• S5 - Episode 002 – Cicada 3301
    Mar 26 2026

    Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion

    In January 2012, a mysterious message appeared on an obscure corner of the internet — a simple image posted on 4chan with a chilling promise: "We are looking for highly intelligent individuals." What followed was unlike anything the internet had ever seen.

    Hidden messages. Impossible riddles. Cryptographic puzzles buried in images, music files, and code. Clues scattered across the globe — from obscure websites to real-world posters taped to telephone poles in cities thousands of miles apart. Behind it all was a name that would become internet legend: Cicada 3301.

    In this episode of The Cyber Distortion Podcast, we dive deep into one of the most enigmatic puzzles ever unleashed online. Was Cicada 3301 a recruitment program for intelligence agencies? A secret society searching for elite cryptographers? Or an elaborate experiment designed to test the limits of human intelligence and collaboration?

    Join Kevin Pentecost and Jason Popillion, bringing over 50 years of combined cybersecurity experience, as they:

    • Break down how the Cicada puzzles pushed the boundaries of cryptography and problem-solving
    • Explore the hidden techniques used — from steganography to advanced encryption
    • Investigate the theories surrounding who might have been behind the mysterious organization
    • And uncover why, more than a decade later, the true purpose of Cicada 3301 remains unsolved

    This isn't just a story about puzzles — it's a journey into the strange intersection of cybersecurity, internet culture, and human curiosity. A digital scavenger hunt so complex that only a handful of people in the world were able to follow it to the end… and even they still don't fully understand who was waiting at the finish line.

    Are you ready to follow the clues?

    Resources

    Explore the Actual Puzzle Archive

    If your listeners want to see the real puzzle files and clues, this is one of the best archives online:

    • Complete Cicada 3301 Archive (GitHub)

    This repository contains:

    • Original images used in the puzzles
    • Clues from 2012, 2013, and 2014 puzzles
    • Hidden files extracted from the images
    • Documentation from the community of solvers

    The puzzles first appeared in 2012 on 4chan, challenging users to uncover hidden messages embedded in images and code.

    Audio

    - Suspicious Atmosphere

    - Cyberpunk Hacker Loop

    - True Crime Investigation

    - The Truth is Here

    Provided by Filmora

    - Splatter Horror Silence 01

    - Social Crisis

    Provided by: Audiostock



    - A Sinister Plot 1285
    Provided by: Universal Music for Creators 🎧

    Show More Show Less
    44 mins
  • S5 - Episode 001 – The Day that Twitter Died
    Feb 18 2026
    Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion On July 15, 2020, the unthinkable happened: dozens of the world's most powerful voices — Barack Obama, Elon Musk, Bill Gates, Joe Biden, Apple, Uber, and more — suddenly blasted the same message out to millions of followers. A promise that sounded too good to be true… because it was. What looked like a generous giveaway turned into one of the most audacious social engineering hacks in tech history — all orchestrated not by a foreign syndicate, not by an elite hacker collective… but by a 17-year-old from Tampa, Florida. In this episode of The Cyber Distortion Podcast, we peel back the curtain on the incredible story of Graham Ivan Clark — the mastermind behind the 2020 Twitter bitcoin scam. How did a teenager with no access to Twitter's code base infiltrate its inner systems? What dark psychology powered the attack? And how did a stunt that netted six figures in Bitcoin come crashing down in just hours? Join Kevin Pentecost and Jason Popillion, together bringing over 50 years of cyber expertise, as we: - Break down the hacker's journey from online forums to global headlines - Decode the social engineering tricks that toppled corporate giant - Reveal the lessons the security world still hasn't fully learned - And explore how a single moment of human error unlocked the keys to a digital kingdom This isn't just a story about stolen Bitcoin — it's a chilling reminder that the weakest link in any system is the human one, and how one kid's curiosity turned into one of the most notorious cybersecurity breaches of our time. Are you ready to join us inside the breach?! Other Helpful Links: Wikipedia – 2020 Twitter account hijacking — comprehensive overview of the incident, how it unfolded, and its impact. 2020 Twitter account hijacking (Wikipedia)Wikipedia – Graham Ivan Clark — detailed background on Clark's role in the hack and related charges. Graham Ivan Clark (Wikipedia)Ars Technica – "I was a teenage Twitter hacker…" — tech-focused reporting on how the social engineering worked and the aftermath. I was a teenage Twitter hacker (Ars Technica)The Hacker News – sentencing & case details — breakdown of charges, Bitcoin scam metrics, and how the hack was executed. 18‑Year‑Old Hacker Gets 3 Years for Massive Twitter Hack (The Hacker News)CoinDesk – coverage of sentencing and legal outcomes — crypto community perspective on the hack and legal resolution. Twitter Hacker Will Serve 3 Years for Crypto Phishing Scheme (CoinDesk)Tech Times – detailed narrative of the incident — narrative explanation of how the scam unfolded and Twitter's response. 'Bitcoin Scam': Teen Twitter Hacker Gets 3 Years (Tech Times)OPB – contemporary reporting from 2020 — quotes from prosecutors and early reporting on the arrest and scope of the hack. Florida Teen Charged as Mastermind (OPB)Wikipedia (alternate language overview) — another useful global perspective on the same incident. Détournement de comptes Twitter en juillet 2020 (Wikipedia French) Court Documents: Here are some relevant links to official or publicly shared court documents / legal filings related to the 2020 Twitter hack that you can include as sources for research. (Actual court dockets are often on PACER or state court sites and require login, so we've linked publicly accessible filings or charge PDFs where available): Charging document for Mason Sheppard (PlugWalkJoe) – PDF of federal charges in the Twitter hack case (linked from CBS News). (Note: these are federal indictments related to co-conspirators; Clark's state court documents aren't publicly indexed in one central PDF but this gives key legal filings tied to the case.) 📄 [Read the charging document for Mason Sheppard (.pdf)]Charging doc for federal co‑conspirator PlugWalkJoe (CBS News)Tampa teen pleads not guilty as court filings reveal charges – local news report referencing the court proceedings and charges in Clark's case. (Tampa Bay Times) 🔗 Tampa teen pleads not guilty as documents reveal how feds cracked Twitter hack case (Tampa Bay Times summary)Court hearing coverage – describes Clark's hearing and bail setting at the Hillsborough County Courthouse with reference to court filings. (Tampa Bay Times) 🔗 Bail and court hearing coverage for Twitter hack case (Tampa Bay Times)Sentencing summary – covers Clark's plea deal and sentence terms as reflected in official court action. (WUSF) 🔗 Tampa Twitter hacker sentenced to prison and probation (WUSF)Wikipedia – Case overview with court info – includes a summary of charges, indictment details, plea dates, and sentencing, citing court sources. (Wikipedia) 🔗 2020 Twitter account hijacking (case details)Nasdaq / CoinDesk coverage on legal proceedings – references court filings and proceedings around charges and bail. (...
    Show More Show Less
    29 mins
  • S4 - Episode 014 – CYBR.HAK.CON: The L33T DFW Hacker Conference (w/ Michael Farnum & Phillip Wylie)
    Dec 22 2025

    In this episode, we're diving deep into the evolution of one of the most respected cybersecurity community movements in the country. Michael Farnum, founder of CYBR.SEC.Community and the original force behind HOU.SEC.CON, joins us to talk about the transformation of a beloved Houston-based conference into a multi-city, multi-conference ecosystem designed to empower cybersecurity professionals, enthusiasts, and newcomers alike. With expansion plans already underway, the CYBR.SEC.Community is poised to redefine how regional infosec communities connect, learn, and grow.

    We're also joined by Phillip Wylie, a well-known ethical hacker, author, and educator, who will be leading CYBR.HAK.CON — the Dallas/Fort Worth chapter of this new initiative. Together, Michael and Phillip share their vision for what makes a truly impactful cybersecurity event, how they're building inclusive and technically rich experiences, and what attendees can expect from these revamped conferences. From speaker curation to community engagement, they're crafting something that's more than just a series of events — it's a movement.

    And of course, we'll have some fun along the way. Expect stories from past conferences, a few laughs about hacker culture, and maybe even a debate over which fictional hacker deserves a keynote slot. Whether you're a seasoned security pro or just curious about the people shaping the future of cyber communities, this episode will give you a front-row seat to the next chapter in grassroots cybersecurity.

    Helpful Links:

    Here are some helpful and relevant links for your listeners to explore CYBR.SEC.Community, its conferences, and your guests' work. These will give them direct access to events, media, and speaker profiles mentioned in your episode.
    ________________________________________
    🔗 CYBR.SEC.Community & Conferences
    • CYBR.SEC.Community Official Site
    https://www.cybrseccon.com
    Main hub for the community, including conference info, speaker lineup, merch, and tickets.
    • CYBR.SEC.Media
    https://www.cybrsecmedia.com
    Articles, podcasts, videos, and updates from across the CYBR.SEC ecosystem.
    • HOU.SEC.CON Legacy & Current Info
    https://www.houstonseccon.com
    Historical and current details about the Houston-based conference that started it all.
    ________________________________________
    🧠 Featured Guests
    • Michael Farnum (Founder, CYBR.SEC.Community)
    LinkedIn: https://www.linkedin.com/in/mfarnum
    • Phillip Wylie (Lead, CYBR.HAK.CON)
    Personal Site: https://thehackermaker.com
    Podcast: https://phillipwylieshow.transistor.fm
    LinkedIn: https://www.linkedin.com/in/phillipwylie
    • CYBR.HAK.CON Announcement Post by Phillip Wylie
    https://www.linkedin.com/posts/phillipwylie_im-excited-about-my-partnership-with-houseccon-activity-7379520683552321536-OV83

    Show More Show Less
    1 hr and 20 mins
  • S4 - Episode 013 – The Cyber Crystal Ball: Predictions & Pitfalls (w/ Paul Furtado from Gartner)
    Nov 14 2025
    In this episode of the Cyber Distortion Podcast, hosts Jason Popillion and Kevin Pentecost sit down with Paul Furtado, Vice President and Analyst at Gartner, for a deep, insightful conversation that cuts through industry noise and gets to the heart of what's shaping cybersecurity and enterprise technology today. Paul brings a dynamic blend of executive leadership and real-world operational expertise, with a career marked by driving bottom-line impact, navigating mergers and acquisitions, optimizing performance, and reshaping strategic technology programs. Known for his visionary leadership, negotiation acumen, and ability to connect strategy with execution, Paul shares the kind of clarity and perspective that only comes from decades on the front lines of IT, security, and business transformation. Whether you're a cybersecurity leader, a tech strategist, or simply someone looking to understand the forces driving today's enterprise landscape, this episode delivers actionable takeaways, thoughtful commentary, and a rare behind-the-scenes look at how one of Gartner's top voices views the future. Tune in and get ready for a strategic, sharp, and forward-thinking discussion only Cyber Distortion can deliver. Helpful Links: Here are some very good accompanying resources you can include in your episode show notes, to give listeners more context and the ability to dig deeper. Helpful Resources: About Paul Furtado Paul Furtado's profile on Gartner, Inc.: Paul Furtado – Gartner Expert — details his role, background, areas of coverage (security operations, infrastructure security, cyber risk) and previous experience. (Gartner)(If available) His LinkedIn profile — you may search LinkedIn for "Paul Furtado Gartner" or similar to locate his public profile, so listeners can connect or follow his posts and insights. About Gartner & the "Magic Quadrant" Gartner's official definition of the Magic Quadrant: What is the Magic Quadrant? — explains the concept of mapping vendors by "Ability to Execute" and "Completeness of Vision". (Gartner)Gartner's research methodology page: Magic Quadrant, Critical Capabilities and Market Coverage — covers how vendors are evaluated and what the four quadrants (Leaders, Challengers, Visionaries, Niche Players) mean. (Gartner)Additional explanatory article: "What is Gartner's Magic Quadrant and why does it matter?" — by AmericanEagle.com Insights: Link (Americaneagle.com) Recommended Further Listening / Reading Webinar: "The Gartner Cybersecurity Outlook for Midsize Enterprises" hosted by Paul Furtado. A helpful session for listeners who want leadership-level views on cyber risk in mid-sized enterprises. (Gartner)Research note: "How markets and vendors are evaluated in Gartner Magic Quadrants" (March 2024) — useful for understanding the behind-the-scenes of how Gartner constructs these analyses. (Gartner) Suggested "Next Steps" for Listeners Visit Paul Furtado's Gartner Expert profile and follow his commentary on cybersecurity trends.Explore Gartner's Magic Quadrant methodology so you understand how vendor evaluations work (especially useful in your job, budget planning, vendor selection).Reflect on your organization: Where would you place your internal tech or security vendors? Are you focusing just on "Leaders", or considering "Challengers", "Visionaries", or "Niche Players" based on your specific needs? (This aligns with what we discussed in the episode.)
    Show More Show Less
    1 hr and 12 mins
  • S4 - Episode 012 – Zero Trust, Zero Confusion (w/ Rob Allen)
    Oct 15 2025
    In this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust. With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust architecture, this episode gives you the insights and practical takeaways you need — without the confusion. Expect real talk, real strategies, and a fresh perspective on building a more secure future. Don't miss this chance to learn from one of the industry's most experienced leaders in cybersecurity, cloud infrastructure, and customer-driven solutions. Zero Trust doesn't have to be complicated. Let's make it make sense. Helpful Links: Here are several high‑quality resources to deepen your understanding of Zero Trust, along with the official web links for ThreatLocker and Rob Allen's LinkedIn profile: 🔗 Official Links ThreatLocker (official website / resource center) https://www.threatlocker.com/ (ThreatLocker)Rob Allen — LinkedIn https://www.linkedin.com/in/threatlockerrob/ (Phillip Wylie) ThreatLocker Resource Center (blogs, eBooks, webinars, case studies) https://www.threatlocker.com/resources (ThreatLocker) 📚 Additional Learning Resources on Zero Trust Here are several authoritative and practical learning resources to help your listeners (or you) get up to speed on Zero Trust architectures, strategies, and implementation: Resource What You'll Learn / Why It's Useful Link Microsoft Learn: Introduction to Zero Trust Fundamental concepts and principles of Zero Trust https://learn.microsoft.com/en-us/training/modules/zero-trust-introduction/ (Microsoft Learn) Microsoft Learn: Introduction to Zero Trust and Best Practice Frameworks How Zero Trust fits into security frameworks and architectural patterns https://learn.microsoft.com/en-us/training/modules/introduction-zero-trust-best-practice-frameworks/ (Microsoft Learn) Microsoft Learn: Protect Infrastructure with Zero Trust A module focusing on applying Zero Trust in infrastructure & server environments https://learn.microsoft.com/en-us/training/modules/zero-trust-infrastructure/ (Microsoft Learn) Microsoft Learn: Manage Networks with Zero Trust Zero Trust applied to network segmentation, traffic flows, threat protection https://learn.microsoft.com/en-us/training/modules/zero-trust-networks/ (Microsoft Learn) Microsoft Learn: Protect Data with Zero Trust Emphasis on data protection, classification, and Zero Trust data access patterns https://learn.microsoft.com/en-us/training/modules/zero-trust-data/ (Microsoft Learn) Microsoft Learn path: Establish the guiding principles and core components of Zero Trust A full learning path covering identity, endpoints, apps, network, infrastructure, and data https://learn.microsoft.com/en-us/training/paths/zero-trust-principles/ (Microsoft Learn) LinkedIn Learning: Understanding Zero Trust A beginner-friendly video course explaining Zero Trust models and problem framing https://www.linkedin.com/learning/understanding-zero-trust (LinkedIn) Udemy: Zero Trust Security Masterclass – Beginner to Mastery A hands-on, implementation-oriented course (paid) https://www.udemy.com/course/zero-trust-masterclass-from-beginner-to-mastery/ (Udemy) Cisco Zero Trust Workshops Hands‑on and strategic workshops from a major vendor's perspective https://www.cisco.com/c/en/us/products/security/zero-trust-workshops.html (Cisco) Tonex Training: Zero Trust Security Model Training A structured training course in Zero Trust fundamentals and use cases https://www.tonex.com/training-courses/zero-trust-security-model/ (Tonex)
    Show More Show Less
    1 hr and 10 mins
  • S4 - Episode 011 – Faith, Fire, and Frameworks (w/ Gaelle Koanda)
    Oct 6 2025

    Today's guest is a true force in cybersecurity, governance, and leadership. She's a global voice for resilience, inclusion, and innovation — and her story is as inspiring as it is impactful.

    In this episode, we were thrilled to be joined by Gaelle Koanda — a Cybersecurity and GRC powerhouse, ISACA Board Member, AI Ethics Advocate, Entrepreneur, and Nonprofit Leader. From IT audits to executive boardrooms, Gaelle has carved a path defined by grit, grace, and growth. She's the Founder and President of the very first WiCyS chapters in Francophone Africa, and currently serves as the SheLeadsTech Ambassador for Colorado — building bridges across continents and empowering women in tech at every step.

    Her career is a masterclass in purpose-driven leadership — and today, we're going to explore her journey, her insights on cybersecurity risk and governance, her thoughts on ethical AI, and her mission to uplift others through community, advocacy, and bold action.

    Join us for an awesome discussion on Gaelle's path into cybersecurity and beyond!

    🔗 Related Links

    • Gaelle Koanda — LinkedIn profile LinkedIn
    • Gaelle Koanda — ISSA speaker page ISSA International
    • "How I Survive Imposter Syndrome" (guest-written for ISACA) ISACA
    • WiCyS (Women in Cybersecurity) — "Hacking the glass ceiling" article WiCyS
    • WiCyS organization / about page WiCyS
    • YouTube: "Never Give Up: Gaelle Koanda's Inspiring Path to Success" YouTube
    Show More Show Less
    1 hr and 21 mins
  • S4 - Episode 010 – The Making of I AM MACHINE – w/Chris Glanden & Len Noe
    Sep 12 2025
    Description: In this compelling episode of the Cyber Distortion Podcast, hosts Jason sits down with the extraordinary trio behind the groundbreaking documentary I AM MACHINE — a deep dive into the life and mission of transhuman white hat hacker, Len Noe. Known for merging biology with embedded technology, Len's journey into transhumanism is as provocative as it is visionary. He uses his cybernetic implants not only to push the boundaries of human capability but also as a powerful tool to demonstrate vulnerabilities in both physical and digital security systems. From real-world pen tests to live hacking demos, Len's ethical hacking blurs the line between man and machine — all in the name of education and awareness. Joining the conversation is director Chris Glanden from Barcode Security, who provides insight into the creative vision behind the documentary and how the concept was brought to life. Kevin, who also served as the film's editor, gets put in the hot seat by Jason to share his unique perspective on shaping the story from raw footage to finished film. Together, the team explores the challenges, inspirations, and revelations involved in documenting such a futuristic and deeply personal subject. Whether you're fascinated by transhumanism, cybersecurity, or the art of storytelling, this episode unpacks the making of I AM MACHINE from concept to screen — and everything in between. Here are several good resources for listeners to learn more about embedded technology, ethical hacking, and to visit the sites you mentioned. I've grouped them by topic so you can explore what interests you most: 🔌 Embedded Technology Resources TI Developer Zone – Embedded Development Texas Instruments provides hardware + software development tools, demos, software libraries & example projects to help developers get started with embedded systems. (Texas Instruments) Embedded.com – Hands‑On Experience Articles, webinars, and practical labs for embedded tech, sensors, microcontroller work – great for seeing how embedded software and hardware interact in real world applications. (Embedded)Embedded Artistry – Resources A curated set of articles, tutorials, libraries, podcasts, and community content for both beginners and those with more experience. Offers insight into best practices, architectures, hardware/software integration. (Embedded Artistry) STMicroelectronics IoT / Embedded ML Platform Free educational resources around embedded systems + machine learning, helping bridge the gap between raw hardware and AI / intelligent embedded systems. (STMicroelectronics)"Awesome Embedded" (Adafruit's curated list) A big collection of blogs, code, tools, designs, hardware boards, etc., all focused around embedded systems & related tech. (blog.adafruit.com) 🛡 Ethical Hacking / Cybersecurity Resources TryHackMe A platform with guided, hands‑on labs for ethical hacking, useful for beginners and intermediate learners. Offers real‑world style challenges. (slickhacker.com)Hack The Box (HTB) More advanced penetration‑testing style labs and "boxes" that you can hack in a safe environment. Great for up‑skilling. (slickhacker.com)OWASP (Open Web Application Security Project) Very well‑regarded project that publishes tools, frameworks, cheat‑sheets, open source projects (e.g. WebGoat, Juice Shop) and guidance on securing web apps. (slickhacker.com)GitHub — "Awesome Ethical Hacking Resources" repos Repositories like vadymurupa/ethical‑hacking‑resources or hassnainfareed/awesome‑ethical‑hacking‑resources gather lists of books, courses, vulnerable machines, tools, write‑ups, etc. (GitHub) Cyberly Tutorials, guides, and free content on cybersecurity, ethical hacking, privacy, and emerging threats. Great for self‑paced learners. (cyberly.org) 🌐 Websites You Should Definitely Visit I AM MACHINE — https://i‑am‑machine.com The official website for the documentary. Includes information about Len Noe, embedded tech, screenings, news, trailer, etc. (assumed from context).Cyber Circus Network — https://www.cybercircusnetwork.com The network behind Cyber Distortion Podcast and related content. Good place to get more episodes, background, community, and related materials.
    Show More Show Less
    1 hr and 15 mins
  • S4 - Episode 009 – Codewaves Rising – Surfing Latin Americas Talent Tide (w/ Roger Einstoss)
    Aug 7 2025

    Description:

    🎙️ New Episode Alert – Cyber Distortion Podcast 🚨
    Welcome back! In this episode we're diving deep into one of the most pressing challenges in cybersecurity: finding the right talent. Join us for an eye-opening conversation with Roger Einstoss, co-founder of Braintly, a company revolutionizing how organizations source cybersecurity professionals from across Latin America. With decades of experience and a sharp eye for global tech talent, Roger shares insider knowledge on tapping into thriving hubs like Argentina, Brazil, and beyond.

    We explore how Latin America is rapidly emerging as a hotbed for skilled cybersecurity professionals—and why North American companies are increasingly turning south of the border for outsourced expertise. Roger walks us through Braintly's unique approach to vetting and placing top-tier talent, the challenges companies face in scaling their security teams, and why understanding cultural fit is just as crucial as technical skills.

    Whether you're a CISO looking to grow your team, a tech leader exploring nearshoring options, or simply curious about the evolving cybersecurity workforce, this episode delivers both practical insights and global perspective. Roger's passion for empowering Latin American professionals and building cross-border partnerships is not only inspiring—it's exactly what the cybersecurity industry needs right now.

    🔗 Don't miss this one—subscribe now and tune in to the Cyber Distortion Podcast on your favorite platform.

    Connect with Roger here: LinkedIn – Roger Einstoss

    🎧 Featured Guest: Roger Einstoss

    • LinkedIn: https://www.linkedin.com/in/rogereinstoss
    • Twitter/X: (Not publicly listed, but you can search or ask Roger directly)
    • Company Website (Braintly): https://www.braintly.com
    • Braintly on LinkedIn: https://www.linkedin.com/company/braintly

    🌎 Explore Braintly

    Braintly helps companies worldwide connect with top-tier tech and cybersecurity talent across Latin America.

    • 🌐 Homepage: https://www.braintly.com
    • 🔍 Services Overview: https://www.braintly.com#services
    • 📩 Contact Braintly: https://www.braintly.com#contact
    • 📘 Braintly Blog (if available): (Currently no blog listed on homepage—check for updates)

    🧠 Learn More: Latin America's Cybersecurity Talent Landscape

    Here are some external resources you can reference or share to expand on the discussion:

    • 📈 "Why Latin America is the Next Frontier for Tech Talent" – TechCrunch
      https://techcrunch.com/2021/08/24/latin-america-tech-talent
    • 📊 "Cybersecurity Workforce Study" – (ISC)² 2024
      https://www.isc2.org/Research/Workforce-Study
    • 🌍 "Nearshore Outsourcing Trends in 2025" – Nearshore Americas
      https://nearshoreamericas.com
    • 🗺️ "Top Tech Hubs in Latin America: Argentina, Brazil, Mexico" – Globalization Partners
      https://www.globalization-partners.com/blog/tech-hubs-latin-america
    Show More Show Less
    1 hr and 2 mins