Jack Recider
๐ค SpeakerAppearances Over Time
Podcast Appearances
And this circles back to the Greek prime minister, too, because as soon as he took office in 2019, he moved the Greek intelligence agency to be under the direct control of the prime minister's office. But not all news outlets were angry about this in Greece.
In fact, a lot of mainstream media in Greece was on the government side trying to slander the journalists for bringing up these stories, even slandering the people who were infected by the spyware since they were critical of the government. It was a mess. Now, while all this was going on in Greece, a big conference was kicking off in Prague called ISS World.
In fact, a lot of mainstream media in Greece was on the government side trying to slander the journalists for bringing up these stories, even slandering the people who were infected by the spyware since they were critical of the government. It was a mess. Now, while all this was going on in Greece, a big conference was kicking off in Prague called ISS World.
So when you list a bunch of companies like that, I just feel like, oh my gosh, there's got to be a huge story for every one of those companies. Who have they done business with? Who have they spied on? What shady deals are they dealing with? We keep picking on NSO, but I really feel like just walk into the ISS World Conference and every one of these companies are... Are any of them above board?
So when you list a bunch of companies like that, I just feel like, oh my gosh, there's got to be a huge story for every one of those companies. Who have they done business with? Who have they spied on? What shady deals are they dealing with? We keep picking on NSO, but I really feel like just walk into the ISS World Conference and every one of these companies are... Are any of them above board?
Are any of them like, oh, no, we're very clean? Or are they all, oh, yeah, this is a cyber weapon that you can use to spy on your citizens with if you want. We don't care. We'll look the other way.
Are any of them like, oh, no, we're very clean? Or are they all, oh, yeah, this is a cyber weapon that you can use to spy on your citizens with if you want. We don't care. We'll look the other way.
Oh, yeah, that's a whole other degree of responsibility, right? Because how exactly do these targeting systems work? Like, we have this Predator and Intellecta thing, right? Like, does this whole kit and infrastructure and everything get sold to the customer? And then once it's delivered, Intellecta just kind of steps back and wipes their hands clean of the whole thing?
Oh, yeah, that's a whole other degree of responsibility, right? Because how exactly do these targeting systems work? Like, we have this Predator and Intellecta thing, right? Like, does this whole kit and infrastructure and everything get sold to the customer? And then once it's delivered, Intellecta just kind of steps back and wipes their hands clean of the whole thing?
Or is it some kind of hacking as a service type of thing? where the customer tells IntellXa, here's what we want you to target, and then IntellXa does all the infections and delivers the data that they got off the phone.
Or is it some kind of hacking as a service type of thing? where the customer tells IntellXa, here's what we want you to target, and then IntellXa does all the infections and delivers the data that they got off the phone.
Or maybe it's a mix of IntellXa doing the infection, and once the spyware is on the phone, then the customer can access that data whenever they want, like listen to the phone calls or see where that person is. We don't know exactly how involved anyone is in all this. You see how this changes where the responsibility lands. Isn't this an important thing to know?
Or maybe it's a mix of IntellXa doing the infection, and once the spyware is on the phone, then the customer can access that data whenever they want, like listen to the phone calls or see where that person is. We don't know exactly how involved anyone is in all this. You see how this changes where the responsibility lands. Isn't this an important thing to know?
Is the government doing the hacking themselves or is this company doing it with authorization from a government? I mean, think about it like this. The phishing message that journalists got, it looked like a normal article from a financial news website, but the domain was changed from .gr to .online. And that is what hosted the malware.
Is the government doing the hacking themselves or is this company doing it with authorization from a government? I mean, think about it like this. The phishing message that journalists got, it looked like a normal article from a financial news website, but the domain was changed from .gr to .online. And that is what hosted the malware.
So someone had to register this domain, get it hosted somewhere, stage the malware on it, and then integrate it into the Predator package. And not to mention, craft a message that the target is likely to click on. And these domains get burned fairly often, so you need to create new ones all the time and integrate that into the package. Is the customer doing all that work?
So someone had to register this domain, get it hosted somewhere, stage the malware on it, and then integrate it into the Predator package. And not to mention, craft a message that the target is likely to click on. And these domains get burned fairly often, so you need to create new ones all the time and integrate that into the package. Is the customer doing all that work?
Or is Intellexa setting all this stuff up to make it easier for the customer to simply point and shoot? So at the conference, do we get kind of any information about Predator, how much it costs or anything?