00;00;00;06 - 00;00;02;20 Alex Technically speaking. 00;00;02;22 - 00;00;05;18 Chelsie Welcome to our technically untechnical Technology talk. 00;00;05;20 - 00;00;14;18 Alex A NIWC Atlantic production and an award winning podcast with your hosts, Chelsie Holloway and Alex Jackson. 00;00;14;20 - 00;00;38;15 Chelsie So Alex, instead of jumping into our usual banter, we need to introduce our guest because we have a different style episode for you, our listeners. We are sitting here with a Narvik Atlantic expert to have a roundtable discussion around cybersecurity. Now, I'm not talking about naval cyber security for the warfighter, even though that is, of course, a wonderful capability that now, like Atlantic has. 00;00;38;18 - 00;00;43;06 Chelsie I'm talking about tips around cyber security for you and your home. 00;00;43;09 - 00;01;05;10 Alex That's right Chelsie. I'm excited for this episode and to ask all our burning questions. He will not only be giving us advice on securing our home networks, but also our online presence. So without further ado, I'd like to introduce you all to Richard Stamper or Rick. And now we could Lanark lead engineer and this episode's expert. Welcome to the podcast, Rick. 00;01;05;11 - 00;01;06;21 Rick Thank you. Pleasure to be here. 00;01;06;27 - 00;01;25;16 Chelsie Great. I'm so excited to talk about this. It's a great, conversation starter whenever I'm talking to anyone about what I do with work, because half the time they're like, oh, well, what about, like, cyber security? How do I protect myself? I was I don't know, I'm not an engineer. Right. So now we have an engineer here to tell us all about it. 00;01;25;18 - 00;01;47;02 Chelsie And I have to share, like my big thing that I did for myself. And it's been over a year now. I deleted my social media apps thinking. But I did that more just to, like, separate and had no idea the type of cyber security. I might be helping myself by deleting the apps, but I think there's so much more I should be doing, so I'm excited to kind of talk about that today. 00;01;47;05 - 00;01;51;07 Chelsie Are you on social media? Do you kind of indulge in that? 00;01;51;10 - 00;02;09;22 Rick I am as guilty as anybody else. I do indulge in social media. I just start. But you're right, there's a lot of risk to be considered when you're on there. And there's a lot of practices that people should take. Especially from the perspective of those of us who travel internationally for our work and do work for the government, there's a lot of things to consider. 00;02;09;26 - 00;02;11;19 Chelsie And, Alex, you're active on social media. 00;02;11;20 - 00;02;21;06 Alex Yes, I'm a as well. So it's kind of hard to balance that, to making sure that you stay safe, but also wanting to, stay current with what's, what's out there on social media. 00;02;21;13 - 00;02;28;27 Rick Yeah. And there's some things that can go over with you, with your social media that help you. You can't totally protect yourself, but there's some things you can do to help protect your data. 00;02;28;29 - 00;02;38;29 Chelsie And before we dive into that, we're going to start with how we protect our home Wi-Fi. But I want to know what are the threats that we need to be aware of around even just our home networks? 00;02;39;01 - 00;02;54;21 Rick Yeah. So around your home networks, things to consider are accessibility. And what you're using on your Wi-Fi. Who's using it? A lot of the routers and stuff nowadays, you have a lot of capabilities that you can exercise and you can use to help protect yourselves. Segmentation. 00;02;54;21 - 00;03;00;15 Chelsie Is it that easy for people to like hack into your home Wi-Fi and just see what you're doing? Is that a real threat? 00;03;00;15 - 00;03;13;08 Rick It's a very real threat. There's actually people who drive around affluent neighborhoods, as you would call them, and hack people's networks to get into their their home devices and get into financial records and information that they're trying to steal your. 00;03;13;08 - 00;03;20;16 Chelsie Your are they looking for your online, like, banking and stuff like you're talking about, or are they trying to get into your files or all of the above? 00;03;20;17 - 00;03;45;04 Rick Think about it as your front door is just like your router. It's only as secure as the locks you put on it and the effort you put into protecting it. So yeah, I mean, you can get into a lot. So if somebody can get into your Wi-Fi network, they can get into accessing files on your computers, they can get in your computers and monitor you gain access to financial information, personal information, maybe stuff you don't want out on the internet. 00;03;45;06 - 00;03;50;21 Rick You don't want to have access. It's personal. It's all accessible if you don't protect yourself. 00;03;50;23 - 00;03;54;10 Alex So you mentioned segmentation. What can we do to protect our Wi-Fi? 00;03;54;13 - 00;04;11;24 Rick All right. So if you start simple a lot of the routers nowadays come with guest Wi-Fi. I think everybody's seen that you have a guest option on your Wi-Fi. So my recommendation is to anybody that's coming into your home that is not a regular, needs to be on guest Wi-Fi. Don't ever let somebody onto your main Wi-Fi. 00;04;11;25 - 00;04;30;18 Rick Don't assume best intentions as we spoke earlier. Zero trust. Don't trust anybody. Especially from outside your home. My kids at my home, you get a little QR code, that we have that whenever our friends come over, it's put on the fridge and the friends come over, they want to get on there. That's great. Fine. Scan the fridge, jump on the guest Wi-Fi. 00;04;30;20 - 00;04;52;14 Rick Keep them off of your your your main internet. And I try to, you know, for those of us who are a little more savvy, you can do other things. Like if you have segmentation between the different, wavelengths and stuff like that, you can actually break it down. So if you're using a 2.5 or 5MHz, you can break those down a little bit differently to be able to give people the ability to segment your work traffic from your personal traffic to. 00;04;52;16 - 00;04;59;00 Chelsie Show a segmentation, something like another device you have to buy, or is it something like a setting within your Wi-Fi? 00;04;59;02 - 00;05;16;15 Rick It's settings within your router. It's utilizing the settings that are available to you so you can utilize, like I said, most most people's routers have guest Wi-Fi built in. It's a great feature to utilize. It's a very basic feature. Anybody can do it. Just don't give anybody your main Wi-Fi password. And make sure you give that guest to everybody who's just coming in and out of your home. 00;05;16;22 - 00;05;18;23 Chelsie So segmentation is guest Wi-Fi. 00;05;18;23 - 00;05;20;24 Rick Basically it's a concept okay. 00;05;20;24 - 00;05;29;09 Chelsie So but how do we protect them from people just driving around trying to hack in, like you had mentioned earlier? 00;05;29;12 - 00;05;49;15 Rick This is a tough one. So there was a time that everybody thought if you hit your Ssid, which is your ID that identifies your router when you go to your home and you see, you know, Alex's internet, right? That's your society, okay? And people thought, hey, we can hide that. Well, yes and no. Anybody that actually is has the tools and is driving around doing this. 00;05;49;15 - 00;06;05;04 Rick They have a way of seeing that so they can still pick that Ssid out. Right. And then they can ping that information and actually get it to come back in and give them all the the data that they're looking for to be able to get into your router. So it doesn't give your password, it just identifies your router for them, tells you make model and things like that. 00;06;05;04 - 00;06;24;07 Rick So there's a way for them to do it. So the best security you have is keeping your iOS up to date, your firmware up to date, the things that you know, provide security patches for your devices, and making sure you keep a good, strong password on your router. Most people take the little password that's written on the bottom of the Wi-Fi router. 00;06;24;10 - 00;06;41;28 Rick I would recommend against that, even though that's I understand a lot of, providers give you that so that they do something other than just using the admin password for the software as it comes. However, I would strongly recommend, you go to something a little stronger, create a password, no information in it that's can even be figured out. 00;06;41;28 - 00;06;47;02 Rick It's just make it random letters and symbols to try and protect yourself and. 00;06;47;04 - 00;06;51;03 Chelsie Well, actual words. Would you even use real words? They're just random letters. 00;06;51;10 - 00;07;12;03 Rick I would recommend against it. Pattern recognition, anything. I mean, these these tools that they use nowadays goes through the vocabulary listed. There's a lot of, there's a lot of encryption tools out there in decrypting tools for this case that will get through that pretty quick. So you want to make it random letters, random symbols, and you want it to be minor 20 or greater bits long. 00;07;12;03 - 00;07;17;16 Rick So 20 or greater characters stay away from 12 sixteens. Good. The more the better. 00;07;17;19 - 00;07;19;27 Alex Do you recommend changing that password? 00;07;19;27 - 00;07;29;14 Rick Every so often we change our quarterly in our home. So every three months I change that password. You don't have to. It's a it's just a philosophy that I live by now is protecting myself. 00;07;29;20 - 00;07;41;02 Chelsie Oh so other than changing our password and, you know, keeping our devices and our devices up to date or our router up to date, because I don't know if I've ever seen anything from my router. 00;07;41;05 - 00;07;58;22 Rick Yeah. It's it's everything. So anything on your network at your home should be patched properly, which means you should have your iOS updates on, on your phone. Right. So you have you have your your software on your iPhone and your Android. You should be on the latest version. You should never a lot of people turn. They found a don't update until I've looked you and you wanted to. 00;07;58;23 - 00;08;16;22 Rick You want to manually do it. But what do we mostly forget. Yeah, yeah, things like that that are in the background that you're they're obscure to you. You're not thinking about them every day, especially if it's not your livelihood to do so. So setting automatic updates on making sure when you get prompted for an update on your phone or your computer or anything like that, you do those updates. 00;08;16;22 - 00;08;35;10 Rick They're there to protect you. Your home, your router is a doorway. And what people forget to realize, if you think about it, like you've a car, right? You got four doors on your car, but you got windows. Well, there's more than one way to get into your car than just the driver's side door, right? There's all these other doors. 00;08;35;10 - 00;08;57;02 Rick There's windows. When you reach out to the internet, you're opening up those doors and windows, right? And you're giving you're reaching out to websites and you're creating points of access for that. So your software on your computer is designed to help protect you for that. There's other methods which we can get into when you want to, but you have to remember that your only secure is the locks on your door. 00;08;57;02 - 00;09;03;23 Rick So same concept. These computers are doorways into your home network, and you've got to make sure that your software is up to date so that you're protected. 00;09;03;26 - 00;09;25;29 Chelsie So speaking of websites and usage of our, internet, data. So our data, we're learning has been collected all the time from social media, from Google searches, from everything. Do we need to be concerned about how it's used? Yes. And if so, why? 00;09;26;02 - 00;09;32;29 Rick Okay, so there's a lot of different answers to that one. You mean who here gets spam phone calls? 00;09;32;29 - 00;09;34;20 Chelsie Oh, yeah. All this, all this all. 00;09;34;20 - 00;09;50;20 Rick The time, right? It's used for that purpose. It's used for advertising, spam emails, all kinds of stuff. It's used, it can be used for other nefarious purposes. People stealing your identity so they can try to get a loan in your name. Try to get credit cards in your name. Maybe just get your credit card information so they can utilize your credit card. 00;09;50;23 - 00;10;09;29 Rick And then there's people who that they gather the data bits because we want to know what they're thinking. I've actually I was talking this with some coworkers of mine. Have you ever been in a mood about something? Maybe it's like, you know, for men and maybe a drill you like, or a type of drill you like, or something you just think about, but randomly shows up as an advertisement for you. 00;10;10;00 - 00;10;23;04 Rick Now you didn't search it. You didn't mention to nobody. You didn't talk about it in front of Alexa or anything like that. But yet an advertisement pops up for that particular thing. All right. So it's algorithm maker. They collect data on you. 00;10;23;04 - 00;10;24;11 Chelsie It's not listening. 00;10;24;11 - 00;10;49;21 Rick It's so advanced. It's so advanced. They study your behaviors and your patterns through that. And they can tell based on other things you've purchased and your historical purchases that when they buy these things, they tend to go buy these other things, or when they're doing this, they tend to be in the mood to purchase things like this, and they can go right down to that level of detail and predict what you would like to put, what you would like to purchase at that time. 00;10;49;24 - 00;10;57;04 Rick Yeah, that's that's how advanced it is. So remember, when they're collecting data, they're collecting patterns. Your behavioral patterns. 00;10;57;07 - 00;11;06;04 Alex Yeah. That brings us to the next question, which was going to be about algorithms. How do we protect ourselves from being taken advantage of the algorithm. 00;11;06;07 - 00;11;15;03 Rick In reference to things like data collection. Well, how how many people will have an app? And I'll ask you, what, do you have any apps on your phone that you don't pay for? 00;11;15;03 - 00;11;15;16 Chelsie All of. 00;11;15;16 - 00;11;18;17 Alex Them? Yes. All of them. Yeah. 00;11;18;19 - 00;11;26;14 Rick They're free. Right? Yeah. You have some free. You have some paid for apps. I have some that I pay for. But the majority of your apps are free. Yeah. Is anything ever free? 00;11;26;20 - 00;11;28;07 Chelsie Well. 00;11;28;09 - 00;11;30;17 Rick Nothing's ever free, right? 00;11;30;19 - 00;11;34;05 Chelsie It's literally. I'm not paying for this. 00;11;34;07 - 00;11;54;10 Rick Right. That's what I mean. So, if you're not paying for an app, which means there's no security policy between you, that privacy policy between you and that company that says, hey, we're you're paying us for a service and we're going to provide you just that service. And if we collect data from you, it is specifically to make sure we're providing you a good service, those apps, because you are the commodity you are what they're selling. 00;11;54;12 - 00;12;08;19 Rick They're collecting your data, taking that oh, I got a free IP calculator and I put it on my phone. So it makes it so much easier for me to do my work. I'll go and look and see what they're collecting off of you. They're collecting your information. They're taking that information, and then they're selling it to the market. 00;12;08;19 - 00;12;10;07 Chelsie What is an IP calculator. 00;12;10;08 - 00;12;32;12 Rick So it's just an application that you buy or you don't buy. You download for free and you put it on your phone and it helps you calculate subnets on the fly. So if you're calculating something complex, you can move quickly, quickly and calculate it real quick and keep moving right. So it's just because it's free monetarily to you does not mean you're not the commodity that somebody is collecting data off of to sell to somebody else. 00;12;32;16 - 00;12;43;18 Rick Yeah. And that is actually very quite often the case. And probably I would venture to say very, very few applications in this world that are free for your phone or your computer that aren't costing you money. 00;12;43;24 - 00;12;59;12 Chelsie And that that's legal. Right? It wasn't that a big argument in the courts. And eventually it has become legal. They just have to tell you that they're going to collect your data and then you can accept or not accept cookies. Am I blending too many things together or how how is that? 00;12;59;15 - 00;13;11;23 Rick No, no. And I think I think you're right there in in in some forms. And I think some of these applications have a lot of ways around those types of things. But they do. They're supposed to disclose to you in a privacy disclosure. But what does that last of you read? A privacy disclosure. 00;13;11;28 - 00;13;18;26 Chelsie Right. No, but I, I always agree to it. And I know now I know what it means. Then collecting my data. 00;13;18;28 - 00;13;21;00 Rick Is so much like the way I read it all. 00;13;21;02 - 00;13;25;24 Chelsie But I do try to avoid the cookies and do like only the necessary cookies. 00;13;25;24 - 00;13;26;14 Rick So that your private. 00;13;26;16 - 00;13;28;24 Chelsie Health at all. Or is that pointless. 00;13;28;27 - 00;13;40;14 Rick Laziness to some degree, and it depends on the website that offers it. Yeah, I always try to reject anything and everything I possibly can. Yeah, because I don't like to share that kind of information. I don't want to give you information about me that I really don't want to disclose. 00;13;40;14 - 00;13;48;19 Chelsie And Google's Incognito mode, does that actually protect you or is that also I mean, they thing that they've put out there. 00;13;48;19 - 00;14;09;06 Rick So yes, it does help okay. You know Safari offers something several similar privacy. You know, private privacy browsing private browsing. So like that. So there are features out there that they're trying to utilize to help protect consumers. So that's a definite big step in the right direction. But in the end the website you connect to it's still your biggest problem. 00;14;09;06 - 00;14;30;28 Rick Right. And there's there are other things you can use other browsers. They can use that will protect you do a better job of protecting, allow more customization to protect you at a much more granular level, and keep those, those types of what you can't even access those types of websites, to be honest with you, with some of these things, some of these tools that you have, they'll keep you away from them and they'll warn you, hey, if you want to access, you're going to give up a lot of data. 00;14;31;01 - 00;14;54;04 Chelsie Yeah. And I've noticed, like every time I have to, I have to make an account for so many different websites now and create a password and all this fun stuff. Right. And it always needs my address. Yeah. Or a phone number. And I feel like if I and it's required and I have to put it in or else I can't have the account, I can't access the service. 00;14;54;07 - 00;15;01;20 Chelsie Is that protected or am I at risk with that? Like they're supposed to have some sort of protection when they do that right? 00;15;01;24 - 00;15;20;25 Rick The answer would vary based on the type of website you're accessing and what service it is, how we get our memory. It's also we're talking ethics to to a certain degree with these companies. So it's also talks about you got to consider the company you're doing business with. Are you signing up for a free like a free trial? 00;15;20;25 - 00;15;37;06 Rick If you go to one of these websites you can sign for a free trial two weeks for free, no charge. Just give us your name, your email and your phone number and your date of birth. Yeah, well, if you'd be surprised if you go out there on the internet or you do some websites, I use incognito. Incognito, one of the ones I use to protect myself to pull my data off the net. 00;15;37;08 - 00;15;56;24 Rick When you go out there and look and guess what you find predominantly is associated with you, it's usually your name, your phone number, your email, and maybe your birthdate or an address they got there. Oh wow. They've sold this to over 500 companies. Yeah. So your information is it's still really based on the company. There are some companies that do that like incognito which is a search. 00;15;56;24 - 00;16;15;11 Rick It's their purpose. They're a security based company. They're not going to sell your information. But then then there are companies that they're it's another form of income, right. So they're able to passively make money off you by just selling the data, telling people what you bought from them or what services you're using or what you're accessing through them, and then giving them a method to access you. 00;16;15;14 - 00;16;34;09 Chelsie So like one tip to help combat the algorithm is, say, I don't know, your feed is, too much, at politics. Right? Like, that's a very relevant thing to any politics. Should you just start googling cat videos? And then the algorithm will pick up that new pattern that you don't want political stuff. You want cat. 00;16;34;11 - 00;16;37;17 Rick Well, I'd say you're probably not going to fool the Google. 00;16;37;19 - 00;16;38;05 Chelsie Why not? 00;16;38;05 - 00;17;00;18 Rick Right. If you had a very advanced tool, what I would recommend in this case is you would use other browsers and other search tools. There are other search tools out there that don't collect data on you, but they're still pretty good. They're not great, but they're still pretty good. And I mean, Google is used so heavily because it's so advanced, but it's so advanced because of all the data they collect and the billions of dollars they've poured into making it that way. 00;17;00;18 - 00;17;18;29 Rick So I'm using different browsers like Brave. Brave is a great browser you can use. It's a, it's one I personally actually I'm very fond of. You can customize it. You can prevent all those trackers that you don't realize when you access a website. The trackers that they have built in to pull information off of offer you just to try and track you. 00;17;19;01 - 00;17;35;22 Rick So brave. There's a browser, a search tool called duck. Duck, duck duck is a great browsing tool that you can use, and there's a lot of others out there that won't collect data off of you, but still allow you to access the web and will warn you when you're going to a website that is known for collecting data off of users. 00;17;35;24 - 00;17;45;10 Chelsie Okay. All right. So best overall tips to keep ourselves safe, whether it's home Wi-Fi or just browsing the internet. What was your overall tips? 00;17;45;12 - 00;18;06;02 Rick I'd say the best tip I can give anybody, because it's probably the most impactful as far as the biggest risk that everyone, the most part suffers from, or anybody who doesn't practice good security would be when it comes to your financial accounts, bank accounts, credit card accounts and anything of that nature. There's, the. Do you ever see the movie Catch Me if you can? 00;18;06;02 - 00;18;06;27 Rick Yeah. 00;18;07;00 - 00;18;08;19 Chelsie Yeah. Oh, no. You're not a DiCaprio. 00;18;08;21 - 00;18;21;10 Rick Yeah. Leonardo DiCaprio and the gentleman he portrayed in that movie was Frank Abagnale. Frank Abagnale is a real guy. Yeah, he's worked for the FBI for ages. Right. You saw that in the movie. Went to work. That was a true story. Frank Abagnale gave it. 00;18;21;10 - 00;18;27;16 Chelsie Up for anyone who who hasn't seen the movie. We got to give a little bit of the preface here. So basically. 00;18;27;16 - 00;18;47;24 Rick Okay, so Frank Abagnale was a young man at that point in time who traveled the world, basically using fraud as his method to, to get it where to get gain access to bank accounts, get money for free. I mean, he literally. Yeah. Traveled the world. He pretended to be a pilot, never flew a plane, eventually did actually fly a plane, pretended to be a surgeon. 00;18;47;26 - 00;18;49;25 Rick He all kinds of crazy stuff he did. 00;18;49;25 - 00;18;52;27 Chelsie He forged paper, though. Just so. Just so people. 00;18;52;27 - 00;19;10;02 Rick Yeah, he forged checks. Yeah, but he was a master at it. Yes. And this is why, when he got out of prison, they actually put him to work. Yep. He went to work for the FBI. He was their premier fraud guy. Check for a guy. Frank Abagnale gave a speech at the a lot of the FBI graduations and stuff like that. 00;19;10;02 - 00;19;30;09 Rick So Frank Abagnale gave a speech, and it's actually what got me into where I'm at, and it got me into where I am as a person, just being more careful. In that speech, he talked about people with bank accounts, and he said the single greatest risk to consumers, the worst invention was the debit card. Because a debit card is immediate access to your bank account. 00;19;30;11 - 00;19;53;08 Rick And when I, I heard him talk about that and he explained why he used credit cards only he never, never connects a bank account to any external facing thing. It just triggered me just really start thinking about my bank account in my career field. Talking segmentation, and started thinking about why I would be a really great idea if I didn't have the same email and password for every single bank account, credit card account, or things of that nature. 00;19;53;10 - 00;20;22;20 Rick So my best advice to anybody out there who was just really trying to do something simple, kind of complex, but simple it is. And it's how you do it. Create separate emails for your bank accounts and don't access anything from those emails, and use separate passwords for all those emails so that every bank account and every credit card has its own email and its own password, and never utilize them to get a free trial or to log on to a website, keep them completely separate from the world. 00;20;22;23 - 00;20;26;06 Rick That is one of the best ways to protect your bank accounts and your financial information. 00;20;26;06 - 00;20;33;17 Alex That's really good advice. I think it's very unique and want to make sure that those, safeguards are there for us to keep our lives safe. 00;20;33;23 - 00;20;39;06 Chelsie Yes. Out of curiosity, how many emails do you have? Email addresses? 00;20;39;08 - 00;20;40;07 Rick 15. 00;20;40;10 - 00;20;45;00 Chelsie Oh my God. Okay, they're not all Google, are they? 00;20;45;03 - 00;21;01;10 Rick No. I have a few that are Google. The majority of my emails are actually, proton. Proton does a really great job of removing. So when you get an email, you get trackers in your emails and stuff too. So proton does a great job of filtering those out and keeping them, not if keeping them from getting access to you. 00;21;01;10 - 00;21;16;12 Rick So again, when you open an email, you think you just open an email. You don't realize there's trackers built into those emails too. It's it's really crazy the lengths they go to to get data off of you and proton strips. Those trackers before you get the email so that they can't pull any data off you. 00;21;16;13 - 00;21;36;21 Chelsie This is a lot of very good advice. I'm sure we could talk all day about this, but no one wants to listen to an eight hour podcast about this. So we are going to we are going to take it down, take it back. But I have some work to do. I have a lot of emails to make, and then I have to try and convince my husband to do the same, because he's definitely the type of person who keeps life simple, as simple as possible to not have to remember too much. 00;21;36;21 - 00;21;40;22 Chelsie Yeah, and I'm just like, oh, maybe we need to. Maybe we need to change our tactics. 00;21;40;22 - 00;21;51;15 Rick Yeah. And you could, you could do something simple like add a VPN, you know, to your network, NordVPN, proton VPN things, something like that that help protect your traffic too. It's a good way to keep people that are trying to sniff around from seeing what you're doing. 00;21;51;16 - 00;21;54;13 Chelsie So, Alex, what are you going to do? What changes are you going to make? 00;21;54;13 - 00;22;01;28 Alex I'm going to have to create some new emails as well. And yeah, and definitely do some segmentation on the Wi-Fi at home, which is which will be helpful. 00;22;02;00 - 00;22;04;27 Chelsie Joe, you got any tidbits from yourself back there? Our sound. 00;22;04;27 - 00;22;05;29 Alex And you, man. 00;22;06;06 - 00;22;07;22 Chelsie You already knew all this. 00;22;07;25 - 00;22;10;08 Alex No, man. 00;22;10;10 - 00;22;19;08 Chelsie This. All right, Rick, thank you so much for chatting with us. We learned a lot. I'm excited to share all this with our audience and it's been a great time. It was. 00;22;19;08 - 00;22;20;10 Rick A pleasure. Thank you for having me. 00;22;20;12 - 00;22;30;19 Chelsie As usual, to learn more about Network Atlantic and all of our wonderful capabilities, check out our social medias under Nav or our North Atlantic website. Links are in the description. 00;22;30;24 - 00;22;43;12 Alex This wraps up another great episode. Thanks as always for listening. If you have a story that you think should be included in this podcast, please contact us at our Public Affairs email address which is listed in the description. 00;22;43;15 - 00;23;00;19 Chelsie Naval Information Warfare Center Atlantic, also known as DeWitt, is the East Coast branch of the Naval Information Warfare Systems Command within the Department of the Navy, we develop a range of technologies that provide state of the art capabilities to the United States military.