BBC Sounds Music Radio Podcasts The Second World War by Between Two and Four Years Or Did It? And after decades of secrecy in the last 20 years we've learned of the remarkable minds that made this possible Or have we? What are you doing? I'm being an Enigma machine. So yeah, the idea was, because Enigma, as well as being the name of the machine, also can mean being enigmatic. And I don't matter. He was unable to write a funny joke for the introduction. That's basically the part being anyway.
So we're not looking at the past but towards the future. The information technology of the 21st century have created immense opportunities, but there's also a darker side. How can these ubiquitous technologies be manipulated to influence us? What is cyber warfare? And how can we prevent malevolent forces turning our everyday devices against us? To help us understand what we know, what we know, what we know, what we can't know, that we don't know.
We're joined by two leading authorities on cyber security and a former sluice conjurer. My name is Professor Richard Benham, and best known for being patron of the National Museum of Computing just up the road. I'm also known for being a best selling spy novelist, which was something that came to me later on in life, with a cyber twist. So that was where my cyber bit came in. And I'm Victoria Baines. I'm professor of information technology at Gresham College.
I'm also an erstwhile cybercrime investigator. And the most surprising thing that people don't know about cyber technology is the money that some countries make from cyber attacks. One of whom, reportedly, gets half of their GDP from cybercrime. Harleman. I'm Alan Davis. I'm a comedian and former sluice conjurer.
And the most surprising fact I know about cybercrime is that I know this because I know someone who's in the Royal Cycloes who are at the forefront of cyber warfare, and the rest of the army refer to them as chair force. And this is our panel. Victoria, so this term cybercrime cyber warfare, we probably think most of us think of teenagers probably in their bedrooms, so it's trying to hack computers. But you alluded to it in your introduction that now it can be states as well.
So can you give us an overview of who is conducting cybercrime and cyber warfare? What is it today? Well, I think the term cyber is really unhelpful. It's a made up word. It comes from ancient Greek. It's what a helmsman does when he's piloting a boat and all of a sudden through science fiction. All the folks who work in what we used to call information security, computer security go, no, I'm a cyber warrior now. I'm defending the galactic universe against all these different cyber threats.
Very radio for that. The origin of the word. It's a helmsman. Yeah, so I'm a recovering classicist. And so I'm really interested in the origins of how it comes about. It's Norbert Venus 1948 definition of cybernetics, regulatory systems, mechanisms to regulate animals and machines. And through that, that cyber prefix then gets stuck on everything.
But to your question about what actually is it, it's really a spectrum of activity. And at one end we have nation states engaged in cyber warfare and old school espionage as well. So, you know, if we're thinking about war games and other movie that lots of us watched in the early 80s, the idea that you could hack into the Pentagon and say, do you want to play a game of thermonuclear war?
You know, it's that kind of attack, attacks on critical infrastructure, the things that keep the country running. And at the other end we have that profit driven cyber crime, which is just making a fast buck out of other people. The trouble is that 10 years ago it was a lot easier to distinguish the guys who were the nation state actors and the guys who were trying to make a fast buck.
But now when a company or a person even or a country experiences a cyber attack, they don't actually know the intent of that attack. Is it to steal trade secrets? Is it to take down their hospitals? Or is it to get some money out of them? And that's really challenging for those of us who are responding to it. Because we actually don't know whether it needs to be the army sometimes, or a cyber security sensor, or the intelligence services, or plain old coppers.
Do you want to try and guess which nation state it is? What is it? 50% not the island of man, I should say. Which nation state is it? I think it's going to be some small remote island. It might be in the Caribbean, could be in the Indian Ocean, could be the seashells. I think it's quite a good guess because what we do see is we see kind of dastardly cyber criminals using small island web domains to launch their attacks from.
So you might be an attacker from France, but you'll use Vanuatu or Togo's web domain just to obscure where you're really from. And you park your billion dollar yacht at the end of the jetty, so then you can be a mobile state when everyone's on. And that's not obvious at all. No. This is how we investigate cyber crime. We look for the yachts. With a helmsman, obviously. I do it with a cyber helmsman. In this case it's North Korea.
And you could say, well, you make that noise, but did any of you guess it? Three hands up, three North Koreans here. And you could say, well, they probably don't have a very large GDP, so we're talking proportions rather than absolute amounts. But the United Nations last year they launched an investigation into North Korea because in the years 2017 to 2020 they amassed $3 billion US dollars just from 58 cyber attacks.
Wow. And there's that ransom stuff. Are they getting into companies and getting paid off and pinching data? Ransomware quite often. Again, we like to make up words in cyber security. So it's malicious software that locks your files and says, right, if you don't pay the ransom, you're not going to get your files back. Actually, what tends to happen is that you pay the ransom and you don't get your files back strangely enough.
And just to go on fixed point as well about crime, cyber warfare is something else and it seems to have materialized. And I am a military officer in my as a part time role. And one of the things we look at is obviously the threat landscape posed by other state nations. And it's increasing. And the simple reason it's increasing is cyber warfare is really cost effective to do.
Far more cost effective and having lots and lots of nuclear weapons. And again, one of the good bits of news that I always like to share is I think that the world that we will go into will actually become safer because of cyber warfare. We just need to negotiate our way there before anybody does anything silly. Richard, we look at the history because we're here at Bledchley Park. So would it be right to characterize the enigma machine, the use of codes, code breaking?
Is that really the first historic instance of what we might call cyber warfare? I think it's the best known. I think there are arguments before that people have used technology, used coding. Certainly ciphers in even in Greek times, you know, people were using ciphers to transfer messages. So it wasn't there something where they tattooed the head, let the hair grow. And then when they went, they ran to the other person, shaved their head off. And then the message would be on the top.
So I think this whole bit about. I felt that was passed over with too much ease. Right, run me through this story, right? So I need to get a message. How long ago? It's only has to be there in about three months, but it is quite important and it's very secret. So shaved the head. Yeah. To have to do the message on the head. Let the hair grow. Obviously there's an assumption there that the hair is going to grow fast enough and not challenged.
Secondly, and secondly, that there's this period of time before hats. Yeah. Right. So there's also the challenge of the time, the time taken to get from one place to the other so that the hair grows. And then at that point gets shaved off and then they can be domesticated. So you see, because it takes a lot of time. So you don't wait until your hair is grown, then get on the ship. You get on the ship under the assumption that it's going to take two months to get to the.
This is when your head grow faster than the hair and your chin. I suppose you could do it on your chin. I think to do it. So they're going to have it tattooed on your chin, right? You could do. I never regret that question about this. How has this never been in any films? I've done it on the dog. I've shaved the side of a dog and put the message on the dog and then the dog's hair grows back. And then you send the dog. You don't need to go anyone interfering with your head.
You can do feathers, Greg. Could you do it on pigeons? A pigeon. You could do a small message. Do you know what you can do with a pigeon? I believe some people have. They put a little message in a little ring now and a bit of a... And they let it fly. Don't start plucking. I've got another pigeon. Just put the message on my... Oh, no! What we have to do. How are we going to get these facts? Do you remember what the question was?
I thought I'd asked a very simple question to connect the location of this recording to the history of cyber warfare. And we've ended up with something to do with plucking dogs. Yeah. Coming back to cyber warfare. Yes. So what we're seeing is that cyber warfare is getting a bit bullied now. So what's that state against state? And as Victoria said, all the criminals are involved. You get the state sponsoring criminals.
So terrorism is another word that's banded around with the word cyber-siber-terrorism, which is effectively using cyber machines to damage your enemy, so to cause mayhem, to break systems, to break their infrastructure. And then that's almost gone one step further. And North Korea being a good example where you get economic cyber-terrorism, which is effectively terrorizing the system, but doing it to either economic advantage or economic disadvantage.
So the city of London suffers from this a lot, because there are many, many foreign countries, particularly the Chinas, the Russians and North Korea's Iranians, who would like to bring the city of London down. The only thing that currently stops that from hacking to a large degree is the Lord and the God, their money deposited there. So he's sort of self-regulates his self. But if it wasn't, he would come under a lot more sustained attack.
So this idea that someone, a state or an individual, can hack into the computer system, essentially. So what are the most common failures in security? Well, we quite often in cyber security to talk about the Holy Trinity, which is people, process and technology. And a vulnerability in any one of those three means that you're not 100% secure. Now, spoiler alert, nobody is 100% secure.
And what we do is we try and put in enough measures in place that we reduce the risk of some of the most common, and hopefully some of the most sophisticated attacks. But if someone is really persistent, and they put a ton of money behind it, say, with state backing, and they've got an entire army unit working on this stuff, they'll get in. It could be things like identity management.
It's making sure that the only people who can have access to your systems are the ones that should have, that you haven't given it to somebody's sister because you use their tablet in COVID. You can have a failure in the technology because new types of malicious software are being developed all the time, and that's where all those antivirus companies, they're racing to develop the antidotes to that. You also have kind of technical vulnerabilities in operating software.
People make mistakes when they're writing code, and companies have to race to patch those. But then, of course, you have the vulnerability in the people, and that's the social engineering part, and that's why things like fishing still work because we fall for stuff. Can you just define fishing then? I hope I'm not going to trigger PTSD, because we've all suffered this stuff. It can be things that are based on something that you really want.
So your boss sends you an email and says, Hey, you're employee, if the month, just click on this link. You have won a massive yacht, it does tend to be a massive yacht in very many cases. Or it could be romance, of course. And people quite often say, well, why are people so stupid as to fall for the hot girl that says, hey, you look nice, do you want to get on webcast? Well, because they might have just split up with their partner. They might have had a few beers.
We're all vulnerable at certain times in our lives, but also fear. Fear is a really big tactic. The scam of people ringing up and saying, hey, we're a Microsoft help desk. We can see your computer is vulnerable. Well, yeah, we want to fix that, of course, we're vulnerable. And of course, we will then be driven to do something in a panic. We're quite often told that it's time limited. You need to do it right now. Otherwise, something terrible is going to happen. It's human manipulation tactics.
Do get trends, don't you? I mean, there was a time when everybody's bank was ringing them up. A tenant that their bank account was compromised. And what were the last few transactions? And then keep you on the phone for ages until you give away your sort code. And then you start to think, hang on a minute. You haven't been scammed. Oh, you got relentlessly. A Christmas. I had three Christmas lists from my three children.
And I found a website that had every single gift on the site from all three lists. This was heaven, including a Lego set that's no longer made. And I nearly gave them 457 quid. And then I thought, this is unlikely. I mean, I had once scammed on a PS5 about two years ago. That was 400 quid down this morning. And artificial intelligence is changing all of this. Because we used to say to people, you can spot a fishing email because the grammar's not quite right.
Or it's got some funny spelling in it. Well, of course, scammers are using chat GPT now to write their fishing emails, which look perfect. So we're having to find different ways to show people how to spot that something might be a scam. Richard, when we talk about a really big cyber attack, so it'd be infrastructure attacks. So as you said, attacks on state security infrastructure, for example. Do we know what the proportion is that are successful?
So do we know where the biggest vulnerabilities? Yes, so it always used to be in the systems itself. And a lot of it, particularly like NHS Government Department's banks, in particular, have a large number of what's called legacy systems. So all the systems, and when they were merging, growing, nobody used to spend on the IT. They just used to bash the two together, connect them with a wire, put something over the top and then carried on. And as long as it worked, it was fine.
And there was always a day of reckoning for that. And we sort of saw that in the last 10 years. When most of the attacks were directed at the computer itself. But that's changed. And I think the big thing that caused the change was the introduction of the iPhone, and also 4G. So when those two things came together, I think it's 2007, 2009, it changed the whole idea of what an IT attack, what a cyber attack was. It was no longer attacking IT. It was attacking the individual using the IT.
The whole nature of attacks changed. And so what we see today is not so much attacks on these big systems. But what we see are individual attacks now, because it's easier. It's more profitable. And the human vulnerability just means that it's just an easy target for cyber criminals. Put on top of that social media, manipulation of people as well. And the whole thing is turning into not a nice place at the end of the moment. Because it's not just about money. It's also about manipulating people.
We're seeing it manipulating outcomes of elections. So that's brought into the definition of cyber. It is. And that's what's happened to cyber. It's a definition. It's gone from being IT security now to almost a human-based threat that encompasses everybody. We are now all on the front line for nation-state attacks. If you're the Russian Internet Research Agency and you want to manipulate the results of an election, you do it on social media. You say, oh, the Pope is voting for Trump, et cetera.
Which they did in 2016. And those are the places where all of a sudden we become the attack vectors for attacks on other people. Alan, we've seen that people can be manipulated into some very eccentric ways of thinking. Do you think that's because this speed of delivering information seems to have made people tremendously susceptible. And I'm sure part of their brain is going, this can't be true, but this cognitive dissonance just seems so vibrant.
I think what's coming to my mind now is it's now become almost impossible to contact an actual human being with any company that you're dealing with. My Twitter account was hacked by a Bitcoin scammer. And I couldn't do anything about it. And they hacked into my email and I lost my, I had about 800,000 followers or something. I wasn't one of the big fish in the ocean, but quite a lot of people and it was really helpful for me if I was doing a tour or something. So I lost them all.
And then I couldn't get back into the account. And then they said, we suspect you are a bot or something else. And we don't know who you are. And I responded, they'll Google me. I mean, I'm not hard to come by. But at no point in that process could I ever communicate with a human being. And you can't communicate with a human being with almost any company that you're dealing with. I don't know what the long term effect of all this will be on people as humans.
I really start to think if you sit at home and you rely on this machine so much and it does so much for you, does all your shopping for you, does everything for you, you know, all your kids' appointments, everything to do with school, everything is in this thing. And you start to think, hang on a minute, you used to ring up, didn't you?
Does that Victoria Makers far more vulnerable to cyber attack, the fact that we become ever more reliant on machines, be it the phone or whatever it is, that is possible to hack these things. This is possibly that, your fridge, I guess, or your toast or anything, anything that's connected to the internet. We're absolutely so reliant on digital technology for everything, you know, how we get about how we do our work.
But what I would say is that we're probably better prepared to defend against cyber attacks than we are to defend against mistakes. And we saw a really good example of this over the summer when CrowdStrike had a bug in a piece of its software that was used to secure many millions of machines all over the world. It was ironically, it was cyber security software.
When this was initially reported, when everybody got the blue screen of death, when airports couldn't function anymore, everyone said, oh, it's a cyber attack. It wasn't a cyber attack, it was a mistaken piece of code that took down all of these millions of machines that had to be manually rebooted. So in many respects, the most dangerous person in the world is the software engineer that hasn't checked his code.
When they get here at Black State Park and suddenly you can crack the codes, the enigma machines, and one of the problems then is what do you do with that knowledge? You don't want the other side to know that you've cracked it. So then you have to be very careful. Does that still apply for the military now? Can we keep it a secret that we found it out?
Yeah, no, absolutely. A misinformation is as important as information. So sometimes you'll allow a tact to carry on on the basis that you can twist it around and ping it straight back. So the route coming into you also becomes the route back into the enemy. That's quite common. So you'll get a Trojan, then you'll ping a Trojan back on the information going back.
It gets quite complicated, but absolutely. Basic warfare stays the same. Could you define that word by the way? There was a lot of jargon in this area. So Trojan? Trojan, yes, sorry. So if you go back to Greek time, some senior in your classics here, a Trojan horse was where the Persians or the Greeks were attaching Troy.
And the idea was to present a gift of a nice big wooden horse and inside it were hidden a load of soldiers. Obviously seeing it as a gift, the fort opened up, took it in and then all the soldiers came out in the middle of the night and killed them all. And that analogy is used quite often in cyber security where we'll send something to someone that looks innocuous. So it may be a nice photo. It might be a nice little program that does something.
It can be anything at all. The important thing is that the person receiving it sees it as a gift. Now sooner than they download it and put it on their machine, then we can open it up from afar and see what they're up to. And certainly when I worked in the intelligence services, there was a lot of that going on in the early days. And even today, I can't speak for GCHQ or any other agencies because I'm sure that's what you say.
Many of them are here tonight, I suspect. But certainly as a tool in the armory, that's always a good one, a Trojan. And we do the same with Prophet Drift and Cybercrimes. As soon as you arrest someone who's in, say, a forum on the dark web, you can take on their persona and then you can catch what everybody else is up to.
And there are quite a few operations over the last few years where folks like Interpol and Europe, all who have cooperated with say the National Crime Agency here in the UK to take down those forums. But only after they've got all the data from them. In terms of security threats, we hear about the big high profile failures. But it sounds as if you're both saying that there's an awful lot going on and we're very successful at preventing most of it.
And part of the reason for that is that quite a lot of the time when a cyber attack happens, we just don't know. So it's not like a murder where you have a body and you can immediately go around and interview the immediate family, who might have had a grudge against the deceased, et cetera. And it's not like a burglary where you know what's missing and you have the traces. Sometimes all you have is the logs that show that something suspicious has happened.
And it can take several years to find out who the people are behind a cyber attack. And even then if they happen to be a member of the Russian army or a member of the Chinese army, they're not going to be brought to justice. So we have this dark space, a lot of the time around what's actually going on. It can take time to work out. I suppose if you're successful as a state, let's say, of hacking into our accessing the computers in another state and it's working, you'll just keep going.
And actually the word Trojan is very appropriate again because it can stay there for a long, long time. You know, there are cases where Trojan has stayed in military systems for up to 10 years before it's been activated. And sometimes they're so clever that you're never going to find them either. That's one of the other challenges we face is it's become so, so sophisticated that even to defend and come up with these programs that defend us against it is really challenging.
And the fact that we don't know who these people are a lot of the time means that we come up with some really strange naming conventions. One set of researchers has come up with names based on animals and their national affiliations. So, APT 28, the folks who in Russia hacked into the Democratic National Committee in the US are also known as fancy bear because they're from Russia. In China we have a quatic panda.
Why are you having Alan when you start to do all this stuff then if you've got a nice lower back pain? Just thinking of the fact that you know there are many pictures of Alan Turing around the site that we're on now obviously in Bledchley Park. And that idea of the Turing test of the ability to see that you are not actually communicating with another human being and some of the scams that you were to wear.
Do you think that that's one of the things that we're just we're not able now to see that something is algorithmic program. It's not a human being that you're communicating that that's a skill we've lost. The only skill we appear to have acquired is now to not trust any communication at all from anyone and never to click on any link on any text message or any email ever. And I imagine that eventually you're going 10 years everyone will be writing letters again.
I'd like to find out that in years to come you've stopped using computers and every time you get around can you send that script now and suddenly 40 men with razors arrive and go. Alan's written it all on us. There we go. Hang on we have to get in the right order as well. I think I'm act one I can't remember.
It's almost paradoxical isn't it says we move into this future of being far more integrated everything's online is going to be the case that we just become completely reliant or is it the case that we're going to step back because of fear. So I wrote a paper on this back in 2015 nobody wrote it but here that I wrote it and it was called the cyber paradox and it was exactly that as we become so dependent as the data becomes so critical and so vulnerable.
We'd actually revert back to carrier pigeon or even manually carrying data written down between two points and I know that in some security agencies for instance information is so vital that they actually write it down put it in the lock box drive it with a guard. And then the open it up the other the other end rather than relying on say Wi-Fi or the internet the vulnerabilities are just too big for that that type of data.
Part of the behavioral change then we will have to accept that there is no such thing as secure electronic communication. The good news I think is that the technology keeps up with that the security technology keeps up with that so all of us who have junk email folders know that there are technical signals that our email providers are looking for where they can say well that looks a bit dodgy I'm going to stick that in a folder so that you don't inadvertently click on it.
AI is doing something smarter than that now which is automated cyber defense looking at the patterns in the text that's being sent looking at the clusters of where some of these badness is coming from and reacting to it taking it down before humans even need to be manipulated.
Are we essentially just sitting back and letting different AI systems fight against each other in some kind of arms race. That's both the concern and the aspiration I think more and more we're seeing automation being used both in attack and defense. But as we saw with you know the recent glitch in CrowdStrike cyber security software we also need human eyeballs on this to make sure it's being checked before it goes live.
If you fire a missile is there a risk halfway on its journey that the enemy could hack it and send it back to you. This is going to put people off fire in this. Yes and that's the point I alluded to earlier you know the cyber warfare will overtake conventional warfare once you control the systems you can use someone's weapon against them even before it's launched or whilst it's being launched.
And that's been worked on hugely at the moment and that's good news in my view because it is taking away a level of risk. It's like I said we just got to get to that point before anybody does anything stupid. Remember in war if someone attacks another country and you destroy that other country or you've inherited is a barren piece of land with no value. So the art of warfare is quite often to invade with that huge cost but to take control and cyber warfare is very very good at that.
Quite a lot of the time that work is outsourced to job in cyber criminals. So there was a famous story a few years ago where journalists went to the source of a lot of the misinformation that was being spread on social media during times of elections in particular. And what they found was that a lot of this was being put on social media by teenagers in North Macedonia who didn't know who they were being paid by and they were doing it to buy trainers and to go away for the weekend.
So it's that idea of we think these are you know nation state masterminds but actually there's a whole cyber criminal underground economy where you can say well I can write this bit of code and I can leverage this set of people manipulate them. It sounds to me like the answer is something that we've established in our house which is for teenagers there are no screens in the bedroom. And if they just had that in North Macedonia none of this would have happened. Absolutely.
It does sound that it's an almost few tile arms race ultimately between AI is just a week we can have a sit back presumably and let them get on with trying to hack each other. So where is the future if you look into five years time ten years time. So if I was being pessimistic I think 60% of the world's population have access to mobile phone. Perhaps that 60% is the ones that will end up demising because we effectively then almost end up destroying ourselves.
And the 40% that have lived almost primitive basic lives almost inherent here there afterwards that is pessimistic look at it. But there is pessimistic. As mentioned you were talking about all of this a new phone that's come out today. Exactly what you're saying. But that is one way you could seriously go and the point I was making is those without it are probably better off because they have more stable systems they have things in place.
Whereas we're so dependent on it for our whole every way of living the technology. If it fails us in any way we're almost doomed I would suggest. I would frame this slightly differently. I just thought I would share a bit of it. We're almost doomed I would suggest and with that thank you for listening. And now it's a very nervous question sign. But it gave me this image of Elon Musk as Colonel Kurtz in Apocalypse Now or Heart of Darkness this kind of arc.
So I would argue that because we're so reliant on technology because there are going to be more people walking around who are physically, bodily, physiologically connected to the internet. Because we're going to have we already have to a certain extent the massive internet of things because we are so dependent critical thinking in humans has never been more important. We need to develop new skills so thinking about trust and authenticity.
We need some other means to identify things that don't smell or feel quite right. So is that kind of you know that chomp ski and thing about you know how if they got power you know who is it who you know where does their wealth cut all of those things like that critical question. Trust no one. So almost as if Alan we should develop something like a soggine education system.
Yeah it's a good idea where everyone from a young age would attend institutions that were organised to improve their knowledge and understanding of the world. Yeah in a community. So to let us secure and they could share the knowledge speak, use paper. As we've had a we're all doomed from Richard. I think I've just got more of the terminator to blade on a scenario going which is human's will say. What was your message to the listeners and their children? Yes, Skynet is not real.
It's a fiction. It's ten years away. Well but we could pick up on that because Richard is nodding at your joke. It's ten years away. I'm actually taking it seriously. I'm thinking does he know something I don't but I know. But I'm with you on it. Even as a science fiction writer I'm really struggling to anticipate what the next ten years is going to is going to give us.
I mean I find it equally difficult when we're thinking about something like quantum and how quantum computing is going to impact on cyber security. There's this fabulous thing called Y2Q. If you remember Y2K and the Millennium Bug, Y2Q or QJ is the date on which quantum computing will decrypt current encryption standards. So all of our messages will suddenly become no longer secure, no longer encrypted. We initially said oh there'll be around about 2040, 2050.
The greatest mind now say that's going to be about 2030. So we believe that what nation states and some cyber criminal groups are doing is they're harvesting all the encrypted data right now. Because in 2030 they'll be able to read it all in the clear and get all our bank details. What do you mean? The final question then is are we in control of this situation in any sense? By that I mean the potential, the power of AI, the power of quantum computing, are we in control?
And if not then what do we need to do as a civilization to regain control? For me we are, there is a control, are we totally in control? It doesn't feel like it and that's a feeling. It almost feels to me that this is running away from us rather than us running towards it. And the follow up question is who is in control? Whereas before it would be countries negotiating with each other about where jurisdiction was. You know this is my territory, this is your territory.
The internet puts paid to all of that and actually a lot of the power lies in the hands of the big tech companies. Whether we like it or not they're the people that make the products that everybody uses and misuses. We can regulate them as much as possible but more and more we're seeing companies like Microsoft, like Meta, like Google asking to sit at the table when the UN is deliberating on how cyber space should be governed. Recognising that they have the power as well.
Individually just I'd like to ask all of you, what are the little bits and pieces you said? Do you know what? Just to protect yourself a little bit more, here is something that when you log in is a good thing to do. When you're interacting with the internet. Yeah, so as I've got older the two things I must have stood up to is I use the same pin number for all my cards because I can't remember all the pin numbers all the time.
And I've also been guilty in the past and I'm being very honest here using the same password on multiple accounts. So my bit of advice is don't. If you can somehow use a phrase, bespoke it with an extra word for each of your passwords. That's the way I now remember it. As for pin numbers on all my cards, I don't know what the answer is to that but try not to use the same one. Or write it on the back of a card. Well I know your debit cards 5, 6, 7, 2 is a new one.
So yeah, that's the, we've been doing a lot of work whether it's shows been on Victoria. Yeah and definitely not the name of your first pet and the year you were born. Particularly if you do those social media quizzes where they ask you the name of your first pet and the year that you were born. Also keep your software up to date. I know it's annoying but those folks that you know whose job it is to make sure that you can defend yourself technically against these threats.
So updating that software all the time please update it. And also just take a second. I know it's really difficult. Take a second to think where is that link really trying to send me? When you do a test that says you've got an IQ of 190, don't then order the certificate that costs 200 quid. Alan, what about you? What would be your advice P? Well I don't have much advice but what I do when I get the email that I'm suspicious of.
I have a look at the email address that it's come from and it's normally Jeremy 68Q's as well Namibia and I think that isn't Carphone Warehouse. So I just see, I don't, you know, trust no one but I've been saying that for years. Something I just have to put you up Brian at one point you said anything connected to the internet and you included your toaster. Is your toaster connected to the internet? No my toaster is about a dishwasher is.
Oh okay, so there's what it has the capacity but I don't trust it so I haven't connected it to the wire. I don't have a dishwasher. So there we are. So thank you very much to our panel Professor Richard Benham, Professor Victoria Baines and Alan Davis. Do we do a round of applause there? We have a little bit. Yeah let's do that. This enthusiastic applause has been one of the most frightening in my key cages. I think the, yes, the conclusion is we're all doomed I think.
Anyway, we always ask the audience a question and this week we ask them what's the password for your online banking? So it's the final episode in the series. I've just been a two-part series and I'm off to be a helmsman for Brian in Rio. Actually the question was what is the oddest breach of security you have ever experienced? So this is cracking the code for Brian's face cream. It was an enigma. So there we are, I like that yes.
My deteriorating pelvic floor. No no Brian, just do the answer you want in the page. That's a good password I don't think. This appears to be a true one I think. It's losing the keys to an armory and explosive store. But found in my daughter's toy car. I won't give the name out. So Professor Richard knows. Whenever my brother or I leave our PC unlocked the other will change the desktop background to a picture of a horse bum. All fun and games for the work presentation later on.
I got one here from Ross, brackets 37 from Blectchley, comma, single. I'm not going to write to come to me but there you are. He says he wants his bank account hat while he was on a best makestack do and he couldn't buy anything. So that was good news. Good time to. Another true one I think here. Last minute confiscation of polar mints before entering high security prison. For work he says in brackets just to be clear.
Polar mints are actually quite easy to smuggle into prison due to anyway look yeah yeah Alan. On a trip to Hawaii many years ago every time he went through airport security my how why would you keep going through airport? I'm like a happy doesn't it. Every time he went through airport security my husband would tell them the man behind is a bit dodgy. They stopped my dad and searched him seven times. He just couldn't understand what was happening. That is an excellent trip.
Well next week we are discussing the science of Pam Ares with a head chalk or the science of headstrokes with Pam Ares. We haven't decided yet. One other two. So thank you very much for listening. Bye bye. APPLAUSE Hello I'm Greg Jenner. I'm the host of your Dead To Me, the Radio 4 comedy show that takes history seriously. And we are back for series 8. Starting with a live episode recorded at the Hay Literary Festival all about the history of the medieval printed book in England.
Our comedian there is Robin Inz and then we'll be moving on to the life of Mary Annning, the famous paleontologist of the 19th century with Sarah Pasco. Then it's off to Germany in the 1920s for an episode on LGBTQ life in Weimar, Germany with Jordan Gray. And then we'll hop on a ship all the way back to Bronze Age Creek to learn about the ancient Minotons with Josie Long. Let's load more. So if that sounds like fun, listen and subscribe to your Dead To Me on BBC Sounds.