CYBER cover image

Darknet Diaries Presents: The Pentagon's Online War Against ISIS

CYBER

00:00

How to Protect Your Email Access

We had multiple access vectors into the whole system. It's not a matter of if, it's just went like i was amazed working there hat any challenge that would come the folks at enese or any of the developers, it was just a matter of time before they figured it out. They assembled all the people into teams and were getting them ready. We had an extensive amount of rehearsals before anything was actually executed on the real target. Everyone's got their practice on right is there the one operation everyone was working on in folcuston. Yet when you went to bed at night, this team,. it was o g sy ppk! In case you're wondering what

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app