Logo
    Search

    Ep 50: Operation Glowing Symphony

    en-usOctober 30, 2019

    Podcast Summary

    • The Rise and Fall of ISIS Following the Takeover of MosulThe takeover of Mosul by ISIS increased their popularity, leading to a rise in global attacks. The US military responded with Operation Inherent Resolve, but ISIS had already recruited tens of thousands of members. This serves as a reminder of how quickly extremist groups can gain power and the devastating impact of terrorism on innocent lives.

      The takeover of Mosul by ISIS and the declaration of a caliphate increased their popularity and led to a rise in attacks in several cities worldwide including Paris, Brussels, and Ottawa. The US military initiated Operation Inherent Resolve to stop ISIS, using airstrikes, tomahawk missiles, and other measures. However, tens of thousands of people had joined ISIS and it wasn't easy to stop them. The takeover of Mosul is what put ISIS on the map and made them a common household name in the US. It is a reminder that extremist groups can take over cities in just a few days, and highlights the devastating impact of violence and terrorism on innocent lives.

    • Inside the US Cyber Command's Offensive Cyber-space OperationsThe US Cyber Command, a secret hacking organization within the US government, conducts offensive cyber-space operations and is constantly seeking new members to help battle terrorists.

      The US Cyber Command is a secret hacking organization within the US government that conducts full spectrum cyber-space operations, including conducting offensive cyber-space operations. US Cyber Command needed more help to battle terrorists, and as a result, phone calls were made that led to an extremely rare interview with a person inside the US Cyber Command, Command the Commander, who was formerly a Force RECON Marine. Marines are known to be competitive, gung-ho, and battle-hungry, and this mindset was exemplified in the Marine Force's Cyber Command. MARFORCYBER conducts offensive cyber-space operations, something that the US government has historically not admitted to doing. The Commander is a beast, having spent his first five military years as a Force RECON Marine before joining the cyber division and subsequently becoming a mission commander.

    • Targeting ISIS Media - How a Special Team Analyzed and Built a Network for Collecting InformationThe NSA and Cyber Command formed a team to study ISIS media and collect data, preparing well in advance of the group's invasion of Mosul. The team consisted of military and civilian personnel with specialized IT skills.

      The NSA and US Cyber Command created a team to focus solely on ISIS media, which was responsible for producing their magazines, videos, attack claims, social media accounts, and websites. The team was tasked with mapping out the network and understanding everything that made ISIS media tick, from people and places to things. They spent a year and a half analyzing, developing, and building out the network to collect as much data as possible from the group. This was done before ISIS invaded Mosul and declared a caliphate, and the team was made up of Marines, civilians, and skilled IT personnel.

    • NSA and Cyber Command's Two-Year Effort Against ISIS Media NetworkThe NSA and Cyber Command dedicated extensive resources to gather data, infect systems, and develop tactical attacks against ISIS media. Despite their readiness to take out more of ISIS media, higher-ups lacked the appetite for a big cyber-operation after the Paris attacks.

      The NSA and Cyber Command dedicated a whole team for two years to investigate ISIS media network, gathering as much data as possible and infecting the systems to maintain their foothold in there. They hacked into the phone of one of the ISIS media people and stole the private decryption keys for that phone, enabling them to decrypt private chat messages. They also had extensive knowledge of ISIS media and developed tactical cyber-attacks to disrupt and take down their networks. After the Paris attacks in November 2015, Secretary Carter requested options for a big cyber-operation to stop and diminish the impact of ISIS media. The Commander had the skills and expertise to take out more of ISIS media, and they were ready at a tactical level, but there wasn't that appetite at higher levels.

    • Joint Task Force ARES: A New Approach to Fighting ISISGlowing Symphony is a prime example of the military's ability to utilize offensive cyber-operations as a powerful weapon to destroy and attack key nodes of terrorist organizations like ISIS.

      The discovery of key nodes in ISIS media led to the formation of a new task force, Joint Task Force ARES, which focused specifically on offensive cyber-operations against ISIS. This task force was granted permission to disrupt, degrade, and destroy the target using cyber-attacks, representing a significant shift in operations. The team came up with the name 'Glowing Symphony' for their cyber-operation, which aimed to take down all of the ISIS servers, domains, and emails at the same time. This mission was the result of a major realization that military and NSA operations could go beyond simply collecting data and listening/watching to the enemy, but also using cyber-attacks as weapons to destroy and attack key nodes.

    • Operation Glowing Symphony: A Cyber-Op Against TerrorismHighly skilled hackers and professionals with intricate knowledge of computer networks and terrorist organizations are crucial in countering terrorism through cyber-ops like Operation Glowing Symphony.

      Operation Glowing Symphony was a cyber-op executed by cyber-com term Mission Commanders and their highly skilled hackers, who formed teams of operators, signals analysts, intel analysts and team leaders. The Mission Commanders had the responsibility of ensuring that the teams operate legally to accomplish the cyber operation. These teams could navigate enemy territory and big target networks to hit objectives, delete data or move around the network to accomplish their goals. This mission demonstrates the US government's dedication to countering terrorism by striking critical elements like the media infrastructure of terrorist groups. This operation also highlights the need for highly skilled hackers and other professionals with intricate knowledge of computer networks and terrorist organizations.

    • Overcoming Obstacles: The US Military-Trained Hackers' Struggle Against ISIS.The fight against ISIS required coordination with hackers and other skilled professionals, but getting approval and navigating bureaucracy were major challenges. Despite these obstacles, the hackers' successful mission showed the importance of their expertise in modern warfare.

      The US military-trained hackers faced tension and hurdles due to deconfliction with the inner agencies, high-up approvals, and government bureaucracy before going ahead with the mission. Anonymous also joined the fight against ISIS, reporting thousands of Twitter and Facebook accounts, taking down ISIS websites, and frustrating the intelligence community's data collection. However, such activism could lead to the loss of data sources and the need for coordination with hackers. The operation required access to aerial photos, code-breakers, developers, linguists, and interpreters. Every member of the team had to pass the mission briefs and gain confidence in the plan, given the publicity within the community. Despite the risks, the hackers succeeded in their mission.

    • Operation Glowing Symphony: Taking Down the ISIS Media EmpireSecuring your email account is essential because over 90% of cyberattacks begin with e-mail access. Once hackers have access, they can pivot to other associated accounts and wreak havoc.

      The US Cyber Command used Operation Glowing Symphony to decimate ISIS media by taking down as much as possible in the shortest amount of time possible and then picking apart the remaining remnants. The team spent months gaining access to the network, and it all started with e-mail access. Over 90% of cyber-attacks start with e-mail access, which provides access to the username, e-mail address, and password. Once hackers gain access to an e-mail account, they can pivot to other accounts associated with that e-mail for password reset. Thus, it's essential to secure e-mail accounts to prevent hackers from gaining unauthorized access to other accounts associated with it.

    • Protecting Email Access to Secure All Accounts.Secure your email account with a long, complex password and enable two-factor authentication to prevent hackers from accessing your email and gaining access to other services you use. Conduct thorough preparation like Operation Glowing Symphony's team for optimal security.

      Protecting your email access is crucial as it can serve as the core key to pivot through multiple accounts. If hackers can access your email, they can reset passwords and gain access to other services you use. To secure your email account, you should create a long and complex password and enable two-factor authentication. If anyone gains access to your email, they can access almost everything. Operation Glowing Symphony relied on multiple access vectors to gain access to their targets. They spent time pairing the infrastructure with the exploits they needed and planned out the operation to a T. The team had extensive rehearsals and received approval from technical experts before executing the operation. OGS was their primary focus, and they conducted preparation even on nights and weekends.

    • Cyber Strike Against ISIS Media NetworkThe success of the cyber-strike against ISIS media network showcased the power of profiling and meticulous planning in executing a plan. It also highlighted the capabilities of the NSA and US Cyber Command in infiltrating and understanding the enemy to the extent of accessing their secret questions for any account.

      During the cyber-strike, the task unit picked a ten-minute window to launch their plan. Teams worked together in the Operations Room, executing according to plan, and destroying key infrastructure in ISIS media network. They had a large printout of every target attached to the wall and briefed the higher authority as they progressed. However, one team hit a roadblock during their mission and had trouble authenticating with a security question. Through meticulous profiling of the enemy, an analyst provided the right answer and the task unit continued executing the plan. This emphasizes the power of NSA and US Cyber Command to understand and infiltrate someone's life to the extent that they know their secret questions for any account they've ever set up.

    • Operation Glowing Symphony's Impact on Taking Down ISISOperation Glowing Symphony successfully disrupted ISIS's key nodes and targets, resulting in a reduction of their propaganda and communication channels, as well as significant losses in financial accounts and crypto-currencies.

      Operation Glowing Symphony was an effective mission to take down ISIS's key nodes and targets. The task force successfully accomplished their objectives within ten minutes of the mission, resulting in several losses for ISIS, including financial accounts and crypto-currencies. The ISIS media team suffered the most significant loss, as all their servers and accounts went offline, forcing them to rebuild the entire network from scratch. Though their IT team managed to bring back their sites, files and accounts with a lot of trouble, the production cycle was longer than before. One significant impact of Operation Glowing Symphony was a drastic reduction in ISIS's tweets on Twitter, which indicates its effectiveness in disrupting their propaganda and communication channels.

    • The Consequences of Missing Deadlines and the Rise of Information WarfareMissed deadlines can have significant consequences on a brand and make it less appealing to audiences. With the rise of information warfare, the military is building out cyber branches to defend and execute offensive missions.

      Missing deadlines can erode the quality of a brand and make it less appealing to audiences. This was evident in the case of ISIS media outlets, where repeated cyber-attacks over seven months not only took down 90% of their websites but also led to their media production slowing down and ultimately being discredited. The US government has never taken credit for cyber-attacks like this, but it is important for the military to have readiness in this domain since information warfare is now a fifth domain of warfare. The military is building out cyber branches with cyber-specialities for both enlisted and officer positions to defend and execute offensive missions.

    • The US's Fight Against Cyber ThreatsThe NSA and Cyber Command work to protect and defend the US against cyber threats, even if it means crossing legal boundaries. Their mission is vital, but with technology advancing, potential risks remain.

      The documentary 'Darknet Diaries' reveals that the US is in the fight against cyber threats. The NSA and Cyber Command are taking up the responsibility to protect the US from threats and are conducting destructive cyber-attacks like JTF-ARES that target the enemies. Although they have sometimes crossed the legal boundary of surveillance, their goal and mission are clear. With the advancement of technology, it is alarming to think about what other doors have got opened because of these attacks. The US has never admitted to conducting destructive cyber-attacks like Stuxnet. However, with the approval of telling the story about US Cyber Command's involvement in hacking ISIS without revealing any confidential information, it is fascinating to learn about the US security and protection measures.

    Recent Episodes from Darknet Diaries

    147: Tornado

    147: Tornado

    In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

    This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.

    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    16: Sum Ting Wong

    16: Sum Ting Wong
    Asiana Fox Faux Pas, the death & ressurection of Hulu, Atari Alums hit the slums, Jobs screwing Apple from beyond the grave, dorky algorithms, DEF CON biting the hand that spies, stalkers delight in new creepy, more crap you can't afford. Subscribe to the Grumpy Old Geeks on iTunes and give us a five star rating. You know you want to! Shownotes: On the Shortness of Life - Kindle Edition San Diego Zoo Safari Park Why you don't rely on interns. The Death of Hulu Owners call off Hulu sale, to inject cash instead Judge In Apple Price-Fixing Trial Used This Video Of Steve Jobs Chatting With Walt Mossberg To Prove Apple's Guilt Seriously?! Prismatic FEDS, WE NEED SOME TIME APART. Hackers convention ask government to stay away over Snowden Secure Ideas will not be presenting at DEF CON this year General Alexander Black Hat Keynote DEF CON 20 Videos Background Check app Intelius Date Check Patrick Smith's Ask the Pilot Touch of Modern The 50 Most Perfectly Timed Photos Ever Quit on 5 by 5 See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    18: A Cornucopia of Crazy Making

    18: A Cornucopia of Crazy Making
    Celebrity weddings, hearty stouts, class clowns ruin it for everyone, private armies, another kickstarter rip-off, Japan rules at crazy, and Kanye West is still a total douchebag. They also discuss the future of making money on the internet. Subscribe to the Grumpy Old Geeks on iTunes and give us a five star rating. You know you want to! Shownotes: John Rzeznik Is Married Jimmy Beaumont & The Skyliners Jason's step-dad comes in at 2:46 Ten Fidy Stone Farking Wheaton w00tstout! University Suspends Online Classes After More Than Half the Students Fail Apple Developer site hack: Turkish security researcher claims responsibility Apple releases status board in reaction to hacked dev portal Monsanto Buys BLACKWATER the largest mercenary army in the world Selfie-Loathing: Instagram is even more depressing than Facebook. Here’s why. Awesome FREE Instagram Exporter The Wayback Machine The Archive Documentary This is not a conspiracy theory Kanye West sells $120 t-shirts: On the Emotional and Literal Value of Bravado. Seriously? Bizarre "Bagel Head" Injections Become Latest Beauty Trend in Japan Heard App IFTTT App NeverWet promo video NeverWet, the viral "magic" spray doesn't work. At all. Behind the scenes at a McDonald's photo shoot Arby's meat on Snopes Who Owns the Future? by Jaron Lanier Flattr See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    Episode 3139: Dark Enigma - The Eerie Enigma of Cicada 3301

    Episode 3139: Dark Enigma - The Eerie Enigma of Cicada 3301
    Please be aware the stories, theories, re-enactments and language in this podcast are of an adult nature and can be considered disturbing, frightening and in some cases even offensive. Listener Discretion is therefore advised.

    Welcome heathens welcome to the world of the weird and unexplained. I’m your host, Nicole Delacroix and together, we will be investigating stories about the things that go bump in the night, monsters lurking under your bed or deep in the forest, that unknown creature lurking just out of sight and frighteningly imagined creatures, ghosts, supernatural beings or unsolved mysteries. So, sit back, grab your favorite drink, and prepare to be transported to today's dark Enigma....

    And on today’s Dark enigma we’re looking into a rather interesting conspiracy theory, well not so much conspiracy as weird, but I’ll let you be the judge. Okay, with that said, we will still be playing our drinking game and as you know, the drinking game is only for those of us that are at home and have nowhere else to go tonight. The choice of libation is yours, so choose your poison accordingly… Alright, now for the game part how about every time I say Internet that will be a single shot and every time I say Cicada, that will be a double shot. Now that the business end is out of the way we can jump headfirst into today’s dark enigma… so put on your best cyberpunk duds, grab your laptop and log into the darkest parts of the web as we jump down the rabbit hole with The Eerie Enigma of Cicada 3301

    We live in the age of the Internet. Virtually every aspect of our lives is tied in some shape or form to cyberspace, and the net has become a sprawling, lawless cyber jungle. And just like a jungle, there are things that move in the shadows and stalk about the wilderness here in the ether. In some cases it’s hard to know if what is prowling out there in the dark is harmless, a predator, a mere illusion caused by the play of light on the leaves, or something else. It is from this cyber wilderness that creeps one of the weirdest unsolved technological mysteries of the modern age; a puzzle put forth from some mysterious cabal whose agenda and identity remain unknown to this day, and which has spiraled into perhaps the most legendary and baffling conundrums of the Internet.

    On 4th January 2012, a cryptic message in simple white text on a black background mysteriously appeared on the infamous Imageboard 4chan set a small corner of the internet ablaze. It stated simply: “Hello. We are looking for highly intelligent individuals. To find them, we have devised a test. There is a message hidden in the image. Find it, and it will lead you on the road to finding us. We look forward to meeting the few who will make it all the way through. Good luck.” The denizens of 4chan didn’t know what to make of it. Was it a marketing tactic? A recruitment scheme for some tech firm? An elaborate joke?

    53: Shadow Brokers

    53: Shadow Brokers
    The NSA has some pretty advanced, super secret, hacking tools. What if these secret hacking tools were to end up in the wrong person’s hands? Well, that happened. Guest Thanks to Jake Williams from Rendition Security for telling us the story. Sponsors This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Don't underestimate how much trouble Facebook is in right now

    Don't underestimate how much trouble Facebook is in right now
    Facebook's management doesn't seem to understand why daily use on the site is continually falling. It may be because of all of the false promises Facebook has made about fixing problems like fake news and conspiracy videos. Facebook would do well to remember the fall of Myspace and what happened to Nokia and Blackberry.  

    Learn more about your ad choices. Visit megaphone.fm/adchoices