{
	"id": "2eab432a-9028-494e-8a0d-a6527db18713",
	"created_at": "2026-04-06T00:10:19.35632Z",
	"updated_at": "2026-04-10T13:13:02.188946Z",
	"deleted_at": null,
	"sha1_hash": "d5c00eb4389a47ada511fb138a2823c20bc9ebce",
	"title": "29: Stuxnet - Darknet Diaries",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 41586,
	"plain_text": "29: Stuxnet - Darknet Diaries\r\nArchived: 2026-04-05 17:34:09 UTC\r\nEpisode Description\r\nStuxnet was the most sophisticated virus ever discovered. It's target was a nuclear enrichment facility in Iran. This virus was\r\nsuccessfully able to destroy numerous centrifuges. Hear who did it and why.\r\nSpecial thanks to Kim Zetter for joining us this episode. You can find more about Stuxnet from\r\nSee all episodes\r\nFrom 2009 to 2013 the communication channels the CIA uses to contact assets in foreign countries was compromised. This\r\nhad terrifying consequences.Guests this episodes are Jenna McLaughlin and Zach Dorfman.SponsorsThis episode was\r\nsponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.This\r\nepisode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert\r\nif someone tries to access them. Great early warning system for knowing when someone is snooping around where they\r\nshouldn’t be. Check them out at https://canary.tools.View all active sponsors.Sources https://finance.yahoo.com/news/cias-communications-suffered-catastrophic-compromise-started-iran-090018710.html Video: Fostering Bipartisanship in\r\nIntelligence Oversight CNAS2019 https://www.mcclatchydc.com/news/nation-world/national/article28348576.html\r\nhttps://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/\r\nhttps://www.nytimes.com/2017/05/20/world/asia/china-cia-spies-espionage.html\r\nhttps://www.nytimes.com/2018/01/17/world/asia/jerry-lee-cia-china-mole-hunt-suspect.html https://news.yahoo.com/cia-fix-communications-system-left-trail-dead-agents-remains-elusive-100046908.html\r\nhttps://www.washingtonpost.com/archive/sports/1988/03/21/cuban-defector-impeaches-cia-spies/10cec17c-076b-4867-\r\n96c5-628b8435a852/ https://en.wikipedia.org/wiki/Aldrich_Ames AttributionDarknet Diaries is created by Jack\r\nRhysider.Research assistance this episode from Yael Grauer.\r\nSep 29, 2020\r\n38 min 30 sec\r\nPSYOP, or “Psychological Operations”, is something the US military has been doing to foreign audiences for decades. But\r\nwhat exactly is it? And what’s the difference between white, gray, and black PSYOP missions? We talk to PSYOP specialists\r\nto learn more.Thanks to Jon Nichols for telling us about this fascinating world.SponsorsSupport for this episode comes\r\nfrom LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use\r\nit to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.Support for\r\nthis episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in\r\nabout 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign\r\nup.Sources https://www.democracynow.org/2006/3/24/the_psyops_war_a_look_at\r\nhttps://en.wikipedia.org/wiki/Lincoln_Group https://www.goarmy.com/careers-and-jobs/special-operations/psyop/psyop-mission.html# https://en.wikipedia.org/wiki/Operation_Wandering_Soul_(Vietnam_War)\r\nhttps://en.wikipedia.org/wiki/Torches_of_Freedom http://cgsc.contentdm.oclc.org/cdm/ref/collection/p16040coll3/id/182\r\nhttps://archive.org/details/PropagandaAudiobook/Propaganda+Chapter+01.mp3 https://www.newsweek.com/us-military-gets-mysterious-and-false-text-message-evacuate-korean-peninsula-669875 https://www.cbinsights.com/research/future-of-information-warfare/\r\nhttps://en.wikipedia.org/wiki/National_Defense_Authorization_Act_for_Fiscal_Year_2013#Smith%E2%80%93Mundt_Modernization_Ac\r\nVideos Vietnam War Ghost Audio Tape used in PSYOPS ‘Wandering Soul’ Jon Nichols Part 0 - Unallocated Spaces Talk on\r\nRussian Propaganda Cyber-Influence: Cyberwar and Psychological Operations WWII Psych Ops MISO Marines broadcast\r\nimportant information to Afghans The War You Don’t See Edward L. Bernays interview, 1986-10-23 As it fights two wars,\r\nthe Pentagon is steadily and dramatically increasing money spent on propaganda\r\nhttps://open.spotify.com/episode/0qlbXt6FWftwS94UUfluOT?si=_pdmIrbpRdW7umqXXFIqBw\u0026nd=1\u0026dlsi=e45c589309dc4c62\r\nPage 1 of 2\n\nIsrael has their own version of the NSA called Unit 8200. I was curious what this unit does and tried to take a peek inside.\r\nHear what I found by listening along to this episode.This episode was sponsored by Nord VPN. Visit\r\nhttps://nordvpn.com/darknet and use promo code “darknet”.This episode is also sponsored by Mack Weldon. Visit\r\nmackweldon.com to shop for premium men's casual wear and get a 20% off discount with your first order by using promo\r\ncode “diaries”.\r\nDec 15, 2018\r\n51 min 58 sec\r\nIn this episode of Cyber Series, Darragh sits down with Dr Jeremy Bradley (Principal TD for Crypt and High Threat\r\nTechnologies), and Flo D (Deputy CTO for Cyber Policy, NCSC-CAP) to explore what “the quantum threat” really means\r\nand how organisations should prepare.From international standards and timelines for migration, to challenges facing critical\r\nnational infrastructure, our guests break down the opportunities and obstacles of post-quantum cryptography. Whether\r\nyou’re a CISO, IT leader, or simply curious about the future of cyber security, this conversation sheds light on the steps we\r\nall need to take as we enter the quantum era.\r\nNicole Beckwith wears a lot of hats. She’s a programmer, incident responder, but also a cop and a task force officer with the\r\nSecret Service. In this episode she tells a story which involves all of these\r\nroles.https://twitter.com/NicoleBeckwithSponsorsSupport for this show comes from IT Pro TV. Get 65 hours of free training\r\nby visiting ITPro.tv/darknet. And use promo code DARKNET.Support for this show comes from Exabeam. Exabeam lets\r\nsecurity teams see what traditional tools can’t, with automated threat detection and triage, complete visibility across the\r\nentire IT environment and advanced behavioral analytics that distinguishes real threats from perceived ones, so security\r\nteams stay ahead and businesses keep moving — without fear of the unknown. When the security odds are stacked against\r\nyou, outsmart them from the start with Exabeam. Learn more at https://exabeam.com/DD.View all active sponsors.Sources\r\nhttps://www.secjuice.com/unusual-journeys-nicole-beckwith/ Talk from Nicole: Mind Hacks – Psychological profiling, and\r\nmental health in OSINT investigations Talk from Nicole: Who’s guarding the gateway?\r\nSource: https://open.spotify.com/episode/0qlbXt6FWftwS94UUfluOT?si=_pdmIrbpRdW7umqXXFIqBw\u0026nd=1\u0026dlsi=e45c589309dc4c62\r\nhttps://open.spotify.com/episode/0qlbXt6FWftwS94UUfluOT?si=_pdmIrbpRdW7umqXXFIqBw\u0026nd=1\u0026dlsi=e45c589309dc4c62\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://open.spotify.com/episode/0qlbXt6FWftwS94UUfluOT?si=_pdmIrbpRdW7umqXXFIqBw\u0026nd=1\u0026dlsi=e45c589309dc4c62"
	],
	"report_names": [
		"0qlbXt6FWftwS94UUfluOT?si=_pdmIrbpRdW7umqXXFIqBw\u0026nd=1\u0026dlsi=e45c589309dc4c62"
	],
	"threat_actors": [
		{
			"id": "fea75bf4-c510-4146-bbac-0802351f4eb0",
			"created_at": "2023-01-06T13:46:38.714847Z",
			"updated_at": "2026-04-10T02:00:03.076837Z",
			"deleted_at": null,
			"main_name": "Unit 8200",
			"aliases": [
				"Duqu Group"
			],
			"source_name": "MISPGALAXY:Unit 8200",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434219,
	"ts_updated_at": 1775826782,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d5c00eb4389a47ada511fb138a2823c20bc9ebce.pdf",
		"text": "https://archive.orkl.eu/d5c00eb4389a47ada511fb138a2823c20bc9ebce.txt",
		"img": "https://archive.orkl.eu/d5c00eb4389a47ada511fb138a2823c20bc9ebce.jpg"
	}
}