Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing

Jack Recider

👤 Person
3924 total appearances

Appearances Over Time

Podcast Appearances

Darknet Diaries
139: D3f4ult

So we played that movie. I think what they did here is they called up Comcast pretending to be her and get her password reset. And yeah, it worked. And once they got in her Comcast portal, they were able to control her TV at home. And they just started playing the movie Hackers on it. This is a problem with connected and smart devices. You're not the only one who can control them.

Darknet Diaries
139: D3f4ult

So we played that movie. I think what they did here is they called up Comcast pretending to be her and get her password reset. And yeah, it worked. And once they got in her Comcast portal, they were able to control her TV at home. And they just started playing the movie Hackers on it. This is a problem with connected and smart devices. You're not the only one who can control them.

Darknet Diaries
139: D3f4ult

Amy claimed she suffered from psychological damage from this. And once they got into someone's account and messed around there, they just went down the list to the next person.

Darknet Diaries
139: D3f4ult

Amy claimed she suffered from psychological damage from this. And once they got into someone's account and messed around there, they just went down the list to the next person.

Darknet Diaries
139: D3f4ult

These guys were just ripping through all these high-level people's accounts. It was insane, the people that they were able to breach. But at some point, the two started talking and realized, wait a minute, we have all this information on U.S. intelligence members. What databases do they have access to?

Darknet Diaries
139: D3f4ult

These guys were just ripping through all these high-level people's accounts. It was insane, the people that they were able to breach. But at some point, the two started talking and realized, wait a minute, we have all this information on U.S. intelligence members. What databases do they have access to?

Darknet Diaries
139: D3f4ult

So somewhere in all this, they hacked into Mark Giuliano's accounts. He was the deputy director of the FBI. And using his information, they were able to leverage that to get into Leap, which I think is really taking this to another level, to basically pose as the deputy director of the FBI to access a database that only officials should have access to. I don't know.

Darknet Diaries
139: D3f4ult

So somewhere in all this, they hacked into Mark Giuliano's accounts. He was the deputy director of the FBI. And using his information, they were able to leverage that to get into Leap, which I think is really taking this to another level, to basically pose as the deputy director of the FBI to access a database that only officials should have access to. I don't know.

Darknet Diaries
139: D3f4ult

This just seems crazy to me that this can even happen. Because why is this Leap database even accessible from the internet at all?

Darknet Diaries
139: D3f4ult

This just seems crazy to me that this can even happen. Because why is this Leap database even accessible from the internet at all?

Darknet Diaries
139: D3f4ult

Mm-hmm. That sentiment right there is what I think fueled Default to go further. This idea that the U.S. government thinks that there's some elite hacking force able to break into anything and steal anything, yet has a database of FBI agents' personal details on a public website, which is vulnerable to a teenage social engineer to be able to get into it.

Darknet Diaries
139: D3f4ult

Mm-hmm. That sentiment right there is what I think fueled Default to go further. This idea that the U.S. government thinks that there's some elite hacking force able to break into anything and steal anything, yet has a database of FBI agents' personal details on a public website, which is vulnerable to a teenage social engineer to be able to get into it.

Darknet Diaries
139: D3f4ult

They wanted to put their thumb right in the eye of the government and make it hurt. How can we trust you with our private data if you can't even protect your federal agent's data? Why is the Department of Defense hacking into things instead of defending their own network? On top of that, why is the world even like this at all?

Darknet Diaries
139: D3f4ult

They wanted to put their thumb right in the eye of the government and make it hurt. How can we trust you with our private data if you can't even protect your federal agent's data? Why is the Department of Defense hacking into things instead of defending their own network? On top of that, why is the world even like this at all?

Darknet Diaries
139: D3f4ult

Why is security so bad everywhere that the intelligence community can't even secure their own stuff? So Default and Cracker got into the Leap database and downloaded all the information they could on as many FBI agents as they could. Okay. But what are you going to do with this?

Darknet Diaries
139: D3f4ult

Why is security so bad everywhere that the intelligence community can't even secure their own stuff? So Default and Cracker got into the Leap database and downloaded all the information they could on as many FBI agents as they could. Okay. But what are you going to do with this?

Darknet Diaries
139: D3f4ult

I don't think WikiLeaks posted any of the stuff from the Leap database, but they sure did post John Brennan's information. They got into other databases too.

Darknet Diaries
139: D3f4ult

I don't think WikiLeaks posted any of the stuff from the Leap database, but they sure did post John Brennan's information. They got into other databases too.

Darknet Diaries
139: D3f4ult

Yeah, okay, so any person who's put in prison is in this system. And they found access to this very useful. They were doing things like looking up other hackers that were caught and keeping an eye on them, like trying to figure out, did they become informants? But also they were suspicious of some of the other people in CWA, and there might be an informant within them.

Darknet Diaries
139: D3f4ult

Yeah, okay, so any person who's put in prison is in this system. And they found access to this very useful. They were doing things like looking up other hackers that were caught and keeping an eye on them, like trying to figure out, did they become informants? But also they were suspicious of some of the other people in CWA, and there might be an informant within them.