Cyber warfare expert Cyrus Nooriala exposes the unsettling reality of critical infrastructure vulnerabilities already being exploited through silent cyber attacks unfolding behind the scenes.
Studio Sponsor: Cardio Miracle - "The finest heart and health supplement in the world!": https://www.briannicholsshow.com/heart
Could critical infrastructure already be held hostage by silent cyberwars secretly unfolding behind the scenes?
On today's episode of The Brian Nichols Show, Brian interviews cybersecurity expert Cyrus Nooriala on escalating cyber threats. Together they unpack and examine the precarious lack of security pervading both personal technology and business networks, leaving users and companies dangerously exposed.
Delving into ominous examples like the Stuxnet virus and recent Iranian utility hacks, Nooriala outlines the constant probing of systems by state actors seeking leverage in global conflicts. With references ranging from Soviet tyranny to the suspicious Israeli border breach preceding recent violence, he constructs a disturbing narrative of cyber warfare rapidly intensifying across the Middle East and beyond.
Exploring defensive fundamentals like network monitoring, penetration testing, and employee education, Nooriala stresses the multifaceted nature of business cybersecurity. He details how seemingly innocuous activities like pirated downloads can open companies to crippling lawsuits and security disasters. The conversation then begins its conclusion with a disturbing analysis of how cyber-attacks could lead to infrastructure sabotage and kinetic warfare.
While cautioning that absolute privacy remains impossible given legal backdoors in commercial encryption, Nooriala argues knowledge itself creates crucial protection against exploitation. He urges individuals to scrutinize the true reach of household technology, warning device cameras and microphones enable mass warrantless surveillance by Big Tech and government alike.
In this riveting edition of The Brian Nichols Show, Nooriala pierces the veil shrouding the silent cyber battles unfolding across the globe. Tune in as he distills actionable methods for securing both personal and business digital worlds against the rising tide of cyber warfare threatening us all!
❤️ Order Cardio Miracle (https://www.briannicholsshow.com/heart) with code TBNS at checkout for 15% off and take a step towards better heart health and overall well-being!
🎙️ Tune in to The Brian Nichols Show, available on YouTube, Rumble, and Ben Swann's Sovren. With over 790 episodes featuring local candidates, elected officials, economists, CEOs, and more, each show educates, enlightens, and informs.
🔗Follow Brian on social media: X.com/Twitter (https://www.briannicholsshow.com/twitter) & Facebook (https://www.briannicholsshow.com/facebook)
🔔 Don't forget to like, share, and subscribe to The Brian Nichols Show for more captivating interviews and insights into libertarian solutions for local problems!
Learn more about your ad choices. Visit megaphone.fm/adchoices
Studio Sponsor ➡ Cardio Miracle: Your health is an investment - NOT an expense. - 15%off using code TBNS at checkout
Support our Sponsors!
Support the program with a one-time donation or join our Patreon!
Take our audience survey for a chance to win a "Don't Hurt People, Don't Take Their Stuff" bumper sticker!
Brian Nichols 0:30
Could hackers already be inside Middle East networks wrecking havoc without anyone noticing? Well, cybersecurity experts Cyrus Nura Alella dry reveals what silent CYBER WARS are secretly unfolding in the shadows behind the scenes of the battlefield. So today, let's talk about that. Instead of focusing on winning arguments, we're teaching the basic fundamentals of sales and marketing and how we can use them to win in the world of politics, teaching you how to meet people where they're at on the issues they care about. Welcome to The Brian Nichols Show. Well, hey there folks, Brian Nichols here on The Brian Nichols Show. Thank you for joining us on of course another fun episode I am as always your humble host joining me live Mark cardio miracle Studios here in lovely Indiana folks revolutionize your heart health but cardio miracle this natural supplement boosts nitric oxide for a healthier blood pressure in healthier heart increase energy better sleep in and enhanced blood flow will have you feeling the difference today. So at the Brian Nichols show.com forward slash heart start your 100% money back guarantee adventure using code TB and S for 15% off your order for cardio miracle start your heart health journey today, with quite literally the best heart health supplement in the world. One more time cardio miracle at Brian Nichols show.com forward slash heart. All right, let's dig into yes all things in the world of cybersecurity. For those of you who've been listening to this show for a while you know that this is my world. I have done extensive work in the world of cybersecurity telecommunication. So I'm really excited for today's conversation joining us from sai West communications Cyrus neuralgia welcome The Brian Nichols Show. Hey, Brian, how
Cyrus Nooriala 2:14
you doing? Doing good.
Brian Nichols 2:15
Cyrus, thank you for joining us today. And definitely thank you for joining us to dig into Yes, a very real concern. And frankly, it's an unfortunate topic of conversation that seems to be at the top of everybody's heads. What happens in the event of a cataclysmic cyber attack. But before we dig into all things, cybersecurity threats and the likes, do us a favor, introduce yourself as well as SCI West communications.
Cyrus Nooriala 2:40
Sure, I'm Cyrus, Nori, Allah and I began Silas communications in 1997. And we were largely involved in telecommunications. We were developing monitoring systems for carriers so that they could be more proactive with regard to circuit outages and things of that nature. And we began to realize that the industry was very apathetic to its users needs. And so we decided to start designing network architectures, communications architectures that would work around the shortcomings of the industry. Fast forward to about 2008. And we started building our own cloud, into our communications networks. So we started getting pretty heavy into the data transport as well as the data at rest. And of course with that, and our clients came the issues of security and protecting that information.
Brian Nichols 3:41
Cyrus, this is a topic that a lot of folks they're like, Yeah, I know, this is important. But frankly, it goes over my head. So let's maybe set the groundwork here for your average person who's listening to today's episode. Okay. I'm an average Joe, I have nothing to hide, I don't have anything to lose. Why should I be concerned about cybersecurity Cyrus make the case?
Cyrus Nooriala 4:06
Well, you have to ask yourself, do you believe in a police state or not? And the reality is, you don't have to go that far back in history, let's just go to the former Soviet Union, what they did is they regulated things to such a degree, that it was impossible for you to be a Russian citizen without being a criminal. There was not any law that wasn't on the books that you couldn't have violated. And so the problem is, when you became become a an enemy of the state, or somebody who is a person of interest, they simply will take any data they have about you, and show that you violated the law in some way because of the restrictive rules. And so it's something that should concern all of us. There's a reason why we have the Fourth Amendment. It's in the Constitution, not because somebody just drempt it up, but because the forefathers have Our country, we're living the tyranny and experiencing it in in that day. And that's why that fourth amendment exists.
Brian Nichols 5:07
I love it. Because you're tying together things that we care about here on the show, right? We talk about the importance of maintaining not just your personal autonomy and freedom, but also let's talk about the implications of not taking care of your personal security, right, and how that could damage not just your personal self. But you know, this is also true for the world of business. This is where I've spent most of my time over the past decade talking about this very issue with folks as it pertains to their cybersecurity posture. What are you doing for your annual penetration tests and audits? What are you doing from an MDR EDR SDR standpoint? What are you doing for redundancy, all these little questions that need to be put in place that a lot of folks simply aren't thinking about? Right. And I think Cyrus part of the problem is that too many people, number one, they're just too focused on the important things that matter to them in their day to day. But number two, the idea of cybersecurity, it just, it sounds so difficult to even start to grasp, and many folks are politically or I'm sorry, or technologically, you know, I wanna say inept, but they're not as savvy as some folks like you are, or yours truly, which and that's not even saying that much for me, because I still, you know, will leverage the old Google machine to help you a lot of tech stuff. But even still, there's a lot of folks who they just don't feel that they can really step their toe into the water, so to say in order to effectively deal with their own personal cybersecurity or heck, for those business owners dealing with their cybersecurity. So I guess, to kind of start things out, what would be some of the baseline cybersecurity tips that you would recommend to folks just whether it's in personal life or in business, to make sure that they're, they're putting themselves in a better situation?
Cyrus Nooriala 6:47
I have to answer that in two parts. Because you know, personal and business are a little bit different. But, you know, there is some crossover there. But in personal, you really do need to think about the devices that you're using, and know that these devices are not only vulnerable, but they're also being used by the tech companies that are providing them to you, and they're in cahoots with government and they are surveilling individuals, all we have to do is look at the January 6, issue as an example, you know, people are being harassed and even swatted at their homes, because they just happened to be in Washington, DC during the January 6 event, they may have not been at the Capitol, they may have just gone over there for a business trip. But because they happen to be in the facility or travel there, the government is going after them as if, as if there's some kind of enemy, enemy of the state. And this is just brings up another point too, is all these data points that they're collecting on individuals, they're correlating all those data points together, and they're building profiles. And sometimes those profiles are going to be accurate, and sometimes they're not. And this is back to where we started in this conversation, why it's important that you do keep your information private. So as a personal, you know, strategy, I would say, really understand the apps that you're putting on your phone, for example. You know, the droid App Store, for example, is notorious for having very bad apps on their ones that are designed to spy on you on your device. We know that the droid devices have key loggers on the keyboards, so you really need to be careful what you're typing into these devices. And you also have to be thinking about the camera and the microphones on those devices, as well. So and then back to the January 6 issue, check out what is tracking your location and how that's being recorded. On a business side. Boy, it's multifaceted. One, you have to educate your employees because they're bringing their personal devices to work. They're bringing their personal habits with them to work. And they're also using the internet to do things that are probably not work related at different times, oftentimes, even at our company will will catch employees at companies that are doing Netflix videos and things of that nature. Some are actually downloading things, pirated, copy copies of TV shows, movies, and things like that. So when you start going into the dark web and start downloading pirated things, and you're doing this on a company network, and then you're opening your company up to not only security issues, but also legal liability. So there are a lot of things that you need to be looking at, you know, pen tests and things like that are one way of of checking the defenses of your network. But the other thing too, is to have a strategy, for example, on our customers networks, we'll put out certain traps and honeypots and different things that we know are going to show us and generate notifications, because these hackers or actors out there, or their bots on their algorithms are going to going to attempt certain things first in order to find specific vulnerabilities. And so once we get those notifications, we'll then go and look at what the source. Sometimes that takes a little bit of digging, but we find the source of that. And I'll just give you an idea of the cyber warfare that's going on out there. We have actually DDoS attacked, those bad actors that we know are sponsored by certain states, because they're not going to go away unless we start attacking them back. So there's both a defensive and a offensive posture that you need to think about. And it also depends on how visible your company is how global your company is, sometimes companies don't want to get involved with any litigation that might involve any offensive postures.
Brian Nichols 10:56
Yeah, so DDoS attack denial of service attack. I think we just watched rumble get hit one of those, I think this past week. So it's happening, right? It's happening to to us as American companies and American individuals. It's very interesting, though, that you're talking about the offensive side. I think that's a very interesting segue right to the second part of the conversation which goes to what's happening right now in our world you have a Middle East is on fire, it seems Israel which is known to be a country usually pretty strong when it comes to cybersecurity stuff, all sudden, they're caught completely flat footed. With the October 7 attack by by Hamas, you look at Klaus Schwab and his his little accent that that WTF saying cyber attack might be coming down the road sometime. And it's like, okay, that's a little spooky that we have Klaus Schwab head of the WTF now touting the idea of a cybersecurity attack a cyber nuclear holocaust. It
seems like so talk to us about where we are right now, specifically, in that hotbed, right, you look to the Middle East, there's a lot of question marks right there. What's going on Cyrus?
Cyrus Nooriala 11:59
Well, you know, it wasn't too long ago, even before October 7, where we saw the Iranian nuclear facilities, having been plagued with a virus that was orchestrated by the Israelis and the United States via Mossad and the CIA. And, you know, so those are the types of attacks that are coming at us as well. And, you know, the, the Stuxnet virus, which was being used in that situation, is not something that is only being used by us. So variants of those types of things are being used by Russia, they're being used by other state actors as well, Iran was recently in the news, because we found out that they were hacking around at a utility company. I think it was on the East Coast, if I remember, right, maybe New Jersey, but I don't really recall the story completely. But these things are happening all the time. They're happening, whether we're in wartime, or whether we're in peacetime. These are just some of the things that are status quo between nations, because they're looking for these vulnerabilities. And when any kind of a conflict does come about, then they're ready to enact those sleeper elements that they have living inside of networks and what have you. But to talk specifically about the Middle East, you know, there are a lot of Israelis, and some people that I know that are talking about October 7 being their version of 911, that the defenses were suspicious suspiciously down for the Israelis. And there was no response for seven hours that occurred when we knew that the border there is so secure that even a stray animal can't cross that border without somebody knowing about it. And from a networking and security aspect. I know about the redundancies not only in the communications that occur, but also in the monitoring systems that are occurring. And so if there's any hint of anything that is not responding in a way that is anticipated, somebody should have been getting an alert, there should have at least been some bodies out there when these people were hand gliding in or bulldozing some fences with a tractor. So there's that element of this. And we have to remember that this is a geopolitical game. This is a game of chess, it's not checkers. We know that the Israeli government, you know, just prior to October 7, Netanyahu was bragging about how he had 98% of his population vaccinated. So they are a part of this globalist agenda. They are part of this WEF agenda that we've been looking at that does not excuse Hamas and the brutality and the barbarity whatsoever. But we also have to keep in mind too, that you know, Ron Paul was testifying in the Senate in the 90s and telling us about Hamas being the creation of the CIA. A Mossad and MI six, and you have to ask yourself today, why are the heads of Mossad worth $11 billion and flying around in private jets? Where did the $11 billion come from? And if you really want to take out Hamas, why aren't you shooting down their private jet?
Brian Nichols 15:18
Yeah. Yeah, those are the those are the questions that need to be asked. I mean, drop Cyrus, but like, the part that drives me crazy is that none of this is new. Right? This is stuff we've been aware of for decades, you know, that it's been it's been really bubbling to the point now where we're at a steady boil. And I guess, you know, it started to boil over now. And I hate to ask this question, because I don't want doom and gloom. But, Cyrus, if things continue down this path. I mean, where do you see us heading?
Cyrus Nooriala 15:52
You mean, as far as the United States getting involved in a conflict?
Brian Nichols 15:55
Yeah, no, I'm sorry. Exactly.
Cyrus Nooriala 15:59
Well, you know, in a lot of ways we already are, you know, Ukraine is a proxy war for us. And the reality is, look at what's happening to our infrastructure. You know, I think we're at 750 Plus food processing plants that have gone up in smoke. We have several train derailed derailments where bootie judge is trying to convince us that this is normal. And, you know, we've never seen these kinds of things before. And we have to understand that the traditional kinetic type of wars is not the kind of war that is that we're being engaged in at this time. We're involved in psyops through the social networks, through the devices that we're using on the internet. And we're being we're fighting an unconventional war right now. And unfortunately, our government in a lot of ways is not for its own people. It is working toward its own agenda, and the people's agenda and the government's agenda are often in conflict.
Brian Nichols 17:01
Yep. What's that old quote? It was like, I know that World War Two was fought with bombs and planes by no world war three will be fought with sticks and stones. I don't know World War Three seems like it started off being fought with computers and, and technology. I mean, that's where we are right now. It feels not just for us over here in the States, but a global society, like we are also interconnected as it pertains to our our technology, that all it takes really is is one flip of the switch, metaphorically speaking, to turn it all off. And where does that lead us? Right? Where would that put us? Not as a country in the United States, I guess, as a global society. I mean, we're really, we're playing around here with fire. And I don't want to see the whole place get burned down. Saira. So as we go towards our final thoughts for today. I mean, paint the picture, how can we avoid worst case scenario here as it pertains to a site cyber cataclysmic event?
Cyrus Nooriala 18:04
Well, I think knowledge is power, and understanding how a lot of these systems are breached, and how we are being surveilled is really half the battle. And once you understand that, then you can take steps in protecting yourself, the truth is, there is a certain element of things that we don't have control over. And the reality also is, is we have the technology to compete. In order for us to be completely private. We do have the ways and the methodologies so that we could be protecting ourselves. But the other issue as well as is that the government doesn't really allow us to without breaking the law. And one of the things I can point to with that is encryption algorithms, you know, everybody's communicating everything over the internet. And that wasn't the case really. Not too long ago, just a few years ago. You know, you had business circuits like MPLS, and things like that, which were part of closed networks, which doesn't mean to suggest secure networks. But they weren't closed. They weren't on this public internet. But those products have been priced out of the market now. And now everybody is convinced to use encryption layer three encryption protocols over the internet thinking that this is safe and secure. But the reality is, according to the Espionage Act from 1917, we're not allowed to transmit an encryption protocol that the government doesn't have a backdoor to. And everything that we're communicating back and forth on this internet is being archived at some NSA facility. So we just have to be conscious of those things and understand that everything that we're putting out there is really out in the open and we have to be responsible stewards of that information that we're dealing with.
Brian Nichols 19:49
Cyrus nori Ella from SCI West Communications. Thank you for joining us, folks. If you got some value from today's episode, you know the drill go ahead and give it a share. When you do please tag yours truly at be Nichols liberty, you can find me on Facebook as well as over on x.com. Cyrus, what final thoughts do you have for the audience today?
Cyrus Nooriala 20:12
If you want to check out anything with our company and you have some questions about cybersecurity, please visit sigh west.com See ywest.com There's a contact form there. And we'd love to talk to you about it, we love talking the subject, it helps us and it helps our customers as well. Love it. And
Brian Nichols 20:31
I'm just gonna, for my final thoughts, I'm gonna take that and give it a nice little exclamation point. I've worked in this tech space for a very long time. And let's just address the elephant in the room Sirish. Right, lots of lots of companies, they tend to be more politically left leaning, right, the fact that you have not only taken a stand, but you're coming on shows like this to talk about the issues, and doing so through the lens of a pro Liberty advocate. I'm on board. I think this is not only important for us to start addressing with solutions, but I want folks to go ahead and support you. So if you are a small business owner, if you are a medium sized business owner and you're listening to today's episode and a couple of question marks that popped up about your cybersecurity posture, please reach out to Cyrus and his amazing team over at SCI West communications. And with that being said, make sure beyond sharing today's episode, go ahead and let people know how much you enjoyed it share the episode, you can find it on the video version, as well as the podcast version of the show. If you're watching us on video, you can find us on youtube rumble we also upload our entire episodes over to x.com. And also we upload our episodes over to Ben swans, sovereign s o v r e n, which is a great independent media outlet. And by the way, if you're watching us over on sovereign congratulations, you're seeing today's episode before anybody else and that is your sovereign exclusive. And in terms of podcasting. Well, you can go ahead and find us wherever you get your podcasts, whether that's Apple podcasts, Spotify, YouTube, music, or somewhere else, just hit that subscribe button, hit that little notification bell. And of course, if you are listening to the show, download all unplayed episodes. Why? Well, because we have almost 800 episodes here of The Brian Nichols Show and I guarantee of the hundreds of guests we've had in the program. At least a handful will leave you educated, enlightened and informed. I'm just teasing a more than a handful, quite a few. With that being said, Folks, thank you for supporting the show. And one last thing if you want to go ahead and enter to win are don't hurt people and don't take people's stuff bumper sticker head over to the Brian Nichols show.com Leave a five star rating and review take a quick screenshot and email to me at Brian at Brian Nichols show.com. And not only could you enter to win that bumper sticker, but also enter to win $100 gift certificate to our shop over at Brian Nichols show.com forward slash shop where we have hats like our good ideas don't require force. Snap back. We have goodies, T shirts, all that and more and of course it's the holidays. So what a great time to go ahead and get some awesome Liberty swag for that Liberty lover in your family. Other than that, that's all we have for you. Brian Nichols signing off here on The Brian Nichols Show for Cyrus Newari nor yella. We'll see you next time
Transcribed by https://otter.ai
CEO
Cyrus Nooriala, CEO of Cywest Communications, a cyber security company, is an expert in cyber security and can speak to possible strategies and tactics we could expect to see in the declared war in the Middle East. In fact, his company has a patent that was awarded in 2022 that directly addresses the issue of infiltration and remediation.
Did you know that infiltration, on average, isn’t realized until 8 months after the fact? That means in this current conflict, the nefarious systems embedded in many networks have likely already been in place for months.
We are all familiar with the cold-war tactics between the US and the former Soviet Union, and how the KGB and CIA were engaged in sophisticated methods to spy on each other’s countries and to steal state secrets. There was no kinetic war, yet these things occurred without end, whether in peace time or war time. However, in the Cold War days many tactics were physical in nature; physical bugging devices, photographs of documents, honeypots (women agents luring male agents to include sexual activity). Today, most of this has all transferred into the digital landscape. Most of America’s might is supported by American industry, and most American companies work through security certification processes, which are considered amateurish at best.
Cyrus can walk your viewers/listeners through this history as well as explain what to expect in the realm of cyber warfare not only in this current war, but also what might lie in wait for America as well.
Check out some of our favorite episodes!