CYBER
Share
The DEA Is Skipping Warrants and Buying Data from Rogue Employees
In America, no one can protect you from a transportation employee being paid off by the feds.
The Drug Enforcement Agency has a single remit: to prosecute America’s long-failed war on drugs. Joseph Cox is on today’s episode of Cyber to talk about one its shadier practices and the senators who want answers from the Department of Justice. It turns out that the DEA has been paying Amtrak and commercial package companies to act as informants and supply data on customers without having to get a warrant.
Stories discussed in this episode:
The DEA Bought Customer Data from Rogue Employees Instead of Getting a Warrant
The 'Insanely Broad' RESTRICT Act Could Ban Much More Than Just TikTok
Here is the FBI’s Contract to Buy Mass Internet Data
Cops Sue Afroman for 'Emotional Distress' After He Made Music Videos of Botched Raid
We’re recording CYBER live on Twitch and YouTube. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show.
Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.
More Episodes
The DHS Is Reading Travelers' Posts at the Border
36:59Customs and Border Protection is scanning people’s social media, the feds have arrested some swatters, and the FTC has ordered Ring to cough up a fine. This week on Cyber, Motherboard’s premier cyber crime reporter Joseph Cox is back to walk us through the latest in privacy violations done by Washington and the private sector. We’ll also take another look at the criminal world of SIM swappers and auto-swatters.Stories discussed in this episode:Homeland Security Uses AI Tool to Analyze Social Media of U.S. Citizens and Refugees'The Comm': The Group Linked to a Nationwide Swatting RampageFTC Orders Ring to Pay $5.8 Million in Refunds For Surveilling Customers, Failing to Stop HackersRussian FSB Accuses U.S. of Hacking Thousands of iPhones in RussiaWe’re recording CYBER live on Twitch. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.AI Can Read Your Dreams and Collect Your Debts. What’s Next?
37:23Is there anything artificial intelligence can’t do?Debt collectors want AI to push people into coughing up what’s owed. An AI created photo of an attack on the Pentagon generated a minor panic. There’s an AI that can read your mind and the CEO of OpenAI, the company behind ChatGPT, just testified before Congress.This week on Cyber, Motherboard reporter Chloe Xiang comes on to walk us through the big headlines in the world of AI.Stories discussed in this episode:Debt Collectors Want To Use AI Chatbots To Hustle People For MoneyVerified Twitter Accounts Spread AI-Generated Hoax of Pentagon ExplosionAI Reconstructs 'High-Quality' Video Directly from Brain Readings in StudyWorried About Sending Your Data to a Chatbot? 'PrivateGPT' Is HereOpenAI Tells Congress the U.S. Should Create AI 'Licenses' to Release New ModelsWe’re recording CYBER live on Twitch. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.CYBER: Crime and Crypto with Cory Doctorow
38:35Crypto and crime, crime and crypto. They go together like spreadsheets and tax evasion. When cryptocurrency hit the scene it was, according to its evangelists, going to usher in a world of decentralized currency and free everyone from the shackles of oppressive central banks. Turns out it’s also been a pretty great way to launder money.It’s also the subject of the new book Red Team Blues, a novel from writer Cory Doctorow. In Red Team Blues a 67 year old forensic accountant finds himself at the center of a crypto-crime mystery that takes him from the heights of silicon valley to the depths of the Tenderloin. This week on Cyber, Doctorow walks us through a brief history of the valley and why he wrote three books about an old accountant during the pandemic.Doctorow is the author of more than two dozen books and too many articles to count. He’s currently blogging at pluralistic.net.We’re recording CYBER live on Twitch and YouTube. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.CYBER: Inside the Italian Mafia’s Encrypted Phone of Choice
34:04We talk a lot about encrypted phones on Cyber. Everyone loves a secure communication channel that no one can peer into. But some companies, well, if there’s criminal activity going on they’re gonna sell you out. And the cops have gotten very good at setting up honeypots and hacking into existing networks.But there’s one encrypted service out there that is, as far as we know, still secure. It’s called No. 1 Business Communication and it’s a favorite of the Italian Mafia. On this episode of Cyber, Joseph Cox comes on to explain how and why No. 1 Business Communication has survived in a world where authorities have shut down the competition. Stories discussed in this episode:Inside the Italian Mafia’s Encrypted Phone of ChoiceWe’re recording CYBER live on Twitch and YouTube. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.Apple II and How the Computer Became Personal
57:56If you’re watching or listening to this show you’re probably doing it on a device that owes its very existence to the Apple II. But these days we remember the iPhone, 90s era Windows, and even the Macintosh as these big benchmark moments in widespread adoption of tech.But all those devices wouldn't be here if it weren’t for the little Apple II board that could and the people who turned a hobbyist curiosity into a fundamental part of every household in the world.That story is the subject of the new book The Apple II Age: How the Computer Became Personal. This week on Cyber, author Laine Nooney comes on to talk about The Apple II Age and how the little machine ushered in a new world of personal computing. Nooney is also an assistant professor of Media and Information Studies at New York University and the founding editor of ROMchip: A Journal of Games Histories.We’re recording CYBER live on Twitch and YouTube. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.Wondery Presents - Flipping The Bird: Elon vs Twitter
05:06When Elon Musk posted a video of himself arriving at Twitter HQ carrying a white sink along with the message “let that sink in!” it marked the end of a dramatic takeover. Musk had gone from Twitter critic to “Chief Twit” in the space of just a few months but his arrival didn’t put an end to questions about his motives. Musk had earned a reputation as a business maverick. From PayPal to Tesla to SpaceX, his name was synonymous with big, earth-shattering ideas. So, what did he want with a social media platform? And was this all really in the name of free speech...or was this all in the name of Elon Musk?From Wondery, the makers of WeCrashed and In God We Lust, comes the wild story of how the richest man alive took charge of the world’s “digital public square.”Listen to Flipping The Bird: Wondery.fm/FTB_CyberThieves are Stealing Cars Using Old Nokia Phones
33:29It looks like a bluetooth speaker or an old Nokia cellphone. But that’s a disguise. Inside these small devices is everything car thieves need to break into your vehicle. There are telegram channels now where, for a few thousand dollars, you can buy a device that will break into a car in seconds.Motherboard reporter Joseph Cox is here on Cyber this week to walk us through it.Stories discussed in this episode:The Car Thieves Using Tech Disguised Inside Old Nokia Phones and Bluetooth SpeakersWe’re recording CYBER live on Twitch and YouTube. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.Someone Is Selling Computer Generated Swatting Services
31:55Automation is making everyone’s lives easier, including people who call in fake bomb threats on crowded public locations. We live in a world where pranksters and criminals can summon a massive police presence with the click of a few buttons. On this episode of Cyber, Motherboard staff writer Joseph Cox is here to tell us all about it.Stories discussed in this episode:A Computer Generated Swatting Service Is Causing Havoc Across AmericaSmart Garage Company Fixes Vulnerability by Breaking Customers' DevicesHackers Can Remotely Open Smart Garage Doors Across the WorldIRS Wants to Buy Internet Mass Monitoring ToolWe’re recording CYBER live on Twitch and YouTube. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.What We Know about the Pentagon Leaks
37:31Top Secret classified Pentagon documents leaked on a Minecraft Discord server. The pages of documents contain sensitive information about troop placements in Ukraine, rumors about allies, and—weirdly—a character sheet for a tabletop roleplaying game. On this episode of Cyber, host Matthew Gault takes a back seat and lets Motherboard editor-in-chief Jason Koebler interrogate him about what’s in these classified Pentagon documents.Pentagon’s Ukraine War Plans Leaked on Minecraft Discord Before Telegram and TwitterLeaked Pentagon Docs Share Wild Rumor: Kremlin Plans to ‘Throw’ Putin’s War While He’s Getting ChemoLeaked Classified Documents Also Include Roleplaying Game Character StatsWe’re recording CYBER live on Twitch and YouTube. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts.