Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Jack Recider

๐Ÿ‘ค Speaker
4533 total appearances

Appearances Over Time

Podcast Appearances

Darknet Diaries
137: Predator

And this circles back to the Greek prime minister, too, because as soon as he took office in 2019, he moved the Greek intelligence agency to be under the direct control of the prime minister's office. But not all news outlets were angry about this in Greece.

Darknet Diaries
137: Predator

In fact, a lot of mainstream media in Greece was on the government side trying to slander the journalists for bringing up these stories, even slandering the people who were infected by the spyware since they were critical of the government. It was a mess. Now, while all this was going on in Greece, a big conference was kicking off in Prague called ISS World.

Darknet Diaries
137: Predator

In fact, a lot of mainstream media in Greece was on the government side trying to slander the journalists for bringing up these stories, even slandering the people who were infected by the spyware since they were critical of the government. It was a mess. Now, while all this was going on in Greece, a big conference was kicking off in Prague called ISS World.

Darknet Diaries
137: Predator

So when you list a bunch of companies like that, I just feel like, oh my gosh, there's got to be a huge story for every one of those companies. Who have they done business with? Who have they spied on? What shady deals are they dealing with? We keep picking on NSO, but I really feel like just walk into the ISS World Conference and every one of these companies are... Are any of them above board?

Darknet Diaries
137: Predator

So when you list a bunch of companies like that, I just feel like, oh my gosh, there's got to be a huge story for every one of those companies. Who have they done business with? Who have they spied on? What shady deals are they dealing with? We keep picking on NSO, but I really feel like just walk into the ISS World Conference and every one of these companies are... Are any of them above board?

Darknet Diaries
137: Predator

Are any of them like, oh, no, we're very clean? Or are they all, oh, yeah, this is a cyber weapon that you can use to spy on your citizens with if you want. We don't care. We'll look the other way.

Darknet Diaries
137: Predator

Are any of them like, oh, no, we're very clean? Or are they all, oh, yeah, this is a cyber weapon that you can use to spy on your citizens with if you want. We don't care. We'll look the other way.

Darknet Diaries
137: Predator

Oh, yeah, that's a whole other degree of responsibility, right? Because how exactly do these targeting systems work? Like, we have this Predator and Intellecta thing, right? Like, does this whole kit and infrastructure and everything get sold to the customer? And then once it's delivered, Intellecta just kind of steps back and wipes their hands clean of the whole thing?

Darknet Diaries
137: Predator

Oh, yeah, that's a whole other degree of responsibility, right? Because how exactly do these targeting systems work? Like, we have this Predator and Intellecta thing, right? Like, does this whole kit and infrastructure and everything get sold to the customer? And then once it's delivered, Intellecta just kind of steps back and wipes their hands clean of the whole thing?

Darknet Diaries
137: Predator

Or is it some kind of hacking as a service type of thing? where the customer tells IntellXa, here's what we want you to target, and then IntellXa does all the infections and delivers the data that they got off the phone.

Darknet Diaries
137: Predator

Or is it some kind of hacking as a service type of thing? where the customer tells IntellXa, here's what we want you to target, and then IntellXa does all the infections and delivers the data that they got off the phone.

Darknet Diaries
137: Predator

Or maybe it's a mix of IntellXa doing the infection, and once the spyware is on the phone, then the customer can access that data whenever they want, like listen to the phone calls or see where that person is. We don't know exactly how involved anyone is in all this. You see how this changes where the responsibility lands. Isn't this an important thing to know?

Darknet Diaries
137: Predator

Or maybe it's a mix of IntellXa doing the infection, and once the spyware is on the phone, then the customer can access that data whenever they want, like listen to the phone calls or see where that person is. We don't know exactly how involved anyone is in all this. You see how this changes where the responsibility lands. Isn't this an important thing to know?

Darknet Diaries
137: Predator

Is the government doing the hacking themselves or is this company doing it with authorization from a government? I mean, think about it like this. The phishing message that journalists got, it looked like a normal article from a financial news website, but the domain was changed from .gr to .online. And that is what hosted the malware.

Darknet Diaries
137: Predator

Is the government doing the hacking themselves or is this company doing it with authorization from a government? I mean, think about it like this. The phishing message that journalists got, it looked like a normal article from a financial news website, but the domain was changed from .gr to .online. And that is what hosted the malware.

Darknet Diaries
137: Predator

So someone had to register this domain, get it hosted somewhere, stage the malware on it, and then integrate it into the Predator package. And not to mention, craft a message that the target is likely to click on. And these domains get burned fairly often, so you need to create new ones all the time and integrate that into the package. Is the customer doing all that work?

Darknet Diaries
137: Predator

So someone had to register this domain, get it hosted somewhere, stage the malware on it, and then integrate it into the Predator package. And not to mention, craft a message that the target is likely to click on. And these domains get burned fairly often, so you need to create new ones all the time and integrate that into the package. Is the customer doing all that work?

Darknet Diaries
137: Predator

Or is Intellexa setting all this stuff up to make it easier for the customer to simply point and shoot? So at the conference, do we get kind of any information about Predator, how much it costs or anything?