meta_pixel
Tapesearch Logo
Log in
Darknet Diaries

53: Shadow Brokers

Darknet Diaries

Jack Rhysider

True Crime, Technology

4.98.6K Ratings

🗓️ 10 December 2019

⏱️ 53 minutes

🧾️ Download transcript

Summary

The NSA has some pretty advanced, super secret, hacking tools. What if these secret hacking tools were to end up in the wrong person’s hands? Well, that happened. Guest Thanks to Jake Williams from Rendition Security for telling us the story. Sponsors This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

Sometimes, you read the news, and the story sticks with you forever.

0:05.3

One such news story I saw was some security news I heard, and I'll always remember it.

0:10.5

It was when I first saw a presentation about the NSA ANT catalog.

0:15.5

Have you seen this?

0:16.5

It's mind-bending.

0:18.5

Okay, here's what happened.

0:20.5

Someone with access to NSA documents took the ANT catalog and gave it to journalists

0:25.2

at their spigil, and then they published it.

0:28.2

At first, we thought it was Snowden who leaked these documents, but we're not sure if it was him or a second leaker.

0:34.0

I asked Snowden on Twitter if it was him, but he didn't respond.

0:37.4

So what's NSA's ANT catalog?

0:40.2

ANT stands for Advanced Network Technology, and in this catalog, our list of hacks, exploits,

0:47.2

and cyber surveillance devices that the NSA can use for certain missions.

0:52.2

If you work at the NSA and you need an exploit, you look through this catalog,

0:56.5

and the request to get one of these devices or pieces of software.

1:00.3

When you look through it, it looks like the work of science fiction, but these are all real devices.

1:06.6

Let me point out a few to you.

1:08.9

NSA has created a device, codenamed Cotton Mouse.

1:12.3

It looks like a typical USB plug, one you'd see on a mouse or a keyboard,

1:16.3

but it's actually capturing all the data going through it, and where is Lee transmitting that data?

1:21.7

It listens for mouse clicks, keyboard strokes, or any other data going through it.

1:26.2

Now, the receiver has to be close by, I don't know, 20 feet maybe,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Jack Rhysider, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Jack Rhysider and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.