meta_pixel
Tapesearch Logo
Log in
Malicious Life

Friend or Foe

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 10 January 2018

⏱️ 36 minutes

🧾️ Download transcript

Summary

The largest hack in U.S military history may have been conducted by… The NSA. In 1997, a wargame conducted by the NSA showed just how unprepared we were for a potential cybernetic strike- in 4 days, NSA hackers were able to take down entire military networks. It revealed the dire consequences of a possible cyberattack, and even […] Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

And So, June 9th, 1997. Over the next four days, officials across the United States Department of Defense

0:37.0

experienced problems in their computer systems.

0:40.0

Streams of scrambled inexplicable data popped up on screens.

0:45.0

Files got deleted in hard drives reformatted.

0:49.0

E-mails stopped sending and receiving,

0:52.0

or even worse, sending but saying something totally

0:56.0

different upon arrival. Phone lines broke. Facts lines became overloaded with requests.

1:02.4

Computer monitors simply shot. became overloaded with requests.

1:03.0

Computer monitors simply shut down without rhyme or reason.

1:08.0

High-ranking members had no clue of what could be going on,

1:12.0

nor of the scope of the problem.

1:15.0

Some didn't even notice it happening.

1:18.0

Few did or knew how to do anything to stop it.

1:22.0

No branch of the US defense complex, from the joint chiefs to the

1:26.6

Pacific Command to the Pentagon and more, were spared. One particularly concerned individual sent an email to his commanding officer,

1:35.6

quote, I don't trust my command control. That email was intercepted.

1:41.1

This all, it turns out, was by far the largest hack of the U.S. military and history.

1:48.9

Luckily, the hackers responsible for initiating such a devastating attack were the NSA.

1:57.0

Hi, my name is Rian Levy and this is the Malicious Life Podcast.

2:04.4

In this episode, penetration testing or the act of intentionally breaching a system

2:10.5

in order to test its strength and weaknesses.

2:14.0

Think of pen tests like a really honest roommate,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.