Logo
    Search

    Podcast Summary

    • Legalities of Working for a Foreign Cyber Intelligence Organization after Leaving a Role in a National AgencyWhile the legalities of working for a foreign cyber intelligence organization after leaving a role in a national agency may seem clear-cut, the reality is complex due to murky laws and potential actions of spies. Avoid sharing classified information and spying on own countrymen.

      While the legalities of working for a foreign cyber intelligence organization after leaving a role in a similar capacity with a national agency may seem clear-cut, the reality is much more complex. The laws governing such situations are murky, and the actions of spies, who are not known for their transparency, can complicate matters further. The two primary illegal activities to avoid are sharing classified information and spying on one's own countrymen. However, the history of spies and their actions suggests that violations of these rules may be common. Ultimately, the decision to work for a foreign cyber intelligence organization after leaving a role with a national agency requires careful consideration and a deep understanding of the legal and ethical implications.

    • The Importance of Discretion in Sensitive RolesBreaching confidentiality in sensitive roles can damage reputations and lead to legal consequences. Employers must carefully vet new hires and ensure they understand the importance of discretion.

      Working in a sensitive field like cybersecurity or intelligence comes with unique challenges and responsibilities. Lori Stroud's story illustrates this concept well. She spent over a decade working for the NSA, where she played a crucial role in identifying vulnerabilities in foreign government systems. However, her reputation was tarnished when, in 2013, she recommended a new hire, Edward Snowden, who later leaked classified information. Despite the fallout, Stroud was offered a job by a former colleague at CyberPoint, a cybersecurity firm. While the company's involvement in the UAE raised eyebrows, CyberPoint maintained that they had done nothing improper. Stroud, seeking new opportunities, accepted the offer and signed a lengthy NDA. This case highlights the importance of discretion and the potential consequences of breaching confidentiality in sensitive roles. Employers must carefully manage the onboarding process for new hires in such fields, ensuring they understand the nature of their work and the importance of maintaining confidentiality.

    • UAE's Cybersecurity Agency Hires US Company for Offensive Cyber OperationsThe UAE's cybersecurity agency hired a US company to conduct offensive cyber operations, targeting enemies online and collecting data. The operation, Project Raven, focused on foreign adversaries but also domestic actors, raising ethical concerns.

      The UAE's cybersecurity agency, NISA, hired a US-based company, CyberPoint, to carry out offensive cyber operations under the name Project Raven. Stroud, the protagonist, was brought into this operation and was tasked with helping the government profile enemies online, hack them, and collect data. The targets were provided by NISA. Although the UAE has been accused of suppressing free speech and detaining dissidents, the organization's focus extended to foreign adversaries such as Iran, Qatar, and Turkey. However, the operation also targeted domestic actors, raising ethical concerns. The American contractors for Project Raven identified vulnerabilities and developed hacks, but it was typically an Emirati operative who executed the attacks. This compartmentalization allowed the Americans to avoid potential legal issues. The operation's methods and targets have sparked controversy, with critics accusing the UAE of human rights violations. Despite this, the UAE maintains that it works with Washington to fight extremism. The boundary between what American and Emirati operatives did was defined by legal considerations, with the Americans providing the plan and the Emirati operatives executing it. This complex arrangement highlights the ethical dilemmas and legal loopholes that can arise in national cybersecurity operations.

    • The UAE's Project Raven used NSA tactics to hack activists and journalistsProject Raven, a UAE cyber espionage unit, employed ex-NSA agents to target critics using social engineering and malware

      The UAE's Project Raven, a cyber espionage unit made up of former NSA agents, used tactics learned from their previous employment to target and hack activists and journalists. For instance, they used social engineering techniques to gain the trust of their targets, such as Rory Donaghy, a British journalist critical of the UAE's human rights record. They pretended to be human rights activists and emailed Donaghy, eventually convincing him to download malware that allowed Project Raven to monitor his email accounts and Internet browsing. Another target was Ahmed Mansur, a prominent Emirati activist, who was spied on for years and had his photographs of a dissident in prison illegally obtained by Project Raven. These cases demonstrate how Project Raven used their expertise from the NSA to carry out sophisticated cyber attacks against perceived enemies of the UAE government.

    • Covering up illegal activities can lead to severe consequencesTransparency is crucial, hiding illegal activities can result in severe penalties including long-term imprisonment

      The cover-up of illegal activities can be just as damaging as the crimes themselves. Mansur Hussain, a British journalist, deleted incriminating files to hide his involvement in hacking iPhones using a tool called Karma. This cover-up led to his conviction in a secret trial in 2017 for damaging the country's unity, resulting in a decade-long jail sentence. The line between spy craft and illegal techniques is blurry, and tools like Karma, which exploited a vulnerability in Apple's iMessage, were powerful and dangerous when in the wrong hands. These hackers had to keep such tools in limited circulation to avoid detection and patching by tech companies. A simple yet effective security tip for iPhone users is to reboot their phones regularly to flush out malware from memory. This tale from 2016 highlights the importance of transparency and the potential consequences of trying to hide illegal activities.

    • Gray market for cybercrime tools and exploitsCybercrime tools and exploits trade like commodities, with exclusive day zero exploits changing hands between governments and cybercriminals for significant value, despite legal ambiguity

      The market for cybercrime tools and exploits functions much like a traditional marketplace, with valuable day zero exploits changing hands between governments and cybercriminals. The UAE's purchase of the exploit known as Karma serves as an example of this gray market economy, where the seller remains anonymous and the product's value lies in its exclusivity and potential to cause significant damage. The legality of such transactions hinges on the specific laws of the countries involved, adding an extra layer of complexity to this intricate web of clandestine deals. The value of these exploits can be immense, and the consequences of falling on the wrong side of the market can be severe. It's a fascinating yet dangerous world that continues to evolve, blurring the lines between legal and illegal activities.

    • Unintended hacking of American data during foreign cyber surveillance projectAdhering to legal and ethical guidelines is crucial in implementing sensitive defense technologies and services to avoid unintended consequences and potential backlash.

      While CyberPoint, a defense contractor, was legally allowed to provide cyber surveillance services to a foreign government under specific conditions, the implementation of the project, Project Raven, led to the unintended hacking of American data. Despite a policy to flag and delete such data, it was discovered that the same data was reappearing in Raven's controlled storage. This violation of the agreed-upon terms raised concerns for the UAE, leading to the decision to transition the program to a local company and phase out external contractors. This incident underscores the importance of adhering to legal and ethical guidelines in the implementation of sensitive defense technologies and services.

    • The allure of cybercrime and ethical dilemmas in cybersecurityThe complex dynamic of cybercrime's allure and the ethical dilemmas faced by cybersecurity professionals can be challenging to navigate, especially when the lines between ethical and unethical practices become blurred.

      The allure of the unknown and the gamesmanship aspect of cybercrime can be compelling, even for those with a strong moral compass. The case of Dark Matter, a cybersecurity company, illustrates this complex dynamic. Initially, Dark Matter gained the UAE Security Forces as a client and grew to employ 650 people. While they acknowledged working with the government, they denied being hackers. The company's strict secrecy around certain projects, such as Project Raving Mad, kept even top-level executives in the dark. However, as Dark Matter took over projects previously handled by foreign contractors, the nature of their work became more clandestine. The assignments from the UAE government, referred to as "Emirates eyes only," required a high level of trust and discretion. For some, the puzzle-solving aspect of cybercrime and the potential financial rewards were too tempting to resist. The speakers in the discussion shared their personal dilemmas regarding the ethical implications of their work. While some found the potential unethical aspects unappealing, others saw it as just another day in the job. The blurred lines between ethical and unethical practices can be challenging to navigate, especially when they become the norm. In the end, the question remains: what finally functions as a trip wire that separates ethical from unethical practices in the realm of cybersecurity? The answer may depend on individual perspectives and personal values.

    • Lack of coordination between intelligence agencies and contractors can lead to privacy violationsIntelligence agencies and contractors need clear communication and oversight to prevent potential privacy violations and international law breaches.

      The relationship between private contractors and intelligence agencies can be complex and potentially dangerous, especially when it comes to spying on American citizens. In 2016, American operatives returning to the US were questioned by the FBI about their involvement in spying activities, suggesting a lack of coordination between agencies. Contractor Stroud, who had access to internal databases as a lead analyst, discovered that American journalists were being targeted by Emirati security forces. Despite her concerns, she was discouraged from further investigation and eventually put on leave. This incident highlights the importance of clear communication and oversight between intelligence agencies and contractors to prevent potential violations of privacy and international laws.

    • The Ethical Complexities of American Contractors in International EspionageAmerican contractors selling cyber intrusion tools to foreign governments raises ethical concerns and can result in legal consequences, including charges, fines, and loss of security clearances.

      The line between good and bad spies can be blurry, especially when it comes to contracted Americans working for foreign governments. The story of Laurie Stroud, a former intelligence officer who was targeted for her involvement in selling cyber intrusion tools to a foreign government, highlights the ethical complexities of international espionage. Despite the fact that nations have historically spied on each other, the issue at hand is the involvement of American contractors in such activities. With the cases of Mark Baer, Ryan Adams, and Daniel Gericchi, we see the consequences of these actions, including charges, fines, and loss of security clearances. It's important to remember that this is not a new phenomenon, and it's a challenging issue to regulate in the international market for spies.

    • Mercenaries and Whistleblowers: Complex Geopolitics and Moral DilemmasMercenaries' careers involve working for various nations or industries, raising geopolitical complexities and moral dilemmas. Whistleblowers like Rebecca Gordon face tough decisions, influenced by personal motivations and external factors.

      Mercenaries, who are often trained by governments for military or security roles, can find themselves in high demand for similar services in various nations or industries. This creates a complex web of geopolitics and moral dilemmas, as these individuals may view their work as a career move and means to support their families. The case of Edward Snowden's whistleblower, Rebecca Gordon, raises intriguing questions about her motivations. Was she driven by a desire to expose wrongdoing or to avoid potential trouble? It's likely a combination of both, with the actions of others, like Snowden, potentially influencing her decision. As for the audience, if you find yourself in possession of sensitive information, the question remains: do you use it to further your career or do the right thing? This is a tough call, and the consequences can be significant. Overall, this discussion highlights the complexities of whistleblowing and the moral gray areas that often accompany it.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Cyber mercenaries and the digital “Wild West"

    Cyber mercenaries and the digital “Wild West"

    The concept of mercenaries, hired soldiers and specialists working privately to fight a nation’s battles, is nearly as old as war itself.

    In our fourth episode of “Patching the System,” we’re discussing the threat cyber mercenaries pose to individuals, governments, and the private sector. We’ll examine how spyware used to track criminal and terrorist activity around the world has been abused by bad actors in cyberspace who are hacking and spying on activists, journalists, and even government officials. And we’ll talk about what’s being done to stop it.

    Our participants are:

    • John Scott-Railton, Senior Researcher at the Citizen Lab at the University of Toronto's Munk School
    • David Agranovich, Director of Global Threat Disruption at Meta.
    • Ali Wyne, Eurasia Group Senior Analyst (moderator)

    GZERO’s special podcast series “Patching the System,” produced in partnership with Microsoft as part of the award-winning Global Stage series, highlights the work of the Cybersecurity Tech Accord, a public commitment from over 150 global technology companies dedicated to creating a safer cyber world for all of us.

    #249 More Visual Goofs

    #249 More Visual Goofs

    This week we talk about our favorite card backs, Ted's journey in the world of Mercenaries, and WHY IS UTHER A CASTER?!

    Logo Created By: Nate Wolfe

    Theme Song By: Se7enist. https://www.reverbnation.com/se7enist

    Patreon.com/Blizzlet

    Shop.spreadshirt.com/blizzlet

    #ad #manscapedpod

    Blizzlet is sponsored by Manscaped. Get 20% off and free shipping by using the promo code Blizzlet at Manscaped.com

    What’s Really Going On in Russia?

    What’s Really Going On in Russia?

    Last weekend, in the course of about 36 hours, Vladimir Putin faced — and then survived — one of the most serious challenges to his rule in over 20 years. An armed rebellion led by Yevgeny Prigozhin, the head of a Russian mercenary group, took control of a southern military town, and then advanced toward Moscow, coming within about 125 miles of the city. Then, as suddenly as the rebellion began, it was over: Prigozhin was quickly exiled to Belarus without facing criminal charges — an outcome that shocked many Russia watchers.

    Why did Prigozhin stage this rebellion in the first palace? Why did Putin respond the way he did? What are the implications for the future of Putin’s rule — and the broader war in Ukraine?

    There are few people who understand the Putin regime as deeply as Stephen Kotkin, a pre-eminent scholar of Russian history at Stanford. We discuss Prigozhin’s complex motivations, why Putin didn’t shut down Prigozhin’s critiques before they escalated to the point of armed rebellion, how to interpret reports that members of Putin’s inner circle were aware of the rebellion plot, how Prigozhin’s march created an “unwitting referendum” that could threaten the stability of Putin’s regime, the bizarre cease-fire arranged by Belarusian president Aleksandr Lukashenko, why Putin didn’t kill or jail Prigozhin, how this series of events could impact the outcome of the war in Ukraine and more.

    (Note: This episode was recorded on Wednesday, June 28. It does not reflect any news developments that have emerged since.)

    Book Recommendations:

    Chagall by Jackie Wullschlager

    Invisible China by Scott Rozelle and Natalie Hell

    Classified by David Bernstein

    Listen to this podcast in New York Times Audio, our new iOS app for news subscribers. Download now at nytimes.com/audioapp

    Thoughts? Guest suggestions? Email us at ezrakleinshow@nytimes.com.

    You can find transcripts (posted midday) and more episodes of “The Ezra Klein Show” at nytimes.com/ezra-klein-podcast, and you can find Ezra on Twitter @ezraklein. Book recommendations from all our guests are listed at https://www.nytimes.com/article/ezra-klein-show-book-recs.

    This episode of “The Ezra Klein Show” was produced by Emefa Agawu and Kristin Lin. Fact-checking by Michelle Harris, with Rollin Hu, Mary Marge Locker and Kate Sinclair. Engineering by Jeff Geld and Efim Shapiro. Our senior editor is Rogé Karma. The show’s production team also includes Annie Galvin. Original music by Isaac Jones. Audience strategy by Kristina Samulewski and Shannon Busta. The executive producer of New York Times Opinion Audio is Annie-Rose Strasser. And special thanks to Sonia Herrero.

    #133 - ChatGPT multi-document chat, CoreWeave raises $2.3B, AudioCraft, ToolLLM, Autonomous Warfare

    #133 - ChatGPT multi-document chat, CoreWeave raises $2.3B, AudioCraft, ToolLLM, Autonomous Warfare

    Our 133rd episode with a summary and discussion of last week's big AI news!

    Apologies for pod being a bit late this week!

    Read out our text newsletter and comment on the podcast at https://lastweekin.ai/

    Email us your questions and feedback at contact@lastweekin.ai

    Timestamps + links: