logo
episode-header-image
Jan 2021
1h 22m

83: NSA Cryptologists

Jack Rhysider
About this episode

In this episode we interview two NSA Cryptologists, Marcus J. Carey and Jeff Man. We hear their story of how they got into the NSA and what they did while there.

To hear more stories from Jeff tune into Paul’s Security Weekly where Jeff is a regular co-host and shares a lot of stories and insights.

Marcus has written several books on security. They are Tribe of HackersTribe of Hackers Blue TeamTribe of Hackers Red TeamTribe of Hackers Security LeadersThink in Code, and a childrens book called Three Little Hackers.

Also check out the Tribe of Hackers podcast to hear interviews with all these amazing people!

Sponsors

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.

View all active sponsors.

Up next
Jun 3
159: Vastaamo
Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive it blurred the line between digital crime and psychological torture. This story might make your skin crawl.Get more from Joe linktr.ee/joetidy.Get the book Ctrl + Alt ... Show More
51m 6s
May 6
158: MalwareTech
MalwareTech was an anonymous security researcher, until he accidentally stopped WannaCry, one of the largest ransomware attacks in history. That single act of heroism shattered his anonymity and pulled him into a world he never expected.https://malwaretech.comSponsorsSupport for ... Show More
1h 6m
Apr 1
157: Grifter
Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days exploring networks to helping shape one of the largest hacker conferences in the world, Grifter has built a reputation for blending deep technical insight with a sha ... Show More
1h 17m
Recommended Episodes
Nov 2019
Kevin Mitnick - The World's Most Famous Hacker | Mystery and Murder: Analysis by Dr. Phil
Cybersecurity expert and “the world’s most famous hacker” Kevin Mitnick demonstrates some methods hackers use to access sensitive information, and gives valuable tips to keep yourself safe in the cyberworld. Dr. Phil says, "This is a time that it is really important because we're ... Show More
1h 3m
May 2020
The Dark Secrets of a Hacking Hero
In May of 2017, Marcus Hutchins saved the internet. A vicious ransomware attack known as WannaCry had infected computer systems across dozens of countries. It was the worst cyberattack in history at the time, and it seemed unstoppable. But Hutchins, a 23-year-old-hacker in Ilfrac ... Show More
30m 39s
Mar 2023
The quantum revolution: Q-Day
In the cybersecurity world they call it Q-Day, the day when a quantum computer will be built that can break the encryption of the internet. John Thornhill and Madhumita Murgia speak to cybersecurity expert and former professional hacker Mark Carney about password cracking, and wh ... Show More
26m 4s
Mar 2022
The Rise of the Hacking Group LAPSUS$
It started with SIM swapping and escalated into hacks of Okta, Microsoft, Nvidia, and EA. They’re LAPSUS$, a hacking collective that’s been the boogeyman of big corporations for the past few years. People have wondered about their motivations and identities. Now, seven of them ha ... Show More
33m 17s
Mar 2023
Crypto hacker hijinks, government spyware, and Utah social media shocker
A cryptocurrency hack leads us down a maze of twisty little passages, Joe Biden's commercial spyware bill, and Utah gets tough on social media sites.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Gra ... Show More
47m 33s
Jul 2015
#32 The Evilest Technology On Earth :-)
On July 5th, a hacker leaked hundreds of gigabytes of information stolen from a company that sells surveillance software to some of the most oppressive regimes in the world. We look into what journalists have found so far. Also, a new Yes Yes No! Don't forget to go to your local ... Show More
27m 1s
Sep 2022
How To Protect Yourself From Social Engineering Hacks
Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ... Show More
29m 32s
Apr 2019
Poisoned porn ads, the A word, and why why why Wipro?
The hacker who lived the high life after spreading malware via porn sites, Wipro demonstrates how to turn a cybersecurity crisis into a PR disaster, and why are humans listening in to your Alexa conversations?All this and much much more is discussed in the latest edition of the " ... Show More
52m 41s
Oct 2021
Cybersecurity and the Internet of Things
Nobody wants to be hacked through their toaster. Or even worse, their toaster joining an army of toasters that attack critical infrastructure and send me 50 spam emails a day. The Internet of Things is the idea that any device connected to electricity will eventually be connected ... Show More
39 m
Mar 2021
We Are Cyber Security Experts
In episode 192, the girls are joined by the Chief Information Security Officer for North Dakota and cyber security expert Kevin Ford to talk about Anna's twitter hacking at the beginning of this new year. They also give tips on how to protect yourself online! Use 2-Factor Authent ... Show More
1h 4m