POPULARITY
Chapter 1 What's Monsters In America by W. Scott Poole"Monsters in America: Our Historical Obsession with the Hideous and the Haunting" by W. Scott Poole is a compelling exploration of American culture through the lens of monsters and monstrosity. The book delves into how various American monsters—ranging from folklore creatures to cultural icons—reflect the nation's fears, prejudices, and myths. Poole analyzes the evolution of monsters in American literature, film, and popular culture, suggesting that they serve as a mirror to societal anxieties. By examining figures such as Bigfoot, the vampire, and zombie narratives, Poole illustrates why these creatures are not just sources of entertainment but also poignant symbols of deeper cultural issues, including racism, nationalism, and existential dread. The work provides a historical context, demonstrating how societal changes influence perceptions of monstrosity, while also probing into themes like identity, the otherness, and the perpetual battle between civilization and savagery. With insightful analysis and engaging writing, Poole invites readers to reconsider their relationship with these figures and what they reveal about the American psyche.Chapter 2 Monsters In America by W. Scott Poole Summary"Monsters In America" by W. Scott Poole explores the cultural significance of monsters in American society and how they reflect deeper societal anxieties, fears, and desires. Poole delves into various monster archetypes found in literature, film, and folklore, analyzing their origins and the context in which they emerged. He examines classic figures such as vampires, zombies, and werewolves, and discusses how these creatures embody the struggles and conflicts present in American history.Throughout the book, Poole argues that monsters serve as a projection of societal issues, from immigration and race to gender and class. He highlights how these monstrous figures often represent the 'other' and reflect fears about what is unfamiliar or threatening to mainstream culture. By tracing the evolution of monsters through American pop culture, Poole provides insight into how these creatures have transformed alongside the nation's identity and values. He also touches on the commercialization of monster mythology and how they have become central to entertainment narratives.Overall, "Monsters In America" presents monsters not merely as fictional entities, but as critical cultural symbols that dissect and reveal the complexities of the American psyche.Chapter 3 Monsters In America AuthorW. Scott Poole is an American author and academic known for his work in American studies and popular culture. He released the book "Monsters in America: Our Historical Obsession with the Hideous and the Haunting" in 2011. This book explores how monsters in American culture reflect broader anxieties and fears in society, examining various manifestations of monstrosity in literature, film, and folklore.In addition to "Monsters in America," Poole has written other notable works, including:"The Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World" (2018) This book narrates the history of the influential hacking group Cult of the Dead Cow and its impact on technology and society."Ronald Reagan and the Movies" (2017) An analysis of the relationship between Ronald Reagan's film career and his political life."A History of Horror: The Changing Face of Fear" (2020) An examination of the evolution of horror in American culture.As for which of his books is the best in terms of editions, "Monsters in America" is particularly well-regarded for its thorough research and engaging prose, and it has received positive reviews from both academic and general audiences. It is often cited in discussions of American folklore and cultural studies, making it a strong candidate for his best...
Join Kali Fencl as she dives deep into a conversation with cybersecurity veteran The Gibson. With 25+ years in InfoSec, The Gibson shares his journey from coding as a child to shaping threat intelligence and privacy-first technology today. In this episode, they discuss hacker ethics, the influential hacker groups Loft and Cult of the Dead Cow, the evolution of hacktivism, and the groundbreaking work on privacy-focused projects like Veilid. Tune in for insights on hacking culture, cybersecurity ethics, and the balance between creativity and responsibility in the digital age.
A Dramatic SaturdayFirst a look at the events of the dayThen The Lux Radio Theater, originally broadcast October 26, 1942, 82 years ago, Wake Island starring Brian Donlevy, Broderick Crawford, and Robert Preston. A war drama about the relatively undefended Pacific Island attacked by the Japs shortly after Pearl Harbor. We follow that with Presenting Charles Boyer, originally broadcast October 26, 1950, 74 years ago, The Paris-Marseilles Highway. Michel helps a family to find a lost cow. But the poor cow has been struck by a car. Michel comes up with a scheme to replace the cow. Then The Shadow starring William Johnstone, originally broadcast October 26, 1941, 83 years ago, The Devil's Hour. The Devil is summoned on Halloween, at midnight!Finally, Claudia, originally broadcast October 26, 1948, 76 years ago. Claudia decides on a cow.Thanks to Honeywell for supporting our podcast by using the Buy Me a Coffee function at http://classicradio.streamIf you like what we do here, visit our friend Jay at http://radio.macinmind.com for great old time radio shows 24 hours a day
In this compelling episode of our podcast, we delve into the intriguing world of Anonymous, the infamous hacktivist collective that has left a significant mark on internet culture and activism. The discussion begins with a gripping account of an early morning raid by law enforcement, highlighting how "ten thousand angry kids" challenged the established order and shook the foundations of institutions like PayPal and WikiLeaks. We explore the rise of Anonymous as a chaotic yet powerful force, characterized by a lack of formal leadership but a strong commitment to freedom of expression. The conversation takes a deeper dive into the roots of hacktivism, tracing its origins back to playful pranks at MIT and the motivations of various hacker groups, including the influential "Cult of the Dead Cow." The impact of Anonymous on global movements, particularly during the Arab Spring, is examined, showcasing how their actions supported activists fighting against government censorship and repression. Finally, we reflect on the personal consequences of being involved in Anonymous, discussing the ethical implications of hacktivism and the ongoing struggle against censorship. This episode is not just a narrative of rebellion; it's a powerful exploration of the meaning of freedom in the digital age. Join us for an enlightening discussion that reveals the complexities of activism in our interconnected world.Here's a summary of the documentary in five bullet points with timestamps:- **Introduction to Anonymous** (00:14 - 01:42): The documentary opens with a personal account of an early morning raid by law enforcement. The speaker reflects on how the actions of "ten thousand angry kids" challenged governmental authority and perceptions surrounding organizations like PayPal and WikiLeaks.- **The Rise of Anonymous and Its Activities** (02:20 - 05:36): Anonymous is described as a chaotic force in activism, with no formal leadership but a strong collective ethos focused on freedom of expression. The group claims various high-profile attacks, including on government and corporate websites, positioning themselves as defenders of internet freedom.- **Hacktivism and Cultural Origins** (06:56 - 08:06): The concept of hacktivism is explored, detailing its roots in playful pranks at MIT and the subsequent political motivations of hackers. Key figures and groups, such as the "Cult of the Dead Cow," are mentioned in relation to the development of hacktivism as a political movement.- **Impact of Anonymous on Global Movements** (01:01:15 - 01:03:53): The documentary highlights Anonymous's involvement in significant global events, including the Arab Spring, where they provided support to activists facing government censorship and violence, demonstrating the power of online activism in real-world protests.- **Consequences and Reflections on Activism** (01:30:12 - 01:33:35): The speaker discusses the personal repercussions of their involvement with Anonymous, reflecting on the ethical dilemmas of hacking as activism. The closing thoughts emphasize the ongoing struggle against censorship and oppression, asserting that everyone's opinion matters in the fight for freedom.
Send us a Text Message.Episode 108 is up and ready. Lots to chat about. A few events and a few previews for you to sink your teeth into.Support the Show.Thanks for your Support!!
Today we spoke to Sam Harvey again after he won the Dead Cow Gully Ultra with an aim of running over 800km non stop raising money for I AM HOPE. See omnystudio.com/listener for privacy information.
Times have changed!! If you are in the market for buying or selling a HUNTING PROPERTY, then you need to listen to this podcast! Whitetail Properties land specialist Jason "Zig" Ziegler joins me to discuss the things you NEED TO KNOW before going "ALL IN" on a property. Zig also gives strategies on how to stay ahead of the game to have an opportunity at your DREAM PROPERTY before it's OFF the MARKET. Finally, the story of the BUTCHERED COW on the front LAWN...Thanks Zig for Joining me!Website: https://mnrackstars.weebly.com/THANKS TO ALL OF OUR PARTNERS!!Please check out all of their websites and follow them on their social media platforms!!ArcticShield- https://www.arcticshieldoutdoor.com/Domain Outdoor- https://www.domainoutdoor.com/Tactacam- https://www.tactacam.com/Fourth Arrow Camera Arms- https://www.fourtharrowcameraarms.com/J&R Outdoors- Check out their Facebook pageThe Fish Guyd- Check out his social media platformsSkull Craft- Check out their social media platforms as well!!
Summary Eric Escobar (Twitter; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss compromising networks and information security. He has a coveted DEFCON Black Badge. What You'll Learn Intelligence -What keeps Eric up at night -Thinking like an ethical hacker (aka a “penetration tester) -Protecting your information (i.e., “Hardening the attack surface”) -Plain English explanations of key cyber concepts like “Kill Chains” and “Zero Days” Reflections -Having a cool job -The information revolution and life in the modern world And much, much more… Episode Notes Eric Escobar commits several thousand felonies on any given day, if he didn't have permission to do what he was doing. A Principal Security Consultant with SecureWorks, Eric has compromised pretty much everything out there: from healthcare and banking to technology and critical infrastructure, through to amusement parks and next generation military aircraft. “From my perspective, it's the coolest job in the entire world.” His team consecutively won first place in the Wireless CTF category at DEF CON 23, 24, and 25, snagging a Black Badge along the way. He has a BS and MS in Civil Engineering. And… The links between computing, hacking and the 60's counterculture are FASCINATING. Learn more by dipping your toes here and here, or dive deeper with What the Dormouse Said (2005) by John Markoff and From Counterculture to Cyberculture (2006) by Fred Turner. Quote of the Week "Watching any critical infrastructure get compromised is really the thing that keeps me up at night because lives are in the balance…and we do a lot of testing for critical infrastructure, and I've seen computers and machines that have been online and not been taken offline, longer than I've been alive…So really interesting to see those types of things because they interact with really big, expensive hardware…there's a catch 22 that happens where you can't really take the machine offline to do maintenance on it because it's critical infrastructure. So then how do you test it to make sure that a hacker can't take it offline, or maintenance can't be done on it? " – Eric Escobar. Resources *Andrew's Recommendation* -Word Notes From beginner thru advanced, you'll find some helpful definitions of things like “Web 3.0,” “NFT's” and “Digital Transformation” on this Cyberwire audio glossary. *SpyCasts* -Inside Microsoft's Threat Intelligence Center (MSTIC) – with John Lambert and Cristin Goodwin (2021) -The Cyber Zeitgeist – with Dave Bittner (2021) -Securing Cyberspace – with Charlie Mitchell (2016) *Beginner Resources* -What is Hacking? The Economic Times (n.d.) [web] -Ethical Hacking in 8 Minutes, Simplilearn (2020) [8 min video] -Cybersecurity in 7 minutes, Simplilearn (2020) [7 min video] Books -The Cyberweapons Arms Race, N. Perloth (Bloomsbury, 2021) -Cult of the Dead Cow, J. Menn (PublicAffairs, 2020) -Breaking & Entering, J. Smith (Mariner Books, 2019) -The Art of Invisibility, K. Mitnick (L, B & C, 2017) -Ghost in the Wires, K. Mitnick (Back Bay Books, 2012) -Kingpin, K. Poulson (Crown, 2012) -The Cuckoo's Egg, C. Stoll (Doubleday, 1989) -Neuromancer, W. Gibson (Ace, 1984) Articles -2022 State of the Threat: A Year in Review, Secureworks (2022) -The Anthropology of Hackers, The Atlantic (2010) -Timeline Since 2006: Significant Cyber Incidents, CSIS (n.d.) Documentary -DEFCON, The Documentary Network (2013) Resources -Government Hacking Bibliography, S. Quinlan, New America Foundation (2016) *Wildcard Resource* -“The Aurora Shard” Come to the International Spy Museum to see an ugly chunk of metal. Why? Well, it speaks to a revolution in the relationship between the material world and the non-material world. Broken down? 30 lines of code blew up a 27-ton generator. Zeros and ones can cause violent explosions!
From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.
From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998. Learn more about your ad choices. Visit megaphone.fm/adchoices
Visit: RadioLawTalk.com for information & full episodes! Follow us on Facebook: bit.ly/RLTFacebook Follow us on Twitter: bit.ly/RLTTwitter Follow us on Instagram: bit.ly/RLTInstagram Subscribe to our YouTube channel: www.youtube.com/channel/UC3Owf1BEB-klmtD_92-uqzg Your Radio Law Talk hosts are exceptional attorneys and love what they do! They take breaks from their day jobs and make time for Radio Law Talk so that the rest of the country can enjoy the law like they do. Follow Radio Law Talk on Youtube, Facebook, Twitter & Instagram!
This week, First up its the Security News: libwebp or die: we unravel some of the details behind the webp vulnerability first fixed by Apple and Google, then, hopefully by everyone else, attackers can steal your pixels using your GPU, someone cough China cough has been hacking Cisco routers, Kia boys are still a problem, How the Cult of the Dead Cow plans to save the internet, how iOS updates could break glucose monitors, spamming the CVE database, and when a medium is really a high! Just what are the right skills to have or acquire to work in cybersecurity today? Kayla and the Security Weekly crew talk about it in this segment. We also touch on why we get burnt out and how to avoid it, all in anticipation for SOC Analyst Appreciation Day! This segment is sponsored by Devo . Visit https://securityweekly.com/devo to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/psw-800
This week, First up its the Security News: libwebp or die: we unravel some of the details behind the webp vulnerability first fixed by Apple and Google, then, hopefully by everyone else, attackers can steal your pixels using your GPU, someone cough China cough has been hacking Cisco routers, Kia boys are still a problem, How the Cult of the Dead Cow plans to save the internet, how iOS updates could break glucose monitors, spamming the CVE database, and when a medium is really a high! Show Notes: https://securityweekly.com/psw-800
This week, First up its the Security News: libwebp or die: we unravel some of the details behind the webp vulnerability first fixed by Apple and Google, then, hopefully by everyone else, attackers can steal your pixels using your GPU, someone cough China cough has been hacking Cisco routers, Kia boys are still a problem, How the Cult of the Dead Cow plans to save the internet, how iOS updates could break glucose monitors, spamming the CVE database, and when a medium is really a high! Just what are the right skills to have or acquire to work in cybersecurity today? Kayla and the Security Weekly crew talk about it in this segment. We also touch on why we get burnt out and how to avoid it, all in anticipation for SOC Analyst Appreciation Day! This segment is sponsored by Devo . Visit https://securityweekly.com/devo to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/psw-800
This week, First up its the Security News: libwebp or die: we unravel some of the details behind the webp vulnerability first fixed by Apple and Google, then, hopefully by everyone else, attackers can steal your pixels using your GPU, someone cough China cough has been hacking Cisco routers, Kia boys are still a problem, How the Cult of the Dead Cow plans to save the internet, how iOS updates could break glucose monitors, spamming the CVE database, and when a medium is really a high! Show Notes: https://securityweekly.com/psw-800
We are living in a cyberpunk Reality the birth of the full 21st century into a cyber trans human corporate technocracy that rules via software and super computers and social media. The real life Arasaka Corp is the Red Chinese taking over major USA companies and operating them on US soil as tech puppets invading us with our own capitalism. The only hope is the legacy of citizen hackers and hacktivists fighting for human rights with high tech skills like the Cult of the Dead Cow with its roots in Texas. Fight the Future. X: @topsecrettexan CashApp: $beyondtopsecrettexan --- Support this podcast: https://podcasters.spotify.com/pod/show/beyondtopsecrettexan/support
Alex is in Slovenia, Dildog, Medus4 and The Gibson join the panel to discuss their Veilid project, how the framework reduces costs and secures data for apps built on top of it, The Gibson's motivation for creating hackers.town, reaction to the project since it was announced, user experience, design considerations that went into Veilid, explaining Cult of the Dead Cow, how Veilid can protect against some of the more sinister use cases of personal data, addressing safety of the framework, where the name came from.
Alex is in Slovenia, Dildog, Medus4 and The Gibson join the panel to discuss their Veilid project, how the framework reduces costs and secures data for apps built on top of it, The Gibson's motivation for creating hackers.town, reaction to the project since it was announced, user experience, design considerations that went into Veilid, explaining Cult of the Dead Cow, how Veilid can protect against some of the more sinister use cases of personal data, addressing safety of the framework, where the name came from.
Summary Bill Britton (LinkedIn) joins Andrew (Twitter; LinkedIn) in a discussion about cybersecurity and cyber awareness. Bill is the Director of the California Cybersecurity Institute and CIO at Cal Poly. What You'll Learn Intelligence How to better protect your online information Why cybersecurity is more important now than ever How Cal Poly is addressing cybersecurity challenges The state of cyber in California and America Reflections Confronting our learned habits Lifelong learning *EXTENDED SHOW NOTES & FULL TRANSCRIPT HERE* Episode Notes This week on SpyCast, Andrew was joined in the studio by Bill Britton, Vice President of Information Technology, Chief Information Officer at Cal Poly, and the Director of the California Cybersecurity Institute. Bill joins us to discuss the work Cal Poly is doing to train, accelerate, and empower the next generation of cybersecurity professionals. And… In 2011, Oprah Winfrey declared San Luis Obispo “America's Happiest City,” and it's no wonder why – the quiet city is nestled within a beautiful landscape surrounded by historic architecture, interesting landmarks, and over 250 vineyards. Erin and Andrew are rethinking their East coast lifestyles… Quotes of the Week “We're trying to establish a way that people think differently about what cyber really is and does for them, and how it can be an expediter of their abilities to have a job and do great things for not just themselves, but the nation at large.” – Bill Britton *EXTENDED SHOW NOTES & FULL TRANSCRIPT HERE* Resources SURFACE SKIM *SpyCasts* Indian Intelligence & Cyber with Sameer Patil of ORF Mumbai (2023) Espionage and the Metaverse with Cathy Hackl (2023) Trafficking Data: The Digital Struggle with Aynne Kokas (2022) Sure, I Can Hack Your Organization with Eric Escobar, Part 1 (2022) Sure, I Can Hack Your Organization with Eric Escobar, Part 2 (2022) *Beginner Resources* CyberWire Word Notes, CyberWire (2023) [Audio glossary] What is Cybersecurity?, CISA (2021) [Short article] Cybersecurity in 7 minutes, Simplilearn (2020) [7 min video] *EXTENDED SHOW NOTES & FULL TRANSCRIPT HERE* DEEPER DIVE Books The Cyberweapons Arms Race, N. Perloth (Bloomsbury, 2021) Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, J. Menn (Public Affairs, 2019) The Art of Invisibility, K. Mitnick (Little, Brown, and Company, 2017) Ghost In The Wires: My Adventures as the World's Most Wanted Hacker, K. Mitnick & W. L. Simon (Little, Brown, and Company, 2011) Primary Sources Cybersecurity Case Library, Vol. 1, California Cybersecurity Institute (2021) NASA's Cybersecurity Readiness, NASA (2021) Computer Fraud and Abuse Act of 1986, US Congress (1986) *Wildcard Resource* Defend the Crown (2021) A computer game for all ages that teaches the basics of cybersecurity, through the defense of your virtual castle from cyber ninjas! *EXTENDED SHOW NOTES & FULL TRANSCRIPT HERE*
This week, we're going to chat one of the most well known hacking groups of all time. The "Cult of the Dead Cow". Discord Link: https://www.youtube.com/channel/UCth6hQBU-3AsS84zlk_A1Pw Podcast site: https://whattheshellpod.com Cult of the Dead Cow Book: https://www.amazon.com/Cult-Dead-Cow-Original-Supergroup-ebook/dp/B07J54F9KR/ref=sr_1_1?crid=1DF1O7WMS9YCG&keywords=cult+of+the+dead+cow&qid=1692040055&sprefix=cult+of+the+dead+cow%2Caps%2C121&sr=8-1
On This Week in Tech, Leo Laporte, Rob Pegararo, Christina Warren, and Iain Thomson talk about the Cult of the Dead Cow's big announcement at DEF CON 2023 of its encryption framework called Veilid. Full episode at http://twit.tv/twit940 Host: Leo Laporte Guests: Iain Thomson, Christina Warren, and Rob Pegoraro You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
On This Week in Tech, Leo Laporte, Rob Pegararo, Christina Warren, and Iain Thomson talk about the Cult of the Dead Cow's big announcement at DEF CON 2023 of its encryption framework called Veilid. Full episode at http://twit.tv/twit940 Host: Leo Laporte Guests: Iain Thomson, Christina Warren, and Rob Pegoraro You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
Katelyn Bowden and TC Johnson join Dennis Fisher to discuss the release of Veilid, a new protocol built by members of the Cult of the Dead Cow that is designed to bring true privacy and anonymity to users.
Midnight Blizzard, Citrix, Bloodhound, Five Eyes, Canon, Cult of the Dead Cow, AI Shopping, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/swn-315
On Tech News Weekly, Jason Howell speaks with Joseph Menn of The Washington Post about the hacktivist group, Cult of the Dead Cow (cDc), and its plan to develop a framework that looks to secure users' personal data when using social media or messaging services. For more, check out Tech News Weekly: https://twit.tv/tnw/297 Hosts: Jason Howell and Mikah Sargent Guest: Joseph Menn You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
Midnight Blizzard, Citrix, Bloodhound, Five Eyes, Canon, Cult of the Dead Cow, AI Shopping, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-315
On Tech News Weekly, Jason Howell speaks with Joseph Menn of The Washington Post about the hacktivist group, Cult of the Dead Cow (cDc), and its plan to develop a framework that looks to secure users' personal data when using social media or messaging services. For more, check out Tech News Weekly: https://twit.tv/tnw/297 Hosts: Jason Howell and Mikah Sargent Guest: Joseph Menn You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
Midnight Blizzard, Citrix, Bloodhound, Five Eyes, Canon, Cult of the Dead Cow, AI Shopping, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/swn-315
Midnight Blizzard, Citrix, Bloodhound, Five Eyes, Canon, Cult of the Dead Cow, AI Shopping, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-315
The Cult of the Dead Cow has developed new encryption technology that would allow messaging and social networking apps not to hold users' personal data. Joseph Menn of The Washington Post stops by the show to discuss this new technology. Did you know that 500+ cables are running across our ocean floor that can carry 400 terabits of data per second? Neither did we. Stephen Shankland of CNET joins the show to talk about these cables that run across our ocean floors. Jason Howell talks about how the IRS is allowing taxpayers to file every major tax form online thanks to President Biden's Inflation Reduction Act. Finally, Mikah Sargent shares how IBM and NASA have teamed up to "build the GPT of Earth sciences" to monitor deforestation, predict possible crop yields, and monitor greenhouse emissions. Hosts: Jason Howell and Mikah Sargent Guests: Joseph Menn and Stephen Shankland Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: AWS Insiders - TNW kolide.com/tnw bitwarden.com/twit
The Cult of the Dead Cow has developed new encryption technology that would allow messaging and social networking apps not to hold users' personal data. Joseph Menn of The Washington Post stops by the show to discuss this new technology. Did you know that 500+ cables are running across our ocean floor that can carry 400 terabits of data per second? Neither did we. Stephen Shankland of CNET joins the show to talk about these cables that run across our ocean floors. Jason Howell talks about how the IRS is allowing taxpayers to file every major tax form online thanks to President Biden's Inflation Reduction Act. Finally, Mikah Sargent shares how IBM and NASA have teamed up to "build the GPT of Earth sciences" to monitor deforestation, predict possible crop yields, and monitor greenhouse emissions. Hosts: Jason Howell and Mikah Sargent Guests: Joseph Menn and Stephen Shankland Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: AWS Insiders - TNW kolide.com/tnw bitwarden.com/twit
The Cult of the Dead Cow has developed new encryption technology that would allow messaging and social networking apps not to hold users' personal data. Joseph Menn of The Washington Post stops by the show to discuss this new technology. Did you know that 500+ cables are running across our ocean floor that can carry 400 terabits of data per second? Neither did we. Stephen Shankland of CNET joins the show to talk about these cables that run across our ocean floors. Jason Howell talks about how the IRS is allowing taxpayers to file every major tax form online thanks to President Biden's Inflation Reduction Act. Finally, Mikah Sargent shares how IBM and NASA have teamed up to "build the GPT of Earth sciences" to monitor deforestation, predict possible crop yields, and monitor greenhouse emissions. Hosts: Jason Howell and Mikah Sargent Guests: Joseph Menn and Stephen Shankland Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: AWS Insiders - TNW kolide.com/tnw bitwarden.com/twit
The Cult of the Dead Cow has developed new encryption technology that would allow messaging and social networking apps not to hold users' personal data. Joseph Menn of The Washington Post stops by the show to discuss this new technology. Did you know that 500+ cables are running across our ocean floor that can carry 400 terabits of data per second? Neither did we. Stephen Shankland of CNET joins the show to talk about these cables that run across our ocean floors. Jason Howell talks about how the IRS is allowing taxpayers to file every major tax form online thanks to President Biden's Inflation Reduction Act. Finally, Mikah Sargent shares how IBM and NASA have teamed up to "build the GPT of Earth sciences" to monitor deforestation, predict possible crop yields, and monitor greenhouse emissions. Hosts: Jason Howell and Mikah Sargent Guests: Joseph Menn and Stephen Shankland Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: AWS Insiders - TNW kolide.com/tnw bitwarden.com/twit
The Cult of the Dead Cow has developed new encryption technology that would allow messaging and social networking apps not to hold users' personal data. Joseph Menn of The Washington Post stops by the show to discuss this new technology. Did you know that 500+ cables are running across our ocean floor that can carry 400 terabits of data per second? Neither did we. Stephen Shankland of CNET joins the show to talk about these cables that run across our ocean floors. Jason Howell talks about how the IRS is allowing taxpayers to file every major tax form online thanks to President Biden's Inflation Reduction Act. Finally, Mikah Sargent shares how IBM and NASA have teamed up to "build the GPT of Earth sciences" to monitor deforestation, predict possible crop yields, and monitor greenhouse emissions. Hosts: Jason Howell and Mikah Sargent Guests: Joseph Menn and Stephen Shankland Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: AWS Insiders - TNW kolide.com/tnw bitwarden.com/twit
The Cult of the Dead Cow has developed new encryption technology that would allow messaging and social networking apps not to hold users' personal data. Joseph Menn of The Washington Post stops by the show to discuss this new technology. Did you know that 500+ cables are running across our ocean floor that can carry 400 terabits of data per second? Neither did we. Stephen Shankland of CNET joins the show to talk about these cables that run across our ocean floors. Jason Howell talks about how the IRS is allowing taxpayers to file every major tax form online thanks to President Biden's Inflation Reduction Act. Finally, Mikah Sargent shares how IBM and NASA have teamed up to "build the GPT of Earth sciences" to monitor deforestation, predict possible crop yields, and monitor greenhouse emissions. Hosts: Jason Howell and Mikah Sargent Guests: Joseph Menn and Stephen Shankland Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: AWS Insiders - TNW kolide.com/tnw bitwarden.com/twit
The Cult of the Dead Cow has developed new encryption technology that would allow messaging and social networking apps not to hold users' personal data. Joseph Menn of The Washington Post stops by the show to discuss this new technology. Did you know that 500+ cables are running across our ocean floor that can carry 400 terabits of data per second? Neither did we. Stephen Shankland of CNET joins the show to talk about these cables that run across our ocean floors. Jason Howell talks about how the IRS is allowing taxpayers to file every major tax form online thanks to President Biden's Inflation Reduction Act. Finally, Mikah Sargent shares how IBM and NASA have teamed up to "build the GPT of Earth sciences" to monitor deforestation, predict possible crop yields, and monitor greenhouse emissions. Hosts: Jason Howell and Mikah Sargent Guests: Joseph Menn and Stephen Shankland Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: AWS Insiders - TNW kolide.com/tnw bitwarden.com/twit
The Cult of the Dead Cow has developed new encryption technology that would allow messaging and social networking apps not to hold users' personal data. Joseph Menn of The Washington Post stops by the show to discuss this new technology. Did you know that 500+ cables are running across our ocean floor that can carry 400 terabits of data per second? Neither did we. Stephen Shankland of CNET joins the show to talk about these cables that run across our ocean floors. Jason Howell talks about how the IRS is allowing taxpayers to file every major tax form online thanks to President Biden's Inflation Reduction Act. Finally, Mikah Sargent shares how IBM and NASA have teamed up to "build the GPT of Earth sciences" to monitor deforestation, predict possible crop yields, and monitor greenhouse emissions. Hosts: Jason Howell and Mikah Sargent Guests: Joseph Menn and Stephen Shankland Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: AWS Insiders - TNW kolide.com/tnw bitwarden.com/twit
What is Cult of the Dead Cow? --- Support this podcast: https://podcasters.spotify.com/pod/show/wikipediaread/support
No guest this time! Jen and Alvaro catch up
This episode is jam packed! I sit down with Harvey Lewis, just days after his finish at Badwater 135. And his Badwater run across Death Valley was less than 2 weeks after his 375 miles that he ran at Dead Cow Gully backyard ultra in Australia. We also talk about his documentary that just game out: Like Harvey Like Son, where he attempted the fastest known time, FKT, to run the entirety of the Appalachian Trail. I also found out that he ran the Arrowhead 135, which is a race across the frozen landscape of International Falls, Minnesota where temps have dipped to -45°F during the race. Harvey has also ran in the last two runnings of the Barkley Marathons, which is an invite-only 100-ish mile orienteering race at Frozen Head State Park that has only been completed 21 times by 17 runners. Again, so much to get to and I hope you enjoy this episode. I feel like there is a lot more to uncover with Harvey and more stories to share, but we try to uncover more of his adventures and the worst weather he has had to endure. Harvey partners with RoadiD, Newton, Tailwind, 2XU, and All Day Running. Follow Harvey on social media by looking up Harvey Lewis Ultrarunner on Facebook, Instagram, and TikTok. You can find the documentary "Like Harvey, Like Son" on Amazon Prime Video. Also, if you are interested in checking out his travel running company, check out Run Quest Travel.
Alex is back in the country, Emmanuel and Kyle are on assignment, The_Gibson joins the panel to discuss the fediverse, Twitter restricts access to logged in users only, how the fediverse differs from Twitter, Threads might disrupt the fediverse, Google might scrape everything you post online to train it's AI, a preview of a privacy project by The_Gibson and Cult of the Dead Cow.
Alex is back in the country, Emmanuel and Kyle are on assignment, The_Gibson joins the panel to discuss the fediverse, Twitter restricts access to logged in users only, how the fediverse differs from Twitter, Threads might disrupt the fediverse, Google might scrape everything you post online to train it's AI, a preview of a privacy project by The_Gibson and Cult of the Dead Cow.
Join us as we chat the Gold Coast Suns' theme song, and other distracting irrelevances. Follow us on Twitter and Facebook: @WCEBFPod
- Dana Zook- Josh Bushong - Chad Webb- Nitrate Toxicity - Prussic Acid- OSU Soil, Water and Forage Analytical Laboratory - Extension Experience Podcast
Josh and Kurt talk about Lufthansa trying to ban Airtags. This has a similar feel to all the security events where a company tries to hand waive away a security problem then having to walk back all their previous statements. There is almost always a massive imbalance between the large companies and consumers. Show Notes Lufthansa bans airtags Airtag stalking problems Lufthansa unbans airtags Cult of the Dead Cow book TV Typewriter Andre the Giant on an airplane Poison Squad
Summary Eric Escobar (Twitter; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss compromising networks and information security. He has a coveted DEFCON Black Badge. What You'll Learn Intelligence What keeps Eric up at night Thinking like an ethical hacker (aka a “penetration tester) Protecting your information (i.e., “Hardening the attack surface”) Plain English explanations of key cyber concepts like “Kill Chains” and “Zero Days” Reflections Having a cool job The information revolution and life in the modern world And much, much more… Episode Notes Eric Escobar commits several thousand felonies on any given day, if he didn't have permission to do what he was doing. A Principal Security Consultant with SecureWorks, Eric has compromised pretty much everything out there: from healthcare and banking to technology and critical infrastructure, through to amusement parks and next generation military aircraft. “From my perspective, it's the coolest job in the entire world.” His team consecutively won first place in the Wireless CTF category at DEF CON 23, 24, and 25, snagging a Black Badge along the way. He has a BS and MS in Civil Engineering. And… The links between computing, hacking and the 60's counterculture are FASCINATING. Learn more by dipping your toes here and here, or dive deeper with What the Dormouse Said (2005) by John Markoff and From Counterculture to Cyberculture (2006) by Fred Turner. Quote of the Week "Watching any critical infrastructure get compromised is really the thing that keeps me up at night because lives are in the balance…and we do a lot of testing for critical infrastructure, and I've seen computers and machines that have been online and not been taken offline, longer than I've been alive…So really interesting to see those types of things because they interact with really big, expensive hardware…there's a catch 22 that happens where you can't really take the machine offline to do maintenance on it because it's critical infrastructure. So then how do you test it to make sure that a hacker can't take it offline, or maintenance can't be done on it? " – Eric Escobar. Resources *Andrew's Recommendation* Word Notes From beginner thru advanced, you'll find some helpful definitions of things like “Web 3.0,” “NFT's” and “Digital Transformation” on this Cyberwire audio glossary. *SpyCasts* Inside Microsoft's Threat Intelligence Center (MSTIC) – with John Lambert and Cristin Goodwin (2021) The Cyber Zeitgeist – with Dave Bittner (2021) Securing Cyberspace – with Charlie Mitchell (2016) *Beginner Resources* What is Hacking? The Economic Times (n.d.) [web] Ethical Hacking in 8 Minutes, Simplilearn (2020) [8 min video] Cybersecurity in 7 minutes, Simplilearn (2020) [7 min video] Books The Cyberweapons Arms Race, N. Perloth (Bloomsbury, 2021) Cult of the Dead Cow, J. Menn (PublicAffairs, 2020) Breaking & Entering, J. Smith (Mariner Books, 2019) The Art of Invisibility, K. Mitnick (L, B & C, 2017) Ghost in the Wires, K. Mitnick (Back Bay Books, 2012) Kingpin, K. Poulson (Crown, 2012) The Cuckoo's Egg, C. Stoll (Doubleday, 1989) Neuromancer, W. Gibson (Ace, 1984) Articles 2022 State of the Threat: A Year in Review, Secureworks (2022) The Anthropology of Hackers, The Atlantic (2010) Timeline Since 2006: Significant Cyber Incidents, CSIS (n.d.) Documentary DEFCON, The Documentary Network (2013) Resources Government Hacking Bibliography, S. Quinlan, New America Foundation (2016) *Wildcard Resource* “The Aurora Shard” Come to the International Spy Museum to see an ugly chunk of metal. Why? Well, it speaks to a revolution in the relationship between the material world and the non-material world. Broken down? 30 lines of code blew up a 27-ton generator. Zeros and ones can cause violent explosions!
Summary Eric Escobar (Twitter; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss compromising networks and information security. He has a coveted DEFCON Black Badge. What You'll Learn Intelligence What keeps Eric up at night Thinking like an ethical hacker (aka a “penetration tester) Protecting your information (i.e., “Hardening the attack surface”) Plain English explanations of key cyber concepts like “Kill Chains” and “Zero Days” Reflections Having a cool job The information revolution and life in the modern world And much, much more… Episode Notes Eric Escobar commits several thousand felonies on any given day, if he didn't have permission to do what he was doing. A Principal Security Consultant with SecureWorks, Eric has compromised pretty much everything out there: from healthcare and banking to technology and critical infrastructure, through to amusement parks and next generation military aircraft. “From my perspective, it's the coolest job in the entire world.” His team consecutively won first place in the Wireless CTF category at DEF CON 23, 24, and 25, snagging a Black Badge along the way. He has a BS and MS in Civil Engineering. And… The links between computing, hacking and the 60's counterculture are FASCINATING. Learn more by dipping your toes here and here, or dive deeper with What the Dormouse Said (2005) by John Markoff and From Counterculture to Cyberculture (2006) by Fred Turner. Quote of the Week "Watching any critical infrastructure get compromised is really the thing that keeps me up at night because lives are in the balance…and we do a lot of testing for critical infrastructure, and I've seen computers and machines that have been online and not been taken offline, longer than I've been alive…So really interesting to see those types of things because they interact with really big, expensive hardware…there's a catch 22 that happens where you can't really take the machine offline to do maintenance on it because it's critical infrastructure. So then how do you test it to make sure that a hacker can't take it offline, or maintenance can't be done on it? " – Eric Escobar. Resources *Andrew's Recommendation* Word Notes From beginner thru advanced, you'll find some helpful definitions of things like “Web 3.0,” “NFT's” and “Digital Transformation” on this Cyberwire audio glossary. *SpyCasts* Inside Microsoft's Threat Intelligence Center (MSTIC) – with John Lambert and Cristin Goodwin (2021) The Cyber Zeitgeist – with Dave Bittner (2021) Securing Cyberspace – with Charlie Mitchell (2016) *Beginner Resources* What is Hacking? The Economic Times (n.d.) [web] Ethical Hacking in 8 Minutes, Simplilearn (2020) [8 min video] Cybersecurity in 7 minutes, Simplilearn (2020) [7 min video] Books The Cyberweapons Arms Race, N. Perloth (Bloomsbury, 2021) Cult of the Dead Cow, J. Menn (PublicAffairs, 2020) Breaking & Entering, J. Smith (Mariner Books, 2019) The Art of Invisibility, K. Mitnick (L, B & C, 2017) Ghost in the Wires, K. Mitnick (Back Bay Books, 2012) Kingpin, K. Poulson (Crown, 2012) The Cuckoo's Egg, C. Stoll (Doubleday, 1989) Neuromancer, W. Gibson (Ace, 1984) Articles 2022 State of the Threat: A Year in Review, Secureworks (2022) The Anthropology of Hackers, The Atlantic (2010) Timeline Since 2006: Significant Cyber Incidents, CSIS (n.d.) Documentary DEFCON, The Documentary Network (2013) Resources Government Hacking Bibliography, S. Quinlan, New America Foundation (2016) *Wildcard Resource* “The Aurora Shard” Come to the International Spy Museum to see an ugly chunk of metal. Why? Well, it speaks to a revolution in the relationship between the material world and the non-material world. Broken down? 30 lines of code blew up a 27-ton generator. Zeros and ones can cause violent explosions!
Covering technology issues, and specifically cybersecurity as a journalist is a tough endeavor. Some of these technologies are complex as are the security vulnerabilities often inherent in their deployment and making these topics broadly accessible can be a challenge. Many of the underlying issues touch upon national security and civil liberties creating an interesting nexus that must be highlighted in the proper context. Lastly, it can be a challenge to create trusted relationships with the hacker community, but they provide essential perspectives and leads. Joseph Menn has established himself as one of the top journalists covering these issues for over two decades at organizations like the Financial Times, Los Angeles Times, Bloomberg, Reuters, and now at the Washington Post. He's spoken at conferences like Black Hat, Def Con, and RSA. He's written three books covering topics like Napster, cybercrime, and most recently the infamous hacker group cDC in his book "Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World". In the OODAcast, Joseph provides insights from his career as a journalist covering technology and cybersecurity. We explore how he first got involved with Def Con Black Hat and the value of attending the events. Joseph discusses how he first got introduced to the cDC and why he decided to write a book about the group and developed an overall positive outlook in the critical role hackers will play in saving the world. Official Bio: Joseph Menn joined The Washington Post in 2022 where he specializes in computer security, hacking, privacy and surveillance. He has perhaps the longest running track record among professional journalists covering cyber security and cyber conflict issues, having over two decades of experience on the topic. Prior to the Washington Post he covered cybersecurity and technology for Reuters, the Financial Times and the Los Angeles Times His books include "Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World" (2019) and "Fatal System Error: The Hunt for the New Crime Lords who are Bringing Down the Internet" (2010). External Links: Cult of the Dead Cow book Joseph Menn on Twitter Book Recommendation: The Dawn of Everything
In this episode, we talk about Lego expanding its online ambitions and its plans to triple the number of software engineers on staff. Then we'll speak with Joseph Menn, author of the book, Cult of the Dead Cow, and technology reporter at The Washington Post, about a piece he wrote titled, “Hacking Russia was off-limits. The Ukraine war made it a free-for-all.” Finally, we'll speak with Jen Caltrider, who leads Mozilla's Privacy Not Included guide, about their research which found that the vast majority of mental health and prayer apps are severely lacking in privacy protections. Show Notes DevDiscuss (sponsor) CodeNewbie (sponsor) Avalanche (sponsor) Lego to expand online ambitions by tripling total of software engineers Hacking Russia was off-limits. The Ukraine war made it a free-for-all. Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World *Privacy Not Included: Mental Health Apps