POPULARITY
Why is Donald Trump dismantling America's national security apparatus? And how dangerous will this be for the US and the world? The commander-in-chief recently dismissed six National Security Council staffers, reportedly at the request of right-wing influencer and conspiracy theorist Laura Loomer. Today in The Bunker, national security journalist Ben Makuch joins Jacob Jarvis to ask: Who is Laura Loomer, and why does she have the ear of the president? Plus, they unpack the global consequences of Trump's ongoing efforts to hollow out the United States' security infrastructure. • We are sponsored by Indeed. Go to https://indeed.com/bunker for £100 sponsored credit. https://www.patreon.com/c/bunkercast Written and presented by Jacob Jarvis. Produced by Liam Tait. Audio editors: Simon Williams. Managing editor: Jacob Jarvis. Music by Kenny Dickinson. Group Editor: Andrew Harrison. THE BUNKER is a Podmasters Production. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Trump's Secretary of Defense Pete Hegseth is at the centre of a scandal – so how bad things could things get under his watch? After a journalist was accidentally added to a group chat discussing war plans, all focus is on the former Fox News host we discuss if he'll get fired – or if he'll stick around making things worse. Ben Makuch is a freelance national security reporter who writes for the Guardian among other outlets and joins us for this bonus edition. Back us on Patreon – we need your help to keep going. Get ad free episodes, extra bits and merch: https://www.patreon.com/c/americanfriction We're now on Youtube: https://www.youtube.com/@AmericanFrictionPod Follow us on social media: BlueSky: https://bsky.app/profile/americanfric.bsky.social Instagram TikTok Written and presented by Chris Jones and Jacob Jarvis Audio editor: Simon Williams. Group Editor: Andrew Harrison. Managing Editor: Jacob Jarvis Executive producer: Martin Bojtos. Artwork by James Parrett. Music: Orange Factory Music. AMERICAN FRICTION is a Podmasters Production. www.podmasters.co.uk Learn more about your ad choices. Visit podcastchoices.com/adchoices
Orlan-10 drones are arguably one of Russia's most important assets on the battlefield. Which is why the West has sanctions in place to keep the tech needed to build the drones out of Russian hands.So why do hacked emails show that a Russian arms dealer was seeking out parts made by Canadian tech companies? And how are Western parts ending up on the frontlines of Russia's war with Ukraine?Today, Ben Makuch shares his CBC investigation.
Ben Makuch discusses his recent Intercept report titled " Russian Militia Has Links to American Neo-Nazi and Anti-Trans Figures: The leader of the anti-Putin Russian Volunteer Corps is publicly connected to Robert Rundo and Christopher Pohlhaus." After the interview, a Question from Hell! winner is revealed and Jeff Dorchen remembers when we tried civilization in his latest Moment of Truth.
Tucker Schools GOP On How To End Ukraine War Tucker Exposes Nikki Haley Over Nord Stream Pipeline William Arkin: CIA Is Playing "Outsize Role" in Ukraine Despite Biden Pledge Not to Send U.S. Forces The Whitewashing of Neo-Nazis: Lev Golinkin & Ben Makuch on How Far Right Is Exploiting Ukraine War In this engaging and thought-provoking episode of the Chris Abraham Show, Chris draws intricate parallels between historical global events and the present-day geopolitical landscape. In a discussion characterized by unique perspectives and fresh insights, he analyzes the escalating geopolitical tensions, particularly zeroing in on the dynamics between Ukraine, Russia, and America. In a bold start, Chris questions the portrayal of these countries in the global media. He expresses skepticism about the roles each party plays, emphasizing his belief that no player in this complex geopolitical chessboard is entirely innocent. He turns the spotlight on the United States and the not-so-subtle influences it wields in these conflicts. Chris expands on Amy Goodman's surprising revelation about the strong neo-Nazi influence in Ukraine - a fact that has, until now, been conveniently overlooked. He also highlights Goodman's reporting on the outsized influence of the CIA on Ukraine missions and the Ukraine war. Drawing from the annals of history, Chris notes how this playbook resonates with the strategies employed during the Vietnam War. Moving on to the domestic front, Chris applauds Tucker Carlson's unflinching critique of the Republican Party. He talks about how Carlson exposed the warmongering tendencies of Republicans, laying bare the hawkish and imperialistic inclinations deeply embedded within their rhetoric. Chris underscores how these confrontations served to dismantle the entire Republican base, thereby stirring the political pot. Using a compelling analogy of a rattlesnake, Chris dissects the current international dynamics. He argues that ignoring obvious threats is tantamount to inviting trouble, suggesting that the world must not overlook the warning signs and underlying tensions that preface international conflicts. This section offers listeners a vivid visual representation of the ongoing political dynamics, making Chris's analysis both accessible and relatable. Delving deeper into the fabric of international relations, Chris explores the concept of 'American colonies.' He critiques the establishment of American military bases around the globe, challenging the narrative of these bases representing power and security. Instead, he argues, these bases serve as a symbol of covert imperialism, infringing on the sovereignty of other nations. In a twist away from the heavy political discourse, Chris also shares a personal anecdote. A recent spillage incident involving his thermos and GoRuck bag results in an impulsive purchase—a 30-pound plate for his bag, signifying his readiness to bear more weight, a metaphor subtly hinting at his readiness to delve deeper into complex issues. In conclusion, this episode of the Chris Abraham Show is a thought-provoking exploration offering a fresh perspective on world politics, media representation, and the true nature of international relations. It calls for introspection, awareness, and an understanding of the interconnectedness of the world we live in today. --- Send in a voice message: https://podcasters.spotify.com/pod/show/chrisabraham/message Support this podcast: https://podcasters.spotify.com/pod/show/chrisabraham/support
DeRay, De'Ara, Kaya, and Myles cover the underreported news of the week— including a Chicago-based gun manufacturer marketing rifles to children, Amy Robach and T.J. Holmes' depart from ABC network, an online community where home-schoolers learn how to turn their kids into Nazis, and Robert Townsend's evolution from actor to director. DeRay interviews VICE's award-winning national security reporter Ben Makuch about his podcast "American Terror".NewsDeRay Inside The Online Community Where Home-Schoolers Learn How To Turn Their Kids Into ‘Wonderful Nazis'Myles ‘GMA3' anchors Amy Robach and T.J. Holmes depart ABC after reported romantic relationshipKaya A child-size rifle with cartoon skulls, inspired by the AR-15, raises concernsDe'Ara Robert Townsend's ‘Hollywood Shuffle' comes full circle
Get an inside look at far-right extremism and domestic terror groups. From Gimlet and VICE News, American Terror follows reporter Ben Makuch as he investigates the ideologies and inside workings of hate groups in America. Listen to the first episode right here, then follow American Terror to catch the rest of this eight-episode series. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Get an inside look at far-right extremism and domestic terror groups. From Gimlet and VICE News, American Terror follows reporter Ben Makuch as he investigates the ideologies and inside workings of hate groups in America. Listen to the first episode right here, then follow American Terror to catch the rest of this eight-episode series. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Almost three years ago, an informant invited extremism and national security correspondent Ben Makuch into a secret phone call where members of a neo-Nazi terror group called The Base gathered to plan a civil war. Ben spent the next few years tracking every single move of The Base and the explosion of right wing terror groups in the United States. What he uncovered is revealed through his new podcast “American Terror” from VICE News and Gimlet, only on Spotify. This episode was produced by Sam Eagan, Editing by Stephanie Kariuki and Julia Nutter.VICE News Reports is produced by Sophie Kazis and Adriana Tapia. Our senior producers are Jesse Alejandro Cottrell, Janice Llamoca, and Julia Nutter. Our supervising producer is Ashley Cleek. Our associate producers are Steph Brown, Sam Eagan, and Adreanna Rodriguez. Sound design and music composition by Steve Bone, Pran Bandi, and Kyle Murdock. Our executive producers are Adizah Eghan and Stephanie Kariuki.Annie Aviles is our Executive Editor and Janet Lee is Senior Production Manager for VICE Audio. Fact Checking by Nicole Pasulka. Our theme music is by Steve Bone. Our host is Arielle Duhaime-Ross. Hosted on Acast. See acast.com/privacy for more information.
Back in May of 2020, a few ex-Green Berets and about 60 Venezuelans tried to overthrow the government of President Nicolas Maduro. The plan was a mess from the beginning, and it ended in a spectacular failure. VICE News reporter Ben Makuch and producer Miguel Fernández Flores investigate who was behind the plan and how it ended so disastrously. This episode was reported and produced by Ben Makuch and Miguel Fernández Flores with Ashley Cleek.VICE News Reports is hosted by Arielle Duhaime-Ross and produced by Jesse Alejandro Cottrell, Sophie Kazis, Jen Kinney, Janice Llamoca, Julia Nutter, and Sayre Quevedo. Our senior producers are Ashley Cleek and Adizah Eghan. Our associate producers are Steph Brown, Sam Eagan, and Adreanna Rodriguez. Sound design and music composition by Steve Bone, Pran Bandi, Natasha Jacobs and Kyle Murdock. Our executive producer and VP of Vice Audio is Kate Osborn. Janet Lee is Senior Production Manager for VICE Audio. See acast.com/privacy for privacy and opt-out information.
Fascists love to perfect a look. Hugo Boss' Nazi Uniforms, the striking headquarters of the Italian Fascist party, and the sleek presentation of Islamic State's Dabiq all have one thing in common—they're visually striking.So too with today's extremists. Neo-Nazis from Atomwaffen Division to the Order of the 9 Angles have a certain aesthetic flair. And that's largely down to a few influential artists. VICE extremism reporter and Cyber host Ben Makuch recently went in search of ‘Dark Foreigner:' The Artist Who Fueled a Neo-Nazi Terror Movement. See acast.com/privacy for privacy and opt-out information.
Fascists love to perfect a look. Hugo Boss' Nazi Uniforms, the striking headquarters of the Italian Fascist party, and the sleek presentation of Islamic State's Dabiq all have one thing in common—they're visually striking.So too with today's extremists. Neo-Nazis from Atomwaffen Division to the Order of the 9 Angles have a certain aesthetic flair. And that's largely down to a few influential artists. VICE extremism reporter and Cyber host Ben Makuch recently went in search of ‘Dark Foreigner:' The Artist Who Fueled a Neo-Nazi Terror Movement. See acast.com/privacy for privacy and opt-out information.
This is a re-run of an episode originally released on July 18th, 2019 A Silicon Valley company with a history of CIA funding, a suite of highly sought after intelligence software tools, and a gallivanting billionaire founder with connections to the Trump Administration is set to become one of the biggest IPOs in recent memory.Yet many outside of the infosec world don’t even know its name or that it even exists—a sharp difference Palantir doesn’t share with other similar-sized startups based out of the Silicon Valley.But Palantir’s surveillance software, which essentially siphons up monumental amounts of data on the public using state, police, and federal databases can map interpersonal relationships between people and provide that info to the fingertips of police and spies in a matter of seconds.Among the list of past and current Palantir clients are the NSA, CIA, Department of Homeland Security and Immigrations and Customs Enforcement—which directly uses its technology to fuel its controversial raids on undocument workers. Motherboard reporter Caroline Haskins obtained a copy of one of the company’s top-secret police manuals describing how to use its software. The revelation gave privacy-concerned onlookers a rare insight into just how invasive Palantir technology can be.On this week’s CYBER, Caroline sits down with host Ben Makuch to map out what Palantir is and how this company influences the very technological landscape of the modern world. See acast.com/privacy for privacy and opt-out information.
This is a re-run of an episode originally released on July 18th, 2019 A Silicon Valley company with a history of CIA funding, a suite of highly sought after intelligence software tools, and a gallivanting billionaire founder with connections to the Trump Administration is set to become one of the biggest IPOs in recent memory.Yet many outside of the infosec world don't even know its name or that it even exists—a sharp difference Palantir doesn't share with other similar-sized startups based out of the Silicon Valley.But Palantir's surveillance software, which essentially siphons up monumental amounts of data on the public using state, police, and federal databases can map interpersonal relationships between people and provide that info to the fingertips of police and spies in a matter of seconds.Among the list of past and current Palantir clients are the NSA, CIA, Department of Homeland Security and Immigrations and Customs Enforcement—which directly uses its technology to fuel its controversial raids on undocument workers. Motherboard reporter Caroline Haskins obtained a copy of one of the company's top-secret police manuals describing how to use its software. The revelation gave privacy-concerned onlookers a rare insight into just how invasive Palantir technology can be.On this week's CYBER, Caroline sits down with host Ben Makuch to map out what Palantir is and how this company influences the very technological landscape of the modern world. See acast.com/privacy for privacy and opt-out information.
The Canadian government recently listed the Proud Boys and three other far-right organizations as terrorist entities. They also moved to list nine other militant Islamist groups. For some people, this is a huge win. But others worry it's a sign that the war on terror is continuing to expand, and they're concerned about who might get caught up in its dragnet. Today, Ben Makuch a national security reporter for Vice, and Michelle Shephard, author of Decade of Fear: Reporting from Terrorism's Grey Zone, wade through the complex ramifications.
In the second and final episode in a series for CYBER on neo-Nazi terror group the Base, we dive into its origins: The online brainchild of its leader Rinaldo Nazzaro, an ex-Pentagon contractor with alleged links to the Kremlin (which he denies) who began his project for “race war” as a WordPress site that evolved into a secretive, encrypted chat group, then into paramilitary training in the fall of 2018. But shortly after, VICE News broke the first story on the group and authorities began circling.Once that viral feature published, some members of the Base fled the group, while others regrouped online and in-real-life, more committed to creating a homegrown, American insurgency against the government than ever. Over the course of the winter and spring of 2019, the Base recovered, gaining momentum and new recruits from across the U.S. and abroad. Threatening propaganda images emerge of members in the middle of Central Park in New York City, other members in Georgia call for attacks on the electric grid and a Canadian soldier (and terror suspect) is illegally on the lam in the U.S. with the help of the Base. But after a series of failed terror plots is disrupted by the FBI (and the bold actions of an undercover who infiltrates the group) the Base is torn apart in a series of stunning nationwide raids in January 2020. The final installment, titled “Train. Fight. Organize.,” is a discussion between reporters Ben Makuch and Mack Lamoureux, who have investigated the group for over two years, and features never-before heard phone calls obtained by VICE News from a confidential source, between the Base and its cell leaders discussing new recruits and how to use the war in Ukraine as a potential terror pipeline. See acast.com/privacy for privacy and opt-out information.
In the second and final episode in a series for CYBER on neo-Nazi terror group the Base, we dive into its origins: The online brainchild of its leader Rinaldo Nazzaro, an ex-Pentagon contractor with alleged links to the Kremlin (which he denies) who began his project for “race war” as a WordPress site that evolved into a secretive, encrypted chat group, then into paramilitary training in the fall of 2018. But shortly after, VICE News broke the first story on the group and authorities began circling.Once that viral feature published, some members of the Base fled the group, while others regrouped online and in-real-life, more committed to creating a homegrown, American insurgency against the government than ever. Over the course of the winter and spring of 2019, the Base recovered, gaining momentum and new recruits from across the U.S. and abroad. Threatening propaganda images emerge of members in the middle of Central Park in New York City, other members in Georgia call for attacks on the electric grid and a Canadian soldier (and terror suspect) is illegally on the lam in the U.S. with the help of the Base. But after a series of failed terror plots is disrupted by the FBI (and the bold actions of an undercover who infiltrates the group) the Base is torn apart in a series of stunning nationwide raids in January 2020. The final installment, titled “Train. Fight. Organize.,” is a discussion between reporters Ben Makuch and Mack Lamoureux, who have investigated the group for over two years, and features never-before heard phone calls obtained by VICE News from a confidential source, between the Base and its cell leaders discussing new recruits and how to use the war in Ukraine as a potential terror pipeline. See acast.com/privacy for privacy and opt-out information.
The last time Phineas Fisher agreed to an interview with Motherboard, they made us recreate the whole thing with a puppet. This time around, Phineas Fisher—one of the world’s most wanted hackers—wanted to make a statement on CYBER to deny he’s an agent of the Kremlin.Phineas Fisher is the hacker’s hacker that nobody knows. In fact, nobody even knows if they are just one person, or several people. All we know is Phineas Fisher has hacked, embarrassed, and exposed some of the world’s most powerful spyware companies that have connections to the FBI, the DEA, and dozens of other law enforcement and spy agencies all around the world. And Phineas Fisher has completely gotten away with it. Throughout these exploits, Motherboard'sLorenzo Francheschi-Bicchierai has been one of the few reporters to make contact with the hacker several times. Recently, Phineas Fisher got in touch with him again, but this time to deny a recent allegation that he’s Russian intelligence operation made in Joseph Menn’s new book on hacktivism.On this week’s CYBER re-run, Lorenzo sits down with host Ben Makuch to take you through the murky history of Phineas Fisher’s hacks, then the infamous hacktivist speaks. See acast.com/privacy for privacy and opt-out information.
The last time Phineas Fisher agreed to an interview with Motherboard, they made us recreate the whole thing with a puppet. This time around, Phineas Fisher—one of the world's most wanted hackers—wanted to make a statement on CYBER to deny he's an agent of the Kremlin.Phineas Fisher is the hacker's hacker that nobody knows. In fact, nobody even knows if they are just one person, or several people. All we know is Phineas Fisher has hacked, embarrassed, and exposed some of the world's most powerful spyware companies that have connections to the FBI, the DEA, and dozens of other law enforcement and spy agencies all around the world. And Phineas Fisher has completely gotten away with it. Throughout these exploits, Motherboard'sLorenzo Francheschi-Bicchierai has been one of the few reporters to make contact with the hacker several times. Recently, Phineas Fisher got in touch with him again, but this time to deny a recent allegation that he's Russian intelligence operation made in Joseph Menn's new book on hacktivism.On this week's CYBER re-run, Lorenzo sits down with host Ben Makuch to take you through the murky history of Phineas Fisher's hacks, then the infamous hacktivist speaks. See acast.com/privacy for privacy and opt-out information.
What is going on? Why is it going on? Is this actually real? Disinformation in the election was always going to be a thing, and well, it was. Today on Cyber, Ben Makuch and Jason Koebler discuss the state of play and why we're here, Iranian hackers, and mass conspiracies on twitter. See acast.com/privacy for privacy and opt-out information.
What is going on? Why is it going on? Is this actually real? Disinformation in the election was always going to be a thing, and well, it was. Today on Cyber, Ben Makuch and Jason Koebler discuss the state of play and why we're here, Iranian hackers, and mass conspiracies on twitter. See acast.com/privacy for privacy and opt-out information.
This week, we talk to Jek, a physical penetration tester whose job is to infiltrate offices, data centers, store stockrooms, and other supposedly "secure" locations and either steal information or install a tool so that other hackers can exfiltrate data. She relies on the most reliable vulnerability of all: human weakness. Jek tells host Ben Makuch how she does it, some of her most memorable operations, and why other hackers think that what she does is "witchcraft." See acast.com/privacy for privacy and opt-out information.
This week, we talk to Jek, a physical penetration tester whose job is to infiltrate offices, data centers, store stockrooms, and other supposedly "secure" locations and either steal information or install a tool so that other hackers can exfiltrate data. She relies on the most reliable vulnerability of all: human weakness. Jek tells host Ben Makuch how she does it, some of her most memorable operations, and why other hackers think that what she does is "witchcraft." See acast.com/privacy for privacy and opt-out information.
Audio deepfakes are getting more convincing than ever. To test this out, we’ve replaced our host Ben Makuch with a robotic clone of himself. Sponsored by NeXt. See acast.com/privacy for privacy and opt-out information.
Audio deepfakes are getting more convincing than ever. To test this out, we've replaced our host Ben Makuch with a robotic clone of himself. Sponsored by NeXt. See acast.com/privacy for privacy and opt-out information.
In this episode, we discuss why accelerationism has become a flagship doctrine of far-right violent extremism. To help us comprehend what accelerationism is and how it is reflected in the online sphere, Maygane Janin and Adam Hadley are joined by Professor Matthew Feldmann, Director of the Centre for Analysis of the Radical Right (CARR), and an expert on fascist ideology, neo-Nazism and “lone actor” terrorism, and by Ashton Kingdon, a PhD student at the University of Southampton and a fellow at CARR, whose research focuses on how far-right extremists use technology for recruitment and radicalisation. In today’s podcast, we also welcome Ben Makuch, a national security reporter with Vice News, who investigates far-right violent extremism, particularly neo-Nazism.Together, they consider how propaganda is being repurposed on forums and mainstream platforms to coincide with particular events to misconstrue the narrative and cause political tension. We also discuss the emergence of accelerationist subcultures, and how they are using the pandemic to “initiate the collapse of society”, and discuss a rise in media attention on accelerationism in the US.
It used to be that American hackers and the NSA were the unquestionable world's best. Following the many revelations from the Snowden leaks, it became clear the U.S. government had not only violated the civil liberties of American citizens, but the NSA had done an excellent job hacking, well, everything. It hacked the phones of world leaders (including key allies) and made major geopolitical rivals China and Russia very nervous.But, like everything else in the world, American hegemony in cyberspace has quickly faded as the proverbial American empire looks like it's in quick decline for a variety of obvious reasons. And when it comes to hacking powers across the world, it's been widely reported that everyone from China to private mercenaries have caught up to the hacking skills of American hackers. So for our Independence Day edition of CYBER, Motherboard reporter Lorenzo Francheschi Bicchiarrai and host Ben Makuch are discussing America's standing among the world powers of cyberspace. See acast.com/privacy for privacy and opt-out information.
It used to be that American hackers and the NSA were the unquestionable world’s best. Following the many revelations from the Snowden leaks, it became clear the U.S. government had not only violated the civil liberties of American citizens, but the NSA had done an excellent job hacking, well, everything. It hacked the phones of world leaders (including key allies) and made major geopolitical rivals China and Russia very nervous.But, like everything else in the world, American hegemony in cyberspace has quickly faded as the proverbial American empire looks like it's in quick decline for a variety of obvious reasons. And when it comes to hacking powers across the world, it’s been widely reported that everyone from China to private mercenaries have caught up to the hacking skills of American hackers. So for our Independence Day edition of CYBER, Motherboard reporter Lorenzo Francheschi Bicchiarrai and host Ben Makuch are discussing America’s standing among the world powers of cyberspace. See acast.com/privacy for privacy and opt-out information.
Adrian Cheung talks to Ben Makuch, national security reporter for Vice News, about why some neo-Nazis and white supremacists view the COVID-19 pandemic as their moment to act out their racist ideologies.
Yes, friends, this week’s CYBER podcast was recorded from the comfort of our apartments. Because, well, the global pandemic. Today on the show, we thought it would be important to discuss how coronavirus will affect state and corporate surveillance. Yes, because, like 9/11 and the quick enactment of the Patriot Act, there is already evidence of a boom for the spy industry. One company is advertising tech that leverages video surveillance software it says can spot people who have a fever, while the Israeli government has already given Shin Bet (its internal police agency) access to secretive cellular data to see who coronavirus positive patients have interacted with in an effort to stem the disease. In other words, sometimes companies react to crises by exploiting a business opportunity and governments might look to increase their Big Brother powers. Motherboard editor-in-chief Jason Koebler joins host Ben Makuch on the show. See acast.com/privacy for privacy and opt-out information.
Yes, friends, this week's CYBER podcast was recorded from the comfort of our apartments. Because, well, the global pandemic. Today on the show, we thought it would be important to discuss how coronavirus will affect state and corporate surveillance. Yes, because, like 9/11 and the quick enactment of the Patriot Act, there is already evidence of a boom for the spy industry. One company is advertising tech that leverages video surveillance software it says can spot people who have a fever, while the Israeli government has already given Shin Bet (its internal police agency) access to secretive cellular data to see who coronavirus positive patients have interacted with in an effort to stem the disease. In other words, sometimes companies react to crises by exploiting a business opportunity and governments might look to increase their Big Brother powers. Motherboard editor-in-chief Jason Koebler joins host Ben Makuch on the show. See acast.com/privacy for privacy and opt-out information.
Ben Makuch's reporting on national and international security issues has taken him from Eastern Europe to talking to Canadian foreign fighters to challenging the Canadian government in the Supreme Court over protections for journalists. Over the magic of the internet, Stephanie sits down with Ben and they talk about his latest reporting on far right extremism and white nationalist movements in Canada, the United States, Ukraine and the growing links between these movements. Is law enforcement paying enough attention and are they prepared to take on this threat? This podcast was recorded on 26 February 2020.
Last week, former reservist Patrik Mathews was arrested by the FBI on firearms-related charges. Front Burner first covered his story last summer, when he was being investigated by law enforcement for suspected ties to a militant white supremacist group called The Base. After a raid by the RCMP, Mathews disappeared. Because of his arrest, we have access to a trove of court documents from the FBI's investigation of Mathews. Today on Front Burner, we talk to Vice national security correspondent Ben Makuch about what we've learned from these documents, and what they might say about efforts to stop the growth of white supremacist groups.
It occurred to us at Motherboard that for this final episode of CYBER in the 2010s we could recount the year in stories that we've done. The real scoops, traffic hogs, and think pieces. But then again, this is the decade that changed infosec. This was the decade that made hackers critical players on the world stage, our personal digital information sacred, and our political systems fixed into some strange, social media hellscape. Since its founding in 2009, Motherboard has seen it all with you.So on this episode of CYBER, our dear editor-in-chief Jason Koebler and host Ben Makuch will take you through from the beginning of the decade to its end: from Guy Fawkes masks, strings of weaponized code to your brain being manipulated by a Facebook ad. See acast.com/privacy for privacy and opt-out information.
It occurred to us at Motherboard that for this final episode of CYBER in the 2010s we could recount the year in stories that we’ve done. The real scoops, traffic hogs, and think pieces. But then again, this is the decade that changed infosec. This was the decade that made hackers critical players on the world stage, our personal digital information sacred, and our political systems fixed into some strange, social media hellscape. Since its founding in 2009, Motherboard has seen it all with you.So on this episode of CYBER, our dear editor-in-chief Jason Koebler and host Ben Makuch will take you through from the beginning of the decade to its end: from Guy Fawkes masks, strings of weaponized code to your brain being manipulated by a Facebook ad. See acast.com/privacy for privacy and opt-out information.
An army reservist from a town near Winnipeg is being investigated by the RCMP and the Canadian Military for suspected ties to a shadowy militant neo-Nazi group called “The Base.” Today, we’ll talk to VICE national security correspondent Ben Makuch and VICE senior reporter Mack Lamoureux about the tactics and inner workings of the group, including its similarities to al-Qaeda. We’ll also touch on the Canadian military’s stance on extremism in their ranks.
The last time Phineas Fisher agreed to an interview with Motherboard, they made us recreate the whole thing with a puppet. This time around, Phineas Fisher—one of the world’s most wanted hackers—wanted to make a statement on CYBER to deny he’s an agent of the Kremlin.Phineas Fisher is the hacker’s hacker that nobody knows. In fact, nobody even knows if they are just one person, or several people. All we know is Phineas Fisher has hacked, embarrassed, and exposed some of the world’s most powerful spyware companies that have connections to the FBI, the DEA, and dozens of other law enforcement and spy agencies all around the world. And Phineas Fisher has completely gotten away with it. Throughout these exploits, Motherboard'sLorenzo Francheschi-Bicchierai has been one of the few reporters to make contact with the hacker several times. Recently, Phineas Fisher got in touch with him again, but this time to deny a recent allegation that he’s Russian intelligence operation made in Joseph Menn’s new book on hacktivism.On this week’s CYBER, Lorenzo sits down with host Ben Makuch to take you through the murky history of Phineas Fisher’s hacks, then the infamous hacktivist speaks. See acast.com/privacy for privacy and opt-out information.
The last time Phineas Fisher agreed to an interview with Motherboard, they made us recreate the whole thing with a puppet. This time around, Phineas Fisher—one of the world's most wanted hackers—wanted to make a statement on CYBER to deny he's an agent of the Kremlin.Phineas Fisher is the hacker's hacker that nobody knows. In fact, nobody even knows if they are just one person, or several people. All we know is Phineas Fisher has hacked, embarrassed, and exposed some of the world's most powerful spyware companies that have connections to the FBI, the DEA, and dozens of other law enforcement and spy agencies all around the world. And Phineas Fisher has completely gotten away with it. Throughout these exploits, Motherboard'sLorenzo Francheschi-Bicchierai has been one of the few reporters to make contact with the hacker several times. Recently, Phineas Fisher got in touch with him again, but this time to deny a recent allegation that he's Russian intelligence operation made in Joseph Menn's new book on hacktivism.On this week's CYBER, Lorenzo sits down with host Ben Makuch to take you through the murky history of Phineas Fisher's hacks, then the infamous hacktivist speaks. See acast.com/privacy for privacy and opt-out information.
A Silicon Valley company with a history of CIA funding, a suite of highly sought after intelligence software tools, and a gallivanting billionaire founder with connections to the Trump Administration is set to become one of the biggest IPOs in recent memory.Yet many outside of the infosec world don’t even know its name or that it even exists—a sharp difference Palantir doesn’t share with other similar-sized startups based out of the Silicon Valley.But Palantir’s surveillance software, which essentially siphons up monumental amounts of data on the public using state, police, and federal databases can map interpersonal relationships between people and provide that info to the fingertips of police and spies in a matter of seconds.Among the list of past and current Palantir clients are the NSA, CIA, Department of Homeland Security and Immigrations and Customs Enforcement—which directly uses its technology to fuel its controversial raids on undocument workers. Motherboard reporter Caroline Haskins obtained a copy of one of the company’s top-secret police manuals describing how to use its software. The revelation gave privacy-concerned onlookers a rare insight into just how invasive Palantir technology can be.On this week’s CYBER, Caroline sits down with host Ben Makuch to map out what Palantir is and how this company influences the very technological landscape of the modern world. See acast.com/privacy for privacy and opt-out information.
A Silicon Valley company with a history of CIA funding, a suite of highly sought after intelligence software tools, and a gallivanting billionaire founder with connections to the Trump Administration is set to become one of the biggest IPOs in recent memory.Yet many outside of the infosec world don't even know its name or that it even exists—a sharp difference Palantir doesn't share with other similar-sized startups based out of the Silicon Valley.But Palantir's surveillance software, which essentially siphons up monumental amounts of data on the public using state, police, and federal databases can map interpersonal relationships between people and provide that info to the fingertips of police and spies in a matter of seconds.Among the list of past and current Palantir clients are the NSA, CIA, Department of Homeland Security and Immigrations and Customs Enforcement—which directly uses its technology to fuel its controversial raids on undocument workers. Motherboard reporter Caroline Haskins obtained a copy of one of the company's top-secret police manuals describing how to use its software. The revelation gave privacy-concerned onlookers a rare insight into just how invasive Palantir technology can be.On this week's CYBER, Caroline sits down with host Ben Makuch to map out what Palantir is and how this company influences the very technological landscape of the modern world. See acast.com/privacy for privacy and opt-out information.
The secularism bill banning public workers from wearing religious symbols finally passed in Québec. Google News gathered together the heads of major media companies for a meeting and (surprise!) didn’t tell the public. And VICE reporter Ben Makuch lost a legal challenge to keep private background material from the RCMP. Sarah Hagi co-hosts. This episode is brought to you by our listeners. Please consider becoming a monthly supporter. CORRECTION: The show notes previously listed Ben Makuch as a former VICE employee. He remains employed at VICE. Support CANADALAND: http://canadalandshow.com/join See omnystudio.com/listener for privacy information.
For the last four years, Vice reporter Ben Makuch has been fighting to keep communications he had with a suspected ISIS fighter from the RCMP. The case went all the way to the Supreme Court of Canada, and last week, Makuch and Vice lost their final appeal on this case. Ben Makuch talks to host Jayme Poisson about that journey, and what it might mean for press freedom in Canada.
On this week’s CYBER host Ben Makuch sat down with Dutch politician Marietje Schaake to discuss the future of cyberweapons, how governmental regulation on spyware should mirror the conventional arms industry, and how Brexit might make Britain a haven for commercial surveillance companies. See acast.com/privacy for privacy and opt-out information.
On this week's CYBER host Ben Makuch sat down with Dutch politician Marietje Schaake to discuss the future of cyberweapons, how governmental regulation on spyware should mirror the conventional arms industry, and how Brexit might make Britain a haven for commercial surveillance companies. See acast.com/privacy for privacy and opt-out information.
Ben Makuch sits down with one of InfoSec’s only true celebrities: The Grugq (who recently added the name ‘Thaddeus’ to his Twitter account, which has over 100,000 followers.)For the uninformed, the Grugq is a South African hacker, security research, OPSEC expert and highly entertaining Twitter follow with a history of being an exploit broker that has a rolodex of government contacts (he once claimed in Forbes to be taking in over $1 million in a single year skimming a fee off of exploit sales as a middle-man to intelligence agencies).In this episode, the hacking and spy expert cuts through the media tailspinning around disinfo campaigns to tell us what 2020 election meddling might just look like. See acast.com/privacy for privacy and opt-out information.
Ben Makuch sits down with one of InfoSec's only true celebrities: The Grugq (who recently added the name ‘Thaddeus' to his Twitter account, which has over 100,000 followers.)For the uninformed, the Grugq is a South African hacker, security research, OPSEC expert and highly entertaining Twitter follow with a history of being an exploit broker that has a rolodex of government contacts (he once claimed in Forbes to be taking in over $1 million in a single year skimming a fee off of exploit sales as a middle-man to intelligence agencies).In this episode, the hacking and spy expert cuts through the media tailspinning around disinfo campaigns to tell us what 2020 election meddling might just look like. See acast.com/privacy for privacy and opt-out information.
Very few people have heard of them, but "dev-fused" iPhones sold on the grey market are one of the most important tools for the best iOS hackers in the world. Lorenzo Franceschi-Bicchierai talks about his blockbuster investigation, and host Ben Makuch talks to someone who sells these prototype phones. See acast.com/privacy for privacy and opt-out information.
Very few people have heard of them, but "dev-fused" iPhones sold on the grey market are one of the most important tools for the best iOS hackers in the world. Lorenzo Franceschi-Bicchierai talks about his blockbuster investigation, and host Ben Makuch talks to someone who sells these prototype phones. See acast.com/privacy for privacy and opt-out information.
Tracking hacking groups has become a booming business. Dozens of so-called “threat intelligence” companies keep tabs on them and sell subscriptions to feeds where they provide customers with up to date information on what the most advanced cyber criminals and government hackers are up to. Lots of these are small companies, but one of the best in the biz you've definitely heard of: It's Google. The internet giant has more than 1.5 billion active users on Gmail, more than 1 billion people who use Chrome, and more than 2 billion of their Android phones floating around in the world.This week, Ben Makuch talks to Shane Huntley, the Director of Google's Threat Analysis Group (TAG). TAG is essentially Google's hacker hunting team: they're the ones tasked with monitoring Google networks for criminal and government hacking groups. See acast.com/privacy for privacy and opt-out information.
Tracking hacking groups has become a booming business. Dozens of so-called “threat intelligence” companies keep tabs on them and sell subscriptions to feeds where they provide customers with up to date information on what the most advanced cyber criminals and government hackers are up to. Lots of these are small companies, but one of the best in the biz you've definitely heard of: It's Google. The internet giant has more than 1.5 billion active users on Gmail, more than 1 billion people who use Chrome, and more than 2 billion of their Android phones floating around in the world.This week, Ben Makuch talks to Shane Huntley, the Director of Google's Threat Analysis Group (TAG). TAG is essentially Google’s hacker hunting team: they’re the ones tasked with monitoring Google networks for criminal and government hacking groups. See acast.com/privacy for privacy and opt-out information.
This week, we talk to Jek, a physical penetration tester whose job is to infiltrate offices, data centers, store stockrooms, and other supposedly "secure" locations and either steal information or install a tool so that other hackers can exfiltrate data. She relies on the most reliable vulnerability of all: human weakness. Jek tells host Ben Makuch how she does it, some of her most memorable operations, and why other hackers think that what she does is "witchcraft." See acast.com/privacy for privacy and opt-out information.
This week, we talk to Jek, a physical penetration tester whose job is to infiltrate offices, data centers, store stockrooms, and other supposedly "secure" locations and either steal information or install a tool so that other hackers can exfiltrate data. She relies on the most reliable vulnerability of all: human weakness. Jek tells host Ben Makuch how she does it, some of her most memorable operations, and why other hackers think that what she does is "witchcraft." See acast.com/privacy for privacy and opt-out information.
Earlier this month, Motherboard sent $300 to a bounty hunter. Within moments, he sent us a Google Maps screenshot with the real-time location data of a phone that we'd asked him to track. Motherboard editor-in-chief Jason Koebler and senior staff writer Joseph Cox go deep on the shady—but legal—market of data aggregators and brokers who sell smartphone location data to bounty hunters, bail bondsmen, landlords, used car salesmen, and anyone who can afford it.We learn how bounty hunters go right up to the edge of what the law allows and use "neurolinguistic mind manipulation" to get people to give them information. CYBER host Ben Makuch also talks to Oregon Senator Ron Wyden, who has legislation pending that would ban these practices and would help protect Americans' privacy. See acast.com/privacy for privacy and opt-out information.
Earlier this month, Motherboard sent $300 to a bounty hunter. Within moments, he sent us a Google Maps screenshot with the real-time location data of a phone that we'd asked him to track. Motherboard editor-in-chief Jason Koebler and senior staff writer Joseph Cox go deep on the shady—but legal—market of data aggregators and brokers who sell smartphone location data to bounty hunters, bail bondsmen, landlords, used car salesmen, and anyone who can afford it.We learn how bounty hunters go right up to the edge of what the law allows and use "neurolinguistic mind manipulation" to get people to give them information. CYBER host Ben Makuch also talks to Oregon Senator Ron Wyden, who has legislation pending that would ban these practices and would help protect Americans' privacy. See acast.com/privacy for privacy and opt-out information.
On this episode, VICE Podcast Producer Sophie Kazis sits down with reporter Ben Makuch to discuss how rural communities in the U.S. and Canada are grappling with how to provide vital emergency services to citizens amid rapid population migration into cities. See acast.com/privacy for privacy and opt-out information.
CYBER host Ben Makuch and reporter Mack Lamoureux recently spent months embedded on in a secretive social network called “The Base," which is used by American neo-Nazis to organize real-life meetups. See acast.com/privacy for privacy and opt-out information.
CYBER host Ben Makuch and reporter Mack Lamoureux recently spent months embedded on in a secretive social network called “The Base," which is used by American neo-Nazis to organize real-life meetups. See acast.com/privacy for privacy and opt-out information.
CYBER is Motherboard's first-ever cybersecurity, hacking, and infosec podcast - and you can listen to episode 1 here.Imagine if your phone suddenly stopped working. And then you couldn't login to Facebook, Instagram, your email, or bank account. Your phone switches back on, and you get a call. On the other end of the line is a guy telling you he's stolen your phone number, and is about to take all your money. This is a new type of hack called SIM hijacking, and there's almost nothing you can do to stop it. In this first episode of CYBER, we hear audio from a real-life ransom attempt, and host Ben Makuch speaks to Motherboard reporter Lorenzo Franceschi-Bicchierai about how it all works.If you like what you hear, make sure to subscribe on Apple Podcasts or wherever you listen. See acast.com/privacy for privacy and opt-out information.
In this bonus episode Austin Walker interviews Ben Makuch, host of Motherboard's new podcast "Cyber", about cyber security, why we always seem caught off guard by each new cyber threat, and what responsibilities large companies like Facebook have in keeping people safe on the internet, followed by the first full episode of "Cyber." See acast.com/privacy for privacy and opt-out information.
Imagine if your phone suddenly stopped working. And then you couldn't login to Facebook, Instagram, your email, or bank account. Your phone switches back on, and you get a call. On the other end of the line is a guy telling you he's stolen your phone number, and is about to take all your money. This is a new type of hack called SIM hijacking, and there's almost nothing you can do to stop it. In this first episode of CYBER, we hear audio from a real-life ransom attempt, and host Ben Makuch speaks to Motherboard reporter Lorenzo Franceschi-Bicchierai about how it all works.This episode was produced and edited by Sophie Kazis. See acast.com/privacy for privacy and opt-out information.
Imagine if your phone suddenly stopped working. And then you couldn’t login to Facebook, Instagram, your email, or bank account. Your phone switches back on, and you get a call. On the other end of the line is a guy telling you he’s stolen your phone number, and is about to take all your money. This is a new type of hack called SIM hijacking, and there’s almost nothing you can do to stop it. In this first episode of CYBER, we hear audio from a real-life ransom attempt, and host Ben Makuch speaks to Motherboard reporter Lorenzo Franceschi-Bicchierai about how it all works.This episode was produced and edited by Sophie Kazis. See acast.com/privacy for privacy and opt-out information.
Imagine if your phone suddenly stopped working. And then you couldn’t login to Facebook, Instagram, your email, or bank account. Your phone switches back on, and you get a call. On the other end of the line is a guy telling you he’s stolen your phone number, and is about to take all your money. This is a new type of hack called SIM hijacking, and there’s almost nothing you can do to stop it. In this first episode of CYBER, we hear audio from a real-life ransom attempt, and host Ben Makuch talks to Lorenzo Franceschi-Bicchierai about how it works.
We talk to two Canadian journalists who are facing legal consequences --including jail time-- for doing their jobs. VICE reporter Ben Makuch is heading to the Supreme Court to try to stop the RCMP from getting access to communications he had with alleged ISIS recruit Farah Shirdon in 2014. APTN's Justin Brake, formerly of The Independent, is facing criminal charges for disobeying a court injunction while following Indigenous land protectors onto the site of the Muskrat Falls hydroelectric project in 2016. The outcomes of these cases could set precedents for how the press is allowed to operate. Support CANADALAND: http://canadalandshow.com/join See omnystudio.com/listener for privacy information.
Motherboard speaks to Ben Makuch, the host of VICELAND's Cyberwar, about how he may have come face-to-face with a Russian DNC hacker. See acast.com/privacy for privacy and opt-out information.
Duncan Pike is the Campaigns and Advocacy Coordinator with Canadian Journalists for Free Expression (CJFE) talks about Ontario appeals court decision compelling Ben Makuch to give RCMP materials he used for stories on a suspected terrorist.
Freelance journalist Matt Braga joins Jesse to talk about spy stuff - the Panama Papers, CSIS, C-51, and Ben Makuch's ongoing battle with the RCMP. Support CANADALAND: https://canadaland.com/joinSee omnystudio.com/listener for privacy information.
Americans are threatening to come to Canada if Trump becomes president. And the Canadian media is reporting on the American media checking us out. Vice reporter Ben Makuch is in court, trying to keep his notes away from the RCMP. Vice is going to cable with VICELAND. The skinny basic packages offered by cable companies are awful. Buzzfeed Canada's Ishmael Daro co-hosts.Support CANADALAND: https://canadaland.com/joinSee omnystudio.com/listener for privacy information.
Ben Makuch, Vice's national security reporter, discusses Trudeau's cabinet swearing in, CBC's The National's gender parity panel, why the Mounties are out for Ben, and J. Kelly Nestruck's brush with New Zealand sports reporting. CANADALAND's new weekly newsletter, NOT SORRY Ben Makuch's Twitter - @bmakuch Jane Lytvynenko's Twitter - @janelytv SHORT_CUTS_45_-_Trudeau_Mania_Gender_Parity_RCMP_Fights_Vice_Theatre_Sports_ReporterSupport CANADALAND: https://canadaland.com/joinSee omnystudio.com/listener for privacy information.