35 Burst results for "NSA"
Bongino Welcomes Liberals to Confront Their Ideology; We All Should
"Liberals on even though it can be annoying at times, because I think it exposes the failure, their ideology and They won't do that to us because they're uncomfortable with their own ideas. I mean, Ilhan Omar is running away from critical race theory, claiming We're not teaching it. We don't run away from our ideas. But I was really spinning during that segment because I knew what he was saying was false. You doubt me? Look, here's a Fox news story for by Fred Fleitz who knows a lot about the Intel community May 2017 Talking about the so called 17 agencies that said Russia had feared on behalf of Donald Trump. In his May a testimony. The Senate Committee Judiciary Committee Jim Clapper, folks, Jim Clapper, confirmed what flight said in January that the assessment so far he was talking about reflected the views of only three intelligence agencies. The CIA, the NSA and FBI, Not all 17 again. It's just they just don't tell the truth about stuff. And I wonder sometimes what if there's any value in this? I mean it like I know, maybe it's for Baden and talk about this stuff or whatever. But the show is for you and I wanted to be informative, and I wasn't going to let that go and it it's weird because I only had like three minutes with him and he just wouldn't give it up. It's not true. It wasn't 17 agencies that concurred. There was three It's or a clapper already admitted it that there were select handful of insiders that set all this junk. But I don't know what you get out of it so Email us. You can go to our website
Rep. Devin Nunes on the Irony of Recent DOJ Invesitation Into Democrat Leaks
"Ironies here are really troubling. Your phone records were stolen, fleeced put out there for the media, Um, to embarrass you by Adam Schiff and others They were taken from you. Nobody made a big stink about it because your Republican congressman who's been on the side of Donald Trump and against the spy gate scandal from the start. And now we see this new quote Scandal congressman where the Trump Administration may have been looking at the actual violations of the law and leaks, and it may have been some subpoenas issued for phone records and all of a sudden it's a huge media story. Uh, any well coming to look at it. First of all, it's a It's a faux fake news narrative. To begin with. This launch is on a Friday. From the same exact reporters. The New York Times reporters who took the leaks in the first place and continue to take leak, right, so then they write a story in the most favorable life. Oh, my God, there's you know, gambling in Casablanca. As if you know, investigations don't occur when the leaks of classified information leak out. So so, Dan, you you know this. If if there is a leak that comes from anywhere within the government, the agency itself Has to call for an investigation. So we get notified all the time about investigations that are occurring, you know from you Name the three letter Agency. D o d CIA, NSA, etcetera. Get notified. Look a lot of times. It's a notification about just where it wouldn't even involve Congress. It might just involved. You know some some contractors or some military personnel. And as you know, those people get prosecuted. So that's point number one is they would have been well aware of whatever investigation was occurring. They might not have known They were the targets of the investigation, but Anyone that was read into any of the programs that leaked are a target of an investigation.
Antetokounmpo has big day, Bucks trounce 76ers 132-94
"The NSA tentacle portal over twenty four points fourteen rebounds and seven assists in just twenty four minutes as the bucs blasted the seventy Sixers one thirty two ninety four we played great it was awesome everybody enjoyed it hi everybody played hard to remove the bullet had one assist and then that last four numbers of them everything was great and tend to cope up past Glenn Robinson for second on the team's all time scoring list Bobby Portis added seventeen points to help the walkie beat the seventy Sixers for the second time in three days G. Milton Tyrese Maxey scored fifteen apiece to lead the seventy Sixers who played with that Jo Ellan be because of a sore right shoulder the Sixers fourth straight loss drops of one full game behind the nets for the Eastern Conference lead on the ferry
Anonymous and the World of Hackers
"We are legion. We do not forgive. We do not forget expect us. This is the typical calling card sil- for anonymous a hacking collective that informed by two thousand seven these hackers slash activists or to use their language. Hacktivists have used their ability to break the technology that runs our lives to protest governments. Bring down websites and exposed countless pieces of personal sensitive. Information anonymous has hassled the kkk the church scientology and various governments across the world they've hacked into institutions previously thought to be unhappy able like the. Nsa the us national security agency. Who are they well. As the name implies they are anonymous we don't know most of their identities the hide behind online. Aliases and the iconic guy. Fawkes mask from v for vendetta anonymous was born on four chan's b board a forum dedicated to sharing ridiculous content offensive jokes and otherwise provide a safe haven for young people with dark senses of humor. Humor well mine probably like yours and from this community would bloom. Ethos centered around protecting free speech fighting government corruption try not to pay for copyright movies and music and sometimes fucking with completely innocent people just for some los anonymous has backed both revolutions and cyberbullying today. We will into the deeds and misdeeds of anonymous. How they began what they've done. Also dive into the history of hacking. Who were the first. Hackers hacking evolved over the years. What kinds of heists have some of the world's most talented and criminally minded hackers pulled off
NSA Says It Found New Critical Vulnerabilities in Microsoft Exchange
"Four more serious vulnerabilities have been found in on premise versions of microsoft exchange. That means a gain. It departments have to make sure the latest patches are installed as soon as possible. This comes after microsoft released. Emergency patches last month to close holes on a number of exchange server vulnerabilities. Now it's bad enough that criminal hackers a nation states are getting into unpacked exchange implementations to read email now a new report sets crooks are also trying to take over exchange servers to install currency minors. It's vital your firm's exchange server is patched vulnerabilities in a basic piece of communication software used millions of computing devices could lead to denial of service or hacking attacks. According to a new report. The problem is in some versions of the tcp. Ip stack used an internet connected products from routers to medical equipment. It managers need to check with vendors of their products to see if they need patching or mitigation. This report is the latest in a series that have exposed problems in the software stack. The effectiveness of corporate cybersecurity. Training is again in question. It comes after the release of a survey of twelve hundred americans sixty nine percent of whom have received awareness training of that group sixty one percent failed to get the majority of seven questions right in a multiple choice security test.
Nicole Perlroth On The Cyberweapons Arms Race
"Nicole peril roth on the cyber weapons arms race nicole statement at the end of your book which is a pretty serious indictment of the us government. That i think sums up the thesis of the book you say quote the very institutions charged with keeping us safe have opted time and time again to lead us more vulnerable unquote it. You explain with that means and just tell us what the books about shore. So what that means is that. In order to preserve our espionage operations are battlefield preparations in the digital realm. It necessitates these days. This tradeoff that basically entails leaving americans more vulnerable when you find a hole in the system and you decide that you can use that whole to spy on our enemies or drop a cyber weapon on their grid. One day there was no problem with that three or four decades ago when we were all using different systems but these days we all use the same systems. We all use iphones and androids and microsoft windows whether you know it or not and siemens industrial software and schneider. Electric industrial software. Were all using it for our critical infrastructure. So if you find a whole no systems and you decide that you're not going to get it fixed so that you might able to exploit at one day for espionage or surveillance or a gun. Cyberattack you are leaving americans more vulnerable these days and when i wrote that sentence i wasn't even just talking about the nsa or command or or some of our other spy agencies. I was really talking about the entire system. You know microsoft. They've come a long way but it is holes in their products in their technology. That just able this. Latest chinese attack on our systems solar winds that did not catch the fact that the russians were essentially using it software update as a trojan horse to get into our federal. It networks you know. No one is incentivized to seriously look at security. They are incentivized to get their product to market to cut costs to keep shipping and government. They're incentivized to spy on as many people as possible in the name of protecting americans but the problem is we have this moral hazard in this trade off now where it effectively left a lot of americans less safe so that that is the nut of the buck i really wanted to explore. The is incentive structures. I wanted to look at this because from my vantage point. I've been covering nonstop cyber-attacks the new york times and you know ten years ago. When i started. I could cover one attack every week or every other week but steady getting a little bit worse now. They're all happening simultaneously from so many corners of the globe and they are so costly. Not just for american businesses and government. They're costly for hospitals. There was just a a ransomware attack on a hospital that costs the hospital. Ten million dollars and an american cities and towns so remind vantage point things. Were getting a lot worse. And we had no interest in legislating that critical infrastructure operators up their security. We had no interest in exacting penalties for companies. That didn't take their security seriously. So i really just wanted to look at the incentive structures if going to rely on our free market economy to sort of dictate the terms of our security. I wanted to understand what those incentives were and if there was any opportunities to correct
Is it too late to get in to Bitcoin?
"Back in the day when amazon i one public it shot up roughly after some fits and spurts. It went up to about ninety dollars. You it was like i'm too late. Missed it gone. And then it capitulated down at shot all the way down to two and i was like it's gone amazon's finished not even gonna look at it and then it went back up to ninety. I missed it. I missed it again then. Went up to three hundred to four hundred. It's this constant m. I too late emmett too. Early internal struggle that we have in our brain. What do you think about that. Yeah i think this is exactly so what you're really describing is Things being relative and this is actually think the fundamentally challenging concept with something like bitcoin which is a paradigm shift so people think about bitcoin relative to other assets. If you call a lot of conversations i had in two thousand nineteen twenty twenty where around bitcoins volatility right but bitcoins volatility relative to what because volatility is a relative measure price when we talk about price it's a relative measure because what am i Pricing bitcoin and typically people are pricing in dollars so relatively speaking yes. Bitcoin is volatile compared to holding dollars. But if we compare bitcoin to say equities if you quainton bonds if we compare bitcoin to precious metals the volatility doesn't look so extreme. What really happened at the start of this year. In march of twenty twenty the world shifted the world changed completely and forty years of capital markets. Beliefs were shattered like smashed with a hammer completely shattered. Now changes really hard for people and one of the things. That's really interesting For me personally. I want things to go fast right. Because i've in crypto and things fast and like wait why has it taken a six years to get to this point but in reality as you know the arc of time is very long and it takes a lot of time for the world to change for people to internalize that change and adjust their mental models right and a big part of this in a big part of ice than so much time talking and writing and trying to teach and communicate is. It's really about giving people new frameworks mental models to help them. Integrate this new way of thinking these mental models into how they view the world trade. That's really important. I think there's so many. Brilliant people in crypto. Who do this in different ways. So we have this really broad cross section of people communicating a lot of ways talking to a lot of different audiences which is amazing. The we had this fundamental shift happened. Everything got everything else got crazy. It's not that bitcoin got crazy. That everything else got way freaking crazier and what i love is when i talk to people about. Bitcoin bitcoin to extensive. I'm like let me ask you a question. Did you did you. By tesla five hundred and yeah. Of course i did. Like tesla's going to and i'm like okay. So tesla has appreciated more this year than bill. Clinton has tesla appreciated close to seven hundred percent in two thousand twenty yet you bought at the high and they clean appreciated two hundred and fifty percent and twenty twenty yet. You refuse to buy so help me understand right even if we're using the same of dollars even if we're looking at the same volatility measure somehow bitcoin Why and then he will start thinking. They're like wait a minute because math is hard this we know the people just. They're not thinking logically for some reasons for some people when they think about bitcoin their brain goes into like a tailspin and logic goes out the window. But this is again why i think the collectibles narrative is in so interesting to me because when i say to people like do you know what a honus wagner card is. They're like yeah. Of course. I know i'm like i don't know like okay. One honus wagner card is two point five million dollars. Do you think bitcoin at twenty five thousand thirty five thousand forty thousand is expensive in there. Like probably not right. So let's dig into that tesla coin thing. What part of the fact that. Bitcoin is effectively. Founded by an an-and sushi. Who we do not know if it's a he she it what vs on. Musk pop very public. Are we in agreement. That's the toshi was the aliens. Are we doing alias. I'm kidding shocking. Oh every time. I hear that especially in clubhouse. Everyone's like oh yeah. It was created by the alien somebody yeah. Let's not do that you know. I'm already speculating. That twenty two thousand one. The aliens are finally come here and just completely take over. But i don't want to hear that. The ashley also created the nsa taverners been around for a while and then there's a holiday larue like there. What what part in in psychology because you talked to a lot of institutional investors to you talked to a lot of big money. What part of that psychology. That one you have a very public figure with ilan and then too you have associate whom no one really knows who it is what it is. What part of that you place until list. Yeah so i actually think. Bitcoin and tesla are very similar in one regard both are aspirational and let me explain what i mean by that. Bitcoin invites you to conceptualize the world in a different way. Tesla what eon has done with business. Ilan has memed a new reality into existence. The way he talks about tesla right is completely detached from the economic realities of that business. Completely detached from the economic realities of that business but it doesn't matter because the vision that ilan describes the persona that he has the cult of personality he's created around himself is aspirational grit song by the way cult of personality. That's a great song. it's also great like psychological phenomenon. And what. I think eli done so effectively is. He's the zeitgeist okay. Markets are just sentiment machines. And it's it's been really interesting. Because every value investor. I talked to like twenty twenty. Made their brains explode. It literally made their slowed. They're looking at these stocks trading at fourteen hundred two thousand three thousand acts he for pe ratio rate and their brains are exploiting. That's our valued. And i'm like you forgot that nothing acid matters anymore. We don't live in the world that you lived in two years ago. this is not about value. We live in a world where there is a lot of uncertainty uncertainty about the future uncertainty about the stability institutions uncertainty about our role in this world. That's unfolding and in times of uncertainty. What people look for is vision. Right and what elon. Musk articulates when you talks about going to mars when you talks about. Putting for tesla on mars. That's vision right. I think satory she in so many ways and what we're doing with. Bitcoin is very similar. And i caught this. I've been really obsessed with the idea of building cathedrals lately. It's like five hundred years ago. Right if i was a visionary and had suggested for the future and i wanted to express that the only way for me to create something that withstood the test of time right to create quote unquote immutable. Truth was to build a cathedral and cathedrals took hundreds of years to build and people who built them dedicated tremendous amounts of resources to building these amazing like technology a technologically very advanced like gravity defying beautiful structures and. Whenever people saw them they would feel inspired. Right like cathedrals were how we painted a vision for the reality we wanted to live in. Okay tesla is a cathedral. Bitcoin is a cathedral. The stocks that are soaring the assets that are doing well their assets that are aspirational right and their people. Whether it's a non community of people an individual it's groups of people who believe in a vision for the future that is radically different from the future. We live today but it creates a motion. Right people look at it and they're like that is beautiful. And i wanna live in not future
"nsa" Discussed on Darknet Diaries
"Think so <Speech_Male> <SpeakerChange> is my. <Speech_Male> That's my final answer. <Speech_Music_Male> <Advertisement> <Speech_Music_Male> <Music> <Music> <Music> <Music> <Music> <Music> <Advertisement> <Speech_Music_Male> <Advertisement> <SpeakerChange> <Speech_Music_Male> <Speech_Music_Male> Big thinking marcus <Speech_Male> jake carey and <Speech_Male> jeff to <Speech_Music_Male> excellent people who <Speech_Music_Male> work hard at giving <Speech_Music_Male> back to the community <Speech_Male> and making us all better. <Speech_Music_Male> I'll have links <Speech_Music_Male> to both of their stuff in the show <Speech_Music_Male> notes. But you can check <Speech_Male> out marcus. Book <Speech_Music_Male> title is tribe <Speech_Music_Male> of hackers <Speech_Music_Male> and again that book has brought <Speech_Music_Male> value to be by <Speech_Music_Male> helping me find guests <Speech_Music_Male> for the show. <Speech_Music_Male> So thank you mark. <Speech_Music_Male> You've helped make <Speech_Music_Male> this show better in some <Speech_Music_Male> ways. If <Speech_Male> you wanna hear more stories from <Speech_Music_Male> jeff tune into <Speech_Music_Male> the podcast. Paul security <Speech_Music_Male> weekly. Which <Speech_Music_Male> is a podcast. That goes <Speech_Music_Male> <Advertisement> into security news <Speech_Music_Male> every week. And <Speech_Male> it's a great show. That has <Speech_Male> lots of really cool amazing <Speech_Music_Male> guests to and i've <Speech_Music_Male> enjoyed many episodes of <Speech_Music_Male> it if you <Speech_Male> want hear more. About the nsa. <Speech_Male> I've made quite a few <Speech_Male> other episodes about <Speech_Music_Male> this interviewing people from <Speech_Music_Male> their even check <Speech_Music_Male> episode fifty-three <Speech_Male> called shadow brokers <Speech_Male> fifty <Speech_Male> called operation going <Speech_Music_Male> symphony or episode. <Speech_Music_Male> <Advertisement> Twenty-nine stuxnet <Speech_Music_Male> <Advertisement> <Speech_Music_Male> so not many of you stick <Speech_Music_Male> around this far <Speech_Music_Male> <Advertisement> into the episode. I <Speech_Male> watched the. I <Speech_Male> know how many of you have dropped <Speech_Music_Male> off by <SpeakerChange> now. <Speech_Male> But if you're the <Speech_Female> type of person who is still <Speech_Female> here with me. <Speech_Male> I can tell you really <Speech_Music_Male> <Advertisement> like the show and <Speech_Music_Male> <Advertisement> want more of it <Speech_Music_Male> <Advertisement> in the best way to help <Speech_Male> support. The show is <Speech_Music_Male> <Advertisement> to donate to it through <Speech_Music_Male> patriotic. This <Speech_Male> <Advertisement> helps keep the mike <Speech_Music_Male> powered up. in the. we've <Speech_Music_Male> <Advertisement> files flowing. <Speech_Music_Male> <Advertisement> Please consider donating <Speech_Music_Male> at patriae <Speech_Music_Male> on dot com <Speech_Music_Male> slash darkness. Dies <Speech_Music_Male> thank you. <Speech_Male> This show is made <Speech_Music_Male> by me. Irate monk <Speech_Music_Male> geoffrey cider <Speech_Music_Male> episode <Speech_Male> by cotton mouth <Speech_Male> damian and our <Speech_Music_Male> <Advertisement> theme music is by the holder <Speech_Music_Male> <Advertisement> monkey brake master <Speech_Music_Male> cylinder. <Speech_Music_Male> And even i don't <Speech_Male> back up my data because <Speech_Music_Male> i know the. Nsa <Speech_Music_Male> does it for me. This <Speech_Music_Male> is <SpeakerChange> dr <Speech_Music_Male> diaries.
"nsa" Discussed on Darknet Diaries
"nsa" Discussed on Darknet Diaries
"Hey it's jackie hosted the show. Did i ever tell you about the time. I tried to sneak into the pentagon. Yeah after college. I took a trip to washington. Dc all by myself. I like traveling alone. Guest there's a certain kind of freedom. I like about it which allows me to reinvent myself on trips anyway. There's this metro subway that goes underground through washington d. c. I jumped on it just to see where it would go. And one of the stations it took me to was the pentagon i'm like all right. This sounds cool so jumped off and somehow ended up at like the employee entrance to the pentagon the really no visitors allowed in this area for sure so as stood and watched how people were getting in and out out were one way turnstiles in everyone was scanning their badges and went through a metal detector. I decided to try to do a fake badge scan and see if just walk on in assab some guy walking up so i followed him and did exactly what he did. He leaned over skinned his badge on the reader and then walk through. i leaned over waved. My hand over the reader and walked through to immediately to security officers stopped me and didn't even ask what i was doing. They simply turned me around and set me right back out. They knew exactly what i was up to you and must have spotted me like a mile away. I'm never been shut down so fast or kicked out of someplace that quickly words were even spoken. Do just blocked wouldn't let me go any further and point in straight to the exit. It's funny what remember on our trips hasn't it anyway. This episode interview two different. Nsa agents really liked both of these guys. And i think you will to. What's common between.
Security operations centers: a first principle idea.
"The idea of operations centers has been around seemingly forever friedrich limb in his a history of western technology suggests that the concept goes back as far as five thousand bc amazing anytime an organization grows big enough either in terms of function or one. Small team can't do everything. Leaders have built these centers to men's the workflow and status of the various groups into coordinate. If you fast forward to the early days of the technological revolution we started seeing organizations. That began looking like a modern day sark. But we're quite there yet. The classic example is how nasa managed space missions starting way back in nineteen fifty eight now for those. Who don't know me. I'ma space geek specifically. I love everything about the space race between the russians and the americans during the nineteen sixties in fact as a side note the washington post lillian cunningham produced a thirteen episode podcasts. About that very thing last year it is called moon rise and i highly recommended. But did you know that when neil armstrong and buzz aldrin landed on the moon in nineteen sixty nine that the russians had a remote controlled spacecraft up there at the same time. I didn't know that. Until i listen to the moon rise podcasts. The russians crashed into a moon mountain as armstrong and aldrin. We're flying back to the lunar module so maybe that is why the russians don't advertise that much. But i digress. One of my favorite space movies is paolo. Thirteen directed by ron howard. And one of the things. I love about that. Movie is how it depicts the energy and sense of purpose of an operation center. Here's the actor. Ed harris in a virtuoso performance playing gene kranz the real life nasa flight director delegating tasks his crew of operational teams on what they need to do to get apollo thirteen at home. And the meantime whenever frozen command module to power it up another but the re entry batteries. We've been tried before we've never even stimulated it before gene. We're going to have to figure it out. i want people in our simulators working reentry scenarios. I want you guys to find. Every engineer designed ever switch every circuit transistor and every lightbulb. It's up there then. I want you to talk to the guy. Knee assembly line actually built the thing. Find out how to squeeze every aunt at both of these goddamn machines. I want this mark all the way back to earth with time to spare never lost an american in space where surest not gonna lose one on my watch. Failure is not an option. If that doesn't bring chills down your spine you might be dead. I'm just saying when telephone network started appearing in the early nineteen twenty s phone companies like eighteen bill traffic control bureaus to handle long distance traffic issues by the early nineteen sixties. At and t. Handled most telephone switching through mechanical devices and build a network control center or noc to manage it. At and t. Historians consider this to be the first knock ever built by nineteen seventy seven bell systems had built the first national knock in bedminster new jersey which looked a lot like modern knocks. Today there wasn't much security yet but if there was any knock operators were doing it in the us intelligence community the nineteen sixties were fraud with international incidents like the cuban missile crisis of nineteen sixty to the arab israeli six day war in nineteen sixty seven the us pueblo capture and nineteen sixty eight the prague spring crisis and czechoslovakia also nineteen sixty eight in the one. Twenty-one shootdown crisis in one thousand nine hundred sixty nine the. nsa decided that. They needed an operation center to manage their efforts. Across a wide swatch of international activity. Based on the freedom of information request. The nsa released a document in two thousand seven that described the formation of the first national cigarette operations center or insomniac in one thousand nine hundred seventy three and according to charles berlin. I hit him on lincoln and the answer me. He's a former in sock director. The innocent kept adding more responsibility to over time. He said that it's secret. Sauce was when the nsa decided to pair offense or cigarette defense or comsec in the same place. Eventually they replaced the word singing in the title with security. In other words it became the national security operations center. Berlin said that when cyber came along years later the toll of michigan came too big to keep in the in sock in the. Nsa created the national cyber threat operations center or the in talk to deal with it. But with the addition of the concept mission these operations centers started to lean toward defensive security on the government side and in the aftermath of the morris worm which was the first destructive internet worm
Leave Out Porridge for Belligerent Elves on Christmas Eve
"More trip to europe before christmas to explore some interesting traditions. This time in denmark as kids in america may be getting ready to leave out cookies for santa on friday and don't worry after his scientifically dubious assertions about old saint nick having magical immunity to covid nineteen. Dr fauci has since clarified that. He took a trip to the north pole to vaccinate santa claus himself. Anyways wall here in the us. It's cookies for santa. in denmark. Children leave out porridge for mischievous lives as bribe to make sure they behave the elves. Not the kids. The idea of needing to keep these elms or nisa. Happy goes back to at least the middle ages when farmers explained various bad luck and the hardships of a long winter on the nisa farm. If you kept the nissan happy your livestock would survive the winter in all else would go. Well if you disrespected or upset the nida you may find horrors in the morning like your cow. Having dropped dead to stay on your nieces good side families began offering him a bowl of porridge. On christmas eve. Poor inge was a common staple at the time but the one for the nissan would be special made of rice instead of oats or barley boiled in milk and topped with butter. atlas obscure shares. One account of someone not leaving out the proper offering quote in one story a milkmaid designed to play a trick on her farms. Nissa hiding the butter beneath the porridge. Seen his offering on garnished the niece of flies into a rage and kills the families. Cow finishes his meal and realizes his mistake. He solves the problem by stealing a neighbor's cow and delivering it to his family's farm and quotes. So you really didn't want to get on their bad side. There are many artworks depicting the nisa as almost demonic looking elves throughout the fifteen and sixteen hundreds but by the century they had started taking on more of a happy christmas elf. Kind of look quoting again. A child sized bearded man and appointee red cap traditional garb for farmhands and quotes and met martin anderson curator at the national museum of denmark. Chalks this change up to industrialization and urbanization saying that quote. The nisa was away for rural farmers to explain seemingly random events like illnesses among livestock. They had these thoughts because they couldn't explain bacteria or things like that. She says as people gained a better understanding of agricultural science denisa didn't need to serve the role of scary scapegoats anymore and quotes nowadays. The nsa or even more jolly and innocence. They may still play pranks like stealing. One sock or families may nominate someone to play the role of the nsa and play small pranks on other family members throughout the month of december. But you no longer have to worry about your house's nisha killing you war your animals but people still leave the sweet porridge out for him on christmas eve although now they usually enjoy some of it themselves as well and i will say that. There are other similar kinds of nieces folklore and traditions throughout the other nations in scandinavia in some places. He's called the toyota. Sometimes he brings presence sometimes he can shape shift. There's a number of variations. Suggest know that this one danish tradition is not all there is to know about the more the topa
Experts Weigh In On How U.S. Should Respond To Massive Computer Hack
"Should the us government respond to a computer hack that breached both government networks and private companies mo- cybersecurity experts think. Russia is responsible for the hack and npr's national security correspondent. Greg myra has been talking to some of them. Good morning greg. good morning noel. Perhaps most importantly is the over absolutely not it's still ongoing and we're continuing to learn details. We've heard now that the treasury department hack occurred in july and like other government departments. This was just uncovered in recent days. The email of top officials was hacked. Apparently not the account of treasury secretary. Steve mnuchin Also no evidence that classified systems were breached This information has come from democratic. Senator ron wyden who was briefed on the matter and we can expect this kind of information to sort of dribble out in the weeks and months ahead as government agencies and private companies go through their computer networks But clearly much of this is going to fall on the biden administration to make sure the hack Inside government computer networks is over that there's clear attribution on who did it and then to decide how to respond these major breaches have happened. Before does the government have a strategy to deal with them. No absolutely not again. There are no rules or red lines or clear consequences for adversaries who get caught now today. What we ended up seeing is lots of hand-wringing and ultimately some sort of limited responses right now with this current hack. We're seeing wrestling over. The definition some members of congress. Call this an act of war now. Cyber experts in the intelligence community. Do see it as a big deal but more along the lines of traditional espionage albeit on a massive scale i spoke about this with p w singer cyber expert at the new america think tank. This was not an act of war. This is more cold war style back and forth espionage stealing secrets. That's why you've seen the reaction from the intelligence community to be a mix of. Oh my god what just happened and gosh. We got a tip the hat to them. What a coup for them so. There is no clear way to respond greg. What are the range of options here. Traditional spying might generate public criticism Kicking out suspected spies perhaps some sanctions. But when this happened it really hasn't changed the behavior of russia any other adversaries they still seek hacking is a low cost high return proposition singer says the us can and needs to do much more and should create deterrence in in two ways gave a boxing analogy saying the us needs to punch back harder and also develop more resiliency to absorb the growing number of cyber blows. I make the parallel to my tyson. You don't hit him. He'll punch you back in the face versus muhammad ali rope a dope through resilience where you don't hit me because it just won't work out for you. What else do we know. So we know that the government and private companies were both hacked. What do we know about the private companies. We haven't heard that much from them. Have we know that's right. But we are hearing more of the hackers clearly targeted many tech companies in. This makes a lot of sense. They that hackers want these cutting edge cyber tools. These companies have so presumably. The hackers can use them themselves in the first organization to detect. This hack. two weeks ago was fire. I of prominent cyber security farm fire. Icao kevin mantius spoke with all things considered yesterday and he said these hackers were extremely sophisticated and once they got into the system. They cured out. An operation was specifically designed to attack fireeye. He realized very early on as they launched their own investigation that this was a level of tradecraft he'd never seen before and he said the scale of this hack really drives home the need for a strong national cyber policy. It's time this nation comes up with some doctrine on what we expect. Nations rules of engagement to be. And what will our policy or proportional response speed of folks. Violate the doctrine. Because right now there's absolutely esscalation in cyberspace it. It just seems astonishing that we don't yet have the doctrine in the year. Twenty twenty the. Us however does have a lot of cybersecurity might what is preventing us from using it more effectively. While you're still seeing a lot of things that are in the works Security cyber agency was just launched in twenty eighteen at focused on the elections this year and by all accounts did a did a did a good job right now. There's the military authorization bill on the president's desk waiting to be signed it has money for additional cyber upgrades in by all accounts. You're seeing a lot more cooperation between the government and private tech companies. But this country is losing huge sums of money Do to these cyber attacks and Couple of years ago the nsa director paul nakasone was at his confirmation hearing and he was asked if adversaries. Fear the us in cyberspace. He said the answers absolutely not. Npr's greg mary. Thanks so much. Greg my pleasure.
Government Systems Hacked By International Threat
"S cyber experts scramble to assess the scope of the hack of a decade by kimberly dosier. Us government cyber experts are working furiously. Insecure offices around the globe sifting through computer traffic to figure out which federal systems have been penetrated in the sweeping cyber-spying attack. The fbi warned this week is significant and ongoing suspected russian. Hackers have broken into sensitive. Us government computer networks from the pentagon to the department of energy as well as top us private businesses rummaging around in them and likely reading emails and gathering data the department of homeland security cyber security and infrastructure security agency called the attack which started in march or possibly earlier a grave risk to the us government experts from both the government and top us private firms compromised in the attack are taking whole sections of their computer networks off line or quarantining them for a deeper forensic dive to figure out what was copied or taken. And if the hackers left any malware code behind the hackers exploited a little known but widely used software. Program called a ryan made by a cyber company called solar winds whose client list includes the office of the us. President the pentagon nasa nsa all five branches of the us military and most of the fortune five hundred companies including the top ten u s communications companies the austin texas based company removed. Its client list from its website. After reporting the hack may have affected some eighteen thousand customers. The company says it has been quote advised that the nature of this attack indicates that it may have been conducted by an outside nation state and is urging clients to update their systems to remove the threat. The company didn't immediately respond to a request for comment ceasar referred to the attackers has quote a patient. Well resourced and focused adversary adding that. The orion software vulnerability wasn't the only way it attacked but declining to share further details since it was first reported by reuters on sunday the known extent of the hack has grown wider each day so far government agencies including the departments of commerce and energy are among those confirmed to be infected though energy. Spokesperson said the hack only compromised business networks and didn't reach the national nuclear security administration on thursday microsoft reported that it's found the malware uploaded to some of it systems. You've got to assume that they're still in right now. And they're going to stay in says cyber experts suzanne spaulding who led the homeland security office. That is now ceases during the obama administration so you pretty quickly have to start looking at what they could have gotten access to president. Donald trump has so far been silent on what appears to be one of the worst cyber attacks on the united states in decades. The white house has offered little public comment beyond confirming via twitter that an investigation is underway. A senior administration official speaking anonymously to describe the ongoing investigation told time that the list of compromised. Us government agencies will likely include the pentagon as well as other agencies that use the software. The official also confirmed time that the attackers are believed to be russian state. Operatives reported by the washington post to be the infamous hacking collective known as abt twenty nine or cozy bear russia's ambassador to washington anatoly. I- antonoff denounced. Those reports is quote unfounded attempts of the us media to blame russia for hacking attacks on the us government bodies in remarks this week where georgetown university virtual forum the diplomat. Who complained that. He can't get a meeting with top government officials or lawmakers to discuss a host of accusations against moscow offered to arrange a meeting between russian intelligence. Fbi and cia officials to get to the bottom of it. The orion software is used to monitor and manage computer systems the kind of program and in house. It tech might use to remotely fix an employee's computer when it has a meltdown. The hacker is essentially piggybacked on the orion program software updates so when users updated their systems. They unwittingly uploaded. Malware that gave the hackers. A back. Door explains dmitri alperovitch former co founder and cto of cybersecurity firm crowd strike. His former cybersecurity company was hired by the democratic national committee. When it's emails were hacked in two thousand sixteen which the fbi later attributed to russia when the update came down it basically was a master key for the russians to get access to every single one of these systems. Alperovitch says calling it a heck of a decade and one of the most significant cyber espionage operations in history though it apparently did not penetrate classified systems he says citing conversations with industry insiders. The fbi is leading an investigation to track the hackers while cease which became a household name this year after disputing trump's allegations of election fraud resulting in trump's firing. Its director is sending out new warnings on what they've found and how government and private companies should respond to fix it. The spying attack was first discovered by cybersecurity. Firm fire which reported being hacked by a quote highly sophisticated threat actor that it says inserted malware onto its own network via the solar winds ryan software and then stole some of the cybersecurity companies own quote unquote ethical. Hacking tools. used to probe fire eye. clients networks for vulnerabilities aaron hughes former. Us deputy assistant secretary of defense for cyber policy says the sophistication of targeting contractor in the government supply chain to get to its clients immediately points to an actor like russia or china impersonating users and using inherently trusted mechanisms to conduct what appear to be trusted communication. That's not an insignificant task says hughes. Who's now a cyber expert with the center for strategic and international studies cis. Is the level of effort in stealth. That goes into instituting. That sort of computer to computer communication requires the skill set and breath of a nation state. He said there's a ranking in terms of urgency that governs what cyber-attacks combing their networks for i they make sure. The enemy hasn't accessed critical. Us weapons systems like the launch codes for nuclear bombs. Then they look at things like control of electricity or water supplies triaging a malthusian. Hierarchy of threats says spalding. Who's a senior homeland. Security adviser with csis. After you figure out what the adversary access you play out the worst case scenario of what they might do with what they were able to reach she adds and the game is still on hackers off in store things. They want a copy within the system. They've targeted so they can download it in a way. That won't arouse copying the data a few kilobytes at a time. So there may be packets of information that they've marked to move that are still untouched. And the race is on to cut the hackers off and then rebuild. It can't just go in and kind of surgically remove the adversary spalding. Explains you have to rebuild a completely new infrastructure that isn't connected to the old infrastructure though. The operatives were still active while americans were voting in the presidential election. This fall spalding. Doesn't think the suspected russian hackers were able to effect twenty twenty voting because of quote such overwhelming use of paper ballots and the ability to audit. I think it would have been detected. She said russian government. Hackers have penetrated sensitive systems before they did in two thousand sixteen. When russian military intelligence officers were indicted for crimes including hacking the computers of the democratic national committee primarily through phishing emails. Russian hackers were also blamed for a two thousand fifteen fishing attack that seized control of the pentagon joint staff's unclassified email systems retired chairman of the joint chiefs general martin dempsey told. Cbs news that within an hour of accessing the system. The hacker seized dempsey's computer credentials as well as hundreds of other senior officers and the only way to stop. It was to take the system down cyber expert hughes who was serving as the pentagon seibert defense deputy assistant secretary at the time recalls that his team had to quote isolate and shut down. Parts of the unclassified network to identify and then eradicate the threat actor. Ironically it was the failure to update software that enabled what still seen as the worst cyber attack on the us government. When chinese hackers stole the personnel files of four point two million government employees as reported by the us office of personnel management in two thousand fifteen including the real names of intelligence officers serving in covert positions around the world responding to news the hack the incoming biden administration released a statement thursday vowing to make dealing with quote what appears to be a massive cybersecurity breach affecting potentially thousands of victims a top priority. From the moment we take office alperovitch. Who's now the chairman of the silverado. Policy accelerator a washington dc based cyber think tank warned against us officials or lawmakers reacting to what he calls run of the mill spying as opposed to enact of war. This is a case where we should say good for them. Shame on us for letting them he says we need to use this as a wake-up call to reorganize our government to better deal with this massive intelligence failure and massive failure
US government agencies hacked, Russia suspected
"Russia is suspected of having multiple us government agencies including the department of homeland security and the commerce treasury departments. The heck is said to have gone undetected for months the investigation is still underway. And there's a lot we don't know yet but when the smoke clears matter say the breach could amount to one of the most significant national security failures in years or puerto dustin bolts cover cybersecurity and intelligence for the wall street journal and he joins us now to talk more about this destined. Thanks for joining me. Humanity could be here all right. So what do we know about who these hackers are and how they gained access so we are still learning a lot about this hack and how it came to be and who's behind it but what we are hearing so far from our sources in and outside the government is that this is believed to be russia's foreign intelligence service. This is an elite cyber espionage group that has engaged in successful cyber attacks against government agencies in the past most notably they preached the obama administration several years ago including the state department in the white house also in the lead up to the two thousand sixteen election. They were also implicated in hacking the democratic national committee. They are not the group that ultimately was responsible for leaking those emails and sort of interfering in the election. That was a separate russian group but this group had been actually in the dnc systems for a longer amount of time sort of quietly engaging and political espionage so this is a confirmed that it is these russians. These are very very capable. Hackers considered some of the best spies basically in the world when it comes to this type of behavior and what we know about how they gain access to all these agencies so the suspected russian operation involved basically hijacking a routine software update mechanism for this company called solar winds that does network management four tons of government agencies and more than four hundred of the fortune five hundred companies in the us essentially by hijacking this software upgrading mechanism The hackers were able to build a backdoor into the networks of targets that they wanted to pursue and over the course of several months. We actually think this dates back to march of this year. According to solar winds and other sources they were able to determine which ones they wanted to go after based on their intelligence directives and burrow into their systems and lie in wait for for weeks or months scanning emails spying on internal communications. And that sort of thing. This is sort of a cybersecurity. Professionals would call a supply chain attack where they're able to compromise something that is used widely by a lot of different customers and then by doing that they can sort of have free rein to go after the victims that are then compromised as a result of that attack. We should note here. That russia has denied responsibility for the attack destined. How big a deal is this breach in relation to what we've seen before. Can you just kind of put this into context for us. This is a very significant breach. The only question is sort of how significant it is and is it going to count eventually when all said and done as one of the worst cyber breaches on record. Someone i spoke to. He told me that on a scale of one to ten in terms of severity. This ranks as a tent and the expectation is that in the coming days and weeks. We're probably going to learn about a lot. More government agencies that were breached as well as potentially any number of private networks ranging from defense contractors to accounting firms to a major major companies and all sorts of industries that would be potentially relevant to the hackers. There's a lot remains to be seen about how significant this is. But this is certainly alarming folks inside the government and around the cyber security community. It is worth noting that by all accounts. This is cyber espionage campaign. This was not something that was destructive. This was not you know. This wasn't a ransomware attack. Where hospital now works. Were being frozen opera. Something and they were unable to access patient data. This wasn't it's like some of the major attacks we've seen in recent years that were attributed to north korea for example that did damage to hundreds of thousands of systems around the world. This does appear to be classic espionage but very very significant espionage that got it and this is the result of hackers exploiting of onery product by a private company that's commonly used by the government among other customers. You know it sounds like every link in the chain has to be secure in order to keep your systems safe. How does the government do that is even possible. That is a question and that is something that a lot of folks and government has spent years trying to focus on and they have not come up with a clear easy solution. The reality is that the federal government uses hundreds or thousands of vendors across all the agencies and it is very difficult to maintain the security across the entire supply chain. It's easy to forget that. Just a few years ago several agencies. We're using ski lab products. Despite widespread concerns that that russia antivirus company could potentially be a security risk. Because i of course you know denied all those allegations but the risks were very well known in the us government but they were still being used widely in several different agencies. And so when you sort of take a step back and you realize there's just tons and tons of vendors being used it is really really difficult to ensure the security of all of them and make sure that they're dealing with all the best practices and protecting their systems as much as they should be but this is the lawmakers in both parties have brought attention to that they've raised concern about. And and this is certainly going to add to the level of scrutiny. Another thing that i think is worth noting solar winds actually listed on its publicly available website. All of its many government clients and a lot of his high profile private sector clients. So if you are a hacker with a foreign government this is sort of a roadmap for you to know that. Hey if i can infiltrate these guys. I'll have the keys to the kingdom for all sorts of folks for example in the nsa nasa all branches of the military again more than four hundred the top five hundred fortune five hundred companies and they were all publicly listed on solar wins website as customers and so it would be very easy to identify them as a top target given the the huge range of customers that they had and you mentioned before that even figuring out the scope of this attack. Something that's gonna take days or weeks maybe months so what happens next. How does the government go about re securing. Its systems that remains to be seen as well there are lawmakers already who are saying that they are very concerned about this and that they hope that the outgoing trump administration takes seriously. But this is coming out. A uniquely vulnerable moment for the federal government given that we have a president elect joe biden set to take office and a little bit more than a month. And so it's not clear how. The trump administration plans to respond or mitigate these issues the department of homeland security's cyber wing did issue an emergency directive telling all civilian agencies to immediately uninstall the software from their systems. But that alone won't necessarily fix the problem because the hackers already and getting rid of that software doesn't necessarily in the fight certainly. This is something that folks are concerned about the administration and it's going to be a top concern for the incoming biden administration. I mean imagine a world which now seems that we're in where the administration is taking office shortly after. Several of the federal agencies have been ransacked by a hostile power. It looks like that's what's happening and it seems like that's going to be a serious issue that the biden administration is going to have to deal with wants to take office on january twentieth. And i just want to widen out for a second here. You cover cybersecurity intelligence forest and it has been a really busy year for your beat. It seems like every week practically. We're learning about new breaches. Why is that because twenty twenty has just been one heck of a year. I mean the reality is. There's a lot of added vulnerabilities given the pandemic right. So people are working from home meaning that they're relying more on technology than ever before that is allowed. Hackers to have added opportunities to mess with businesses. Hospitals have been obviously stressed under the pandemic meaning. That ransomware attacks on on their systems are more urgent than ever. And at the same time. You have a lot of foreign governments and others who are very interested in stealing vaccine research and so when you add all those things together. In addition to the fact that there was an election in which they're were heightened concerns about four interference. There was just sort of a lot of things happening in the world that made us more vulnerable and more at risk for cybersecurity episodes. And what you're seeing right now could have happened regardless of the pandemic but the reality is that i think twenty twenty showed us. Just how reliant. We are technology and how we need to be ever vigilant dealing with those threats.
US agencies hacked in monthslong global cyberspying campaign
"US government agencies have been ordered to scour their networks after learning of a cyber espionage campaign that may have been going on for months in a rare emergency directive the department of homeland security cybersecurity arm warned of unacceptable risk and said U. S. agencies should immediately disconnect or power down any machines running the impacted solar winds software after prominent cyber security firm FireEye learned it had been breached authorities learned that the treasury and commerce departments had been hacked FireEye did not name specific targets but said an investigation into the hack of its own network identified a global campaign that had slipped malware into a solar wind software update cyber security experts say the malware gave hackers remote access to victims networks in a mode that can make everything visible former NSA hacker Jake Williams says he suspects there's a number of other agencies that have also been hit Jennifer king Washington
Juan Benet, Founder & CEO of Protocol Labs Discusses Filecoin and the Vision for a Decentralized Web
"Now. Let's talk about five point. Five point is the incentive layer that kind of brings it all together. What happens another would say. I am someone who wants to retrieve some content that i know is somewhere out there so basically what would happen. Whom would i pay. Who's incentivized by. What's what are the economics going on. Here yeah so basically you're saying hey like let's walk through kind of the the life cycle of data and kind of like follow it and so on Yeah so maybe. That's our with a three. So i that think about adding capacity to the network than adding storage. So you know a client hiring hiring a minor to its data and then the third is a another client retreating. Something that exists there so the first case A minor that has sort of provide. And i walked up to the network and up pledges. Certain amount of sectors and a pledge is a commitment to the network that you're going to store a certain amount of addison capacity and you're going to produce some proofs for that capacity and you also have to of because this is a relief to consumers. You have to have something at stake here. You have to discern conditions in which the might eat. Certain kinds of you could play That includes kind of eighty positive. A falcon A minor add smart of the networks some actual capacity than gets a random seed from the network to start Some data and kind of to produce a kind seal. What is right now. An empty sectors know capacity. And this is a kind of a sector today thirty two gigabytes and then there'll be kinda size actress in the feature on in what they might or might walk in with satire by or something like that you're by terabyte into you know thirty two gigabytes segments Any now Seal all of these segments in the ceiling processing in a reputation that you actually have that capacity to provide the network and the minor you have now signed up with an hour to for the this capacity in addition to monica sets a an asking price which is how much they're still is going to go for when clients are going to hire less storage What go right now. The sort of a global ask bryce on minor mostly use cases. Miners have one price in that set. In the future winters debate we want to have a flexible and fluid ask model where minus can have many different prices for different tiers Looking to stuff But for now sort of a very simple one price for all the storage so that point kind of the minor has committed to to of this and now other parties can can view it so now along comes a user client and says okay great like i want to store this data. And so the data they can just added with. There's different kinds of tools. So that can i get a hash or they can add with a five win with the latest client which is kind of look at the one of the main pump implementation's or a bunch of other tools. That that speak these protocols like exile arrogate or slate which is consumer lincoln application. There's a bunch of different kinds of things and that was the You can now hire. You can kind of create a deal to hire minor to back this backpack this data and that deal is of a relationship between a client and it client in a single minor and a single piece of data just kind of like the unit of of agreement as a. You probably want to do this with multiple minors because he want to replicate your data with multiple different parties and and so you now sound good data over to find these miners in the network by you. This number of ways you can either a numerate them from the blockchain you can find them in a buck explorer this much tools that can show you what miners what prices they have and so you select which minor you want and you could be maybe presented but you might also take into account other important details about the minor so for example they're kind of reliability. There's a different kind of schedules features about the minor that tracked by the blockchain and can score ran others. There's no emerging score the everybody's using yet but you could put these kind of like rating style numbers from the kind of like a very simple way of selecting minors klein right now. Uses a minor and sensor data over to the source provider one source brighter receives that they the deal is completed and the minor. Alicia the deal into the network. There's a bunch of operations that happened underneath a hood in order to like actually making that make that work this in preparation of the data that has to happen in order to make it easier to prove on and so on and definitely a different sizes of the data really matter writes a few set sending a little. Bit of the nsa. A few megabytes few kilobytes megabytes. That's going to be the kind of distribution very different than if you're sending gigabytes or terabytes and so for example in the smaller scales that just a very simple protocol where right away i can just over and make the deal and whatnot user Completely hidden from you. You know the client and the mine are doing this. This software is doing this under hud users themselves. Don't have to be exposed to all of this going on but it's kind of like a like a bitcoin. Transaction in theorem transaction. There's a lot going on happening under the hood where transaction to move to a certain place get validated execute on. Not but all of this kind of hidden from from the actual users
Attorney General Barr paves way for prosecutors to investigate claims of voter fraud
"One week since the election, and Attorney General William Barr has issued an order paving the way for prosecutors to investigate President Trump's claims of voter fraud. Correspondent Paula Reed is at the White House Attorney General William Barr has given the president's unsubstantiated allegations of voter fraud, a boost By allowing prosecutors to go around longstanding policies to investigate allegations of fraud. In a memo obtained by CBS News, he says prosecutors can pursue substantial allegations of voting and vote tabulation irregularities before the election is certify the president refusal to concede is denying President elect Biden. Access to essential government resource is To ensure a smooth transition of power. CBS's at O'Keefe, among other things, the Biden Transition team at this point should be getting classified briefings access to secure facilities, the ability to submit more names for background briefings. They can't even talk to the state Department yet. Help them facilitate the calls that they're getting from world leaders to congratulate Mr Vice Head of the NSA is a Trump appointee and says she'll on Lee Grant full access and funding once a winner is clear. The
GSA's Emily Murphy Holding Up Joe Biden's Transition Team
"The attorney general bar authorizing the Justice Department to look into what he calls quote substantial allegations of voting irregular irregularities, despite the fact there's been a little evidence of any fraud. So far, the legal fights haven't gone anywhere. But the head of the NSA Emily Murphy, is affecting the Biden team by holding up its presidential transition to explain how that can happen. And for more information on Emily Murphy, Sean and Hillary talked about it with Washington Post National reporter Lisa Rain. She was confirmed by the Senate on DH. She has Ah ah, strong background in Federal contracting and had worked on Capitol Hill as an aide on Dad worked in the federal government and and so she's viewed as very competent. And she has also gotten entangled, though in some controversies involving the Trump Hotel, as well as the new location for you know, the FBI headquarters, which both involved Ah involved the president. But she has as do all GS administrators thiss kind of on known roll whenever you have a presidential transmit transition, where once President elected named You write a letter and you basically release millions of dollars in in federal funding, you know, as well as office space for transition teams of the agencies as well as just Access to the new the new administration. This case the President Biden elect and his team to federal agencies so that they can learn what's been going on for the past four years, and that she hasn't done Can you Can the Biden teen challenger or does it simply just have to wait her out? So right now, you know nothing that Emily Murphy has done is illegal in the law that actually was passed by Congress in I think it was 1962 or three does give her you know, the GIs administrator wide latitude you know, for when this letter is written, that sort of, you know, unleashes the transition resource is, but it's never really been tested before, right, Because normally, this's just a very pro forma thing. I mean, you know, after President Obama 12 hours later, you know, the Bush team have had written it their letter now in 2000, Bush v. Gore. We know that was, you know, disputed election that went on and on for weeks. Obviously, it took a while, but that's a different circumstance here than you know, a president. I'm not conceding. So right now it's not clear what the bite and folks feel there. They will do right now. There are no no legal avenues that they're pursuing. And they have told my colleague Matt Visor that they're sitting tight for a couple of days. If this continues, though, you know until the end of the week, they you know they will be thinking harder about What legal arguments they have to make. You know. The problem is, though that is it's really tricky because technically an early member if he could wait until December 14th when the electoral college needs and by then you know the recounts in battleground states would have been completed. President Trump would have, in theory, exhausted his legal options he's pursuing, but that's a long way away. From now on, that's an eternity in a transition of presidential transition. So we just don't know what's gonna happen. And that is Washington Post National reporter Lisa Rain
Trump-appointed administrator holding up transition paperwork
"Trump fighting the election results. President elect Biden's transition team is being denied support from the current administration. The administrator of the General Services Administration who was a Trump Administration of Pointy is refusing to sign a letter allowing President elect Joe Biden's transition team to formally begin its work this week. Typically, the NSA administrator releases computer systems and money for salaries and administrative support for the massive undertaking of setting up a new government
BTS #35 Excerpt: What is the Endocannabinoidome? w/ Vincenzo Di Marzo, PhD
"Absolutely. And for those listening that maybe don't have such a technical technical background on cannabinoids science. How would you describe the concept of the Endo cannabinoid Dome to somebody? Okay. So basically, you know with the word. Oh now we make new words containing the the the prefix the suffix off to identify very large system. So we have the Janome with the metabolism. We have the proteome and so on and so forth. So the Endo the endocannabinoid Ang Ang came in a way from you mentioned before the the study that roughly mechoulam in which we collaborating collaborated on the Entourage effect. So basically what we perceived is that in what we were measuring. In fact when we were measuring endocannabinoids is that this these two molecules and under minded to a g were accompanied by dog Plethora of other compounds and this compounds this metabolites were chemically and biochemically similar meaning that you know, an undermined into a Jeep belongs to you know, mm different families of metabolites. And these are the Ennis. I'll at the moment and the and the monocyte whistles some of which were already known. In fact, even one of two thousand kids, but even longer than that before the end of cannabinoids were discovered. So the nobody knew really how these molecules were acting so Rafi in a vegetative way that this is really is his main feature is creativity and Imagination thought about this. These are accompanying molecules that are there too practical to make make the two big actors look even more important than they are so it's an Entourage or you know, when politicians go around and they take with them a lot of birth. Of the accompanying people and that that's certainly part of the of the picture but that then we started realizing that these compounds in fact do have a molecules do have targets of their own. So the endocannabinoid if you wish is is a kind of evolution of the of the Entourage effect. Molecules like the NSA little minds or the Mona Lisa started being investigated receptors were being found and and this created of course exciting but also complications because you know, the pharmacologists ended the drug developers were the therapeutic drug developers were we're thinking okay, we can we can manipulate wage levels of the end of since they are so strongly involved in pathology. We can manipulate the levels of the endocannabinoids of an undermined and 2G in order to make more of these compounds where they're needed or to reduce the amount their amount where they're produced in an excessive that manner so you can do that by manipulating the the degradation of the biosynthesis of endocannabinoids, but then when it was found that and we found we and many others that and under might has the same biochemical Pathways as other in a salad all mines which have different receptors from the cannabinoid. Just this created a strong complication. We cannot really manipulate the levels of an endermite in this way without manipulating the levels of the other previously known as entering compounds but having an identity and and in the mechanism of action of independent from the endocannabinoids of their own so they can have been a dome is basically the the the bigger System including Napoleon undermine and 2G and their main receptors which are simply one CB2 but also bought some of the other receptors foreign under my tend to agree because these are two very promiscuous molecules unlike THC. This is one major difference from between between the endocannabinoids and the plants and and happy now it's dead or at least between between the endocannabinoid and THC and then it was found that in fact, even the biosynthesis and degradation of of these 2 khong Will not be only mediated by one or two enzymes there was a redundancy of biosynthetic and degrading enzymes and and sometimes it ingredient X will not degrade enzymes because they were simply converting an undermined and 2 g into molecules which had different receptors. And this is you know, this is this may seem strange but not two people like like me off at the bioactive lipids all their life, you know, all bye-bye activities are transformed into something different and come from something different with the different biological a month or so, and then there is the containers of an under my dental legited what we call the previously the Entourage compound which have their own receptors, even though they share with the endocannabinoid the same battle synthetical Pathways. And then finally there were other molecules which have different biochemical dead. Pathways as the end of cannabinoids better nevertheless, they're not congeneres. They're not like cousins not they're not like brothers and sisters but their cousins so you have a tennis I'll amide. And in fact when we collaborated with the and with with the with the other groups, we we found that in fact particularly with the group of my coworker the late my coworker. We we found that many many compound many amino acids could make a might with fatty acids and this could create an almost incredible number of new combinations between the 10 or 15 fatty acids and 20 amino acids. So just just imagine all the permutations and and so this compounds actually exist as as the group of other brands show as also recently investigated and and so it's really we're talking now about a huge number of chemical mediators. So the endocannabinoid open their containers their analogues, which may or may have not different similar biochemical Pathways normally have different receptors dead. We we talking about the several other targets that undermined into the G have Beyond City 162. We're talking about other enzymes. So we're talking about something something about more than a 250 chemical mediators more than fifty enzymes and and receptors and some of these receptors were actually known previously like the wage channels or the or the P bars and and and the interesting thing is that you know, of course we when the end of conversation became so big Then the next question was okay. THC is the only out of 100 and more a plan cannot be known that interact with the endocannabinoid system. What about maybe maybe if you don't look only at the end of can access them, but we look at the expanded n. Can have this Summit this and maybe the other cannabinoids with interact with the endocannabinoid home, even though they don't in fact with the entertainment system. This is true to a large
"nsa" Discussed on Risky Business
", the first thing we're going to talk about this wake is An FBI doc seeing some gi you malware God, , I love Twenty Twenty <hes> specifically they. . Like. . A Lennox Malware toolkit this pretty fun angles here but let me start off with you Adam. . What did you make of I? ? Mean you know you you'll links your guy right out of the three of us. . What did you think of the? ? Document that Honestly. . It's a beautiful thing. . It really warms my heart to see this really old school technique of. . Trad, , Lennox route kits, , kernel mode, , Lennox road kits with all the classic bells and whistles written finest. . Tank. . Great Engineering. . It's just a beautiful thing and the NSA's documentation of it is honestly probably better than what the Russians have like really in depth right job reversing it well, , written up our. . Yeah. . Really enjoyed it like I'm I'm Jelly I want a copy of this so that I can use it looks like a nice piece of tooling and twenty years ago me really would like this. . It's good. . Yeah I mean I. . I kept having flashbacks to to talks from like Kiwi Con Circa ten years ago. . Like a fin buyers well, , and yeah, , it was just. . Sort of that's classic beautiful technique share. . It is there enough useful stuff in this thing that someone like yourself who actually works in a role that's that's. . Way tightly sort of information try to make it actionable like was this a useful document or do you get the impression that it's just neon Jagna a bit of a middle finger at Russia. . No. So . I think it is useful. . We love attribution from a from a law enforcement agency for state-sponsored you just can't beat it because it allows us to do is we can kind of correlate and you can at the very least put a little bit to rest and attribution and say look if there's an. . If there's a press release if the NSA the FBI say that it's this group in the Intel community were all just going to kind of agree that this is the group that it is and you can get away from the hundreds of different names all hang on hang on. . What you're saying is the primary benefit here is you get to settle all of the clustering arguments that happened in threat research a slacks exactly, , and I, , think you and I have talked a little bit about what a mess that is with people like Joe Slowec it's it's. . Crazy how difficult that is the main reason for that is that everybody that does intelligence has access to a different source of data and so you know you can kind of look at the FBI and the NSA and say, , okay, , they have access to all the data. . The best data may be dated. . They shouldn't even have access to and that kind of gives us a little bit of a reprieve and we can say, , okay, , they're probably right. . Let's move forward from here. . The indicators are are usually good when they come out in these kinds of releases. . But I wanted to ask, , Adam, , you were kind of saying I wish I had this. . So what do you think the chances are that this will be potentially spread around or that somebody could create something similar. . It's using tricks that have been used by the hacker scene for for a very long time I mean this kind of rocket is pretty old school. . What's Nice is having one that's. . Supportive a modern kernels, for , example, , because that's one thing that was always really fiddly it's about about maintaining this kind of tooling was you had to have kernel modules that were built against all versions of the next year we're going to run up against and that's the sort of thing that as a bedroom hacker, , you can do for a few red hats or a few seuss's debut or whatever. . But doing it against a bunch of stuff like that takes actual work. . You know getting hold of something like this. . You know that's weaponized and usable in the real world and has workable your malleable see through channels. . That kind of thing is I mean in this case, , I, , think it's just like Jason of the. . Web sockets or anyway. . But you know having something that's actually being used versus just kind of homebrew. . There was quite a bit gap in it. . They lost eighty percent of making a tool really genuinely useful is boring, right? , ? Yeah. . That's why I wanted just for the maintenance burden and guess the you aren't really selling support contracts are. . I mean that could be. . It could be a pivot at some point you never know. . But I I look. . I found a couple of things interesting here. . One is that you just mentioned that the to handle by Jason I've HDTV the govern the US government's released a bunch of Yarrow rules that help you detect the message format that the two uses sir rather than looking at like a destination addresses, , it's actually looking at at message format. . Of course, , I can change the message format but that was an interesting thing to do I thought. . The other thing is a both of you have spoken about. . Getting your hands on this thing no one has seen it. . I've even been asked around saying you know who's got sample because a couple of people I know one no one's GonNa, , which tells me that. . Abe may not, , really be out there in the wall much which begs the question why the hell did I get it from and I don't think they got it rolling incident response. . Let's just put it that way. . It looks like they have gone right into these these these. . Operators infrastructure and just pulled it straight from there like this. . This really does look like there's a bit of a psychological Operation Angle to this is in like we are all in your. .
"nsa" Discussed on The WAN Show Podcast
"Oh sorry I just wanted to note that feature requests because it's good an error. An error occurred. Please try again later. But also it says live. They've excellent condition. I love the so much. Hey Jake he wandered off okay. I'm just GONNA sing. This is probably the quickest way. Wait for me to do this. I'm just GonNa snap a quick picture this because this is hilarious. We have we have a call with them probably next week like we actually have a contact act like actively working on the development of this panel and be hard right we were like straight up honest with with them. We were like look the way that it's so confusing to us because the way it messages things is terrible like it's undecipherable and so me getting like excellent connection action live by the way there's a problem you can't you can't do that anyway. We're live a show ladies and gentlemen. We've got a fantastic show for you guys today. The NSA has revealed a major flaw in Microsoft's Windows operating system. Apple may be forced to ditch the late in connector. Luke got banned by Blizzard Lizard Months. Well I'm fascinated to hear about it. Okay story and you don't have to go home but you can't can't stay here. Windows seven is dead. Dead has doornail dead as you can still use it. Yeah you can still use it but like AAC people used. Xp for a long time they did they shouldn't anymore no but they should do to Windows Network.
"nsa" Discussed on TalkRadio 630 KHOW
"NSA decided to create hacking tools to weaponize the windows back if you don't remember how that ended let me give you hit want to cry that's right cyber criminals stole those hacking tool developed by the NSA and a twenty seventeen launched a massive ransomware campaign against a hundred and fifty countries and about two hundred thousand companies so now there's a major flaw in windows ten that's worse than eternal below once again the NSA knows about it so what are they gonna do this time seems like they learn the lesson they learned Microsoft the bug which is central that a patch to keep the bugs from being exploited so if you're running windows ten or windows server twenty sixteen the need to download this patch immediately you can check commander dot com for some more tips on how to make sure that happens and make sure that your PC save but here's a fun fact the windows PC is running at the NSA they have stickers on them and the sticker say Intel inside all right number three forget sex ed it's sexting at researchers from universities in Florida Wisconsin conducted a survey of five thousand kids between the ages of twelve and seventeen and nearly twenty five percent responded that they have received messages that were sexually explicit fifteen percent said they've sent sexting messages which brings us back to the researchers advice which they compare to sex ed they say it is talk to your kids and teach them about safe sex in because they're gonna do it anyway so for starters don't share the messages it's only bears the of those images get out and make their way on to the internet it could be a legal it's easy to follow because teens don't brag right not it goes on with other tips engaging in sex with people who you trust making sure to get consent first sending suggestive photos incident naked photos and leaving your face out of it and here you thought the birds and the bees talk was tough now it's hardly the meaning of life number four fake virtual people are making more money than you are as tech because we're sophisticated artificial intelligence continues one of the big questions I hear a lot is a camel robot take my job some day there can be a quite hard question to answer depending upon what field you're at but if you're an influence or Instagram be afraid be very afraid the new rising social media stars aren't even real take should do a beautiful gorgeous south African model with nearly two hundred thousand Instagram followers she was created by a fashion photographer the U. K. you took up three D. animation as a hobby little McClellan is they buy influencer with nearly two million followers not remember this is a fake virtual person created by someone who's really good at photo shop at a five dollars CPM little gal is earning about ten thousand dollars for a single post just got a job at a magazine as a contributing arts editor yeah I don't say I understand it either the influencers might not be real but the money that they raking in sure has a right number five Ilan mosque deep down is still a twelve year old boy all right first and tell you probably the auto pilot features built into test was supposed to help you drive but not take over apparently nobody told the Tesla owner in Ontario according to police they started Tessler was speeding while the fifty eight year old driver was flossing his teeth that's right kudos for the good dental hygiene but a bad idea when you're supposed to be focused on the road he was charged with careless driving just remember don't floss and drive is being of Tesla Ilan mosque says your toes will soon be able to talk to pedestrians which he demonstrated in a recent tree that's great but now it's really hard was the power of artificial intelligence and technology must also said that soon you'll be able to use the feature on your Tesla to quote fart any pedestrians a general direction correct who has who has a real need for flying cars when we have this to look for to talk about to do your own **** all right there are tons of VPN providers out there but only to research my sponsors and I only only recommend brands to my listeners and viewers that I believe in and the ones that I have trusted and I can say with full confidence that express V. P. N. isn't the best VPN on the market and here's why first and they're not gonna log your data in fact expressed B. P..
"nsa" Discussed on Off The Hook
"So that prevents gummy residue on your lens. Which is a lot better than masking tape, which I know a lot of people use. So it's not just you know, covering it up with with a piece of tape. This is something that specially designed I believe, rob. You have some information on how not to do that. Right. There was there was a fun tweet by the F F on February the first the NSA that many of you may have heard of famous three-letter government organization is among these these organizations that if you go to various tech, events and conferences and things they'll they'll give away swag and a popular swag. These days is a little plastic cover for your webcam. The NSA was giving out these purple ones, but the EFF noticed that these webcam covers we're actually translucent. You could you could you could kind of see through them, and they posted a picture of this and tweeted to the NSA at NSA at NSA of the webcam covers your giving out have an interesting effect. The purple ones are transparent and they posted the photo and stuff. And of course, they they referred to these stickers which are part of this package. We're giving away that the F F make which are actually not translucent think that was that was done on purpose at the did it on purpose. They do spine. Do they they like spying it? It's kind of funny that they were giving out webcam covers in the first place when they're part of the reason that I think some people want to have a Cam either they they did on purpose or even the NSA doesn't know how to do it properly event. These stickers will will protect you. And it's it's it's done the right way. But that's still not all because one more item in this amazing package is the EFF beanie. That's right. It's a hat that probably says EFF on it. It's white embroidery on stretchy double layered black acrylic hats measures seven. Point five by eight inches. And that is just an amazing package. All of that. Did I mentioned also the Lawrence Lessig book is autographed code and other laws of cyberspace. So you get two books you.
"nsa" Discussed on Risky Business
"To which organization opera operation should belong. Good question. And I think you know, there's probably a fair number of your listeners that don't understand some of those distinctions. So we are were in always will be what's known as a combat support agency. And and that means were an element of the department of defense. And we exist to make sure that the war fighters have the information they need as they're looking to defend the US or go into battle. And so the foreign intelligence mission of NSA is one of the KEA neighbors. Right. That is that is central to one of the activities and say does is for an intelligence cyber command. And and interestingly enough that foreign intelligence if you get down into the authorizations that allow NSA to do that. It's it's an area known as as title fifty. Which is a civilian intelligence authorization the military operates and performs operations under title ten. And in fact, NSA has no authority to do offensive cyber operations. So we have the technical capability we will often support, but sensei Bor command has stood up. We do that in support of cyber command. We will do that at other times in support of other US government agencies that have thirties execute operate. But we don't have any authority ourselves outside generating foreign intelligence. Sorry, it's purely a collection role now and all offensive operations. The command all offensive operations, our cyber command or another US government agencies to lead, but we can integrate people onto their teams under there. Authorities. Okay. So you can deliver the work, but you can't initiate it. Correct. In one I think you'll see, you know, the the expertise you needed to do cyber operations resided in an essay. And and when I say resided at an assay that still meant there could be a lot of military people. We have a fair uniform population within NSA, I'm it could've been military people who are gaining those skills and building those capabilities, but I think what what the department of defense recognize was the world was changing the amount of conflict kind of below the level of war. That was coming at us. The amount of threats to our ability to be able to rate weapon systems our ability to safeguard or information and even operate the platforms like planes and ships and tanks that now are mobile computers ability to keep them safe an operational. We head to head. Have more people in the military capable of performing the the cyber operations necessary to do the DOD's mission. And yeah, some of those things are very defensive a significant amount of cyber commands resources are defensive cyber activities running our networks and securing our networks. Well, I mean, I'm on you, describe what you described is pretty clear separation of the balls of of anti and cyber command in very very simply explained, and yet, you know, general Neka sunny, of course, west who hats runs both NSA, and and saw the command and has said has been on record saying that, you know, splitting those roles is actually going to be quite quite difficult at least in the in the sort of short to medium-term sorry. How do you then go about actually separating these things out? I mean because it seems like we've got two different parallel bureaucracies operating out of the same building. How do you go about actually turning them into more distinct organizations without kind of ruining the cooperation between the two the two bodies? You made a good point that, you know, general Naksone dual headed, and if you look at the way the structures of the two organizations are he is literally the only person that that lives on both sides of that fence what we're going to have is we're gonna have NSA insider command supporting interoperation and and collaborating for the for the infinite future. Right. I don't think you can have a military organization operating inside or space. That's not going to have to engage with an essay be supported by NSA because that's our role. Right. Combat support agency and even informed by NSA. So cyber command has some civilians, but predominantly most of their or forces is uniformed a fair amount of them are enlisted military that are going to rotate up out. It's a benefit to the to NSA because we're seeing talent AMAN. We're also seeing a good amount of that talent go into industry where they where they're going to be able to bring that knowledge out into defending the nation at the corporate low..
"nsa" Discussed on Risky Business
"Get detected a lot easier. There's a lot more attention on it. You've given up some of your good. So I I think you'll still see some pretty good firewalls between these countries and their cyber programs now that's interesting now, one of the strategies case strategies of the United States government is to is to indict in obsessed show some of the operators of programs that the United States has deemed broke its laws. Often the discussion in the information security field is that there is potential for some unwanted consequences there. I mean, we've seen after the detention of this ten gentle, but we've seen after the detention of Renzo phase daughter in Canada, I should say the arrest because she's being we've seen various Canadian citizens kind of being. Throw it into the van. And I think the concern is among some people that we could say some of these other countries that where the US is indicted. It's operated we could say some of those countries actually targeting US operators. I mean that has to be a legitimate concern, doesn't it? It's a concern. But I think you need to put it into perspective. Right. When when I joined NSA, you know, I joined an arm of the department of defense where I knew that, you know, I had the opportunities to do operations. And and with that comes the understanding that some of the things we're doing our are authorized and supported by our government. And what that means is you have the full backing and security of the things the US government can do disappoint you. And so, you know, yes, if you are doing cyber espionage for the US government, and you get caught there's the potential that somebody could go out and issue an indictment. The thing we have behind us as I mentioned earlier, we got the rule of law. Right. We we are very specific on what we will and won't do. And I think if you look at the types of. Indictments we've done. That's what differentiates the work. We do for mothers. Right. It's the it's whether it's espionage for economic gain, or whether it's destructive activities against mersal. Entities. Those kind of things could and should get you indicted by the US if you're coming here on breaking the law. I don't think anybody would want the US from shying away from pursuing the the the criminals that that have broken the law because we worry that others might get indicted by people in in other places, I guess it has all side the the angle to it that if you're gonna play spy games, you're gonna win spy prizes. Right. Like, you know, it's it's it's it's a bit naive to suggest that you know, that doing this type of thing might be entirely consequence free. It's a it's a reason I guess people have to accept is what I'm getting. It's a fair assessment right in. You've gotta consider, you know, all of the activity. I don't think you're gonna see rob Joyce go into Beijing in the next six months, but at the same time, do I worry that you know, as I go take an international flight that I'm gonna wind up with international indictment. I really don't. But the thing that that I do understand is that you know, I have the whole of the US government behind me. And they're always going to stand up for me. And that's base while that helps right? So I look I wanna move onto another topic here which is talking about the roles of cyber command and innocent. Now, I understand that you work for an SI. And and you don't work facade command. Right. So so you can only speak for NSA's pot, but on behalf, but I guess what? I'm hearing about here is to nor more about the how you split the roles between the two because. You know, you look at some innocent materials particularly historical materials, and there's a lot of talk about supporting the war warfighter and all of this sort of stuff. Right. So the NSA was certainly tasked with supporting the military. So why is cyber command all of a sudden needed, and how do you how do you actually determine?.
"nsa" Discussed on Armchair Expert with Dax Shepard
"They are them the next eleven military's combined. I think it's currently twenty four cents of every tax dollar supports the Pentagon and military. Just clarify. I'm not getting facts. What is often not in that number is they don't include homeland security in it doesn't sound like him that number. They did. But yeah, whatever if you include homeland security and stuff, but go ahead. And it's the biggest after the next seven countries, not eleven and bigger. Meaning we spend more than seven countries now combined cry combined. Yeah, we spend six hundred ten billion dollars. Okay. Great. So. Yeah. That that makes sense where that number. Because I think it's one point two trillion with homeland security and. NSA? I love you. We got through Sam we were a little nervous. Yeah. Don't you think? Yeah. I'm still nervous. There's still. Yeah. Yeah. Because we we aim to be less divisive. And but what I feel is this is Sam I mean, this we have people on to talk about them and talk about what makes them tick and what what is their work and their interests. And that's what SAM's interested in his doing great. You know, he is expanding minds, and it's great, and this is a part of him. So of course, it's going to be on the show in minimally. Even if you hate what he says, you think it's stupid. Can lead to a compelling conversation. Yeah. That could bear fruit. It is good Tillerson to people who challenge your normal thinking, even if it just means so you can build a good argument against it. Sure. So you don't build a straw, man argument are y love you. I love you way, more than any election. That's coming way, more than my wife have ledge way more than my male privilege or my toxic masculinity. I love you more. The fact that I wanna Ferrari F f his toxic masculinity. Now, I I don't go on whatever you want. All right. I love you..
"nsa" Discussed on 600 WREC
"Out of the country there was a cover up the DNC put pressure. On the local police to, drop it, to stop, looking into it we also know that the, his his server was accessed illegally from Pakistan so there is national security. Hillary's emails national security The DNC hacking which is just internal politics there's no national security and the fusion GPS which because Russia. Is involved it might be national security which one do they which one. Did they do the indictment on which, one did Which one did they solve Solve the toughest one yeah the toughest one that also has zero Democrats involved in the, possibility of doing anything bad Because it's the DNC hack? It's. The one that is all internal politics no national security and the Democrats were the victim It also like Pat said is the, hardest one to. Solve because this one involves WikiLeaks DC leaks dot, com and Gustav for now if you don't. Have time here to explain all of those but those are mysteries wrapped in an enigma Nobody knows who goose affir-? Was nobody knew who DC leaks were nobody, knows how the DNC servers got to WikiLeaks all kinds of. Speculation but how did all of it happen So here's this is quite interesting We just indicted I think sixteen GRU like the. KGB military version of the KGB we. Just indicted and somebody on this somebody who listen to the, show called yesterday and said Glen and we just. Going to take, the Democrats word? And I said you know what I. Don't know what the evidence. Was let me look into. It we. Started looking into it it's incredible Here's how they. Here's how they did it. The NSA Identified sixteen GRU okay now I don't know about. You but let's, just talk about this like. Mission impossible These? Agents are here and they're all undercover it's like mission impossible how do the? NSA identify these sixteen people we don't know or did, they identify more but only find it on this so. We have the g r you the KGB agents the NSA found. Them. And then they started monitoring them, they tracked them to a bitcoin wallet that's, like You know bit. Pay so okay I can see how the. NSA did that they. Go and they're following these guys and they? See that there's a large transfer from a Bank to a bitcoin wallet well? That's where it should stop because remember bitcoin is unhappy, cobble you cannot you, can't track those that's why drug. Cartels use them because you can't track. Them right Somehow or another the NSA Hacked it and they tracked the bitcoin expenditures to buy a. A VPN A VPN is I think it's a very private network And these are what. You have. To have to go onto the dark web you, can't you, can't just go. Onto the dark web with you know outlook or explorer you need to have a VPN me only reason why you'd have a VPN as you're going to. Do some various stuff. And VPN's also make you invisible you can't, track those so the NSA found the GRE you, guys they then tracked into a bit pay a. Wallet then they followed that money to buy..
"nsa" Discussed on Newsradio 970 WFLA
"We know so we went back and we looked the NSA track these GRE you guys you know military KGB if you will and track, them. To a a crypto wallet right and then they. Tracked that wallet or they track that money to, a VPN which is. What you need to go onto the dark web right then they tracked those players in the dark web it's my understanding is people. Say all the time it's just money laundering only the. People that are using bitcoin or the dark web are bad people probably, right about the dark web But not necessarily about bitcoin but I thought it, was? Untrue symbol it is not untraceable it is the cryptography is unbreakable it is pseudo anonymous so every single transaction that happens in bitcoin shows, up. On the bitcoin blockchain and anybody can see it. So if you can be tied to just one, purchase right if they. Can say okay tika bought this then then they can go and trace all the way back to the bitcoin We'll just. Waiting for that number they look into that number and then they can. They can unfold everything I do use bitcoin to break, the law you you've got to be dumber than two rocks and. A sock it's just not bright to do that when I? Speak, to. Prosecute is, off the record they say, tika we'd love it. When criminals are stupid enough to use bitcoin because. It's, like they, leaving a trail for us to follow they've only got time back to one. Transaction and they can unfold everything I. Can't believe. That these Russian agents didn't use cash they would have been much better. Off using, cash than using bitcoin is that your understanding of, a pet certainly wasn't until, now no that's I mean I know..
"nsa" Discussed on Pocket Now Weekly
"Nsa's doing all this stuff and like kim trails this is awesome i love that this was like someone immediately went to you know they they are the law enforcement is offering it adviser he against while way because there too difficult now i'm telling you are the chinese are turning the frogs gay screwed you are a alexander contact group together spit there an end later will will our sponsor is not selling disaster buckets of food that you can also turn into founder i i'd be before we get to our sponsor and i apologize the outlet sponsoring i guess this week i i did also just wanted it lightly touch on this because in in light of this political news you're losing a fight badly in trying to get while way phones in to us carriers law enforcement issuing an advisory against the security of these devices it's just over wrong time to be entertaining shenanigan review common trick arri on trying to encourage people to buy your phones this best by this best buy problem was a bad look for while i i can't imagine any one being able to to properly justified that instantly create sort of an arab illwill around the brand yet definitely didn't make any sense like there there was a just peace in that they had two different marketing operations happening simultaneously in wires got cross some wearing they asked people from won promotion to to participate in other sorry for my cat uh.
"nsa" Discussed on KTLK 1130 AM
"I've never gone to google and they just they lost all those answers have you ever seen that happen is there no backup the nsa his spying on you and me they are collecting all of our data and they say they are not listening to it but it's saved forever the national archives are saving every tweet and every facebook post for historical purposes in the national archives you have fp i devices that by law are supposed to be preserved every single tweet every single taxed everything written or spoken on that phone is supposed to be recorded and saved by law and they've lost them but just this one time period it's so unfortunate tonight at five o'clock i am going to i laid out this morning for the staff and i asked them to do the research on it i'm i'm telling you this is this is worse then watergate except it's not the president that's covering this up it's the system that is covering this up and i believe that both the republicans and the democrats are so dirty this is exactly like that was was sandy berger remember when sandy berger red if you're not eleven sandy berger goes in you know to to some research he just going to look at some papers aboard the bush administration and the clinton administration is is looking to add some stuff for history and then all of a sudden those favors are missing we don't even know what those papers are but he took him out in his underpants.
"nsa" Discussed on KSFO-AM
"Seven seven three eight one three eight one one eight seven seven three eight one three eight one one we're going to talk more about this down the road and not that far down the road little bit later this week and a lot next week and the week after and one hundred more points that relate to this because this is your society at cheer culture it your country at your government and we need to understand what it's supposed to be and what it is and we're going to do that in a moment be dyer and so forth i think it'll be really bracing and compelling an inspiring in many respects now i'll take your calls on these subjects at all worried only to hang up we have a full board but i want to move onto a few other things trade judge the former secretary department of homeland security never much like this guy under obama but he was testifying today at a house hearing on russian hacking and i've asked over and over and over again if this was so bad and it was didn't happen on obama's watch mr johnson's watch mr holders watch and ms lynch's watch didn't happen on the watch of their cia and they're nsa in the democrat party the hell they do about it while for a while they covered it up they didn't tell the american people all right so let's begin speaking at the beginning cut one go in two thousand sixteen the russian government at the direction of ladimir putin himself orchestrated cyber attacks on our nation for the purpose of influencing.
"nsa" Discussed on The Majority Report with Sam Seder
"The idea that this whole russia thing is some type of complete fabrication i think um is getting harder and harder to defend another story associated with this is that the fbi has arrested a twenty five year old woman named reality lee winner reality winner reality sperry thomas pension we yes i would say apparently this is what happened and she has been charged under the espionage act the fbi affidavit filed with her arrest said she's worked for plural bus international corporation at a government facility in georgia since february thirteenth she is charged with providing a copy of a highly confidential top secret nsa document and here's how they found out it was her some of this is the intercept apparently not using best practices the intercept when they were going to the nsa to get comments on the story that they were preparing to write on this document showed the nsa a copy of the document they had which apparently was a copy in and of itself the copy of the document as opposed to being an original document the copy showed some type of crease in the paper which indicated that it was a copy and there were specific signatures left by the copy machine i don't know if it's expressly for this purpose but it's the case nsa's auditing system showed that six people had printed out the report concluding ms winner investigators then examined the computers of those six people and found them is winner had been in email contact with the news outlet this being the intercept but the other five had not so look here's one thing that.
"nsa" Discussed on As It Happens from CBC Radio
"This is an early twenty correct correct i was arrested in two thousand twelve and went to prison from two thousand thirteen to two thousand fifteen and so now to this see this woman who has been charged allegedly she is the leaker she was she had the classified nsa documents she it's somehow guided to them uh and that uh they went to confirm the center city the document and have revealed on this do you know anything about with the information that document how important it was to be put into the public domain yeah this was not uh raw cia or nsa intelligence it was an fa analysis of russian meddling in the two thousand sixteen presidential election so sure was classified but one of the one of the tenets of the espionage act is that it had to cause harm to the national security and as an analytic product this is this is and if an opinion of the nsa's a analytic staff i can't imagine that there's any harm to the national security here and you know another thing too up until barack obama was elected president these issues were dealt with administratively and internally i worked at the cia for many years and there was a woman that i sat near who leaked information wants to a cnn she was having an affair with the cnn correspondent uh she was caught she admitted what she had done and she was suspended without pay for six weeks and she was barred from promotion for three years and that's normally how these things are are dealt with but since obama the us government has used the espionage act which is really an iron fist to crack down on leaks so is this really the new policy that we have now we have two successive presidents using the espionage act to crack down on leaks.