Jack Recider
๐ค SpeakerAppearances Over Time
Podcast Appearances
Ooh, this is no good. The SF-86 form is the form that you fill out to apply for secret clearance, which means it has your entire background listed clearly in the form. Social security number, email address, telephone number, place of birth, aliases, passports use, prior addresses, names of your neighbors, what school you went to, your military history, past employers. It's everything on a person.
Unreal. And Krakka's just posting this stuff straight up to Twitter as Krakka. And it wasn't just these two guys in CWA. There were some other members there for the ride, but Default was suspicious about one of the members in CWA.
Unreal. And Krakka's just posting this stuff straight up to Twitter as Krakka. And it wasn't just these two guys in CWA. There were some other members there for the ride, but Default was suspicious about one of the members in CWA.
They were so relentless that people started going into hiding.
They were so relentless that people started going into hiding.
At some point, they got into Amy Hess's account. She was the FBI Executive Assistant Director for Science and Technology.
At some point, they got into Amy Hess's account. She was the FBI Executive Assistant Director for Science and Technology.
So we played that movie. I think what they did here is they called up Comcast pretending to be her and get her password reset. And yeah, it worked. And once they got in her Comcast portal, they were able to control her TV at home. And they just started playing the movie Hackers on it. This is a problem with connected and smart devices. You're not the only one who can control them.
So we played that movie. I think what they did here is they called up Comcast pretending to be her and get her password reset. And yeah, it worked. And once they got in her Comcast portal, they were able to control her TV at home. And they just started playing the movie Hackers on it. This is a problem with connected and smart devices. You're not the only one who can control them.
Amy claimed she suffered from psychological damage from this. And once they got into someone's account and messed around there, they just went down the list to the next person.
Amy claimed she suffered from psychological damage from this. And once they got into someone's account and messed around there, they just went down the list to the next person.
These guys were just ripping through all these high-level people's accounts. It was insane, the people that they were able to breach. But at some point, the two started talking and realized, wait a minute, we have all this information on U.S. intelligence members. What databases do they have access to?
These guys were just ripping through all these high-level people's accounts. It was insane, the people that they were able to breach. But at some point, the two started talking and realized, wait a minute, we have all this information on U.S. intelligence members. What databases do they have access to?
So somewhere in all this, they hacked into Mark Giuliano's accounts. He was the deputy director of the FBI. And using his information, they were able to leverage that to get into Leap, which I think is really taking this to another level, to basically pose as the deputy director of the FBI to access a database that only officials should have access to. I don't know.
So somewhere in all this, they hacked into Mark Giuliano's accounts. He was the deputy director of the FBI. And using his information, they were able to leverage that to get into Leap, which I think is really taking this to another level, to basically pose as the deputy director of the FBI to access a database that only officials should have access to. I don't know.
This just seems crazy to me that this can even happen. Because why is this Leap database even accessible from the internet at all?
This just seems crazy to me that this can even happen. Because why is this Leap database even accessible from the internet at all?
Mm-hmm. That sentiment right there is what I think fueled Default to go further. This idea that the U.S. government thinks that there's some elite hacking force able to break into anything and steal anything, yet has a database of FBI agents' personal details on a public website, which is vulnerable to a teenage social engineer to be able to get into it.