 Welcome back to the Cyber Underground. I'm Dave Stevens, the professor, and I'm here to tell everybody about cybersecurity, of course. It's been a while. All right, I took a long break. We're back. Let's get you up to speed. Once again, I teach for the University of Hawaii Cappy Yolani Community College. I teach Network Security and Ethical Hacking. And I'm here to try to educate the public on cybersecurity. That's a broad term, but we're going to cover a wide swath of the descriptions of cybersecurity today. First of all, we're going to start out with some local events. I have with me the state cybersecurity coordinator, Randall Tiochi. Welcome, sir. Hey, thanks for having me back, Dave. What are you doing? What's up today? So today, we want to talk about girls go cyber start. Okay. Describe this. First of all, I just want to talk about what about cybersecurity, right? So why cybersecurity before we move into that? So first slide. We're going to put the first slide right now. Yes. Okay. So as you probably know, just some background for a lot of people. So why cybersecurity? So short of the events that are occurring out there and those incidents and those breaches, just wanted to give our students really some background as well as their parents. So really, there's an organization called ISC squared. It is the largest international cybersecurity professional association. And they did a survey back in 2017. And just wanted to highlight three things. If you'll get the top right of the sheet on the screen. In 2022, they expect to have 265,000 cyber series jobs that we will not able to fill as a nation. So that's 265,000 gaps. Yeah, it's a gap, not the number of jobs, but the number of jobs after we fill all the jobs that will be left that we cannot fill. Unfilled jobs. Unfilled jobs. So very high demand. Next on the bottom towards the left there, there's a red rectangle. The cybersecurity professionals that were surveyed, 81% said that they are somewhat satisfied, very satisfied with their jobs. So that's a very high satisfaction. And the last one we all want to wait for is how much does a cybersecurity professional make? And back in 2017, the average cybersecurity professional made $124,000 a year. That's a pretty good average when you're considering the wide swath again of all the cities in America where you can employ cybersecurity professionals from Shreveport, Louisiana to Silicon Valley. So in the middle there, 124,000. But that means in Silicon Valley, you're like in a much larger paycheck. Oh, definitely. So this is actually an average throughout the nation. So Hawaii probably may not be that as an average, but Hawaii, cyber professionals do very well here. We have the Paradise Tech. Everybody says you live here, you're grateful, so we're going to give you 30% less. And we all deal with it. So next slide. Why am I here? So that's really the background for our young people in high school as well as their parents. Why cybersecurity? So that's the reason. But I wanted to talk really about a program called Girls Go Cyber Start. So next slide. So really, this program is designed to empower our young women in high school to become cybersecurity professionals and hopefully help with everyone else to protect the web and everything online. So you're getting them in the ninth grade and moving them. So this program is 9 through 12. It's known that in the cyber security profession, women make a very small portion from a representation perspective, right? They're about 10% plus or minus. And so this idea is to bring those young women and add them to the profession. It's such a great profession to be in. That's a great idea for a couple of reasons. The first I can think of is when it comes to cybersecurity, the more minds that think about a problem, the better because you're coming at it from so many different angles. And if you're just coming at it from the angle of the nerdy guys. You got it? Me. You're only getting that certain perspective, whereas if you add women to the mix, you're gaining a lot of knowledge and perspective that you might miss. And as you know, in a cybersecurity career field, sharing, working as a group, team efforts is huge. And men tend to not do that as well, I think, as women. No, they do. They work better as teams. And it's the highest mentality that keeps you safe. You can't have one or two people in a company doing this job. You've got to train everybody's got to be on the front line. Yeah. So back to Girls Go Cyberstar. So Girls Go Cyberstar is a program that Alan Paller from Sands Institute started about a year and a half ago. And what it is really is it's really taking cybersecurity and making it a game web base and asking our young adults to kind of play with it. And as they do this, they'll start learning different cybersecurity principles, you know, encryption, web vulnerabilities, maybe do some Python programming, learning some Linux commands. But they'll actually go through the program and actually learn a lot of these things, not really necessarily realizing they're learning things. Now, these things are many challenges you go through. You have to do problem solving activities. As you go through it, you go from one to another to another. And it just builds upon itself until you get you get really knowledgeable. A lot of these areas. You increase your skill set as you move through. Yeah. That's I think that's the biggest skill set that we need in IT in general, not just cybersecurity. It's a problem solving. The critical thinking aspect. And I think many of our high school students come out challenged in that area. Especially, you know, I teach Community College. It's one of the areas we try to promote. Yeah. So this actually goes into, it's really based on, you know, self learning as a group kind of thing. So there's discussions. If you go through the website, there's an advisor. But the advisor is really the person, the adult at the high school, kind of getting the word to the students and really betting the students as a student of a high school. So we don't have, you know, old people kind of trying to jump in and kind of be young young women kind of thing. So it's really the girls actually kind of do it on their own. But that's what that's all about. With adult supervision. With us out, not really supervision in the sense that they can do it at home. But they do have an adult that has to be the interface with SANS Institute. Well, that's good. Let's go to the next slide. I talked about what it what it is. In girls go cyber start, there's actually three phases that you go through. And really anyone, any young women in high school, nine through 12, they have to be at least 13 years old, just a caveat there. So if it's a high performing young person, they will not be even if they're not 13. That ever happened. Real quick, this is the second year we're doing this. 329 students participated last year. And Hawaii did extremely well as as as teams at international level. Last year, there were 17 states that participated. And this year, the projection is 27 states that will participate. And over to over 20,000 girls, we think are going to sign up 20,000 girls in high school nationwide, nation. That's the way to prime the pump. Yeah, it hasn't started yet. Right now is kind of the sign up phase. So if we can go to the next slide. So what I want to talk about right now is so what do you need to know what you need to what is the experience level. And for SANS Institute, and we saw this last year, you really don't need to know anything. You know, you don't have to be a computer programmer or someone that does Python or have a Linux box at home, any of that you come as is. A lot of it is self learning. So you have to be as as a team, you guys will, you know, encourage, collaborate and move forward. So really, it's one solve one problem solved after another and you skip on building. A really quick note is last year, you would think schools that maybe have a cyber patriot team, or did Jen cyber or hacker high school, these programs out there would do very well. But interestingly, Kalani High School took first place. Kalani High School. Okay, right by Kahala. And Kalani High School does not have a cyber patriot team. They have a pretty high speed math teacher, Dr. Mike Eda, who led his his team and they took first place and he took 10th nationally, which is pretty good. Kalani High School. Good for you guys. They didn't have, I think maybe they had computer science, but short of that, it did not have a, you know, a cyber specific program. It sounds like all you really need is the ability to browse the web and your login. So the first part is web based. Yep. The second part, as you go deeper in, you're going to have to bring up a VM, a virtual machine. So you're going to have to have something that runs, I'm sure they're using VM player as part of that. And then you'll start doing some challenges on the image. And VM player is free to download and use. Yes. So yep, no cost. These modules, it sounds like they provide a little bit of knowledge, and then they have you solve a problem. So you're gaining knowledge, solving problems as you go. Yeah. And in addition to that, in the game, there are resources that they have built. So there's actually toolkits that, I won't say toolkits, but resources where it'll explain things as they go along. So they're just not code in there. And of course, a lot of it also is done on the web as you search and solve the problems. So let's go to the next slide. So just wanted to emphasize, we're kind of on a time crunch. We already have about 300 students that have signed up as of last week. I'm not sure it is today, but to participate, you have to go through the assess phase, which is the first phase. And what that means is you need to go to the website, which I'll show later, and sign up and just do a couple problems just to see if you're interested. It's really an interest check. Once you do the assess phase, you'll get an invitation to do the game phase. Does it put people into groups based on their ability level, or everyone starts at the same level? You pick your teammates. So the girls will come together as a group and be a team. They'll grab your advisor, and they'll move forward. All online. All online. Okay. But if someone wants to be a team member, and you want to sit right next to them physically. Oh, that's okay too. Yeah, I'm sorry. You can play online. You can play next to each other. You can go headsets or however you want to do it. Wow, that's a lot of range. Okay. You don't have to meet any place. And in today's world, you know, we're all remotely distributed kind of. So it's, you know, I don't think they're going to be. Actually, some have told me that they played together and others were online last year. Okay. So next slide. I talked about the assess phase, which was the last slide. Once you do that, and the deadline is April 12 to complete that, you'll get an invitation, and you will be asked if you want to do the game. So the game is really that what we're talking about. It's hundreds of challenges. If you can do all of them, there's a moon base you're trying to get to, earth base, you are a cyber protection officer, and you're trying to protect the world. And you're now searching, you know, doing all those different things, but specifically you're tracking the trail of cyber criminals and trying to take them down. You take them down little by little as you move forward in the game. Let's see. So that one is actually goes from April 22 to June 28. So you get a little while. It's a long time weekend. Last last year was actually two weeks. And the design is specifically so it kind of ended towards the end of the school year. And they think a lot of the AP computer science students would be playing this. So they'll have they'll have some time at the end of the year. Additionally, there's there's kind of a downtime right before they graduate. Little caveat, I didn't put it on this, but there's actually also a capture the flag event from was it June 5 to 7. So the high performing teams in the state and different schools will be asked if they want to do a capture the flag. That'll be the national level after the flag. Another good event coming up. I wanted to mention in the in the game, there are cash prizes for the students as well as their school. So and also scholarships for the kids. Last year, Sacred Hearts Academy got $2,000 as a cash prize for the school based on the performance of their students. And what are the scholarships like? Well, in this one, the scholarships are $500 scholarships for college and every state will get at least 10 scholarships. Well, that's great. That could pay for your books. That'll pay for something. Yeah, that's offset the cost adds up. Yeah. Oh, let's see. With that, let's go to the next slide. How do you go about doing this, right? So if you want to participate, there it is right there. Go to the website girls go cyberstart.org. There's two things on that website. It'll ask you if you want to register. Go ahead and do that. But on the bottom, it'll ask you if you want to try some examples. And there's a website design specifically some examples that you can try out just test drive. Yeah, let's leave that up for the last minute here. We want to win or keep those websites up for people to look at. And what about the last 30 seconds before our break? Anything else you want to promo? Well, a couple of things. If you on that slide right now, we also stood up a Instagram. So cyberstart hi cyberstart Hawaii. There's another program coming up. Maybe I'll show you come by again next month. It's called cyber fast track. And that one is specifically for our college students. If you're a college student, doesn't matter what age from regular age all the way to 8090, you can play that one. And there's some scholarships there. But the big prize in those are actually sans Institute courses. You know, $6,000 per course, very expensive. And the grand prize on that side is basically three of those courses. You'll be you'll be sitting very good as a cyber person if you get that. Yeah, good to know. And come back next month and tell us about this stuff. And thanks for being here. Appreciate your time. Have you got to take a little break and come right back everybody. In one minute, we'll start with drones and how we use them for physical security. So I'm back and join us. Aloha. I'm Wendy Lo and I'm coming to you every other Tuesday at two o'clock live from think tech Hawaii. And on our show, we talk about taking your health back. And what does that mean? It means mind, body and soul. Anything you can do that makes your body healthier and happier is what we're going to be talking about, whether it's spiritual health, mental health, fascia health, beautiful smile health, whatever it means. Let's take healthy back. Aloha. Hi, I'm Rusty Komori host of beyond the lines on think tech Hawaii. My show is based on my book also titled beyond the lines. And it's about creating a superior culture of excellence, leadership and finding greatness. I interview guests who are successful in business, sports and life, which is sure to inspire you in finding your greatness. Join me every Monday as we go beyond the lines at 11am. Aloha. Aloha and my boohai. My name is Amy or take Anderson inviting you to join us every Tuesday here on Pinoy power Hawaii with think tech Hawaii. We come to your home at 12 noon every Tuesday. We invite you to listen, watch for our mission of empowerment. We aim to enrich and lighten, educate, entertain, and we hope to empower. Again, Maraming, Salamat Bo, Mabuhai, and Aloha. Welcome back, everybody. If you skipped ahead, this is the second half of the show. We're changing topics now. We're going to physical security and a unique property of physical security. We're using drones this time, drone technology, which also can can account as IOT. With me here is Percy Ellis, adjunct faculty at the online community college where I teach it and so does he and Russ Langston from Aloha area. Aloha area. Welcome, guys. Hey, good to have you. So do you think this qualifies as internet of things? Absolutely. It can claim an IP on a network can be network network based. Sure. Yeah, it can have an IP address. And generally, we don't have an IP address. We usually use Wi Fi or a similar radio technology to communicate with the drones just direct from the controller to the drone, but nothing else connecting. Yeah, but we can stream live to another device or to YouTube or Facebook. And then these things are getting incredibly advanced. And you guys are going to walk me through some of the ways we can use this for physical security. And what let's talk about physical security. Anyway, in cybersecurity, this is the one thing that people throw out the window. And you know, all the network guys think, Oh, we got this handle because we got a firewall. But then they forgot, you know, there's a six pinlock on the door, and there's no alarm system. And there's no fence. And you know, someone can walk into the parking lot and piggyback through the back door and walk right up to you and tap you on the shoulder. The physical security is monumentally important. And we usually forget about it. And there's all kinds of ways that you can use these drones to enhance your security posture. Now just a quick story, I'm not going to tell you who it is, but a certain person implemented an alarm system for his house remote because he's not always there. And our friend Andrew Lanning and integrated security technology. So why hooked up the alarm system for him hooked up the remote camera so you can log in off island and see whatever's going on in the house. But in addition, if you can't find somebody on the camera, but you know, somebody's there, you can launch a drone. With your iPhone, you can launch the drone, zoom around the house and harass whoever in your yard. I thought, brilliant, absolutely brilliant. But these are incredibly advanced. Walk me through what these are and why they're so advanced with properties. What do you get with a unit like this, pointed towards a camera there. That's, you can see it kind of a star wars looking front. And it's called the enterprise. This is the price version of the Mavic two pro. And if you can start the first video, you can show you some of the infrared properties. This has an infrared, what you call a clear camera is forward looking infrared. You can see a person on the ground in the infrared doing his full Michael Jordan pose. And you can see how hard it is to pick them up without a spotlight on them. So there is in the dark on the left, right, you can see them in the FLIR and the infrared is using both cameras simultaneously and recording two separate files. And then you can send the dogs after them, you know, if the FLIR can be very helpful. It's an attack squirrel. It's an attack. It's actually my dog and I just playing around in there. That's great. What a wonderful device. And it lasts how long in the air? How long can you keep it up? The battery life is anywhere between 17 minutes to half an hour, depending on the conditions you're flying in, right, right, what power devices you're using, because they all draw on the same source. Yeah, yeah. And some of these drones, that drone can be outfitted with a speaker to put on it. We were kind of like, Why would you want that? But let's say you're rescuing somebody on top of you know, trying to miss hat or something is you want to tell them to hold their hands up if they're okay, you can communicate them with them in that way and get some visual communication. They kind of plan how you're going to pull them down from there. That's remarkable. So safety and security. Yeah, that's great. What else can we do with these things? Okay, what was our second graphic? Can we pull that up? I think we were talking about Oh, here we go. Stockpiles. When you hear the term stockpiles, you think it's a figurative thing like I've got a lot of spam stockpiled spam, but there's actually companies that have product and stockpiles out where it's relatively insecure. So this is out in a quarry or a field area where there's a lot of material as far as asphalt gravel, and we can actually program drones to do what I call mowing the lawn. And so this is a demonstration of a drone that's flying this path of taking overlapping images as it goes. And those images because they're geo catched and they're assigned certain GPS coordinates can be stitched together there to form a two or three dimensional map that can be used not only to identify the surface area of product that's there in this case, gravel that actually used to measure the volume of gravel on hand so they can look at sort of inventory security for having large operations. And we can use this in agricultural as well. That's amazing. I mean, stitching the other photo used to be something you do in Photoshop and it took you hours to get it just right. And this does it on the fly. It does. There's a software that you use afterward. It's a little bit proprietary. You need a lot of computing space to do it. If you're taking each of these images about 12 megabytes and you stitch together, you know, or 200 or 300 of them, it's going to be a lot of computing power. A lot of processor power. Yeah, so you shouldn't do this on your 2004 laptop. This is a modern computing environment. And do you have to physically attach something like a USB cable to the device to download the data? You can. Yeah, because it's faster that way or does it also have a Wi-Fi? Not to download it to your laptop. Okay, you download it to your physical connection. Yeah. Oh, but your phone can. So that's the next thing I was going to ask. The controller doesn't have to be like the PS2 controller. You can do it from your phone. You can do an iPad, right? The software for the controller. Well, you still need the controller itself, but the iPad or the phone is your your window, right? Yeah, and on Monday, I'm going to get to see the new DJI controller, which is built in the stack of screen that's built into the controller. And it's for daylight. So you can see the images clearly during the day. And you don't have to break out your cell phone. Okay, what else can you do with these? Well, we have, I think, another video. Let's see what that is. See another video. Okay, this I'll start this off about biosecurity, which is a security that people don't think about a lot. But in Hawaii, we have a lot of endemic species that is species they're found here and nowhere else. And we know that one of the greatest threats to endemic species are non native species, whether they're plants or animals and so us us. Yeah. A lot of cases like strawberry guava is an incredibly invasive plant here in Hawaii. I did not know that. And so yeah, we find them this way, you can find them this way, you can also find native plants this way. And using that sort of mapping technology we showed previously is a good way to map a certain forested area and maybe go back and identify what proportion is native and non native. And then you can make a management plan say how I'm going to go through and cut these down. And because that drone can fly the exact same path over time, you can have the exact same analysis done as snapshots through time. A little scary now that I know that you can use a drone to find my Pakalolo patch. Absolutely, right? But it's good that you can also find people that are lost now. I don't know about you guys. Civil Air Patrol would be good application. So we have a Civil Air Patrol but no helicopters in the civil civil Air Patrol is all fixed wing. Right? They don't have any rotary aircraft. So if you see a helicopter and a search and rescue, that's city or county or Coast Guard, right or the military. And we live right by the high coup stairs. Yeah, stairway to heaven. That's a 3000 foot climb. And people quite often get stuck up there. And it'd be great to be able to find them without burning through 160 gallons of aerial fuel every hour in a regular helicopter. Just send one of these little babies up there. What is the range? I think we have three miles. Three miles. So easily you can go up that high. Yeah, easily. Yeah. And really great cameras. What is the optical resolution of these cameras? I have what's called the Hasselblad or Hasselblad camera. And it has a one inch CMOS sensor on it. And it's 4K resolution. 4K. So this is like the TVs you buy from Costco, a big 80 inch screen. So if you took imagery and put it on that big screen, it's not going to get pixelated or blurry. Not at all. Get a nice clear image, right? So you don't want to take images of your wife before she puts her makeup on. No comment. No comment. Yeah. Yeah, tell me more about these things. Now, first of all, the cost? What's the entry to get in there? Okay, so for the Mavic 2, which is this one with the Hasselblad camera, we're talking 1250 currently. 1250. So that's really affordable. Does that come with a case that folds up into an extra battery and the controller? Yes, and you can get the Flymore pack with three additional batteries and a couple of other features that'll give you more time. What is the educational level like? Like I've never flown a drone before. It's a lot easier now than it used to be. I think the first time I was interested in, I said, well, I'll go get the remote remote control helicopter. And I came in with a couple thousand to drop down and the lady said, I defied this little one and I just bam, she's like, I will not sell this to you. And so I've done the same thing with a couple of drones. I just like ran into a wall and now they sit on a shelf. But these are easier, right? I know the first one you had was you let me fly and it had sensors where you couldn't go forward into a pole. Unfortunately, I reversed into a pole. Right. We've all done the same. These have omnidirectional sensors. But these are the sensors around the sides that we see here. You see these sensors in the back. And this is a this is a sensor up here too. Yes. So as long as it's in tripod mode, it shouldn't be able to fly into anything. Should not. But you're not letting me fly this. I would have no hesitation to allow you to fly that. But you can get it replaced. So tell me about the replacement policy. There's just a fantastic thing. So DJI has a care package that says if you can find the drone afterwards, after a crash, you can return it to them for full replacement. And I did that with the drone that we flew. Oh my god. So I saw the video you guys had. Do you have it? Do you flew out to Chinaman's Hat? Yeah. I'd love to see that one because you guys literally flew this across the ocean. Sure. From the mainland to a mini island called Chinaman's Hat. It's off the north coast out here in Oahu. And if you ditched it in saltwater, okay, you can have to dive into the saltwater. But you can get it replaced. That's fantastic. Was that a lot of money? No. I think it was $60 for the drone that I had, which was a spark. And it's a little bit more for these. But the Chinaman's Hat video was an example of the point of interest features. Well, you just click a point of interest and it goes out there. Yeah. That's fantastic. All these navigational features is neat point of entry. It's easy to fly. It looks like it's economical and it comes with a pretty good insurance policy that you can pick. And all these things make it easier for small and medium businesses to initiate something like this. I just did an audit for a refinery out here and I thought, what a perfect application. So you don't have to walk around and risk your life around the refinery. You can fly this little drone around and not bother anybody. I think this is a perfect solution for physical security when you can't physically cover the amount of space. You can reduce your staff and increase your capacity for a reasonable price. Thanks for coming by, guys. Anything you want to promo before we get out of here is about 30 seconds left. Well, we'd like to promote our business Aloha Aerial Imaging and we have a YouTube page and we're just a fledgling business so you can come out and see some of our first videos. We're going to be polishing up that site and possibly coming up with a more social media presence like Facebook and Twitter. There's a lot of business applications. I'd like to get you guys back in here in a couple of months. Tell me what you've been doing with the business community and all the applications, not just security. And let's do this again. Thanks for coming by. Thank you. Thank you, sir. Thank you. Aloha. Aloha. Aloha, everyone. Thanks for joining us this week for Cyber Underground and we'll be back with another really interesting episode. I promise, very soon. Until then, stay safe.