CYBER

Share

Inside the Tool the US Military Is Using to Monitor Emails and Web Traffic

You ever feel like somebody’s watching you? Well, on the internet, it’s often true. Every move you make on the internet generates reams of data that ISPs and data brokers sell on to on to a ton of people who may want to take a look. It’s a big business. One we don’t often see the inside of.


One of the companies buying up all that data is Team Cymru who watches over all of it with a tool it calls Augury. Who buys Augury? We’ve just learned a lot of agencies within the federal government. Cyber Command, the Army, the Navy, are all using Augury to paw through internet traffic. But what, exactly, are they looking for? And what can they even see?


Stories discussed on this episode:


Revealed: US Military Bought Mass Monitoring Tool That Includes Internet Browsing, Email Data


We’re recording CYBER live on Twitch. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. 


Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.


Sign up for Motherboard’s daily newsletter for a regular dose of our original reporting, plus behind-the-scenes content about our biggest stories.

More Episodes

9/29/2022

How To Protect Yourself From Social Engineering Hacks

Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an employee of the company and tricked them into giving up the keys to the company. It doesn’t matter how fancy your 2FA system is if an employee is just gonna give up their SMS codes to some rando on the phone.But worry not. There are ways to protect yourself and your company against such attacks. With me today to work through it all is Rachel Tobac. Tobac is a hacker and the CEO of SocialProof Security, a company that aims to get your organization politely paranoid.She also, coincidentally, just published a really amazing video that dramatizes a lot about what we’re going to talk about today. You can find it on Twitter @racheltobac.Stories discussed in this episode:The Uber Hack Shows Push Notification 2FA Has a Downside: It’s Too AnnoyingHow a Third-Party SMS Service Was Used to Take Over Signal AccountsHackers Convinced Twitter Employee to Help Them Hijack AccountsWe’re recording CYBER live on Twitch. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.Sign up for Motherboard’s daily newsletter for a regular dose of our original reporting, plus behind-the-scenes content about our biggest stories.
9/28/2022

The Chess Scandal Involving Butt Plugs, AI, and Accusations of Cheating

Chess. Chess. Chess. You, the audience, quite literally asked for it. It’s the scandal that just won’t quit. On September 4 at a live Chess Tournament in St. Louis, chess grandmaster Magnus Carlsen lost in a massive upset to young chess wiz Hans Niemann. This was not supposed to happen and almost immediately accusations and revelations about cheating have gotten wilder, involving AI driven cheating engines and buttplugs.Throughout it all, Motherboard editor-in-chief Jason Koebler has kept pushing the story, watching every moment, and now he’s got a big scoop.Stories discussed on this episode:‘I Can’t Believe It’: Magnus Carlsen Resigns After One Move in Chess Rematch With Hans NiemannMagnus Carlsen Finally Speaks on Chess Cheating Scandal, Sows Even More ChaosMagnus Carlsen: Hans Niemann ‘Has Cheated More—and More Recently—Than He Has Publicly Admitted’Chess Grandmaster Maxim Dlugy Admitted to Cheating on Chess.com, Emails ShowDid Hans Neimann Cheat at Chess With a Sex Toy? This Coder Is Attempting to Find Out.We’re recording CYBER live on Twitch. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.Sign up for Motherboard’s daily newsletter for a regular dose of our original reporting, plus behind-the-scenes content about our biggest stories.