Episode

83: NSA Cryptologists
Description
In this episode we interview two NSA Cryptologists, Marcus J. Carey and Jeff Man. We hear their story of how they got into the NSA and what they did while there. To hear more stories from Jeff tune into Paul’s Security Weekly where Jeff is a regular co-host and shares a lot of stories and insights. Marcus has written several books on security. They are Tribe of Hackers, Tribe of Hackers Blue Team, Tribe of Hackers Red Team, Tribe of Hackers Security Leaders, Think in Code, and a childrens book called Three Little Hackers. Also check out the Tribe of Hackers podcast to hear interviews with all these amazing people! Sponsors Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25. Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer. View all active sponsors. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Chapters
The speaker tells a story about accidentally stumbling upon the employee entrance to the Pentagon during a trip and observing how employees entered and exited the building.
00:00 - 01:43 (01:43)
Summary
The speaker tells a story about accidentally stumbling upon the employee entrance to the Pentagon during a trip and observing how employees entered and exited the building.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
The speaker interviews a Texan man who grew up in a small town with horses and describes his surprise when he saw how Black people were dressing in LA, like the Black Panther Party.
01:48 - 06:26 (04:38)
Summary
The speaker interviews a Texan man who grew up in a small town with horses and describes his surprise when he saw how Black people were dressing in LA, like the Black Panther Party.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
The speaker shares their experience of learning about cryptographic protocols and communication as part of their US Navy operations, which is classified information, but crucial for military communication.
06:26 - 12:59 (06:33)
Summary
The speaker shares their experience of learning about cryptographic protocols and communication as part of their US Navy operations, which is classified information, but crucial for military communication.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
The speaker talks about his experience working with heavy Cisco stuff while in the Navy and compares his work to being a Jason Bourne of IT or technology.
12:59 - 17:12 (04:13)
Summary
The speaker talks about his experience working with heavy Cisco stuff while in the Navy and compares his work to being a Jason Bourne of IT or technology.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
The NSA's mission is focused on protecting U.S. assets and interests through various levels of secure networks.
17:12 - 23:17 (06:04)
Summary
The NSA's mission is focused on protecting U.S. assets and interests through various levels of secure networks. However, concerns arise as to why they do not disclose exploits found in Microsoft and Google products to help these companies stay secure.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
The speaker built a cyber range with a complete mock-up of a corporate network where federal agents were able to learn various forensic techniques ranging from log analysis to working with the best software backed by the NSA education.
23:17 - 27:13 (03:55)
Summary
The speaker built a cyber range with a complete mock-up of a corporate network where federal agents were able to learn various forensic techniques ranging from log analysis to working with the best software backed by the NSA education.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
A security expert describes a training exercise where they conducted network security testing on a complete corporate network, including live Chinese malware.
27:13 - 34:34 (07:21)
Summary
A security expert describes a training exercise where they conducted network security testing on a complete corporate network, including live Chinese malware. It was like playing a CTF against professional network security personnel.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
This podcast episode features an interview with a cybersecurity prodigy who started out as a teenage video game developer, and discusses his unique journey to becoming a successful and knowledgeable professional in the field.
34:34 - 39:54 (05:20)
Summary
This podcast episode features an interview with a cybersecurity prodigy who started out as a teenage video game developer, and discusses his unique journey to becoming a successful and knowledgeable professional in the field.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
In the past, lifestyle questions were asked during job interviews to ensure that a potential employee would not compromise national security or be subject to blackmail.
39:54 - 47:00 (07:06)
Summary
In the past, lifestyle questions were asked during job interviews to ensure that a potential employee would not compromise national security or be subject to blackmail. These questions asked about financial records, alternative lifestyles, and personal contacts.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
The NSA's first attempt at software-based cryptography involved a computer program that would do encryption and decryption, along with a half paper pad and half key on a floppy disk.
47:00 - 56:53 (09:52)
Summary
The NSA's first attempt at software-based cryptography involved a computer program that would do encryption and decryption, along with a half paper pad and half key on a floppy disk. This was a significant advancement towards the development of software-based cryptography.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
This episode features a discussion on how a small group of individuals learned the intricacies of hacking and internet security by breaking into networks and exploring the nuances of operating systems.
56:53 - 1:04:23 (07:30)
Summary
This episode features a discussion on how a small group of individuals learned the intricacies of hacking and internet security by breaking into networks and exploring the nuances of operating systems.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
The NSA was involved in developing cybersecurity standards with NIST, but actually carried out the methodology required themselves instead of NIST due to unique restrictions.
1:04:23 - 1:12:44 (08:21)
Summary
The NSA was involved in developing cybersecurity standards with NIST, but actually carried out the methodology required themselves instead of NIST due to unique restrictions.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
A former NSA Hacker recalls how he and his team successfully hacked into the US government using open-source reconnaissance.
1:12:44 - 1:24:43 (11:58)
Summary
A former NSA Hacker recalls how he and his team successfully hacked into the US government using open-source reconnaissance. This highlights the need for cybersecurity measures to protect against similar attacks in the future.
Episode83: NSA Cryptologists
PodcastDarknet Diaries
The host recommends Marcus Carey's book, Tribe of Hackers, and Jeff Man's podcast, Paul's Security Weekly, for more interesting stories on security.
1:24:43 - 1:25:43 (00:59)
Summary
The host recommends Marcus Carey's book, Tribe of Hackers, and Jeff Man's podcast, Paul's Security Weekly, for more interesting stories on security. Additionally, the host encourages listeners to support the podcast through Patreon.