From the Vault: The Professional Hacker with Eric Escobar (Pt 1.)
SpyCast9 Tammi 2024

From the Vault: The Professional Hacker with Eric Escobar (Pt 1.)

Summary Eric Escobar (Twitter; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss compromising networks and information security. He has a coveted DEFCON Black Badge. What You’ll Learn Intelligence -What keeps Eric up at night -Thinking like an ethical hacker (aka a “penetration tester) -Protecting your information (i.e., “Hardening the attack surface”) -Plain English explanations of key cyber concepts like “Kill Chains” and “Zero Days” Reflections -Having a cool job -The information revolution and life in the modern world And much, much more… Episode Notes Eric Escobar commits several thousand felonies on any given day, if he didn’t have permission to do what he was doing. A Principal Security Consultant with SecureWorks, Eric has compromised pretty much everything out there: from healthcare and banking to technology and critical infrastructure, through to amusement parks and next generation military aircraft. “From my perspective, it’s the coolest job in the entire world.” His team consecutively won first place in the Wireless CTF category at DEF CON 23, 24, and 25, snagging a Black Badge along the way. He has a BS and MS in Civil Engineering. And… The links between computing, hacking and the 60’s counterculture are FASCINATING. Learn more by dipping your toes here and here, or dive deeper with What the Dormouse Said (2005) by John Markoff and From Counterculture to Cyberculture (2006) by Fred Turner. Quote of the Week "Watching any critical infrastructure get compromised is really the thing that keeps me up at night because lives are in the balance…and we do a lot of testing for critical infrastructure, and I've seen computers and machines that have been online and not been taken offline, longer than I've been alive…So really interesting to see those types of things because they interact with really big, expensive hardware…there's a catch 22 that happens where you can't really take the machine offline to do maintenance on it because it's critical infrastructure. So then how do you test it to make sure that a hacker can't take it offline, or maintenance can't be done on it? " – Eric Escobar. Resources *Andrew’s Recommendation* -Word Notes From beginner thru advanced, you’ll find some helpful definitions of things like “Web 3.0,” “NFT’s” and “Digital Transformation” on this Cyberwire audio glossary. *SpyCasts* -Inside Microsoft’s Threat Intelligence Center (MSTIC) – with John Lambert and Cristin Goodwin (2021) -The Cyber Zeitgeist – with Dave Bittner (2021) -Securing Cyberspace – with Charlie Mitchell (2016) *Beginner Resources* -What is Hacking? The Economic Times (n.d.) [web] -Ethical Hacking in 8 Minutes, Simplilearn (2020) [8 min video] -Cybersecurity in 7 minutes, Simplilearn (2020) [7 min video] Books -The Cyberweapons Arms Race, N. Perloth (Bloomsbury, 2021) -Cult of the Dead Cow, J. Menn (PublicAffairs, 2020) -Breaking & Entering, J. Smith (Mariner Books, 2019) -The Art of Invisibility, K. Mitnick (L, B & C, 2017) -Ghost in the Wires, K. Mitnick (Back Bay Books, 2012) -Kingpin, K. Poulson (Crown, 2012) -The Cuckoo’s Egg, C. Stoll (Doubleday, 1989) -Neuromancer, W. Gibson (Ace, 1984) Articles -2022 State of the Threat: A Year in Review, Secureworks (2022) -The Anthropology of Hackers, The Atlantic (2010) -Timeline Since 2006: Significant Cyber Incidents, CSIS (n.d.) Documentary -DEFCON, The Documentary Network (2013) Resources -Government Hacking Bibliography, S. Quinlan, New America Foundation (2016) *Wildcard Resource* -“The Aurora Shard” Come to the International Spy Museum to see an ugly chunk of metal. Why? Well, it speaks to a revolution in the relationship between the material world and the non-material world. Broken down? 30 lines of code blew up a 27-ton generator. Zeros and ones can cause violent explosions! Learn more about your ad choices. Visit megaphone.fm/adchoices

Jaksot(725)

Intelligence and the Middle East with Robert Baer

Intelligence and the Middle East with Robert Baer

Peter’s guest today is Robert Baer who served for many years as a CIA operative in the Middle East. Among other things, Bob talks about his tour of duty in Lebanon, the psychology of suicide bombers, and the emerging threat of Iran. He also discusses the movie Syriana, which is based on his book, See No Evil. Learn more about your ad choices. Visit megaphone.fm/adchoices

1 Marras 200726min

The Polygraph — Science or Art?

The Polygraph — Science or Art?

Peter interviews John Sullivan, the CIA’s longest serving polygrapher. The lie detector has supporters and detractors, and John confronts the controversy surrounding it head-on. He frankly discusses the role of the polygraph in the Agency’s security process and offers his candid opinion on the possibilities and limitations of this device. Learn more about your ad choices. Visit megaphone.fm/adchoices

1 Loka 200730min

Leon Trotsky — Murder in Mexico

Leon Trotsky — Murder in Mexico

Peter’s guest today is H. Keith Melton, renowned intelligence historian and owner of the largest collection of espionage artifacts. Keith sheds new light on one of the most notorious intelligence operations of all time—the assassination of exiled Russian revolutionary Leon Trotsky in Mexico in 1940. Keith reconstructs the operation in all its phases, including material from his own original research. Learn more about your ad choices. Visit megaphone.fm/adchoices

1 Syys 200731min

Cuban Intelligence and the Ana Montes Spy Case

Cuban Intelligence and the Ana Montes Spy Case

Peter’s guest this month is Scott Carmichael of the Defense Intelligence Agency (DIA). As the DIA’s senior counterintelligence investigator, Scott identified one of the most damaging spies in recent U.S. history, the Agency’s own chief Cuba analyst, Ana Belen Montes. Scott discusses Montes’ motivations, the damage she did, and the continuing threat of Cuban intelligence to the United States. Learn more about your ad choices. Visit megaphone.fm/adchoices

1 Elo 200727min

From the Secret Files of the CIA

From the Secret Files of the CIA

Peter interviews Tom Blanton of the National Security Archive about a recently declassified set of documents regarding illegal CIA activities in the early Cold War. Putting these "Family Jewels" in historical perspective, Tom and Peter discuss the CIA’s participation in domestic wiretapping, assassination attempts at Fidel Castro, and the popular notion of the Agency as a "rogue elephant." Learn more about your ad choices. Visit megaphone.fm/adchoices

2 Heinä 200729min

British Intelligence—Past and Present

British Intelligence—Past and Present

Peter interviews Dame Stella Rimington, former Director-General of MI5, the British domestic security service. Dame Stella compares American and British approaches to intelligence and offers her view on the terrorist threat and the Litvinenko murder. She also discusses the authenticity of spy fiction and reveals her favorite espionage writer. Learn more about your ad choices. Visit megaphone.fm/adchoices

1 Kesä 200724min

Counterterrorism, Intelligence, and the Iraq War

Counterterrorism, Intelligence, and the Iraq War

After responding to inquiries from listeners, Peter interviews Melissa Mahle who served for over a decade in the CIA’s clandestine service in the Middle East. Melissa provides a unique intelligence perspective on 9/11, terrorist threats, and America’s continuing engagement in Iraq. She also discusses career opportunities in the intelligence community and the changing role of women in the CIA. Learn more about your ad choices. Visit megaphone.fm/adchoices

1 Touko 200732min

FBI Counterintelligence and the Robert Hanssen Spy Case

FBI Counterintelligence and the Robert Hanssen Spy Case

Peter discusses the Robert Hanssen spy case with retired Senior FBI Supervisory Special Agent David Major who knew Hanssen for over 20 years and was one of his supervisors. Dave shares his thoughts on Hanssen’s personality and reasons for spying for the Russians. Last not least, Dave offers his perspective on how the movie Breach captures and misses aspects of the Hanssen espionage case. Learn more about your ad choices. Visit megaphone.fm/adchoices

2 Huhti 200727min

Suosittua kategoriassa Politiikka ja uutiset

rss-ootsa-kuullut-tasta
aikalisa
tervo-halme
ootsa-kuullut-tasta-2
politiikan-puskaradio
viisupodi
rss-podme-livebox
et-sa-noin-voi-sanoo-esittaa
otetaan-yhdet
rss-vaalirankkurit-podcast
aihe
the-ulkopolitist
rss-polikulaari-humanisti-vastaa-ja-muut-ts-podcastit
rss-hyvaa-huomenta-bryssel
rss-kuka-mina-olen
politbyroo
linda-maria
rss-lets-talk-about-hair
rss-50100-podcast
rss-tekoalyfoorumi