Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Gordon Corera

๐Ÿ‘ค Speaker
552 total appearances

Appearances Over Time

Podcast Appearances

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

He says he wants people who can, if you like, work through the documents, validate them, explain them and publicize them. That's what he wants to do rather than just take indiscriminately and publish them.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

He says he wants people who can, if you like, work through the documents, validate them, explain them and publicize them. That's what he wants to do rather than just take indiscriminately and publish them.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

Yeah. And it is also true that I think working through journalists, he thinks will give him a bit more protection in a sense, because you can go through kind of First Amendment and the freedom of the press, and that that will give him a bit of institutional protection, if you like. as he seeks to kind of expose what he sees as the surveillance state.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

Yeah. And it is also true that I think working through journalists, he thinks will give him a bit more protection in a sense, because you can go through kind of First Amendment and the freedom of the press, and that that will give him a bit of institutional protection, if you like. as he seeks to kind of expose what he sees as the surveillance state.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

Yeah. And it is also true that I think working through journalists, he thinks will give him a bit more protection in a sense, because you can go through kind of First Amendment and the freedom of the press, and that that will give him a bit of institutional protection, if you like. as he seeks to kind of expose what he sees as the surveillance state.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

So certainly that is a decision that he's kind of consciously taken that this is the best route to try and get this information out there. So here he is. He's decided he wants to reach out for journalists. But how? I mean, how do you do that without being spotted?

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

So certainly that is a decision that he's kind of consciously taken that this is the best route to try and get this information out there. So here he is. He's decided he wants to reach out for journalists. But how? I mean, how do you do that without being spotted?

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

So certainly that is a decision that he's kind of consciously taken that this is the best route to try and get this information out there. So here he is. He's decided he wants to reach out for journalists. But how? I mean, how do you do that without being spotted?

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

So he sets up a series of anonymous or at least pseudonymous email accounts to try and contact people using kind of particularly interesting encrypted email services. Encrypted so it's hard to trace, you know, who owns the account. And actually the NSA and FBI will try and trace that eventually. And they go through lots of efforts to do that. It's interesting.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

So he sets up a series of anonymous or at least pseudonymous email accounts to try and contact people using kind of particularly interesting encrypted email services. Encrypted so it's hard to trace, you know, who owns the account. And actually the NSA and FBI will try and trace that eventually. And they go through lots of efforts to do that. It's interesting.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

So he sets up a series of anonymous or at least pseudonymous email accounts to try and contact people using kind of particularly interesting encrypted email services. Encrypted so it's hard to trace, you know, who owns the account. And actually the NSA and FBI will try and trace that eventually. And they go through lots of efforts to do that. It's interesting.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

He comes up with names for these accounts. Cincinnati, you know, a Roman who voluntarily relinquished power. Tell me you're a narcissist without telling me you're a narcissist. And he uses another one, okay, Virax, truth teller. He's coming up with these email accounts, which he's going to use to reach out to journalists to say, I've got this stuff for you.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

He comes up with names for these accounts. Cincinnati, you know, a Roman who voluntarily relinquished power. Tell me you're a narcissist without telling me you're a narcissist. And he uses another one, okay, Virax, truth teller. He's coming up with these email accounts, which he's going to use to reach out to journalists to say, I've got this stuff for you.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

He comes up with names for these accounts. Cincinnati, you know, a Roman who voluntarily relinquished power. Tell me you're a narcissist without telling me you're a narcissist. And he uses another one, okay, Virax, truth teller. He's coming up with these email accounts, which he's going to use to reach out to journalists to say, I've got this stuff for you.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

Now, he's worried about using the internet and being traced, obviously, because he knows a fair bit about what can be done. So he used something called war driving around Hawaii. It's really interesting. So war driving is basically where you drive a car around with your antenna looking for Wi-Fi and hotspots and internet access. that you can just kind of jump onto.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

Now, he's worried about using the internet and being traced, obviously, because he knows a fair bit about what can be done. So he used something called war driving around Hawaii. It's really interesting. So war driving is basically where you drive a car around with your antenna looking for Wi-Fi and hotspots and internet access. that you can just kind of jump onto.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

Now, he's worried about using the internet and being traced, obviously, because he knows a fair bit about what can be done. So he used something called war driving around Hawaii. It's really interesting. So war driving is basically where you drive a car around with your antenna looking for Wi-Fi and hotspots and internet access. that you can just kind of jump onto.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

So it's someone else's, you know, kind of Wi-Fi or network that you can connect to and then use so that you can use that to send your email and then move on. And then obviously, if someone comes to try and trace which IP address or where the email passed through in terms of the network, It'll just be some, you know, cafe or something like that.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

So it's someone else's, you know, kind of Wi-Fi or network that you can connect to and then use so that you can use that to send your email and then move on. And then obviously, if someone comes to try and trace which IP address or where the email passed through in terms of the network, It'll just be some, you know, cafe or something like that.

The Rest Is Classified
44. The Leak That Changed The World: Stealing State Secrets (Ep 2)

So it's someone else's, you know, kind of Wi-Fi or network that you can connect to and then use so that you can use that to send your email and then move on. And then obviously, if someone comes to try and trace which IP address or where the email passed through in terms of the network, It'll just be some, you know, cafe or something like that.