back to indexChris Tarbell: FBI Agent Who Took Down Silk Road | Lex Fridman Podcast #340
Chapters
0:0 Introduction
1:16 Silk Road
11:39 Mass surveillance
15:50 Operation Onion Peeler
21:6 Hacker Avunit
31:56 Ross Ulbricht and Silk Road
44:39 Edward Snowden
46:44 NSA surveillance
58:51 Silk Road murders
67:37 Dark web
71:39 Ross Ulbricht's arrest
79:37 Aaron Swartz
82:55 Donald Trump and the Mar-a-Lago raid
86:1 Tech companies and censorship
95:0 War in Ukraine
98:58 Anonymous and LulzSec
109:10 FBI
112:11 Personal threats
117:57 Hector Monsegur a.k.a Sabu
131:7 Cyber attack threats against civilians
147:55 Most secure operating system
151:44 Cyber war
159:38 Advice for young people
164:50 FBI's credibility
173:21 Love
00:00:00.000 |
You could buy literally whatever else you wanted. 00:00:11.480 |
- The following is a conversation with Chris Tarbell, 00:00:16.200 |
a former FBI special agent and cyber crime specialist 00:00:27.240 |
And he tracked down and arrested Hector Monsegur, 00:00:55.760 |
I would also like to interview people on the other side, 00:01:01.240 |
and perhaps the cyber criminals who have not been caught 00:01:10.040 |
please check out our sponsors in the description. 00:01:18.600 |
cybersecurity law enforcement agents of all time. 00:01:32.440 |
who was one of the most influential hackers in the world. 00:01:38.400 |
of tracking down Russ Ulbricht and Silk Road? 00:01:42.640 |
And maybe let's start by explaining what is the Silk Road. 00:01:45.280 |
- It was really the first dark market website. 00:01:55.200 |
You couldn't buy guns, because that was a different website, 00:02:02.960 |
but you could buy literally whatever else you wanted. 00:02:23.920 |
So internally to the FBI, how I had to sell it, 00:02:30.360 |
And I think one time I saw a posting for baby parts. 00:02:43.040 |
- For like surgical operations versus something darker. 00:02:48.200 |
as far as people that wanted to eat body parts. 00:02:51.000 |
I did interview a cannibal once when I was in the FBI. 00:02:57.240 |
- So I just watched Jeffrey Dahmer document on Netflix, 00:03:00.920 |
and it just changed the way I see human beings 00:03:04.040 |
because it's a portrayal of a normal-looking person 00:03:11.240 |
and doing so not out of a place of insanity, seemingly, 00:03:19.400 |
It's disturbing that people like that are out there. 00:03:22.080 |
So people like that would then be using Silk Road, 00:03:34.240 |
- It was primarily drugs, and that's the way it started. 00:03:35.920 |
It started off with Ross Ulbricht growing mushrooms 00:03:38.440 |
out in the wilderness of California and selling them. 00:03:41.240 |
But really his was more of a libertarian viewpoint. 00:03:48.000 |
And the way Silk Road kind of had the anonymity 00:03:50.800 |
is it used what's called Tor, the Onion Router, 00:03:54.120 |
which is an anonymizing function on the deep web. 00:04:05.320 |
So it was the first time that we saw this birth 00:04:13.320 |
So in cybercrime, you go after, one, the IP address 00:04:21.600 |
- Cache meaning the flow of money, physical or digital, 00:04:25.480 |
and then IP is some kind of identifying thing 00:04:31.080 |
- It's your telephone number on your computer. 00:04:33.040 |
So yeah, all computers have a unique four-octet numbers. 00:04:43.760 |
And the computer uses DNS or domain name services 00:04:52.040 |
your computer then translates that to that IP address 00:04:56.840 |
- Didn't Silk Road used to have guns in the beginning? 00:05:04.320 |
and then Russ realized like, this is not good? 00:05:08.680 |
I think there were guns on there and he tried to police it. 00:05:12.360 |
He told himself that they're the captain of the boat, 00:05:16.280 |
So I think he took off those posts eventually 00:05:21.080 |
- What was the system of censorship that he used 00:05:30.000 |
- Do you know by chance if there was a lot of debates 00:05:33.880 |
and criticisms internally amongst the criminals 00:06:24.680 |
- So we had arrested a guy named Jeremy Hammond 00:06:30.000 |
it was the second time he had been arrested for hacking. 00:06:37.220 |
The FBI has a computer system where you look up things. 00:06:46.480 |
And we were finding at the time a lot of things 00:07:09.020 |
and 14 hours, 15 hours a day, you sort of take a break. 00:07:13.000 |
The boss kind of said, yeah, I'll see you in a few months. 00:07:14.800 |
Go get to know your family a little bit and come back. 00:07:21.960 |
And that's when we were finding case closed, it was TOR. 00:07:29.480 |
And Silk Road was being looked at by other law enforcement, 00:07:44.800 |
- And so you were taking a cyber security approach. 00:08:06.320 |
- That when you were at college, you wrote a paper 00:08:08.400 |
and you're connected to the person that started. 00:08:18.720 |
- No, that's exactly what you were about to tell me. 00:08:20.720 |
- I was looking up his name 'cause I forgot it. 00:08:22.320 |
So one of my advisors for my PhD was Rachel Greenstadt 00:08:46.840 |
and the timing of it, it was just like beautiful. 00:09:01.940 |
in terms of like when you were tracking people. 00:09:05.160 |
Can you paint a picture of what Tor is used in general? 00:09:09.240 |
Other, it's like when you talk about Bitcoin, 00:09:12.000 |
for example, cryptocurrency, especially today, 00:09:23.560 |
so that like spies inside countries could talk to spies 00:09:29.720 |
And then they released that information free to the world. 00:09:35.280 |
versions, two different ways it can be utilized. 00:09:38.240 |
There's .onionsites, which is like a normal website, 00:09:40.800 |
a .com, but it's only found within the Tor browser. 00:09:43.200 |
You can only get there if you know the whole address 00:09:46.400 |
The other way Tor is used is to go through the internet 00:09:59.200 |
and I would trace it back out to a Tor relay. 00:10:01.800 |
And then because you don't have an active connection 00:10:09.360 |
I would have to go to each machine physically live 00:10:11.920 |
and try to rebuild that, which is literally impossible. 00:10:21.120 |
on this world that spent quite a few years of your life 00:10:37.640 |
the exploitation of children fucking pisses me off. 00:10:41.120 |
And that sort of jaded my opinion towards Tor 00:10:46.120 |
because that, because it helps facilitate those sites. 00:10:49.680 |
- So this ideal of freedom that Russell Albrecht, 00:11:00.920 |
because of what you've seen that ideal being used for. 00:11:13.520 |
'cause no one listening to this is ever gonna say 00:11:15.600 |
that I'm wrong and that we should allow child porn. 00:11:19.240 |
Should, because some people utilize it in a bad way, 00:11:41.560 |
in tracking down information, and we'll get to it, 00:11:44.760 |
there is some suspicion that this was only possible 00:11:49.720 |
with mass surveillance, like with NSA, for example. 00:12:22.840 |
- I mean, nobody wants to give up their privacy. 00:12:26.240 |
I say that, I say no one wants to give up their privacy, 00:12:28.720 |
but I mean, I used to have to get a search warrant 00:12:33.320 |
and you've got pictures of all inside your house 00:12:37.160 |
so people like the idea of not giving up their privacy, 00:12:43.520 |
They're giving away their freedoms all the time. 00:12:44.960 |
They're carrying watches that gives out their heartbeat 00:12:47.960 |
to a weight of companies that are storing that. 00:12:49.680 |
I mean, what's more personal than your heartbeat? 00:12:57.480 |
And I would say most people don't really need 00:13:03.720 |
is that if you want to criticize the government 00:13:12.400 |
So when you need the freedom, you should have it. 00:13:17.960 |
there's something going wrong with the country I love, 00:13:28.120 |
is there's that individual revolutionary spirit, 00:13:31.480 |
like so that the government doesn't become too powerful. 00:13:37.200 |
There's always the best of the ideal of freedom of speech. 00:13:46.760 |
or indirect suppression of that through mass surveillance. 00:14:00.440 |
I'm gonna get a ticket every time I say something bad, 00:14:05.840 |
The bureaucracy grows and the freedoms slip away. 00:14:11.560 |
- I completely see your point and I agree with it. 00:14:16.600 |
people criticize the government of these freedoms, 00:14:19.040 |
but tech companies talk about destroying your privacy 00:14:25.160 |
and they can decide what's on their platform, 00:14:28.560 |
but they're taking away your freedoms of what you can say. 00:14:32.600 |
where maybe government officials were in line 00:14:35.360 |
with tech companies to take away some of that freedom. 00:14:40.560 |
- Yeah, there's something about government that feels, 00:14:43.560 |
maybe because of the history of human civilization, 00:14:47.240 |
maybe because tech companies are a new thing, 00:14:50.040 |
but just knowing the history of abuses of government, 00:14:59.920 |
to take hold at scale more than tech companies, 00:15:06.720 |
But I mean, we haven't had a voice like we've had 00:15:10.520 |
I mean, anyone that has a Twitter account now can speak 00:15:18.720 |
If they wanted to speak out against the government 00:15:22.880 |
or organize a protest or do something along those lines. 00:15:26.160 |
So we have more of a place to put our voice out now. 00:15:30.240 |
- Yeah, it's incredible, but that's why it hurts. 00:15:36.240 |
The president of the United States of America 00:15:39.840 |
was removed from one such or all such platforms. 00:15:49.680 |
- But let's return to Silk Road and Russ Elbrecht. 00:15:54.680 |
So how did your path with this very difficult, 00:16:02.680 |
- We were looking to open a case against Tory 00:16:11.840 |
with 26 different onion, dot onions that we targeted. 00:16:21.720 |
and we were like the premier squad in New York 00:16:29.320 |
And so, any website that was offering hackers for hire 00:16:38.400 |
now we're seeing ransomware as a paid service 00:16:45.840 |
So we opened this case on, I think we called it, 00:16:50.160 |
One of the fun thing in the FBI is when you start a case, 00:16:59.120 |
I think we called this Onion Peeler because of the, yeah. 00:17:02.240 |
- So a little bit of humor, a little bit of wit 00:17:05.440 |
and some profundity to the language, yeah, yeah. 00:17:11.040 |
- Yeah, this one had the potential of being a big one 00:17:13.480 |
because I think Silk Road was like the sixth on the list 00:17:33.720 |
- I wish to say that Tor is the name of the project, 00:17:47.800 |
with a Tor relay, which are all publicly available out there. 00:18:03.880 |
and then knows about the next relay down the chain. 00:18:11.400 |
Now, relay number two only knows about relay number one. 00:18:16.360 |
And it goes through there, adding those layers on top, 00:18:19.000 |
layers of encryption till it gets to where it is. 00:18:21.480 |
And then even the onion service doesn't know, 00:18:23.640 |
except for the relay it came from, who it's talking to. 00:18:27.320 |
And so it peels back that, gives the information, 00:18:31.280 |
And so it's layers, like you're peeling an onion back 00:18:34.720 |
of the different relays and that encryption protects 00:18:38.920 |
who the sender is and what information they're sending. 00:18:42.360 |
the more exponentially difficult it is to decrypt it. 00:18:52.080 |
It's mathematically impossible to decrypt it. 00:18:54.320 |
But the more relays you have, the slower it is. 00:18:58.240 |
I mean, that's one of the big drawbacks on Tor 00:19:17.120 |
People have come up with different techniques. 00:19:19.760 |
There's been techniques to put out in the news media 00:19:22.760 |
about how they do it, running massive amounts of relays 00:19:34.560 |
What about trying to infiltrate the actual humans 00:19:39.560 |
that are using the Silk Road and trying to get in that way? 00:19:44.140 |
- Yeah, I mean, I definitely could see the way of doing that 00:19:47.760 |
and in this case, in our takedown, we used that. 00:19:51.880 |
There was one of my partners, Jared Darragon, 00:19:54.320 |
he was an HSI investigator and he had worked his way up 00:20:02.640 |
because he was inside and talking to, at that time, 00:20:07.120 |
we only know it as DPR or Dread Pirate Roberts. 00:20:13.640 |
And one of the things, the technical aspects on that 00:20:20.600 |
There was, that's a type of communication server 00:20:32.000 |
So we had a pretty good idea what part of the country 00:20:38.520 |
- I mean, isn't that, from DPR's perspective, 00:20:47.680 |
- Do you notice that aspect of the technical savvy 00:20:50.200 |
of some of these guys doesn't seem to be quite, 00:20:55.120 |
- Well, the real techie savvy ones, we don't arrest. 00:21:06.880 |
- I mean, yeah, I mean, we're getting the low-hanging fruit. 00:21:08.880 |
I mean, we're getting the ones that can be caught. 00:21:13.120 |
but the anonymous case, there was a guy named AV Unit. 00:21:18.080 |
We caught everybody else, we didn't catch him. 00:21:22.680 |
He pops up, too, once in a while on the internet, 00:21:26.720 |
- AV Unit, that's all I know, is his AV Unit. 00:21:34.280 |
- Can I actually, can we go on that brief tangent? 00:21:37.800 |
- Well, let me ask you, since he's probably he or she, 00:21:46.840 |
- Another funny story about hackers, the he/she issue. 00:22:08.920 |
and he was in love with her almost at one point. 00:22:12.720 |
It turns out to be a 35-year-old guy living in England. 00:22:21.560 |
By a linguistic, human-based linguistic analysis or what? 00:22:28.840 |
so it ended up being a modification of his sister's name, 00:22:40.600 |
They social engineer the shit out of each other 00:22:43.440 |
just to build, if one of them ever gets caught, 00:22:47.400 |
that they're a Brazilian ISP owner or something like that, 00:22:55.480 |
is part of living a life of cyber crime or cybersecurity 00:23:07.760 |
Is it possible for me to have a podcast conversation 00:23:33.600 |
I mean, someone who has been living a double life 00:23:36.440 |
for long enough, where you think they're not a criminal. 00:23:45.080 |
- Oh, you would wanna have a conversation with AV unit? 00:24:07.640 |
understanding their mind, I think is very important. 00:24:12.600 |
And I think there's fundamentally something different 00:24:24.320 |
You have a big shift in your understanding of the world. 00:24:27.680 |
I mean, I do have a question about the ethics 00:24:31.320 |
of having such conversations, but first, technically, 00:24:44.040 |
that you're having this conversation with, the better. 00:24:46.720 |
And yeah, you could, are you doing it in person? 00:24:55.440 |
I mean, you couldn't publish the show for a while. 00:25:03.380 |
I say tapes 'cause it's old school, the opt-out, you know. 00:25:08.040 |
- Exactly, I'm sure a lot of people just said that, 00:25:18.600 |
They'd have to have complete faith and trust in you 00:25:21.080 |
that you destroy the originals after you've altered it. 00:25:28.960 |
So like for me to go through some kind of process 00:25:38.400 |
I don't know if that's the life you wanna live. 00:25:47.160 |
It's worthy to go through the hardship of that 00:25:52.400 |
I think fundamentally conversations are a different thing 00:26:03.160 |
the honest conversation that you're looking for. 00:26:05.520 |
I mean, it may sound honest, but it may not be the truth. 00:26:08.320 |
I found most times when I was talking to criminals, 00:26:15.400 |
they can keep that story going for long enough. 00:26:18.080 |
If they're not, you kind of see the relief in them 00:26:26.720 |
If the interviewer is good, then perhaps not directly, 00:26:41.320 |
what their motivations are, what their ethics are, 00:26:44.260 |
how they see the world, what is good, what is evil, 00:27:02.160 |
to a different view of the world than others perhaps have? 00:27:05.800 |
Do they have certain fetishes, like sexual and otherwise, 00:27:15.960 |
to the cybersecurity infrastructure of our world, 00:27:20.120 |
not in detail, but like philosophically speaking. 00:27:24.240 |
They might have, I know you might say it's just a narrative, 00:27:29.240 |
but they might have a kind of ethical concern 00:27:35.240 |
that they're essentially attacking the weakness 00:27:47.940 |
And if they're stealing a bunch of money, that's okay, 00:27:51.060 |
because that's gonna enforce you to invest a lot more money 00:27:53.780 |
in defending, yeah, defending things that actually matter, 00:27:58.380 |
you know, nuclear warheads and all those kinds of things. 00:28:01.340 |
I mean, I could see, you know, it's fascinating 00:28:05.100 |
to explore the mind of a human being like that 00:28:07.220 |
because I think it will help people understand. 00:28:16.740 |
that's creating a lot of suffering in the world, 00:28:20.820 |
So do you think ethically it's a good thing to do? 00:28:23.860 |
- I don't, I mean, I feel like I have a fairly high 00:28:36.220 |
- I mean, not that I'm your ethical coach or anything. 00:28:40.340 |
so 'cause I thought you would have become jaded 00:28:49.420 |
- It's funny, you know, fast forward in our story, 00:28:56.580 |
I'm very good friends with Hector Monserrate, 00:29:00.340 |
and he tells stories of what he did in his past, 00:29:06.820 |
But then I listened to your episode with Brett Johnson, 00:29:11.220 |
and I was like, ah, this guy's stealing money 00:29:17.300 |
and all this sort of thing, it just pissed me off. 00:29:19.340 |
And I don't know why I have that differentiation in my head. 00:29:30.140 |
- Well, you didn't feel that way about Hector 00:29:38.380 |
and I learned about Hector over those nine months. 00:29:41.340 |
- We'll talk about a little, let's finish with, 00:29:54.780 |
he's one of the critical people in Anonymous. 00:29:57.940 |
- There's what's known in public and what was known 00:30:01.340 |
and he was sort of like the set things up guy. 00:30:11.060 |
and they had their media guy, this guy Topiary, 00:30:20.100 |
but AV unit was the guy that set up infrastructure. 00:30:34.860 |
Just because he kind of lived that lifestyle. 00:30:40.500 |
and then all of a sudden gone for three weeks. 00:30:56.860 |
And not to say, I mean, I was in over my head 00:31:00.220 |
with that case, just the amount of work that was going on. 00:31:30.380 |
- And just talk shit about you the whole time. 00:31:41.300 |
not catching another guy who's extremely good at his job. 00:31:46.780 |
- There you go, he's still eating at you, I love it. 00:31:55.540 |
- So yes, Silk Road, can you speak to the scale 00:32:04.340 |
And any other interesting things you understand 00:32:10.980 |
- So it was when we finally got looking through the books 00:32:14.780 |
and the numbers came out, it was about $1.2 billion 00:32:22.220 |
of Bitcoin at the time to come up with a real number. 00:32:24.500 |
So you kind of pick a daily average and go across. 00:32:33.700 |
you came in and you put money in an escrow account 00:32:37.060 |
and the transaction wasn't done until the client 00:32:46.580 |
There was some talk at the time that the cartel 00:32:50.980 |
So that started getting a little hairy there at the end. 00:32:53.260 |
- What was the understanding of the relationship 00:33:08.020 |
It was just, 'cause like I said, Jared was in the inside. 00:33:15.540 |
with the different people that he advised him, 00:33:27.900 |
had to send a picture of their driver's license or passport, 00:33:32.180 |
because if you are an admin on a site that sells fake IDs, 00:33:40.060 |
who profits from selling fake IDs believe that it was? 00:33:48.620 |
All the IDs that we found on Ross's computer as the admins 00:33:59.460 |
I mean, even Ross bought fake IDs off the site. 00:34:04.780 |
You know, and then he got a little cocky about it. 00:34:08.100 |
- The landscape, the dynamics of trust is fascinating here. 00:34:13.740 |
like who do you trust in that kind of market? 00:34:15.740 |
What was your understanding of the network of trust? 00:34:19.180 |
- I don't think anyone trusts anybody, you know? 00:34:20.980 |
I mean, I think Ross had his advisors of trust, 00:34:24.980 |
he required people to send their ID for their trust. 00:34:42.460 |
Can you imagine being trapped in something like that 00:34:47.380 |
and you can't tell people what you do all day? 00:34:51.340 |
- Like someone else take over or the site just shut down? 00:35:05.340 |
So walk away with some kind of financial stability. 00:35:22.940 |
- And you'd like to talk to her honestly about everything. 00:35:38.620 |
I mean, she's gonna question why the Ferrari is outside 00:35:43.780 |
Well, I'm sure you can come up with something. 00:35:47.860 |
It's another question of why don't criminals walk away 00:35:51.900 |
- Well, I mean, I don't know every criminal mind 00:35:55.900 |
I mean, not to go back to that son of a bitch, but-- 00:36:00.780 |
- But you know, Ross started counting his dollars. 00:36:04.340 |
I mean, he really kept track of how much money 00:36:06.300 |
he was making and it started getting exponentially growth. 00:36:12.060 |
he would have probably been one of the richest people 00:36:27.060 |
It's not like I can give you a briefcase of Bitcoin 00:36:33.540 |
I mean, I think it started off as sharing this idea, 00:36:39.420 |
and that's what goes and he was making a lot of money. 00:36:42.840 |
And again, my interaction with Ross was about 00:36:46.940 |
maybe five or six hours over a two day period. 00:36:52.360 |
I knew DPR 'cause I read his words and all that. 00:37:00.900 |
and so it sort of kind of gave me a little insight. 00:37:03.940 |
So I don't like to do a playbook for criminals, 00:37:06.500 |
but I'll tell you right now, don't write things down. 00:37:12.540 |
shooting people with paint balls and filming it? 00:37:16.140 |
Why would you videotape yourself committing crime 00:37:19.300 |
Like if there's one thing I've taught my children, 00:37:24.980 |
- And you actually give advice on the other end 00:37:26.860 |
of logs being very useful for the defense perspective 00:37:30.260 |
for information is useful for being with people 00:37:36.220 |
for being able to figure out what the attacks were all about 00:37:39.260 |
- Logs are the only reason I found Hector Monsegor. 00:37:41.340 |
I mean, the one time his VPN dropped during a Fox hack 00:37:48.380 |
He just was sent a link and he clicked on it. 00:37:58.460 |
So what was the process of bringing down Ross 00:38:07.820 |
You want the whole thing or you want to break it up? 00:38:11.620 |
- Once we had the information of the chat logs 00:38:23.000 |
the Silk Road was running on a server in Iceland. 00:38:31.680 |
- Yeah, that's the one that we said that, yeah, 00:38:36.540 |
I mean, the internet has their conspiracy theories 00:38:39.380 |
- But you figure out, that's the part of the thing you do. 00:38:41.780 |
It's puzzle pieces and you have to put them together 00:38:56.660 |
if you've never been, you should definitely go to Iceland. 00:39:05.300 |
- So I went to Iceland for the Anonymous case. 00:39:09.020 |
Then I went to Iceland for the Silk Road case. 00:39:10.820 |
And I was like, oh shit, all cyber crime goes through Iceland. 00:39:15.020 |
And I was over there for like the third time. 00:39:16.860 |
And I said, if I ever can bring my family here. 00:39:24.020 |
But it's where the North American continental plate 00:39:27.420 |
and the European continental plate are pulling apart. 00:39:29.780 |
And it's being filled in with volcanic material 00:39:36.300 |
Like, I was like, one day I'll be able to afford 00:39:42.780 |
- Just like the humbling and the beauty of nature. 00:39:45.060 |
- Just everything, man, it was a different world. 00:40:01.260 |
Like, Reykjavik's nice, but get out of Reykjavik 00:40:10.380 |
have been going through here for millions of years 00:40:17.020 |
You can walk behind a waterfall in one place. 00:40:20.060 |
It's the most beautiful place I've ever been. 00:40:36.980 |
And so, and then it keeps all the servers nice and cool. 00:40:40.060 |
So why not keep your computers there at a cheap rate? 00:40:54.220 |
I mean, the Pacific, the PST, the time zones, 00:40:58.100 |
there's so many fascinating things to explore here. 00:41:02.340 |
the European internet cable goes through there. 00:41:07.460 |
So they have backbone access with cheap energy 00:41:34.580 |
it was like going into Facebook of criminal activity. 00:42:10.100 |
because you basically, you say don't keep chat logs, 00:42:13.700 |
but it's very difficult to erase chat logs from this world. 00:42:18.700 |
I guess if you're a criminal, that should be, 00:42:25.180 |
To erase your footprints is very, very difficult. 00:42:30.580 |
But yeah, I mean, not only do you have to be, 00:42:34.620 |
whatever you put in a chat log or whatever you put in an email 00:42:38.580 |
to stand behind it publicly when it comes out. 00:42:43.660 |
I mean, we're seeing that now in today's society. 00:42:56.860 |
no, we'll become more accustomed to that kind of thing. 00:43:07.340 |
because of something she posted in high school 00:43:09.360 |
and the shittiest thing for him, but great for my kids. 00:43:17.580 |
So in the chat logs was a useful information, 00:43:37.580 |
And it's a certain weight in each type of drug 00:43:41.580 |
that you had, I think it's four or five employees 00:43:45.100 |
of your empire and that you made more than $10 million. 00:43:48.660 |
And so it's just like what the narco track readers 00:43:55.660 |
- And that was primarily what he was charged with 00:44:14.740 |
there's no possibility of parole when you have life. 00:44:16.940 |
The only way you get out is if the president pardons you. 00:44:31.180 |
Given, it's fascinating, but given the political, 00:44:33.940 |
the ideological ideas that he represented and espoused, 00:44:50.900 |
- I saw that, and I've heard a lot of weird theories 00:44:54.820 |
- Well, actually, on another tangent, let me ask you, 00:44:57.740 |
do you think Snowden is a good or a bad person? 00:45:04.700 |
- Can you make the case that he's a bad person? 00:45:17.300 |
I mean, I'm red, white, and blue, so I'm pretty, 00:45:22.300 |
- So you think his actions were anti-American? 00:45:24.500 |
- I think the results of his actions were anti-American. 00:45:27.260 |
I don't know if his actions were anti-American. 00:45:39.500 |
- I think we all get to judge him based on our own beliefs, 00:45:44.500 |
- Can you still mend the case that he's actually 00:45:59.400 |
- Yeah, I mean, I'm not big government-type guy, 00:46:06.140 |
coming from a government guy for so many years, 00:46:12.500 |
I mean, he put some of our best capabilities, 00:46:25.460 |
- Right, so he revealed stuff that he didn't need to reveal 00:46:30.020 |
- So if you could imagine a world where he leaked stuff 00:46:55.740 |
that it's possible for a government to collect data at scale. 00:47:00.740 |
- It's surprising to me that people are that shocked by it. 00:47:13.940 |
I mean, there's a lot of reality that people ignore, 00:47:20.620 |
you realize, holy shit, we're living in a new world. 00:47:31.900 |
how fucked we all are in terms of cybersecurity. 00:47:38.580 |
How many dangers there are in a digital world, 00:47:44.100 |
and how more intense the attacks are getting, 00:47:58.260 |
They think about privacy from tech companies. 00:48:01.020 |
They don't think about attacks, cyber attacks. 00:48:04.940 |
and that message definitely has to get out there. 00:48:07.780 |
I mean, if you have a voice, you're a target. 00:48:10.780 |
If the place you work, you might be a target. 00:48:23.180 |
the idea that the US government or any government 00:48:26.340 |
could be doing mass surveillance on its citizens 00:48:32.900 |
because you could imagine the ways in which that could be, 00:48:42.020 |
to control a citizenry for political reasons and purposes. 00:48:48.220 |
I think during, in the part of the Snowden League, 00:48:50.740 |
saw that two NSA guys were monitoring their girlfriends, 00:48:56.660 |
Those people should be punished for abusing that. 00:48:58.860 |
But how else are we going to hear about, you know, 00:49:06.500 |
And, you know, that was a case where that was the trip word, 00:49:09.220 |
that, you know, we're gonna go bomb New York City's subway. 00:49:19.460 |
Because, like, you know, in the name of the war on terror, 00:49:26.580 |
there is a trade-off between security and freedom, 00:49:29.700 |
but it just feels like there's a giant, slippery slope 00:49:33.060 |
on the sacrificing of freedom in the name of security. 00:49:40.180 |
well, I live in a world where I had to tell you exactly 00:49:44.740 |
I had to write a 50-page document of how I arrested you 00:49:47.900 |
and all the probable cause I have against you and all that. 00:49:53.500 |
and they're changing the way they're doing things. 00:49:56.820 |
You know, they're doing it to be more secure. 00:50:02.540 |
how, what we're surveilling, we're gonna lose that. 00:50:05.100 |
I mean, the terrorists are just gonna go a different way. 00:50:07.740 |
And I'm not trying to, again, I'm not big government. 00:50:22.900 |
And those 50 pages, they have a lot of value. 00:50:28.920 |
but they prevent you from abusing the power of the job. 00:50:46.440 |
and all the large-scale czar-level drug trading. 00:50:51.440 |
What else did it give you in terms of the how to catch? 00:50:56.800 |
So the Onion name was actually running on a server in France 00:51:02.420 |
and it only commuted through a back channel of VPN 00:51:07.660 |
There was a Bitcoin vault server that was also in Iceland. 00:51:19.600 |
the other admins that were hired to work on the site. 00:51:34.080 |
Don't put your infrastructure in the United States. 00:51:38.200 |
I mean, again, let's not make a playbook, but you know. 00:51:43.520 |
that people of competence would know already. 00:52:06.200 |
putting infrastructure where it shouldn't be, 00:52:12.000 |
- How did you figure out that he's in San Francisco? 00:52:28.360 |
worked for HSI, Homeland Security Investigations in Chicago. 00:52:37.600 |
come to find out he traced it back to Silk Road. 00:52:39.600 |
So he started working at a Silk Road investigation 00:52:53.080 |
a private Jabra server, private chat communication server. 00:53:01.160 |
on that Jabra server was set to the West Coast. 00:53:05.980 |
So we had a region, 1/24 of the world was covered 00:53:11.960 |
- And from there, how do you get to San Francisco? 00:53:53.000 |
- Yeah, and the name he used on that post was Frosty. 00:54:01.320 |
and here's a Gmail, and the Gmail has the name. 00:54:09.840 |
- So what's the connection of Frosty elsewhere? 00:54:12.560 |
- The person logging into the Philadelphia backup server, 00:54:22.640 |
The name is there, the connection to the Philadelphia server 00:54:28.000 |
and so the rest is small details in terms of, 00:54:33.440 |
- No, I mean, there's some electronic surveillance 00:54:37.640 |
and is there, you know, is a computer at his house 00:54:40.520 |
attaching to, you know, does it have Tor traffic 00:54:56.880 |
like what I see from that, just at the scale of that market, 00:55:05.520 |
that are not making these low-hanging fruit mistakes 00:55:10.680 |
To me, it seems like you could be a criminal, 00:55:13.940 |
much, it's much easier to be a criminal on the internet. 00:55:18.680 |
- What else to you is interesting to understand 00:55:25.640 |
and just the history of it from your own relationship with it 00:55:33.040 |
from an ethical perspective, all that kind of stuff. 00:55:39.640 |
- I think my views on the case have changed over time. 00:55:48.160 |
I sort of made a name for myself in the bureau 00:55:52.520 |
for the anonymous case, and then this one was just, 00:56:03.600 |
Unfortunately, the government shut down two days before, 00:56:14.280 |
was that affidavit with my signature at the end. 00:56:17.360 |
Otherwise, it would have just been the attorney general 00:56:20.000 |
and the president announcing the rest of this big thing, 00:56:24.320 |
- Did you understand that this was a big case? 00:56:28.560 |
- Was it because of the scale of it or what it stood for? 00:56:32.380 |
- I just knew that the public was gonna react in a big way. 00:56:39.160 |
that it was gonna be on the front page of every newspaper 00:56:44.000 |
Like I went like three or four days without sleep. 00:56:47.120 |
When I was out in San Francisco to arrest Ross, 00:56:52.280 |
So it was a three-prong approach for the takedown. 00:56:54.560 |
It was get Ross, get the Bitcoins, and seize the site. 00:56:58.280 |
Like we didn't want someone else taking control of the site 00:57:00.560 |
and we wanted that big splash of that banner. 00:57:04.440 |
Like you might not wanna think about doing this again. 00:57:18.880 |
- In the business I formed, that's what I did. 00:57:23.280 |
but smart enough to know who the smart people are. 00:57:32.760 |
the main guys I sent to Iceland, man, he was so smart. 00:57:35.240 |
I sent another guy from the FBI to France to get that part, 00:57:46.360 |
They had to pull some stuff out of memory on a computer. 00:57:57.200 |
You're, this is like a multi-layer interrogation going on. 00:58:07.120 |
We didn't have insight on who exactly I'd control. 00:58:10.120 |
So it turns out that Russ had like dictatorial control, 00:58:13.760 |
so it wasn't easy to delegate to somebody else. 00:58:23.120 |
but he couldn't give up that control on anybody apparently. 00:58:30.520 |
and his ideals were not as strong as he espoused about, 00:58:46.360 |
You could see it in his writings that he changed. 00:59:12.320 |
oh man, I can't deal with this, I can't do it, 00:59:17.240 |
the guy said, well, he's got three roommates. 00:59:27.560 |
because there was some stuff, problems in that case. 00:59:33.480 |
that they had been working on for a lot longer. 00:59:39.080 |
because now we have multiple federal agencies, 00:59:48.560 |
- So there was a de-confliction meeting that happened in DC. 00:59:52.920 |
I didn't happen to go to that meeting, but Jared went, 00:59:58.040 |
and we have like televisions where we can just sit in a room 01:00:13.640 |
and people just kept saying the term sweat equity. 01:00:18.200 |
meaning that they had worked on the case for so long 01:00:30.640 |
that we had found the server and we have a copy of it 01:00:34.640 |
And these guys had just had communications under covers. 01:00:40.640 |
And this wasn't my first de-confliction meeting. 01:00:47.880 |
- Agents within your agency or other federal agencies 01:00:52.240 |
have an open investigation that if you expose your case 01:01:17.720 |
Just because you've worked on it long enough, 01:01:19.960 |
longer than I have, that means you did better? 01:01:28.040 |
- And so that one of the part of the sweat equity discussion 01:01:31.680 |
This was, here's a chance to actually bust them 01:01:37.960 |
- They wanted us just to turn the data over to them. 01:01:44.720 |
I mean, it came to the point where they sent us, 01:01:46.880 |
like they had a picture of what they thought Ross was 01:01:58.040 |
- All right, so there's different degrees of competence 01:02:01.120 |
all across the world between different people. 01:02:05.360 |
Does part of you regret because you pushed forward 01:02:15.800 |
- I mean, the only regret is that the internet 01:02:22.040 |
that he literally paid people to have people murdered. 01:02:31.480 |
was that I had people killed and here's the money. 01:02:34.160 |
He paid a large amount of Bitcoins for that murder. 01:02:40.880 |
He actually took action, but the murders never happened. 01:02:50.000 |
- That said, can you understand the steel man, 01:03:08.600 |
I don't remember exactly, six weeks, a month, two months, 01:03:25.920 |
We could have pulled the plug on the server and gone. 01:03:37.280 |
- But if we look at the scale at the war on drugs, 01:03:43.680 |
do you think the war on drugs by the United States 01:03:57.320 |
I mean, I understand the other side of the argument. 01:03:59.560 |
I mean, people said that I don't have to go down 01:04:13.560 |
if I made it more difficult for my children to get drugs, 01:04:20.280 |
if we legalize all drugs, including heroin and cocaine, 01:04:30.160 |
legalizing all drugs would make for a better world. 01:04:40.200 |
I've started to, I like to see both sides of an argument. 01:04:49.520 |
But I don't wanna be, my race children in a world 01:04:57.480 |
- Well, and then the other side of it is with Silk Road, 01:05:00.600 |
taking down Silk Road, did that increase or decrease 01:05:06.720 |
the number of drug trading criminals in the world? 01:05:14.360 |
I think, that's one of the things I think about a lot 01:05:24.040 |
but then after that, it was on the front page of the paper, 01:05:25.960 |
and there was millions of people that knew about Tor 01:05:31.080 |
I would have thought, I thought crypto was gonna crash 01:05:34.840 |
Like, I don't know, people now see that bad people 01:05:41.680 |
And I thought, Ross was sentenced to two life sentences 01:05:55.840 |
and I'm gonna steal all the money that came in. 01:06:36.680 |
it could be used as a place to find criminals, right? 01:06:45.120 |
start get to involve you, you go after the dealers. 01:06:58.480 |
And a lot of people in upper management of the FBI 01:07:00.920 |
didn't have the appetite of running something like that. 01:07:04.240 |
That would have been the FBI running a drug market. 01:07:06.920 |
How many kids, how many fathers would have to come in 01:07:09.440 |
and said, "My kid bought while the FBI was running a site, 01:07:14.800 |
So I didn't know of anybody in the FBI and management 01:07:21.960 |
'Cause remember at that time we're still believing 01:07:26.280 |
We're still investigating where are all these bodies. 01:07:29.000 |
That's pretty much why we took down Ross when we did. 01:07:35.600 |
- What else can you say about this complicated world 01:07:53.040 |
Now, I'm really surprised that it hasn't grown 01:07:55.880 |
into other networks or people haven't developed 01:08:02.520 |
I mean, there's a few others and I'm not gonna put 01:08:10.480 |
- Yeah, my sense was when I interacted with TOR 01:08:19.080 |
it's just not as good of a browser to look at stuff. 01:08:29.960 |
I know some people would use it to like view movies 01:08:31.880 |
like Netflix, so you can only view certain movies 01:08:34.640 |
You can use it for that, but it's too slow even for that. 01:08:46.720 |
it's just difficult to understand the digital world. 01:08:56.200 |
It's just, it's hard to, what am I trying to say? 01:09:00.160 |
It's hard to visualize it in the way I can visualize it. 01:09:04.600 |
I can visualize meetings between people, military strategy, 01:09:14.040 |
I can visualize the people, there's agreements, 01:09:16.640 |
hands, handshakes, stuff signed, groups built. 01:09:21.640 |
Like in the digital space, like with bots, with anonymity, 01:09:31.420 |
- Like, yeah, it feels like I can't trust anything. 01:09:34.760 |
And like, you can talk to two different people 01:09:40.400 |
Hector had so many different identities online, 01:10:00.840 |
- Ross Albrecht represents the very early days of that. 01:10:15.880 |
You just see how good people are at video games. 01:10:17.760 |
Like the level of play in terms of video games. 01:10:37.640 |
- Yeah, I stopped playing because it's so embarrassing. 01:10:45.360 |
- And in some sense, hacking at its best and its worst 01:10:50.360 |
And you can get exceptionally good at that kind of game. 01:11:06.280 |
whatever hacked into Uber was his screen name. 01:11:10.720 |
I mean, one building evidence against himself, 01:11:19.480 |
What do you think is in the mind of that guy? 01:11:24.520 |
Do you think they see themselves as good people? 01:11:33.760 |
- So that Uber hacker, I think that's just youth 01:11:45.080 |
He truly had his beliefs that he could provide 01:11:58.280 |
- What's the difference between DPR and Ross? 01:12:03.840 |
"I have only had those two days of worth of interaction." 01:12:07.920 |
- It's just interesting given how long you've chased him 01:12:11.920 |
what was the difference to you as a human being? 01:12:26.800 |
I'm gonna be the one in charge of dealing with this person, 01:12:53.200 |
And you can kind of like, "Let's start thinking about this. 01:12:58.720 |
There's a lot of cops out there and federal agents, cops, 01:13:06.360 |
You don't get very far being a mean asshole to somebody. 01:13:15.080 |
you were still able to have compassion for him? 01:13:29.600 |
because I was dealing with people in Iceland, 01:13:35.400 |
So, and I was in San Francisco, so timeframe, 01:13:44.720 |
while Ross sat in jail and bought him breakfast. 01:13:50.920 |
and took him over to the FBI to do the FBI booking, 01:13:56.520 |
I mean, and you don't get paid back for that sort of thing. 01:14:00.840 |
- Did he make special requests for breakfast? 01:14:04.440 |
- What, can you mention, is that top secret FBI? 01:14:10.000 |
And, you know, but I mean, he already had lawyered up, 01:14:13.560 |
so we, you know, which is his right, he can do that. 01:14:23.940 |
- Most of the conversations have to be then with lawyers. 01:14:30.500 |
or if I did, it couldn't be used against him. 01:14:33.240 |
So we just had conversation where I talked to him. 01:14:38.080 |
but then I have to remind him that he asked for a lawyer, 01:15:01.020 |
I mean, he did offer me $20 million to let him go 01:15:13.900 |
I think he kind of got caught up in how much money it was, 01:15:17.580 |
and how, you know, when crypto started, it was pennies, 01:15:20.980 |
and by the time he got arrested, it was 120 bucks, 01:15:26.300 |
Even today, you know, that's a lot of Bitcoins. 01:15:31.280 |
if you continued to be one of the richest people 01:15:34.640 |
- I possibly could have been if I took that 20 million then. 01:15:38.480 |
we could have this conversation in Venezuela. 01:15:54.840 |
I don't think he probably wants to hear from me. 01:15:57.100 |
- And do you know where, in which prison he is? 01:16:04.820 |
for a little while, like the high security one 01:16:13.900 |
- I wonder if he can do interviews in prison. 01:16:36.300 |
I've been married to my wife for 22 years now. 01:16:46.340 |
- Did you think the movie on the topic was good? 01:16:49.820 |
- I didn't have anything to do with that movie. 01:16:59.260 |
- When Hollywood, I don't think they understand 01:17:02.120 |
what's interesting about these kinds of stories, 01:17:06.060 |
and there's a lot of things that are interesting, 01:17:09.740 |
So for example, I recently talked to John Carmack, 01:17:16.020 |
So Hollywood would think that the interesting thing 01:17:23.740 |
like a parody of a hacker or something like that. 01:17:36.420 |
for five hours with him, for 10 hours with him, 01:17:45.620 |
even if they don't understand all the details, 01:17:49.920 |
That's just one way of saying that you wanna reveal 01:17:57.180 |
in interesting ways, and to make a Hollywood, 01:18:19.760 |
the trust issues of the different criminal entities involved, 01:18:28.340 |
the being shitty at certain parts on the technical front, 01:18:49.580 |
of a difficult story and reveal the human side, 01:18:55.380 |
and have some deep, profound understanding on that case, 01:19:02.220 |
In this case, you could reveal the bureaucracy, 01:19:13.580 |
When I rewatch it, I can't watch episode three, though, 01:19:19.260 |
They go around shooting all the dogs and all that. 01:19:34.620 |
- Just to linger on this ethical versus legal question, 01:19:37.900 |
what do you think about people like Aaron Schwartz? 01:19:47.980 |
He downloaded and released academic publications 01:19:56.660 |
and he was arrested for that and then committed suicide, 01:20:15.460 |
scientific knowledge is being put behind paywalls, 01:20:20.780 |
and he basically broke the law to do the ethical thing. 01:20:26.620 |
Now, you could challenge it, maybe it is unethical, 01:20:31.980 |
but there's a gray area, and to me at least, it is ethical. 01:20:43.500 |
created by the institutions that hold these publications. 01:21:05.500 |
Like they're not actually making that much money. 01:21:08.900 |
It should, to me, it should all be open public access. 01:21:23.060 |
That's the other criticism, it was too harshly. 01:21:45.260 |
Unfortunately, when you're in law enforcement, 01:21:51.060 |
you have to, your job is to enforce the laws. 01:22:09.260 |
you bring the case to the U.S. Attorney's Office, 01:22:11.740 |
and whether they're gonna press charges or not, 01:22:14.180 |
you can't really pick and choose what you press 01:22:18.900 |
I never felt that, at least that flexibility, 01:22:50.460 |
the basis of the internet was to share academic thought. 01:22:58.180 |
So the role of the FBI is to enforce the law. 01:23:10.860 |
Not to get into all the aspects of the Trump case 01:23:16.580 |
I mean, the FBI has so many tools they can use 01:23:19.860 |
and a search warrant is the only way they could get in there. 01:23:28.660 |
- What do you think about the FBI and Mar-a-Lago 01:23:32.820 |
and the FBI taking the documents for Donald Trump? 01:23:38.500 |
The FBI has gotten a lot of black eyes recently. 01:24:02.140 |
they're only limited to what they're legally allowed to do 01:24:05.420 |
and a search warrant is the only legal way of doing it. 01:24:08.860 |
I have my personal and political views on certain things. 01:24:37.460 |
people in the FBI are just following the law, 01:24:41.100 |
What do you think about the conspiracy theories 01:24:42.780 |
that people, some small number of people inside the FBI 01:24:47.780 |
conspire to undermine the presidency of Donald Trump? 01:24:51.500 |
- If you would have asked me when I was inside 01:24:59.700 |
Somebody's gonna come out with some sort of information. 01:25:02.140 |
But I mean, from the more of the stuff that comes out, 01:25:06.460 |
agents are being fired because of certain actions 01:25:14.760 |
- So do you think it's explicit or just pressure? 01:25:19.500 |
Just, do you think there could exist just pressure 01:25:21.900 |
at the higher ups that has a political leaning 01:25:28.060 |
any kind of thing, but just kinda pressure people 01:25:29.900 |
to lean one way or the other and then create a culture 01:25:46.700 |
You know, I'd had no aspirations of being a boss. 01:25:56.220 |
To be management and manage people and all that, 01:26:08.820 |
warned Facebook about potential foreign interference? 01:26:16.980 |
that they're talking about Hunter Biden laptop story 01:26:27.020 |
I wouldn't believed it from being on the inside 01:26:30.100 |
But there's a certain narrative being written 01:26:42.260 |
They're saying that there's interference activity happening. 01:26:46.900 |
And it's a weird relationship between FBI and Facebook. 01:26:50.260 |
You could see from the best possible interpretation 01:26:57.660 |
a platform for viral spread of misinformation. 01:27:01.720 |
So in the best possible interpretation of it, 01:27:05.100 |
it makes sense for FBI to send some information 01:27:07.660 |
saying like we're seeing some shady activity. 01:27:11.540 |
- But it seems like all of that somehow escalated 01:27:15.860 |
- I mean, yeah, it sounded like there was a wink-wink 01:27:20.020 |
I don't know if Mark meant for that to be that way. 01:27:38.140 |
on the Facebook side have a certain political lean 01:27:43.140 |
have a political lean when they're interacting together. 01:27:50.920 |
but just with a culture that has a particular political lean 01:27:57.700 |
And so like maybe it could be Hunter Biden laptop one time 01:28:17.580 |
that I'm sure they were offered a position at some point. 01:28:19.860 |
It seems, you know, there's FBI agents that go, 01:28:27.020 |
that now leads up their child exploitation stuff. 01:28:29.460 |
Another squad mate runs their internal investigations, 01:28:36.820 |
especially when you're an FBI agent that's capped out 01:28:46.620 |
maybe want to please them and be asked to join them. 01:28:56.140 |
I think there has to be an introspection in tech companies 01:29:28.220 |
about the kind of bubbles we have in this world. 01:29:30.620 |
And it makes me wonder, pharmaceutical companies, 01:29:44.560 |
is to create drugs that help people and do so at scale. 01:29:49.280 |
And it's hard to know at which point that can be corrupted. 01:30:07.060 |
you can convince yourself if anything is good. 01:30:14.460 |
I'm sure many just, "Bloodlands" is another book 01:30:21.220 |
And the ability of humans to convince they're doing good 01:30:23.980 |
when they're clearly murdering and torturing people 01:30:31.460 |
They're able to convince themselves they're doing good. 01:30:40.340 |
So it has taught me to be a little bit more careful 01:31:13.460 |
Yeah, and also it inspired me to question my own assumptions 01:31:26.000 |
I mean, do you wanna be just static and not grow? 01:31:28.260 |
You have to question yourself on some of these things 01:31:35.300 |
of being a public personality when you speak publicly 01:31:38.300 |
is you get attacked all along the way as you're growing. 01:31:48.460 |
And those hurt, it hurts, it hurts, it hurts. 01:32:01.220 |
One, you can shut yourself off from the world and ignore it. 01:32:15.660 |
or anyone's ever done anything was always gotten hate. 01:32:22.740 |
wear my heart on my sleeve, really show myself, 01:32:25.380 |
open myself to the world, really listen to people. 01:32:37.340 |
I mean, can you be bullied into a different opinion 01:32:40.780 |
than you think you really are just because of that hate? 01:33:04.580 |
or a Zelensky apologist, which I'm currently getting 01:33:15.700 |
it hurts because it damages slightly my faith in humanity 01:33:28.900 |
and then to see that I'm trying to find that. 01:33:34.380 |
in the limited capabilities I have to find that. 01:33:37.420 |
And so to call me something like a bad actor, 01:33:44.940 |
people don't have empathy and compassion for each other. 01:33:48.980 |
And it makes me question that for a brief moment. 01:34:16.580 |
They still, they forget he's an actual real human being. 01:34:23.660 |
- So does that cause him to wall himself off more? 01:34:35.460 |
I think that's also the difference with Joe and me. 01:34:50.060 |
that I'm always longing to connect with people 01:34:59.900 |
the things they tell you can really hurt in every way. 01:35:08.960 |
Some of it is, I mean, unforgettably haunting. 01:35:15.180 |
Not in some kind of political way, activist way, 01:35:27.380 |
- When you see a human being bad to another human, 01:35:31.580 |
You can't imagine that we can treat each other like that. 01:35:42.740 |
like when I did the child exploitation stuff, 01:35:55.460 |
And that sounds like the kind of thing you're going through. 01:36:03.180 |
but in the FBI you have to keep that machismo up 01:36:06.600 |
or they're gonna take your gun away from you. 01:36:26.580 |
given all the very intense propaganda that's happening. 01:36:30.740 |
So you can understand that there is love in the heart 01:36:42.380 |
believe they're saving these Ukrainian cities 01:36:48.260 |
Now there is stories, there is a lot of evidence 01:36:57.500 |
Now that is closer to the things you've experienced 01:37:18.940 |
if somebody shot somebody for fun in front of me, 01:37:24.440 |
Like seeing it yourself, knowing that it exists 01:37:32.380 |
and they tell me stories and you see their homes destroyed, 01:37:39.540 |
It's civilians with civilian homes being destroyed. 01:37:44.680 |
It's, yeah, the people that are capable of that. 01:37:56.000 |
the non-military targets are gonna be destroyed. 01:37:59.620 |
- To put it in perspective, I'm not sure a lot of people 01:38:04.800 |
or even the military strategy side of this war. 01:38:07.720 |
There's a lot of experts outside of the situation 01:38:12.400 |
And that kind of hurts me because I feel like 01:38:19.280 |
Yeah, so my whole hope was to travel to Ukraine, 01:38:32.800 |
that have lost homes, that have lost family members, 01:38:39.120 |
who this war changed completely how they see the world. 01:38:42.600 |
Whether they have love or hate in their heart 01:38:46.440 |
I've learned a lot on the human side of things 01:38:51.120 |
But it has been on the Ukrainian side for me currently. 01:38:54.320 |
Traveling to the Russian side is more difficult. 01:39:02.680 |
can we go as far as to say his friend in Asabu, 01:39:08.600 |
What's the story, what's your long story with him? 01:39:16.960 |
who is Asabu, and who's Anonymous, what is Anonymous? 01:39:37.320 |
The power struggle comes with whoever has a hacking ability. 01:39:52.160 |
Anonymous started doing their hacktivism stuff 01:39:57.880 |
The word hack was in the media all the time then. 01:40:03.160 |
there was a federal contractor named HBGary Federal. 01:40:13.000 |
He's gonna come out and talk at Black Hat or Defcon 01:40:17.320 |
He figured it out by based on when people were online, 01:40:22.320 |
when people were in IRC, when tweets came out. 01:40:25.480 |
There was no scientific proof behind it or anything. 01:40:42.440 |
- I have very mixed feelings about all of this. 01:41:09.240 |
- But what was the philosophy of the hacktivism? 01:41:13.360 |
The philosophically, were they at least expressing it 01:41:19.920 |
- They outwardly said that they were gonna go after people 01:41:27.520 |
Once you get inside and realize what they were doing, 01:41:37.800 |
and then they searched for servers running that zero day. 01:41:43.400 |
I mean, one time they went after a toilet paper company. 01:41:46.640 |
I still don't understand what that toilet paper company did, 01:41:51.760 |
- Is there some way for the joke, for the lulz? 01:41:56.480 |
So I think the hacktivism and the anonymous stuff 01:42:02.960 |
then there were six guys that worked well together 01:42:06.600 |
and they kind of split off into their own private channels. 01:42:09.120 |
And that was lulzsec, or laughing at your security, 01:42:26.440 |
- So Kayla and Sabu were the hackers of the group. 01:42:30.720 |
And so they really did all the work on HBGary. 01:42:38.340 |
And so, you know, that's all they knew each other as. 01:42:54.680 |
where they would just release major, major breaches. 01:43:00.520 |
I mean, it put hacking in the media every day. 01:43:11.080 |
But then they started swinging at the beehive 01:43:21.480 |
where every Friday they would release something. 01:43:25.120 |
I mean, they had us hook, line, and sinker pissed. 01:43:28.040 |
We were waiting to see what was gonna be dropped 01:43:30.480 |
It was, it's a little embarrassing looking back on it now. 01:43:42.640 |
What, do we still understand what the heck is Anonymous? 01:43:47.480 |
I mean, it's just, it started on 4chan, went to 8chan. 01:43:51.680 |
You could be in Anonymous right now if you wanted to. 01:43:53.600 |
Just you're in there hanging out in the channel. 01:43:56.960 |
until you work your way up and prove who you are 01:44:04.960 |
Do you have a sense that there is a leadership? 01:44:08.560 |
Now, is that someone that says this is what we're doing 01:44:12.560 |
- I love the philosophical and the technical aspect 01:44:28.080 |
When you're attached, I'm actually really terrified 01:44:33.440 |
It's the fun thing somehow becomes a slippery slope. 01:44:38.080 |
I haven't quite understood the dynamics of that. 01:44:40.540 |
But even in myself, if you just have fun with a thing, 01:44:45.440 |
you lose track of the ethical grounding of the thing. 01:44:50.780 |
can just turn it, like literally lead to nuclear war. 01:45:07.920 |
And I wonder about it because in internet speak, 01:45:19.480 |
If everything's a joke, then everything's allowed 01:45:22.720 |
then you don't have a sense of what is right and wrong. 01:45:30.180 |
Whether it's major corporations or the individuals. 01:45:35.580 |
releasing people's PII, their personal identifying 01:45:42.640 |
But if you could choose to not have your information 01:45:48.800 |
- We do have a sense of what anonymous is today. 01:45:54.520 |
or is it a collection of hackers that kind of emerge 01:46:01.820 |
like, hacktivism tasks and that kind of stuff? 01:46:05.080 |
- It's a collection of people that has some hackers in it. 01:46:11.120 |
I mean, there's some that'll come bouncing in and bounce out. 01:46:14.160 |
Even back then, there was probably just as many 01:46:20.280 |
with the hackers at the time, just trying to get 01:46:27.360 |
We arrested a reporter that gave over the username 01:46:37.920 |
- Speaking of trust, reporters, boy, there's good ones. 01:46:47.320 |
But boy, do I have a complicated relationship with them. 01:46:49.800 |
- How many stories about you are completely true? 01:46:53.000 |
- You can just make stuff up on the internet. 01:47:11.480 |
And if it's not funny, so lizard is kind of funny, 01:47:17.280 |
Lex has admitted to being an agent of the FBI. 01:47:24.320 |
And then the response that the internet will be like, 01:47:29.320 |
They won't go like, provide evidence, please. 01:47:38.640 |
And then it piles on, it's like, hey, hey, hey, guys. 01:47:47.840 |
- Yeah, Johnny6969 is now a source that says. 01:47:51.160 |
- And then like, the thing is I'm a tiny guy, 01:47:54.440 |
but when it grows, if you have a big platform, 01:48:04.440 |
And you never know where that story really started. 01:48:07.480 |
I mean, to me, actually, honestly, it's kind of cool 01:48:24.600 |
in the best possible world, it is the role of the journalist 01:48:28.280 |
to be the adult in the room and put a stop to it 01:48:35.160 |
so that there could be clickbait that can generate money. 01:48:38.600 |
Journalism should be about sort of slowing things down, 01:48:49.320 |
And I think that would actually get the most clicks 01:48:52.240 |
- I mean, it's that same pressure I think we're talking about 01:48:53.900 |
with the FBI and with the tech companies about Controversy. 01:48:57.280 |
I mean, the editors have to please and get those clicks. 01:49:02.680 |
So, I'm sure the journalists, the true journalists, 01:49:10.520 |
- Can I actually ask you really as another tangent, 01:49:13.160 |
the Jared and others that are doing undercover, 01:49:26.880 |
You have to do a lot to start an undercover in the FBI. 01:49:31.680 |
So, it's not your first investigative tool step. 01:49:37.840 |
and then show that the lower steps can't get you there. 01:50:07.520 |
but also psychologically, like you have to really- 01:50:11.760 |
Like you have to know what's going on and what's happening. 01:50:14.120 |
You're taking on, you have to remember who you are 01:50:17.920 |
when you're, 'cause you're a criminal online. 01:50:20.920 |
You have to go to a special school for it too. 01:50:28.760 |
And so, it's tough for me to build that wall of lies. 01:50:35.400 |
- Yeah, but a guy who's good at building up a wall of lies 01:50:45.120 |
because I'm trying to be honest and transparent, 01:50:47.360 |
that's exactly what an agent would do, right? 01:50:50.160 |
But I feel like an agent would not wear a suit and tie. 01:51:00.260 |
I remember one time I wore shorts in and the SAC came in. 01:51:03.400 |
And this was when I was a rockstar at the time in the Bureau 01:51:10.440 |
And she goes, "You can wear bike shorts in here, 01:51:19.200 |
But see, I don't see a suit and tie as constraining. 01:51:24.080 |
It's like, shows that you're taking the moment seriously. 01:51:39.880 |
He was dressed always in t-shirts and shorts. 01:51:44.560 |
- I wonder how many police that can just show up 01:51:46.520 |
and say I'm from the FBI and start interrogating them. 01:51:52.060 |
- Oh, definitely, if they've had a few drinks, 01:52:15.760 |
some of the most dangerous people in this world. 01:52:42.480 |
Now, these things happen on the black market. 01:52:46.040 |
and people debate whether they're real or not. 01:53:19.680 |
So an agent on the squad, a girl named Evelina, 01:53:40.960 |
My kids were, I think, kindergarten and fifth grade, 01:53:44.000 |
or somewhere around there, maybe the closer, second, 01:53:50.160 |
and we had to, from there, go move into a safe house. 01:54:06.760 |
I got to watch my house on an iPad while I sat at my desk. 01:54:15.880 |
And that's, to be honest, I think that's sort of 01:54:27.360 |
I didn't tell my family what I was working on. 01:54:35.080 |
driving in, I used to go in at 4.30 every morning, 01:54:38.520 |
'cause I like to go to the gym before I go to the desk. 01:54:41.800 |
so in the gym at five, a couple hours, and then go. 01:54:46.000 |
The best time I had was that drive-in in the morning 01:55:01.840 |
It was great to not think about Silk Road for 10 minutes. 01:55:05.280 |
But that was my best time, but yeah, again, so yeah. 01:55:39.240 |
I don't have pictures of me and my kids online. 01:55:41.640 |
I don't really, if I go to a wedding or something, 01:55:43.720 |
I say, "I don't take my picture with my kids," 01:55:46.160 |
if you're gonna post it someplace or something like that. 01:55:50.240 |
But just like everybody, you start to relax a little bit 01:55:55.480 |
and security breaks down 'cause it's not convenient. 01:56:04.280 |
like, I mean, your job now and your job before, 01:56:12.840 |
and I think that's what a lot of people don't understand, 01:56:14.640 |
is understanding what the threat against them is. 01:56:23.320 |
I do remember, so you tripped a memory in my mind. 01:56:28.280 |
I remember a lot of times, and I had a gun on my hip, 01:56:37.240 |
walking out of the house 'cause I couldn't see it. 01:56:39.800 |
I remember those four o'clocks, heading to the car. 01:56:47.000 |
I mean, having seen some of the things you've seen, 01:56:52.960 |
how much evil there is out there in the world, 01:56:56.640 |
how many dangerous people there are out there, 01:57:01.440 |
- There's a lot of crazy, there's a lot of evil. 01:57:11.760 |
They don't really know, maybe think about the victim. 01:57:25.080 |
is that rule of law, despite everything we talk about, 01:57:28.400 |
it's tough to be a criminal in the United States. 01:57:45.960 |
one guy in the United States, five guys other places. 01:58:19.360 |
because he grew up in the Lower East Side of New York 01:58:31.480 |
he looks, I don't know exactly what he looks like, 01:58:33.800 |
but not like a technical, not what you would imagine. 01:58:42.520 |
- Yeah, I think you get in trouble these days 01:58:47.520 |
I don't know if they have a traditional look. 01:59:28.720 |
- So when did your paths cross in terms of tracking? 01:59:38.440 |
- Through Anonymous, and really kind of LULZSEC. 01:59:49.600 |
Most of them have cyber squads or cyber units. 02:00:04.880 |
Then I got a tip that a local hacker in New York 02:00:17.480 |
We went all around New York looking for this kid 02:00:21.640 |
and ended up out in Staten Island at his grandmother's house. 02:00:26.120 |
She didn't know where he was, obviously, why would she? 02:00:30.400 |
He gave me a call that night and started talking to me. 02:00:38.840 |
And he came in and three of us sat there and talked 02:00:46.920 |
he was committing those days, including that break into AOL. 02:00:50.040 |
And then he finally says, "I can give you Sabu." 02:00:54.520 |
Sabu to us was the Kaiser socialite of hacking. 02:01:29.680 |
You know, and they weren't getting like real FBI. 02:01:31.720 |
They weren't breaking into FBI mainframes or anything, 02:01:33.560 |
but they were affiliate sites or anything that had to do, 02:01:38.320 |
a lot of law enforcement stuff was coming out. 02:01:47.640 |
maybe there was a chance we could use him to lure Sabu out. 02:01:52.440 |
"Well, maybe this kid knows Sabu in real life." 02:01:55.680 |
and 10 million IPs, we find one and it belonged to him. 02:01:58.360 |
And so that day Sabu, someone had doxxed Sabu 02:02:03.360 |
and we were a little afraid he was gonna be on the run. 02:02:17.760 |
and all whatever you wouldn't expect an FBI agent to have. 02:02:22.960 |
I mean, it is true, but they fit into the area. 02:02:33.280 |
They really get in, play the character and get into it. 02:02:36.080 |
- So now I can never trust a baby stroller again. 02:02:40.640 |
- Every baby, I'm just like, look at stare at them suspiciously. 02:02:43.720 |
- Especially if the mom's wearing cargo pants 02:02:46.360 |
- Yeah, so if it's like a very stereotypical mom 02:02:49.800 |
or stereotypical baby, I'm gonna be very suspicious. 02:03:05.400 |
I had a white t-shirt on and I only bring it up 02:03:09.720 |
So I had a bulletproof vest and a white t-shirt on 02:03:12.520 |
I had shorts too and all that, but raced over to there. 02:03:20.320 |
He stopped off at NYPD, got us like a ballistic shield 02:03:25.920 |
And then we get to Hector's house, Sabu's house, 02:03:31.760 |
And so normally, you know, we're the cyber dork squad. 02:03:36.360 |
We'll hop in the elevator, six floors is a long ways 02:03:39.080 |
to go up and bulletproof vest and a ballistic shield. 02:03:40.880 |
But we had been caught in an elevator before on a search. 02:03:46.880 |
We get to the top, a tad winded, but knocking the door 02:03:52.840 |
and this big towering guy opens the door just slightly. 02:03:56.400 |
And he sees the green vest with big yellow letters FBI 02:04:06.560 |
But eventually we get our way inside the house. 02:04:08.920 |
You know, I noticed a few things that are kind of 02:04:13.800 |
There's a laptop charger and a flashing modem. 02:04:17.360 |
And I said, well, do you have a computer here? 02:04:25.880 |
So it took us about another two hours and finally gave up 02:04:28.680 |
that he was Sabu, he was the guy we were looking for. 02:04:35.760 |
And, you know, from his words, we sat there and talked, 02:04:56.360 |
So then we brought him down to the FBI that night, 02:05:02.080 |
'cause I'm sitting in the back seat of the car with him. 02:05:20.920 |
- That's so interesting 'cause it's such a strange world. 02:05:27.680 |
'cause you still have to prove it's the same guy, right? 02:05:32.080 |
- Yeah, I mean, we had his laptop by that point. 02:05:35.120 |
- Yeah, I know, but-- - Him saying, that helped. 02:05:43.280 |
I mean, that definitely would have come in as evidence 02:05:45.160 |
that other FBI agents are saying it's not him. 02:05:58.680 |
Now that's if you took every charge we had against him 02:06:05.900 |
but yeah, essentially it would have been 125 years. 02:06:44.600 |
Back when hackers didn't work together with anonymous, 02:06:47.120 |
he was down Cult of Dead Cow and those type guys, 02:06:59.800 |
he kind of came back when anonymous started going 02:07:06.160 |
- But even that little interaction, being an informant, 02:07:30.920 |
- He has very good security for himself, cyber security. 02:07:45.480 |
of the internet kind of bitching at you and all that, 02:07:49.480 |
you get calloused, it's just internet bitching. 02:07:52.600 |
- And also the hacking world moves on very quickly. 02:07:55.840 |
He is kind of, they have their own wars to fight now, 02:08:08.680 |
I think, you know, he has a good message out there 02:08:26.120 |
Is there all kinds of ways, being not your line of work, 02:08:30.040 |
his line of work, just all the stories you've seen 02:08:33.320 |
of people that are in Anonymous and LulzSec and Silk Road 02:08:38.080 |
and all the cyber criminals you've interacted with. 02:08:45.560 |
You know, I used to be able to say, you know, 02:08:47.140 |
the kid in your mom's basement or something like that, 02:08:57.000 |
that you wouldn't expect would be cyber criminals. 02:08:59.500 |
- And it's in the United States, it's international, 02:09:04.660 |
I mean, we're seeing a lot of the big hackers now. 02:09:07.520 |
The big arrests for hackers in England, surprisingly. 02:09:12.360 |
you're not gonna see there's a lot of good hackers 02:09:21.540 |
- How much state-sponsored cyber attacks are there, 02:09:32.740 |
You had a successful attack or just a probing? 02:09:35.220 |
- Probing for information, just like feeling, you know, 02:09:40.060 |
testing that there's where the attack factors are, 02:09:43.460 |
trying to collect all the possible attack factors. 02:09:45.600 |
- Put a Windows 7 machine on the internet forward-facing 02:09:51.160 |
I mean, in 24 hours, you were gonna fill up a hard drive 02:10:05.520 |
draws in intrusions, should I see what methodologies? 02:10:10.320 |
It maybe has fake information and stuff like that. 02:10:13.460 |
You know, it's kind of to see what's going on 02:10:20.280 |
and test the wind of what's happening these days. 02:10:22.460 |
- The funny thing about, like, because I'm at MIT, 02:10:28.180 |
not for the lulz, but for the technical challenge. 02:10:33.340 |
Just the amount of traffic MIT was getting for that, 02:10:58.880 |
'cause, you know, they're not getting any money from MIT. 02:11:13.900 |
Like, let's lay out, where are we in this world? 02:11:24.140 |
people want the idea of security, but it's inconvenient, 02:11:31.860 |
And there are a lot of opportunistic nation state, 02:11:35.900 |
financially motivated hackers, hackers for the lulz. 02:11:44.060 |
They have really good tools that are being used against us. 02:11:51.260 |
I don't know what's, let's talk about companies first. 02:12:00.540 |
I wonder what the most interesting business is. 02:12:03.420 |
So Google, we can look at large tech companies, 02:12:06.580 |
or we can look at medium-sized tech companies. 02:12:10.420 |
And like, you are sitting in a room with a CTO, 02:12:12.980 |
with a CEO, and the question is, how fucked are we? 02:12:24.380 |
- I mean, the problem is they want a push button. 02:12:30.020 |
They want to tell people they're secure, but-- 02:13:06.140 |
and they introduce a lot of pain for the people. 02:13:08.460 |
They decrease efficiency of the actual work you have to do. 02:13:23.340 |
but user data, so like data that belongs to users, 02:13:30.580 |
like the amount of security they have around that 02:13:42.260 |
so I never got a chance to work with actual user data, 02:13:45.860 |
first of all, you have no access to the internet. 02:14:37.820 |
might have a lot of trouble with doing that kind of stuff. 02:14:46.620 |
So there's a big difference between IT and security. 02:14:51.340 |
they try to stack security into their IT department. 02:14:54.340 |
Your IT department is about business continuity. 02:14:56.560 |
They're about trying to move business forward. 02:15:06.340 |
But there's fine-tuning you can do to ensure that. 02:15:11.100 |
I mean, as simple as having good onboarding procedures 02:15:18.060 |
Maybe you need access to something for one day. 02:15:26.300 |
because old credentials from a third-party vendor 02:15:30.780 |
And the Chinese government found those credentials 02:15:32.660 |
and were able to log in and steal all my information. 02:15:36.780 |
if you just control the credentials, the access, 02:15:41.940 |
And people who need access to a certain thing 02:15:45.580 |
only get access to that thing and nothing else. 02:15:56.260 |
Two-factor authentication, that's a big thing. 02:16:10.700 |
- Well, two-factor authentication is a good example 02:16:19.740 |
but it seems that it's pretty easy to implement horribly 02:16:31.280 |
like to authenticate yourself twice should be super easy. 02:16:35.720 |
- If security, if it's slightly inconvenient for you, 02:16:39.460 |
it's think about how inconvenient it is for a hacker 02:16:41.580 |
and how they're just gonna move on to the next person. 02:16:43.100 |
- Yes, yes, in theory, we implemented it extremely well. 02:16:53.780 |
it shows that system hasn't been thought through a lot. 02:16:57.260 |
- Do you know why we need two-factor authentication? 02:17:00.060 |
People using the same password across the same site. 02:17:11.020 |
"Don't use the same fucking password across the internet, 02:17:22.020 |
- Right, but I'm saying like the two-factor authentication, 02:17:26.220 |
it should be super easy to authenticate myself 02:17:48.700 |
of the cyber attacks these platforms are under. 02:17:51.620 |
They're probably under insane amount of attacks. 02:17:56.100 |
- People have no idea, these large companies, 02:17:58.700 |
how often they're attacked, on a per second basis. 02:18:05.980 |
So yeah, there's no way I'd wanna run a large tech company. 02:18:12.420 |
- Well, what about protecting individuals, for individuals? 02:18:15.580 |
What's good advice to try to protect yourself 02:18:20.140 |
from this increasingly dangerous world of cyber attacks? 02:18:23.420 |
- Again, educate yourself that you understand 02:18:39.100 |
"I woke up this morning and I just clicked on a link 02:18:44.780 |
And I was like, "Throw your phone in a glass of water. 02:18:53.700 |
So sometimes I go to a little extremes on those ones. 02:19:05.420 |
Simple things like, as we add more internet of the things 02:19:15.260 |
and giving your password to people who come to visit. 02:19:18.660 |
Set up something you can change every 30 days. 02:19:23.100 |
I hate to remind you, but change your passwords. 02:19:25.180 |
I mean, I feel like I'm a broken record again. 02:19:27.140 |
But just make it more difficult for others to victimize you. 02:19:31.060 |
- And then don't use the same password everywhere. 02:19:38.660 |
- I mean, ask.fm.got popped last week, two weeks ago. 02:19:42.260 |
And that's 350 million username and passwords 02:19:44.980 |
with connected Twitter accounts, Google accounts, 02:19:50.780 |
That is a treasure trove for the next two and a half, 02:19:53.660 |
three years of just using those credentials everywhere. 02:19:57.980 |
Using, you'll learn, even if it's not the right password, 02:20:03.180 |
Bad guys are making portfolios out of people. 02:20:06.220 |
We're figuring out how people generate their passwords 02:20:09.820 |
and then it's easier to crack their password. 02:20:14.940 |
It's 350 million dossiers just in that one hack. 02:20:27.140 |
yeah, evaluates the strength of the passwords, 02:20:33.500 |
That means that this person is probably the kind of person 02:20:35.620 |
that would use the same password across multiple. 02:20:39.900 |
Remember the Ring hack a couple of years ago? 02:20:41.900 |
That's all it was, it was credential stuffing. 02:20:47.780 |
And they also had a don't try unlimited tries 02:20:51.900 |
You can lock it out after 10, by default, not turned on, 02:21:02.060 |
but cybersecurity, don't make it inconvenient, 02:21:11.060 |
reputational harm right there for Ring, but they didn't. 02:21:14.500 |
People bought username and passwords on the black market 02:21:17.980 |
and just wrote a bot that just went through Ring 02:21:24.120 |
but that's a big hit to the number of Ring users. 02:21:27.380 |
- You know, you can use also password managers 02:21:29.180 |
to make the changing of the passwords easier. 02:21:32.200 |
- And to make, you can charge the difficulty, 02:21:52.620 |
- You can only use these three special characters. 02:21:55.120 |
Do you understand how password cracking works? 02:22:02.960 |
- I honestly just want to have a one-on-one meeting, 02:22:07.580 |
like late at night with the engineer that programmed that, 02:22:18.020 |
I was like, you just, you can't have money here. 02:22:20.500 |
- But then there's also like the zero-day attacks. 02:22:22.500 |
Like I mentioned before the QNAP NAS that got hacked. 02:22:27.500 |
Luckily I didn't have anything private on there, 02:22:34.420 |
so like if you take everything extremely seriously. 02:22:49.620 |
So there's a patch now out there for the security. 02:22:53.180 |
for these security patches, if it's just not on you, 02:23:06.820 |
because, you know, we talked about that powerful tool 02:23:16.220 |
It's called, you know, it used to be called Google dorking. 02:23:18.940 |
Now it's, I think it's named kind of Google hacking 02:23:22.740 |
You can go in, you know, and find a vulnerability, 02:23:26.040 |
read about the white paper, what's wrong with that software. 02:23:34.020 |
And there's your list, there's your target list. 02:23:39.740 |
but, you know, that's how easy it is to find your targets. 02:23:53.100 |
to, you know, hack into a Twitter account, for example. 02:24:01.060 |
- Probably, if you want something specific to that. 02:24:02.980 |
I mean, if you really want to go far, you know, 02:24:06.380 |
if you're targeting a specific person, you know, 02:24:17.060 |
And you can, for 40 bucks on the black market, 02:24:25.260 |
you can buy the stuff with a mouse inside of it 02:24:30.820 |
And there's a key logger that lives in there and calls home, 02:24:43.580 |
just for, I was doing as part of the research, 02:24:46.780 |
I was doing to see if by the dynamics of how you type 02:24:51.780 |
and how you move the mouse, you can tell who the person is. 02:24:57.740 |
- That's like, it's called the active authentication, 02:25:01.940 |
like it's basically biometrics that's not using bio 02:25:09.180 |
but it's also fascinating how damn easy it is 02:25:15.940 |
what happens is you realize how many vulnerabilities 02:25:20.100 |
You do that when you understand bacteria and viruses, 02:25:24.900 |
And the same way with, I'm talking about biological ones, 02:25:27.840 |
and then you realize that all the vulnerabilities 02:25:32.540 |
is how many people don't log out of their computers. 02:25:36.200 |
Just how easy physical access to systems actually is. 02:25:46.740 |
I'm talking about companies, especially large companies. 02:25:57.140 |
It just, I laugh because one of my partners at Naxo 02:26:00.460 |
that I work at now, he worked at a big company. 02:26:04.500 |
You would know the name as soon as I told you, 02:26:14.940 |
So they hired a person that stands next to his computer 02:26:17.420 |
when he's not there, and that's his physical security. 02:26:23.100 |
- Yeah, I mean, I guess if you could afford to do that. 02:26:25.700 |
- At least you're taking your security seriously. 02:26:27.380 |
I feel like there's a lot of people in that case 02:26:32.260 |
No, the security team there had to really work around 02:26:35.100 |
to make that work, non-compliant with the company policy. 02:26:49.220 |
and worry about someone physically gaining access 02:26:51.300 |
to your computer with key logger and stuff like that. 02:26:53.940 |
You know, if you're traveling to a foreign country 02:26:57.920 |
You pick little, you know, sometimes some countries 02:27:04.260 |
- I really want, especially in this modern day, 02:27:24.140 |
We do these searches in FBI houses and stuff like that. 02:27:26.260 |
If someone just got a box load of 10 terabyte drives 02:27:33.240 |
do you know how long the FBI would spin their wheels 02:27:40.160 |
- You don't even know which one you're looking for. 02:27:48.540 |
to a random location, just get people to go on goose chases. 02:28:00.460 |
and what's the least secure operating system, 02:28:08.620 |
People used to think Macs were the most secure 02:28:17.340 |
I like Linux too, but it's tough to run a business on Linux. 02:28:23.180 |
People wanna move more towards the Microsofts 02:28:25.220 |
and the Googles just 'cause it's easier to communicate 02:28:28.280 |
with other people that maybe aren't computer guys. 02:28:30.520 |
So you have to just take what's best, what's easiest, 02:28:34.080 |
and secure the shit out of it as much as you can 02:28:40.700 |
So I left the government and went to a couple consultancies 02:28:54.360 |
- You used to work for the man and now you're the man. 02:29:04.640 |
- Do you wanna give more details about the party 02:29:08.080 |
- No, I don't think I can tell you where it is. 02:29:10.440 |
You can come if you want, but don't bring the hackers. 02:29:16.800 |
'cause you also say insider threat is the biggest threat. 02:29:22.160 |
By the way, can you explain what the insider threat is? 02:29:24.160 |
- The biggest insider threat in my life is my children. 02:29:34.200 |
- Do you recommend against marriage and family and kids? 02:29:43.040 |
I mean, we do it in all businesses for years. 02:29:45.800 |
Started segmenting networks, different networks. 02:29:55.220 |
You can monitor traffic and then also throttle bandwidth 02:30:01.700 |
So you can obviously change that a little too. 02:30:04.340 |
- You know they're gonna listen to this, right? 02:30:09.700 |
But there's nothing more humbling than your family. 02:30:13.060 |
and you go on a big podcast and talk to Les Freeman, 02:30:41.860 |
So yeah, we got 1,300 downloads the first day. 02:30:45.660 |
So pretty, we were at the top of Hacker News, 02:30:52.740 |
- Go download and listen to Hacker in the Fed. 02:30:56.300 |
'cause I don't think I've seen a video of you two together. 02:30:58.500 |
So I can't wait to see what the chemistry is like. 02:31:01.860 |
It's not weird that you guys used to be enemies 02:31:07.780 |
- So yeah, I mean, we just did a trailer and all that. 02:31:10.940 |
And our producer, we have a great producer guy named Phineas 02:31:22.700 |
And I was like, oh, I arrested one of my closest friends. 02:31:43.060 |
- Do you worry about cyber war in the 21st century? 02:31:50.060 |
If there is a global war, it'll start with cyber. 02:32:22.100 |
Do you worry about this kind of thing happening 02:32:25.940 |
in the next decade or two, like where it really escalates? 02:32:29.220 |
You know, people in the 1920s were completely terrible 02:32:37.000 |
Do you think we're at the precipice of war, potentially? 02:32:48.980 |
COVID's over, so the next big thing in the media 02:33:01.460 |
I hope smarter people than I are figuring it out. 02:33:10.620 |
- Well, there's two things to be concerned about 02:33:13.420 |
One is the actual defense on the technical side of cyber. 02:33:17.660 |
And the other one is the panic that might happen 02:33:20.860 |
when something like some dramatic event happened 02:33:24.860 |
because of cyber, some major hack that becomes public. 02:33:31.900 |
because I feel like if people don't think about this stuff, 02:33:42.180 |
I feel like it'll come like a much harder surprise. 02:33:45.820 |
- Yeah, I think people will be really shocked on things. 02:33:59.700 |
They were sitting on it in case someone got arrested 02:34:01.700 |
and they were gonna maybe just expose that it's insecure. 02:34:05.840 |
Maybe they were gonna do something to fuck with it. 02:34:11.660 |
I don't think it's gotten a lot better since then. 02:34:14.300 |
- And there's probably nation states or major organizations 02:34:21.000 |
that are sitting secretly on hacks like this. 02:34:28.400 |
I mean, again, I don't wanna scare the shit out of people, 02:34:32.620 |
but people have to understand the cyber threat. 02:34:34.700 |
I mean, there are thousands of nation state hackers 02:34:46.020 |
there's planes that actually hit actual buildings 02:34:50.080 |
and it was visibly clear and you can trace the information. 02:34:54.620 |
With cyber attacks, say something that would result 02:35:14.660 |
has complete freedom to blame anybody they want. 02:35:25.120 |
that's sorry, that's one cynical take on it, of course. 02:35:31.820 |
I mean, the guys that flew planes in the buildings 02:35:39.660 |
Maybe the victim side, the US government on this side 02:35:48.020 |
There's not really a good way of verifying that. 02:36:04.260 |
I wouldn't say you're being tracked by the government. 02:36:09.100 |
- No, I mean, me personally, Lex, at an escalated level. 02:36:13.860 |
like you mentioned, there's an FBI file on people. 02:36:37.640 |
- A little bit better, 'cause that's where the director, 02:36:42.340 |
Have you been to Silicon Valley, those cafeteria, 02:36:53.100 |
- Well, when you're going through the Academy, 02:36:58.060 |
And I think that's the only reason people eat it. 02:37:05.660 |
- But there's also a bar inside the FBI Academy. 02:37:11.940 |
And as long as you've passed your PT and going well, 02:37:41.460 |
And I mean, whole websites were dedicated to that. 02:37:49.620 |
I would go after like major, like powerful people 02:37:58.580 |
and like something that, like positive, like loving, 02:38:02.740 |
but like for the walls, the obvious that it's a troll. 02:38:11.300 |
- Because hackers never put things out about love. 02:38:19.460 |
- He talks about love in every podcast he does. 02:38:28.280 |
- Looking back at your life, is there something you regret? 02:38:31.820 |
- I'm only 44 years old, I'm already looking back. 02:38:49.820 |
and it took Hector Monsiger to make me realize 02:38:53.620 |
that criminals aren't really criminals, they're human beings. 02:38:57.620 |
That really humanized the whole thing for me, 02:39:01.980 |
I think that's maybe why I had a lot more compassion 02:39:09.460 |
if it was before Hector, but yeah, he changed my life 02:39:15.220 |
- So would it be fair to say that all the criminals, 02:39:27.900 |
- I'd say 99% of the criminals that I've interacted with, 02:39:36.020 |
no, I don't have any place in my heart for them. 02:39:38.420 |
- What advice would you give to people in college, 02:39:52.460 |
- In the US budget that was just put forward, 02:40:00.360 |
of where we really should be in the industry, if not more. 02:40:03.120 |
If you have, want job security and want to work 02:40:06.100 |
and see exciting stuff, head towards cybersecurity. 02:40:11.400 |
And one thing I dislike about cybersecurity right now 02:40:21.520 |
and knowing every different Python script out there 02:40:26.440 |
The industry needs to change and let the lower people in 02:40:28.840 |
in order to broaden and get those billion jobs filled. 02:40:40.400 |
that you have to turn over your social media accounts 02:40:53.200 |
So hopefully you didn't say something strange 02:40:56.640 |
in the last few years and it's gonna follow you forever. 02:40:59.480 |
I bet Ross Ulbrich would tell you the same thing, 02:41:10.040 |
as if they're talking to a couple of buddies, 02:41:17.280 |
and like, what is that, busting each other's chops, 02:41:24.240 |
especially gaming culture, like people who stream. 02:41:29.680 |
Oh my God, the things people say on those streams. 02:41:39.480 |
And I mean, just outside of the very offensive things 02:41:49.400 |
They're not the kind of person that I would wanna hire, 02:42:04.080 |
like playing a video game and talking shit to each other, 02:42:16.080 |
it's complicated 'cause I'm like against hiding 02:42:20.440 |
- If you're an asshole, you should hide some of it. 02:42:42.920 |
If that person can say that I'm an asshole to them, 02:42:52.960 |
and that's considered who you are is dangerous. 02:43:03.460 |
That's definitely something that you need to learn 02:43:20.440 |
I feel like it's a good opportunity when you're young 02:43:23.720 |
to ask what are the things that are okay to say? 02:43:28.720 |
What are the things, what are the ideas I stand behind? 02:43:35.300 |
and I'm willing to say them because I believe in them 02:43:44.600 |
That said, man, I was an idiot for most of my life 02:43:50.460 |
I'd hate to be responsible for the kind of person 02:44:05.600 |
but I used to read so much existential literature. 02:44:19.280 |
Oh my God, I would never have gotten the FBI. 02:44:22.680 |
- Would you recommend that people consider a career 02:44:33.240 |
with the gold watch and everything from the FBI. 02:44:42.040 |
You get a gold badge, you actually get your badge 02:44:43.840 |
in Lucite and your creds, they put it in Lucite 02:44:49.880 |
since we like those, does it hurt you that the FBI 02:44:54.880 |
by certain people is distrusted or even hated? 02:45:03.160 |
sometimes be embarrassed about the FBI sometimes, 02:45:16.200 |
with all the guys in your squad, guys and girls. 02:45:24.160 |
because we were so social of going out after work 02:45:34.100 |
But yeah, I mean, if someone can become an FBI agent, 02:45:40.880 |
The day you graduate and walk out of the academy 02:45:43.040 |
with a gun and a badge and the power to charge someone 02:45:48.120 |
a United States flag at night, that's awesome. 02:45:55.880 |
and especially if you're doing cyber security. 02:46:04.320 |
Sometimes you'll see an older agent that's done 02:46:07.680 |
not cyber crime come over to cyber crime at the end 02:46:29.760 |
But we also lost a bunch of guys that had some skills 02:46:42.840 |
so he decided to keep his family versus the FBI. 02:46:54.240 |
Like one of my quickly becoming good friends is Mudge. 02:47:00.360 |
and then now was recently Twitter chief security officer, 02:47:06.800 |
CSO, but he had a bunch of different leadership positions, 02:47:19.720 |
- I just wonder what would cause him to stop doing it, 02:47:35.520 |
And when I think the hacking culture evolved over the years, 02:47:43.120 |
oh, actually what I wanna do is I wanna help the world, 02:47:45.920 |
and I can do that in legitimate routes and so on. 02:47:49.960 |
and yeah, I would love to talk to him one day, 02:48:01.520 |
If you're not careful, it can really pull you in. 02:48:03.320 |
- Yeah, you're good at it, you become powerful, 02:48:06.920 |
you become, everyone's slapping you on the back 02:48:09.640 |
and say what a good job and all that at a very young age. 02:48:13.640 |
- Yeah, I would love to get into my buddy's mind 02:48:20.440 |
- In his case, maybe it's always about a great woman 02:48:24.000 |
involved, a family and so on that grounds you. 02:48:36.280 |
once you have family, maybe you're not willing to partake in. 02:48:41.080 |
What, from childhood, what are some fond memories you have? 02:48:55.760 |
what are some beautiful moments that you remember? 02:49:18.280 |
or he was a disabled veteran, he was in the army 02:49:21.080 |
and got hurt and was in a wheelchair his whole life 02:49:38.040 |
foot chase and all that, and kicking doors in. 02:49:43.920 |
And at some points I was kind of too cool for school 02:49:46.840 |
and, "Ah, dad, I just want a break," and all that, 02:49:50.400 |
We lost my dad during COVID, not because of COVID, 02:50:18.120 |
They'll even tell you that "Silk Road" movie was good. 02:50:22.840 |
But, and so they came over and I helped them with something 02:50:27.680 |
and my mom called me back a couple of days later 02:50:30.040 |
and she said, "I appreciate you helping them. 02:50:31.720 |
"I know fixing someone's Apple phone over the phone 02:50:39.880 |
And she said, "Oh, they loved hearing the stories 02:50:45.400 |
And she goes, "Your dad, he loved those stories. 02:50:52.880 |
"Maybe Chris will come home and I'll get him drunk 02:50:59.320 |
But, and then she goes, "Maybe one day in heaven 02:51:06.000 |
I literally stood in my shower sobbing like a child. 02:51:18.480 |
telling the stories to the world and I did tell him. 02:51:22.740 |
- Did you ever have like a long heart to heart with him 02:51:30.880 |
- He was in the hospital one time and I went through 02:51:36.880 |
And I think he may be sensationalized some of it, 02:51:41.120 |
Your dad's a hero, so you want to hear those things. 02:51:44.080 |
- Yeah, again, I don't know what was true and not true, 02:51:52.760 |
But you know, we lost him and now those stories are gone. 02:51:59.260 |
- What did he teach you about what it means to be a man? 02:52:13.640 |
And so part of his job, we worked for Vermont Power 02:52:21.200 |
I mean, when he first got married to my mom and all that, 02:52:32.000 |
to check to make sure they were functioning properly 02:52:44.680 |
And my dad probably went through some dark points, 02:53:03.040 |
- I'm sure I do, but I don't think he knew that, 02:53:07.720 |
- Well, you get to pass on that love to your kids now. 02:53:20.840 |
- Well, what do you think is the role of love? 02:53:30.000 |
What do you think is the role of love in the human condition? 02:53:35.080 |
If you don't have it, find it, get it as soon as you can. 02:53:41.160 |
I had no idea what love was until my kids were born. 02:53:53.600 |
"10 and 10, doc, 10 fingers, 10 toes, everything good?" 02:54:06.200 |
or some score about breathing and color and all that. 02:54:15.480 |
Just fell in love with my kids when I saw them. 02:54:17.560 |
And that to me really is what love is, just for them, man. 02:54:31.640 |
- I didn't when I was young, the foolishness of youth. 02:54:48.520 |
and you get a better job or you move up the chain. 02:54:51.020 |
It took a real change in my life to see that humanity. 02:55:07.760 |
and given how much you've changed each other's lives. 02:55:14.800 |
You're an amazing person with an amazing life. 02:55:35.640 |
please check out our sponsors in the description. 02:55:49.920 |
Thank you for listening and hope to see you next time.