Who Stole the NSA's Top Secret Hacking Tools?🎙Darknet Diaries Ep. 53: Shadow Brokers

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 ก.ย. 2024
  • The NSA has a super secret catalog of sci-fi level cyber weapons. Then one day in 2016, someone started auctioning them off on Twitter.
    Visit darknetdiaries... for a list of sources, full transcripts, and to listen to all episodes.

ความคิดเห็น • 810

  • @Mp-jw1qg
    @Mp-jw1qg ปีที่แล้ว +401

    In highschool, they took my internet access away on my account so i made a kernel level bootloader that would bypass the schools login system and would boot the native windows xp at the time. I was better at c++ than the teacher and often times i was just sitting in class playing counter strike 1.6. I found a vulnerability in the schools CISCO network and how it was tied in to AERIES software that the teachers used to keep grades. There was a default login and password that would allow me to get passed the firewall and into the actual login page. The school computer lab had a program that was essentially a key logger that would log the students typing assignments to judge accuracy of the students typing. I Found the master cd copy of that program with the master license one day and cloned it. I went and installed that program on the economics teachers pc and waited for him to login to ARIES. I logged in and changed everyones grades in ARIES and then logged into his user account wich as admin for the network and i turned my interent access back on and gave myself admin privelages. I only got caught because i was playing counter strike in class one day on the schools video editing pc and i was the only one who could have done it. I was young and stupid. I didnt get to graduate on stage and I lost my college scholarship because of it. I gave up programming and went to college for chemistry. I probably would have gotten in real trouble had i not matured and gave that stuff up.

    • @dimi_95
      @dimi_95 ปีที่แล้ว +26

      I love your story, hope everything worked out for you

    • @laoso8776
      @laoso8776 ปีที่แล้ว +41

      Why did you not go to school if you could do all that?

    • @paganizonda1000ps
      @paganizonda1000ps ปีที่แล้ว +34

      Man everything came out because you played too much. Sad that you didnt study cs.

    • @jacksparrow3490
      @jacksparrow3490 ปีที่แล้ว +51

      Those skills will come in handy when they turn off your digital money once the social credit score system hits.

    • @ihakker1416
      @ihakker1416 ปีที่แล้ว +32

      Wtf I just freaked out reading this. This story is creepily similar to something I did
      And I also gave up programming and went to college for chemistry.
      Wtf

  • @Ye4rZero
    @Ye4rZero ปีที่แล้ว +189

    The person who deserves real recognition is whoevers in charge of naming the NSA's tools. Deity bounce? Fkn awesome

    • @schwingedeshaehers
      @schwingedeshaehers ปีที่แล้ว +15

      It is a program, that gives random name (but they often use more than one try)

    • @theRPGmaster
      @theRPGmaster ปีที่แล้ว +22

      @@schwingedeshaehers That's classified. You've said too much.

    • @schwingedeshaehers
      @schwingedeshaehers ปีที่แล้ว +11

      @@theRPGmaster it is at least public since Edward Snowden wrote it in his book.

    • @famousartguymeme
      @famousartguymeme ปีที่แล้ว +6

      @@schwingedeshaehers public dosent mean de-classafied, please report to your nearest ODNI office for apprehension and impreseanmeant.

    • @schwingedeshaehers
      @schwingedeshaehers ปีที่แล้ว +6

      @@famousartguymeme where do I find it? Do you take the cost to get there? Can I get immunity when entering the USA?

  • @Yerbah
    @Yerbah ปีที่แล้ว +320

    Doing my coding final and saw this pop up. I did my first CTF this year. I have learned alot from this channel. Thank you for the community.

    • @Ataraxia_Atom
      @Ataraxia_Atom ปีที่แล้ว +4

      How was your first CTF? What have you been using to learn?

    • @everythinggaming1536
      @everythinggaming1536 ปีที่แล้ว

      Same lol

    • @ssimple-4621
      @ssimple-4621 ปีที่แล้ว

      im in the same situation, doing my final paper on cyberattacks, hacking and security

    • @Ataraxia_Atom
      @Ataraxia_Atom ปีที่แล้ว +4

      @@brenndandeffendall6211 thank you for your reply, I've been doing the Advent of cyber which has been super fun after spending about 10 months teaching myself web development and JavaScript, I'll check out the guardian group forsure

    • @mossdem
      @mossdem ปีที่แล้ว +4

      @@Ataraxia_Atom you’ll like John Hammond. Just search that name on TH-cam :)

  • @captain_hanzo
    @captain_hanzo ปีที่แล้ว +164

    When I first stumbled upon this channel I was like "yeah what is this gonna do for me when I listen to the podcast every other week" but man you put out so many banger episodes like this that are well worth listening again to. Either they're interesting/suspenseful/entertaining enough on their own or we know things now that put a couple episodes in another context retroactively.

    • @Joe60459
      @Joe60459 ปีที่แล้ว +2

      What episodes are you referring to that the perspective changed on?

    • @captain_hanzo
      @captain_hanzo ปีที่แล้ว +3

      @@Joe60459 I wish I could think of a couple more episodes from the top of my head to illustrate my point but one I can think of instantly is the one with the FBI agent that investigated the bombing of the USS Cole in 2000. The episode ends on the kinda grim, sobering note that if it were not for the unprofessional and (arguably) unnecessary secretive behavior/relationship between the FBI and CIA, the 9/11 perpetrators would have gotten under a lot more scrutiny before they even took flying lessons especially with the information the FBI agent from the episode unearthed). After the 20th anniversary of 9/11 there was a flood of new documentaries, essays, analyses and to me it is shocking how close the authorities actually were and how the new information corroborates what the agent in the episode tells. Makes the episode even more bone chilling and what happened seems to be in fact as grim and sobering as the FBI agent's retelling implied.

    • @Rooot-username
      @Rooot-username ปีที่แล้ว +1

      Same. Ended up binge listening lmao

    • @valkyr1985swe
      @valkyr1985swe ปีที่แล้ว +3

      Myself can't believe i just found this channel. Been listening to the podcast for years. Why haven't I found this before.

    • @KenSherman
      @KenSherman ปีที่แล้ว

      16:00
      _Resend/rescind the message. We have the capacity to do it..._ Yep, that sound like Biden.

  • @arupball1505
    @arupball1505 ปีที่แล้ว +76

    Your podcast is music to my ears , don't ever stop this series FREAKING "NEVER"

  • @byron2334
    @byron2334 ปีที่แล้ว +377

    People need to understand that literally the only difference between a government and a street gang is membership numbers.

    • @playtester6635
      @playtester6635 ปีที่แล้ว +68

      The difference between a State and a criminal gang is that the State is the gang that won

    • @johnrodgers2171
      @johnrodgers2171 ปีที่แล้ว +14

      Ok let's go with having no government because anarchy would be fun

    • @jaygin6518
      @jaygin6518 ปีที่แล้ว +7

      Nope

    • @TwinTurboOnly
      @TwinTurboOnly ปีที่แล้ว +15

      No it’s being on the right side of the law lol. Those who make the rules. Break the rules.

    • @imt3206
      @imt3206 ปีที่แล้ว +1

      @@johnrodgers2171 yes

  • @oldgoat8861
    @oldgoat8861 ปีที่แล้ว +16

    These episodes/stories are fantastic to listen to. Reminds me of early 70's Documentaries and interviews....but....This guy believe it or not is better. He expands beyond the content and establishes a base layer, then delves deeper.

  • @vyrenpevo979
    @vyrenpevo979 ปีที่แล้ว +30

    This is the second best pod I've picked up this year. Binged every ep over the last few week. Great work, Jack. Keep it up!

    • @johnstuckaiii
      @johnstuckaiii ปีที่แล้ว +2

      What's the other one (please) ?

    • @vyrenpevo979
      @vyrenpevo979 ปีที่แล้ว +8

      @@johnstuckaiii Hehe. Conan Needs A Friend.

    • @juandager5220
      @juandager5220 ปีที่แล้ว

      Sounds like the old Get Smart joke...

    • @msergio0293
      @msergio0293 5 หลายเดือนก่อน

      ​@@johnstuckaiii A man of culture

  • @horsied
    @horsied ปีที่แล้ว +194

    anyone who thinks the NSA isn’t on the offensive is insane. Cmon, we all know the best defense is offense…

    • @TomTom-gx1sm
      @TomTom-gx1sm ปีที่แล้ว

      Of course they are war of tomorrow will be drones vs drones & taking over the network / hijacking those drones...

    • @Electron42
      @Electron42 ปีที่แล้ว +19

      Thanks Patriot Act!

    • @justcallmetruman
      @justcallmetruman ปีที่แล้ว +20

      I don't consider them on the side of the us citizens that's for sure

    • @Stopinvadingmyhardware
      @Stopinvadingmyhardware ปีที่แล้ว

      I bet they are offended. Those losers.

    • @rxsk
      @rxsk ปีที่แล้ว +1

      Best offense is defense.

  • @shadowuaw-0001
    @shadowuaw-0001 ปีที่แล้ว +14

    Always Christmas, when a new episode drops. Keep up the great work Jack!

  • @bryceburns429
    @bryceburns429 ปีที่แล้ว +12

    Never correct your enemies when they are making a mistake 😊

  • @gregh7457
    @gregh7457 ปีที่แล้ว +16

    i had a nightmare the other night that quantum computers had finally cracked all encryption and all the bad actors had sprung into action decrypting all the encrypted data they had collected and stored for years

    • @DgarciaA-hj8qc
      @DgarciaA-hj8qc ปีที่แล้ว

      Fuck man interesting?

    • @DgarciaA-hj8qc
      @DgarciaA-hj8qc ปีที่แล้ว +3

      Eventually that's what gonna happen or it already has happend it's just a matter of timing when all the nukes launch

  • @savagepro9060
    @savagepro9060 ปีที่แล้ว +3

    0:05 " . . . one such news story I SAW, was some security news I HEARD . . ."

    • @AnonymousQwerty
      @AnonymousQwerty หลายเดือนก่อน +1

      Yeah I was like wtf lol

  • @mxcollin95
    @mxcollin95 ปีที่แล้ว +13

    New to the channel and am absolutely loving it! I’m definitely learning a lot too as I have no computer nerd skills to speak of but I’m learning! 🤙

  • @tonyzone8999
    @tonyzone8999 5 หลายเดือนก่อน +1

    I’m going to have to tip my hat. Absolutely brilliant stuff. A lot of this is 100% unavoidable.

  • @ScottCalvinsClause
    @ScottCalvinsClause ปีที่แล้ว +4

    God! I can't believe the rate at which you upload such quality

    • @bbertsamson8118
      @bbertsamson8118 ปีที่แล้ว +1

      It's awsome, i'v binge watch all of his work so fast and he's still able to provide more exciting testimonies
      My 2022 crush for sure

  • @guruoo
    @guruoo ปีที่แล้ว +6

    Got lucky, and caught a deal on the whole set of NSA tools on markdown day at Goodwill.

  • @mashmasho
    @mashmasho ปีที่แล้ว +6

    This podcast is fantastic. I’ve learned so much!

  • @baineking271
    @baineking271 ปีที่แล้ว +4

    One of the best podcast ever. Keep it up!

  • @HecTechFPV
    @HecTechFPV ปีที่แล้ว +7

    New TEMPEST exploits are being found all the time, the other week I was reading about malware that used the sata cables as a rf transmitter to pipe out.

  • @jayredbeard7433
    @jayredbeard7433 ปีที่แล้ว +6

    Love this stuff. Keep 'em coming.

  • @jonnyphenomenon
    @jonnyphenomenon ปีที่แล้ว +11

    TEMPEST (transient electroMagnetic pulse emanation surveillance technology) was a surveillance tech that could sniff the data sent over a vga cable to a targets monitor from hundreds of feet away. If the target has a vga cable without ferrite beads on the ends, these signals are incredibly strong. The system just amplified the signal and displayed it on the viewers screen where they could sit and watch from a van down the block (with a directional antenna aimed at the intended target).

  • @ehoffmann47
    @ehoffmann47 ปีที่แล้ว +19

    Dirty grandpa. Prerty spot on. We should've listened to them.....

    • @meepk633
      @meepk633 4 หลายเดือนก่อน +2

      Almost like you're the easily manipulated target they had in mind.

  • @benruniko
    @benruniko ปีที่แล้ว +3

    Wow I remember manipulating pretend logs as a kid in the Uplink game. Little did I know that would someday be possible!

  • @F3PIZZA
    @F3PIZZA ปีที่แล้ว +2

    Oh, Jachary. Outstanding content. Thank you, dude. 😊

  • @gh0stm0nst3r6
    @gh0stm0nst3r6 ปีที่แล้ว +1

    I listen to this on Google Podcasts when showering. There's soooooo much more on here. OMG this is so great. Thank you so much Jack! Subbed, Liked, and Shared up!

  • @aetherwizard3218
    @aetherwizard3218 ปีที่แล้ว +19

    Oh no you were right the first time. the NSA certainly sees every single member of the public as their enemy.

    • @meepk633
      @meepk633 4 หลายเดือนก่อน

      This is just silly. It doesn't even make sense on a practical level. You've never been coerced by the NSA to do anything in your entire life. You never will. You'll probably never interact with them in any way. I know it's fun to imagine that you are some oppressed freedom fighter, but you aren't. You're a citizen in a democratic country with remarkably low corruption.

  • @ttmilk6633
    @ttmilk6633 ปีที่แล้ว +2

    Went to my first B-Sides! Thanks Jack for letting me know about them!

  • @HazyJ28
    @HazyJ28 ปีที่แล้ว +5

    How is it 2023 and the public has never seen wireless VGA or HDMI. How come we're always 10-20 years behind the government, Im tired of it. Intel WiDi and MIRACAST (basically just WiFi direct) doesn't cut it.

  • @issamelarmi
    @issamelarmi ปีที่แล้ว +1

    Just tumbled randomly upon the channel and i got to say, i love this

  • @omgemilyhd4500
    @omgemilyhd4500 ปีที่แล้ว +32

    Good to mention that ALL chinese vendors have been doing this to all hardware coming from China, ALL OF THEM.

    • @veramae4098
      @veramae4098 ปีที่แล้ว +1

      Source? I don't believe anything without some kind of credentials anymore.
      Retired librarian
      P.S. Although I do believe this because -- China.

    • @19801981ification
      @19801981ification ปีที่แล้ว +2

      ​@@veramae4098 silly use some common sense

    • @lo2740
      @lo2740 ปีที่แล้ว

      @@19801981ification yeah, the "common sense" of low educated , low IQ peoples.

    • @lo2740
      @lo2740 ปีที่แล้ว

      you have very low education, right?

  • @Pendoza84
    @Pendoza84 ปีที่แล้ว +4

    This was a good one. Super relatable too.. Keep it up!

  • @fatalinsomn1a182
    @fatalinsomn1a182 ปีที่แล้ว +4

    Certain groups really need both isolated internal networks with physical transfer of information, and also some completely invisible hardware logging tools. Also you should use linguistic analysis, and look for many unrelated clues to find a common trend to defeat diversion tactics.

  • @imnotahippie22
    @imnotahippie22 ปีที่แล้ว +20

    The majority of Government doesn't prevent attacks. They sit by as they happen and swoop in to point the finger at who did it. In my opinion

    • @n0madfernan257
      @n0madfernan257 ปีที่แล้ว +4

      kinda reminds me that ww2 an attack message was intercepted before pearl harbor was bomb so they can announce retaliation

    • @nancysmith2389
      @nancysmith2389 ปีที่แล้ว

      Better than not knowing. Like now. Hee hee hee.

    • @meepk633
      @meepk633 4 หลายเดือนก่อน

      I love to make vapid guesses based on nothing but anti-establishment word association. In my opinion.

  • @jtw-r
    @jtw-r ปีที่แล้ว +3

    “infosec dumpster fire putter-outer” 😂😂

  • @slavaboggu
    @slavaboggu ปีที่แล้ว +31

    Wow, not too far fetched of an idea to think this Jack guy is still working for nsa as a sheep dipped agent. Can’t think of a better way to gain access to highly sensitive equipment than a security consultant. Jeez, even the company name is suspicious - rendition security. One thing comes to mind for me is the rendition torture sites used by the us gov around the world. Scary stuff. Too bad the host didn’t bring this angle up.

    • @goodknight4132
      @goodknight4132 ปีที่แล้ว +2

      Car telll

    • @krotchlickmeugh627
      @krotchlickmeugh627 ปีที่แล้ว

      He didn't bring it up because hes trying to suck nuts to get in the club. I mean hes pushing russiagate bullshit.

    • @DebianOchoa-mf4iv
      @DebianOchoa-mf4iv ปีที่แล้ว

      It certainly wouldn't be unheard of. It is well known that many of the deep state agencies pay influencers to move the publics opinión on the governments overreach.

    • @oiuhwoechwe
      @oiuhwoechwe ปีที่แล้ว +3

      lol yeah. "let me just patch this router for you"....

    • @tonyk438
      @tonyk438 ปีที่แล้ว

      Yeah, and then just take anything the former NSA guy writes/says as possible disinformation. Possible false flag. Look at the targeting of Russia by mainstream media, especially since invasion of Ukraine.

  • @dronefish9629
    @dronefish9629 7 หลายเดือนก่อน

    I came here a year later to listen again. My favourite podcast ever, I think.

  • @herbert5491
    @herbert5491 ปีที่แล้ว +3

    Thank you. I remember well when the NSA was offering over one million for the return of a specific hacking tool. It could also have been a trick to catch the hackers. Never found out the end result

    • @Arbiter710
      @Arbiter710 ปีที่แล้ว +1

      Prob both

    • @herbert5491
      @herbert5491 ปีที่แล้ว

      @@Arbiter710 Probably but the one, or ones that stole it would not be that stupid to return it

    • @Arbiter710
      @Arbiter710 ปีที่แล้ว

      @@herbert5491 I doubt they stole it, this smells like an Edward Snowden Russia dry up… this was the last bit they could get till they sucked him dry

  • @travelinman70
    @travelinman70 ปีที่แล้ว +11

    If event logs can be edit, then you can change events to point to someone else hacking in the system.
    Notice I didn't say "researching" the system. because let's be fair here "researchers" are hackers. If someone is researching exploits, they're hacking.

  • @jowb-wf5tg
    @jowb-wf5tg ปีที่แล้ว +7

    shadow brokers would be watching this video for sure🤣

  • @chasefoster8092
    @chasefoster8092 ปีที่แล้ว +1

    In a top tier category? Nah! They are the top tier! Fictional levels of legendary! The stuff you only see in movies! This is awesomeness in carnate!

  • @robotron1236
    @robotron1236 6 หลายเดือนก่อน +2

    😂😂😂 The NSA was probably behind shadow brokers. These exploits were released right after they were patched. I wouldn’t put it past them. They were SO desperate to stop the bad orange man 😂

    • @meepk633
      @meepk633 4 หลายเดือนก่อน

      What if your dad saw you spamming emojis like this? What would he say?

  • @FRM101
    @FRM101 4 หลายเดือนก่อน

    'Rendition' Security. 😂
    I like this guy already.

  • @Caurnots
    @Caurnots ปีที่แล้ว

    My favorite podcast by far. There are some amazing stories!

  • @brainiacrawkib8135
    @brainiacrawkib8135 ปีที่แล้ว +7

    Thanks Jack, pls can you share a link to the Advance Network Tools catalogue. Will like to read more on that

  • @Nourrights_psalm118.8
    @Nourrights_psalm118.8 2 หลายเดือนก่อน +1

    You know it's bad when his first concern was what is the USA government going to do..... What type of world are we living in people??? WAKE UP

  • @tdbla98
    @tdbla98 ปีที่แล้ว

    This is my fave episode by far. Great stuff man

  • @LordJackass
    @LordJackass ปีที่แล้ว

    I couldn't stop thinking about the Jaboody Dubs dumps skit when you mentioned the broker dumps. Very interesting podcast ya got here though, genuinely.

  • @daxramdac7194
    @daxramdac7194 ปีที่แล้ว +2

    I'm sure a lot of the hardware and software they've made is fairly impressive. But breaking into a targets hotel room, especially when they have complete clearance to do so, I mean it's pretty easy when you have that kind of power. At that point, the tools create themselves.

  • @keithp6054
    @keithp6054 ปีที่แล้ว +10

    What if the equation released the tools as a way to publicly hack certain groups while giving cover by claiming those tools were used by an "opposition" group?

    • @daneanderson737
      @daneanderson737 ปีที่แล้ว

      True

    • @AnnieNelson-wo6bm
      @AnnieNelson-wo6bm ปีที่แล้ว

      That does not explain why they are terrorizing me with it I've done nothing to no one

  • @rahulramteke3338
    @rahulramteke3338 8 หลายเดือนก่อน +1

    Alternate title: NSA gets mogged by Shadow Brokers

  • @HighSpeedNoDrag
    @HighSpeedNoDrag ปีที่แล้ว +2

    The last couple of years prior to my seperation/retirement from the Gov., CISO was implemented. In a nutshell, a low leverl hacker could negotiate and or hack the system and eventually, IOT's assistance or corrective action was ZERO.

  • @johnfarmer3506
    @johnfarmer3506 ปีที่แล้ว +3

    How did Martin only get nine years? How did the FBI or why did the FBI not read Harold his rights during his initial arrest and confession?

  • @mohmadhafiz1675
    @mohmadhafiz1675 ปีที่แล้ว +3

    This is true fuzzbunch exploits still in use, since most companies around the world are using outdated os like xp,7, sever 2008 but it's in their internal network 🤫

  • @veteranmuscle
    @veteranmuscle ปีที่แล้ว +4

    As always Jack, great episode broheim. Now, we can sit here and blame the Russians and any other nation state that have these capabilities all we want OR we can look within 😬

  • @frankjohnson8750
    @frankjohnson8750 ปีที่แล้ว +6

    All these hacks seem to make computer networks useless 😐

  • @janinegarverick5642
    @janinegarverick5642 ปีที่แล้ว +4

    Pegasus and Spyware technologies can use voice technology attacking its victims with warfare technologies

    • @krotchlickmeugh627
      @krotchlickmeugh627 ปีที่แล้ว +3

      They also use their massive data files of us. Our voice from listening every day. Then use A.I. to say whatever they want us to say. Then prosecute us for crimes that we never did.

    • @johnfarmer3506
      @johnfarmer3506 ปีที่แล้ว

      A lot of youtube accounts were created at the end of 2022

  • @evanallen5377
    @evanallen5377 ปีที่แล้ว

    Man, that signoff... "don't hack like my brother" "and don't hack like my brothet"

  • @smartwatchonpluto
    @smartwatchonpluto 7 หลายเดือนก่อน +1

    Snowden wasn't a privacy advocate, he was a spy.

  • @MAX-nv6yj
    @MAX-nv6yj ปีที่แล้ว +1

    On its time I just finish day 6 quest AoC
    Let’s just watch this amazing content😍❤❤❤

  • @Lei_Wong
    @Lei_Wong ปีที่แล้ว +1

    Great episode Jack,... as always

  • @CyberSnakeEater
    @CyberSnakeEater 3 หลายเดือนก่อน

    They called him dirty grandpa because they already took a look at his hard drive

  • @wizardmack3551
    @wizardmack3551 ปีที่แล้ว

    Your wrap up at the end of this episode should have been at the start,, it would have helped clarify some issues. Thanks again for all your hard work!!!

  • @LuigiMordelAlaume
    @LuigiMordelAlaume ปีที่แล้ว +1

    This is the #1 argument against governments wanting backdoors, like the apple phone encryption and end-to-end messengers

  • @cipanexalandros7658
    @cipanexalandros7658 ปีที่แล้ว +2

    Once NSA ... 4eva NSA!

  • @lwiltshire
    @lwiltshire ปีที่แล้ว +6

    Jack seriously doesn't know why handsy, sniffer Joe would be referred to as Dirty Grandpa?

  • @chadyonfire7878
    @chadyonfire7878 ปีที่แล้ว

    This is crazy content man . Thx wish u more support

  • @oodles86
    @oodles86 ปีที่แล้ว +1

    Cool. Some of this parallels with what I've been reading in Sandworm lately.

    • @sandworm9528
      @sandworm9528 ปีที่แล้ว +1

      Great book 😂

    • @oodles86
      @oodles86 ปีที่แล้ว

      @@sandworm9528 must've really impacted you haha

  • @DudeAndDogsSailing
    @DudeAndDogsSailing 8 หลายเดือนก่อน

    I have been awful about 👍 all these amazing interviews. Shucks...guess i just have to watch them all again.

  • @SalamiMommie
    @SalamiMommie ปีที่แล้ว +1

    considering he worked for the NSA and the brokers implied he was part of the Q group, that should tell people a lot!

  • @vihangapramodya405
    @vihangapramodya405 ปีที่แล้ว +7

    i remember i've downloaded this archive few years ago. most of them flaged as viruses though.

  • @georgewbushcenterforintell147
    @georgewbushcenterforintell147 ปีที่แล้ว

    The name dirty grampa is gonna come back in style

  • @thedamnedatheist
    @thedamnedatheist ปีที่แล้ว +6

    Why would a nation state act like this to begin with? Those tools were much more valuable kept quiet & used than to tell everyone they exist & have been compromised. Any intelligence agency would give their right arm for those sort of tools. It makes me think there is much more to the story than we know.

    • @dilligaf8349
      @dilligaf8349 ปีที่แล้ว

      Ever wondered if we're just super advanced Ai with a written script back at the point of creating basic Ai? Or maybe think of yourself as a tiny part of the big mechanism. The corruptible parts within are the same all the way up the chain.

    • @actuallynotsteve
      @actuallynotsteve 11 หลายเดือนก่อน

      I've thought for a LONG time that Snowden was a limited hangout, chosen for the role, and might be a double agent in Russia.
      Some of the tech make not even exist, but is designed to make Russia and China think they do.

    • @FragmentedLore
      @FragmentedLore 10 หลายเดือนก่อน

      I came to a similar conclusion based on geopolitical insight and human motivation. I doubt the NSA data dump was done by any foreign (un)official state program. Most state groups would study and backward engineer those NSA tools and keep it quiet as to not allow those tools to lose their viability. No this feels like an internal leaker or psy-op/recruitment activator. Those two things aren't mutually exclusive either.
      You could dump data in the form of hacking tools to invigorate new people into wanting to learn more and use those tools. This then turns up (in)voluntary recruitment into agencies which are in need of fresh potential.
      Money obviously wasn't the goal despite what they may have said, applying false motivation is classic misdirection. That's also why it's obviously not a state actor, auctions for Intel like this go on in back rooms, embassies, and secure channels. Not in public, unless the goal is to humiliate. If humiliation was the goal it would have blown up, but this died down and has so far gone back into the shadows. For now anyways.

  • @johnfarmer3506
    @johnfarmer3506 ปีที่แล้ว +1

    The thing I don't get about the NSA catalog is why they put all the eggs in one basket. If you have a retirement account, you don't allow direct access; you open another account and transfer money as needed. And this is after knowing that the NSA has lost tera bits of information. The narrative just does not seem 100% true.

    • @noahway13
      @noahway13 ปีที่แล้ว

      Totally agree. And this guest was so sus. He did not say ONE thing definitive--- Half of us thought it was this, the other half thought it was that, and I was thinking it might be, or might not be.. but that is the most I can say without saying for sure either way... I can almost say for sure that I think they were not just guessing... blah, blah, blah. What a load of shit.

  • @AnonymousQwerty
    @AnonymousQwerty หลายเดือนก่อน

    No. Intel agencies don’t “intercept” the hardware to put their firmware on it, they have backdoors in the firmware from the beginning

  • @grumpent
    @grumpent ปีที่แล้ว +1

    Bro been stuttering and nervous explaining he wouldn’t be surprised if he gets indicted by another country 💀

  • @wwjd6041
    @wwjd6041 ปีที่แล้ว +2

    When I was young, I ......

  • @domdirector
    @domdirector ปีที่แล้ว +2

    “Cisco didn’t know” thats bull crap

  • @digiworld1212
    @digiworld1212 ปีที่แล้ว +2

    Keep it up the great work.

  • @adrianalexandrov7730
    @adrianalexandrov7730 หลายเดือนก่อน

    Interesting when one of their own is really worried about what the government gonna do...
    Also, why is he so worried about people and clients?
    I haven't heard of marines fearing that people would know.
    So it sems like NSA doesn't think of themselves as a heroes serving US citizens and that they see people as enemy.

  • @bany512
    @bany512 ปีที่แล้ว +6

    spy game is much more than just "hacking"

    • @DgarciaA-hj8qc
      @DgarciaA-hj8qc ปีที่แล้ว +1

      That is true I was aware since a pal told me about how to notice and know that is one of my most interesting life experience

  • @Robbie_jojo
    @Robbie_jojo ปีที่แล้ว

    I also have a sock at home,but it's dirty one 😂

  • @dffabryr
    @dffabryr ปีที่แล้ว +1

    NSA does not need to search for weaknesses and/or zero day attacks, or any vulnerabities. If that take place they will be steps back from their ennemies. If you want to be "offensive" you must know about weaknesses months before new program releases/updates/upgrades take place

    • @jamescollier3
      @jamescollier3 ปีที่แล้ว +2

      They are involved with MS, apple, Samsung etc . remember when they opened that i phone?

  • @itsmmdoha
    @itsmmdoha ปีที่แล้ว +1

    Love this Jack!

  • @amos660
    @amos660 ปีที่แล้ว +1

    same people who didn't steal it in every EU country at the exact same UTC.

  • @aphaomega0098
    @aphaomega0098 7 หลายเดือนก่อน

    My guess is that they are 3 people all men or possibly 1 woman in the group. One of them works or worked at the NSA it would have to be someone who had the minimal clearance needed for the ANT catalougue. Wouldve quit about 6 to 8 months after the 2017 leak to avoid suspicion. Most likely someone with talent but never recognized or always passed over for promotion.

    • @o1-preview
      @o1-preview 15 วันที่ผ่านมา

      could be, but I think it was probably a zero day attack on an attack server with some of the loaded ANT tools, not all of them.. who knows

  • @Ghostfancoder
    @Ghostfancoder ปีที่แล้ว

    I just found your channel. It’s bad ass!!!

  • @VitalTechnology_
    @VitalTechnology_ ปีที่แล้ว +2

    Thanks Jack!

  • @NiclasHorn
    @NiclasHorn ปีที่แล้ว +4

    All i can say, keep en eye or ear open for Russian powergrid "hack" in the future.

  • @vstoykovbg
    @vstoykovbg ปีที่แล้ว +1

    43:30 Another problem: NSA is using the same software (Microsoft Windows) with the same vulnerabilities. The enemy may find out about these vulnerabilities and use them against NSA and against other US government agencies and US private companies.

    • @alexeilindes7507
      @alexeilindes7507 ปีที่แล้ว

      I think this would be ideal at this point. I like the shadow brokerss.

    • @100c0c
      @100c0c ปีที่แล้ว

      @@alexeilindes7507 why would that be ideal?

    • @johnfarmer3506
      @johnfarmer3506 ปีที่แล้ว

      Maybe that is how they did it. They used one of the vulnerabilities listed in the NSA catalog and then got the rest.

  • @silver1407
    @silver1407 ปีที่แล้ว +2

    pay attention to how the guest uses their words and avoids proper nouns often. he knows how algorithms can find and enumerate the things you say and associate them with your global "profile"

    • @meepk633
      @meepk633 4 หลายเดือนก่อน

      Vicarious schizophrenia. You hate to see it.

  • @josephpace3438
    @josephpace3438 ปีที่แล้ว

    at 1:51 You described an OMG cable... you have been able to buy them for years for a few hundo...

  • @chubtochamp1208
    @chubtochamp1208 ปีที่แล้ว +1

    The first thing you talk about, the USB, sounds exactly like hak5 omg cable. Way cheaper than 20,000

    • @saxxonpike
      @saxxonpike ปีที่แล้ว +3

      Of course they can be made for way cheaper, especially since there have been advancements in tech since 2009. But if I'm the contracted company that's manufacturing these in secret? You bet I'm going to milk that contract for all it's worth.

  • @jmichaelbest1941
    @jmichaelbest1941 ปีที่แล้ว +2

    I stole the NSA's tools 10 years ago and i still have them

    • @HighSpeedNoDrag
      @HighSpeedNoDrag ปีที่แล้ว

      Does the GAO know?

    • @Teluric2
      @Teluric2 ปีที่แล้ว +1

      Ye right. Quit the dope

  • @nancysmith2389
    @nancysmith2389 ปีที่แล้ว

    Oooh. Someone stole the NSA's playbook.

  • @TheStringBreaker
    @TheStringBreaker ปีที่แล้ว

    *Phenomenal episode!*

  • @janinegarverick5642
    @janinegarverick5642 ปีที่แล้ว

    Exactly and he doesn't want the public to know lol

  • @RobbyHouseIV
    @RobbyHouseIV ปีที่แล้ว +1

    If the Shadow Brokers hacking group worked on behalf of a nation-state wouldn't it behoove said nation-state to keep the hacker's findings (hacking tools, malware, etc.) a secret and use those tools found for their own clandestine hacking abilities?

    • @FragmentedLore
      @FragmentedLore 10 หลายเดือนก่อน

      Yeah it's as if someone wanted to blame a feign entity. The bad grammar is funny for many reasons.
      A. It keeps you from sounding like yourself
      B. Everyone knows about Google but state agencies have specialized interpreters.
      Preying on ignorance is an Intel agency tactic. This smells like psy-op/recruitment material. Purposefully leak dated tools to invigorate new blood to test and learn to hack. It may be they have backdoors and scripts embedded in the tools themselves, leaking the info or location of the person using them. This turns up (in)voluntary recruitment into the intelligence field. I'm sure this has to be an inside job either (un)officially. Windows response was way too fast. Microsoft must have had a fix for the NSAs exploit ahead of time and intentionally left the vulnerability intact. Thats my take anyway.

    • @meepk633
      @meepk633 4 หลายเดือนก่อน

      No. They weren't state-of-the-art tools. They were more valuable as fuel for the conspiratorial brain fire that is currently destroying America.

  • @Morristown337
    @Morristown337 21 วันที่ผ่านมา

    20$k for a keylogger that requires someone to be close by instead of recording and sending the data via interenet connection out or just saving to a hidden file that a person can return days later to receive the recorded keystrokes? I am in the wrong business. I need to be producing keyloggers.

  • @tjoleary8738
    @tjoleary8738 ปีที่แล้ว

    Sandworm rocked....my favourite book, by far!