is handed from one server to another all along the route. Your email is handed to your local server (your ISP—Internet Server Provider) and from there to a number of other servers as it wends its way to its final destination, your recipient’s ISP and, from there, to your recipient’s computer.

To return to the analogy, Queen Hillary’s email left the safety of the castle walls and went out into the countryside—and stopped at every tavern along the way for a pint or two before staggering out the door on to the next one.  This is how Hillary sent official, confidential, and classified State Department emails.

But Wait, it Gets Worse

That tavern picture above isn’t too far from the truth. The “secret message” is just sitting, there on the table and potentially anyone can sneak a peek. Or, as the servant toddles off to the next tavern, he could get waylaid and robbed or worse. Worse you say? Worse, say I.

What’s worse is that while the messenger is either sleeping it off under the bar or staggering off to the next village, someone could not only read the message but potentially slip a bit of malicious code in message pouch. Not so much as change the message (“P.S. Bill, I want a divorce”) but code that could make it easier to get into the castles. This would be like a note to the guards that, at 12:01 a.m. on Michaelmas, open the gate.

This is malware. It gets into a computer, behind the castle walls, and makes it easier for the barbarian hackers to gain entry. As revealed on the show, as of the last year of the Bush presidency, the Chinese government had hired 100,000 full-time hackers to do nothing but try to hack into the U.S. government, major companies, financial systems, and internet infrastructure. So what do you figure are the chances one or more of those 100,000 hackers managed to hack into a “tavern” and lie in wait for a government messenger to stagger in?

But Wait, it Gets Worse Yet

Hillary's Chappaqua residence. Sort of looks like a castle, doesn't it?
Hillary’s Chappaqua residence. Sort of looks like a castle, doesn’t it?

At long last, the dutiful messenger finally staggers up to Castle Chappaqua. He salutes the guard and presents his credentials at the same time and wobbles a bit as the guard yanks them from his hand. The two blush a little as the sounds of feminine giggles waft down from one of the towers — oh, sorry. Got lost there in the moment.

What’s worse than an unguarded messenger carrying classified information going from one castle to another, stopping at every tavern along the way? What’s worse is precisely what Hillary has done. Brace yourself.

Remember that messenger carrying the message? That he kept leaving on the bar? On the bar of every tavern and dive between Windsor and Chappaqua? The message in the courier bag into which anyone who knew how could slip other messages? If all that weren’t already horrible enough, given the sensitivity of the messages, think about this:  every time Hillary emailed—er, messaged—King Obama or any other government official—even people in State Department offices just down the hall—the messenger was dispatched all went to Chappaqua. And back.

That’s right. Instead of a messenger going from Tower A to Tower B safely behind the castle walls, Hillary sent that drunken messenger all the way to Chappaqua and back, stopping again at every tavern along the way. Just to get an email  to King Obama.

Yes, the contents of those emails matter. Destroying emails is criminal enough. But what Hillary has exposed the entire government to —and all of us— is far, far worse. And she wants to be president? She ought to be in jail.

 

Footnotes

The discussion with Kevin about Hillary’s private email server and her deleted emails takes place in segment six but to really get the full brunt of it, you need to listen to the whole show. It puts what she’s done in context.

Copyright © Aug. 10, 2015 Mark Anderson and I Spy Radio. All rights reserved. If citing this article, please cite http://ispyradio.com/new-insights-on-hillarys-private-server/ or link to www.ispyradio.com.

5-32 Chinese Invasion – China’s Silent War with the US

5-32 Chinese Invasion – China’s Silent War with the US

To download the show, right-click the mic, and then “Save Link As…” or use the handy player below
To download the show, right-click the mic, then “Save Link As…” or use the handy player below

Air Dates: August 8 & 9, 2015 | James Hirsen & Kevin Freeman

Seemingly almost without notice, China is quietly invading the U.S. Perhaps taking a page from the Soviet Union era’s failed communist takeover, China is waging war against the U.S. — not with nuclear ICBMs but through economic and cultural warfare. And the scary thing is, they’re winning.

This Chinese invasion is taking many forms. Some months ago, we brought your attention to the economic warfare China is waging against the U.S. Their silent warfare has intensified. This week, we take a deeper look at the threat no one seems to be paying attention to—at least seemingly no one in the Obama administration. Why are they opening the door to our enemies?

The Chinese Invasion of Hollywood

We’ll start by talking to James Hirsen of Headline Hollywood about the Chinese invasion of Hollywood. Why are Hollywood elites—the uber-liberal of liberals, who famously decry any sort of censorship—getting into bed with Chinese investors? What are the Chinese hoping to get out of this strange marriage?

The Chinese Invasion of US Companies

As of 2008 the Chinese government had hired more than 100,000 full-time hackers to do nothing but try to hack into America’s government and U.S. companies. Given that, and the Obama administration’s penchant for words not actions, it’s perhaps not surprising that a former NSA director recently said that every major US company has been hacked into by the Chinese. This gives the Chinese access to trade secrets, companies’ financial information, and future plans. Talk about insider trading. Are we ripe for a disaster? We’ll talk with Kevin Freeman about China’s silent war with the U.S. Kevin is one of the world’s leading authorities on financial and economic warfare.

Since the mainstream media is focused on Donald Trump, you probably haven’t heard that the Chinese markets have suffered huge losses, more than 30%, in the last few months. The Chinese government has officially accused the U.S. of hacking their system. Did we?

Hillary Clinton’s Emails Hacked?

Given the Chinese hack attacks on our infrastructure, on our government, and that Hillary used a private server for official, classified State Department business, could one of these 100,000-plus Chinese hackers found their way into Hillary emails? Tune in to hear the stunning revelation of how easily Hillary’s private server may have exposed the entire U.S. government to infiltration.

Related Links

Economic Warfare

Economic Warfare

To download the show, right-click the mic, and then “Save Link As…” or use the handy player below
To download the show, right-click the mic, and then “Save Link As…” or use the handy player below

Air Dates: Jan 17 & 18, 2015

The 21st century’s battlefields won’t just involve bombs and guns. Enter the age of economic warfare and financial terrorism. And when it comes to warfare, you attack your enemy’s weaknesses. The problem is, the U.S. has created a massive weakness and the States are helping—and in this day and age, we’re more vulnerable than ever.

We know that regular I Spy Radio listeners are keenly aware that at the heart of big government lies big spending. In fact, big government simply could not exist without big spending.

But what do you know about the actual mechanism that allows the federal government to enact policies it is not constitutionally allowed to do? We talk about grant-in-aid funding with State Senator Doug Whitsett and how this funding is really about states giving up their own authority.

Perhaps even worse is the extremely vulnerable position this spending puts us in. We talk with Kevin Freeman, one of the world’s leading authorities on economic warfare and financial terrorism. With groups like ISIS, this is no longer “just” threats from countries like China and Russia. It’s real, it’s happened and find out why it will happen again. Tune in to hear why all this spending is like a bomb we built — and then handed to the terrorists.

Links mentioned