Favoriting Techtonic with Mark Hurst: Playlist from May 22, 2023 Favoriting

Mark Hurst's avatar View Mark Hurst's profile Favoriting

Conversations with creators and thinkers who are charting the way forward in a tech-saturated society. In our shift to a digital future, we need alternatives to Big Tech. Homepage: techtonic.fm

Monday 6 - 7pm (EST) | On WFMU | 91.1, 90.1, 91.9 FM & wfmu.org
WFMU LIVE Audio Streams (Get help):   Pop-up  |  128k AAC  |  128k MP3  |  32k MP3

iTunes Feed Also available as an MP3 podcast. More info at our Podcast Central page.

<-- Previous playlist | Back to Techtonic with Mark Hurst playlists | Next playlist -->


Upcoming events:

Mon. Nov 4th, 6pm - 7pm: Dystopia update (More info...)
Mon. Dec 23rd, 6pm - 7pm: Don Fleming guest hosts Techtonic

Favoriting May 22, 2023: Cybersecurity and "how the world ends"

Listen to this show: MP3 - 128K | Pop-up listen Pop-up player!

Playlist image Favoriting

Today: Cybersecurity and "how the world ends" – drawing on Nicole Perlroth’s book This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (in paperback as of Feb 2023).

Context:

• Where cybersecurity is important: banks, hospitals, government, schools, energy (nuclear power plants, oil and gas pipelines, electric utilities), telecom, food, big stores and other companies, smartphones and other devices (see Pegasus show from March 27 with Sandrine Rigaud), transportation (aviation, trains, shipping), and connected cars and other "smart" (i.e., surveillance) things.

• Types of cybersecurity vulnerabilities (malicious hackers taking advantage of zero-days, or "rudimentary" attacks like "phishing scams, stolen passwords, lazy configuration mistakes, [or] a lack of multifactor authentication"). Perlroth’s book mostly covers hackers using zero-day exploits.

• Risks of security breaches: leaks, theft, damage, and loss

• Zero-day exploits: zero referring to the number of days a company has had to patch this vulnerability

• For example: Apple fixes three new zero-days exploited to hack iPhones, Macs (Bleeping Computer, May 18, 2023) – one of which was reported by Donncha Ó Cearbhaill of Amnesty International’s Security Lab, featured in the Pegasus book

• Ransomware: Malware that locks up systems, threatening to delete or disclose data unless a ransom payment is made to the hackers, typically by a deadline

From Nicole Perlroth’s This Is How They Tell Me the World Ends

• In recent years, hackers from China, Russia, North Korea, and Iran have infiltrated the digital systems of hospitals, schools, nuclear power plants, and government offices. We now live in danger of a "Cyber Pearl Harbor," Perlroth writes.

• Or this: "The most likely way for the world to be destroyed, most experts agree, is by accident." (p. 52, quoting a cybersecurity expert)

• From the prologue, talking about an early Russian hack of Ukraine’s systems: "The public’s understanding of what was transpiring was - to put it mildly - a mismatch to the gravity of the situation . . ." A theme of the book.

• "In the United States, convenience was everything; it still is. . . . We had bought into Silicon Valley’s promise of a frictionless society. . . . we had never paused to think that, along the way, we were creating the world’s largest attack surface. . . . We failed to see that the world of potential war has moved from land to sea to air to the digital realm."

• The book covers the history of the "cyberweapons arms race" and the various actors: capitalists, spies, mercenaries, and "the resistance."

• Back in the 1990s, "boutique government contractors . . . started buying zero-day bugs on behalf of U.S. intelligence agencies. . . . Amassing those stockpiles became a competitive enterprise. . . . It wasn’t abnormal to find multiple nation-states listening in on the same machine." (pp. 43, 46, 47)

• "Today, the Pentagon’s Joint Strike Fighter aircraft contains more than 8 million lines of onboard software code, while Microsoft’s Vista operating system [which was updated through 2016] contains an estimated 50 million lines." (p. 86)

• On Stuxnet: "By the start of 2010, the worm had destroyed 2,000 of Natanz’s 8,700 centrifuges." Then the worm got out (to Chevron, though didn’t do a lot of damage) – foreshadowing later events.

• On the Pentagon (p. 221): "The Pentagon had paid Computer Sciences Corporation $613 million to secure its systems. CSC, in turn, subcontractedthe actual coding to a Massachusetts outfit called NetCracker Technology, which farmed it out to programmers in Moscow. Why? Greed. The Russians were willing to work for a third of the cost that U.S. programmers had quoted. As a result, the Pentagon’s security software was basically a Russian Trojan horse, inviting in the very adversary the Pentagon had paid hundreds of millions of dollars to keep out."

• (p. 261) "Hackers weren’t hobbyists anymore. . . . they had become the world’s new nuclear scientists. . . . What Iran, North Korea, and others could not develop on their own, they could now just buy off the market." [similar to what we learned in the Pegasus interview]

• On China’s commercial espionage (p. 281): By 2015, "China had already collected enough U.S. intellectual property to last it well into the next decade. Chinese hackers had taken everything from the designs for the next F-35 fighter jet to the Google code, the U.S. smart grid, and the formulas for Coca-Cola and Benjamin Moore paint."

• (p. 285): "The consequences of a large scale attack on the U.S. grid would be catastrophic." From a national-security letter to Congress: "widespread outages for at least months to two years or more, depending on the nature of the attack."

• (p. 305) "Governments are starting to say, ’In order to best protect my country, I need to find vulnerabilities in other countries. . . . The problem is that we all fundamentally become less secure.’"

• (p. 307, quoting a security expert) "We’ve all migrated to the same technology. You can no longer cut a hole in something without poking a hole in security for everyone."

• (p. 323) "Few, if anyone, had ever paused to consider what might happen if the [U.S.] government’s stockpile was stolen." Yet that’s what happened in the Shadow Brokers hack in 2016-2017, North Korea launching WannaCry ransomware from the NSA’s Eternal Blue exploit. but then, (p. 343) "the United States had set the rules itself [with Stuxnet], making it permissible to attack a country’s critical infrastructure in peacetime."

• (p. 391) "The world is on the precipice of a cyber catastrophe." . . . "We must stop introducing glaring bugs into our code. Part of the problem is the economy still rewards the first to market. . . . the ’move fast and break things’ mantra Mark Zuckerberg pushed in Facebook’s earliest days has failed us time and time again."

• from an afterword written in 2022: "Most of the country’s 50,000 water plants are run by small nonprofits and staffed by only a handful of employees, few of whom are fluent in code or even cognizant of the threat. . . . all you need to remotely poison America’s drinking water is a stolen passwerd."

In the news since the book’s release

GoDaddy: Hackers stole source code, installed malware in multi-year breach (Bleeping Computer, Feb 17, 2023): a new breach of cPanel, following the 2021 breach that saw 1.2 million WordPress customers get hacked

Cyberattack on food giant Dole temporarily shuts down North America production, company memo says (CNN, Feb 22, 2023): "A cyberattack earlier this month forced produce giant Dole to temporarily shut down production plants in North America and halt food shipments to grocery stores"

• Gary Marcus in Persuasion (May 20, 2023), on ChatGPT systems writing code:

[P]eople in the last month have been playing around with something called Auto-GPT, where an unreliable AI system calls another unreliable system, and they’ve set it up so that these systems have direct internet access, direct memory access, and source code access. Just from a cybersecurity perspective alone, that’s a complete disaster waiting to happen, if you have bots that aren’t necessarily going to do what you want on any given trial, writing code that isn’t necessarily going to be reliable. I talked to someone very high up at Microsoft recently who had worked in cybersecurity for a long time, and they’ve spent years trying to teach programmers how to follow certain conventions so the code will be safe and won’t be hacked. These systems don’t have the conceptual wherewithal to do that. These systems are not smart enough to say, “Well, I’m being used now in a phishing thing, where people are trying to steal credentials.” They’ll happily comply.

. . . You trust humans to make the decisions. But some fool hooks up a large language model that hallucinates things to the train network and 500 trains go off of bridges. There are some scenarios where humans get fooled by new kinds of things that machines suddenly can do. There are many such possible scenarios, and I think each of them, individually, is pretty unlikely. But you sum all of those risks up—it’s enough to make me nervous.
What you can do

• Learn more about cybersecurity (read the articles or books mentioned here, listen to the shows, etc.)

• For anything you definitely want to keep, make a local backup, on a backup drive not connected to anything

• For anything really important, print it out

• Don’t use QR codes

• Don’t click on links unless you’re totally sure you can trust them

• Set up 2FA (two-factor or multifactor authentication, requiring you to verify login via text)

• Don’t reuse passwords at different services

• Use the minimum of apps on your phone (or don’t use a smartphone at all) and minimize luxury surveillance devices: Apple Watch, Google Fitbit, etc.

• Minimize or eliminate all IoT (Internet of Things) surveillance devices at home – Google Nest, Amazon Ring, Amazon Alexa, Google Home, etc.

• Keep your computer and smartphone fully updated, though beware that updates can break or degrade software that you’re accustomed to using. Decide between stability and security.

• Be careful with payment apps on the phone, especially: from A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Life (WSJ, Feb 24, 2023):
On the evening of Jan. 22, 2022, Reece Thompson, an art director at a creative agency in Hiawatha, Iowa, was having a drink with his girlfriend while visiting downtown Minneapolis when his iPhone 12 Pro went missing from the bar. The next morning, when he tried to log into his Apple account from a different device, the account password had been changed. Thousands of dollars had been charged to his credit cards via Apple Pay and $1,500 was stolen from his Venmo account, he said.

Sign up to get Mark’s weekly email newsletter.

PAST EPISODES: techtonic.fm lists recent Techtonic shows.

PODCAST: Subscribe to the Techtonic podcast

Artist Track Images Approx. start time
  Cybersecurity and "how the world ends"
Tomaš Dvořák  Game Boy Tune   Favoriting
Favoriting
 
  Mark discusses cybersecurity  
Favoriting
 
Balanescu Quartet  Robots   Favoriting
Favoriting
0:55:20 (MP3 | Pop-up)


<-- Previous playlist | Back to Techtonic with Mark Hurst playlists | Next playlist -->

RSS feeds for Techtonic with Mark Hurst: RSSPlaylists feed | RSSMP3 archives feed

| E-mail Mark Hurst | Other WFMU Playlists | All artists played by Techtonic with Mark Hurst |

Listen on the Internet | Contact Us | Music & Programs | WFMU Home Page | Support Us | FAQ

Live Audio Streams for WFMU: Pop-up | 128k AAC | 128k MP3 | 32k MP3    (More streams: [+])


Listener comments!

Avatar Swag For Life Member 5:58pm
ultradamno:

Mark! Techtuardians!
Avatar 🤖 Swag For Life Member 6:00pm
chresti:

Hi Mark and techtonicians!
Avatar 🤖 Swag For Life Member 6:01pm
Handy Haversack:

Mark! Techyons!
Avatar Swag For Life Member 6:02pm
melinda:

hi all
Avatar 🤖 Swag For Life Member 6:02pm
Wendy del Formaggio:

hi Mark! I am psyched for tonight's show, which I can listen to LIVE. Tuning in while I put away my CDs and records and what-not.
Avatar 🤖 Swag For Life Member 6:04pm
DjLorraine:

Hi Mark and techtronians
  6:05pm
SM Ken:

Hello Techticians
  6:07pm
Androu B.:

Good evening Mark, Technocrits & Technocrats!

John Oliver just did a follow-up on Cybercurrency on a recent Last Week Tonight, which I have yet to see. (To those of you who have seen it, I kindly plead to you...NO SPOILERS!)
Avatar 🤖 6:07pm
herb.nyc:

Author not here? Well, guess we can be brutally honest tonight. Like now: mark, you ignorant slut!
Avatar 6:09pm
Juli:

The Context is to detailed:::
Avatar 6:09pm
Doug in MP:

Timely: just got a text about important information from "your bank" with a bitly link
Avatar 6:09pm
Juli:

*So
Avatar 6:10pm
Juli:

So Everything.
Avatar 🤖 Swag For Life Member 6:10pm
Webhamster Henry:

Hi Friends! WE ARE DOOMED!
  6:11pm
Androu B.:

↳ Webhamster Henry @6:10
Invader Zim fan are you?
Avatar 6:12pm
MarciB:

at a recent conference I attended, a cybersecurity expert gave us tips to protect our info - and it was exhausting and left me feeling like I'm just treading water. No matter what I do, it's not enough.
Avatar 6:13pm
MarciB:

On the plus side, she recommended everything that Mark has listed here.
Avatar 🤖 Swag For Life Member 6:13pm
Wendy del Formaggio:

The blackout was in August 2003.
Avatar 6:14pm
Doug in MP:

Man, that was 20 years ago this year
  6:14pm
Sam:

It’s the Y2K fear alll over again. What are you going to do at midnight New Year’s Eve when all the lights go out?!
Avatar 🤖 Swag For Life Member 6:14pm
Wendy del Formaggio:

When the blackout happened, I thought I caused it.
  6:16pm
SM Ken:

I was in the wave pool at Action Park when the blackout happened. It was maddening
Avatar 6:16pm
MarciB:

I remember we were the last house on the block to get our electricity back. I also remember some of the nice folks at the local farmer's market giving me some free food since she felt so sorry for me. It was such a kind thing to do. Not sure that would happen now.
Avatar Swag For Life Member 6:16pm
Ciggy:

↳ Wendy del Formaggio @6:13
I was on secluded portion of Fire Island until sunset. Oblivious to the blackout.
Avatar 🤖 Swag For Life Member 6:16pm
Webhamster Henry:

I was up in Woodstock, and assumed it was just Ulster County undergoing a typical blackout.
Avatar Swag For Life Member 6:17pm
Ciggy:

Periodically, I'll watch that Stuxnet documentary by Alex Gibney entitled, "Zero Days". 👍
Avatar 🤖 Swag For Life Member 6:18pm
Will thee Sound Guy:

Hi Mark Hurst and all!!!
Avatar Swag For Life Member 6:19pm
Ben in Long Melford, UK:

Already sounds like a great book. Have just ordered a copy.
  6:19pm
Androu B.:

Why not call it, "World Ending Estimation of Possibilities" (or WEEP for short)?
Avatar 🤖 Swag For Life Member 6:20pm
Wendy del Formaggio:

@SM Ken: I didn't know the wave pool or Action Park were still open in 2003! Wow, being in the wave pool right then. Musta been either interesting... or shocking...
Avatar Swag For Life Member 6:20pm
coelacanth∅:

greetings Mark
Avatar Swag For Life Member 6:21pm
ultradamno:

I'm assuming China is already set...
Avatar 6:22pm
Doug in MP:

Saudi Arabia would never do anything bad to us /s
Avatar 🤖 Swag For Life Member 6:22pm
Webhamster Henry:

The LinkedIn breach from long ago is still being used today, I think.
  6:23pm
Sam:

As long as there’s a way to unhook our electrical systems from the network we should be able to get them restarted fairly quickly. You just need a way to override the network grid and manually get each one connected to a local grid of physical wires with no internet involved.
  6:25pm
P-90:

This is related to the threat of using small nukes as EM pulse weapons. An enemy could put small tactical-size nukes in 4-5 small private aircraft, detonate at high altitude simultaneously over different parts of the US: the detonations and fallout pose minimum threat, but the electromagnetic pulse from the nukes will disable everything with a silicon microprocessor chip in it that isn’t specially shielded (“Faraday shielding”). In this scenario. phones. cable access to the internet, even cars that have chips in their ignition systems will all be simultaneously disabled permanently from one end of the country to the other. This way, no hacking/breeches are required, the shutdown is inflicted “physically.”
Avatar Swag For Life Member 6:26pm
ultradamno:

Unless TV has lied to me, the ransomware is legally required to present with a cute animation and guttural altered voice
  6:26pm
Sam:

Wouldn’t it be great if the cost of all this ransomware and insurance and security experts made it no longer cost effective to use networked computers? We’d go back to faxes and phone calls and human interaction because it would simply be more cost effective than risking hacks in the long run. God that would be cool.
Avatar 🤖 Swag For Life Member 6:26pm
Handy Haversack:

↳ Doug in MP @6:14
Jesus. That's a thing.
Avatar Swag For Life Member 6:27pm
Ike:

What, no tankies getting mad that Mark slandered the completely sweet, innocent, harmless, unimpeachable Russia and China? /s
I'm almost disappointed.
Avatar 🤖 Swag For Life Member 6:28pm
Handy Haversack:

↳ Ike @6:27
Tan ... kies?
Avatar 6:28pm
Juli:

That's right.
We USA started it.....

We are also to blame.
Avatar 🤖 Swag For Life Member 6:28pm
PaulRobeson1923:

Hi Hi Hi Hi
  6:28pm
queems:

WE’RE #1 WE’RE #1
Avatar Swag For Life Member 6:28pm
chris in the redwoods:

and Israel is another state actor in the cyber weapons arms race (often with US involvement, tho).
hi, Mark and folks
Avatar 🤖 Swag For Life Member 6:29pm
Folsom:

↳ Ike @6:27
At least the tankie WFMU show is off the air for now.
Avatar Swag For Life Member 6:30pm
chris in the redwoods:

tankies? folks who wear tank tops?
Avatar Swag For Life Member 6:30pm
ultradamno:

A Tankie Top WFMU shirt is an idea whose time has come...in plether New York Dolls "better red than dead" period style pref.
  6:31pm
respectablename42069:

Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety, by Eric Schlosser - this the one?
  6:31pm
P-90:

@Chris: “tankies”, not “tanksters”
Avatar 6:31pm
MarciB:

Just like in the 1980s movie "War Games"
Avatar Swag For Life Member 6:32pm
Fishtown Mike:

↳ Sam @6:23
Not necessarily. Depending on access levels, systems can be overloaded, or caused to go into cascading failures that can result in hardware or fusing failures. Some are localized, but many would be distributed throughout the entire electrical grid. In an urban location it might not be down as long. But suburban or rural locations probably much longer.
Avatar 6:33pm
Doug in MP:

↳ Handy Haversack @6:26
Like a lifetime ago
Avatar Swag For Life Member 6:34pm
Ike:

↳ Handy Haversack @6:28
I thought we'd discussed this before (?), but if not:
en.wikipedia.org...
  6:34pm
Homer:

It’s pronounced nu-cyu-lar
Avatar 🤖 Swag For Life Member 6:35pm
Handy Haversack:

↳ Ike @6:34
Ah, I see!

Oh, hey, also, didn't you have a "rate-my-credit-union" site that you posted once?
Avatar Swag For Life Member 6:36pm
chris in the redwoods:

ah, thanks, P-90 and Ike!
  6:37pm
P-90:

STUXNET, one of the most effective and consequential state-actor hacks in history
  6:37pm
Androu B.:

↳ P-90 @6:25
I get the feeling this has already happened before. I remember once recently when certain electronics in my house all went dead or malfunctioned on the same day: a smartphone died, laptops had trouble booting, digital clocks blinking and reset to 12:00 AM, stored batteries blown or suddenly losing all charge, and other phenomena.
Avatar Swag For Life Member 6:38pm
Zipperhead7:

I was the co-author of this, which was published about three and a half years ago. We talk about the marketplace for zero-day exploits as well as the market for cybersecurity and a lot of other aspects of hacking's political econpmy: www.ucpress.edu...
Avatar Swag For Life Member 6:39pm
chris in the redwoods:

iirc, the reason Stuxnet "escaped" is because the Israelis changed the code to do something else, against the wishes of the US... but i may be thinking of another "project."
  6:39pm
?:

Covid started as a computer virus which somehow evolved to become real.
Avatar 6:39pm
Juli:

If you're intelligent enough to du this:::

Let's hope you want to save the world instead::::
Avatar 🤖 Swag For Life Member 6:39pm
Ken From Hyde Park:

Hi, Mark and friends. I may need to see my doctor to make a techtrolysis appointment. ⚕️
Avatar 6:40pm
Juli:

Totally,
This:::
Move slowly::
Build well.
Avatar Swag For Life Member 6:40pm
Ciggy:

The worms were called, Olympic Games & Nitro Zeus
Avatar 🤖 Swag For Life Member 6:40pm
Handy Haversack:

↳ Zipperhead7 @6:38
UCPress -- nice. Hope you had a good publishing experience. I've liked all the people I've met from there.
Avatar 6:41pm
dan in wisconsin:

Is Palantir Software the natural evolution (or de-evolution?) of the proverbial rosetta stone PROMIS Software of the 1980s?
Avatar Swag For Life Member 6:42pm
ultradamno:

Mark Zuckerberg, the jiu-jitsu champ?
Avatar Swag For Life Member 6:42pm
Ike:

↳ Handy Haversack @6:35
I don't know about *rate* a credit union, but there's a site for *finding* a credit union: www.culookup.com
  6:42pm
P-90:

The civilian coder who “found” STUXNET:

https://eugene.kaspersky.com/2011/11/02/the-man-who-found-stuxnet-sergey-ulasen-in-the-spotlight/
Avatar 6:44pm
Doug in MP:

We stopped in Wildwood last week, and I made sure to bring quarters for the meter this time. But no, you had to download an app to park anywhere in town. F that
  6:45pm
Sam:

The cost of making every water treatment plant manager a cybersecurity expert is higher than the productivity lost by simply unhooking the water treatment plants from networks and going back to the sixties or whenever this risk was impossible.
  6:46pm
Sam:

No mark don’t drink the water!!!
Avatar Swag For Life Member 6:46pm
Ciggy:

I'm waiting
  6:46pm
yippie:

dole in North America? Hawaii is not in North America
Avatar 🤖 Swag For Life Member 6:46pm
chresti:

Lay it on us Mark
Avatar 🤖 Swag For Life Member 6:46pm
Handy Haversack:

↳ Ike @6:42
Thanks, Ike.
  6:47pm
lamegaming:

and cheat on english assignments 😂
  6:50pm
Sam:

The bots running the asylum
Avatar 🤖 Swag For Life Member 6:51pm
Folsom:

Here's a scary piece about bots talking to other bots for self improvement www.lesswrong.com...
Avatar 6:51pm
Doug in MP:

Train systems are maybe hardcoded but maybe I don't know
Avatar Swag For Life Member 6:51pm
Ciggy:

Zero Days Documentary:
youtu.be...
  6:51pm
P-90:

Alternative title for “Techtonic”: “CODE REVIEW”
Avatar 🤖 Swag For Life Member 6:52pm
Ken From Hyde Park:

The phrase "inmates running the asylum" comes to mind.
Avatar 6:52pm
Motobro:

Mark, you are so spot on bringing up all these points. Especially our infrastructure automation and the latest on chat bot.
Avatar 🤖 Swag For Life Member 6:53pm
Handy Haversack:

Hell yeah, Mark. Say it.
Avatar 6:53pm
dan in wisconsin:

"First humans shape a tool. And then the tool shapes humans." - Marshall McLuhan
Avatar 6:53pm
Juli:

Wow.
  6:54pm
Sam:

↳ Doug in MP @6:51
Hey Doug! The safest way to throw switches is still with manual levers. Any computer system could fail, but the mechanical metal system physically can’t allow a conflicting route. I learned that over in France from the guys in the old towers.
Avatar 6:54pm
Motobro:

Wonderfully horrible things.
Isn't that Ken's old favorite word, a juxpostion?
Avatar 6:54pm
MarciB:

The oligarch's lights will never go off. But ours will.
Avatar 🤖 Swag For Life Member 6:55pm
Will thee Sound Guy:

I think that it's a big reason that a bunch of ATMs and ATM networks are still programmed in COBOL
  6:56pm
P-90:

Stop Millennials from reflexively scanning every QR code they see? How?!!!
  6:56pm
Dean:

The QR-Code Menu Is Being Shown the Door (NYT)
https://www.nytimes.com/2023/05/22/dining/restaurant-qr-code-menu.html
Avatar 6:57pm
Doug in MP:

↳ Sam @6:54
Last one around here went out of service twenty years ago! But even the modern VPI stuff is addressable via T1 but hard coded to prevent conflicting aspects
Avatar 6:57pm
Juli:

I deleted most apps.
Avatar 6:57pm
Doug in MP:

There are much, *much* easier ways to cause chaos. I assume that's true in all fields
  6:57pm
Rolando:

A very decent show tonight. Thank you.
  6:57pm
Androu B.:

Thanks, Mark! (Especially for the always welcome & badly needed purge rant! Always love when you end with that!)
Avatar 🤖 Swag For Life Member 6:57pm
Ken From Hyde Park:

Don't connect to random wifi transmitters when out walking around.
Avatar Swag For Life Member 6:57pm
ultradamno:

Speaking of Russian and links, Pussy Riot are on Bandcamp now pussyriot.bandcamp.com...
Avatar 🤖 Swag For Life Member 6:57pm
Handy Haversack:

Thanks, Mark.
Avatar Swag For Life Member 6:58pm
chris in the redwoods:

still terrified. thanks, Mark!
  6:58pm
wind:

Always terrifying!!
Avatar Swag For Life Member 6:58pm
Zipperhead7:

Good advice, Mark. Sadly, increasingly one needs a smartphone and credit card to participate in "society." It's a matter of forced choice
  6:58pm
Motobro:

Wonderfully horrible things.
Isn't that Ken's old favorite word, a juxpostion?
Avatar 🤖 Swag For Life Member 6:58pm
chresti:

Thanks Mark!
  6:58pm
P-90:

Yes Mark it was “a little bit terrifying” mission accomplished
  6:58pm
Motobro:

Thank you Mark.
  6:58pm
Dean:

Still the best cover of Kraftwerk is The Routes, a Japanese surf guitar band.
  6:58pm
Jung:

I bought books in Google and that affects the content that I browse including Youtube
Avatar 🤖 Swag For Life Member 6:59pm
Wendy del Formaggio:

Thanks for a great show, Mark!
  6:59pm
Sam:

Cue the scary cello music
Avatar 🤖 Swag For Life Member 6:59pm
Will thee Sound Guy:

Be safe everyone!!!
Thank you Mark Hurst!!!
Avatar 6:59pm
Doug in MP:

This album is my favorite of the Kraftwerk cover genre
  7:00pm
Jackie G:

↳ Dean @6:58
This is pretty damn good
Avatar Swag For Life Member 7:00pm
ultradamno:

Best cover of Kraftwerk starts with Snakefinger moves to Messer Chups then to Big Black
Avatar 🤖 Swag For Life Member 7:01pm
Ken From Hyde Park:

Also: never deviate from www.wfmu.org.
  7:06pm
Fredericks:

↳ Folsom @6:29
Fabio?
Avatar Swag For Life Member 7:10pm
coelacanth∅:

Thanks Mark
Bottom
Comment!
Name
Email
(C) 2024 WFMU. Generated by KenzoDB, written 2000-2024 by Ken Garson