Jack Recider
๐ค SpeakerAppearances Over Time
Podcast Appearances
Their automated solutions, which is built on over 350 billion recaptured assets from the criminal underground, ensure you're not in the dark when it comes to your company's exposure to cybercrime. To get your full Darknet exposure report, visit spycloud.com slash darknetdiaries. That's spycloud.com slash darknetdiaries. This episode is sponsored by Delete Me.
In episode 133, I spoke to Connor Tumbleson about some people from who knows where who were stealing his identity. Luckily, they weren't out to destroy his reputation or extort him, but think of the damage that could be done. We all have data out there, which data brokers use to make profit. Anyone on the web can buy your private details to do anything they want.
In episode 133, I spoke to Connor Tumbleson about some people from who knows where who were stealing his identity. Luckily, they weren't out to destroy his reputation or extort him, but think of the damage that could be done. We all have data out there, which data brokers use to make profit. Anyone on the web can buy your private details to do anything they want.
This can lead to identity theft, phishing attempts, harassment, and unwanted spam calls. But there's a solution called Delete Me. I tried it and they immediately got busy scouring the internet for my name and gave me reports on what they found. And they got busy deleting these things. It was great to have someone on my team when it comes to privacy.
This can lead to identity theft, phishing attempts, harassment, and unwanted spam calls. But there's a solution called Delete Me. I tried it and they immediately got busy scouring the internet for my name and gave me reports on what they found. And they got busy deleting these things. It was great to have someone on my team when it comes to privacy.
Take control of your data and keep your private life private by signing up for Delete Me. Now at a special discount for my listeners, you can get 20% off your Delete Me plan when you go to joindeleteme.com slash darknetdiaries and use promo code DD20 at checkout. The only way to get 20% off is to go to joindeleteme.com slash darknetdiaries and enter code DD20 at checkout.
Take control of your data and keep your private life private by signing up for Delete Me. Now at a special discount for my listeners, you can get 20% off your Delete Me plan when you go to joindeleteme.com slash darknetdiaries and use promo code DD20 at checkout. The only way to get 20% off is to go to joindeleteme.com slash darknetdiaries and enter code DD20 at checkout.
That's joindeleteme.com slash darknetdiaries code DD20. All right, so let's start out with what's your name and what do you do?
That's joindeleteme.com slash darknetdiaries code DD20. All right, so let's start out with what's your name and what do you do?
Lighthouse Reports is an investigative nonprofit working with some of the world's leading media companies on topics like migration and surveillance. And a lot of episodes you hear on my show are sometimes slapped together in a matter of weeks, and it's just me doing the research. But not this episode. Here, we have the luxury of talking with a real reporter who spent lots of time on this story.
Lighthouse Reports is an investigative nonprofit working with some of the world's leading media companies on topics like migration and surveillance. And a lot of episodes you hear on my show are sometimes slapped together in a matter of weeks, and it's just me doing the research. But not this episode. Here, we have the luxury of talking with a real reporter who spent lots of time on this story.
The team at Lighthouse Reports spent over six months researching this story, and they worked together with other reporters and journalists and researchers, places like Inside Story in Greece and Haaretz in Israel. They published similar stories, too. And when I first read the story, I was like, whoa, what? So buckle up and let's go for a ride.
The team at Lighthouse Reports spent over six months researching this story, and they worked together with other reporters and journalists and researchers, places like Inside Story in Greece and Haaretz in Israel. They published similar stories, too. And when I first read the story, I was like, whoa, what? So buckle up and let's go for a ride.
The person at the center of this story is a guy named Tal Dillion.
The person at the center of this story is a guy named Tal Dillion.
So I want to jump in here and underline this for a second. Tal went through the Israeli military. Specifically, he was in Unit 81, which designs new tools for the Israeli military to use. I've heard that Unit 81 once designed a little microphone that is supposed to look like a rock.
So I want to jump in here and underline this for a second. Tal went through the Israeli military. Specifically, he was in Unit 81, which designs new tools for the Israeli military to use. I've heard that Unit 81 once designed a little microphone that is supposed to look like a rock.
So you could just set it down in an area you want to record audio in, and it's hidden, so nobody knows they're being recorded. I imagine they make a lot of spy gear for the Israeli military. Yeah, so Tal came out of that division, and when he left the military, he created a company called Circles, which I believe was a surveillance company that used SS7 attacks to spy on mobile users.
So you could just set it down in an area you want to record audio in, and it's hidden, so nobody knows they're being recorded. I imagine they make a lot of spy gear for the Israeli military. Yeah, so Tal came out of that division, and when he left the military, he created a company called Circles, which I believe was a surveillance company that used SS7 attacks to spy on mobile users.
SS7 attacks are really fascinating. I'm not going to get bogged down into the details of how they work, but real quick, SS7 is a way to exploit mobile carriers into getting info on the users or even taking over their phone number. And I believe this company that Tal started, Circles, was using SS7 attacks to collect data from targets and intercept messages and phone calls.