Global Bob Show

Episode 27 - Strengthening Your Human Firewall: How to Spot and Avoid Online Scams

Global Bob Season 2 Episode 27

Send us a text

Navigating today's digital landscape requires more than just technical knowledge—it demands a vigilant "human firewall" to protect yourself from increasingly sophisticated scams. With cyber attacks occurring every 39 seconds and scam operations projected to reach a staggering $12 trillion by 2025, understanding these threats has never been more crucial.

The landscape of online deception has evolved far beyond obvious Nigerian prince emails. Modern scammers employ multi-layered approaches, gathering small pieces of information through seemingly innocent interactions to build detailed profiles of potential victims. That SunPass toll notification or Facebook friend request might be the first step in a complex scheme designed to manipulate your emotions and exploit your trust.

We dive deep into the mechanics behind today's most prevalent scams. The Haley Welch "hawk tua" cryptocurrency disaster demonstrates how scammers leverage internet fame to create pump-and-dump schemes that leave investors holding worthless tokens. Romance scams employ psychological grooming techniques over months or even years, eventually transitioning into blackmail operations. Charity scams exploit natural disasters and emotional events to collect credit card information under the guise of small donations. Perhaps most insidious are fake antivirus programs that appear legitimate but actively steal your personal information after you've willingly installed them.

What makes these scams so effective isn't that victims are unintelligent—it's that scammers have become experts at manipulating human psychology. They target our natural inclination toward trust, helpfulness, and emotional response. The good news? Understanding these tactics is your strongest defense. By maintaining a healthy skepticism toward unexpected communications, verifying the legitimacy of websites before entering personal information, and approaching online relationships with appropriate caution, you can significantly reduce your vulnerability.

Join us as we break down the anatomy of modern scams and provide practical strategies for protecting yourself in an increasingly treacherous digital world. Your financial security and personal identity depend on your ability to recognize and respond to these evolving threats.

Speaker 1:

All right, all right, here we go. It is that time of the week for the Global Bob Show. Global Bob Show, we are the crossroad of technology and politics episode 26, and with the kickoff we brought in a special guest and her name is Hello Shelly, and I cannot believe the amount of fanfare we got by having Hello Shelly on the podcast. What's really cool is everybody started sending me messages and texts and all kinds of fun stuff. Everybody started sending me messages and texts and all kinds of fun stuff, saying, hey, can you bring her back on the show? And I made it very clear to her that this is the Global Bob Show, not the Hello Shelly Show. So to keep the fans engaged and keeping her from starting her own podcast that would be greatly more listened to than mine I said, hey, well, okay, we'll bring her back, we'll see. She survived week one, we'll see if she survives week two. So, without further ado, hello Shelly.

Speaker 2:

Hello.

Speaker 1:

All right, so she is back.

Speaker 2:

I'm back.

Speaker 1:

Back for episode 27. And yeah, what are we talking about today?

Speaker 2:

We're talking about how not to be a victim when it comes to scams.

Speaker 1:

Oh, scams. What kind of scams.

Speaker 2:

Phishing scams Employment, which is a big one.

Speaker 1:

Employment scams. I haven't heard of that, but we'll circle back to it yeah, charity scams. Charity Okay. I've heard of charity scams Okay.

Speaker 2:

The fake antivirus scams.

Speaker 1:

Fake antivirus scams. Wow, that's a lot of scams, and these are all happening online.

Speaker 1:

I think I talked about this a few podcasts ago but, as we know, with the Global Bob Show, that was years ago and yeah, so I guess we will revisit the topic and see where this takes us. So we have lots of different scams that that that come out. But, you know, all of these scams kind of have something in common, whether it's the fishing scam, the romance scam, which I I like, that one, the, the, the romance one, because they call it the honey trap, which is kind of a play on a honeypot, yeah. And then, uh, there's investment scams and then, of course, course, you told us about tech support scams, shopping I know that that's a big one, shopping, and we'll break some of some of these down a little more.

Speaker 1:

Health insurance that's another one too that is on the rise now, because, I mean, our health insurance is crazy. You know, I thought with Obamacare, you know Obama was going to be our mama and he was going to take care of us from the cradle to the grave, but, uh, but, uh, yeah, I mean even with the healthcare marketplace, you know, that kind of opened up for some scammy type stuff. Um, yeah, you said fake antivirus, that's, that's one that, uh, that has been around actually for quite some time, the whole fake antivirus, and we'll touch on some of these, and Google AdWords too, which you know, and a lot of these will all be combined together. You know, we talked about the Google AdWords and we said some antivirus and stuff. But yeah, we'll unpack all of these. Yeah, we'll unpack all of these, and I think one of the ones that I didn't quite see coming at a certain angle is the cryptocurrency scam. What was that girl's name? The one that everybody she came out with a meme.

Speaker 2:

Haley Welch.

Speaker 1:

Haley Welch. Wow, so I'm glad it's Haley Welch and not Haley Varner, which is my niece. My first born niece's name is Haley Varner. And there I go. I'm leaking personal information out on the internet, because maybe that could be something that a scammer uses against me, right? Yeah, so Haley Welch. What? What was it that Haley was famous for, like? Why did she end up on the?

Speaker 2:

internet Uh Hawk to a girl.

Speaker 1:

Hawk to a.

Speaker 2:

Yeah, uh, uh, she was interviewed like on the street with her friend, oh yeah, that's right.

Speaker 1:

And the, the, the, the girl no-transcript was and, naturally, like with everything I'll tell you on the global Bob show, we we ad lib this. Naturally, like with everything I tell you on the Global Bob Show, we ad lib this. There's not research going on. I don't have this big staff behind me, so if I do get some of the stuff wrong, or hello Shelly if she gets some of the stuff wrong, then what we're doing is giving you generalized antidotes, and so please don't flame us.

Speaker 1:

I think we got like three listeners now between, uh, my family and friends, so, uh, my three only listeners out there. Please don't flame us, but uh yeah, so with oh, there's a term. Maybe people don't know what that term is. Like my mom, she probably doesn't know what that. What does it mean when someone flames somebody else? What?

Speaker 2:

does it mean? When someone flames somebody else, that's like not like hating on them, but like telling on them maybe, yeah, like talking trash right, yeah yeah, like.

Speaker 1:

I'm going to flame you because Do you know who's one of the biggest flamers in my family Is my younger brother, mj. Oh my gosh man, he will flame you in a heartbeat. So, yeah, I don't know girl, and they knew how popular she was and things, and they said, hey, you know, you should have your own cryptocurrency. And we know all the time I talk about I don't like cryptocurrency unless there's a utility behind it, right?

Speaker 2:

Right.

Speaker 1:

And so I guess she was going to come out with the hock to a coin, if I remember correctly. And so she um, they used her fame and they pumped this thing up quite a bit. Now, someone who has made their own cryptocurrency, such as myself, that's used for a utility, I'm like, okay, well, what utility could hock toua coin be traded in for? And I got to be careful. I got to keep this PG. If not, then Apple, yeah, apple, we don't want that. Yeah, they'll get upset with you and pull you off the podcast. But I was like, hey, what would you trade the Haktua coin in? Well, naturally, there's nothing you traded in. It had no utility.

Speaker 1:

So they got it in there, they got her to hype it all up, and as soon as this thing went up, I mean, it was making millions and millions and millions of dollars. And then the people that designed the cryptocurrency they kept a bunch of it back, right, because when you create a cryptocurrency, you can, since you're the author, you're like, hey, I'm going to keep like a billion crypto tokens that are absolutely worthless, by the way, and then I'm going to put the other ones out there. And so what happened was is that it went up real high and they what they call uh pulled the rug out from under it and uh, it went down to next to nothing and and so, really, I mean, we all know about Haley Welch and we know about Hawk too, but she was a victim and everybody was here's our term. They flamed her across the internet, they lit her up and all she was was a beautiful, naive girl that was used by the folks that created the cryptocurrency. There we go there's our first in-depth she disappeared.

Speaker 1:

She did. She had a podcast and she had a lot going for her. She did yeah, I mean, I actually tuned in to some of her podcast and she did them like live, I think. Who's the girl that was the singer? Man I had little butterflies in her hair. I can picture Jojo Siwa. Oh, okay, yeah, that I had a little butterflies in her hair. I can picture, oh, Jojo Siwa.

Speaker 1:

Oh, okay, yeah, that was one of the best ones. She was on there with Jojo Siwa and I couldn't believe. I mean I can't even tell you what Jojo Siwa, but I know that my, my little nieces, they loved uh Jojo Siwa and they had all the, all the stuff for their hair and everything. But it's like I never thought that I would be uh, trying to listen to a podcast with Haley.

Speaker 2:

Welch I digress.

Speaker 1:

Yeah, so that is a one where they, they made, they made millions off of that. But but let's talk about, um, some of the most common ones, uh, that that folks get. I know that lately I've been getting a lot of them from SunPass, where we're at now, oh yeah. Yeah, down here in Florida SunPass is a big thing and I know they got all these other passes.

Speaker 2:

Unpaid tolls.

Speaker 1:

Unpaid tolls. They text it to you.

Speaker 2:

Yeah.

Speaker 1:

And one of the things I've had some of my friends tell me is that they'll respond to that text message that they get and say some derogatory term, and or they'll tell them that you know you're a scammer and they'll try to communicate with them. And, as you know, that's not a good thing to do. Whether they call you on your phone or they hit you on a text message, you don't want to respond back to them because all you're doing is putting yourself in another pile. But you know, just like with any of these scams, what they're trying to do is figure out what your scammability is. I guess you know. If you even respond back to it. Now, you've just shown that there's a live person on the end of that and, uh, now they put you in a different pile also to when they do this, uh, scammy stuff and they land on your phone.

Speaker 1:

Uh, one of the, the, the, the key things they they understand is is that you're an Apple user or an Android user, because of the different um style, like, if it's an Android, it may light up green, I think, and blue. So just from there they know hey, I got a live person, I have their phone number. Uh, that I can. Uh, you know, and, and also they know what kind of device you have, and then they can start start packaging up. You know, and, and also they know what kind of device you have, and then they can start start packaging up. And so then the next scam that comes along may not be about tolls. It may be something to the effect of hello Shelly.

Speaker 2:

Hello, oh yeah.

Speaker 1:

Hello, that's funny, the whole hello Shelly thing, uh, but but then it may be something like hey, your Apple account is past due and the they know that you have an Apple phone or an Android phone and all this does is it builds up like a dossier or a profile. So I know that's one and really those are called phishing, aren't they like a general phishing, so whether it comes in on email or phone and stuff. But one of the ones I want to talk about is the romance scam. Now we understand how beautiful global Bob is and I get these all the time and it comes through as a very attractive woman and she'll send me a picture, whether it's on telegram or signal, not that much. I don't know why I don't get them that much on signal and I never get them on text.

Speaker 2:

It's mostly like a social media type platform that you receive those yeah.

Speaker 1:

And I know I also started locking down my Facebook quite a bit.

Speaker 1:

I don't use Facebook a lot and I know I also started locking down my Facebook quite a bit I don't use Facebook a lot, but yeah, it's usually an attractive woman and then people say, well, wow, okay, how does she end up on there? But what folks don't realize is is that all of this can be from the same person or the same group and they're kind of grooming, right. So now they know what phone you use, they know if you're responding back. Now they're going to do a little catfishing there. Isn't that what it's called catfishing?

Speaker 1:

Yeah catfish, and what they're doing is basically grooming you to figure out what things you respond to, and then it would be a lot of text messages back and forth.

Speaker 2:

Like subtle talk.

Speaker 1:

Yeah, subtle talk right, yeah. Like small talk, a little chitter-chattering.

Speaker 2:

Like hey, how are you doing?

Speaker 1:

I'm like.

Speaker 2:

Oh, are you having a good day today?

Speaker 1:

Oh, I'm having a great day.

Speaker 2:

Awesome.

Speaker 1:

Oh, wow.

Speaker 2:

Me too.

Speaker 1:

Yeah, Uh.

Speaker 1:

But it's not just adults that are getting these.

Speaker 1:

Uh, there's ones out there that are targeting young children, and I, when I say young, I'm talking about like 16, 17, uh, years old, and what they'll do is they'll finally become friends with them and then they'll ask like they'll send them some, uh, some nudie pictures, I guess you would call it or some compromising uh photos of themselves, and then to get that person to send one back. Now, I do know a few of my guy friends none of the girlfriends, but a couple of my guy friends. They, they talk to these, these girls, and I'm like, and they're like, well, what does it matter if I talk to them? And you know, it's not like, but I'm like, I know, but you're putting yourself self out there, but what they're trying to do is get a you to send them a picture. And, uh, if you send them back a picture, and then they'll ask for, like, a picture of you in a mirror or something that they can add positive attribution, that it's you Right, Because they'll say oh, how do I know that's really you?

Speaker 1:

And some of them are even so sophisticated they're asking you to hold up, like your driver's license, but to hold your hand over the address so they're very convincing, right. Hold your hand over the address, so they're very convincing, right. And next thing they do, then they move into like an extortion type route where, oh, I'm going to put all these out on the internet. Or they've already done a lot of research and know what your social circles are and maybe, if you're married or in a relationship, they know who your significant other is, and they actually threaten to publish these like blackmail that's exactly that's exactly what it is, and so you know you start off with, uh, something that's very benign, just chit chat, knowing they're a scammer.

Speaker 1:

But before you know it. If you, um, let your guard down, then you're wrapped up in this thing. And what do they say? Oh, I like, like to get some Bitcoin or whatever, hoctua coins or something.

Speaker 1:

No, no, no Hoctua, they know they know those are useless coins, but that's what they do. And then you never get out of these scams, right, and so so, so that's a big one. Another one is these charity scams, and and we know, living here in Florida, right, what happens every year about this time Hurricanes come through, yeah, storms and stuff.

Speaker 1:

Yeah, storms and all of us. You know they play on our emotions and this is something that's really important to hone in on. Is these scams most of the time only work because of playing on your emotions, and so they wait for an event to happen, whether it's a hurricane here in Florida or earthquake in California, tornadoes out West, you name it the Ukraine war. When that happened, remember, a lot of people were feeling really like patriotic and wanting to help the.

Speaker 1:

Ukrainians.

Speaker 1:

And so these scammers.

Speaker 1:

They will send you something, say, donate a dollar or donate $2, something like cheap, and you click on it and you donate some information. Well, one of the things that was very common is that you click on the link, it takes you to a page to enter in your credit card number, a page to enter in your credit card number. Well, what they'll do is they'll have that page made and it's sending them your credit card information, all your information, and then they're manually punching it into what they call a virtual terminal. And so now, not only do you you're used to when you check out at, like Walmart or any of the legitimate sites we all know there's a lot of security around that, those sites. So your credit card information is never actually stored on Walmart, even if you save your information on there. It's not technically stored and I don't want to get into all the details, but they're sort of like a token that represents that. Well, see these scammers, not only have you given them a dollar or $2, something benign, but now they have your full information.

Speaker 2:

Right.

Speaker 1:

And then later on, say six, eight months from then, they'll start hitting the credit cards again and seeing if anybody notices. And, uh, we've all done it before we sell it. Like, what's this charge on my credit card? It's like it's only two dollars. Who cares? But you can, uh, think about that. If, say, 10 of people will donate to to them that they send the messages to, and then another you know out of those folks, they can hit those cards again and they just keep keep cycling it. Why? Why we're talking about all this is that folks say, wow, that could happen to anybody. But, uh, how successful are they? And they're very successful.

Speaker 1:

Uh, I was doing a little bit of a searching not too long ago and I'm just going off of memory here, and one cyber attack or one of these events happens every 39 seconds. Wow, yeah, there's like 12 trillion in 2025. It's a $12 trillion industry. There was a fact that was about like 27% of folks were scammable and now it's up to 88%. And it's not that we're getting dumber, it's just that they're getting better and they're finding other ways to scam you. But I mean, if you think about $12 trillion, is what this industry? Yeah, and it's all illegal money.

Speaker 1:

And then, kind of like, what we talked about is that it's all Bitcoin-based, cryptocurrency-based, and, as you know, it's hard to track bitcoin down right, and so one of the one of the scams that I'm very, very intimate with is, uh one one that happened to an individual and, from all uh research that was done, that they were grooming that individual for almost a year and they played on that individual's emotions and it started out small, but these scammers were very, very, very good.

Speaker 1:

They created fake documents, they created this whole persona with different people that this person was talking to, and someone like yourself who is a cybersecurity expert you could look at this and see it, as we say, down in the South from a mile away, but when they played on this person's emotions and they brought it all together, they ended up getting countless thousands and thousands and thousands and thousands of dollars, which is really sad. But so what we want to talk about is also just how can you have I like to call it the human firewall? Now tell us what a firewall does on the computer, right?

Speaker 2:

So a firewall blocks any kind of virus or maybe a document that has something that was put in it. The computer will just keep these kind of things out from accessing into the system.

Speaker 1:

Right. So if you think about it in that respect, I think that folks need to establish their own human firewall, and you just got to really, really, really be careful. So when these charity scams come around, I can't do anything. If you're looking for love, I mean I don't know.

Speaker 1:

I guess to combat that you need to go down to a bar. But even nowadays we're seeing some of these scammers for what they call the well that's another term in the scam. The well that's somebody that's really, really rich, that has money. That's just. You know whatever like they.

Speaker 1:

They wipe their ass with like $20 bills and crap, maybe even a hundred dollar bills, and so these scammers will actually run operations against them in bars and hotels. I know in particular, my dad has a friend that this happened to, and this was an electronic scam. This was way back in the day that they were at a hotel and there was an attractive lady there that had taken an interest in his friend, and my dad actually put a stop to it, which was really, really awesome. So when you're out there on the interwebs, internet, dark web, wherever you hang out at, just have your human firewall up. Just have your human firewall up. I mean, if things don't sound right, look right.

Speaker 1:

But you just got to be careful that you don't give out these little trickets of information. You know, with me I'm a public figure and so all of my information is out there. So people, these scammers, probably have a nice dossier on me and so I don't mind telling you. You know, uh, personal information, but really I shouldn't even be doing that. But uh, I, I understand uh how to operate this and so you want to have your, your human firewall, and and you know who's really good about this who do you think in my family probably has one of the best human firewalls outside of me? Who do you think has one of the best human firewalls up?

Speaker 2:

I would say your dad.

Speaker 1:

Why does everybody always say my dad yeah, he's a very smart individual but my mom?

Speaker 2:

Oh, your mom, my mom, yeah, absolutely.

Speaker 1:

She is a cyber ninja. Actually she's a, maybe. Maybe I'll give her a new term. Maybe she's a cyber vigilante, right?

Speaker 2:

Yeah.

Speaker 1:

My mom will get these toll scams, tax scams, and what does she do? She takes a picture of it, a screenshot, and she'll text it to me and she says, hey, this looks like a scam. I'm like, well, mom, unless you've been on the New Jersey turnpike here in the last 10 days or whatever, probably, it probably is a scam. So she's really really good about that. She'll get these friend requests on Facebook who's that? Yeah, who is that? And she'll take a screenshot and she'll scammer.

Speaker 1:

Yeah, and she says, hey, uh, this person's only friends with five other people and so I don't know if she's bored or if she's a cyber vigilante at this point, because, uh, she'll send it. And I'm like mom, that is awesome, that's way to go.

Speaker 2:

Yeah.

Speaker 1:

And so on the Facebook. What they're doing is is that a lot of folks have their Facebook locked down and it's kind of like a double-edged sword. Well, I got it locked down, but I want, like old friends and family, to be able to get a hold of me, and so it's like who can see your stuff? Friends of friends, and so if you're, friends of friends, my mom's friends of friends, and if we're in that little circle all they got to do they could just see each other.

Speaker 2:

Well, they just friend one of us, yeah, yeah.

Speaker 1:

And the next thing, you know, now they have access to my social network, right, right, right. And then what are they doing? They're looking at pictures, they're looking at the to build up that dossier and stuff. So, yeah, I mean, I, I know I, I give a lot of shouts out to mom, but man, I mean, uh, that's really good for someone at her age. And she doesn't even use a computer. Yeah, she doesn't use a computer. It's like all uh iPhone and iPad, but still she, she's out there and uh. So no, this is not a challenge. Please do not try to uh fish, mom, and and and and uh see if you can get something to come through, but uh, yeah. So what I'm telling everybody is you need to have this, uh, human firewall in place because you don't want to be part of this, uh, $12 trillion industry. That's, um, you know so. So supporting this industry, that's, um, you know so. So supporting this. But you, you mentioned something that was, uh, really key, and this is one that people may not know is the antivirus, uh scam?

Speaker 2:

So tell it, tell us a little bit about the antivirus scam. So I think a lot of it comes through email, and in the email they say oh, you know, please sign up for a free trial. Um, for let me throw one out there Um, kaspersky.

Speaker 1:

Oh, that's a good one yeah. That just sounds suspicious.

Speaker 2:

I know that it does.

Speaker 1:

So for for y'all that don't know, kaspersky is a legitimate antivirus uh corporation it is and they were out of russia and very popular at one time. Yeah, they were, they weren't well, they were cheap and, uh, they were good, but now we know what's happening in in russia. But so okay, so they throw it out there and they're like, hey, come sign up for kaspersky, but with a y at the end, it has like an eye exactly, and then what happens?

Speaker 2:

you click on the link click on this link and then all of hey, come sign up for Kaspersky, but with a Y at the end. It has like an I at the end. And then what happens? You, click on the link. They click on this link and then all of a sudden, it could be their computer is infected, gets infected, or maybe it's a site to put in their information, like credit card information.

Speaker 1:

Yeah, moreover, too, they'll actually let you download an application. I've seen this before, so it's Kaspersky with an I instead of a Y, which is ski, ski, whatever, and they'll actually download the application. And when the application comes down, they use the same logos as the antivirus and it will come up and it is scanning your computer for viruses, but really, what it's scanning your computer for is for PII. So, my listeners out there, pii is personally identifiable information.

Speaker 1:

Right, and so they're looking for names, so security numbers, addresses, phone numbers, all of that stuff. Because what do we do? We store it securely on our computer and it's instantly sending that information back. And here's the other thing with the antivirus scam you don't run two antiviruses on your computer right.

Speaker 1:

So they know, the people that are clicking on the link don't have antivirus, so therefore it's not going to detect their malware that they bring down. And so you think about it's like, wow, that's pretty cool, yeah, let's do an antivirus scam. Not that I want to do an antivirus scam, but you click on it and it can easily instantly exploit that computer. And uh, also, too, you're actually installing it. So you're like, hey, I'm installing this. And if it does get installed and I'm not going to get into all the mechanics of it, right, but they're actually signing it, making it all look legit and stuff, and then it's sending back that information. And so, best case scenario, because you don't have antivirus, that, uh, they've exported your computer. And then, if you actually install it.

Speaker 1:

Now they have what they call persistent access to your computer. That means anytime you do anything, your computer, your laptop lid is open, then they have unfeathered access into that. So the antivirus scam is really one of the ones that I consider the most dangerous. Right, because you don't have antivirus, so you're clicking on it, right. But how do they do this? They go to Google, and this this isn't anything bad against Google or bang or name whatever Alta Vista, remember that old oh, alta Vista, right, but, but they go on there and they get the keywords and there's an advertisement, and so, like I talked about with other scams, it plays on your emotions, right, and it's like, well, I need antivirus. And so I go searching for antivirus.

Speaker 1:

I see an ad and this is, uh, you know, using the Google ad the uh AdWords and advertisement, and so it looks like it's all legit because it found it on Google, and people that don't know think that, well, if it's being advertised on Google or Bing or name your search engine, then it must be legit. And so what I'm trying to show here is that it's not a one size fits all when it comes to a scam. They have to figure out what kind of stuff you're interested in and what state your device is in, and so if they send you a uh phishing to your phone, then they know you click on that link. It knows it came from an iOS device. Well, if they send it to an Apple phone and you're logged into iMessenger on your Apple and you click on it, now they know that you came from a Mac device and so now they can start packaging these things together. So when they do actually put what I like to say send you the goods or the value added code that it's highly tailored and high and highly uh and high success rate that you, they're going to land on that that computer.

Speaker 1:

All right, well, we're at the bottom of the half hour and, uh, I'd like to thank everybody that tunes in, as always. Please, uh, send us any feedback on what you want to hear from the show. It looks like uh, hello, shelly, maybe. Uh, this is her second on the podcast, so she makes it through five podcasts in a row. Maybe we'll invite her to be a co-host.

Speaker 1:

Uh, we're always looking for people to come out on the show and give us their perspective and ask questions. You don't have to be technical. I'd love to. You know, really we need to get we need to get my mom in here and get her mic'd up, because I think that that would be great. So Next week, we will talk a little bit more about the training series that we're doing here at the chamber, where we're going to show folks how to actually use AI for their home, you know how to do it for, like home budgets and contracts, and also in the workplace, and so we'll be talking a lot more about that. So until next time, everybody say cyber safe and if you have any questions or comments concern, please email us at global Bobhow at gmailcom. If you want to go ahead and send me a phish email or try to spam me or whatever.

Speaker 1:

We'll see if you can get through Global Bob's human firewall. All right, until next time.