Guest User

Chet Uber/Tom Ryan transcript of 9-28-12

a guest
Feb 6th, 2013
653
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 30.11 KB | None | 0 0
  1. Uber-Ryan 9-28-12 call :
  2.  
  3. (Unidentified voice): Go for it.
  4.  
  5. (same unidentified voice): Can you hear this?
  6.  
  7. Uber: ChetUber speaking.
  8.  
  9. Ryan: Hey Chet, Tom. How are you?
  10.  
  11. Uber: good.
  12.  
  13. Ryan: You got my email that I was going to call?
  14.  
  15. Uber: Ummm.. Tom Ryan?
  16.  
  17. Ryan: Yes.
  18.  
  19. Uber: Okay. Sorry. Yeah I did. Um, when it comes to am or pm, I'm a 24 hour kind of guy. So, yes I did. But I had marked it down for this morning. But I'm wide awake, so go head.
  20.  
  21. Ryan: I had called this morning, but there was no answer.
  22.  
  23. Uber: um, I didn't go to bed until 4 in the morning. I found a cache of hundreds of files that Neal had left with somebody who he had thought was his friend, but was not. And a phone call out of the blue from me, I just happened to say, “Is it possible that Neal left some files with you?” Because I'm trying to run down all the people that Neal basically did wrong by.
  24.  
  25. Ryan: uh huh.
  26.  
  27. Uber: that might have those kinds of things , and I found some, you know, a lot of it was just news articles. I'm still not finding what I'm looking for, but, …
  28.  
  29. (unintelligible cross chatter between two)
  30.  
  31. Uber: we call it the set of que, or just que... it's just, Neal has this political agenda, that I knew about starting in 2009. And, I'm a registered democrat, okay? But I'm a moderate. I'm a dead-centrist. I'm pro government, meaning, I don't believe in anarchy. I'm pro military, and I believe that we need a strong intelligence community, and I believe all of it believes, to have underneath it, to have an open-sourced based set of computer assets, that are not proprietary, that can be monitored and worked on so that the people who support that can actually tell what the hell is going on.
  32.  
  33. Ryan: mmmhmm.
  34.  
  35. Uber: and um, just to tell you about where I come from. So Neal and I agree on a lot of things, like we both like PSP or PSB (?). I'm not quite a big Linux fan, but I've done a bunch of lamp/linux/psp work in my life. But I'm pretty anti-Microsoft, only because I spent two years of my career doing unknown kernel calls, but you know, at least with open source stuff you can find it.
  36.  
  37. So when Neal was working with us, we were trying to develop a set of tools that existed in the Microsoft world, and that's why everybody was working with him. __- source world, and the open-sourced world.
  38.  
  39. But, we completely disagreed on politics. Neal's a very, very far left minded person. He believes that all government, by nature, is corrupt, and that the government is broken, and unrepairable, and um, he thinks that the fault (?) is going to overthrow the far left. And so, in his head, he was, at the time, thinking and doing things that would shift things to the far left.
  40.  
  41. And I told him that in Project Vigilant, we don't do politics. It's just out of our realms. You know, our attack atribution doesn't have a political party. We were thinking that somewhere, in this set of queue, this set of documents, that Neal might have written that was per-se a manifesto, or an end-game.
  42.  
  43. Because for the life of me, if what he did was all that he was professing now on his blog, a big social experiment, a big ____ , that he created in Twitter...which honestly, is a technique in semiotics. Um, it's a combination of psyops and deception, then you'd think he would have wrote it down somewhere. It's far too complicated to just think of off the top of your head.
  44.  
  45. Or, if he wasnt actually doing an experiment, and he was trying to actually do it, the plans for how he would do it, would be ___ somewhere. Like, who was the list of politicans that he was pro, and who was the list of politicians he was against.
  46.  
  47. Ryan: I saw them doing that on ____... Him and his little crony crew got together and put together a job list of politicians. I caught that live and in action.
  48.  
  49. Uber: I saw that too. But he didn't take a picture of it, dont have a recording of it. And so, I can't , I can't... as much as I believe it, it's hearsay evidence. You have to understand, I'm a court-certified forensics examiner. And, digital evidence by nature, all digital evidence by nature, is latent.
  50.  
  51. Ryan: I have screen captures of it.
  52.  
  53. Uber: That's my interpretation. So if you don't capture it in screencaps, and they can be authenitcated as real, now that's stuff, I would think, that the people who we contacted...and I'm trying to stay … not naming, so I don't get accused of... One of the things I got in trouble for before by um, by writers (?), is that we claimed to have ties to specific LEAs. We don't.
  54.  
  55. To be honest, over the time 'weve been around, we've handed over evidence of crimes with a cyber component, to just about all of them.
  56.  
  57. Ryan: uh huh.
  58.  
  59. Uber: we generally, that's not what we do. What we're doing, we're collecting open-source intellgience, and running it against known tools. That are also being developed, that we've helped develop...I always say it wrong, but Ghostwrap (?), Ghostwap, I don't know how to say it, for penetration testing, you know.
  60.  
  61. You've got a set of open-source methods that can be group viewed, and has transparency. We're trying to create the same kind of thing for attack attribution. So that, anybody that was working in the field of attack attribution, it really doesn't exist IDTF or ISO, of attack attribution.
  62. The languages are different. I can't talk to two people that work in attack attribution, and use the same words.
  63.  
  64. And so, our groups main focus, as much as people think that it's to collect intelligence, the only reason we collect intelligence is to test our hypotheses. Or write an application and run it against the application. And we look at, we actually do a lot of work in set theory.
  65.  
  66. Looking at finite sets, and dynamic sets, and the stability of things...like the stability of a political system.
  67.  
  68. But, we never really looked at domestic politics, we look at foreign politics. Because, to me, at least in the time i've been either the director or been in charge of the intelligence program, instability in the American political system is just a plain given. It swings back and forth, and only once, do I know of in modern times, and that was Tom DeLay, on the far right, tried to convert the house so it would be Republican. And he went to prison for it.
  69.  
  70. Um, but Neal, on the other hand, he was originally trying to change the political system of the United States, and I know he was. I'd heard him talking about, and I'd watch him make these lists, and this thing he called the Set of Queue, this set of documents that'd list the name, and if he had that, then he could give it to these people, these watchdog agencies, both in law enforcement and in non-law enforcement, people who oversee the political system. And he could say, “Look, keep an eye on these politicians,” somebody who is totally anti-government put them all on this list.
  71.  
  72. That was our thinking, was, man, this list has got to exist somewhere. We've scoured, and like I told you, we had, in the ...we 'd broken into nine regions in the country. In Omaha, Nebraska, we have a data center. __ we have a data center. We had one in the mid-central states that was in Champaign-Urbana, that was the one Neal ran.
  73.  
  74. Everything in that data center was lost, when Neal ran it, except for Neal's twitter shit. Which, as I told you, we happened to be working on a persona management system if you search my name and HBGary, you'll find the letter between myself and HBGary. It was basically just me wanting to talk to... Aaron Barr about the fact that they wouldn't have lost that bid if they had bothered to come to us.
  75.  
  76. Because, and it ended up we didn't have it, because Neal lost it, we actually had the code for a pretty decent persona management system up and running.
  77.  
  78. Ryan: is that what he uses now, that Lulztweeter 9000 stuff?
  79.  
  80. Uber: well, he wasn't made privilege to...um, the side that the high-end scientists wrote, that I worked on. That was the part, I think I gave you kind of a glimpse of it, you could carefully construct a sentence that can be repeated and even the high-end statistician can't tell that the same thing was said over and over and over again by a suite of people.
  81.  
  82. Um, Neal lacked any mathematical skills in spoketastics (?) And has no linguqistic skills. He doesn't understand natural language processing or anything like that.
  83. What Neal understood was Twitter. I don't know if you ever saw it, but he wrote a paper that I've read, I don't have a copy of it...called “Reputation Economics”, and it's a theory of how many tweets it takes to destroy the reputation of somebody using the Twitter system.
  84.  
  85. And that was Neal's big thing. That his Twitter suite could manage a whole bunch of people in Twitter, and they could take a person on the list, and a hot button issue, find some real examples in the press, and then that tool would allow them to use Twitter to say that to the right groups of people, and manipulate lots of people with a few people.
  86.  
  87. The problem is, his Twitter suite lacks the nuances , so if I actually had all the tweets, I could run a statistical program and say, “This was all done with a Twitter tool, this is all artificially created with a computer”.
  88.  
  89. He was never, ever given...when we build something like that we compartmentalize it, so that some of the people working on it didn't know what they were building had to do with Twitter at all. They were building parsers, or they were building the sentence deconstruction softwarre.
  90.  
  91. Neal's job was to build the front-end so that the Twitter API could be easily exposed to mathematical algorithms running out of Mathematica. And, I've never seen his Twitter stuff that he made public, work.
  92.  
  93. I know he published it recently and said This is what I did, there's nothing special here, anybody in the world can have it.
  94.  
  95. Well the stuff we did, it was dot specified. Meaning that when we wrote it, we said the only person who should ever own this is the government, and then it should have a backdoor, and the backdoor should go to the Senate and House congressional oversight committee. And it's intention was for use by um, law enforcement and the military to basically move radical hate groups and things like that as they came out of the prison systems...into websites that were heavily monitored, and so that, without violating any phishing laws, or doing entrapment, you could have a system where, Twitter is something everyone uses. They would Tweet, that's how they talk, and he knew that you could be ready, and you could, say, move everybody that hates black people, or everybody that hates white people, or everybody that hated Puerto Ricans to a website that also hated Puerto Ricans.
  96.  
  97. But instead of it being a true site against Puerto Ricans, it'd be a site that's sitting on a network that has Cisco netflow running and (?) running and passive mode, so that everything that happened was seen. instead of what happens now... people who do that on boxes that are propped up and hidden on the internet that are not monitored.
  98.  
  99. In attack attribution, you can only deal with things that are seen. In other words, the only way to tell if an attack happens, is if you can observe the things that went into the attack. So if you can't see the port scans, you won't know that someone was getting ready to pentest you. If you don't see the stuff when you go inflow, or running on specific ports with known PVP vulnerabilities, you won't know.
  100.  
  101. So, if they're practicing, on darknets and on boxes that are hidden on the internet, then law enforcement can monitor those.
  102.  
  103. But if it were built and put out there, by an non-governmental organization, and with the idea that, whatever the ideology was, and we we're going to make a box for everybody...We had bought domain names that specifically that were designed to appeal to all the different groups that were in the Southern Poverty Law Center's “map?”, and the FBI's counter domestic terror list and the idea was, that would all be something that would be turned over to the government. They'd have this ready-made suite of open-source tools so that, the, electronic freedom foundations and all the other people who thought the government was trying to spy on Americans, could say, look at it, and go no, that's not what's happening. This is what's happening, because this is what's in the code.
  104.  
  105. And the problem is, that kind of tool exists, in the Microsoft world. They exist on Microsoft web servers. And Akami cookies, for example. Their suites of tools that have been made by really big companies, for um... on websites, they're all closed-source.
  106.  
  107. Because of Neal's love of PSV (?) and everything, and his political stuff, we had thought we had knew his endgame, which we called the Set of Queue.
  108.  
  109. We had no idea what he called it, if he has a manifesto or anything. You understand, it's just too complex to keep in the back of your head. I mean, just the list of politicians. Good god, there's two senators from every state, plus the population division of people in the house, and that's just federal politics. Much less state and local government.
  110.  
  111. So Neal had to have written all this done somewhere. You were just telling me, you confirmed, something that I had seen myself.
  112.  
  113. And that was, make a list of the people who had to go, basically. Who had to be defeated in the next election. Kay. Well thats politics, and up to a point, it's legal. But when you start to apply technology to the manipulation of the political system, I don't think it's legal.
  114.  
  115. Now, I've had a long talk with Mark Rasch, about that, and Mark's a civil libertarian. And Mark's like, “what's illegal about it Chet?”
  116.  
  117. And I'm like, “Well, the people believe they're in a fair system. And so, right there, the system's not fair. Isn't that against the law?”
  118.  
  119. And he says, “Well it should be against the law, but it's not.”
  120.  
  121. And that was one of the things that drove our science team to go 'oh shit, we better figure out a way to detect what Neal had already started working on.”
  122.  
  123. I'm not gonna lie to you, the Twitter thing was Neal's idea. Not the whole thing, but the use of Twitter to do this, is something that Neal theorized, and it's why he quit Project Vigilant. We refused to get involved in politics more than we were.
  124.  
  125. And so the level that we were, was, knowing, how to understand political stability. But it was focused, again, on foreign countries. So, was... was the economy bad enough, were they going to run out of oil? And was their deficit high enough that Yemen was going to get overthrown and would cause a place where, it was highly unstable and it needed money, and so there would be a lot of hackers there, so we were trying to spot countries around the globe where attacks might start coming from.
  126.  
  127. Because that would be a place where hackers would congregate, because there wasn't any money to be had because there were no jobs. This was exactly what you saw during the Egyptian Spring. You had, Egypt and all these countries, that had a mass of people that were average age 23 that had college education but no jobs. And they couldn't feed their families, so there was large instability.
  128.  
  129. In those countries, they took to the streets, rioted and overthrew it.
  130. Well my problem came in that Neal has ties to the Occupy movement, and to me the Occupy movement, while it's a guaranteed thing of the first amendment, freedom of speech and right to gather, I think the Occupy movement has far bigger ...I've got stuff that I just found in Neal's files, that talk about specific things like how to resist the police.
  131.  
  132. Specific ways to hold your hands so that it's hard to cuff you, and ways to lie down so that it takes more police people to drag you off. I'm not sure, while its legal and free speech, to me that indicates that someone is preparing to do something like that.
  133.  
  134. I dont know what your thoughts are. I'm doing a lot of talking and you're not.
  135.  
  136. Ryan: I'm listening, because it's also in line with a lot of things we've found. I missed some questions, I'm still trying to grasp everything you've said.. Like um, for instance, why ___
  137.  
  138.  
  139. Uber: You gotta understand, I'm a setup after seven (?) I'm trusting you Thomas. I've read what you read, I agree with the group you formed. I cannot for the life of me, pronounce your, and I don't know if you're still partners (tries to sound out Greek sounding name?) The other guy, your head pentest guy... you guys... i'm not spelling it right, or he's not involved?
  140.  
  141. Ryan: He's not involved.
  142.  
  143. Uber: But he was, at some time?
  144.  
  145. Ryan: No.
  146.  
  147. Uber: But I had read stuff that you were doing stuff with an open source penetration testing group, is that correct?
  148.  
  149. Ryan: I've always been involved with ____ (name of group) I've been involved with them since 2004.
  150.  
  151. Uber: so because, I believe in open source, I had liked what you were doing. I had done a lot of pen testing, but I learned from guys that were ex-military, hardcore like Red ___ ? And pen testing, and definitely not vulnerability assessment shit.
  152.  
  153.  
  154. I'm talking about high-end, highly-trained people who know how to build, what's called officially by the Navy, a stable of attacks, where you analyze, first of all what systems my enemy has, what are the known vulnerabilities, and then take the top 10 most likely things to go after, and then looking at the vulnerabilities would probably exist, and that would even tell you what kindof scans to do, so you don't get caught doing the reconnoisance before you do the attack.
  155.  
  156. So anyway, I'm very familiar with all that kind of stuff. And unfortunately, I taught some of it to Neal.
  157.  
  158. Um... but, again, then I read some of the stuff you had posted, and I was like, you know, between the fact he's in Infragard, and I like what he's doing, in my gut, I can trust this guy.
  159.  
  160. Remember, we're in a business where the motto is “Trust no one”. So... we're at best, trust but verify.
  161.  
  162. So the stuff I'm telling you, I'm placing a lot of trust in you. And the reason I'm doing it is, I don't think you want to see what Neal was planning, happen.
  163.  
  164. I certainly don't want to see what Neal was planning on happening. But again, we're not totally sure what it was that Neal was planning. We don't know enough specifics to point the right people in the right direction.
  165.  
  166. Ryan: There's been a lot of questions I have, like him picking specific targets as far as people. I understand the whole Aaron Barr thing and the irony of it is, Aaron Barr is a leftist also. What the other stuff, he targets... well we know why he targeted me, because I dumped all the Occupy emails. Because in reality, I wanted to give Occupy the one thing … they sit there and protest for Bradley Manning, so I gave them a taste of their own thing.
  167.  
  168. And then, that was the purpose of it. The other scenario is, i've seen he has this unhealthy obsession with this person who goes by Zapem. I've been trying to figure that out.
  169.  
  170. Uber: Yeah...the thing is, we think Zapem might be government or law enforcement. Or married to govt or law enforcement. There's this characteristic to things that Zapem says that have mil speak in it, and LEO speak in it. At least, in you know, and you gotta remember a lot of our team is ex-military or ex-government.
  171.  
  172. We've never been sure about it. But like, I'd be glad to send you, if you dont already have it. We had a person who had, and remember, we're all volunteers so people don't get ordered to do things. We have discussions and then people think of ideas and then it's up to them, within the law, that's what our lawyers are for, to do things.
  173.  
  174. It's illegal to wiretap. It's illegal to read other people's emails. It's illegal to break into computers.
  175.  
  176. Our people know, you can't do any of that kind of stuff, and we never have. But outside of that, if you want to fake that youre a leftist andjoin the leftist group, we had someone do that with Occupy, and I have a list of everybody in the email group in the Occupy. Our guy got given it, and even got an invitation and went to the Occupy Omaha group.
  177.  
  178. And everybody had cameras, and they're so stupid that they wanted publicitiy. So everyone was taking pictures of everyone else that was there, posted them, to show the Occupy movement. Well, they didnt know our guy had a high-res video camera and not a still camera, well we sent all of that to Dept of Homeland Security.
  179.  
  180. And they were talking about taking a car and lighting it on fire at a TV station at the height of the Occupy movement.
  181.  
  182. To us, that's about as bad as it gets.
  183.  
  184. It's a thing that's called “flashpoint”, and we believe that Neal understood flashpoints that he was going to create, or take advantage of, all these flashpoints when the cameras were rolling, and he was going to destabilize the United States government. That's what we thought he was going to do, that's what he think his endgame was.
  185.  
  186. We just can't fucking prove it.
  187. Ryan : says something unintelligible
  188.  
  189. Uber: all of a sudden you're kind of dropping off.
  190.  
  191. Ryan: I moved, alright sorry. I'm just trying to figure out his whole endgame, why he targets certain people, why he befriends certain people. Like this whole thing ...i'll give you three examples of people who annoy me that he's apparently befriended. So, ironically it looks like he's, you know, I think I brought it up last time, but I don't remember.
  192.  
  193. About him and Mandy, Liberty Chick from Breitbart.. They're ….
  194.  
  195. Uber: Hold on a second, honestly I want to get a place I can take some notes. Honestly, if you don't mind, because this is new... soo... because the thing is, we have filters that filter open source IRC chat rooms … you call her the Libert Chick?
  196.  
  197.  
  198. Ryan: Right. Liberty Chick from Breitbart, Mandy Nagy.
  199.  
  200. Uber: (repeats name for spelling and confirms Breitbart association.) The guy who died from a heart attack? See, and here's the thing. Neal is telling me that because of what he did, that we're going to get, he basically 90 days ago sent me an email that said “i really didn't mean to do it, but in defending myself against all these people who are attacking me”, and this is the part... we don't believe that, we believe he did it himself. “They're gonna come all blame Project Vigilant, and you're gonna have this right-wing fueled hate thing, because of the death of Andrew Breitbart.”
  201.  
  202. Well, until, honestly, and this may show the fact I concentrate on the east, and the far east, and the radical and fundamental islam, and things like that, and Russia, and Russian organized crime mobs, and the far east organized gangs, than I do american politics.
  203.  
  204. I didn't even know who Andrew Breitbart was. I didn't know anything until after the guy had already passed away.
  205.  
  206. But I just got a thing, on why Andrew Breitbart hates Neal Rauhauser.
  207.  
  208. Ryan: I've got a whole file.
  209.  
  210. Uber: Yeah!
  211.  
  212. Ryan: It's weird because Neal has like a weird relationship with here, where the two of them never really badmouth each other. It's only those two in that whole Breitbart group. That's why I asked if you'd ever heard him bring her up.
  213.  
  214. And then the other one, Ron Brynaert. Brynaert, he seems to like to run interference.
  215.  
  216. Uber: Now see, I'll tell you about Ron. Ron, today, I dont know what his deal is, but he used to work for a credible magazine. Ron has the world's worst temper. I don't know if you've ever had the displeasure of talking to the man on the telephone, but I have.
  217.  
  218. And, he will start screaming at you... let me see if I can pull it up for you...
  219. He thinks, he actually thinks, that I'm Neal. Because Neal used to work for me.
  220.  
  221. And when I tell you Neal worked for Project Vigilant, we literally have been around since 1996. And as the head of intelligence and I met, and started working together in 2002. Neal started on March 6, 2009, and he quit December 26, 2010.
  222.  
  223. He was only with us for 13 months. I've known Neal since 1997. Omaha is just not that big.
  224.  
  225. I want to read you what Ron Brynaert today, because he hates Adrian Lamo because Adrian and I are good friends. I had no role to play in this, other then I happen to have been born into the military, so I knew a lot of people from when my father was in the military. And I go to the DoD cyber conference every year as a guest.
  226.  
  227. They get me a free slot.
  228.  
  229. So Ron Brynaert, today, Ron starts... Dming me. Because I finally allow the guy to follow me again. And here's what he said : Neal, are you having fun? This is from three hours ago. I go, I gave you my Skype Address, I gave you my corporate address. Do you know Palantir?
  230.  
  231. Ask me a question, as a real reporter would... this is why I blocked you Ron. I hate Neal, he has fucked me over so many times, I've lost count.
  232.  
  233. And I said, jokingly, I'm a super secret agent for an as yet unknown agency, just fucking with Ron.
  234.  
  235. And then he goes, fine, i'll email you chet, but I doubt i'll get anything different in return.
  236.  
  237. Well I dont use Firedog Lake. And then I go “grin”.
  238.  
  239. (recounts conversation with Brynaert, dealing mostly with Adrian Lamo/Bradley Manning/Wikileaks)
  240.  
  241. The whole thing that went on with Ron, Ron is sitting here saying, asking me stuff, that's related to what I said at Defcon 2010. Well it's 2012, for gods sake, not 2010.
  242.  
  243. Here's the thing: I basically, um, there were people wearing t-shirts that said, Kill Adrian Lamo. And I had been giving a press conference, and I got upset. And I said you want to know what happened, I'll tell you what happened because I was fucking there.
  244.  
  245.  
  246. (conversation continues about Manning/Wikileaks and Brynaert etc)
  247.  
  248. Ryan: Ron hates me speficially, because of the whole Occupy stuff, and the fact I talked to Palantir. It's like, I'm in the security industry and I do talks all the time, I give talks at the Spy Museum, i've done talks for DoD, it's what I do.
  249.  
  250. Uber: Again, I read up. It's cool to hear some of those places, that's really cool. I'm the same way. Literally, Jim Christie and I have known each other for 15 years. I talk to Jim, I have his home phone, you know. I go to the DoD cybercrime conference, and I teach when I can. This year I'm going to give a talk and in 2013. I haven't spoken at a conference in five years.
  251.  
  252. So he goes after Zapem. What do you think Zapem is? Do you know? You don't have to tell me, but do you know who Zapem is? We think it's a pro-government person.
  253.  
  254. Ryan: I just think it's a right-winger that's pro law-enforcement. She may be involved with law enforcement and that needs to be confirmed. But lately, she's been targeted by Neal, and that cause it goes back to 2010 with Twittergate.
  255.  
  256. Uber: We believe, this is what I saw, I gave you all those links, remember the one I put the asterisk by? I was right there, standing in the same room, when Neal did all that shit, and that's why, this was after he'd been out of Project Vigilant for awhile. And I was like, this is why we don't talk to each other.
  257.  
  258. I go, “I knew you when your kids were born. Something is fucked up in your head Neal. You cannot agree with this, this is wrong.” Well he told me , he came to me and told me that the Mexican cartel was after him because Anonymous was after him and pinned it on him.
  259.  
  260. He told me that everyone was after him for killing Andrew Breitbart, and that everybody was after him for Twittergate. Well he did Twittergate for gods sake, I know he did. And he did Weinergate, you know? I just can't prove it!
  261.  
  262. And he's getting away with it.
  263.  
  264. Ryan: It's funny because when you look up killing Breitbart, your name actually pops up in the rumors I heard. You created some direct energy gun that you have to look out for him.
  265.  
  266. Uber: I did create a direct energy gun, but it wouldn't kill somebody. You'd have to be, I didn't create it, the Russians created it. They would go to a hotel room, take the drywall off one side of the room, by the bed, and essentially take the magnetron out of a microwave, and essentially microwave the guy's head in the bed in the room next to you.
  267.  
  268. But directed energy weapons, when I got my de-fribulator put in in 2008, I quit working on them. I worked on them, because the Infraguard coordinator at the time, came in and he goes “what's a burst gun?” If you look in 2002, Dr Wick and I, Dr Wick's from Sweden, the head of Sweden's military related to directed energy weapons, so, that is true. I do know, and I set on the ____ committee, which is the intentional emitters...
  269.  
  270. But no, I don't build rayguns to kill people, for God's sake. Great, now I've got another fucking thing to
  271. add to my long list of bad shit I didn't do.
  272.  
  273. Ryan: Join the crowd. I'm evil because I gave a talk at Palantir.
  274.  
  275. Uber: What the hell is Palantir? I don't know what it is.
  276.  
  277. Ryan: Palantir, it depends , they have different suites of software. So for the financial markets, its used for fraud detection. And for, government,it's used for data analysis. You have to get other tools to tie into it to actually scrape the data, and then Palantir creates the visuals, maps, and gives you all the different scenarios.
  278.  
  279. Uber: okay, so it's a big data visualization tool like ___ ….
  280.  
  281. Ryan: But like on steroids.... the minimum buy-in on Palantir is a million dollars.
  282.  
  283. Uber: Silentrunner is a quarter million dollars per CPU. So its same price range.
  284.  
  285. (cross chatter)
  286.  
  287. Uber: You'd have to have a 10-20 million dollar budget to operate SilentRunner. SilentRunner was written by Raytheon, I saw it run as a demo. What they did was take cell phone data from drug cartels or a drug gang, and they dropped in, what the SilentRunner can do is read any log file, or it can watch wire data.
  288.  
  289. And do DPI... you dropped it in, and it creates this 3-D graph, and the bigger the ball is, that tells how many phone calls they got. And the bigger the pipes that connect the balls, are the number of phone calls. You can look at it, this is the person who brought in the 20 kilos, these are the people who each got a kilo, and these are the people who got an oz, and these are all the street dealers.
  290.  
  291. It did that thing, and it was running, on at that time, on a high-end Sun desktop... when I mean data logs, cell phones from 100 people for 3 years.
  292.  
  293. (unidentified voice: shit)
  294.  
  295. (sound of call dropping)
  296.  
  297. (unidentified voice : yeah, hold on. Try again. Hold on a second. I can't hear you. Hold on. I can't hear you. What are you saying? What do you mean? Tell him that you're going to conference it in to me, and you'll get him right back... Will you just ask him if it's alright if you get me on the phone?)
Add Comment
Please, Sign In to add comment