Justin's note: Over the next two days, I’m sharing a special interview that features Doug Casey and his colleagues on the latest crime wave that’s sweeping the globe.
Below, you’ll hear from John Hunt, an MD and coauthor with Doug of Speculator and Drug Lord, and Durk Pearson, bestselling author and former rocket scientist and aerospace physicist. They recently sat down with Doug to share their best tips on how to protect yourself against the growing cyber-threat.
I think you’ll find their ideas interesting and timely…
John: Equifax hacks, Russian hacks, and political hacks are all competing with the Kardashians for primetime news reports. Let’s focus on something that might actually matter to each of us and that we can do something about: our own personal cybersecurity.
Durk: Computer security is a lot more important than most people realize. Absent precautions, it’s like if you had a stack of $100 bills and left it on the sidewalk in front of your house. If someone happens to stroll through your neighborhood, he can just pick them up.
Likewise, most people have no computer defenses at all. You have more than $100 bills in that computer. You have your future money too, and your credit.
But you can become resistant to this. It’s not an impossible task. Remember the old story? You don’t have to run faster than the bear. You just have to run faster than the other guy. And that is surprisingly simple.
John: So what do you advise that everyone should do now?
Durk: First know that if you live in a gated residential community, you have a very low chance of being robbed. But the internet is as if everyone lives in Watts in the 1960s, or South Chicago now.
John: You have to build your gates and walls.
Durk: Right. Now, you don’t have to be a perfectly hard target. There is no such thing as a perfectly hard target. The CIA got hacked for a lot of their extremely dangerous hacking tools which are now out in the public domain. If the CIA can get hacked, believe me you can get hacked too.
On the other hand, all you have to do is make yourself a much harder target than the value of what people can get out of you and you’re going to be left alone. They’re going to move on to somebody else who isn’t as tough. Which is most everybody.
John: Why are some of the phishing scams so blatantly stupid? Like a Craigslist price of $2,307 for a 2013 BMW. It’s obvious to anyone.
Durk: “Oh gee, I’m a Nigerian prince and I want to move $50 million to America and I’ll give you half of it if you help me.” Why are people trying a scam that’s so stupidly obvious?
The answer is very simple: These are competent and professional fraudsters. If somebody falls for the Nigerian prince thing, then they’ll be stupid enough to give the fraudsters their Social Security number, their bank account number, and their password.
With the Nigerian prince scam, the fraudsters get rid of the 99% of the people that aren’t that stupid right away.
John: Ah. The more inane the fraud pitch is, the better the fraudsters target their market to the stupid. Doug, what’s your definition of stupidity again?
Doug: Stupidity, like intelligence, comes in a number of flavors. The most common definition of stupidity is “of low intelligence” – but that’s rather circular, like saying “slow” means “not very fast.”
I like to define “stupid” as the ability to see the immediate and direct consequences of actions, but the inability to see the delayed and indirect consequences.
Like most criminals, black-hat hackers never see the long-term consequences – like being hunted, being held in contempt by most of society, and probably landing in jail. Or indirect consequences – like destroying their self-respect. Among other things.
An even better definition of stupidity, applicable both to those who respond to the Nigerian prince scam as well as the Nigerian Prince himself, is “an unwitting tendency towards self-destruction.”
Even when criminals score high on IQ tests, they still fit this definition. So while computer criminals are undoubtedly smarter than street criminals, they’re still rather stupid in very important ways.
Durk: It’s relatively easy to protect yourself from being financially harmed in a hack.
The first rule here is, don’t let a million different companies have your credit card number. Almost every company is perfectly willing to deal with a debit card rather than a credit card. If you keep a small amount of spending money in a debit card account, then that’s the most you can lose. And if it’s not your fault, you’re probably going to be made good.
Second, you use encrypted wire transfers with your bank to make deposits. You see that little padlock up on the address line on your browser that says https rather than http? That’s an encrypted link.
Just make sure that you or your browser entered your bank’s internet URL. Don’t click on an email link that appears to have come from your bank, because it may be a fraudulent phishing email that takes you to a URL with an https connection and a padlock that is NOT really your bank but sure looks exactly like your bank’s internet page and likely will have a confusingly similar URL!
The next step is to keep your attack surface to a minimum. An attack surface is the path that you could be attacked through. For example, the more companies that have your credit or debit card numbers, the bigger your attack surface.
When you buy something on the phone, tell them, “I don’t want my credit card number or debit card number being kept permanently on file. I just want to do this one transaction with you and don’t want to set up an account.” It’s in their computer and memory just long enough to clear with the bank or the credit card and then it’s gone. If the company then gets hacked, you are safer.
There are only two places that have my debit card number permanently on file: PayPal and Amazon. Both of those are really serious about security.
John: But the bad guys can be mighty sneaky.
Durk: Yes. Clicking on an ad can load malware onto your computer if you’re not careful, especially if you use Windows. With a Mac, Gatekeeper will ask for your password, warn you that you are about to load an un-vetted program, and ask if you really want to do this.
Some of those ads are little more than a pixel in size. Companies that are selling ad space on their websites don’t do anywhere near what I think is adequate to check out the advertisers. If you use Adblock Plus with Firefox, you are protected because you will never even see the ad, let alone be able to click on it.
Also, you want a more secure browser than something that’s provided by Microsoft or Google. They’ve got a file on you that’s bigger than the FBI, NSA, and the CIA put together.
Every time you do a search they’ve got your IP address – that is your internet protocol address which identifies you uniquely – and they also have years and years of tracking every search you’ve ever done, what you search for, and what you clicked on after you did the search.
That is a vast amount of information. With that information and a bit of computer intelligence, they can figure out that your daughter is pregnant before you know it yourself. Deciphering masses of disparate data to allow for conclusions results from the availability of these dense patterns of information, in what is called the matrix effect.
Microsoft and Google both make more money off of your personal information than they make off any products. The last time I looked at the contract for Windows 10 for individual users, it was 140 pages long. Buried inside there’s a section that essentially says, “All information on your computer belongs to us and we can do anything with it we want.” You agree to this by checking a box that you never read.
Any time you do a Google search they’re harvesting information from you. They’ll sell it to anybody. They’ll sell it to the FSB/KGB, the DEA; they’ll sell it to the cops. If you’re getting a service for free on the internet, you need to know that you are the product.
John: And they can sell this information to burglars who are local to you?
Durk: Not intentionally, but yes, and these burglars then know what you drive, where you drive to and when, where your home is located. They know you’re asleep at 3 a.m., they know you have a Ferrari, they steal your Ferrari out of your driveway.
John: How do you avoid this?
Durk: In the case of Windows, there’s a free program you can get called ShutUp10. It reduces the amount of information getting delivered back to Microsoft from your computer.
You need to keep that ShutUp10 up to date because Microsoft keeps changing the spyware they put on your computer. It’s a constant race. The web has turned into a massive theft of personal information used for marketing purposes.
Also, when doing searches, go to – a ridiculous name, I know – DuckDuckGo.com. They’ll forward your search to Google and Bing and a whole bunch of other search engines, but they won’t forward your IP address, and they won’t keep a dossier on you and all your searches.
Oh, incidentally, don’t use Facebook. Don’t use Twitter. They make all their money by selling your personal information. Just don’t use them.
John: My son told me that travel booking sites substantially raise the available rates for flights if they see you shopping around for a specific trip. Indeed, it happened to me two days ago. I searched a fare three times during the day. The third time, the fare jumped up threefold and stayed high from then on. I thought I had missed out on a good fare.
My son told me to try browsing incognito. Google Chrome has an incognito mode: <Shift + Control + N> turns it on. I turned it on, searched the flight again, and the price for my flight was the nice low one that it had quoted me initially. Sneaky.
But I wonder if I can trust Google Chrome’s incognito mode for long.
Durk: Google Chrome will still fink you out. I use Firefox, which has an incognito mode, with the extensions NoScript, Privacy Badger, Adblock Plus, Cookie Controller, and Random Agent Spoofer. Note that you do not have to restrict yourself to one browser when price shopping for expensive items.
Justin’s note: Chris Wood, our tech expert and editor of Extraordinary Technology, recommended a cybersecurity stock last year that handed his readers triple-digit gains in little over a year. And he’s just found the company set to displace last year’s winner… for potential 130% profits.
You can access the name of this company—and all of Chris’ latest research—with a risk-free trial subscription to Extraordinary Technology. Click here to learn more.
Also be sure to check out Part 2 of Doug’s interview tomorrow, where the guys discuss other ways to start protecting yourself from hackers.
Today, readers respond to our recent Dispatch on the future of electric-car maker Tesla…
It's the first time I have put pen to paper to you but I just have to say that I can't agree more regarding your prognosis on Tesla.
Believing what you have just said, back in March I placed a put, for June, on Tesla crashing, only to lose my $5,000 bet. Clearly the man [Tesla founder Elon Musk] is a perfect artist in front of the American investing public, who just follow and follow his dreams.
I'm afraid that you are right, however. On the other hand, it's great to see how you Americans can follow a dream. Is that not what makes America great?
It is interesting another guy is saying go long on Tesla and that it will be up in the high 300s by the end of Q4!
This may spill over to SpaceX… Boring General Motors (GM) is safer.