Learn how to analyze hacked and leaked datasets with Micah Lee, director of information security for The Intercept. Discover the process of uncovering hidden stories within massive datasets, the significance of Discord as a communication platform, and advice for becoming a source and managing risk. Also, explore the hack on Epic and the difficulties in defending against hackers. Check out Micah Lee's new book, 'Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data', for more insights.
Analyzing hacked and leaked data requires data analysis skills to uncover real-world insights.
Different types of data sets present various challenges, but with the right tools, patterns and insights can be discovered.
Discord has been used by various groups for leaks and information sharing, highlighting the risks of sharing sensitive information on such platforms.
Deep dives
Factor: Ready-to-eat Meal Delivery for New Year Resolutions
Factor is a meal delivery service that offers a variety of chef-crafted and dietitian-approved meals. They deliver over 35 meals per week, including options like keto, calorie smart, vegan, and more. With Factor, you can skip the stress of meal planning and cooking and have nutritious and flavorful meals conveniently delivered to your door.
Analyzing Hacked and Leaked Data with Mike Ali
Mike Ali, the author of 'Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data', discusses the importance of analyzing the vast amounts of hacked and leaked data that circulate on the internet every day. He highlights how there is a need for more individuals with skills in data analysis to make sense of the flood of information and uncover insights that can have real-world impact.
The Challenges and Rewards of Analyzing Data Sets
Analyzing data sets can be a complex and time-consuming task. Mike Ali explains how different types of data sets, such as XML, proprietary formats, and structured data, each come with their own challenges. However, with the right tools and techniques, including using libraries, search tools, and data visualization software, meaningful patterns and insights can be discovered. Mike also emphasizes the importance of verifying and authenticating data sets to ensure accuracy and reliability.
The Role of Discord in Communication and Leaks
Discord has become a popular platform for communication and collaboration, but it has also played a role in leaks and information sharing. Mike Ali discusses how Discord has been used by various groups, including neo-Nazis and those organizing events like the Unite the Right rally in Charlottesville. He highlights the importance of recognizing the illusion of privacy on such platforms and the potential risks involved in sharing sensitive information.
Advice for Potential Sources and Managing Risk
For those considering becoming a source for journalists, Mike Ali provides advice on managing risk and assessing potential consequences. He recommends separating personal and work devices, being cautious about metadata and digital footprints, and understanding the investigative process that follows a leak. By taking precautions and understanding the potential risks involved, individuals can make informed decisions about sharing information.
We live in a golden age of data. Every day, hacktivists release terabytes of data on sites like DDoSecrets, but sorting through it all requires some technical knowledge. What if you don’t know XML from SQL let alone how to write a simple Python script?
Micah Lee is the director of information security for The Intercept and he’s on Cyber today to talk about his new book: Hacks, Leaks, and Revelations. The book is a manual for people who want to learn how to parse and organize hacked datasets. It also contains stories of how Lee and others handled famous cases such as Blueleaks, neo-Nazi Discord chat rooms, and the Parler leak. If you’re not interested in diving into corporate or government secrets, you might learn something about how to protect your own data.