March 24, 2026

Is My Grandchild Really In Trouble

Is My Grandchild Really In Trouble
iHeartRadio podcast player iconAmazon Music podcast player iconApple Podcasts podcast player iconPandora podcast player iconPodchaser podcast player iconAudible podcast player iconSpotify podcast player iconDeezer podcast player iconSpreaker podcast player iconPodcast Addict podcast player iconYoutube Music podcast player iconYouTube podcast player iconCastbox podcast player iconCastamatic podcast player iconCastro podcast player iconFountain podcast player iconGoodpods podcast player iconOvercast podcast player iconRSS Feed podcast player iconPocketCasts podcast player iconPodimo podcast player iconPodurama podcast player icon
iHeartRadio podcast player iconAmazon Music podcast player iconApple Podcasts podcast player iconPandora podcast player iconPodchaser podcast player iconAudible podcast player iconSpotify podcast player iconDeezer podcast player iconSpreaker podcast player iconPodcast Addict podcast player iconYoutube Music podcast player iconYouTube podcast player iconCastbox podcast player iconCastamatic podcast player iconCastro podcast player iconFountain podcast player iconGoodpods podcast player iconOvercast podcast player iconRSS Feed podcast player iconPocketCasts podcast player iconPodimo podcast player iconPodurama podcast player icon

David Hawkins is back to talk about Artificial Intelligence, Deep Fakes, and Voice Cloning. Is it really your grandchild calling? Is this video real or fake?

Join us to learn more about Artificial Intelligence, Deep Fakes, and Voice Cloning.

Let’s Talk About Scams is broadcast live Tuesdays at 8AM PT on K4HD Radio - Hollywood Talk Radio (www.k4hd.com) part of Talk 4 Radio (www.talk4radio.com) on the Talk 4 Media Network (www.talk4media.com). Let’s Talk About Scams TV Show is viewed on Talk 4 TV (www.talk4tv.com).

Let’s Talk About Scams Podcast is also available on Talk 4 Media (www.talk4media.com), Talk 4 Podcasting (www.talk4podcasting.com), iHeartRadio, Amazon Music, Pandora, Spotify, Audible, and over 100 other podcast outlets.

Disclaimer: The information contained in this podcast is intended for informational purposes only and is not a substitute for individual professional / legal advice. The podcast information was carefully compiled from vetted sources and references; however, R.O.S.E. Resources / Outreach to Safeguard the Elderly cannot guarantee that you will not fall victim to a scam.

Become a supporter of this podcast: https://www.spreaker.com/podcast/let-s-talk-about-scams--6483699/support.

WEBVTT

1
00:00:01.000 --> 00:00:04.599
This program is designed to provide general information with regards

2
00:00:04.639 --> 00:00:07.599
to the subject matters covered. This information is given with

3
00:00:07.639 --> 00:00:12.000
the understanding that neither the hosts, guests, sponsors, or station

4
00:00:12.240 --> 00:00:19.079
are engaged in rendering any specific and personal medical, financial, legal, counseling,

5
00:00:19.320 --> 00:00:21.600
professional service, or any advice.

6
00:00:21.960 --> 00:00:24.039
You should seek the services.

7
00:00:23.480 --> 00:00:29.239
Of competent professionals before applying or trying any suggested ideas.

8
00:00:30.199 --> 00:00:33.600
The information contained in this podcast is intended for informational

9
00:00:33.640 --> 00:00:37.079
purposes only and is not a substitute for individual professional

10
00:00:37.240 --> 00:00:41.000
legal advice. The podcast information was carefully compiled from vetted

11
00:00:41.039 --> 00:00:45.200
sources and references. However, Rose Resources outreach to safeguard the

12
00:00:45.240 --> 00:00:48.159
elderly cannot guarantee that you will not fall victim to

13
00:00:48.200 --> 00:00:53.679
a scam. Let's talk about scams. It's the must listen

14
00:00:53.759 --> 00:00:57.000
show for anyone who wants to protect themselves and their

15
00:00:57.039 --> 00:01:01.560
loved ones from scams. Every Tuesday, eight am Pacific time

16
00:01:01.600 --> 00:01:05.719
on K four HD Radio, Joyce Petrowski, founder of Rose,

17
00:01:05.879 --> 00:01:10.719
and her guests will provide valuable insights and practical tips

18
00:01:10.760 --> 00:01:15.040
on how to recognize and protect yourself from scams. And

19
00:01:15.159 --> 00:01:18.640
now here is your host, Joyce Petrowski.

20
00:01:19.560 --> 00:01:22.200
Well, welcome back, everybody to let's talk about scams. I'm

21
00:01:22.239 --> 00:01:26.400
Joyce Petrowski, founder and board president of Rose Resources Outreach

22
00:01:26.480 --> 00:01:29.599
to safeguard the elderly. You can find more information on

23
00:01:29.640 --> 00:01:32.920
our website at Roseadvocacy dot org. At the top of

24
00:01:32.920 --> 00:01:39.079
the homepage, you'll see all of our social media channels Facebook, LinkedIn, Instagram, YouTube,

25
00:01:39.319 --> 00:01:41.480
and if you scroll all the way down to the bottom,

26
00:01:41.879 --> 00:01:43.760
you will see where you can sign up for our

27
00:01:43.799 --> 00:01:47.280
monthly newsletters. We do one that we send out in

28
00:01:47.280 --> 00:01:50.200
the mail, and we do one via email, and the

29
00:01:50.280 --> 00:01:54.280
emailed one Every Tuesday morning at nine fifteen Arizona time,

30
00:01:54.319 --> 00:01:57.319
which is about an hour and twelve minutes. You're going

31
00:01:57.359 --> 00:02:00.840
to receive a tip Tuesday, and it's a great reminder

32
00:02:01.640 --> 00:02:05.280
about your healthy skepticism and scam prevention. You might already

33
00:02:05.359 --> 00:02:09.319
know the tip, but it's a reminder in a good

34
00:02:09.360 --> 00:02:12.360
way to keep scam prevention top of mind so you're

35
00:02:12.400 --> 00:02:16.080
more apt to know to stop and pause when you

36
00:02:16.120 --> 00:02:19.560
get contacted and really do your research to verify what's

37
00:02:19.599 --> 00:02:23.120
going on. Today, we're going to talk about some artificial

38
00:02:23.159 --> 00:02:28.960
intelligence and we have David Hawkins back with deep roots

39
00:02:29.000 --> 00:02:32.960
in both physical and cybersecurity. David's skills cover everything from

40
00:02:33.000 --> 00:02:38.560
identity management and access control to compliance and risk solutions.

41
00:02:39.039 --> 00:02:42.800
He has conducted hundreds of workshops and thousands of pocs

42
00:02:42.800 --> 00:02:46.400
in vendor cyber risk management. So let's welcome David.

43
00:02:48.080 --> 00:02:50.639
Hello, nice to see her again, David, good.

44
00:02:50.479 --> 00:02:50.960
To see you.

45
00:02:52.639 --> 00:02:57.919
All right. So artificial intelligence, Yeah, I think or AI

46
00:02:58.240 --> 00:03:03.479
right as everybody knows it. So what specifically do you

47
00:03:03.520 --> 00:03:04.280
want to talk about.

48
00:03:04.960 --> 00:03:07.560
Well, you know, the last time we talked, we talked

49
00:03:07.560 --> 00:03:13.919
a little bit about the deep fakes, and obviously deep

50
00:03:13.960 --> 00:03:16.520
fakes are a pretty big part of you know, being

51
00:03:16.800 --> 00:03:20.520
aware of not being scammed and things like that. And

52
00:03:20.560 --> 00:03:25.960
in order to illustrate some of what I've learned recently

53
00:03:25.960 --> 00:03:28.680
in AI, and I've spent the last three years digging

54
00:03:28.800 --> 00:03:32.800
pretty deep into ai'll go back to that previous conversation

55
00:03:33.000 --> 00:03:36.759
and show you how number one, it'll reinforce what we

56
00:03:36.879 --> 00:03:39.800
talked about then, but also talk about how I use

57
00:03:39.879 --> 00:03:44.680
that to generate the content that the link that I

58
00:03:44.759 --> 00:03:48.199
provided you has. Okay, So it's a little bit of

59
00:03:48.199 --> 00:03:52.280
a behind the scenes of what we did before. Okay,

60
00:03:54.400 --> 00:03:58.479
So I'll go ahead and share screen here. And what

61
00:03:59.199 --> 00:04:04.280
I did was initially when we first got together I

62
00:04:04.360 --> 00:04:08.719
shared a document with you, and that document essentially was

63
00:04:09.800 --> 00:04:13.719
I took some bullet points and I asked an AI

64
00:04:14.199 --> 00:04:18.639
to help me generate this document. Now, the way that

65
00:04:18.720 --> 00:04:23.160
worked is I started off with let's go to I

66
00:04:23.199 --> 00:04:26.439
started off with this tool called grock. Now grock is

67
00:04:26.560 --> 00:04:29.800
just one of the many AI types out there. There's

68
00:04:30.399 --> 00:04:33.279
Open Ai Rock, Gemini, any.

69
00:04:33.120 --> 00:04:35.480
Of them isn't co Pilot one of them.

70
00:04:35.360 --> 00:04:39.600
And Copilot yes, Microsoft Copilot. So they're all excellent tools.

71
00:04:39.959 --> 00:04:43.839
But I started off with this simple interface and I said,

72
00:04:44.319 --> 00:04:50.519
help me build a document related to As a matter

73
00:04:50.560 --> 00:04:54.000
of fact, I think I have the old prompt somewhere

74
00:04:54.040 --> 00:05:00.759
over here on deep fake videos, so there's right there.

75
00:05:00.800 --> 00:05:03.839
So I created a conversation and I said I'm looking

76
00:05:04.079 --> 00:05:07.759
for a way to demonstrate deep fake videos, and it

77
00:05:07.800 --> 00:05:11.199
actually came back and gave me and I'll just copy

78
00:05:11.240 --> 00:05:13.439
and paste this. You can see how quickly these things

79
00:05:13.920 --> 00:05:17.120
put it together for you. And the trick with AI,

80
00:05:17.759 --> 00:05:21.399
and the real skill with AI right now is in

81
00:05:22.240 --> 00:05:25.800
coming up with the best prompt. In many respects, it's

82
00:05:26.040 --> 00:05:30.079
asking the system, the AI, to make a prompt for you,

83
00:05:31.600 --> 00:05:34.560
and that just saves you the whole and it does

84
00:05:34.600 --> 00:05:37.360
take a few seconds. So what you're seeing in the

85
00:05:37.399 --> 00:05:40.680
background right now is there are a number of agents

86
00:05:40.879 --> 00:05:43.839
inside of this tool that are going out and creating

87
00:05:43.879 --> 00:05:47.800
a bunch of content in order to or doing research

88
00:05:47.879 --> 00:05:49.879
and then creating the content on the fly.

89
00:05:50.920 --> 00:05:52.519
The content showing up there.

90
00:05:53.000 --> 00:05:55.759
Yeah, it's going through and you can see it, says

91
00:05:55.800 --> 00:05:57.480
Agent three, I know this is let me let me

92
00:05:57.560 --> 00:06:00.879
zoom that in a little bit so folks could see it,

93
00:06:02.079 --> 00:06:05.319
and that this gives you an idea of what is

94
00:06:05.560 --> 00:06:08.040
happening behind the scenes. So there are a whole bunch

95
00:06:08.079 --> 00:06:11.639
of agents that are running just for the purpose of

96
00:06:12.759 --> 00:06:17.360
going after and creating and right, rightfully, it's a good

97
00:06:17.399 --> 00:06:20.800
thing to point out right off the bat. It's there

98
00:06:20.839 --> 00:06:23.680
are a lot of protections being built into AI right

99
00:06:23.759 --> 00:06:27.920
now from a deep fake perspective to prevent people from

100
00:06:27.959 --> 00:06:29.120
making deep fakes.

101
00:06:29.319 --> 00:06:30.480
So which is good?

102
00:06:31.079 --> 00:06:31.879
Is aware of that?

103
00:06:32.480 --> 00:06:32.800
Yes?

104
00:06:33.959 --> 00:06:37.519
Now before so explain when you say there's a lot

105
00:06:37.519 --> 00:06:41.240
of agents working in the background, Explain what an agent is.

106
00:06:41.839 --> 00:06:45.959
Right, So, initially, when you just create a prompt, a

107
00:06:46.040 --> 00:06:50.759
prompt is just an instruction. Now an agent is able

108
00:06:50.800 --> 00:06:54.759
to take the instruction and break it down into sub tasks,

109
00:06:55.319 --> 00:06:59.000
and then each agent will go grab onto one of those.

110
00:06:58.800 --> 00:07:03.800
Tasks and run with and the agent is actually the AI.

111
00:07:05.240 --> 00:07:05.800
Software.

112
00:07:06.360 --> 00:07:08.600
It's a task manager, a task manager.

113
00:07:08.639 --> 00:07:09.079
Okay.

114
00:07:09.639 --> 00:07:13.639
And you may have heard recently a great deal of

115
00:07:13.680 --> 00:07:18.639
information about Claude one cloud. I'm sorry. Open Claw okay.

116
00:07:19.120 --> 00:07:22.639
So open Claw is a tool that somebody created here.

117
00:07:22.720 --> 00:07:27.079
It was a weekend project, just a weekend literally, a

118
00:07:27.079 --> 00:07:31.800
weekend project. And this guy put together a tool that

119
00:07:31.959 --> 00:07:34.959
was supposed to be a personal assistant. Okay, we go

120
00:07:35.079 --> 00:07:37.560
out and do all of these different things for you.

121
00:07:38.199 --> 00:07:42.040
And as he continued to build it, he started adding

122
00:07:42.079 --> 00:07:47.079
things like connections to Telegram, which is a communications chat software,

123
00:07:48.040 --> 00:07:51.560
Discord another one like that, and each one of those

124
00:07:51.600 --> 00:07:55.759
communication tools would allow the agent to talk to you.

125
00:07:56.560 --> 00:08:00.079
And it even reached a level of sophistication where the

126
00:08:00.160 --> 00:08:02.079
agent would call you on the phone.

127
00:08:02.600 --> 00:08:06.920
Oh wow, so the agent is really like a computer.

128
00:08:07.519 --> 00:08:07.920
It is.

129
00:08:08.079 --> 00:08:11.639
It's not because I think when we might, you know,

130
00:08:11.879 --> 00:08:14.920
me being old school, we think of agents as being

131
00:08:15.000 --> 00:08:17.079
a real, live person that you're talking to.

132
00:08:17.680 --> 00:08:21.480
That's exactly right, that's exactly right. So and that's how

133
00:08:21.480 --> 00:08:23.639
you want to think of an agent, because each time

134
00:08:23.680 --> 00:08:28.920
you work with an agent, you end up with some

135
00:08:30.079 --> 00:08:32.840
the equivalent of a person that is running with a

136
00:08:32.919 --> 00:08:38.720
task and acting on a number of items. So the

137
00:08:38.759 --> 00:08:41.840
output of what we ended up with here this is

138
00:08:41.919 --> 00:08:45.639
actually a remash because I went back and created something else.

139
00:08:46.000 --> 00:08:51.159
But our original conversation had this document, and this whole

140
00:08:51.200 --> 00:08:57.440
document was composed by the tool. Now that's great just

141
00:08:57.480 --> 00:09:00.320
having a document. This is a script perhaps for a

142
00:09:00.440 --> 00:09:02.960
video that you might make. And that's kind of what

143
00:09:03.000 --> 00:09:04.759
we did on the last call.

144
00:09:05.039 --> 00:09:08.879
Right right, you know, this is when we talked to

145
00:09:09.279 --> 00:09:12.559
people in the presentations. I did one yesterday and on Sunday,

146
00:09:14.320 --> 00:09:18.200
I talk very briefly about AI because I tell them

147
00:09:18.240 --> 00:09:20.480
right up front, I am not an AI expert. I

148
00:09:20.559 --> 00:09:24.840
have not done a lot of research, you know, on it.

149
00:09:25.039 --> 00:09:28.679
But the generative text, right, I talked to him about,

150
00:09:28.720 --> 00:09:30.720
how do you remember when scams kind of were in

151
00:09:30.720 --> 00:09:34.399
the early stages and before we even had email, they

152
00:09:34.440 --> 00:09:37.320
were sending letters in the mail, but then they would

153
00:09:37.360 --> 00:09:39.440
do them via email and you could look at it

154
00:09:39.519 --> 00:09:42.159
and go, the grammar is so bad. You just knew

155
00:09:42.159 --> 00:09:44.039
it was a fake. You knew it was a scam.

156
00:09:44.919 --> 00:09:48.320
But I and I some people know about chat GPT,

157
00:09:48.600 --> 00:09:51.720
others don't. And I'm like, it's free. Scammers can use

158
00:09:51.759 --> 00:09:55.399
it just like we can. But within seconds, it creates

159
00:09:55.639 --> 00:09:59.639
a grammatically correct script that they then copy and paste

160
00:09:59.679 --> 00:10:02.440
over into an email or a letter or whatever they're

161
00:10:02.480 --> 00:10:05.240
going to you know, do, And so you can't look

162
00:10:05.279 --> 00:10:09.480
at it and say, well, you know, this is sounds legitimate.

163
00:10:09.519 --> 00:10:15.120
It must be right exactly, and it's And so now

164
00:10:15.559 --> 00:10:18.080
I want to go just on the like learning about

165
00:10:18.080 --> 00:10:20.720
how to use AI a little bit. Okay, and this

166
00:10:20.759 --> 00:10:23.159
one so this is still this is still on the

167
00:10:23.639 --> 00:10:26.039
creating the script for that discussion, and I'm going to

168
00:10:26.039 --> 00:10:27.600
go back to the top so that you can see

169
00:10:27.639 --> 00:10:30.399
the full conversation. So I said, help me with the

170
00:10:30.440 --> 00:10:33.480
talking points, right and I and I took the original

171
00:10:33.559 --> 00:10:36.840
document that it generated, that word document, and I just

172
00:10:37.000 --> 00:10:39.799
dragged it and dropped it in. Okay, so that's this

173
00:10:39.919 --> 00:10:45.519
attachment right here. Okay, this document that I just talked about, right, Yeah,

174
00:10:45.960 --> 00:10:48.519
I iterated on it. So I took that document it

175
00:10:48.559 --> 00:10:51.039
was downloaded as a file on my computer, and I

176
00:10:51.159 --> 00:10:55.279
just dragged it and dropped it into this conversation so

177
00:10:55.360 --> 00:10:58.840
that way I had more context, and I said, what

178
00:10:58.960 --> 00:11:01.759
I really want, I want to go you know, it

179
00:11:01.799 --> 00:11:04.360
came back and said, Okay, that was a great conversation.

180
00:11:04.440 --> 00:11:07.000
And I'm sorry for scrolling here quick, because I know

181
00:11:07.039 --> 00:11:09.159
that can be annoying. But here's the second part of

182
00:11:09.159 --> 00:11:12.440
my conversation. I said, get me links for all of

183
00:11:12.480 --> 00:11:16.440
the research that you did with those agents, and show

184
00:11:16.480 --> 00:11:19.480
me the links. I don't just want the output of

185
00:11:19.799 --> 00:11:20.399
the content.

186
00:11:20.799 --> 00:11:22.159
I want to where it came from.

187
00:11:22.360 --> 00:11:24.720
Yeah, I want this citeation so I know it's real.

188
00:11:25.159 --> 00:11:25.440
Okay.

189
00:11:25.440 --> 00:11:28.879
And so it came back with all of these links. Wow.

190
00:11:29.399 --> 00:11:32.200
A step by step process that I did in order

191
00:11:32.240 --> 00:11:35.879
to make this a very useful thing is I use

192
00:11:35.960 --> 00:11:40.240
another tool. And this is not AI. This is actually

193
00:11:40.360 --> 00:11:44.200
just a quick, easy tool to get bookmarks for things,

194
00:11:44.799 --> 00:11:47.440
all right. So this is every one of the links

195
00:11:47.679 --> 00:11:50.679
that we looked at over here. I went in and

196
00:11:50.720 --> 00:11:53.879
I said, open this in another tab, open this in

197
00:11:53.919 --> 00:11:56.039
another tab, each one of these links. I did that

198
00:11:56.080 --> 00:11:57.759
for every one of these individual links.

199
00:11:57.879 --> 00:11:58.200
Okay.

200
00:11:58.320 --> 00:12:01.799
That gave me the websites and the items, And just

201
00:12:01.840 --> 00:12:05.279
to make it easy, I saved them with this little

202
00:12:05.360 --> 00:12:08.679
widget and it saved it as you can see right

203
00:12:08.679 --> 00:12:12.440
here in the Rose interview for today. Okay, okay, and

204
00:12:12.480 --> 00:12:15.679
that that's what all of these individual items are. And

205
00:12:15.720 --> 00:12:18.200
so the good news is for the folks who click

206
00:12:18.240 --> 00:12:21.000
on the link for the notebook that I shared, every

207
00:12:21.000 --> 00:12:23.720
one of these links is inside that notebook.

208
00:12:23.759 --> 00:12:25.360
Oh okay, okay.

209
00:12:25.120 --> 00:12:27.279
So all of these videos are there, so you can

210
00:12:27.360 --> 00:12:29.960
actually go in and say, how do I learn about

211
00:12:30.039 --> 00:12:32.840
these deep pics? Can you give me some examples, you know,

212
00:12:32.919 --> 00:12:35.840
rather than rehashing that. We don't need to go try

213
00:12:35.879 --> 00:12:38.559
and create a demo of this because so many have

214
00:12:38.600 --> 00:12:41.200
already built some great, great content.

215
00:12:40.799 --> 00:12:41.840
Around this, right right.

216
00:12:42.600 --> 00:12:46.639
So that's when I go to the next big tool.

217
00:12:46.720 --> 00:12:49.399
So the first big tool was just using any old

218
00:12:50.120 --> 00:12:53.919
chat tool, and make sure to remember to ask specifically

219
00:12:53.960 --> 00:12:56.639
for things that are useful, like I need the links,

220
00:12:56.679 --> 00:12:59.799
don't just tell me give me the links. So you've

221
00:12:59.799 --> 00:13:03.399
got some proof behind it that gives you the starting point.

222
00:13:03.799 --> 00:13:05.840
And I did the same thing again. I took that

223
00:13:06.039 --> 00:13:09.600
content and I copied and pasted all of it with

224
00:13:09.759 --> 00:13:14.360
the links back into this document for the second draft. Okay,

225
00:13:14.480 --> 00:13:16.559
I've got a nice record of that. And then I

226
00:13:16.600 --> 00:13:20.120
went to another really powerful tool. And this is a

227
00:13:20.159 --> 00:13:22.440
free tool that you should know about if you haven't

228
00:13:22.559 --> 00:13:26.080
had the opportunity to work with it. This is a

229
00:13:26.120 --> 00:13:30.759
tool called notebook LM. Now you can download it as

230
00:13:30.799 --> 00:13:32.919
a program. That's what you're looking at on the screen

231
00:13:33.000 --> 00:13:38.600
right now. But it's also available as a link, so

232
00:13:39.080 --> 00:13:42.559
you can just go open notebook LM. I don't think

233
00:13:42.679 --> 00:13:44.919
I thought I had it right there, but I don't,

234
00:13:45.039 --> 00:13:48.080
so we'll go notebook LM. So you can see the

235
00:13:48.120 --> 00:13:53.399
link here at the top says notebook LMT, Google dot com.

236
00:13:53.799 --> 00:13:56.320
And if you just search for notebook l it'll bring

237
00:13:56.360 --> 00:13:59.080
it right here. And then here's the deep fake topic.

238
00:13:59.519 --> 00:14:02.240
I've got all these different notebooks for different shows that

239
00:14:02.240 --> 00:14:06.039
I've been researching and doing. And then here's the here's

240
00:14:06.080 --> 00:14:08.440
the content, and you see all over here on the left,

241
00:14:08.879 --> 00:14:11.080
this is where all the videos that I just showed

242
00:14:11.120 --> 00:14:14.320
you were. When I pasted, I dragged and dropped the

243
00:14:14.440 --> 00:14:18.960
document in okay, and that that by doing that what

244
00:14:19.000 --> 00:14:21.600
it is I had add sources and then I just

245
00:14:22.120 --> 00:14:23.440
dragged and dropped. Yeah.

246
00:14:23.720 --> 00:14:25.679
Yeah, it just went straight upload either one.

247
00:14:25.799 --> 00:14:29.519
Yeah exactly. And in fact, what I did too was

248
00:14:29.720 --> 00:14:32.039
in order to get the websites so clean out here.

249
00:14:32.080 --> 00:14:34.000
If I just left them in as a word document,

250
00:14:34.320 --> 00:14:36.879
it might not have picked it up so easily. So

251
00:14:38.480 --> 00:14:43.840
using this web page tool, I downloaded as a text

252
00:14:43.840 --> 00:14:49.039
file all of my weblinks, and that gave me this

253
00:14:49.240 --> 00:14:51.639
page right here, which I'm going to bring over here

254
00:14:51.639 --> 00:14:53.639
you go. So when I downloaded it, it just gave

255
00:14:53.639 --> 00:14:55.799
me all these web pages, simple as that. It was

256
00:14:55.879 --> 00:14:58.879
just all of the content and when you download it now,

257
00:14:58.879 --> 00:15:01.679
I don't need to memorize these. But what I did

258
00:15:01.799 --> 00:15:04.759
or used these anyway, I just copied this whole thing,

259
00:15:05.480 --> 00:15:08.759
hit copy, and then once I did that, I was

260
00:15:08.799 --> 00:15:12.320
over here in the notebook LM tool and I hit

261
00:15:12.440 --> 00:15:16.559
ad sources and I went to websites and I pasted

262
00:15:16.600 --> 00:15:17.679
all of them met.

263
00:15:18.080 --> 00:15:19.720
And it picked them all up as websites.

264
00:15:20.279 --> 00:15:22.600
Yeah, and that's so that they came in nice and

265
00:15:22.639 --> 00:15:25.759
clean the first time I tried it. When I did it,

266
00:15:25.840 --> 00:15:29.080
I ended up with the word document which is attached

267
00:15:29.120 --> 00:15:31.559
way down here somewhere in the bottom there. It is

268
00:15:32.240 --> 00:15:35.759
so that talking points didn't extract all of the web pages,

269
00:15:35.840 --> 00:15:37.759
and I wanted them nice and clean so you could

270
00:15:37.799 --> 00:15:40.840
go to one of these and actually look at it.

271
00:15:41.679 --> 00:15:46.919
So the idea now is that text source, the text

272
00:15:46.960 --> 00:15:49.240
file that I copied and pasted all the web pages

273
00:15:49.799 --> 00:15:52.480
created individual web pages that you can now look at

274
00:15:52.519 --> 00:15:56.879
and watch the videos on. Okay, but then the beautiful,

275
00:15:57.159 --> 00:16:02.120
like really powerful capabilities of this tool, this notebook LM

276
00:16:02.200 --> 00:16:05.320
tool is I thought, well, I'd like to know more

277
00:16:05.360 --> 00:16:07.879
about the topic. Now I'm going to just spread this

278
00:16:07.960 --> 00:16:10.480
out a little bit so you can see better. Over

279
00:16:10.519 --> 00:16:13.879
here are a set of buttons. And for those who

280
00:16:14.159 --> 00:16:18.360
have done work in the corporate world and you've had

281
00:16:18.440 --> 00:16:22.720
to go create content rapidly, maybe for a meeting or

282
00:16:22.759 --> 00:16:26.440
something like that, if we had had these tools, our

283
00:16:26.480 --> 00:16:28.519
lives would have been so much easier, right. It just

284
00:16:28.799 --> 00:16:29.440
it was crazy.

285
00:16:29.519 --> 00:16:31.440
So there'd be so many more trees around.

286
00:16:32.080 --> 00:16:37.559
Yeah, yeah, and and trees in another sense too, because

287
00:16:37.559 --> 00:16:40.399
here's a tree that it created for me from the content.

288
00:16:40.759 --> 00:16:41.320
Oh wow.

289
00:16:41.879 --> 00:16:45.120
So I just clicked on it, I said create, And

290
00:16:45.279 --> 00:16:48.919
just to give you the context, I clicked this creative

291
00:16:48.919 --> 00:16:53.759
mind map and it created this digital mimic navigating AI

292
00:16:53.879 --> 00:16:57.039
voice and deep fake fraud. So all of those sources

293
00:16:57.120 --> 00:17:00.360
were used to create this little tree. And again us

294
00:17:00.399 --> 00:17:06.160
this understanding real quick. I had scam mechanics. The voice

295
00:17:06.160 --> 00:17:08.200
cloning is one of them. It takes only a three

296
00:17:08.279 --> 00:17:12.079
to ten second clip to create a scam video, which

297
00:17:12.119 --> 00:17:15.279
is why you want to bury and make private any

298
00:17:15.480 --> 00:17:19.759
videos of you and your family on Facebook or yeah. Yeah,

299
00:17:20.759 --> 00:17:23.880
and then you've got the ability to go they can

300
00:17:23.960 --> 00:17:27.640
download your social media media videos, so you want to

301
00:17:27.680 --> 00:17:30.440
make sure that that's not available. And then the tools

302
00:17:30.720 --> 00:17:33.279
you know, this actually talked about the tools that you

303
00:17:33.400 --> 00:17:36.400
could use to go create the deep bakes and I

304
00:17:36.400 --> 00:17:37.960
did do the research. I was going to go ahead

305
00:17:38.000 --> 00:17:40.279
and try and create a sample. And what ends up

306
00:17:40.319 --> 00:17:45.000
happening is it creates. It creates it for one hundred

307
00:17:45.039 --> 00:17:48.440
and fifty dollars a month. So if you don't mind

308
00:17:48.480 --> 00:17:51.519
spending that kind of money, you know, do it. They

309
00:17:51.519 --> 00:17:55.160
can get one scam, they win. But for those of

310
00:17:55.240 --> 00:17:57.960
us just trying to share and help.

311
00:17:57.880 --> 00:17:59.960
The share right, education awareness all that.

312
00:18:00.480 --> 00:18:02.960
Yeah, But like I said, all of these videos actually

313
00:18:02.960 --> 00:18:05.119
have some great content around that, so we don't need that.

314
00:18:05.759 --> 00:18:09.519
But when I clicked on that one tab, it explained

315
00:18:09.640 --> 00:18:11.880
everything in that content for you.

316
00:18:11.920 --> 00:18:15.680
And again the tab that you clicked on was on the.

317
00:18:15.680 --> 00:18:20.000
Tools eleven Labs. So if I go zoom in, I

318
00:18:20.079 --> 00:18:20.440
was in.

319
00:18:20.359 --> 00:18:24.200
The voice AI, So this is the voice cloning yep.

320
00:18:24.359 --> 00:18:27.440
And I just clicked on eleven Labs and it brought

321
00:18:27.519 --> 00:18:29.359
this over here. It just when I clicked it, it

322
00:18:29.559 --> 00:18:34.279
composed and created this chunk of content. And this chunk

323
00:18:34.319 --> 00:18:37.880
of content now you can read and it has citations

324
00:18:37.960 --> 00:18:41.160
which will bring you back to the source material, so

325
00:18:41.240 --> 00:18:43.920
you know exactly what it's talking about and you can

326
00:18:43.960 --> 00:18:45.440
get deeper understanding.

327
00:18:45.480 --> 00:18:50.799
So basically explains how you can do a voice AI

328
00:18:50.960 --> 00:18:56.839
recording exactly right. Oh, and how to detect it. Right,

329
00:18:57.240 --> 00:19:01.240
That's that's the good part. Where where's the challenge of detection? There?

330
00:19:01.240 --> 00:19:01.559
It is?

331
00:19:01.920 --> 00:19:04.920
Yeah, yeah, So this is all in the notebook that

332
00:19:04.960 --> 00:19:07.680
I shared publicly, and each one of these items that

333
00:19:07.759 --> 00:19:10.680
if somebody were to come into this notebook, you can

334
00:19:10.759 --> 00:19:12.880
come in at any time click on the link. It's

335
00:19:12.920 --> 00:19:15.480
these are all safe links. We don't have to I've

336
00:19:15.519 --> 00:19:18.119
made sure that they were all into them at videos

337
00:19:18.160 --> 00:19:21.640
before I uploaded them. But for anything, if you were

338
00:19:21.680 --> 00:19:25.839
to start off by going to the mind map, when

339
00:19:25.839 --> 00:19:28.720
you first come in, you'll be presented with something similar

340
00:19:28.720 --> 00:19:30.960
to this, with the links on the left, the chat

341
00:19:31.000 --> 00:19:33.200
in the middle, and then on the right you'll see

342
00:19:33.240 --> 00:19:37.359
the studio and the items that are created from the

343
00:19:37.440 --> 00:19:40.519
studio are down below here on the right. And this

344
00:19:40.720 --> 00:19:43.400
is this is what you really want to think of

345
00:19:43.440 --> 00:19:45.880
this as not just hey, this is great, I can

346
00:19:45.920 --> 00:19:49.240
go look and learn about deep fakes. This is a

347
00:19:49.279 --> 00:19:53.200
tool that anybody can use. And you can use this

348
00:19:53.359 --> 00:19:56.400
to teach yourself any topic you want to learn in depth.

349
00:19:57.759 --> 00:20:01.359
And that's really the value of this as far as understanding.

350
00:20:01.400 --> 00:20:04.599
And this create notebook at the top is the key.

351
00:20:05.079 --> 00:20:08.400
So if I just create a brand new notebook, it's blank,

352
00:20:08.480 --> 00:20:09.480
it has nothing.

353
00:20:09.200 --> 00:20:12.759
In it, and and you start building from here.

354
00:20:13.079 --> 00:20:14.920
And the way I like to do it is the

355
00:20:14.960 --> 00:20:17.400
way we started out. So I go over here to

356
00:20:18.359 --> 00:20:22.119
any chat, I don't care if it's rock, a chat, GPT.

357
00:20:23.279 --> 00:20:26.839
You're the one that you probably have on your computer copilot,

358
00:20:27.279 --> 00:20:30.160
and you just ask. The first question you ask is

359
00:20:30.200 --> 00:20:33.079
tell me about a topic. And then once I know,

360
00:20:33.359 --> 00:20:35.200
tell me about the topic. Then I want to go

361
00:20:35.319 --> 00:20:37.279
back and I say, now get me the links and

362
00:20:37.279 --> 00:20:41.839
the citations, give me proof of everything you just gave

363
00:20:41.960 --> 00:20:47.279
me in that topic research. And then the third step

364
00:20:47.480 --> 00:20:50.720
is to extract out of that all of the links

365
00:20:51.119 --> 00:20:54.480
that they gave you so that you can now put

366
00:20:54.519 --> 00:20:59.039
that in as research over here in notebook. LM okay,

367
00:20:59.240 --> 00:21:01.559
very good one, Step two and step three.

368
00:21:02.559 --> 00:21:05.039
I did notice when you clicked on that link about

369
00:21:05.079 --> 00:21:08.000
the voice cloning and it gave you all of the

370
00:21:08.039 --> 00:21:12.359
information about it. I don't know it was it called

371
00:21:12.400 --> 00:21:14.200
eleven Labs or something like that.

372
00:21:14.720 --> 00:21:16.839
Yes, that's one of the AI tools that.

373
00:21:16.960 --> 00:21:23.880
Right, and it was saying they came up with, uh,

374
00:21:23.960 --> 00:21:27.359
what was it. They came up with a tool that

375
00:21:28.039 --> 00:21:31.920
you could put a recording into and they would be

376
00:21:31.960 --> 00:21:36.880
able to tell if it was a real recording or

377
00:21:36.920 --> 00:21:41.359
if it was a made up recording through some sort

378
00:21:41.359 --> 00:21:47.440
of software. But then it also said that it had limitations.

379
00:21:49.960 --> 00:21:52.480
Let's see what we can find out. So I'm asking

380
00:21:52.599 --> 00:21:55.079
in the chat at the bottom, tell me about the

381
00:21:55.119 --> 00:22:07.319
detection technologies for d fakes that you have found in

382
00:22:07.359 --> 00:22:12.160
this reach, in this research just to be no, well,

383
00:22:12.440 --> 00:22:14.960
I'm saying in this research so it doesn't go out

384
00:22:14.960 --> 00:22:18.960
to the interview that Yeah. So now it's going to

385
00:22:19.000 --> 00:22:21.759
go ahead and give us it looks through all of

386
00:22:21.799 --> 00:22:24.160
this and says here's how you can find the defense

387
00:22:24.799 --> 00:22:28.359
tools that you need, and we'll see what it comes

388
00:22:28.400 --> 00:22:31.279
back with. And this is what this is is a

389
00:22:31.319 --> 00:22:36.720
single agent that we have put the research into, and

390
00:22:36.759 --> 00:22:40.440
now you interview the agent. You interview the agent for

391
00:22:40.640 --> 00:22:44.000
all of the content that we've put in here. Wow,

392
00:22:45.039 --> 00:22:48.839
so this is here we go. So now some of

393
00:22:48.880 --> 00:22:50.799
the tools that it's going to point out are going

394
00:22:50.880 --> 00:22:53.000
to be enterprise grade tools, which none of us are

395
00:22:53.039 --> 00:22:54.960
going to be able to afford as individuals.

396
00:22:55.319 --> 00:22:58.119
Right, they're made for big companies exactly.

397
00:22:58.400 --> 00:23:03.119
But a like here's an eleven Labs iPhone detector. I

398
00:23:03.119 --> 00:23:05.799
think you must have spotted this. I didn't actually see

399
00:23:05.799 --> 00:23:10.200
it when we were first talking. So so now this

400
00:23:10.279 --> 00:23:14.359
would be able to identify. And that means let's say

401
00:23:15.759 --> 00:23:22.079
the next the next technique, give me links for all

402
00:23:22.119 --> 00:23:33.039
of these tools. Uh, for the consumer level tools I

403
00:23:33.119 --> 00:23:37.240
can use. There we go. So now it's just it's

404
00:23:37.359 --> 00:23:40.440
telling us about it. That's great. I don't how is

405
00:23:40.480 --> 00:23:44.160
it useful? I make it useful by asking again and again.

406
00:23:44.960 --> 00:23:47.319
It's just like being a reporter. You're digging in and

407
00:23:47.359 --> 00:23:49.039
you say why why why? Why?

408
00:23:49.160 --> 00:23:49.359
How?

409
00:23:49.519 --> 00:23:49.720
What?

410
00:23:50.880 --> 00:23:55.640
Right? It's like it's like taking an in person interview

411
00:23:55.720 --> 00:23:58.920
that a reporter does with somebody, and it's just putting

412
00:23:58.960 --> 00:24:05.960
it all online, having a software doing the investigative journalism

413
00:24:06.559 --> 00:24:07.759
exactly exactly.

414
00:24:07.799 --> 00:24:10.039
And so it's come up for us to save us time.

415
00:24:10.640 --> 00:24:13.720
You'll have to be able to spot the links in here,

416
00:24:13.799 --> 00:24:16.680
which should be easy enough. But it's it's black and white,

417
00:24:16.720 --> 00:24:19.240
so that's easier than if it was color. And I

418
00:24:19.279 --> 00:24:22.960
know folks with certain color blindness that links can be invisible,

419
00:24:23.319 --> 00:24:25.960
so as long as you recognize the links, but you

420
00:24:26.000 --> 00:24:30.000
can just there are other ways to see the traditional

421
00:24:30.039 --> 00:24:32.160
link that you might be looking for, just by going

422
00:24:32.160 --> 00:24:34.839
to the citation. So and then like.

423
00:24:34.839 --> 00:24:38.279
At eleven Labs Clone detector, Yeah.

424
00:24:38.400 --> 00:24:41.480
Let's see if I don't know if it does a

425
00:24:41.599 --> 00:24:44.799
good job of telling us how let's try. Let's just

426
00:24:44.839 --> 00:24:49.119
go to that and we'll copy it out and we'll

427
00:24:49.160 --> 00:24:53.599
go over here, paste and see what would come up

428
00:24:53.640 --> 00:24:54.720
there we go, and.

429
00:24:54.759 --> 00:24:57.880
Of course first you have to make sure you're human.

430
00:24:59.079 --> 00:25:03.119
We'll see if that that is a good detection. Please

431
00:25:03.200 --> 00:25:04.720
click the circles as they appear.

432
00:25:04.880 --> 00:25:07.480
Okay, yeah, oh, it's the first time I've seen that.

433
00:25:07.920 --> 00:25:11.480
Yeah, it's a different one. All right. So there's the

434
00:25:13.559 --> 00:25:18.839
and I'm not sure what that we're Oh, it wants

435
00:25:18.880 --> 00:25:25.920
me to oh privacy sex file. I think I'm going

436
00:25:26.000 --> 00:25:28.240
to skip that one because well, no, I'll do it.

437
00:25:28.319 --> 00:25:32.160
Why not? So downloads it and then you know, we'll

438
00:25:32.160 --> 00:25:35.039
find out on the fly. This is essentially, this is

439
00:25:35.119 --> 00:25:38.440
launching a tool that's now going to be on my

440
00:25:38.559 --> 00:25:41.559
tool bar so that I can use it in the future.

441
00:25:41.960 --> 00:25:43.799
This is real time, so you know, I did not

442
00:25:43.960 --> 00:25:47.359
know I was going to be getting this. So now

443
00:25:47.359 --> 00:25:50.079
that we've got it, I'm going to go up here

444
00:25:50.119 --> 00:25:53.000
to my toolbar. We're going to let it have access

445
00:25:53.039 --> 00:25:56.440
to my location. And now I've got this privacy browse.

446
00:25:56.240 --> 00:25:58.920
Tool, So hang on, hang on one second.

447
00:25:59.400 --> 00:26:03.240
Sure for people that like, yeah, you don't want to

448
00:26:03.279 --> 00:26:08.400
automatically just start downloading software onto your computer, but you

449
00:26:08.519 --> 00:26:14.000
have your device secured and locked down, so it would

450
00:26:14.000 --> 00:26:18.720
have already have scanned that to make a determination if

451
00:26:18.759 --> 00:26:21.519
it was bad, and it would have pulled you don't

452
00:26:21.640 --> 00:26:22.279
download this.

453
00:26:22.680 --> 00:26:26.079
Yes, I have. I have a combination of malware bytes,

454
00:26:26.279 --> 00:26:29.119
and then in addition to that, I've got an antivirus

455
00:26:29.160 --> 00:26:32.559
software down here below that's a corporate grade and anti

456
00:26:32.680 --> 00:26:36.640
virus and malware detector. And this one I believe is

457
00:26:36.640 --> 00:26:40.960
called let's see here, I'll just bring it up. So

458
00:26:41.039 --> 00:26:44.799
this one is a bit deefender. So I've got plus

459
00:26:44.839 --> 00:26:49.680
I've got Microsoft Security in and of itself. You're using

460
00:26:49.680 --> 00:26:52.000
a Mac. There are other tools similar to that, and

461
00:26:52.119 --> 00:26:55.440
i'd encourage you to be always using good tools.

462
00:26:56.519 --> 00:26:58.559
So I just wanted to make people aware that you

463
00:26:58.559 --> 00:27:01.920
weren't just downloading you are for the.

464
00:27:01.880 --> 00:27:04.359
Sake of the show. But at the same were you

465
00:27:04.440 --> 00:27:04.960
knew it.

466
00:27:04.880 --> 00:27:07.559
Was okay to download it because of the security measures

467
00:27:07.559 --> 00:27:09.759
you have on your on your computer. But now you

468
00:27:09.839 --> 00:27:11.640
got to the point where it said you were going

469
00:27:11.720 --> 00:27:12.799
to share your location.

470
00:27:13.559 --> 00:27:17.839
Yes, and I did that because for the purpose of context,

471
00:27:18.119 --> 00:27:20.599
I can always go I know, I can go in

472
00:27:20.640 --> 00:27:21.240
and turn.

473
00:27:21.079 --> 00:27:22.200
The turn that off.

474
00:27:22.920 --> 00:27:26.960
So I'm okay with that. So but now the tool

475
00:27:27.000 --> 00:27:30.200
that it gave me was I believe it. Let's see

476
00:27:30.200 --> 00:27:32.440
if it's hidden in the background. Here there it is.

477
00:27:33.160 --> 00:27:35.880
So this tool popped up, and let's I'm going to

478
00:27:35.960 --> 00:27:37.799
move that to another screen for a second so I

479
00:27:37.839 --> 00:27:43.559
don't lose it and come back to our the actual

480
00:27:43.599 --> 00:27:49.200
deep fake pages. Here, there we go, and there we go.

481
00:27:49.599 --> 00:27:52.920
Now the tool here you would get a link for something.

482
00:27:53.119 --> 00:27:57.680
And this is a good idea for multiple tools. This

483
00:27:57.720 --> 00:28:00.279
one here happens to be for eleven eleven lass and

484
00:28:00.599 --> 00:28:04.480
the ideas if you see a video. So let's talk

485
00:28:04.480 --> 00:28:07.720
about two things when it comes to these videos. First

486
00:28:07.759 --> 00:28:11.200
thing is people who are hitting you with a deep

487
00:28:11.240 --> 00:28:16.319
fake are trying to do a one on one persuasion technique.

488
00:28:16.319 --> 00:28:19.559
They're either going to incite your fears or they're going

489
00:28:19.559 --> 00:28:24.039
to incite your greed perhaps, and they're going to use

490
00:28:24.079 --> 00:28:26.319
that to try and get you to click on something like, oh,

491
00:28:26.359 --> 00:28:27.920
I just want a million dollars and we all know

492
00:28:28.079 --> 00:28:29.759
that one. So we're not going to get caught up

493
00:28:29.799 --> 00:28:33.200
in that. But the video that somebody sends or the

494
00:28:33.240 --> 00:28:35.839
audio that you hear on the phone, you know you

495
00:28:36.039 --> 00:28:38.720
probably they're going to put it in a context where

496
00:28:38.720 --> 00:28:41.720
it comes in on your phone, and they're going to

497
00:28:41.799 --> 00:28:46.559
try and inspire fear instantly by like the very topic

498
00:28:46.640 --> 00:28:50.920
that we talked about our opening scene in this was

499
00:28:52.359 --> 00:28:55.279
right here. Imagine your phone rings and it's your granddaughters.

500
00:28:56.160 --> 00:28:59.960
Yeah yeah, So that's an instant fear, and they want

501
00:29:00.119 --> 00:29:05.480
to provoke your reactionary thing, not your critical thing. Absolutely

502
00:29:06.160 --> 00:29:08.480
you have to be able to recognize that. Now a

503
00:29:08.519 --> 00:29:14.359
deep fake video is going to go more for not reactionary,

504
00:29:14.839 --> 00:29:19.160
but a little bit about your team membership, if you will.

505
00:29:19.400 --> 00:29:24.319
And you so a lot of things you think about

506
00:29:24.480 --> 00:29:27.400
what we're going into. This is a political year. There's

507
00:29:27.440 --> 00:29:32.240
going to be influential candidate influential videos put out right.

508
00:29:32.720 --> 00:29:36.599
So you should be suspicious of every video you see

509
00:29:37.119 --> 00:29:40.480
that comes out on any social media or that's sent

510
00:29:40.519 --> 00:29:44.279
to you in an email. And before you ever if

511
00:29:44.279 --> 00:29:46.720
you watch a video, it's okay to watch as many

512
00:29:46.839 --> 00:29:49.960
videos as you want, but don't believe anything in any

513
00:29:49.960 --> 00:29:52.839
of the videos until you come to a site like

514
00:29:52.880 --> 00:29:56.079
this and test it and see if the video is

515
00:29:56.119 --> 00:29:59.599
a real video. So I think in one of the

516
00:30:00.279 --> 00:30:04.079
if we go back to here, there was a deep

517
00:30:04.119 --> 00:30:06.640
fake video that was created here.

518
00:30:07.839 --> 00:30:09.279
Is it?

519
00:30:09.279 --> 00:30:09.640
It is?

520
00:30:10.039 --> 00:30:10.839
Okay?

521
00:30:10.920 --> 00:30:14.680
Yeah, So so if we went to that video, the

522
00:30:14.799 --> 00:30:16.799
video is going to be telling us about it as

523
00:30:16.799 --> 00:30:22.359
opposed to showing you the actual video. So that's not

524
00:30:22.440 --> 00:30:25.279
going to give us exactly the technique that we're looking

525
00:30:25.359 --> 00:30:28.720
for here. But if you were on x, YouTube, any

526
00:30:28.759 --> 00:30:30.880
of the social medias that you might be a member of,

527
00:30:31.559 --> 00:30:35.039
and you see a video, copy that link and come

528
00:30:35.079 --> 00:30:39.480
over to the privacy tool paste it in before you

529
00:30:39.519 --> 00:30:45.039
go believing, especially when it comes to things like Trump

530
00:30:45.079 --> 00:30:48.279
said this, Gavin Newsom said that some other person said

531
00:30:48.680 --> 00:30:53.160
anything like that. Don't believe it because that's going to

532
00:30:53.240 --> 00:30:56.599
be where they're invoking your team spirit for whatever team

533
00:30:56.599 --> 00:31:00.759
you're on. It doesn't matter and if you're abstaining from teams, wonderful.

534
00:31:01.039 --> 00:31:04.400
That should make you even more skeptical of both sides.

535
00:31:04.400 --> 00:31:07.759
And then take those clips and paste it into a

536
00:31:07.799 --> 00:31:11.039
tool like this and find out if it's been modified.

537
00:31:12.160 --> 00:31:15.640
Right, And if somebody was looking for those tools, right,

538
00:31:15.799 --> 00:31:17.920
I mean, they can just do a quick Internet search

539
00:31:18.160 --> 00:31:23.079
and now find you know, we can use our research here,

540
00:31:23.480 --> 00:31:27.599
right yep. Because it looks like McAfee has one, does

541
00:31:27.880 --> 00:31:31.559
semple ai has one, that there's a whole bunch of them, right.

542
00:31:31.519 --> 00:31:33.960
And so I would I would take a look at these.

543
00:31:34.799 --> 00:31:38.880
I'm very careful. I will tell you this. McAfee for me,

544
00:31:40.559 --> 00:31:44.039
I used to work for Semantech, and so both Semantech

545
00:31:44.119 --> 00:31:49.519
and McAfee for me I have a less than trusting perspective.

546
00:31:50.200 --> 00:31:54.359
Not because they're bad tools or bad companies, okay, but

547
00:31:54.559 --> 00:31:58.839
what they are are companies. They want to sell. They

548
00:31:58.839 --> 00:32:01.799
want to sell you something, and so they're going to

549
00:32:02.079 --> 00:32:05.319
if you put their deep fake detector, like a McAfee

550
00:32:05.359 --> 00:32:10.640
deep fake protector. The cost of anti virus and the

551
00:32:10.680 --> 00:32:13.319
tools that are around that have gone down so much

552
00:32:13.799 --> 00:32:17.319
that they're doing anything they can and they're scrambling for

553
00:32:18.880 --> 00:32:22.079
ways to get you to buy into a subscription. So

554
00:32:22.680 --> 00:32:25.880
that's why I like the idea of this eleven Labs

555
00:32:25.920 --> 00:32:28.799
one where you notice when we pulled this up, I

556
00:32:28.839 --> 00:32:31.359
didn't get pounded with ads instantly to say, oh and

557
00:32:31.400 --> 00:32:33.720
by the way, for seventy nine dollars a year, you

558
00:32:33.799 --> 00:32:36.720
can actually have X, y Z tool and all of

559
00:32:36.759 --> 00:32:38.680
these other capabilities.

560
00:32:38.000 --> 00:32:40.440
Right, because sometimes when you get on the website the

561
00:32:40.480 --> 00:32:44.960
pop ups come up about subscribing, and even even.

562
00:32:44.720 --> 00:32:47.839
Malware Bites does this. I mean, I love malware Bites

563
00:32:47.880 --> 00:32:50.119
as a tool. I've been using it for a long time.

564
00:32:50.519 --> 00:32:53.960
But every single one of these tools, their only mechanism

565
00:32:54.079 --> 00:32:57.079
to communicate with you is through your installation of one

566
00:32:57.079 --> 00:33:00.240
of their tools. And then they just say keep sending

567
00:33:00.279 --> 00:33:03.720
me money. You know, find different ways to what else

568
00:33:03.759 --> 00:33:07.160
can you do? And I will say this, those tools

569
00:33:07.200 --> 00:33:10.720
are good. You should have a version of those tools

570
00:33:10.759 --> 00:33:15.599
for without question. But do you want the subscription that

571
00:33:15.640 --> 00:33:19.200
they shove down your throat? Not necessarily. You want to

572
00:33:19.200 --> 00:33:19.920
be selective.

573
00:33:20.880 --> 00:33:23.519
You have to do your own research and make sure

574
00:33:23.519 --> 00:33:25.680
that what you're getting fits your situation.

575
00:33:26.519 --> 00:33:30.160
Yeah, and let's do dive into one thing here. So

576
00:33:30.200 --> 00:33:32.920
I'm going to look at malware bytes for an example

577
00:33:33.640 --> 00:33:36.359
and bring it up here. So there are about three

578
00:33:36.440 --> 00:33:41.279
or four things in this product that are worth talking about. First,

579
00:33:41.279 --> 00:33:43.920
you have a scanner. You should have a scanner, period.

580
00:33:43.920 --> 00:33:46.640
I don't care what brand it is, malware Bytes, any

581
00:33:46.640 --> 00:33:50.119
of the others. You should have scanner. Second thing you

582
00:33:50.160 --> 00:33:53.599
should have is some kind of real time protection that

583
00:33:53.880 --> 00:33:56.519
protects you when it pops up on your computer saying hey,

584
00:33:56.559 --> 00:33:59.400
I just blocked this, so you need that now. It

585
00:33:59.400 --> 00:34:02.759
could be mal where bytes, it could be built into

586
00:34:02.799 --> 00:34:08.039
your operating system, like Microsoft has its own Windows security.

587
00:34:08.400 --> 00:34:11.719
That's perfectly fine as well, but you have to make

588
00:34:11.760 --> 00:34:15.320
sure you run the scans to keep it updated and

589
00:34:15.400 --> 00:34:19.079
make sure that you don't just bypass these pop ups.

590
00:34:20.119 --> 00:34:24.239
And then then we get into the next step. VPNs.

591
00:34:24.559 --> 00:34:28.639
You definitely want to consider a VPN if you're trying

592
00:34:28.679 --> 00:34:31.480
to do things away from home. So if you go

593
00:34:31.480 --> 00:34:36.559
to another country, VPNs are essential because what ends up

594
00:34:36.559 --> 00:34:41.360
happening is you can end up getting into their You know,

595
00:34:41.440 --> 00:34:45.840
every country has bands and agreements on what kind of

596
00:34:45.920 --> 00:34:49.400
data is allowed in their country. So if you're just

597
00:34:50.159 --> 00:34:54.440
using you could be doing a search in a country

598
00:34:54.800 --> 00:34:57.639
where literally you could have somebody knocking on the door

599
00:34:57.679 --> 00:35:03.039
for something you search or posted on a social media network.

600
00:35:03.719 --> 00:35:06.559
So if you go to the UK and you're staying

601
00:35:06.559 --> 00:35:11.159
at a hotel and you make a negative comment about

602
00:35:11.159 --> 00:35:14.480
one of the political parties, you could find yourself being

603
00:35:14.519 --> 00:35:16.000
interviewed for.

604
00:35:15.880 --> 00:35:20.880
That right, right, you have to know and.

605
00:35:21.239 --> 00:35:24.639
By interviewed, I mean it could mean incarceration. It's not privy.

606
00:35:24.760 --> 00:35:26.800
Yeah, you have to know the rules and the laws

607
00:35:26.880 --> 00:35:30.960
and stuff like that. So and that could take tons

608
00:35:31.000 --> 00:35:33.599
of research, and you know, it's interesting. We just we

609
00:35:33.719 --> 00:35:37.280
talk about VPNs in our presentations and explain to people,

610
00:35:38.639 --> 00:35:42.960
you know, just because you're at a place, right, whether

611
00:35:43.039 --> 00:35:47.280
it's a coffee shop, a hotel, you know, whatever it is.

612
00:35:47.440 --> 00:35:50.440
And you say, is your Wi Fi secure? A lot

613
00:35:50.480 --> 00:35:53.000
of times the answer you're going to get is yes,

614
00:35:53.039 --> 00:35:57.239
it's password protected. But you always have to ask yourself

615
00:35:57.320 --> 00:36:02.400
the question how many people know that password on any

616
00:36:02.440 --> 00:36:07.559
given day? It's very true and a lot is the answer,

617
00:36:07.639 --> 00:36:10.960
because they might not change it every day. And even

618
00:36:11.000 --> 00:36:12.800
if they don't, how many people are staying in that

619
00:36:12.840 --> 00:36:15.159
hotel that know that password? Right? I mean there's just

620
00:36:16.039 --> 00:36:18.159
and so we talk to them about their their mobile

621
00:36:18.159 --> 00:36:21.920
hotspots on their phone. Right, Yes that's password protected, but

622
00:36:22.119 --> 00:36:25.880
somebody would actually literally have to have your phone or

623
00:36:25.920 --> 00:36:29.679
they would have to be inside your phone right through

624
00:36:30.000 --> 00:36:32.800
not having protection on your phone and clicking on a

625
00:36:32.800 --> 00:36:36.000
bad link or something like that to see that password,

626
00:36:36.159 --> 00:36:38.719
which is why we always I tell people at the

627
00:36:38.760 --> 00:36:41.800
beginning of the presentation, you're going to hear me say

628
00:36:41.960 --> 00:36:46.719
multiple times you need to secure your mobile phones because

629
00:36:46.760 --> 00:36:51.440
they're mobile computers. And I get that back on the survey.

630
00:36:51.519 --> 00:36:54.239
You know, what's one thing that you learned, And it's like,

631
00:36:54.280 --> 00:36:57.239
I need to get antivirus on my cell phone, you know.

632
00:36:57.920 --> 00:37:00.400
And it's because you have to ask yourself, if someone

633
00:37:00.400 --> 00:37:05.679
got in there, what damage could they do? Yeah, well, let.

634
00:37:05.519 --> 00:37:07.519
Me give you a real world example of what kind

635
00:37:07.519 --> 00:37:10.559
of damage they could do. So and by the way,

636
00:37:10.559 --> 00:37:13.360
this is another good thing that these services all offer,

637
00:37:13.440 --> 00:37:18.159
which is identity protection. And what this will do is

638
00:37:18.199 --> 00:37:20.679
go out and search for all references to you in

639
00:37:20.719 --> 00:37:24.800
the public and in the dark web domains and find

640
00:37:24.960 --> 00:37:28.440
where your data is exposed. And that's a great tool

641
00:37:28.519 --> 00:37:32.079
to have. The trick to this one though the reason

642
00:37:32.079 --> 00:37:34.880
I don't subscribe to it on malware bites is because

643
00:37:35.000 --> 00:37:40.119
it's actually every single time you do one of these researches,

644
00:37:40.159 --> 00:37:42.440
you find out that some of your data has been breached,

645
00:37:42.480 --> 00:37:46.719
it's almost guaranteed. And if you get a message saying

646
00:37:46.760 --> 00:37:50.639
your data was breached, they usually preferably like a letter

647
00:37:50.679 --> 00:37:55.280
that came to your mailbox. You can actually subscribe and

648
00:37:54.880 --> 00:37:59.760
get for free their service. And I always say, if

649
00:37:59.760 --> 00:38:03.400
you've got one of those services, take advantage of it,

650
00:38:03.440 --> 00:38:06.239
because why would you want to pay a subscription for

651
00:38:06.320 --> 00:38:09.400
thirty or forty dollars a year when you get it

652
00:38:09.440 --> 00:38:12.000
for free and it'll last for one to two years.

653
00:38:12.599 --> 00:38:16.039
Just make sure you're careful about knowing how many of

654
00:38:16.079 --> 00:38:18.280
these things you put your credit card into, because you're

655
00:38:18.280 --> 00:38:21.639
going to end up with multiple mit says auto renew,

656
00:38:21.920 --> 00:38:23.679
Make sure you turn off auto renew.

657
00:38:23.440 --> 00:38:26.480
On everything right, because you're going to forget all of

658
00:38:26.519 --> 00:38:27.920
a sudden, you're going to get the charge.

659
00:38:28.199 --> 00:38:30.840
Exactly so. But the real world example I was going

660
00:38:30.880 --> 00:38:34.599
to give you, I had a repair that needed to

661
00:38:34.639 --> 00:38:39.280
be done for a property that I own, and I

662
00:38:39.360 --> 00:38:44.119
made the mistake of texting a person my son actually

663
00:38:45.480 --> 00:38:48.400
my credit card number, and that credit card number now

664
00:38:48.800 --> 00:38:52.000
ended up being used in something that shouldn't have been used,

665
00:38:52.039 --> 00:38:55.519
and it wasn't maliciously used, but because it went through

666
00:38:55.599 --> 00:39:00.360
the texting the open text of the standard text pro call.

667
00:39:00.880 --> 00:39:05.320
Which is not encrypted because encrypted going iPhone to iPhone.

668
00:39:05.840 --> 00:39:07.159
No, it was iPhone to iPhone.

669
00:39:07.280 --> 00:39:09.360
Oh really, because that's supposed to be encrypted.

670
00:39:09.760 --> 00:39:13.400
It is, but unfortunately it did get somehow it got

671
00:39:13.800 --> 00:39:18.119
caught up. So in that instance, what ended up happening

672
00:39:18.199 --> 00:39:22.400
is something on his phone that he had downloaded that

673
00:39:22.519 --> 00:39:26.960
was probably not the best thing to download. Oh okay,

674
00:39:27.039 --> 00:39:29.480
there was some kind of malware on his phone that

675
00:39:29.599 --> 00:39:33.559
picked it out of the app and we never saw it.

676
00:39:33.599 --> 00:39:35.760
We never saw it on his phone as a subscription,

677
00:39:36.320 --> 00:39:39.760
we never saw it tied into anything. But somehow that

678
00:39:39.800 --> 00:39:43.519
credit card number got put into an app that he

679
00:39:43.559 --> 00:39:45.760
didn't even have installed on his phone. He had it

680
00:39:45.840 --> 00:39:48.000
for a brief period of time, but then uninstalled it.

681
00:39:48.559 --> 00:39:51.400
And then I was getting ten dollars charges three four

682
00:39:51.440 --> 00:39:55.320
times a day. Oh, I had an American Express and

683
00:39:55.719 --> 00:39:58.679
they helped me with the fraud and we blocked it.

684
00:39:58.519 --> 00:40:03.199
It was all covered. Nonetheless, that was a problem and

685
00:40:04.320 --> 00:40:09.039
big rule when it comes to protecting yourself, remember the

686
00:40:09.400 --> 00:40:13.320
whose interest is being protected. When you have a debit card,

687
00:40:14.199 --> 00:40:17.239
it's on you. You've got your account. The debit card

688
00:40:17.360 --> 00:40:20.840
is direct access to your check, yes, and it's on

689
00:40:20.920 --> 00:40:24.639
you to protect that. So if you pass that information around,

690
00:40:25.760 --> 00:40:30.159
you're you're just you could be out money instantly, right, yeah,

691
00:40:30.559 --> 00:40:32.199
you know. And then but on the other hand, if

692
00:40:32.239 --> 00:40:36.119
it's a credit card, it's credit and so it's on

693
00:40:36.199 --> 00:40:40.679
the credit card company to protect that because they're giving

694
00:40:40.719 --> 00:40:42.079
you a loan.

695
00:40:44.079 --> 00:40:46.079
Right, that's why they're doing a credit check on you

696
00:40:46.119 --> 00:40:48.519
when you sign up for a credit card, and they

697
00:40:48.519 --> 00:40:50.360
want to make sure that you're a good bet to

698
00:40:50.400 --> 00:40:50.760
pay it.

699
00:40:51.280 --> 00:40:53.400
They have millions of dollars per.

700
00:40:54.000 --> 00:40:57.199
You know, you're for fraudule charges protect.

701
00:40:56.920 --> 00:41:00.119
Themselves, so you don't have to worry about protecting if

702
00:41:00.159 --> 00:41:02.239
you're using a credit card. So if you're going to

703
00:41:02.280 --> 00:41:05.119
do anything on a phone, anything on a subscription of

704
00:41:05.159 --> 00:41:07.880
any kind, always use a credit card. Never use your

705
00:41:07.880 --> 00:41:08.440
debit card.

706
00:41:08.800 --> 00:41:09.000
Yeah.

707
00:41:09.519 --> 00:41:12.039
No, that Even My father got caught up on that one.

708
00:41:12.079 --> 00:41:14.400
He subscribed to something and they were just taking money

709
00:41:14.440 --> 00:41:17.079
out of his account and he couldn't stop it until

710
00:41:17.119 --> 00:41:21.119
I helped him. And it just it's so easy to

711
00:41:21.119 --> 00:41:24.000
get caught up in these things. So it is he

712
00:41:24.000 --> 00:41:25.840
didn't even have a credit card. I made him get

713
00:41:25.840 --> 00:41:29.559
a credit card. And we removed his debit card from everything.

714
00:41:29.960 --> 00:41:34.480
Right, yeah, all right, well we've got about eight minutes left.

715
00:41:34.639 --> 00:41:43.800
Sure is there a way that I'm trying to think

716
00:41:43.840 --> 00:41:45.519
of what's the next step because I know we're going

717
00:41:45.599 --> 00:41:48.280
to do part two next week, and so I don't

718
00:41:48.320 --> 00:41:52.000
want to get into, you know what, what we're going

719
00:41:52.000 --> 00:41:55.480
to talk about next week, you know, but.

720
00:41:58.039 --> 00:41:59.960
I think I think as far as that goes, well

721
00:42:00.119 --> 00:42:05.079
we can do is just uh, we're going to basically

722
00:42:05.119 --> 00:42:07.480
go a little bit deeper, probably talk a little bit

723
00:42:07.519 --> 00:42:11.880
more about agents and things like that, but maybe do

724
00:42:11.960 --> 00:42:17.320
more of a high level discussion on understanding all of

725
00:42:17.360 --> 00:42:19.320
those big chat tools.

726
00:42:19.840 --> 00:42:21.039
Okay, so you know.

727
00:42:21.039 --> 00:42:24.960
There's all of the different there what is called frontier models.

728
00:42:25.360 --> 00:42:28.079
We'll get into what is the difference between a frontier

729
00:42:28.119 --> 00:42:32.159
model and agent, the different tools that you can use

730
00:42:32.280 --> 00:42:35.679
as far as how to create images, how to create videos,

731
00:42:36.320 --> 00:42:41.039
and some real real world use cases workflows we started

732
00:42:41.039 --> 00:42:44.159
one this week, but a real world workflow.

733
00:42:43.679 --> 00:42:47.800
Around so we'll then be able to like see an

734
00:42:47.880 --> 00:42:52.360
actual like deep fake video that I don't.

735
00:42:52.199 --> 00:42:55.280
Think that would be the best because then we would

736
00:42:55.519 --> 00:42:57.440
one way unless we have a budget for that.

737
00:42:58.079 --> 00:42:59.679
Oh, I see what you're saying, because we'd have.

738
00:43:02.840 --> 00:43:05.079
If we're really just going down the path a little

739
00:43:05.119 --> 00:43:09.000
bit of just talking about AI in general too. I

740
00:43:09.039 --> 00:43:13.360
think in the future we if we haven't already said it,

741
00:43:13.480 --> 00:43:17.639
AI is absolutely going to be the number one thing

742
00:43:18.719 --> 00:43:22.679
that's going on. You're not going to be able to avoid.

743
00:43:24.000 --> 00:43:27.599
So rather than avoid it, let's let's talk about how

744
00:43:27.639 --> 00:43:30.719
you can leverage it in your life, real time, in

745
00:43:30.800 --> 00:43:34.039
the real world and get benefit from it.

746
00:43:34.239 --> 00:43:37.760
Right. And then actually also, you know, when we are

747
00:43:37.800 --> 00:43:43.199
looking at videos, are there certain things that we can

748
00:43:43.480 --> 00:43:47.039
look for or to write, you know, little things that

749
00:43:47.079 --> 00:43:50.679
we can look for to say, hey, this doesn't seem

750
00:43:50.719 --> 00:43:54.239
to be making sense, you know, forget forgetting what they're saying,

751
00:43:55.280 --> 00:43:58.079
but just looking at the video itself to see if

752
00:43:58.079 --> 00:44:01.800
there's a little nuances to try to give, you know,

753
00:44:01.880 --> 00:44:05.599
especially the older adult population, right, they might not be

754
00:44:05.960 --> 00:44:10.679
so technical to I have that at.

755
00:44:10.599 --> 00:44:13.400
The end of this document we created for the last one,

756
00:44:13.920 --> 00:44:18.559
and what we'll do here is just it's worth going

757
00:44:18.599 --> 00:44:22.159
through these real quick on today's topic because we were

758
00:44:22.199 --> 00:44:26.440
just talking about this a little bit. So in the videos,

759
00:44:26.599 --> 00:44:33.119
look for unnatural blinking lip sync issues where the words

760
00:44:33.159 --> 00:44:38.039
don't quite match the video okay. And as a matter

761
00:44:38.039 --> 00:44:41.679
of fact, if we talked at the beginning about you

762
00:44:41.760 --> 00:44:46.199
mentioned my channel, which is the Second Sip Second Sip. Yeah,

763
00:44:46.480 --> 00:44:48.400
it's just a bit of a news show. I did

764
00:44:48.400 --> 00:44:51.960
thirty five episodes back to back every day for about

765
00:44:52.039 --> 00:44:54.199
a month and a couple of days, and then I

766
00:44:54.320 --> 00:44:58.679
paused that because basically, I don't want to do it

767
00:44:59.079 --> 00:45:01.360
just a news show every single day, so I'm doing

768
00:45:01.679 --> 00:45:03.880
more in depth videos that are going to be once

769
00:45:03.920 --> 00:45:07.800
a week. But this at the beginning of every single

770
00:45:07.840 --> 00:45:09.840
one of those or most of those videos, I have

771
00:45:09.880 --> 00:45:13.559
a little montage video that I created, okay, out of AI.

772
00:45:13.800 --> 00:45:16.440
I just used AI and you'll see right off the bat,

773
00:45:16.719 --> 00:45:20.039
not my voice, my face looks fake sometimes even though

774
00:45:20.039 --> 00:45:24.039
it's got a good representation of me, okay, and the

775
00:45:24.639 --> 00:45:27.360
audio doesn't always match up. So those are really good.

776
00:45:28.039 --> 00:45:30.960
If you go to that Second Sip channel on YouTube,

777
00:45:30.960 --> 00:45:34.000
you can find these videos and when you look at them,

778
00:45:34.039 --> 00:45:36.400
you can you can ride off the bat see the

779
00:45:36.440 --> 00:45:39.320
messed up video or the waxy image of the face,

780
00:45:39.440 --> 00:45:42.639
and you know, some of them is very obvious.

781
00:45:42.920 --> 00:45:43.199
Okay.

782
00:45:43.239 --> 00:45:45.440
So someone just gets on YouTube and they and they

783
00:45:45.480 --> 00:45:48.760
search the Second Sip or is it just second sip,

784
00:45:49.159 --> 00:45:49.840
either one, but.

785
00:45:49.920 --> 00:45:52.079
Either one to bring it up, but the second sip

786
00:45:52.159 --> 00:45:55.719
will bring up. And there's quite a few episodes in

787
00:45:55.760 --> 00:46:01.039
there where I was coming off of enjoying Scott Adams

788
00:46:01.039 --> 00:46:04.400
show until he passed away in January. Oh, and so

789
00:46:04.880 --> 00:46:07.360
that's where the start of the Second Sip came from.

790
00:46:07.400 --> 00:46:12.840
Because he had a thing, let's have a sip what

791
00:46:12.960 --> 00:46:16.039
he called the simultaneous Sip that he introduced every single

792
00:46:16.079 --> 00:46:18.400
show with, and for me, I just called it the

793
00:46:18.440 --> 00:46:21.519
second Sip because it was kind of a dedication to him.

794
00:46:22.079 --> 00:46:26.280
And he has some amazing techniques on how to detect

795
00:46:26.400 --> 00:46:30.039
deep fakes and how to detect scams and frauds that

796
00:46:30.320 --> 00:46:34.519
has been reporting for years. So that's kind of where

797
00:46:34.679 --> 00:46:35.840
I love Scott Adams.

798
00:46:35.880 --> 00:46:38.440
Okay, all right, so people want to look at that,

799
00:46:38.519 --> 00:46:41.679
they want to look at second Sip. Yeah. In fact,

800
00:46:41.719 --> 00:46:44.239
I'm gonna I have, you know, for the newsletter in April.

801
00:46:45.239 --> 00:46:48.400
I'd like to it'd be nice to put one of

802
00:46:48.400 --> 00:46:51.400
those videos in there and just say do you see

803
00:46:51.559 --> 00:46:53.400
do you notice any differences?

804
00:46:53.679 --> 00:46:56.800
Yes? Yeah, And it'll be pretty simple to you can

805
00:46:56.880 --> 00:46:59.679
instantly see the difference because there's a ten or fifteen

806
00:46:59.719 --> 00:47:03.360
second clip at the beginning and it's not me, and

807
00:47:03.400 --> 00:47:05.920
then you jump into the actual video and it is me.

808
00:47:06.320 --> 00:47:09.960
It's clear that you can tell this was a fake video.

809
00:47:10.039 --> 00:47:12.760
This is a real you. Oh okay, all right, now,

810
00:47:12.880 --> 00:47:15.360
it's not going to be that easy on something that

811
00:47:15.559 --> 00:47:17.960
is a really well designed, deep fake.

812
00:47:18.320 --> 00:47:19.559
Yeah, but you will.

813
00:47:19.480 --> 00:47:23.360
See that in different videos throughout the thirty five videos

814
00:47:23.400 --> 00:47:26.480
that I did. Some of them are really cartoonish and silly.

815
00:47:27.119 --> 00:47:31.239
Some of them really look like me talking towards the

816
00:47:31.320 --> 00:47:34.039
last three or four episodes before I stopped.

817
00:47:33.719 --> 00:47:35.840
So they're a lot harder to detect.

818
00:47:36.159 --> 00:47:38.519
Yeah. Yeah, because I was getting better at making the

819
00:47:38.559 --> 00:47:39.920
prompts to create the video.

820
00:47:40.000 --> 00:47:40.679
Oh there you go.

821
00:47:40.920 --> 00:47:43.679
Yeah, and that, by the way, we'll talk about that

822
00:47:43.719 --> 00:47:46.079
next week. How to save a bunch of prompts that

823
00:47:46.119 --> 00:47:49.880
we use in the in your tools you're your toolkit

824
00:47:50.119 --> 00:47:51.159
to get the most out of it.

825
00:47:51.880 --> 00:47:55.679
Okay, all right, very good. So we've got just under

826
00:47:55.719 --> 00:47:59.000
two minutes. Any closing remarks, Uh.

827
00:47:58.960 --> 00:48:01.360
Yeah, let me just finish these. So look for the

828
00:48:01.440 --> 00:48:05.960
flat tone, the behavioral sudden urgency. You know, do this

829
00:48:06.039 --> 00:48:07.599
is going to be a thing if you don't do

830
00:48:07.639 --> 00:48:08.360
something right now.

831
00:48:08.800 --> 00:48:10.039
Yeah, urgency is always bad.

832
00:48:11.519 --> 00:48:15.000
And then don't tell somebody this is a big secret.

833
00:48:15.559 --> 00:48:18.360
Who wants is an educase, you know, for accuracy. They

834
00:48:18.400 --> 00:48:20.719
are one of the things that I would say is

835
00:48:21.400 --> 00:48:24.119
looks and sounds real, but you want to you always

836
00:48:24.159 --> 00:48:27.679
want to have that skeptical mind of One of the

837
00:48:27.719 --> 00:48:29.719
things that I do when I especially when I'm trolling

838
00:48:29.760 --> 00:48:33.360
through my emails, the junk mail, they say these. They

839
00:48:33.360 --> 00:48:37.519
give you these urgent things like we just process your

840
00:48:37.559 --> 00:48:39.519
payment for six hundred dollars.

841
00:48:39.440 --> 00:48:41.519
To make you want to open that email, right.

842
00:48:41.559 --> 00:48:44.239
And I say, oh, great, thanks for doing that for me.

843
00:48:44.480 --> 00:48:47.639
That's my I literally have a programmed thing in my

844
00:48:47.679 --> 00:48:49.920
head that says, oh, thanks for taking care of my

845
00:48:50.000 --> 00:48:52.559
payment because my AMEX would have shown it to me

846
00:48:52.639 --> 00:48:53.280
if I did it.

847
00:48:54.199 --> 00:48:57.239
Yeah, And that's something so you don't go into panic

848
00:48:57.280 --> 00:49:00.239
mode exactly. It just is like, oh, okay, thanks you,

849
00:49:00.280 --> 00:49:02.000
and then you're going to be more app to go okay,

850
00:49:02.039 --> 00:49:04.119
that doesn't make sense, blah blah blah.

851
00:49:04.239 --> 00:49:07.320
Right, and then the final one is you know, look

852
00:49:07.440 --> 00:49:10.840
for that don't get call plan and that's this last

853
00:49:10.880 --> 00:49:12.840
There's a bunch of these that are in the references

854
00:49:12.840 --> 00:49:15.159
that we have, but this is probably one of the

855
00:49:15.199 --> 00:49:18.079
biggest ones that I'd like to point out. If you

856
00:49:18.239 --> 00:49:22.239
are being told that there's a proof of life situation

857
00:49:22.360 --> 00:49:26.320
going on and somebody is trying to get your somebody,

858
00:49:26.239 --> 00:49:29.360
they're they're doing an imitation of somebody, right, hang up,

859
00:49:30.280 --> 00:49:33.000
Just hang up, and then use the number you have

860
00:49:33.119 --> 00:49:35.679
on your phone to call that person back.

861
00:49:35.920 --> 00:49:38.760
Really, the number in your contacts, in your the number,

862
00:49:38.840 --> 00:49:41.320
the call history number that came through, the number that

863
00:49:41.360 --> 00:49:43.199
you know is that person. Yeah.

864
00:49:43.239 --> 00:49:46.480
Absolutely, if they go what are you talking about, You're like, Okay,

865
00:49:46.519 --> 00:49:47.880
that was a scam exactly.

866
00:49:48.079 --> 00:49:51.400
Yeah, that's verification. All right.

867
00:49:51.440 --> 00:49:53.679
So that's it. Really, I think I just wanted to

868
00:49:53.679 --> 00:49:55.880
make sure and these all of these are in that

869
00:49:56.000 --> 00:49:57.360
research document I shared that.

870
00:49:58.039 --> 00:50:00.880
All right, I'm going to take a dive into that

871
00:50:00.960 --> 00:50:04.440
before next week. So all right, thanks David, and I'm

872
00:50:04.440 --> 00:50:08.519
looking forward to next week to continue this conversation. But

873
00:50:09.199 --> 00:50:11.119
we are out of time and I need to do

874
00:50:11.159 --> 00:50:14.000
a quick ten second close on here. So we got it,

875
00:50:14.840 --> 00:50:17.440
all right, Well, thank you everybody for joining us today.

876
00:50:18.159 --> 00:50:21.360
Lots of great information. Don't forget to tune in next week.

877
00:50:21.599 --> 00:50:25.440
We're going to continue the conversation on artificial intelligence and

878
00:50:26.159 --> 00:50:29.159
with some different tool different tools you can have in

879
00:50:29.199 --> 00:50:32.800
your toolbox, and don't forget to go to Rosadvocacy dot org.

880
00:50:33.000 --> 00:50:35.320
All our social media links are there down at the

881
00:50:35.320 --> 00:50:39.480
bottom of the homepage. You can sign up for the newsletters. Also,

882
00:50:39.599 --> 00:50:43.159
David's YouTube channel is the second SIP. You can get

883
00:50:43.199 --> 00:50:45.800
on and look at some of the videos that he's

884
00:50:45.800 --> 00:50:48.320
done there as well. All right, we'll see you next week.

885
00:50:49.960 --> 00:50:53.480
Well that's all the knowledge for this episode. Junian every

886
00:50:53.559 --> 00:50:57.519
Tuesday at eight am Pacific time on kfourhden Radio at

887
00:50:57.599 --> 00:51:02.199
KFOURHD dot com as joys a variety of knowledge, so

888
00:51:02.480 --> 00:51:06.519
you have the power to make scam protection your healthy habit.

889
00:51:07.119 --> 00:51:10.000
And until then, feel free to reach out to Joyce

890
00:51:10.079 --> 00:51:12.079
and let's talk about scams.