Who Stole the NSA's Top Secret Hacking Tools?🎙Darknet Diaries Ep. 53: Shadow Brokers

Поділитися
Вставка
  • Опубліковано 21 лис 2024

КОМЕНТАРІ • 817

  • @Mp-jw1qg
    @Mp-jw1qg Рік тому +416

    In highschool, they took my internet access away on my account so i made a kernel level bootloader that would bypass the schools login system and would boot the native windows xp at the time. I was better at c++ than the teacher and often times i was just sitting in class playing counter strike 1.6. I found a vulnerability in the schools CISCO network and how it was tied in to AERIES software that the teachers used to keep grades. There was a default login and password that would allow me to get passed the firewall and into the actual login page. The school computer lab had a program that was essentially a key logger that would log the students typing assignments to judge accuracy of the students typing. I Found the master cd copy of that program with the master license one day and cloned it. I went and installed that program on the economics teachers pc and waited for him to login to ARIES. I logged in and changed everyones grades in ARIES and then logged into his user account wich as admin for the network and i turned my interent access back on and gave myself admin privelages. I only got caught because i was playing counter strike in class one day on the schools video editing pc and i was the only one who could have done it. I was young and stupid. I didnt get to graduate on stage and I lost my college scholarship because of it. I gave up programming and went to college for chemistry. I probably would have gotten in real trouble had i not matured and gave that stuff up.

    • @dimi_95
      @dimi_95 Рік тому +26

      I love your story, hope everything worked out for you

    • @laoso8776
      @laoso8776 Рік тому +44

      Why did you not go to school if you could do all that?

    • @paganizonda1000ps
      @paganizonda1000ps Рік тому +36

      Man everything came out because you played too much. Sad that you didnt study cs.

    • @jacksparrow3490
      @jacksparrow3490 Рік тому +54

      Those skills will come in handy when they turn off your digital money once the social credit score system hits.

    • @ihakker1416
      @ihakker1416 Рік тому +34

      Wtf I just freaked out reading this. This story is creepily similar to something I did
      And I also gave up programming and went to college for chemistry.
      Wtf

  • @Ye4rZero
    @Ye4rZero Рік тому +198

    The person who deserves real recognition is whoevers in charge of naming the NSA's tools. Deity bounce? Fkn awesome

    • @schwingedeshaehers
      @schwingedeshaehers Рік тому +16

      It is a program, that gives random name (but they often use more than one try)

    • @theRPGmaster
      @theRPGmaster Рік тому +24

      @@schwingedeshaehers That's classified. You've said too much.

    • @schwingedeshaehers
      @schwingedeshaehers Рік тому +11

      @@theRPGmaster it is at least public since Edward Snowden wrote it in his book.

    • @famousartguymeme
      @famousartguymeme Рік тому +6

      @@schwingedeshaehers public dosent mean de-classafied, please report to your nearest ODNI office for apprehension and impreseanmeant.

    • @schwingedeshaehers
      @schwingedeshaehers Рік тому +6

      @@famousartguymeme where do I find it? Do you take the cost to get there? Can I get immunity when entering the USA?

  • @Yerbah
    @Yerbah Рік тому +322

    Doing my coding final and saw this pop up. I did my first CTF this year. I have learned alot from this channel. Thank you for the community.

    • @Ataraxia_Atom
      @Ataraxia_Atom Рік тому +5

      How was your first CTF? What have you been using to learn?

    • @everythinggaming1536
      @everythinggaming1536 Рік тому

      Same lol

    • @ssimple-4621
      @ssimple-4621 Рік тому

      im in the same situation, doing my final paper on cyberattacks, hacking and security

    • @Ataraxia_Atom
      @Ataraxia_Atom Рік тому +4

      @@brenndandeffendall6211 thank you for your reply, I've been doing the Advent of cyber which has been super fun after spending about 10 months teaching myself web development and JavaScript, I'll check out the guardian group forsure

    • @mossdem
      @mossdem Рік тому +4

      @@Ataraxia_Atom you’ll like John Hammond. Just search that name on UA-cam :)

  • @arupball1505
    @arupball1505 Рік тому +81

    Your podcast is music to my ears , don't ever stop this series FREAKING "NEVER"

  • @captain_hanzo
    @captain_hanzo Рік тому +168

    When I first stumbled upon this channel I was like "yeah what is this gonna do for me when I listen to the podcast every other week" but man you put out so many banger episodes like this that are well worth listening again to. Either they're interesting/suspenseful/entertaining enough on their own or we know things now that put a couple episodes in another context retroactively.

    • @Joe60459
      @Joe60459 Рік тому +2

      What episodes are you referring to that the perspective changed on?

    • @captain_hanzo
      @captain_hanzo Рік тому +3

      @@Joe60459 I wish I could think of a couple more episodes from the top of my head to illustrate my point but one I can think of instantly is the one with the FBI agent that investigated the bombing of the USS Cole in 2000. The episode ends on the kinda grim, sobering note that if it were not for the unprofessional and (arguably) unnecessary secretive behavior/relationship between the FBI and CIA, the 9/11 perpetrators would have gotten under a lot more scrutiny before they even took flying lessons especially with the information the FBI agent from the episode unearthed). After the 20th anniversary of 9/11 there was a flood of new documentaries, essays, analyses and to me it is shocking how close the authorities actually were and how the new information corroborates what the agent in the episode tells. Makes the episode even more bone chilling and what happened seems to be in fact as grim and sobering as the FBI agent's retelling implied.

    • @Rooot-username
      @Rooot-username Рік тому +1

      Same. Ended up binge listening lmao

    • @valkyr1985swe
      @valkyr1985swe Рік тому +3

      Myself can't believe i just found this channel. Been listening to the podcast for years. Why haven't I found this before.

    • @KenSherman
      @KenSherman Рік тому

      16:00
      _Resend/rescind the message. We have the capacity to do it..._ Yep, that sound like Biden.

  • @oldgoat8861
    @oldgoat8861 Рік тому +18

    These episodes/stories are fantastic to listen to. Reminds me of early 70's Documentaries and interviews....but....This guy believe it or not is better. He expands beyond the content and establishes a base layer, then delves deeper.

  • @byron2334
    @byron2334 Рік тому +390

    People need to understand that literally the only difference between a government and a street gang is membership numbers.

    • @playtester6635
      @playtester6635 Рік тому +72

      The difference between a State and a criminal gang is that the State is the gang that won

    • @johnrodgers2171
      @johnrodgers2171 Рік тому +14

      Ok let's go with having no government because anarchy would be fun

    • @jaygin6518
      @jaygin6518 Рік тому +7

      Nope

    • @TwinTurboOnly
      @TwinTurboOnly Рік тому +15

      No it’s being on the right side of the law lol. Those who make the rules. Break the rules.

    • @imt3206
      @imt3206 Рік тому +1

      @@johnrodgers2171 yes

  • @tonyzone8999
    @tonyzone8999 7 місяців тому +2

    I’m going to have to tip my hat. Absolutely brilliant stuff. A lot of this is 100% unavoidable.

  • @horsied
    @horsied Рік тому +202

    anyone who thinks the NSA isn’t on the offensive is insane. Cmon, we all know the best defense is offense…

    • @TomTom-gx1sm
      @TomTom-gx1sm Рік тому

      Of course they are war of tomorrow will be drones vs drones & taking over the network / hijacking those drones...

    • @Electron42
      @Electron42 Рік тому +20

      Thanks Patriot Act!

    • @justcallmetruman
      @justcallmetruman Рік тому +20

      I don't consider them on the side of the us citizens that's for sure

    • @Stopinvadingmyhardware
      @Stopinvadingmyhardware Рік тому

      I bet they are offended. Those losers.

    • @rxsk
      @rxsk Рік тому +1

      Best offense is defense.

  • @bryceburns429
    @bryceburns429 Рік тому +14

    Never correct your enemies when they are making a mistake 😊

  • @vyrenpevo979
    @vyrenpevo979 Рік тому +31

    This is the second best pod I've picked up this year. Binged every ep over the last few week. Great work, Jack. Keep it up!

    • @johnstuckaiii
      @johnstuckaiii Рік тому +2

      What's the other one (please) ?

    • @vyrenpevo979
      @vyrenpevo979 Рік тому +8

      @@johnstuckaiii Hehe. Conan Needs A Friend.

    • @juandager5220
      @juandager5220 Рік тому

      Sounds like the old Get Smart joke...

    • @msergio0293
      @msergio0293 7 місяців тому

      ​@@johnstuckaiii A man of culture

  • @gregh7457
    @gregh7457 Рік тому +16

    i had a nightmare the other night that quantum computers had finally cracked all encryption and all the bad actors had sprung into action decrypting all the encrypted data they had collected and stored for years

    • @DgarciaA-hj8qc
      @DgarciaA-hj8qc Рік тому

      Fuck man interesting?

    • @DgarciaA-hj8qc
      @DgarciaA-hj8qc Рік тому +3

      Eventually that's what gonna happen or it already has happend it's just a matter of timing when all the nukes launch

  • @HecTechFPV
    @HecTechFPV Рік тому +7

    New TEMPEST exploits are being found all the time, the other week I was reading about malware that used the sata cables as a rf transmitter to pipe out.

  • @savagepro9060
    @savagepro9060 Рік тому +3

    0:05 " . . . one such news story I SAW, was some security news I HEARD . . ."

  • @aetherwizard3218
    @aetherwizard3218 Рік тому +19

    Oh no you were right the first time. the NSA certainly sees every single member of the public as their enemy.

    • @meepk633
      @meepk633 6 місяців тому

      This is just silly. It doesn't even make sense on a practical level. You've never been coerced by the NSA to do anything in your entire life. You never will. You'll probably never interact with them in any way. I know it's fun to imagine that you are some oppressed freedom fighter, but you aren't. You're a citizen in a democratic country with remarkably low corruption.

  • @benruniko
    @benruniko Рік тому +3

    Wow I remember manipulating pretend logs as a kid in the Uplink game. Little did I know that would someday be possible!

  • @shadowuaw-0001
    @shadowuaw-0001 Рік тому +14

    Always Christmas, when a new episode drops. Keep up the great work Jack!

  • @dronefish9629
    @dronefish9629 9 місяців тому

    I came here a year later to listen again. My favourite podcast ever, I think.

  • @guruoo
    @guruoo Рік тому +7

    Got lucky, and caught a deal on the whole set of NSA tools on markdown day at Goodwill.

  • @ttmilk6633
    @ttmilk6633 Рік тому +3

    Went to my first B-Sides! Thanks Jack for letting me know about them!

  • @jonnyphenomenon
    @jonnyphenomenon Рік тому +11

    TEMPEST (transient electroMagnetic pulse emanation surveillance technology) was a surveillance tech that could sniff the data sent over a vga cable to a targets monitor from hundreds of feet away. If the target has a vga cable without ferrite beads on the ends, these signals are incredibly strong. The system just amplified the signal and displayed it on the viewers screen where they could sit and watch from a van down the block (with a directional antenna aimed at the intended target).

  • @imnotahippie22
    @imnotahippie22 Рік тому +20

    The majority of Government doesn't prevent attacks. They sit by as they happen and swoop in to point the finger at who did it. In my opinion

    • @n0madfernan257
      @n0madfernan257 Рік тому +4

      kinda reminds me that ww2 an attack message was intercepted before pearl harbor was bomb so they can announce retaliation

    • @nancysmith2389
      @nancysmith2389 Рік тому

      Better than not knowing. Like now. Hee hee hee.

    • @meepk633
      @meepk633 6 місяців тому

      I love to make vapid guesses based on nothing but anti-establishment word association. In my opinion.

  • @mxcollin95
    @mxcollin95 Рік тому +13

    New to the channel and am absolutely loving it! I’m definitely learning a lot too as I have no computer nerd skills to speak of but I’m learning! 🤙

  • @issamelarmi
    @issamelarmi Рік тому +1

    Just tumbled randomly upon the channel and i got to say, i love this

  • @fatalinsomn1a182
    @fatalinsomn1a182 Рік тому +4

    Certain groups really need both isolated internal networks with physical transfer of information, and also some completely invisible hardware logging tools. Also you should use linguistic analysis, and look for many unrelated clues to find a common trend to defeat diversion tactics.

  • @omgemilyhd4500
    @omgemilyhd4500 Рік тому +32

    Good to mention that ALL chinese vendors have been doing this to all hardware coming from China, ALL OF THEM.

    • @veramae4098
      @veramae4098 Рік тому +1

      Source? I don't believe anything without some kind of credentials anymore.
      Retired librarian
      P.S. Although I do believe this because -- China.

    • @19801981ification
      @19801981ification Рік тому +2

      ​@@veramae4098 silly use some common sense

    • @lo2740
      @lo2740 Рік тому

      @@19801981ification yeah, the "common sense" of low educated , low IQ peoples.

    • @lo2740
      @lo2740 Рік тому

      you have very low education, right?

  • @ScottCalvinsClause
    @ScottCalvinsClause Рік тому +4

    God! I can't believe the rate at which you upload such quality

    • @bbertsamson8118
      @bbertsamson8118 Рік тому +1

      It's awsome, i'v binge watch all of his work so fast and he's still able to provide more exciting testimonies
      My 2022 crush for sure

  • @brainiacrawkib8135
    @brainiacrawkib8135 Рік тому +7

    Thanks Jack, pls can you share a link to the Advance Network Tools catalogue. Will like to read more on that

  • @HighSpeedNoDrag
    @HighSpeedNoDrag Рік тому +2

    The last couple of years prior to my seperation/retirement from the Gov., CISO was implemented. In a nutshell, a low leverl hacker could negotiate and or hack the system and eventually, IOT's assistance or corrective action was ZERO.

  • @F3PIZZA
    @F3PIZZA Рік тому +2

    Oh, Jachary. Outstanding content. Thank you, dude. 😊

  • @daxramdac7194
    @daxramdac7194 Рік тому +2

    I'm sure a lot of the hardware and software they've made is fairly impressive. But breaking into a targets hotel room, especially when they have complete clearance to do so, I mean it's pretty easy when you have that kind of power. At that point, the tools create themselves.

  • @gh0stm0nst3r6
    @gh0stm0nst3r6 Рік тому +1

    I listen to this on Google Podcasts when showering. There's soooooo much more on here. OMG this is so great. Thank you so much Jack! Subbed, Liked, and Shared up!

  • @mashmasho
    @mashmasho Рік тому +6

    This podcast is fantastic. I’ve learned so much!

  • @frankjohnson8750
    @frankjohnson8750 Рік тому +7

    All these hacks seem to make computer networks useless 😐

  • @herbert5491
    @herbert5491 Рік тому +3

    Thank you. I remember well when the NSA was offering over one million for the return of a specific hacking tool. It could also have been a trick to catch the hackers. Never found out the end result

    • @Arbiter710
      @Arbiter710 Рік тому +1

      Prob both

    • @herbert5491
      @herbert5491 Рік тому

      @@Arbiter710 Probably but the one, or ones that stole it would not be that stupid to return it

    • @Arbiter710
      @Arbiter710 Рік тому

      @@herbert5491 I doubt they stole it, this smells like an Edward Snowden Russia dry up… this was the last bit they could get till they sucked him dry

  • @travelinman70
    @travelinman70 Рік тому +11

    If event logs can be edit, then you can change events to point to someone else hacking in the system.
    Notice I didn't say "researching" the system. because let's be fair here "researchers" are hackers. If someone is researching exploits, they're hacking.

  • @slavaboggu
    @slavaboggu Рік тому +31

    Wow, not too far fetched of an idea to think this Jack guy is still working for nsa as a sheep dipped agent. Can’t think of a better way to gain access to highly sensitive equipment than a security consultant. Jeez, even the company name is suspicious - rendition security. One thing comes to mind for me is the rendition torture sites used by the us gov around the world. Scary stuff. Too bad the host didn’t bring this angle up.

    • @goodknight4132
      @goodknight4132 Рік тому +2

      Car telll

    • @krotchlickmeugh627
      @krotchlickmeugh627 Рік тому

      He didn't bring it up because hes trying to suck nuts to get in the club. I mean hes pushing russiagate bullshit.

    • @DebianOchoa-mf4iv
      @DebianOchoa-mf4iv Рік тому

      It certainly wouldn't be unheard of. It is well known that many of the deep state agencies pay influencers to move the publics opinión on the governments overreach.

    • @oiuhwoechwe
      @oiuhwoechwe Рік тому +3

      lol yeah. "let me just patch this router for you"....

    • @tonyk438
      @tonyk438 Рік тому

      Yeah, and then just take anything the former NSA guy writes/says as possible disinformation. Possible false flag. Look at the targeting of Russia by mainstream media, especially since invasion of Ukraine.

  • @johnfarmer3506
    @johnfarmer3506 Рік тому +3

    How did Martin only get nine years? How did the FBI or why did the FBI not read Harold his rights during his initial arrest and confession?

  • @baineking271
    @baineking271 Рік тому +4

    One of the best podcast ever. Keep it up!

  • @wizardmack3551
    @wizardmack3551 Рік тому

    Your wrap up at the end of this episode should have been at the start,, it would have helped clarify some issues. Thanks again for all your hard work!!!

  • @HazyJ28
    @HazyJ28 Рік тому +5

    How is it 2023 and the public has never seen wireless VGA or HDMI. How come we're always 10-20 years behind the government, Im tired of it. Intel WiDi and MIRACAST (basically just WiFi direct) doesn't cut it.

    • @Garrett.
      @Garrett. 29 днів тому

      The teradek ace has been around for years, it's just really expensive.

    • @sporkybutterz
      @sporkybutterz 25 днів тому

      These tools are now available to the public

  • @Pendoza84
    @Pendoza84 Рік тому +4

    This was a good one. Super relatable too.. Keep it up!

  • @Nourrights_psalm118.8
    @Nourrights_psalm118.8 5 місяців тому +1

    You know it's bad when his first concern was what is the USA government going to do..... What type of world are we living in people??? WAKE UP

  • @jtw-r
    @jtw-r Рік тому +3

    “infosec dumpster fire putter-outer” 😂😂

  • @thedamnedatheist
    @thedamnedatheist Рік тому +6

    Why would a nation state act like this to begin with? Those tools were much more valuable kept quiet & used than to tell everyone they exist & have been compromised. Any intelligence agency would give their right arm for those sort of tools. It makes me think there is much more to the story than we know.

    • @dilligaf8349
      @dilligaf8349 Рік тому

      Ever wondered if we're just super advanced Ai with a written script back at the point of creating basic Ai? Or maybe think of yourself as a tiny part of the big mechanism. The corruptible parts within are the same all the way up the chain.

    • @actuallynotsteve
      @actuallynotsteve Рік тому

      I've thought for a LONG time that Snowden was a limited hangout, chosen for the role, and might be a double agent in Russia.
      Some of the tech make not even exist, but is designed to make Russia and China think they do.

    • @FragmentedLore
      @FragmentedLore Рік тому

      I came to a similar conclusion based on geopolitical insight and human motivation. I doubt the NSA data dump was done by any foreign (un)official state program. Most state groups would study and backward engineer those NSA tools and keep it quiet as to not allow those tools to lose their viability. No this feels like an internal leaker or psy-op/recruitment activator. Those two things aren't mutually exclusive either.
      You could dump data in the form of hacking tools to invigorate new people into wanting to learn more and use those tools. This then turns up (in)voluntary recruitment into agencies which are in need of fresh potential.
      Money obviously wasn't the goal despite what they may have said, applying false motivation is classic misdirection. That's also why it's obviously not a state actor, auctions for Intel like this go on in back rooms, embassies, and secure channels. Not in public, unless the goal is to humiliate. If humiliation was the goal it would have blown up, but this died down and has so far gone back into the shadows. For now anyways.

  • @mohmadhafiz1675
    @mohmadhafiz1675 Рік тому +3

    This is true fuzzbunch exploits still in use, since most companies around the world are using outdated os like xp,7, sever 2008 but it's in their internal network 🤫

  • @jowb-wf5tg
    @jowb-wf5tg Рік тому +7

    shadow brokers would be watching this video for sure🤣

  • @SalamiMommie
    @SalamiMommie Рік тому +1

    considering he worked for the NSA and the brokers implied he was part of the Q group, that should tell people a lot!

  • @FRM101
    @FRM101 7 місяців тому

    'Rendition' Security. 😂
    I like this guy already.

  • @keithp6054
    @keithp6054 Рік тому +10

    What if the equation released the tools as a way to publicly hack certain groups while giving cover by claiming those tools were used by an "opposition" group?

  • @DudeAndDogsSailing
    @DudeAndDogsSailing 10 місяців тому

    I have been awful about 👍 all these amazing interviews. Shucks...guess i just have to watch them all again.

  • @jayredbeard7433
    @jayredbeard7433 Рік тому +6

    Love this stuff. Keep 'em coming.

  • @chasefoster8092
    @chasefoster8092 Рік тому +1

    In a top tier category? Nah! They are the top tier! Fictional levels of legendary! The stuff you only see in movies! This is awesomeness in carnate!

  • @dffabryr
    @dffabryr Рік тому +1

    NSA does not need to search for weaknesses and/or zero day attacks, or any vulnerabities. If that take place they will be steps back from their ennemies. If you want to be "offensive" you must know about weaknesses months before new program releases/updates/upgrades take place

    • @jamescollier3
      @jamescollier3 Рік тому +2

      They are involved with MS, apple, Samsung etc . remember when they opened that i phone?

  • @ehoffmann47
    @ehoffmann47 Рік тому +19

    Dirty grandpa. Prerty spot on. We should've listened to them.....

    • @meepk633
      @meepk633 6 місяців тому +3

      Almost like you're the easily manipulated target they had in mind.

  • @LuigiMordelAlaume
    @LuigiMordelAlaume Рік тому +1

    This is the #1 argument against governments wanting backdoors, like the apple phone encryption and end-to-end messengers

  • @janinegarverick5642
    @janinegarverick5642 Рік тому +4

    Pegasus and Spyware technologies can use voice technology attacking its victims with warfare technologies

    • @krotchlickmeugh627
      @krotchlickmeugh627 Рік тому +3

      They also use their massive data files of us. Our voice from listening every day. Then use A.I. to say whatever they want us to say. Then prosecute us for crimes that we never did.

    • @johnfarmer3506
      @johnfarmer3506 Рік тому

      A lot of youtube accounts were created at the end of 2022

  • @Sahxocnsba
    @Sahxocnsba Рік тому

    This is my fave episode by far. Great stuff man

  • @evanallen5377
    @evanallen5377 Рік тому

    Man, that signoff... "don't hack like my brother" "and don't hack like my brothet"

  • @veteranmuscle
    @veteranmuscle Рік тому +4

    As always Jack, great episode broheim. Now, we can sit here and blame the Russians and any other nation state that have these capabilities all we want OR we can look within 😬

  • @MAX-nv6yj
    @MAX-nv6yj Рік тому +1

    On its time I just finish day 6 quest AoC
    Let’s just watch this amazing content😍❤❤❤

  • @oodles86
    @oodles86 Рік тому +1

    Cool. Some of this parallels with what I've been reading in Sandworm lately.

    • @sandworm9528
      @sandworm9528 Рік тому +1

      Great book 😂

    • @oodles86
      @oodles86 Рік тому

      @@sandworm9528 must've really impacted you haha

  • @rahulramteke3338
    @rahulramteke3338 11 місяців тому +1

    Alternate title: NSA gets mogged by Shadow Brokers

  • @johnfarmer3506
    @johnfarmer3506 Рік тому +1

    The thing I don't get about the NSA catalog is why they put all the eggs in one basket. If you have a retirement account, you don't allow direct access; you open another account and transfer money as needed. And this is after knowing that the NSA has lost tera bits of information. The narrative just does not seem 100% true.

    • @noahway13
      @noahway13 Рік тому

      Totally agree. And this guest was so sus. He did not say ONE thing definitive--- Half of us thought it was this, the other half thought it was that, and I was thinking it might be, or might not be.. but that is the most I can say without saying for sure either way... I can almost say for sure that I think they were not just guessing... blah, blah, blah. What a load of shit.

  • @josephpace3438
    @josephpace3438 Рік тому

    at 1:51 You described an OMG cable... you have been able to buy them for years for a few hundo...

  • @chadyonfire7878
    @chadyonfire7878 Рік тому

    This is crazy content man . Thx wish u more support

  • @vstoykovbg
    @vstoykovbg Рік тому +1

    43:30 Another problem: NSA is using the same software (Microsoft Windows) with the same vulnerabilities. The enemy may find out about these vulnerabilities and use them against NSA and against other US government agencies and US private companies.

    • @alexeilindes7507
      @alexeilindes7507 Рік тому

      I think this would be ideal at this point. I like the shadow brokerss.

    • @100c0c
      @100c0c Рік тому

      @@alexeilindes7507 why would that be ideal?

    • @johnfarmer3506
      @johnfarmer3506 Рік тому

      Maybe that is how they did it. They used one of the vulnerabilities listed in the NSA catalog and then got the rest.

  • @aphaomega0098
    @aphaomega0098 9 місяців тому

    My guess is that they are 3 people all men or possibly 1 woman in the group. One of them works or worked at the NSA it would have to be someone who had the minimal clearance needed for the ANT catalougue. Wouldve quit about 6 to 8 months after the 2017 leak to avoid suspicion. Most likely someone with talent but never recognized or always passed over for promotion.

    • @o1-preview
      @o1-preview 2 місяці тому

      could be, but I think it was probably a zero day attack on an attack server with some of the loaded ANT tools, not all of them.. who knows

  • @bany512
    @bany512 Рік тому +6

    spy game is much more than just "hacking"

    • @DgarciaA-hj8qc
      @DgarciaA-hj8qc Рік тому +1

      That is true I was aware since a pal told me about how to notice and know that is one of my most interesting life experience

  • @jonbikaku6133
    @jonbikaku6133 Рік тому

    So ragemaster might be what Mr. Robot implied when Darlene attached some physical device to his monitor to grab screenshots etc.

  • @grumpent
    @grumpent Рік тому +1

    Bro been stuttering and nervous explaining he wouldn’t be surprised if he gets indicted by another country 💀

  • @swilsonmc2
    @swilsonmc2 Рік тому +9

    "why not indict the officers or generals or the leaders who signed the executive order?" 4D chess isn't so impressive when the players hands are all under the table making deals with each other. nation states are just what the plebs see. in reality there are a small number of players creating a system for the rest of us.

    • @veramae4098
      @veramae4098 Рік тому

      What are your credentials?

    • @swilsonmc2
      @swilsonmc2 Рік тому +1

      @Vera Mae ma'am, I'm sorry. I don't usually give out such sensitive information to people I'm not formally acquainted with.
      Now, if you're wondering what is in my background to support my previous statement, I would say I have two eyes to see and a pair of ears. That should be all anyone needs to notice the obvious duplicity of our leadership class where they're all working for more control over you and me.

  • @chubtochamp1208
    @chubtochamp1208 Рік тому +1

    The first thing you talk about, the USB, sounds exactly like hak5 omg cable. Way cheaper than 20,000

    • @saxxonpike
      @saxxonpike Рік тому +3

      Of course they can be made for way cheaper, especially since there have been advancements in tech since 2009. But if I'm the contracted company that's manufacturing these in secret? You bet I'm going to milk that contract for all it's worth.

  • @georgewbushcenterforintell147

    The name dirty grampa is gonna come back in style

  • @AnonymousQwerty
    @AnonymousQwerty 3 місяці тому

    No. Intel agencies don’t “intercept” the hardware to put their firmware on it, they have backdoors in the firmware from the beginning

  • @RaanDohmSchitt
    @RaanDohmSchitt Рік тому

    the technology is available today for public use. you just have to know where to look for it because it is not mainstreamed.

  • @RobbyHouseIV
    @RobbyHouseIV Рік тому +1

    If the Shadow Brokers hacking group worked on behalf of a nation-state wouldn't it behoove said nation-state to keep the hacker's findings (hacking tools, malware, etc.) a secret and use those tools found for their own clandestine hacking abilities?

    • @FragmentedLore
      @FragmentedLore Рік тому

      Yeah it's as if someone wanted to blame a feign entity. The bad grammar is funny for many reasons.
      A. It keeps you from sounding like yourself
      B. Everyone knows about Google but state agencies have specialized interpreters.
      Preying on ignorance is an Intel agency tactic. This smells like psy-op/recruitment material. Purposefully leak dated tools to invigorate new blood to test and learn to hack. It may be they have backdoors and scripts embedded in the tools themselves, leaking the info or location of the person using them. This turns up (in)voluntary recruitment into the intelligence field. I'm sure this has to be an inside job either (un)officially. Windows response was way too fast. Microsoft must have had a fix for the NSAs exploit ahead of time and intentionally left the vulnerability intact. Thats my take anyway.

    • @meepk633
      @meepk633 6 місяців тому

      No. They weren't state-of-the-art tools. They were more valuable as fuel for the conspiratorial brain fire that is currently destroying America.

  • @domdirector
    @domdirector Рік тому +2

    “Cisco didn’t know” thats bull crap

  • @Ghostfancoder
    @Ghostfancoder Рік тому

    I just found your channel. It’s bad ass!!!

  • @vihangapramodya405
    @vihangapramodya405 Рік тому +7

    i remember i've downloaded this archive few years ago. most of them flaged as viruses though.

  • @jspencer7788
    @jspencer7788 Рік тому

    It was Robert Redford, River Phoenix, Sidney Poitier and Dan Ackroid.

  • @silver1407
    @silver1407 Рік тому +2

    pay attention to how the guest uses their words and avoids proper nouns often. he knows how algorithms can find and enumerate the things you say and associate them with your global "profile"

    • @meepk633
      @meepk633 6 місяців тому

      Vicarious schizophrenia. You hate to see it.

  • @adrianalexandrov7730
    @adrianalexandrov7730 3 місяці тому

    Interesting when one of their own is really worried about what the government gonna do...
    Also, why is he so worried about people and clients?
    I haven't heard of marines fearing that people would know.
    So it sems like NSA doesn't think of themselves as a heroes serving US citizens and that they see people as enemy.

  • @Lei_Wong
    @Lei_Wong Рік тому +1

    Great episode Jack,... as always

  • @janinegarverick5642
    @janinegarverick5642 Рік тому

    Exactly and he doesn't want the public to know lol

  • @wambamcamcam
    @wambamcamcam Рік тому +3

    USB keyloggers aren't available commercially today? Ever been to Hak5? That's just one place that sells a USB implant similar to the one described.. and they're not even close to $20k..

  • @ross9263
    @ross9263 Рік тому +1

    I feel like 9 years is not that much for harold

  • @ichibot-app
    @ichibot-app Рік тому +1

    It's someone he worked with. That knows him personally. The broken english is just a throw off.

  • @VitalTechnology_
    @VitalTechnology_ Рік тому +2

    Thanks Jack!

  • @nocturnesol9280
    @nocturnesol9280 Рік тому +6

    They weren't stolen. They were caught using them by the EU, and the treaty signed had them sell them. If you use those tools its like theft of government property and your subject to their wireless eavesdropping warrantless search.

    • @krotchlickmeugh627
      @krotchlickmeugh627 Рік тому +1

      Shhh. Thats what they are counting on

    • @nocturnesol9280
      @nocturnesol9280 Рік тому

      @@krotchlickmeugh627 lol i ain't touching some NSA robbing terrorists shit lol.

  • @SnippetSphere_1
    @SnippetSphere_1 Рік тому +2

    Some of these tools are readily available for purchase if you know where to find them.

  • @km2766
    @km2766 Рік тому

    really obvious how the story dances around NSA insider being the shadowbroker(s), Mayne I missed it

  • @wwjd6041
    @wwjd6041 Рік тому +2

    When I was young, I ......

  • @nancysmith2389
    @nancysmith2389 Рік тому

    Oooh. Someone stole the NSA's playbook.

  • @cjcantrell80
    @cjcantrell80 Рік тому

    This is why I loath technology. Absolutely nothing is safe.

  • @FluffyNicholas
    @FluffyNicholas Рік тому +2

    Let’s be real man, the last time I had a machine with a VGA port was 2012!

    • @ScottCalvinsClause
      @ScottCalvinsClause Рік тому +3

      Commercial machines are all about the VGA

    • @saxxonpike
      @saxxonpike Рік тому +1

      A lot of servers still have VGA ports installed now as we go into the year 2023. Dell's rack servers have VGA+USB on the front behind the security grill.

    • @FluffyNicholas
      @FluffyNicholas Рік тому

      @@saxxonpike Really? Wow.

    • @freeone69
      @freeone69 Рік тому

      u would be surprised how many public domains have ancient tech in live environments.

  • @aaronmotta7028
    @aaronmotta7028 Рік тому +3

    Man, this is technology that has been around for decades. A USB stick that can monitor network and computer traffic? Still not public? Really? Hak5 has the USB rubber ducky, sharkjack, you a LAN turtle, which clones monitors. Come on dude.

  • @Robbie_jojo
    @Robbie_jojo Рік тому

    I also have a sock at home,but it's dirty one 😂

  • @GlennsFastReviews
    @GlennsFastReviews Рік тому

    I have a problem with Chromium being vulnerable to some sort of exploit. It started late last year. When I switched to Firefox, it didn't happen (but I don't like Firefox as much), so I switched back and it's happening again.

  • @cipanexalandros7658
    @cipanexalandros7658 Рік тому +2

    Once NSA ... 4eva NSA!