In highschool, they took my internet access away on my account so i made a kernel level bootloader that would bypass the schools login system and would boot the native windows xp at the time. I was better at c++ than the teacher and often times i was just sitting in class playing counter strike 1.6. I found a vulnerability in the schools CISCO network and how it was tied in to AERIES software that the teachers used to keep grades. There was a default login and password that would allow me to get passed the firewall and into the actual login page. The school computer lab had a program that was essentially a key logger that would log the students typing assignments to judge accuracy of the students typing. I Found the master cd copy of that program with the master license one day and cloned it. I went and installed that program on the economics teachers pc and waited for him to login to ARIES. I logged in and changed everyones grades in ARIES and then logged into his user account wich as admin for the network and i turned my interent access back on and gave myself admin privelages. I only got caught because i was playing counter strike in class one day on the schools video editing pc and i was the only one who could have done it. I was young and stupid. I didnt get to graduate on stage and I lost my college scholarship because of it. I gave up programming and went to college for chemistry. I probably would have gotten in real trouble had i not matured and gave that stuff up.
Wtf I just freaked out reading this. This story is creepily similar to something I did And I also gave up programming and went to college for chemistry. Wtf
@@brenndandeffendall6211 thank you for your reply, I've been doing the Advent of cyber which has been super fun after spending about 10 months teaching myself web development and JavaScript, I'll check out the guardian group forsure
When I first stumbled upon this channel I was like "yeah what is this gonna do for me when I listen to the podcast every other week" but man you put out so many banger episodes like this that are well worth listening again to. Either they're interesting/suspenseful/entertaining enough on their own or we know things now that put a couple episodes in another context retroactively.
@@Joe60459 I wish I could think of a couple more episodes from the top of my head to illustrate my point but one I can think of instantly is the one with the FBI agent that investigated the bombing of the USS Cole in 2000. The episode ends on the kinda grim, sobering note that if it were not for the unprofessional and (arguably) unnecessary secretive behavior/relationship between the FBI and CIA, the 9/11 perpetrators would have gotten under a lot more scrutiny before they even took flying lessons especially with the information the FBI agent from the episode unearthed). After the 20th anniversary of 9/11 there was a flood of new documentaries, essays, analyses and to me it is shocking how close the authorities actually were and how the new information corroborates what the agent in the episode tells. Makes the episode even more bone chilling and what happened seems to be in fact as grim and sobering as the FBI agent's retelling implied.
These episodes/stories are fantastic to listen to. Reminds me of early 70's Documentaries and interviews....but....This guy believe it or not is better. He expands beyond the content and establishes a base layer, then delves deeper.
i had a nightmare the other night that quantum computers had finally cracked all encryption and all the bad actors had sprung into action decrypting all the encrypted data they had collected and stored for years
New TEMPEST exploits are being found all the time, the other week I was reading about malware that used the sata cables as a rf transmitter to pipe out.
This is just silly. It doesn't even make sense on a practical level. You've never been coerced by the NSA to do anything in your entire life. You never will. You'll probably never interact with them in any way. I know it's fun to imagine that you are some oppressed freedom fighter, but you aren't. You're a citizen in a democratic country with remarkably low corruption.
TEMPEST (transient electroMagnetic pulse emanation surveillance technology) was a surveillance tech that could sniff the data sent over a vga cable to a targets monitor from hundreds of feet away. If the target has a vga cable without ferrite beads on the ends, these signals are incredibly strong. The system just amplified the signal and displayed it on the viewers screen where they could sit and watch from a van down the block (with a directional antenna aimed at the intended target).
Certain groups really need both isolated internal networks with physical transfer of information, and also some completely invisible hardware logging tools. Also you should use linguistic analysis, and look for many unrelated clues to find a common trend to defeat diversion tactics.
The last couple of years prior to my seperation/retirement from the Gov., CISO was implemented. In a nutshell, a low leverl hacker could negotiate and or hack the system and eventually, IOT's assistance or corrective action was ZERO.
I'm sure a lot of the hardware and software they've made is fairly impressive. But breaking into a targets hotel room, especially when they have complete clearance to do so, I mean it's pretty easy when you have that kind of power. At that point, the tools create themselves.
I listen to this on Google Podcasts when showering. There's soooooo much more on here. OMG this is so great. Thank you so much Jack! Subbed, Liked, and Shared up!
Thank you. I remember well when the NSA was offering over one million for the return of a specific hacking tool. It could also have been a trick to catch the hackers. Never found out the end result
If event logs can be edit, then you can change events to point to someone else hacking in the system. Notice I didn't say "researching" the system. because let's be fair here "researchers" are hackers. If someone is researching exploits, they're hacking.
Wow, not too far fetched of an idea to think this Jack guy is still working for nsa as a sheep dipped agent. Can’t think of a better way to gain access to highly sensitive equipment than a security consultant. Jeez, even the company name is suspicious - rendition security. One thing comes to mind for me is the rendition torture sites used by the us gov around the world. Scary stuff. Too bad the host didn’t bring this angle up.
It certainly wouldn't be unheard of. It is well known that many of the deep state agencies pay influencers to move the publics opinión on the governments overreach.
Yeah, and then just take anything the former NSA guy writes/says as possible disinformation. Possible false flag. Look at the targeting of Russia by mainstream media, especially since invasion of Ukraine.
Your wrap up at the end of this episode should have been at the start,, it would have helped clarify some issues. Thanks again for all your hard work!!!
How is it 2023 and the public has never seen wireless VGA or HDMI. How come we're always 10-20 years behind the government, Im tired of it. Intel WiDi and MIRACAST (basically just WiFi direct) doesn't cut it.
Why would a nation state act like this to begin with? Those tools were much more valuable kept quiet & used than to tell everyone they exist & have been compromised. Any intelligence agency would give their right arm for those sort of tools. It makes me think there is much more to the story than we know.
Ever wondered if we're just super advanced Ai with a written script back at the point of creating basic Ai? Or maybe think of yourself as a tiny part of the big mechanism. The corruptible parts within are the same all the way up the chain.
I've thought for a LONG time that Snowden was a limited hangout, chosen for the role, and might be a double agent in Russia. Some of the tech make not even exist, but is designed to make Russia and China think they do.
I came to a similar conclusion based on geopolitical insight and human motivation. I doubt the NSA data dump was done by any foreign (un)official state program. Most state groups would study and backward engineer those NSA tools and keep it quiet as to not allow those tools to lose their viability. No this feels like an internal leaker or psy-op/recruitment activator. Those two things aren't mutually exclusive either. You could dump data in the form of hacking tools to invigorate new people into wanting to learn more and use those tools. This then turns up (in)voluntary recruitment into agencies which are in need of fresh potential. Money obviously wasn't the goal despite what they may have said, applying false motivation is classic misdirection. That's also why it's obviously not a state actor, auctions for Intel like this go on in back rooms, embassies, and secure channels. Not in public, unless the goal is to humiliate. If humiliation was the goal it would have blown up, but this died down and has so far gone back into the shadows. For now anyways.
This is true fuzzbunch exploits still in use, since most companies around the world are using outdated os like xp,7, sever 2008 but it's in their internal network 🤫
What if the equation released the tools as a way to publicly hack certain groups while giving cover by claiming those tools were used by an "opposition" group?
NSA does not need to search for weaknesses and/or zero day attacks, or any vulnerabities. If that take place they will be steps back from their ennemies. If you want to be "offensive" you must know about weaknesses months before new program releases/updates/upgrades take place
They also use their massive data files of us. Our voice from listening every day. Then use A.I. to say whatever they want us to say. Then prosecute us for crimes that we never did.
As always Jack, great episode broheim. Now, we can sit here and blame the Russians and any other nation state that have these capabilities all we want OR we can look within 😬
The thing I don't get about the NSA catalog is why they put all the eggs in one basket. If you have a retirement account, you don't allow direct access; you open another account and transfer money as needed. And this is after knowing that the NSA has lost tera bits of information. The narrative just does not seem 100% true.
Totally agree. And this guest was so sus. He did not say ONE thing definitive--- Half of us thought it was this, the other half thought it was that, and I was thinking it might be, or might not be.. but that is the most I can say without saying for sure either way... I can almost say for sure that I think they were not just guessing... blah, blah, blah. What a load of shit.
43:30 Another problem: NSA is using the same software (Microsoft Windows) with the same vulnerabilities. The enemy may find out about these vulnerabilities and use them against NSA and against other US government agencies and US private companies.
My guess is that they are 3 people all men or possibly 1 woman in the group. One of them works or worked at the NSA it would have to be someone who had the minimal clearance needed for the ANT catalougue. Wouldve quit about 6 to 8 months after the 2017 leak to avoid suspicion. Most likely someone with talent but never recognized or always passed over for promotion.
"why not indict the officers or generals or the leaders who signed the executive order?" 4D chess isn't so impressive when the players hands are all under the table making deals with each other. nation states are just what the plebs see. in reality there are a small number of players creating a system for the rest of us.
@Vera Mae ma'am, I'm sorry. I don't usually give out such sensitive information to people I'm not formally acquainted with. Now, if you're wondering what is in my background to support my previous statement, I would say I have two eyes to see and a pair of ears. That should be all anyone needs to notice the obvious duplicity of our leadership class where they're all working for more control over you and me.
Of course they can be made for way cheaper, especially since there have been advancements in tech since 2009. But if I'm the contracted company that's manufacturing these in secret? You bet I'm going to milk that contract for all it's worth.
If the Shadow Brokers hacking group worked on behalf of a nation-state wouldn't it behoove said nation-state to keep the hacker's findings (hacking tools, malware, etc.) a secret and use those tools found for their own clandestine hacking abilities?
Yeah it's as if someone wanted to blame a feign entity. The bad grammar is funny for many reasons. A. It keeps you from sounding like yourself B. Everyone knows about Google but state agencies have specialized interpreters. Preying on ignorance is an Intel agency tactic. This smells like psy-op/recruitment material. Purposefully leak dated tools to invigorate new blood to test and learn to hack. It may be they have backdoors and scripts embedded in the tools themselves, leaking the info or location of the person using them. This turns up (in)voluntary recruitment into the intelligence field. I'm sure this has to be an inside job either (un)officially. Windows response was way too fast. Microsoft must have had a fix for the NSAs exploit ahead of time and intentionally left the vulnerability intact. Thats my take anyway.
pay attention to how the guest uses their words and avoids proper nouns often. he knows how algorithms can find and enumerate the things you say and associate them with your global "profile"
Interesting when one of their own is really worried about what the government gonna do... Also, why is he so worried about people and clients? I haven't heard of marines fearing that people would know. So it sems like NSA doesn't think of themselves as a heroes serving US citizens and that they see people as enemy.
USB keyloggers aren't available commercially today? Ever been to Hak5? That's just one place that sells a USB implant similar to the one described.. and they're not even close to $20k..
They weren't stolen. They were caught using them by the EU, and the treaty signed had them sell them. If you use those tools its like theft of government property and your subject to their wireless eavesdropping warrantless search.
A lot of servers still have VGA ports installed now as we go into the year 2023. Dell's rack servers have VGA+USB on the front behind the security grill.
Man, this is technology that has been around for decades. A USB stick that can monitor network and computer traffic? Still not public? Really? Hak5 has the USB rubber ducky, sharkjack, you a LAN turtle, which clones monitors. Come on dude.
I have a problem with Chromium being vulnerable to some sort of exploit. It started late last year. When I switched to Firefox, it didn't happen (but I don't like Firefox as much), so I switched back and it's happening again.
In highschool, they took my internet access away on my account so i made a kernel level bootloader that would bypass the schools login system and would boot the native windows xp at the time. I was better at c++ than the teacher and often times i was just sitting in class playing counter strike 1.6. I found a vulnerability in the schools CISCO network and how it was tied in to AERIES software that the teachers used to keep grades. There was a default login and password that would allow me to get passed the firewall and into the actual login page. The school computer lab had a program that was essentially a key logger that would log the students typing assignments to judge accuracy of the students typing. I Found the master cd copy of that program with the master license one day and cloned it. I went and installed that program on the economics teachers pc and waited for him to login to ARIES. I logged in and changed everyones grades in ARIES and then logged into his user account wich as admin for the network and i turned my interent access back on and gave myself admin privelages. I only got caught because i was playing counter strike in class one day on the schools video editing pc and i was the only one who could have done it. I was young and stupid. I didnt get to graduate on stage and I lost my college scholarship because of it. I gave up programming and went to college for chemistry. I probably would have gotten in real trouble had i not matured and gave that stuff up.
I love your story, hope everything worked out for you
Why did you not go to school if you could do all that?
Man everything came out because you played too much. Sad that you didnt study cs.
Those skills will come in handy when they turn off your digital money once the social credit score system hits.
Wtf I just freaked out reading this. This story is creepily similar to something I did
And I also gave up programming and went to college for chemistry.
Wtf
The person who deserves real recognition is whoevers in charge of naming the NSA's tools. Deity bounce? Fkn awesome
It is a program, that gives random name (but they often use more than one try)
@@schwingedeshaehers That's classified. You've said too much.
@@theRPGmaster it is at least public since Edward Snowden wrote it in his book.
@@schwingedeshaehers public dosent mean de-classafied, please report to your nearest ODNI office for apprehension and impreseanmeant.
@@famousartguymeme where do I find it? Do you take the cost to get there? Can I get immunity when entering the USA?
Doing my coding final and saw this pop up. I did my first CTF this year. I have learned alot from this channel. Thank you for the community.
How was your first CTF? What have you been using to learn?
Same lol
im in the same situation, doing my final paper on cyberattacks, hacking and security
@@brenndandeffendall6211 thank you for your reply, I've been doing the Advent of cyber which has been super fun after spending about 10 months teaching myself web development and JavaScript, I'll check out the guardian group forsure
@@Ataraxia_Atom you’ll like John Hammond. Just search that name on UA-cam :)
Your podcast is music to my ears , don't ever stop this series FREAKING "NEVER"
Your a true hacker
When I first stumbled upon this channel I was like "yeah what is this gonna do for me when I listen to the podcast every other week" but man you put out so many banger episodes like this that are well worth listening again to. Either they're interesting/suspenseful/entertaining enough on their own or we know things now that put a couple episodes in another context retroactively.
What episodes are you referring to that the perspective changed on?
@@Joe60459 I wish I could think of a couple more episodes from the top of my head to illustrate my point but one I can think of instantly is the one with the FBI agent that investigated the bombing of the USS Cole in 2000. The episode ends on the kinda grim, sobering note that if it were not for the unprofessional and (arguably) unnecessary secretive behavior/relationship between the FBI and CIA, the 9/11 perpetrators would have gotten under a lot more scrutiny before they even took flying lessons especially with the information the FBI agent from the episode unearthed). After the 20th anniversary of 9/11 there was a flood of new documentaries, essays, analyses and to me it is shocking how close the authorities actually were and how the new information corroborates what the agent in the episode tells. Makes the episode even more bone chilling and what happened seems to be in fact as grim and sobering as the FBI agent's retelling implied.
Same. Ended up binge listening lmao
Myself can't believe i just found this channel. Been listening to the podcast for years. Why haven't I found this before.
16:00
_Resend/rescind the message. We have the capacity to do it..._ Yep, that sound like Biden.
These episodes/stories are fantastic to listen to. Reminds me of early 70's Documentaries and interviews....but....This guy believe it or not is better. He expands beyond the content and establishes a base layer, then delves deeper.
People need to understand that literally the only difference between a government and a street gang is membership numbers.
The difference between a State and a criminal gang is that the State is the gang that won
Ok let's go with having no government because anarchy would be fun
Nope
No it’s being on the right side of the law lol. Those who make the rules. Break the rules.
@@johnrodgers2171 yes
I’m going to have to tip my hat. Absolutely brilliant stuff. A lot of this is 100% unavoidable.
anyone who thinks the NSA isn’t on the offensive is insane. Cmon, we all know the best defense is offense…
Of course they are war of tomorrow will be drones vs drones & taking over the network / hijacking those drones...
Thanks Patriot Act!
I don't consider them on the side of the us citizens that's for sure
I bet they are offended. Those losers.
Best offense is defense.
Never correct your enemies when they are making a mistake 😊
This is the second best pod I've picked up this year. Binged every ep over the last few week. Great work, Jack. Keep it up!
What's the other one (please) ?
@@johnstuckaiii Hehe. Conan Needs A Friend.
Sounds like the old Get Smart joke...
@@johnstuckaiii A man of culture
i had a nightmare the other night that quantum computers had finally cracked all encryption and all the bad actors had sprung into action decrypting all the encrypted data they had collected and stored for years
Fuck man interesting?
Eventually that's what gonna happen or it already has happend it's just a matter of timing when all the nukes launch
New TEMPEST exploits are being found all the time, the other week I was reading about malware that used the sata cables as a rf transmitter to pipe out.
0:05 " . . . one such news story I SAW, was some security news I HEARD . . ."
Yeah I was like wtf lol
Oh no you were right the first time. the NSA certainly sees every single member of the public as their enemy.
This is just silly. It doesn't even make sense on a practical level. You've never been coerced by the NSA to do anything in your entire life. You never will. You'll probably never interact with them in any way. I know it's fun to imagine that you are some oppressed freedom fighter, but you aren't. You're a citizen in a democratic country with remarkably low corruption.
Wow I remember manipulating pretend logs as a kid in the Uplink game. Little did I know that would someday be possible!
Always Christmas, when a new episode drops. Keep up the great work Jack!
I came here a year later to listen again. My favourite podcast ever, I think.
Got lucky, and caught a deal on the whole set of NSA tools on markdown day at Goodwill.
You funny.
Went to my first B-Sides! Thanks Jack for letting me know about them!
TEMPEST (transient electroMagnetic pulse emanation surveillance technology) was a surveillance tech that could sniff the data sent over a vga cable to a targets monitor from hundreds of feet away. If the target has a vga cable without ferrite beads on the ends, these signals are incredibly strong. The system just amplified the signal and displayed it on the viewers screen where they could sit and watch from a van down the block (with a directional antenna aimed at the intended target).
The majority of Government doesn't prevent attacks. They sit by as they happen and swoop in to point the finger at who did it. In my opinion
kinda reminds me that ww2 an attack message was intercepted before pearl harbor was bomb so they can announce retaliation
Better than not knowing. Like now. Hee hee hee.
I love to make vapid guesses based on nothing but anti-establishment word association. In my opinion.
New to the channel and am absolutely loving it! I’m definitely learning a lot too as I have no computer nerd skills to speak of but I’m learning! 🤙
Just tumbled randomly upon the channel and i got to say, i love this
Certain groups really need both isolated internal networks with physical transfer of information, and also some completely invisible hardware logging tools. Also you should use linguistic analysis, and look for many unrelated clues to find a common trend to defeat diversion tactics.
Good to mention that ALL chinese vendors have been doing this to all hardware coming from China, ALL OF THEM.
Source? I don't believe anything without some kind of credentials anymore.
Retired librarian
P.S. Although I do believe this because -- China.
@@veramae4098 silly use some common sense
@@19801981ification yeah, the "common sense" of low educated , low IQ peoples.
you have very low education, right?
God! I can't believe the rate at which you upload such quality
It's awsome, i'v binge watch all of his work so fast and he's still able to provide more exciting testimonies
My 2022 crush for sure
Thanks Jack, pls can you share a link to the Advance Network Tools catalogue. Will like to read more on that
The last couple of years prior to my seperation/retirement from the Gov., CISO was implemented. In a nutshell, a low leverl hacker could negotiate and or hack the system and eventually, IOT's assistance or corrective action was ZERO.
Oh, Jachary. Outstanding content. Thank you, dude. 😊
I'm sure a lot of the hardware and software they've made is fairly impressive. But breaking into a targets hotel room, especially when they have complete clearance to do so, I mean it's pretty easy when you have that kind of power. At that point, the tools create themselves.
I listen to this on Google Podcasts when showering. There's soooooo much more on here. OMG this is so great. Thank you so much Jack! Subbed, Liked, and Shared up!
This podcast is fantastic. I’ve learned so much!
All these hacks seem to make computer networks useless 😐
Thank you. I remember well when the NSA was offering over one million for the return of a specific hacking tool. It could also have been a trick to catch the hackers. Never found out the end result
Prob both
@@Arbiter710 Probably but the one, or ones that stole it would not be that stupid to return it
@@herbert5491 I doubt they stole it, this smells like an Edward Snowden Russia dry up… this was the last bit they could get till they sucked him dry
If event logs can be edit, then you can change events to point to someone else hacking in the system.
Notice I didn't say "researching" the system. because let's be fair here "researchers" are hackers. If someone is researching exploits, they're hacking.
*cough* YOU KNOW NOTHING!
Wow, not too far fetched of an idea to think this Jack guy is still working for nsa as a sheep dipped agent. Can’t think of a better way to gain access to highly sensitive equipment than a security consultant. Jeez, even the company name is suspicious - rendition security. One thing comes to mind for me is the rendition torture sites used by the us gov around the world. Scary stuff. Too bad the host didn’t bring this angle up.
Car telll
He didn't bring it up because hes trying to suck nuts to get in the club. I mean hes pushing russiagate bullshit.
It certainly wouldn't be unheard of. It is well known that many of the deep state agencies pay influencers to move the publics opinión on the governments overreach.
lol yeah. "let me just patch this router for you"....
Yeah, and then just take anything the former NSA guy writes/says as possible disinformation. Possible false flag. Look at the targeting of Russia by mainstream media, especially since invasion of Ukraine.
How did Martin only get nine years? How did the FBI or why did the FBI not read Harold his rights during his initial arrest and confession?
One of the best podcast ever. Keep it up!
Your wrap up at the end of this episode should have been at the start,, it would have helped clarify some issues. Thanks again for all your hard work!!!
How is it 2023 and the public has never seen wireless VGA or HDMI. How come we're always 10-20 years behind the government, Im tired of it. Intel WiDi and MIRACAST (basically just WiFi direct) doesn't cut it.
The teradek ace has been around for years, it's just really expensive.
These tools are now available to the public
This was a good one. Super relatable too.. Keep it up!
You know it's bad when his first concern was what is the USA government going to do..... What type of world are we living in people??? WAKE UP
“infosec dumpster fire putter-outer” 😂😂
Why would a nation state act like this to begin with? Those tools were much more valuable kept quiet & used than to tell everyone they exist & have been compromised. Any intelligence agency would give their right arm for those sort of tools. It makes me think there is much more to the story than we know.
Ever wondered if we're just super advanced Ai with a written script back at the point of creating basic Ai? Or maybe think of yourself as a tiny part of the big mechanism. The corruptible parts within are the same all the way up the chain.
I've thought for a LONG time that Snowden was a limited hangout, chosen for the role, and might be a double agent in Russia.
Some of the tech make not even exist, but is designed to make Russia and China think they do.
I came to a similar conclusion based on geopolitical insight and human motivation. I doubt the NSA data dump was done by any foreign (un)official state program. Most state groups would study and backward engineer those NSA tools and keep it quiet as to not allow those tools to lose their viability. No this feels like an internal leaker or psy-op/recruitment activator. Those two things aren't mutually exclusive either.
You could dump data in the form of hacking tools to invigorate new people into wanting to learn more and use those tools. This then turns up (in)voluntary recruitment into agencies which are in need of fresh potential.
Money obviously wasn't the goal despite what they may have said, applying false motivation is classic misdirection. That's also why it's obviously not a state actor, auctions for Intel like this go on in back rooms, embassies, and secure channels. Not in public, unless the goal is to humiliate. If humiliation was the goal it would have blown up, but this died down and has so far gone back into the shadows. For now anyways.
This is true fuzzbunch exploits still in use, since most companies around the world are using outdated os like xp,7, sever 2008 but it's in their internal network 🤫
shadow brokers would be watching this video for sure🤣
😂😂
considering he worked for the NSA and the brokers implied he was part of the Q group, that should tell people a lot!
'Rendition' Security. 😂
I like this guy already.
What if the equation released the tools as a way to publicly hack certain groups while giving cover by claiming those tools were used by an "opposition" group?
True
That does not explain why they are terrorizing me with it I've done nothing to no one
I have been awful about 👍 all these amazing interviews. Shucks...guess i just have to watch them all again.
Love this stuff. Keep 'em coming.
In a top tier category? Nah! They are the top tier! Fictional levels of legendary! The stuff you only see in movies! This is awesomeness in carnate!
NSA does not need to search for weaknesses and/or zero day attacks, or any vulnerabities. If that take place they will be steps back from their ennemies. If you want to be "offensive" you must know about weaknesses months before new program releases/updates/upgrades take place
They are involved with MS, apple, Samsung etc . remember when they opened that i phone?
Dirty grandpa. Prerty spot on. We should've listened to them.....
Almost like you're the easily manipulated target they had in mind.
This is the #1 argument against governments wanting backdoors, like the apple phone encryption and end-to-end messengers
Pegasus and Spyware technologies can use voice technology attacking its victims with warfare technologies
They also use their massive data files of us. Our voice from listening every day. Then use A.I. to say whatever they want us to say. Then prosecute us for crimes that we never did.
A lot of youtube accounts were created at the end of 2022
This is my fave episode by far. Great stuff man
Man, that signoff... "don't hack like my brother" "and don't hack like my brothet"
As always Jack, great episode broheim. Now, we can sit here and blame the Russians and any other nation state that have these capabilities all we want OR we can look within 😬
On its time I just finish day 6 quest AoC
Let’s just watch this amazing content😍❤❤❤
Cool. Some of this parallels with what I've been reading in Sandworm lately.
Great book 😂
@@sandworm9528 must've really impacted you haha
Alternate title: NSA gets mogged by Shadow Brokers
The thing I don't get about the NSA catalog is why they put all the eggs in one basket. If you have a retirement account, you don't allow direct access; you open another account and transfer money as needed. And this is after knowing that the NSA has lost tera bits of information. The narrative just does not seem 100% true.
Totally agree. And this guest was so sus. He did not say ONE thing definitive--- Half of us thought it was this, the other half thought it was that, and I was thinking it might be, or might not be.. but that is the most I can say without saying for sure either way... I can almost say for sure that I think they were not just guessing... blah, blah, blah. What a load of shit.
at 1:51 You described an OMG cable... you have been able to buy them for years for a few hundo...
This is crazy content man . Thx wish u more support
43:30 Another problem: NSA is using the same software (Microsoft Windows) with the same vulnerabilities. The enemy may find out about these vulnerabilities and use them against NSA and against other US government agencies and US private companies.
I think this would be ideal at this point. I like the shadow brokerss.
@@alexeilindes7507 why would that be ideal?
Maybe that is how they did it. They used one of the vulnerabilities listed in the NSA catalog and then got the rest.
My guess is that they are 3 people all men or possibly 1 woman in the group. One of them works or worked at the NSA it would have to be someone who had the minimal clearance needed for the ANT catalougue. Wouldve quit about 6 to 8 months after the 2017 leak to avoid suspicion. Most likely someone with talent but never recognized or always passed over for promotion.
could be, but I think it was probably a zero day attack on an attack server with some of the loaded ANT tools, not all of them.. who knows
spy game is much more than just "hacking"
That is true I was aware since a pal told me about how to notice and know that is one of my most interesting life experience
So ragemaster might be what Mr. Robot implied when Darlene attached some physical device to his monitor to grab screenshots etc.
Bro been stuttering and nervous explaining he wouldn’t be surprised if he gets indicted by another country 💀
"why not indict the officers or generals or the leaders who signed the executive order?" 4D chess isn't so impressive when the players hands are all under the table making deals with each other. nation states are just what the plebs see. in reality there are a small number of players creating a system for the rest of us.
What are your credentials?
@Vera Mae ma'am, I'm sorry. I don't usually give out such sensitive information to people I'm not formally acquainted with.
Now, if you're wondering what is in my background to support my previous statement, I would say I have two eyes to see and a pair of ears. That should be all anyone needs to notice the obvious duplicity of our leadership class where they're all working for more control over you and me.
The first thing you talk about, the USB, sounds exactly like hak5 omg cable. Way cheaper than 20,000
Of course they can be made for way cheaper, especially since there have been advancements in tech since 2009. But if I'm the contracted company that's manufacturing these in secret? You bet I'm going to milk that contract for all it's worth.
The name dirty grampa is gonna come back in style
No. Intel agencies don’t “intercept” the hardware to put their firmware on it, they have backdoors in the firmware from the beginning
the technology is available today for public use. you just have to know where to look for it because it is not mainstreamed.
If the Shadow Brokers hacking group worked on behalf of a nation-state wouldn't it behoove said nation-state to keep the hacker's findings (hacking tools, malware, etc.) a secret and use those tools found for their own clandestine hacking abilities?
Yeah it's as if someone wanted to blame a feign entity. The bad grammar is funny for many reasons.
A. It keeps you from sounding like yourself
B. Everyone knows about Google but state agencies have specialized interpreters.
Preying on ignorance is an Intel agency tactic. This smells like psy-op/recruitment material. Purposefully leak dated tools to invigorate new blood to test and learn to hack. It may be they have backdoors and scripts embedded in the tools themselves, leaking the info or location of the person using them. This turns up (in)voluntary recruitment into the intelligence field. I'm sure this has to be an inside job either (un)officially. Windows response was way too fast. Microsoft must have had a fix for the NSAs exploit ahead of time and intentionally left the vulnerability intact. Thats my take anyway.
No. They weren't state-of-the-art tools. They were more valuable as fuel for the conspiratorial brain fire that is currently destroying America.
“Cisco didn’t know” thats bull crap
I just found your channel. It’s bad ass!!!
i remember i've downloaded this archive few years ago. most of them flaged as viruses though.
It was Robert Redford, River Phoenix, Sidney Poitier and Dan Ackroid.
pay attention to how the guest uses their words and avoids proper nouns often. he knows how algorithms can find and enumerate the things you say and associate them with your global "profile"
Vicarious schizophrenia. You hate to see it.
Interesting when one of their own is really worried about what the government gonna do...
Also, why is he so worried about people and clients?
I haven't heard of marines fearing that people would know.
So it sems like NSA doesn't think of themselves as a heroes serving US citizens and that they see people as enemy.
Great episode Jack,... as always
Exactly and he doesn't want the public to know lol
USB keyloggers aren't available commercially today? Ever been to Hak5? That's just one place that sells a USB implant similar to the one described.. and they're not even close to $20k..
I feel like 9 years is not that much for harold
It's someone he worked with. That knows him personally. The broken english is just a throw off.
Thanks Jack!
They weren't stolen. They were caught using them by the EU, and the treaty signed had them sell them. If you use those tools its like theft of government property and your subject to their wireless eavesdropping warrantless search.
Shhh. Thats what they are counting on
@@krotchlickmeugh627 lol i ain't touching some NSA robbing terrorists shit lol.
Some of these tools are readily available for purchase if you know where to find them.
really obvious how the story dances around NSA insider being the shadowbroker(s), Mayne I missed it
When I was young, I ......
Oooh. Someone stole the NSA's playbook.
This is why I loath technology. Absolutely nothing is safe.
Let’s be real man, the last time I had a machine with a VGA port was 2012!
Commercial machines are all about the VGA
A lot of servers still have VGA ports installed now as we go into the year 2023. Dell's rack servers have VGA+USB on the front behind the security grill.
@@saxxonpike Really? Wow.
u would be surprised how many public domains have ancient tech in live environments.
Man, this is technology that has been around for decades. A USB stick that can monitor network and computer traffic? Still not public? Really? Hak5 has the USB rubber ducky, sharkjack, you a LAN turtle, which clones monitors. Come on dude.
I also have a sock at home,but it's dirty one 😂
I have a problem with Chromium being vulnerable to some sort of exploit. It started late last year. When I switched to Firefox, it didn't happen (but I don't like Firefox as much), so I switched back and it's happening again.
Once NSA ... 4eva NSA!