The older archives (>10 years old) have been substantially recovered -- more than 23,800 files' worth -- and are now reachable through the search engine and via file download. Email here if you have any questions.
Your support is essential if the service is to continue, there are bandwidth bills to pay every month and failing disk drives to replace. Volunteers do the work, but disk drives and bandwidth are not free. We encourage you to contribute financially, even a dollar helps. Click here to donate.
Welcome to the new Radio4all website! If you cannot log in, you may need to reset your password. Email here if you need additional support.
Program Information
Sounds Of Dissent
Interview with William Binney, retired National Security Agency (2017-05-13)
William Binney, retired NSA Technical Leader for intelligence, NSA whistleblower in 2001
 Sounds Of Dissent radio  Contact Contributor
The computer ransomware attack on May 12 that hit over 50,000 computers across dozens of countries, England's hospitals, FedEx in the U.S., banks and telecoms in Spain, and a Russian ministry used hacking exploits that researchers believe were developed by the U.S. National Security Agency. The attack is demonstrating what happens when intelligence agencies can't keep their own computer weapons locked down.

This attack exploits a weakness in Microsoft Windows revealed by the Shadow Brokers hacker entity in 2016 that experts believe originated in the NSA-linked Equation Group methods of exploiting computer software vulnerabilities. The exploit named EternalBlue is among dozens revealed by the Shadow Brokers in April.

Although this infection's spread is mostly over, the young British researcher known as MalwareTech, whose quick thinking Saturday temporarily stanched the Wanna Decryptor virus from spreading so rapidly, said this same exploit could be unleashed again with a very simple change to its code.

In March the multinational Cisco systems had to learn from Wikileaks that its Internet switches had been hacked by the CIA to allow eavesdropping. Cisco's engineers had to rush to understand, repair and protect their customers' gear against the exploits the CIA had known about for over a year so that criminals and spies couldn't use the same methods.

About 90% of government spending on cyber programs is for offensively penetrating, disabling and eavesdropping on targeted computers and communications. Comparatively little is spent on protecting consumers, businesses and even the rest of the government from cyber attacks, hacks, economic espionage or holding data for ransom.

Interview with retired NSA Technical Leader for intelligence William Binney, previously the NSA's technical director of military geopolitical analysis and reporting. He worked in both the operations and analysis sides of intelligence, and was a Russia specialist.
Radio interview by John Grebe, first aired live on WZBC 90.3 FM Boston on May 13, 2017.

The weekly news interview program has aired since 1998 on WZBC 90.3 FM in Greater Boston. Catch us every Saturday from 11 a.m. to 1 p.m. Eastern Time. Live streams linked from . Selected interviews archived at
Will grant permission to broadcast or re-use if you email me beforehand or soon after broadcast. Simply email john at SoundsOfDissent dot org, with "Broadcast permission" in the Subject line, and specify the name of the show's edition. Or else click "Contact Contributor" above within the Program Information section. Thanks.

Global Cyber Attack Used NSA Hacking Tools (Wanna Decryptor) Download Program Podcast
109MB mp3
01:10:38 1 May 13, 2017
WZBC-FM Newton, Massachusetts near Boston
  View Script
 01:10:38  192Kbps mp3
(111MB) Stereo
242 Download File...