Firewalls Don't Stop Dragons Podcast

Investigating Data Leaks


Listen Later

Data breaches are usually produced by hackers looking for financial gain. Data leaks, on the other hand, are usually published by whistleblowers or perhaps accidentally disclosed via negligence. Journalists today are inundated by such data leaks – to the point where specialized tools and techniques are required to parse through the piles of digital detritus to ascertain the value and import that they may represent. Micah Lee has been performing this function for The Intercept for many years, including analyzing the Snowden documents. And he has just released a book that outlines the tools, techniques and procedures he uses for this arduous process. Today we discuss the importance and impact of whistleblowers, the state of data leaks today, and how it has impacted modern journalism.

Interview Notes
  • Micah’s book: https://hacksandleaks.com/ 
  • Excerpt article: https://theintercept.com/2023/12/16/hacked-datasets-verification/ 
  • Micah’s GIthub project: https://github.com/micahflee/hacks-leaks-and-revelations 
  • COINTELPRO documentary: https://en.wikipedia.org/wiki/1971_(2014_film) 
  • “The Burglary” book: https://www.amazon.com/Burglary-Discovery-Edgar-Hoovers-Secret/dp/0307962954 
  • EFF’s Surveillance Self-Defense Guide: https://ssd.eff.org/ 
  • Further Info
    • Take the annual listener survey! https://fdsd.me/survey2024 
    • Vote for my show as the best privacy podcast! http://tinyurl.com/PPPCAwards2024  
    • Send me your questions! https://fdsd.me/qna 
    • Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book 
    • Subscribe to the newsletter: https://fdsd.me/newsletter 
    • Become a patron! https://www.patreon.com/FirewallsDontStopDragons 
    • Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch 
    • Give the gift of privacy and security: https://fdsd.me/coupons 
    • Support our mission! https://fdsd.me/support 
    • Generate secure passphrases! https://d20key.com/#/ 
    • Table of Contents

      Use these timestamps to jump to a particular section of the show.

      • 0:01:29: Pre-show notes
      • 0:03:32: Interview prep
      • 0:05:57: Tell us more about the book and why you wrote it.
      • 0:08:11: What’s the difference between a data breach and a data leak?
      • 0:10:02: What are some of history’s most importank leaks?
      • 0:16:14: How do journalists typically obtain leaked data?
      • 0:22:04: You’ve just obtained a massive blob of data. How do you analyze it?
      • 0:27:05: How do you handle leaked data ethnically?
      • 0:30:14: Do you warn the owners of leaked data before you reveal it?
      • 0:32:23: I want to blow the whistle? What should I do? What shoudn’t I do?
      • 0:36:28: I’ve extracted my data. How do I securely share it with a journalist?
      • 0:38:57: What are the legal ramifications of whistleblowing?
      • 0:41:57: How hard is it to analyze digital data? What tools do you use?
      • 0:44:39: Are there dangers to analyzing leaked data?
      • 0:46:43: How do organizations try to identify data leakers?
      • 0:49:42: Will AI tools like ChatGPT help to analyze data leaks?
      • 0:52:19: What can the average person take away from all of this?
      • 0:54:15: How do you know which news sources you can trust today?
      • 0:56:08: Interview wrap-up
      • 0:57:10: Micah blocked on Twitter?
      • 0:57:55: Text parsing tools
      • 0:58:30: Show links
      • 0:58:53: Bonus podcast preview
      • 0:59:42: Annual listener survey raffle info
      • ...more
        View all episodesView all episodes
        Download on the App Store

        Firewalls Don't Stop Dragons PodcastBy Carey Parker

        • 4.9
        • 4.9
        • 4.9
        • 4.9
        • 4.9

        4.9

        64 ratings


        More shows like Firewalls Don't Stop Dragons Podcast

        View all
        Hacked by Hacked

        Hacked

        190 Listeners

        Security Now (Audio) by TWiT

        Security Now (Audio)

        2,010 Listeners

        Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

        Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

        373 Listeners

        Risky Business by Patrick Gray

        Risky Business

        373 Listeners

        SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

        SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

        653 Listeners

        CyberWire Daily by N2K Networks

        CyberWire Daily

        1,021 Listeners

        Smashing Security by Graham Cluley

        Smashing Security

        318 Listeners

        Click Here by Recorded Future News

        Click Here

        418 Listeners

        Darknet Diaries by Jack Rhysider

        Darknet Diaries

        8,035 Listeners

        Hacking Humans by N2K Networks

        Hacking Humans

        315 Listeners

        Techlore Surveillance Report by Techlore

        Techlore Surveillance Report

        105 Listeners

        Cyber Security Headlines by CISO Series

        Cyber Security Headlines

        139 Listeners

        Risky Bulletin by risky.biz

        Risky Bulletin

        44 Listeners

        Hacker And The Fed by Chris Tarbell & Hector Monsegur

        Hacker And The Fed

        169 Listeners

        The AI Fix by Graham Cluley and Mark Stockley

        The AI Fix

        34 Listeners