Some archive (>10 years old) programs are not reachable through the search engine. They can be found at
Your support is essential if the service is to continue, there are bandwidth bills to pay every month and failing disk drives to replace. Volunteers do the work, but disk drives and bandwidth are not free. Click on this bar to contribute, even a dollar helps.
Program Information
 Sounds Of Dissent 
 Interview with William Binney, retired National Security Agency (2017-05-13)
 William Binney, retired NSA Technical Leader for intelligence, NSA whistleblower in 2001
 Sounds Of Dissent radio  
 See Notes.
 Attribution Non-commercial (by-nc) 
 No Advisories - program content screened and verified.
The computer ransomware attack on May 12 that hit over 50,000 computers across dozens of countries, England's hospitals, FedEx in the U.S., banks and telecoms in Spain, and a Russian ministry used hacking exploits that researchers believe were developed by the U.S. National Security Agency. The attack is demonstrating what happens when intelligence agencies can't keep their own computer weapons locked down.

This attack exploits a weakness in Microsoft Windows revealed by the Shadow Brokers hacker entity in 2016 that experts believe originated in the NSA-linked Equation Group methods of exploiting computer software vulnerabilities. The exploit named EternalBlue is among dozens revealed by the Shadow Brokers in April.

Although this infection's spread is mostly over, the young British researcher known as MalwareTech, whose quick thinking Saturday temporarily stanched the Wanna Decryptor virus from spreading so rapidly, said this same exploit could be unleashed again with a very simple change to its code.

In March the multinational Cisco systems had to learn from Wikileaks that its Internet switches had been hacked by the CIA to allow eavesdropping. Cisco's engineers had to rush to understand, repair and protect their customers' gear against the exploits the CIA had known about for over a year so that criminals and spies couldn't use the same methods.

About 90% of government spending on cyber programs is for offensively penetrating, disabling and eavesdropping on targeted computers and communications. Comparatively little is spent on protecting consumers, businesses and even the rest of the government from cyber attacks, hacks, economic espionage or holding data for ransom.

Interview with retired NSA Technical Leader for intelligence William Binney, previously the NSA's technical director of military geopolitical analysis and reporting. He worked in both the operations and analysis sides of intelligence, and was a Russia specialist.
Radio interview by John Grebe, first aired live on WZBC 90.3 FM Boston on May 13, 2017.

The weekly news interview program has aired since 1998 on WZBC 90.3 FM in Greater Boston. Catch us every Saturday from 11 a.m. to 1 p.m. Eastern Time. Live streams linked from . Selected interviews archived at
Will grant permission to broadcast or re-use if you email me beforehand or soon after broadcast. Simply email john at SoundsOfDissent dot org, with "Broadcast permission" in the Subject line, and specify the name of the show's edition. Or else click "Contact Contributor" above within the Program Information section. Thanks.

 Global Cyber Attack Used NSA Hacking Tools (Wanna Decryptor) Download Program Podcast
109MB mp3
01:10:38 English 2017-05-13
 WZBC-FM Newton, Massachusetts near Boston
  View Script
Global Cyber Attack Used NSA Hacking Tools (Wanna Decryptor)  01:10:38  192Kbps mp3
(111MB) Stereo
108 Download File...