Jack Recider
๐ค SpeakerAppearances Over Time
Podcast Appearances
Mm-hmm. That sentiment right there is what I think fueled Default to go further. This idea that the U.S. government thinks that there's some elite hacking force able to break into anything and steal anything, yet has a database of FBI agents' personal details on a public website, which is vulnerable to a teenage social engineer to be able to get into it.
They wanted to put their thumb right in the eye of the government and make it hurt. How can we trust you with our private data if you can't even protect your federal agent's data? Why is the Department of Defense hacking into things instead of defending their own network? On top of that, why is the world even like this at all?
They wanted to put their thumb right in the eye of the government and make it hurt. How can we trust you with our private data if you can't even protect your federal agent's data? Why is the Department of Defense hacking into things instead of defending their own network? On top of that, why is the world even like this at all?
Why is security so bad everywhere that the intelligence community can't even secure their own stuff? So Default and Cracker got into the Leap database and downloaded all the information they could on as many FBI agents as they could. Okay. But what are you going to do with this?
Why is security so bad everywhere that the intelligence community can't even secure their own stuff? So Default and Cracker got into the Leap database and downloaded all the information they could on as many FBI agents as they could. Okay. But what are you going to do with this?
I don't think WikiLeaks posted any of the stuff from the Leap database, but they sure did post John Brennan's information. They got into other databases too.
I don't think WikiLeaks posted any of the stuff from the Leap database, but they sure did post John Brennan's information. They got into other databases too.
Yeah, okay, so any person who's put in prison is in this system. And they found access to this very useful. They were doing things like looking up other hackers that were caught and keeping an eye on them, like trying to figure out, did they become informants? But also they were suspicious of some of the other people in CWA, and there might be an informant within them.
Yeah, okay, so any person who's put in prison is in this system. And they found access to this very useful. They were doing things like looking up other hackers that were caught and keeping an eye on them, like trying to figure out, did they become informants? But also they were suspicious of some of the other people in CWA, and there might be an informant within them.
So access to this system was kind of like a way to run a criminal report. on anyone you wanted very quickly. So they were just downloading stuff from these databases and looking through it. And that's when they found in these databases, there was a bunch of information about the Miami-Dade Police Department. Let's talk about Miami Police.
So access to this system was kind of like a way to run a criminal report. on anyone you wanted very quickly. So they were just downloading stuff from these databases and looking through it. And that's when they found in these databases, there was a bunch of information about the Miami-Dade Police Department. Let's talk about Miami Police.
dropped their docs, pretty much. This time it wasn't WikiLeaks, though. I'm looking at a tweet here, which has a link to Pastebin, and in there is a list of 80 Miami police officers. Their name, title, phone number, and email address.
dropped their docs, pretty much. This time it wasn't WikiLeaks, though. I'm looking at a tweet here, which has a link to Pastebin, and in there is a list of 80 Miami police officers. Their name, title, phone number, and email address.
At the time, Krakow was just a teenage high schooler, but Default was in his 20s.
At the time, Krakow was just a teenage high schooler, but Default was in his 20s.
Yeah, so when they gave John Brennan's SF-86 form to Julian Assange at WikiLeaks, this really angered the Department of Defense. And Julian somehow got word that the NSA was aiding in the investigation. So Julian told Default to be careful. Then one day, Default's computer started acting up. Something wasn't right. It was crashing and glitchy.
Yeah, so when they gave John Brennan's SF-86 form to Julian Assange at WikiLeaks, this really angered the Department of Defense. And Julian somehow got word that the NSA was aiding in the investigation. So Julian told Default to be careful. Then one day, Default's computer started acting up. Something wasn't right. It was crashing and glitchy.
And he looked at the network traffic and saw some connections to Langley, Virginia, where the CIA is based out of.
And he looked at the network traffic and saw some connections to Langley, Virginia, where the CIA is based out of.
He had his computer set up in such a way that if he disconnected the power to it, it would re-encrypt his hard drive. He just needed to grab the cord and pull it. But when you're sitting there at your computer with assault rifles pointed at you, don't think you're going to reach for that power cord. So at gunpoint, he had no choice but to let them seize the computer.