logo
episode-header-image
Feb 2020
24m 9s

Lauri Love: The realities of cyber secur...

Bbc World Service
About this episode

Stephen Sackur speaks to the accused computer hacker Lauri Love. For nations, corporations and all of us as individuals, the age of the internet has heightened vulnerability. Information and data - the most valuable of all commodities - are at risk from hackers, motivated by greed or national or ideological interest. Lauri Love was, from childhood, a gifted computer geek who joined a so-called hacktivist collective. He was charged with hacking secrets from the US military, and narrowly avoided extradition. What does his case tell us about the realities of cyber security?

Up next
Jul 6
Sir Keir Starmer, UK Prime Minister: The UK needs strong international relationships
The UK needs strong international relationships Nick Robinson, presenter of the BBC Today programme and Political Thinking podcast, speaks to Sir Keir Starmer, UK Prime Minister, about the importance of maintaining strong international relationships.In an interview recorded to ma ... Show More
22m 59s
Jul 1
Majid Takht-Ravanchi, Iran’s Deputy Foreign Minister: Regime change is a futile exercise
Lyse Doucet speaks to Majid Takht-Ravanchi, Iran’s Deputy Foreign Minister, about the future of Iran’s nuclear programme and its government. The interview took place in the country’s capital Tehran after Iran’s twelve-day war with Israel. Both sides fired missiles into each other ... Show More
22m 59s
Jun 29
Philippe Kehren, CEO of multinational Solvay: Reducing reliance on China’s rare earth metals
Jonathan Josephs speaks to Philippe Kehren, CEO of chemical multinational company Solvay. His firm sits at the forefront of Europe’s efforts to diversify its supply of rare earth metals. These elements are essential to much of modern technology, from mobile phones to medical equi ... Show More
22m 59s
Recommended Episodes
Jun 2023
Hacking and cybercrime
Just how safe is the online world? Yale Professor of Law and Philosophy Scott Shapiro delves into cybersecurity in his book, Fancy Bear Goes Phishing. The book’s title derives from the exploits of ‘Fancy Bear’, an elite unit of the Russian military intelligence that hacked the US ... Show More
42m 1s
Sep 2020
The difference between a breach and, well, a public record. Pioneer Kitten’s lucrative bycatch. Malware gets past Gatekeeper. A gamer’s bandit economy. And happy birthday, Cyber Branch.
An election hack that wasn’t. More DDoS in New Zealand’s stock exchange. A look at how Iranian cyber contractors make money as a byproduct of cyberespionage. Malware sneeks past Apple’s notarization process. The bandit economy that’s grown up around Fortnite. Ben Yelin looks at h ... Show More
22m 56s
Jul 2023
Asaf Lubin on Cyber Espionage and International Law
On June 16, the U.S. State Department discovered unauthorized access to its Exchange Online email services and reported it to Microsoft. Almost a month later, on July 11, Microsoft disclosed the attack, and attributed it to a China-based threat actor, which they call Storm-0558. ... Show More
48m 46s
Dec 2021
Espionage phishbait in South and Southwest Asia. A utility recovers from a cyber incident. GAO tells the US Congress cyber strategy is wanting. Investigations, Moscow and Missouri style.
SideCopy, a Pakistani APT, is phishing for information in both India and Afghanistan. A Colorado electrical utility continues to recover from a cyber incident it sustained early last month. The GAO tells the US Congress that the nation still lacks a comprehensive cybersecurity st ... Show More
25m 27s
Aug 2020
New Zealand stock exchange sustains DDoS attacks. Flash alert on GoldenSpy. Cyber mercenaries and industrial espionage. Lèse-majesté online. Offering $1 million to a potential co-conspirator?
New Zealand’s stock exchange has sustained two distributed denial-of-service attacks this week. CISA and FBI issue an alert about GoldenSpy. Two cyber mercenary groups are engaged in industrial espionage for hire. Thailand decides to crack down on sites that host content the gove ... Show More
22m 57s
Feb 2023
Known Exploited Vulnerabilities. Fool’s gold. Hacktivists come in both dissident and loyal varieties. Naming and shaming the shameless.
CISA adds to its Known Exploited Vulnerabilities Catalog. Cl0p claims responsibility for GoAnywhere exploitation. Victims mine for gold; attackers use pig butchering tactics. Hacktivists disrupt Iranian television during Revolution Day observances. Killnet claims a DDoS attack ag ... Show More
24m 55s
Jun 2020
Cyberespionage and counterespionage. The DDoS that never was. A very strange case of cyberstalking. And leaky niche dating sites.
What does Beijing want to know about US Presidential campaigns? Position papers, mostly. A redacted version of the CIA’s inquiry into the WikiLeaks Vault 7 material is out. That DDoS attack you read about on Twitter? Never happened. Former eBay employees face Federal charges of c ... Show More
22m 3s
Jan 2023
The power of web data in cybersecurity. [CyberWire-X]
The public web data domain is a fancy way to say that there is a lot of information sitting on websites around the world that is freely available to anybody who has the initiative to collect it and use it for some purpose. When you do that collection, intelligence groups typicall ... Show More
28m 57s
Sep 2021
Electioneering, domestic, but with international implications. The Mirai botnet is exploiting OMIGOD. Container shipper sustains data breach. Odd ads. Phishing with Mr. Musk’s name.
Cyber electioneering, in Hungary and Russia, the latter with some international implications. The Mirai botnet is exploiting the OMIGOD vulnerability. A shipping company deals with data extortion. Government websites have been serving up some oddly adult-themed ads. Malek Ben Sal ... Show More
26m 43s
Jul 2022
Cyber phases of Russia’s hybrid war seem mostly espionage. Belgium accuses China of spying. LockBit ransomware spreads. And Micodus GPS tracker vulnerabilities are real and unpatched.
What’s Russia up to in cyberspace, nowadays? Belgium accuses China of cyberespionage. LockBit ransomware spreading through compromised servers. Malek Ben Salem from Accenture explains the Privacy Enhancing Technologies of Federated Learning with Differential Privacy guarantees. R ... Show More
30m 47s