Who Stole the NSA's Top Secret Hacking Tools?🎙Darknet Diaries Ep. 53: Shadow Brokers

Поделиться
HTML-код
  • Опубликовано: 20 ноя 2024
  • The NSA has a super secret catalog of sci-fi level cyber weapons. Then one day in 2016, someone started auctioning them off on Twitter.
    Visit darknetdiaries... for a list of sources, full transcripts, and to listen to all episodes.

Комментарии • 817

  • @Mp-jw1qg
    @Mp-jw1qg Год назад +416

    In highschool, they took my internet access away on my account so i made a kernel level bootloader that would bypass the schools login system and would boot the native windows xp at the time. I was better at c++ than the teacher and often times i was just sitting in class playing counter strike 1.6. I found a vulnerability in the schools CISCO network and how it was tied in to AERIES software that the teachers used to keep grades. There was a default login and password that would allow me to get passed the firewall and into the actual login page. The school computer lab had a program that was essentially a key logger that would log the students typing assignments to judge accuracy of the students typing. I Found the master cd copy of that program with the master license one day and cloned it. I went and installed that program on the economics teachers pc and waited for him to login to ARIES. I logged in and changed everyones grades in ARIES and then logged into his user account wich as admin for the network and i turned my interent access back on and gave myself admin privelages. I only got caught because i was playing counter strike in class one day on the schools video editing pc and i was the only one who could have done it. I was young and stupid. I didnt get to graduate on stage and I lost my college scholarship because of it. I gave up programming and went to college for chemistry. I probably would have gotten in real trouble had i not matured and gave that stuff up.

    • @dimi_95
      @dimi_95 Год назад +26

      I love your story, hope everything worked out for you

    • @laoso8776
      @laoso8776 Год назад +44

      Why did you not go to school if you could do all that?

    • @paganizonda1000ps
      @paganizonda1000ps Год назад +36

      Man everything came out because you played too much. Sad that you didnt study cs.

    • @jacksparrow3490
      @jacksparrow3490 Год назад +54

      Those skills will come in handy when they turn off your digital money once the social credit score system hits.

    • @ihakker1416
      @ihakker1416 Год назад +34

      Wtf I just freaked out reading this. This story is creepily similar to something I did
      And I also gave up programming and went to college for chemistry.
      Wtf

  • @Ye4rZero
    @Ye4rZero Год назад +198

    The person who deserves real recognition is whoevers in charge of naming the NSA's tools. Deity bounce? Fkn awesome

    • @schwingedeshaehers
      @schwingedeshaehers Год назад +16

      It is a program, that gives random name (but they often use more than one try)

    • @theRPGmaster
      @theRPGmaster Год назад +24

      @@schwingedeshaehers That's classified. You've said too much.

    • @schwingedeshaehers
      @schwingedeshaehers Год назад +11

      @@theRPGmaster it is at least public since Edward Snowden wrote it in his book.

    • @famousartguymeme
      @famousartguymeme Год назад +6

      @@schwingedeshaehers public dosent mean de-classafied, please report to your nearest ODNI office for apprehension and impreseanmeant.

    • @schwingedeshaehers
      @schwingedeshaehers Год назад +6

      @@famousartguymeme where do I find it? Do you take the cost to get there? Can I get immunity when entering the USA?

  • @Yerbah
    @Yerbah Год назад +322

    Doing my coding final and saw this pop up. I did my first CTF this year. I have learned alot from this channel. Thank you for the community.

    • @Ataraxia_Atom
      @Ataraxia_Atom Год назад +5

      How was your first CTF? What have you been using to learn?

    • @everythinggaming1536
      @everythinggaming1536 Год назад

      Same lol

    • @ssimple-4621
      @ssimple-4621 Год назад

      im in the same situation, doing my final paper on cyberattacks, hacking and security

    • @Ataraxia_Atom
      @Ataraxia_Atom Год назад +4

      @@brenndandeffendall6211 thank you for your reply, I've been doing the Advent of cyber which has been super fun after spending about 10 months teaching myself web development and JavaScript, I'll check out the guardian group forsure

    • @mossdem
      @mossdem Год назад +4

      @@Ataraxia_Atom you’ll like John Hammond. Just search that name on RUclips :)

  • @arupball1505
    @arupball1505 Год назад +81

    Your podcast is music to my ears , don't ever stop this series FREAKING "NEVER"

  • @captain_hanzo
    @captain_hanzo Год назад +168

    When I first stumbled upon this channel I was like "yeah what is this gonna do for me when I listen to the podcast every other week" but man you put out so many banger episodes like this that are well worth listening again to. Either they're interesting/suspenseful/entertaining enough on their own or we know things now that put a couple episodes in another context retroactively.

    • @Joe60459
      @Joe60459 Год назад +2

      What episodes are you referring to that the perspective changed on?

    • @captain_hanzo
      @captain_hanzo Год назад +3

      @@Joe60459 I wish I could think of a couple more episodes from the top of my head to illustrate my point but one I can think of instantly is the one with the FBI agent that investigated the bombing of the USS Cole in 2000. The episode ends on the kinda grim, sobering note that if it were not for the unprofessional and (arguably) unnecessary secretive behavior/relationship between the FBI and CIA, the 9/11 perpetrators would have gotten under a lot more scrutiny before they even took flying lessons especially with the information the FBI agent from the episode unearthed). After the 20th anniversary of 9/11 there was a flood of new documentaries, essays, analyses and to me it is shocking how close the authorities actually were and how the new information corroborates what the agent in the episode tells. Makes the episode even more bone chilling and what happened seems to be in fact as grim and sobering as the FBI agent's retelling implied.

    • @Rooot-username
      @Rooot-username Год назад +1

      Same. Ended up binge listening lmao

    • @valkyr1985swe
      @valkyr1985swe Год назад +3

      Myself can't believe i just found this channel. Been listening to the podcast for years. Why haven't I found this before.

    • @KenSherman
      @KenSherman Год назад

      16:00
      _Resend/rescind the message. We have the capacity to do it..._ Yep, that sound like Biden.

  • @oldgoat8861
    @oldgoat8861 Год назад +18

    These episodes/stories are fantastic to listen to. Reminds me of early 70's Documentaries and interviews....but....This guy believe it or not is better. He expands beyond the content and establishes a base layer, then delves deeper.

  • @byron2334
    @byron2334 Год назад +390

    People need to understand that literally the only difference between a government and a street gang is membership numbers.

    • @playtester6635
      @playtester6635 Год назад +72

      The difference between a State and a criminal gang is that the State is the gang that won

    • @johnrodgers2171
      @johnrodgers2171 Год назад +14

      Ok let's go with having no government because anarchy would be fun

    • @jaygin6518
      @jaygin6518 Год назад +7

      Nope

    • @TwinTurboOnly
      @TwinTurboOnly Год назад +15

      No it’s being on the right side of the law lol. Those who make the rules. Break the rules.

    • @imt3206
      @imt3206 Год назад +1

      @@johnrodgers2171 yes

  • @tonyzone8999
    @tonyzone8999 7 месяцев назад +2

    I’m going to have to tip my hat. Absolutely brilliant stuff. A lot of this is 100% unavoidable.

  • @horsied
    @horsied Год назад +202

    anyone who thinks the NSA isn’t on the offensive is insane. Cmon, we all know the best defense is offense…

    • @TomTom-gx1sm
      @TomTom-gx1sm Год назад

      Of course they are war of tomorrow will be drones vs drones & taking over the network / hijacking those drones...

    • @Electron42
      @Electron42 Год назад +20

      Thanks Patriot Act!

    • @justcallmetruman
      @justcallmetruman Год назад +20

      I don't consider them on the side of the us citizens that's for sure

    • @Stopinvadingmyhardware
      @Stopinvadingmyhardware Год назад

      I bet they are offended. Those losers.

    • @rxsk
      @rxsk Год назад +1

      Best offense is defense.

  • @bryceburns429
    @bryceburns429 Год назад +14

    Never correct your enemies when they are making a mistake 😊

  • @vyrenpevo979
    @vyrenpevo979 Год назад +31

    This is the second best pod I've picked up this year. Binged every ep over the last few week. Great work, Jack. Keep it up!

    • @johnstuckaiii
      @johnstuckaiii Год назад +2

      What's the other one (please) ?

    • @vyrenpevo979
      @vyrenpevo979 Год назад +8

      @@johnstuckaiii Hehe. Conan Needs A Friend.

    • @juandager5220
      @juandager5220 Год назад

      Sounds like the old Get Smart joke...

    • @msergio0293
      @msergio0293 7 месяцев назад

      ​@@johnstuckaiii A man of culture

  • @gregh7457
    @gregh7457 Год назад +16

    i had a nightmare the other night that quantum computers had finally cracked all encryption and all the bad actors had sprung into action decrypting all the encrypted data they had collected and stored for years

    • @DgarciaA-hj8qc
      @DgarciaA-hj8qc Год назад

      Fuck man interesting?

    • @DgarciaA-hj8qc
      @DgarciaA-hj8qc Год назад +3

      Eventually that's what gonna happen or it already has happend it's just a matter of timing when all the nukes launch

  • @HecTechFPV
    @HecTechFPV Год назад +7

    New TEMPEST exploits are being found all the time, the other week I was reading about malware that used the sata cables as a rf transmitter to pipe out.

  • @savagepro9060
    @savagepro9060 Год назад +3

    0:05 " . . . one such news story I SAW, was some security news I HEARD . . ."

  • @aetherwizard3218
    @aetherwizard3218 Год назад +19

    Oh no you were right the first time. the NSA certainly sees every single member of the public as their enemy.

    • @meepk633
      @meepk633 6 месяцев назад

      This is just silly. It doesn't even make sense on a practical level. You've never been coerced by the NSA to do anything in your entire life. You never will. You'll probably never interact with them in any way. I know it's fun to imagine that you are some oppressed freedom fighter, but you aren't. You're a citizen in a democratic country with remarkably low corruption.

  • @benruniko
    @benruniko Год назад +3

    Wow I remember manipulating pretend logs as a kid in the Uplink game. Little did I know that would someday be possible!

  • @shadowuaw-0001
    @shadowuaw-0001 Год назад +14

    Always Christmas, when a new episode drops. Keep up the great work Jack!

  • @dronefish9629
    @dronefish9629 9 месяцев назад

    I came here a year later to listen again. My favourite podcast ever, I think.

  • @guruoo
    @guruoo Год назад +7

    Got lucky, and caught a deal on the whole set of NSA tools on markdown day at Goodwill.

  • @ttmilk6633
    @ttmilk6633 Год назад +3

    Went to my first B-Sides! Thanks Jack for letting me know about them!

  • @jonnyphenomenon
    @jonnyphenomenon Год назад +11

    TEMPEST (transient electroMagnetic pulse emanation surveillance technology) was a surveillance tech that could sniff the data sent over a vga cable to a targets monitor from hundreds of feet away. If the target has a vga cable without ferrite beads on the ends, these signals are incredibly strong. The system just amplified the signal and displayed it on the viewers screen where they could sit and watch from a van down the block (with a directional antenna aimed at the intended target).

  • @imnotahippie22
    @imnotahippie22 Год назад +20

    The majority of Government doesn't prevent attacks. They sit by as they happen and swoop in to point the finger at who did it. In my opinion

    • @n0madfernan257
      @n0madfernan257 Год назад +4

      kinda reminds me that ww2 an attack message was intercepted before pearl harbor was bomb so they can announce retaliation

    • @nancysmith2389
      @nancysmith2389 Год назад

      Better than not knowing. Like now. Hee hee hee.

    • @meepk633
      @meepk633 6 месяцев назад

      I love to make vapid guesses based on nothing but anti-establishment word association. In my opinion.

  • @mxcollin95
    @mxcollin95 Год назад +13

    New to the channel and am absolutely loving it! I’m definitely learning a lot too as I have no computer nerd skills to speak of but I’m learning! 🤙

  • @issamelarmi
    @issamelarmi Год назад +1

    Just tumbled randomly upon the channel and i got to say, i love this

  • @fatalinsomn1a182
    @fatalinsomn1a182 Год назад +4

    Certain groups really need both isolated internal networks with physical transfer of information, and also some completely invisible hardware logging tools. Also you should use linguistic analysis, and look for many unrelated clues to find a common trend to defeat diversion tactics.

  • @omgemilyhd4500
    @omgemilyhd4500 Год назад +32

    Good to mention that ALL chinese vendors have been doing this to all hardware coming from China, ALL OF THEM.

    • @veramae4098
      @veramae4098 Год назад +1

      Source? I don't believe anything without some kind of credentials anymore.
      Retired librarian
      P.S. Although I do believe this because -- China.

    • @19801981ification
      @19801981ification Год назад +2

      ​@@veramae4098 silly use some common sense

    • @lo2740
      @lo2740 Год назад

      @@19801981ification yeah, the "common sense" of low educated , low IQ peoples.

    • @lo2740
      @lo2740 Год назад

      you have very low education, right?

  • @ScottCalvinsClause
    @ScottCalvinsClause Год назад +4

    God! I can't believe the rate at which you upload such quality

    • @bbertsamson8118
      @bbertsamson8118 Год назад +1

      It's awsome, i'v binge watch all of his work so fast and he's still able to provide more exciting testimonies
      My 2022 crush for sure

  • @brainiacrawkib8135
    @brainiacrawkib8135 Год назад +7

    Thanks Jack, pls can you share a link to the Advance Network Tools catalogue. Will like to read more on that

  • @F3PIZZA
    @F3PIZZA Год назад +2

    Oh, Jachary. Outstanding content. Thank you, dude. 😊

  • @HighSpeedNoDrag
    @HighSpeedNoDrag Год назад +2

    The last couple of years prior to my seperation/retirement from the Gov., CISO was implemented. In a nutshell, a low leverl hacker could negotiate and or hack the system and eventually, IOT's assistance or corrective action was ZERO.

  • @gh0stm0nst3r6
    @gh0stm0nst3r6 Год назад +1

    I listen to this on Google Podcasts when showering. There's soooooo much more on here. OMG this is so great. Thank you so much Jack! Subbed, Liked, and Shared up!

  • @mashmasho
    @mashmasho Год назад +6

    This podcast is fantastic. I’ve learned so much!

  • @daxramdac7194
    @daxramdac7194 Год назад +2

    I'm sure a lot of the hardware and software they've made is fairly impressive. But breaking into a targets hotel room, especially when they have complete clearance to do so, I mean it's pretty easy when you have that kind of power. At that point, the tools create themselves.

  • @frankjohnson8750
    @frankjohnson8750 Год назад +7

    All these hacks seem to make computer networks useless 😐

  • @herbert5491
    @herbert5491 Год назад +3

    Thank you. I remember well when the NSA was offering over one million for the return of a specific hacking tool. It could also have been a trick to catch the hackers. Never found out the end result

    • @Arbiter710
      @Arbiter710 Год назад +1

      Prob both

    • @herbert5491
      @herbert5491 Год назад

      @@Arbiter710 Probably but the one, or ones that stole it would not be that stupid to return it

    • @Arbiter710
      @Arbiter710 Год назад

      @@herbert5491 I doubt they stole it, this smells like an Edward Snowden Russia dry up… this was the last bit they could get till they sucked him dry

  • @baineking271
    @baineking271 Год назад +4

    One of the best podcast ever. Keep it up!

  • @travelinman70
    @travelinman70 Год назад +11

    If event logs can be edit, then you can change events to point to someone else hacking in the system.
    Notice I didn't say "researching" the system. because let's be fair here "researchers" are hackers. If someone is researching exploits, they're hacking.

  • @slavaboggu
    @slavaboggu Год назад +31

    Wow, not too far fetched of an idea to think this Jack guy is still working for nsa as a sheep dipped agent. Can’t think of a better way to gain access to highly sensitive equipment than a security consultant. Jeez, even the company name is suspicious - rendition security. One thing comes to mind for me is the rendition torture sites used by the us gov around the world. Scary stuff. Too bad the host didn’t bring this angle up.

    • @goodknight4132
      @goodknight4132 Год назад +2

      Car telll

    • @krotchlickmeugh627
      @krotchlickmeugh627 Год назад

      He didn't bring it up because hes trying to suck nuts to get in the club. I mean hes pushing russiagate bullshit.

    • @DebianOchoa-mf4iv
      @DebianOchoa-mf4iv Год назад

      It certainly wouldn't be unheard of. It is well known that many of the deep state agencies pay influencers to move the publics opinión on the governments overreach.

    • @oiuhwoechwe
      @oiuhwoechwe Год назад +3

      lol yeah. "let me just patch this router for you"....

    • @tonyk438
      @tonyk438 Год назад

      Yeah, and then just take anything the former NSA guy writes/says as possible disinformation. Possible false flag. Look at the targeting of Russia by mainstream media, especially since invasion of Ukraine.

  • @johnfarmer3506
    @johnfarmer3506 Год назад +3

    How did Martin only get nine years? How did the FBI or why did the FBI not read Harold his rights during his initial arrest and confession?

  • @wizardmack3551
    @wizardmack3551 Год назад

    Your wrap up at the end of this episode should have been at the start,, it would have helped clarify some issues. Thanks again for all your hard work!!!

  • @HazyJ28
    @HazyJ28 Год назад +5

    How is it 2023 and the public has never seen wireless VGA or HDMI. How come we're always 10-20 years behind the government, Im tired of it. Intel WiDi and MIRACAST (basically just WiFi direct) doesn't cut it.

    • @Garrett.
      @Garrett. 29 дней назад

      The teradek ace has been around for years, it's just really expensive.

    • @sporkybutterz
      @sporkybutterz 24 дня назад

      These tools are now available to the public

  • @Pendoza84
    @Pendoza84 Год назад +4

    This was a good one. Super relatable too.. Keep it up!

  • @Nourrights_psalm118.8
    @Nourrights_psalm118.8 5 месяцев назад +1

    You know it's bad when his first concern was what is the USA government going to do..... What type of world are we living in people??? WAKE UP

  • @jtw-r
    @jtw-r Год назад +3

    “infosec dumpster fire putter-outer” 😂😂

  • @thedamnedatheist
    @thedamnedatheist Год назад +6

    Why would a nation state act like this to begin with? Those tools were much more valuable kept quiet & used than to tell everyone they exist & have been compromised. Any intelligence agency would give their right arm for those sort of tools. It makes me think there is much more to the story than we know.

    • @dilligaf8349
      @dilligaf8349 Год назад

      Ever wondered if we're just super advanced Ai with a written script back at the point of creating basic Ai? Or maybe think of yourself as a tiny part of the big mechanism. The corruptible parts within are the same all the way up the chain.

    • @actuallynotsteve
      @actuallynotsteve Год назад

      I've thought for a LONG time that Snowden was a limited hangout, chosen for the role, and might be a double agent in Russia.
      Some of the tech make not even exist, but is designed to make Russia and China think they do.

    • @FragmentedLore
      @FragmentedLore Год назад

      I came to a similar conclusion based on geopolitical insight and human motivation. I doubt the NSA data dump was done by any foreign (un)official state program. Most state groups would study and backward engineer those NSA tools and keep it quiet as to not allow those tools to lose their viability. No this feels like an internal leaker or psy-op/recruitment activator. Those two things aren't mutually exclusive either.
      You could dump data in the form of hacking tools to invigorate new people into wanting to learn more and use those tools. This then turns up (in)voluntary recruitment into agencies which are in need of fresh potential.
      Money obviously wasn't the goal despite what they may have said, applying false motivation is classic misdirection. That's also why it's obviously not a state actor, auctions for Intel like this go on in back rooms, embassies, and secure channels. Not in public, unless the goal is to humiliate. If humiliation was the goal it would have blown up, but this died down and has so far gone back into the shadows. For now anyways.

  • @mohmadhafiz1675
    @mohmadhafiz1675 Год назад +3

    This is true fuzzbunch exploits still in use, since most companies around the world are using outdated os like xp,7, sever 2008 but it's in their internal network 🤫

  • @jowb-wf5tg
    @jowb-wf5tg Год назад +7

    shadow brokers would be watching this video for sure🤣

  • @SalamiMommie
    @SalamiMommie Год назад +1

    considering he worked for the NSA and the brokers implied he was part of the Q group, that should tell people a lot!

  • @FRM101
    @FRM101 7 месяцев назад

    'Rendition' Security. 😂
    I like this guy already.

  • @DudeAndDogsSailing
    @DudeAndDogsSailing 10 месяцев назад

    I have been awful about 👍 all these amazing interviews. Shucks...guess i just have to watch them all again.

  • @jayredbeard7433
    @jayredbeard7433 Год назад +6

    Love this stuff. Keep 'em coming.

  • @keithp6054
    @keithp6054 Год назад +10

    What if the equation released the tools as a way to publicly hack certain groups while giving cover by claiming those tools were used by an "opposition" group?

  • @chasefoster8092
    @chasefoster8092 Год назад +1

    In a top tier category? Nah! They are the top tier! Fictional levels of legendary! The stuff you only see in movies! This is awesomeness in carnate!

  • @dffabryr
    @dffabryr Год назад +1

    NSA does not need to search for weaknesses and/or zero day attacks, or any vulnerabities. If that take place they will be steps back from their ennemies. If you want to be "offensive" you must know about weaknesses months before new program releases/updates/upgrades take place

    • @jamescollier3
      @jamescollier3 Год назад +2

      They are involved with MS, apple, Samsung etc . remember when they opened that i phone?

  • @LuigiMordelAlaume
    @LuigiMordelAlaume Год назад +1

    This is the #1 argument against governments wanting backdoors, like the apple phone encryption and end-to-end messengers

  • @janinegarverick5642
    @janinegarverick5642 Год назад +4

    Pegasus and Spyware technologies can use voice technology attacking its victims with warfare technologies

    • @krotchlickmeugh627
      @krotchlickmeugh627 Год назад +3

      They also use their massive data files of us. Our voice from listening every day. Then use A.I. to say whatever they want us to say. Then prosecute us for crimes that we never did.

    • @johnfarmer3506
      @johnfarmer3506 Год назад

      A lot of youtube accounts were created at the end of 2022

  • @ehoffmann47
    @ehoffmann47 Год назад +19

    Dirty grandpa. Prerty spot on. We should've listened to them.....

    • @meepk633
      @meepk633 6 месяцев назад +3

      Almost like you're the easily manipulated target they had in mind.

  • @Sahxocnsba
    @Sahxocnsba Год назад

    This is my fave episode by far. Great stuff man

  • @MAX-nv6yj
    @MAX-nv6yj Год назад +1

    On its time I just finish day 6 quest AoC
    Let’s just watch this amazing content😍❤❤❤

  • @veteranmuscle
    @veteranmuscle Год назад +4

    As always Jack, great episode broheim. Now, we can sit here and blame the Russians and any other nation state that have these capabilities all we want OR we can look within 😬

  • @evanallen5377
    @evanallen5377 Год назад

    Man, that signoff... "don't hack like my brother" "and don't hack like my brothet"

  • @oodles86
    @oodles86 Год назад +1

    Cool. Some of this parallels with what I've been reading in Sandworm lately.

    • @sandworm9528
      @sandworm9528 Год назад +1

      Great book 😂

    • @oodles86
      @oodles86 Год назад

      @@sandworm9528 must've really impacted you haha

  • @rahulramteke3338
    @rahulramteke3338 11 месяцев назад +1

    Alternate title: NSA gets mogged by Shadow Brokers

  • @johnfarmer3506
    @johnfarmer3506 Год назад +1

    The thing I don't get about the NSA catalog is why they put all the eggs in one basket. If you have a retirement account, you don't allow direct access; you open another account and transfer money as needed. And this is after knowing that the NSA has lost tera bits of information. The narrative just does not seem 100% true.

    • @noahway13
      @noahway13 Год назад

      Totally agree. And this guest was so sus. He did not say ONE thing definitive--- Half of us thought it was this, the other half thought it was that, and I was thinking it might be, or might not be.. but that is the most I can say without saying for sure either way... I can almost say for sure that I think they were not just guessing... blah, blah, blah. What a load of shit.

  • @josephpace3438
    @josephpace3438 Год назад

    at 1:51 You described an OMG cable... you have been able to buy them for years for a few hundo...

  • @chadyonfire7878
    @chadyonfire7878 Год назад

    This is crazy content man . Thx wish u more support

  • @aphaomega0098
    @aphaomega0098 9 месяцев назад

    My guess is that they are 3 people all men or possibly 1 woman in the group. One of them works or worked at the NSA it would have to be someone who had the minimal clearance needed for the ANT catalougue. Wouldve quit about 6 to 8 months after the 2017 leak to avoid suspicion. Most likely someone with talent but never recognized or always passed over for promotion.

    • @o1-preview
      @o1-preview 2 месяца назад

      could be, but I think it was probably a zero day attack on an attack server with some of the loaded ANT tools, not all of them.. who knows

  • @vstoykovbg
    @vstoykovbg Год назад +1

    43:30 Another problem: NSA is using the same software (Microsoft Windows) with the same vulnerabilities. The enemy may find out about these vulnerabilities and use them against NSA and against other US government agencies and US private companies.

    • @alexeilindes7507
      @alexeilindes7507 Год назад

      I think this would be ideal at this point. I like the shadow brokerss.

    • @100c0c
      @100c0c Год назад

      @@alexeilindes7507 why would that be ideal?

    • @johnfarmer3506
      @johnfarmer3506 Год назад

      Maybe that is how they did it. They used one of the vulnerabilities listed in the NSA catalog and then got the rest.

  • @bany512
    @bany512 Год назад +6

    spy game is much more than just "hacking"

    • @DgarciaA-hj8qc
      @DgarciaA-hj8qc Год назад +1

      That is true I was aware since a pal told me about how to notice and know that is one of my most interesting life experience

  • @jonbikaku6133
    @jonbikaku6133 Год назад

    So ragemaster might be what Mr. Robot implied when Darlene attached some physical device to his monitor to grab screenshots etc.

  • @grumpent
    @grumpent Год назад +1

    Bro been stuttering and nervous explaining he wouldn’t be surprised if he gets indicted by another country 💀

  • @swilsonmc2
    @swilsonmc2 Год назад +9

    "why not indict the officers or generals or the leaders who signed the executive order?" 4D chess isn't so impressive when the players hands are all under the table making deals with each other. nation states are just what the plebs see. in reality there are a small number of players creating a system for the rest of us.

    • @veramae4098
      @veramae4098 Год назад

      What are your credentials?

    • @swilsonmc2
      @swilsonmc2 Год назад +1

      @Vera Mae ma'am, I'm sorry. I don't usually give out such sensitive information to people I'm not formally acquainted with.
      Now, if you're wondering what is in my background to support my previous statement, I would say I have two eyes to see and a pair of ears. That should be all anyone needs to notice the obvious duplicity of our leadership class where they're all working for more control over you and me.

  • @chubtochamp1208
    @chubtochamp1208 Год назад +1

    The first thing you talk about, the USB, sounds exactly like hak5 omg cable. Way cheaper than 20,000

    • @saxxonpike
      @saxxonpike Год назад +3

      Of course they can be made for way cheaper, especially since there have been advancements in tech since 2009. But if I'm the contracted company that's manufacturing these in secret? You bet I'm going to milk that contract for all it's worth.

  • @georgewbushcenterforintell147
    @georgewbushcenterforintell147 Год назад

    The name dirty grampa is gonna come back in style

  • @AnonymousQwerty
    @AnonymousQwerty 3 месяца назад

    No. Intel agencies don’t “intercept” the hardware to put their firmware on it, they have backdoors in the firmware from the beginning

  • @RaanDohmSchitt
    @RaanDohmSchitt Год назад

    the technology is available today for public use. you just have to know where to look for it because it is not mainstreamed.

  • @RobbyHouseIV
    @RobbyHouseIV Год назад +1

    If the Shadow Brokers hacking group worked on behalf of a nation-state wouldn't it behoove said nation-state to keep the hacker's findings (hacking tools, malware, etc.) a secret and use those tools found for their own clandestine hacking abilities?

    • @FragmentedLore
      @FragmentedLore Год назад

      Yeah it's as if someone wanted to blame a feign entity. The bad grammar is funny for many reasons.
      A. It keeps you from sounding like yourself
      B. Everyone knows about Google but state agencies have specialized interpreters.
      Preying on ignorance is an Intel agency tactic. This smells like psy-op/recruitment material. Purposefully leak dated tools to invigorate new blood to test and learn to hack. It may be they have backdoors and scripts embedded in the tools themselves, leaking the info or location of the person using them. This turns up (in)voluntary recruitment into the intelligence field. I'm sure this has to be an inside job either (un)officially. Windows response was way too fast. Microsoft must have had a fix for the NSAs exploit ahead of time and intentionally left the vulnerability intact. Thats my take anyway.

    • @meepk633
      @meepk633 6 месяцев назад

      No. They weren't state-of-the-art tools. They were more valuable as fuel for the conspiratorial brain fire that is currently destroying America.

  • @Ghostfancoder
    @Ghostfancoder Год назад

    I just found your channel. It’s bad ass!!!

  • @domdirector
    @domdirector Год назад +2

    “Cisco didn’t know” thats bull crap

  • @jspencer7788
    @jspencer7788 Год назад

    It was Robert Redford, River Phoenix, Sidney Poitier and Dan Ackroid.

  • @vihangapramodya405
    @vihangapramodya405 Год назад +7

    i remember i've downloaded this archive few years ago. most of them flaged as viruses though.

  • @adrianalexandrov7730
    @adrianalexandrov7730 3 месяца назад

    Interesting when one of their own is really worried about what the government gonna do...
    Also, why is he so worried about people and clients?
    I haven't heard of marines fearing that people would know.
    So it sems like NSA doesn't think of themselves as a heroes serving US citizens and that they see people as enemy.

  • @silver1407
    @silver1407 Год назад +2

    pay attention to how the guest uses their words and avoids proper nouns often. he knows how algorithms can find and enumerate the things you say and associate them with your global "profile"

    • @meepk633
      @meepk633 6 месяцев назад

      Vicarious schizophrenia. You hate to see it.

  • @Lei_Wong
    @Lei_Wong Год назад +1

    Great episode Jack,... as always

  • @janinegarverick5642
    @janinegarverick5642 Год назад

    Exactly and he doesn't want the public to know lol

  • @wambamcamcam
    @wambamcamcam Год назад +3

    USB keyloggers aren't available commercially today? Ever been to Hak5? That's just one place that sells a USB implant similar to the one described.. and they're not even close to $20k..

  • @ross9263
    @ross9263 Год назад +1

    I feel like 9 years is not that much for harold

  • @VitalTechnology_
    @VitalTechnology_ Год назад +2

    Thanks Jack!

  • @ichibot-app
    @ichibot-app Год назад +1

    It's someone he worked with. That knows him personally. The broken english is just a throw off.

  • @nocturnesol9280
    @nocturnesol9280 Год назад +6

    They weren't stolen. They were caught using them by the EU, and the treaty signed had them sell them. If you use those tools its like theft of government property and your subject to their wireless eavesdropping warrantless search.

    • @krotchlickmeugh627
      @krotchlickmeugh627 Год назад +1

      Shhh. Thats what they are counting on

    • @nocturnesol9280
      @nocturnesol9280 Год назад

      @@krotchlickmeugh627 lol i ain't touching some NSA robbing terrorists shit lol.

  • @SnippetSphere_1
    @SnippetSphere_1 Год назад +2

    Some of these tools are readily available for purchase if you know where to find them.

  • @km2766
    @km2766 Год назад

    really obvious how the story dances around NSA insider being the shadowbroker(s), Mayne I missed it

  • @wwjd6041
    @wwjd6041 Год назад +2

    When I was young, I ......

  • @aaronmotta7028
    @aaronmotta7028 Год назад +3

    Man, this is technology that has been around for decades. A USB stick that can monitor network and computer traffic? Still not public? Really? Hak5 has the USB rubber ducky, sharkjack, you a LAN turtle, which clones monitors. Come on dude.

  • @nancysmith2389
    @nancysmith2389 Год назад

    Oooh. Someone stole the NSA's playbook.

  • @FluffyNicholas
    @FluffyNicholas Год назад +2

    Let’s be real man, the last time I had a machine with a VGA port was 2012!

    • @ScottCalvinsClause
      @ScottCalvinsClause Год назад +3

      Commercial machines are all about the VGA

    • @saxxonpike
      @saxxonpike Год назад +1

      A lot of servers still have VGA ports installed now as we go into the year 2023. Dell's rack servers have VGA+USB on the front behind the security grill.

    • @FluffyNicholas
      @FluffyNicholas Год назад

      @@saxxonpike Really? Wow.

    • @freeone69
      @freeone69 Год назад

      u would be surprised how many public domains have ancient tech in live environments.

  • @Robbie_jojo
    @Robbie_jojo Год назад

    I also have a sock at home,but it's dirty one 😂

  • @cjcantrell80
    @cjcantrell80 Год назад

    This is why I loath technology. Absolutely nothing is safe.

  • @GlennsFastReviews
    @GlennsFastReviews Год назад

    I have a problem with Chromium being vulnerable to some sort of exploit. It started late last year. When I switched to Firefox, it didn't happen (but I don't like Firefox as much), so I switched back and it's happening again.

  • @cipanexalandros7658
    @cipanexalandros7658 Год назад +2

    Once NSA ... 4eva NSA!