743 lines
28 KiB
Plaintext
743 lines
28 KiB
Plaintext
|
Transcript of _Now_It_Can_Be_Told_: "Mad Hackers' Key Party"
|
|||
|
Hosted by Geraldo Rivera (Sept. 30, 1991)
|
|||
|
|
|||
|
Geraldo: I'm Geraldo rivera. And now, It can be told.
|
|||
|
|
|||
|
<Flashy intro featuring various bleeps and sounds and what is supposed
|
|||
|
to look like a computer screen>
|
|||
|
|
|||
|
Geraldo: You're watching life imitate art.
|
|||
|
|
|||
|
<home video of hackers hacking. Room is in disarray, with a few
|
|||
|
computers scattered around among various wires and cables and
|
|||
|
telephones, and other equipment.>
|
|||
|
|
|||
|
Geraldo: Exclusive video of teenagers playing a dangerous and
|
|||
|
mind-boggling version of War Games.
|
|||
|
|
|||
|
<video focuses on what appears to be 3 teenagers typing on computer
|
|||
|
keyboards.>
|
|||
|
|
|||
|
<video focuses on one of the screens.>
|
|||
|
|
|||
|
Geraldo: If you think it's kid stuff, just watch this.
|
|||
|
|
|||
|
<screen shows:
|
|||
|
| quit
|
|||
|
| 221 Goodbye.
|
|||
|
| rugrcx>
|
|||
|
| telnet tracer.army.mil
|
|||
|
| Trying 192.33.5.135....
|
|||
|
| Connected to tracer.army.mil
|
|||
|
| Escape character is '^]'.
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
| Xenix K3-4 (tracer.army.mil)
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
| login:
|
|||
|
| dquayle
|
|||
|
| Password:_
|
|||
|
>
|
|||
|
<screams of joy from kids>
|
|||
|
<screen shows: Warning (banner)...This terminal is not secure...Do not
|
|||
|
process classified information...Protect user IDs, passwords...Control
|
|||
|
access to your system....Destroy classified and sensitive
|
|||
|
material....>
|
|||
|
|
|||
|
Geraldo: Straight into the US Army computer. In the name of the vice
|
|||
|
president!! Straight out with America-s counter-terrorist strategies
|
|||
|
in the Persian Gulf war. <video of bombings during Gulf War.)
|
|||
|
|
|||
|
Cliff Stoll: These guys in the army, they didn't do their homework.
|
|||
|
They screwed up. <shows Cliff Stoll sitting in chair, terminal on
|
|||
|
behind him.>
|
|||
|
|
|||
|
Geraldo: You bet they did. And they're not the only ones.
|
|||
|
|
|||
|
<more video of hackers hacking, Emmanuel Goldstein talking on a
|
|||
|
telephone>
|
|||
|
|
|||
|
Geraldo: Try the Pentagon, NASA, the White House.
|
|||
|
|
|||
|
<video showing guy next to payphone, Japanese Kanji characters fill
|
|||
|
the screen>
|
|||
|
|
|||
|
Geraldo: ...the IRS, the Department of Justice, and the stock
|
|||
|
exchange.
|
|||
|
|
|||
|
<Japanese video now shows hacker typing on laptop in front of pay
|
|||
|
phone - It is dark out.>
|
|||
|
|
|||
|
Phiber Optik (guy next to pay phone, typing on laptop): I find it
|
|||
|
very thrilling. It's quite interesting.
|
|||
|
|
|||
|
Some guy in a suit speaking in a microphone: Tomorrow's terrorists
|
|||
|
may be able to more damage with a keyboard, than with a bomb.
|
|||
|
|
|||
|
<more video of a hacker hacking>
|
|||
|
|
|||
|
Geraldo: Now it can be told. A terrifying expose on Malice In
|
|||
|
Wonderland. The Mad Hacker's Key Party.
|
|||
|
|
|||
|
<screen displays that title over hacker typing on keyboard>
|
|||
|
<Intro to the show>
|
|||
|
|
|||
|
Geraldo: Welcome everybody. Up front today, a new kind of warfare.
|
|||
|
This kind of combat won't be fought with bombs and bullets, but with
|
|||
|
bits and bytes, RAMs, and ROMs. I'm talking about computer terrorism.
|
|||
|
Imagine this nightmare: Saddam Hussein breaking into our Pentagon
|
|||
|
computers. Well, as your about to see, we have discovered that this
|
|||
|
is frightningly possible, given a combination of floppy disks and
|
|||
|
sloppy security. Before you meet a mad hacker, live, right here in
|
|||
|
our studio, watch as our correspondant Krista Bradford discovers just
|
|||
|
how vulnerable our national defense system really is.
|
|||
|
|
|||
|
<screen switches to Krista Bradford in corner office, in front of terminal>
|
|||
|
|
|||
|
Krista: Thanks Geraldo. Computers: they are absolutely essential to
|
|||
|
our national defense. Our military depends on them to win wars and to
|
|||
|
save lives. So you'd think they'd do everything possible to protect
|
|||
|
these computers, but, think again. This exclusive video proves
|
|||
|
otherwise. <she hits play button on VCR, hacker home video pops up
|
|||
|
again>
|
|||
|
|
|||
|
Krista: This video looks like a home video, but its implications are
|
|||
|
astounding.
|
|||
|
|
|||
|
<video passes over computer (IBM compat.) - notable is an issue of
|
|||
|
2600 propped up against the keyboard>
|
|||
|
|
|||
|
Krista: These kids are in Amsterdam; they are not the enemy, they are
|
|||
|
not spies. They are computer hackers and they are about to break into
|
|||
|
a US Army computer.
|
|||
|
|
|||
|
Emmanuel: This is about as blatant a violation as you can possibly
|
|||
|
get.
|
|||
|
<screen shows Emmanuel Goldstein>
|
|||
|
|
|||
|
Krista: Emmanuel Goldstein is the editor of 2600, The Hacker Quarterly.
|
|||
|
<screen switches to Emmanuel typing at keyboard, focuses on pile of 2600's
|
|||
|
stacked nearby>
|
|||
|
|
|||
|
<screen switches back to hacker home video, Emmanuel on the phone>
|
|||
|
|
|||
|
Krista: He was with the hackers as thy gained unauthorized access to
|
|||
|
the Army computer.
|
|||
|
|
|||
|
<list of *.MIL sites scrolls across a computer screen>
|
|||
|
|
|||
|
Krista: Although it wasn't classified, what the hackers found was
|
|||
|
alarming.
|
|||
|
|
|||
|
<long e-mail message scrolls across a screen>
|
|||
|
|
|||
|
Krista: A sensitive memo which details a counter-terrorist plan.
|
|||
|
<screen shows bomb going off> The date: January 15th - Saddam
|
|||
|
Hussein's deadline to withdraw his forces from Kuwait. <more footage
|
|||
|
from the Gulf War>
|
|||
|
|
|||
|
<screen switches to Emmanuel being interviewed again>
|
|||
|
|
|||
|
Emmanuel: It was incredible how easy it was. Because, literally they
|
|||
|
picked a machine at random out of a thousand machines that they had a
|
|||
|
listing of. And used various means just to get in.
|
|||
|
|
|||
|
<screen switches to the screen I typed above, except the first login
|
|||
|
is guest [Login incorrect]..Second login, sync, password prompt
|
|||
|
appears?
|
|||
|
|
|||
|
Krista: In order to get into a computer, you need to be an authorized
|
|||
|
user, and have a password. So the hackers had to create one. Using a
|
|||
|
well-known bug in the system, they managed to copy the password file
|
|||
|
and do just that.
|
|||
|
|
|||
|
<list of /etc/passwd floats by>
|
|||
|
|
|||
|
Emmanuel: <sitting at terminal> The idea was to create a user named
|
|||
|
Dan Quayle, and give him superuser privileges, as well he deserves.
|
|||
|
|
|||
|
Krista: Now here's the trick: because they didn't know any
|
|||
|
legitimate passwords, they left the space for Dan Quayle's password
|
|||
|
blank.
|
|||
|
|
|||
|
<screen focuses on dquayle record of /etc/passwd, highlights the
|
|||
|
colons after 'dquayle'>
|
|||
|
|
|||
|
Emmanuel: Everything between those two colon's is the encrypted
|
|||
|
password, but there's nothing between those two colons, so there's no
|
|||
|
password.
|
|||
|
|
|||
|
Krista: Next, the hacker's call back as Dan Quayle, and now they
|
|||
|
don't need a password to get in.
|
|||
|
|
|||
|
<screen shows login as dquayle, null password...Hackers cheer as
|
|||
|
WARNING banner and logon screen (summarized above) appears.>
|
|||
|
|
|||
|
Krista: At this point, all of about 5 minutes have passed. A few
|
|||
|
seconds later, and they have gained complete control.
|
|||
|
|
|||
|
Emmanuel: That means they have access to the entire system, they
|
|||
|
control the entire system. They can take it down, they can change
|
|||
|
every file. They can read anybody's mail.
|
|||
|
|
|||
|
Krista: <walking along outside> So just how serious was this
|
|||
|
violation? Well, the Army, the Justice Department, and the FBI
|
|||
|
wouldn't tell us. They all refused to comment. But this we do know:
|
|||
|
the US Army computer that was accessed was designed for "Authorized
|
|||
|
Use By Official Personnel Only". You wouldn't want just anybody using
|
|||
|
this computer, especially during a time of war.
|
|||
|
|
|||
|
<screen shows jet taking off...screen switches to guy ( Winn Schwartau
|
|||
|
[Information Security Consultant]) sitting in front of terminal set
|
|||
|
up with some other electronic devices attached.
|
|||
|
|
|||
|
Winn: The military knows better. They should be protective of their
|
|||
|
computers a lot better than they are.
|
|||
|
|
|||
|
<helicopter shown...screen switches to Emmanuel>
|
|||
|
|
|||
|
Emmanuel: Obviously, there's a problem. Obviously people can get
|
|||
|
into anything and see anything.
|
|||
|
|
|||
|
<screen switches to Cliff Stoll>
|
|||
|
|
|||
|
Cliff: These guys in the Army, they didn't do their homework. They
|
|||
|
screwed up.
|
|||
|
|
|||
|
<switches back to video of hackers>
|
|||
|
|
|||
|
Krista: They sure did. This isn't the first time Dutch hackers have
|
|||
|
infiltrated government computers.
|
|||
|
|
|||
|
<video of space shuttle taking off>
|
|||
|
|
|||
|
Krista: Just this April, another group made its way into the
|
|||
|
computers at NASA, the Pentagon, and other sensitive locations.
|
|||
|
<screen shows newspaper headline of said event>.
|
|||
|
|
|||
|
<screen shows the Pentagon>
|
|||
|
|
|||
|
Emmanuel: If our own military doesn't know enough to look for these
|
|||
|
bugs and make it hard for people to get into their systems, what can
|
|||
|
we say about non-classified computers or computers run by schools and
|
|||
|
various other institutions?
|
|||
|
|
|||
|
<screen zooms in on hardback copy of _The_Cuckoo's_Egg>
|
|||
|
|
|||
|
Krista: Cliff Stoll, author of The CUckoo's Egg: How he tracked down
|
|||
|
a hacker selling secrets to the KGB. Stoll opposes hacking, likening
|
|||
|
it to breaking into someone's house.
|
|||
|
|
|||
|
<screen shows cliff sitting in front of a Mac LC showing familiar
|
|||
|
'Flying Toasters'....Cliff appears more sedate than as seen before on
|
|||
|
other programs>
|
|||
|
|
|||
|
Cliff: Is there good that can come from someone breaking into my
|
|||
|
house? If someone sneaks in through my window over there, comes in
|
|||
|
and starts looking at things, is there any good that can come from
|
|||
|
that?
|
|||
|
|
|||
|
<screen switches back to Emmanuel>
|
|||
|
|
|||
|
Emmanuel <with hand raised, looking mad at Cliff's comment>: I don't
|
|||
|
like that analogy. Hackers are not interested in personal files of
|
|||
|
individual people. They're interested in huge databases and computer
|
|||
|
systems.
|
|||
|
|
|||
|
<screen switches to Japanese TV, Kanji characters spread all
|
|||
|
over...It's night...Guy is standing in front of lighted-up pay phone>
|
|||
|
|
|||
|
Phiber: My handle's Phiber Optik. I'm a computer hacker from the
|
|||
|
east coast.
|
|||
|
|
|||
|
<screen shows Phiber taking acoustic coupler from a bag...[This scene looks
|
|||
|
extremely modern-day Cyberpunk-ish]>
|
|||
|
|
|||
|
Krista: The Dutch aren't the only ones breaking into US computers.
|
|||
|
|
|||
|
Phiber: I find it actually very, very thrilling. It's quite
|
|||
|
interesting.
|
|||
|
|
|||
|
<screen shows laptop set on some cement stool....Screen moves to show
|
|||
|
other people milling around...Gee, is that Mr. Goldstein?!? And a
|
|||
|
g-man looking type in sunglasses [
|
|||
|
|
|||
|
Krista: It is nighttime in the meat packing district of New York
|
|||
|
City. A Japanese camera crew is documenting the work of one of
|
|||
|
America's most notorious hackers.
|
|||
|
|
|||
|
<Phiber connects the coupler to the pay phone>
|
|||
|
|
|||
|
Phiber: I enjoy this...Just know as much as you can about technology
|
|||
|
and about, uh, computer networking. <he's busy getting the pay phone
|
|||
|
set up>
|
|||
|
|
|||
|
Krista: They watch him hook up his computer to a payphone, so the
|
|||
|
call can't be traced to his home.
|
|||
|
|
|||
|
Phiber: <typing on the laptop> Hacker's goal is basically to become
|
|||
|
one with the machine. [in a Socratic-dialogue tone of
|
|||
|
voice]
|
|||
|
|
|||
|
Krista: Unlike Holland, hacking in the US is a crime, so this hacker
|
|||
|
prefers to remain anonymous.
|
|||
|
|
|||
|
<screen switches to dark bookstore where A. Hacker [Phiber] sits
|
|||
|
across from Krista>
|
|||
|
|
|||
|
Krista: So what gives you the right to access other people's
|
|||
|
computers?
|
|||
|
|
|||
|
A. Hacker: To tell you the truth, I really don't care hat someone
|
|||
|
keeps on their computers. Me, myself personally, and my close friends
|
|||
|
are mainly interested in programming the machines.
|
|||
|
|
|||
|
Krista: But if the machines are owned by somebody else, they're not
|
|||
|
your machines!
|
|||
|
|
|||
|
A. Hacker: Well, sure, but we'd just be coexisting with the people
|
|||
|
that normally use the machine.
|
|||
|
|
|||
|
Krista: Have you ever gotten into the White House computers?
|
|||
|
|
|||
|
A. Hacker: Well, I can't personally say whether I have or not. I
|
|||
|
know it's certainly possible, there's nothing stopping anyone from it.
|
|||
|
|
|||
|
<shot of White House>
|
|||
|
|
|||
|
Krista: Did you ever see anything interesting when you were there?
|
|||
|
|
|||
|
A. Hacker: Well, I'm not gonna say I was ever there...bu...uhh...No
|
|||
|
comment...
|
|||
|
|
|||
|
<screen switches back to the studio>
|
|||
|
|
|||
|
Geraldo: Joining me now is Craig Neidorf. Craig is one of the
|
|||
|
country's most notorious hackers. He has the dubious distinction of
|
|||
|
being one of the first people prosecuted under the Computer Abuse and
|
|||
|
Fraud Act. Although the charges against him were eventually dropped.
|
|||
|
|
|||
|
Geraldo: Do you think it's fun what the Dutch kids did? Get any
|
|||
|
kicks out of it?
|
|||
|
|
|||
|
Craig [KL]: I'm sure they probably thought it was fun. I was a bit
|
|||
|
disturbed by it when I heard about it.
|
|||
|
|
|||
|
Geraldo: Yeah. And you'll see why, after this.
|
|||
|
|
|||
|
<cut away to commercial, but first a message from Winn Schwartau and
|
|||
|
Geraldo...>
|
|||
|
|
|||
|
Winn: We do, potentially face an electronic Pearl Harbor.
|
|||
|
|
|||
|
<shot of Pearl Harbor>
|
|||
|
|
|||
|
Geraldo: Is the United States vulnerable to a computer invasion by
|
|||
|
the enemy? We'll be back in a moment with some of the scenarios for
|
|||
|
terror, as we continue our report on the Mad Hacker's Key Party.
|
|||
|
|
|||
|
<Commercial>
|
|||
|
|
|||
|
Geraldo: We'll be hearing more from our hacker friend here in a
|
|||
|
moment, as well as from somebody who prosecutes guys just like Craig.
|
|||
|
|
|||
|
Geraldo: In their own defense Craig and the other hackers say they
|
|||
|
demonstrate graphically just how vulnerable are to sabotage. Another
|
|||
|
word for sabotage in the high-tech 90's is terrorism. Here's Krista
|
|||
|
Bradford with the second part of her alarming report.
|
|||
|
|
|||
|
Krista: Thanks Geraldo. For years the US government has known about
|
|||
|
the threat of computer terrorism, but it has done little to protect
|
|||
|
itself. Computer security is routinely cut from the budget. So now
|
|||
|
we are in the precarious position of life possibly imitating art.
|
|||
|
That according to a recent Congressional subcommitee, when the
|
|||
|
subcomittee roled a clip from the movie Die Hard.
|
|||
|
|
|||
|
<actually it's Die Hard II...Clip shows scene where head hancho at
|
|||
|
Dullus Airport realizes someone else has control of their computer
|
|||
|
system>
|
|||
|
|
|||
|
<scene switches to that Winn guy...An Information Security Consultant>
|
|||
|
|
|||
|
Winn: A dedicated, motivated group of individuals with proper funding
|
|||
|
and a little bit of knowledge of technology.....
|
|||
|
|
|||
|
<another clip from Die Hard II...Workers scrambling around the control
|
|||
|
tower..Chaos...>
|
|||
|
|
|||
|
Winn: ....has the capability to effectively invade the United States
|
|||
|
via his computers and communication systems, shut those systems down
|
|||
|
that they wish to shut down, and do it invisibly by remote control.
|
|||
|
|
|||
|
<screen shows plane taking off>
|
|||
|
|
|||
|
Krista: The FAA's computerized air traffic control system holds the
|
|||
|
lives of tens of thousands of travellers in the balance every second.
|
|||
|
|
|||
|
<screen shows fictional computer graphic of air traffic over map of
|
|||
|
the country>
|
|||
|
|
|||
|
Krista: The federal reserve system moves $250 trillion through it's
|
|||
|
computer networks every year. The more computers we have the more
|
|||
|
vulnerable we become to computer terrorism.
|
|||
|
|
|||
|
<shot of terrorists hijacking TWA plane>
|
|||
|
|
|||
|
Guy in suit in front of microphone: A recent national research
|
|||
|
council report says that the modern thief can steal more with a
|
|||
|
computer, than with a gun. Tomorrow's terrorists may be able to do
|
|||
|
more damage with a keyboard, than with a bomb. That's frightening.
|
|||
|
|
|||
|
Krista: Dan Glickman (sp?) sits on the House Science, Space, and
|
|||
|
Technology Committee and recently chaired a hearing on computer
|
|||
|
security. Winn Schartau, a leading authority on information security
|
|||
|
and author of the novel _Terminal_Compromise_ testified at this
|
|||
|
hearing.
|
|||
|
|
|||
|
Winn: Terrorism is not necessarily implied by bombs and bullets. You
|
|||
|
can affect massive amounts of people by attacking the right computers.
|
|||
|
And that's terrorism.
|
|||
|
|
|||
|
<switch back to Emmanuel>
|
|||
|
|
|||
|
Emmanuel: The computer is a tool. And any tool can be used as a
|
|||
|
weapon.
|
|||
|
|
|||
|
<switch back to A. Hacker - now we see he's with another person (B.
|
|||
|
hacker?)>
|
|||
|
|
|||
|
A. Hacker: I wouldn't as much call it a weapon as I would call it an
|
|||
|
extension of one's own mind.
|
|||
|
|
|||
|
<switch back to Winn. He's setting up some sort of satellite receiver
|
|||
|
next to his terminal and equipment>
|
|||
|
|
|||
|
Krista: For the first time on television we can see just how
|
|||
|
vulnerable computers are to attack. There are four ways the computer
|
|||
|
can be used as a weapon. Number one, viruses: programs that copy
|
|||
|
themselves over and over again. In January, there were 480 viruses
|
|||
|
In June, 921. At the current rate there will be 100,000 viruses by
|
|||
|
the year 1995.
|
|||
|
|
|||
|
<shows fictional graphic of computers all over the map of the US,
|
|||
|
apparently supposed to be infected>
|
|||
|
|
|||
|
Winn: There are a new breed of viruses coming out that actually can
|
|||
|
cause physical damage to the computer. Either cause the monitor
|
|||
|
itself to blow up, or cause the hard disk to physically crash, thus
|
|||
|
rendering all the information unusable.
|
|||
|
|
|||
|
Krista: Number 2, interception. Terrorists can intercept phone lines
|
|||
|
used by computers and faxes. HIgh-tech phone taps.
|
|||
|
|
|||
|
<shows fictional graphic of guy at keyboard intercepting signals
|
|||
|
transmitted between two computers>
|
|||
|
|
|||
|
Winn: There are very, very simple, off-the-shelf, products and
|
|||
|
techniques that are available to listen in on all your digital
|
|||
|
communications.
|
|||
|
|
|||
|
Krista: Number 3, electromagnetic eavesdropping. Something our own
|
|||
|
government has allegedly kept under wraps for 40 years, so it can
|
|||
|
protect its military computers while spying on other unprotected
|
|||
|
systems.
|
|||
|
|
|||
|
Winn: You have to view the computer as a miniature radio transmitter.
|
|||
|
All the information that is being processed on it, and is being
|
|||
|
displayed on the terminal, your video display terminal, is being
|
|||
|
broadcast into the air just like a radio transmitter.
|
|||
|
|
|||
|
Krista: In an exclusive demonstration of just how easy it is while
|
|||
|
someone is typing at a computer terminal we can see someone up else to
|
|||
|
a mile and a half away tune in the radiation with an antenna and read
|
|||
|
exactly what is being typed.
|
|||
|
|
|||
|
<screen shows one person typing in fictional credit card information,
|
|||
|
then switches back to Winn's setup, where he tunes in to the frequency
|
|||
|
19.9217 and is able to see on his terminal the information that was
|
|||
|
being typed on the other terminal>
|
|||
|
|
|||
|
Krista: And finally number 4, computer guns. These guns are not
|
|||
|
loaded with bullets but transmit high frequencies or electromagnetic
|
|||
|
pulses, which, when fired, can cause an entire computer system to
|
|||
|
crash.
|
|||
|
|
|||
|
<shows fictional graphic of satellite transmitting signal which causes
|
|||
|
computer to blow up>
|
|||
|
|
|||
|
Winn: What if I shot your computer with my hertz (sp? unclear word)
|
|||
|
gun every hour on the hour, forcing your computers down every hour?
|
|||
|
It takes approximately a half-hour to forty-five minutes to bring one
|
|||
|
back up, how long can your company sustain that before you cry uncle?
|
|||
|
|
|||
|
<shows hacker home video again>
|
|||
|
|
|||
|
Krista: Just how real is the threat of computer terrorism? Real
|
|||
|
enough, according to a GAO report on computer security at the
|
|||
|
Department of Justice. The report identified many disturbing computer
|
|||
|
flaws which have life and death implications.
|
|||
|
|
|||
|
<shows report>
|
|||
|
|
|||
|
Krista: Real enough according to another GAO report on computer
|
|||
|
security at the stock market. Six of our nation's stock market
|
|||
|
computers are at risk, which handle 1.8 trillion dollars every year.
|
|||
|
|
|||
|
<shows stock market report>
|
|||
|
|
|||
|
Krista: Real enough that according to a report just this September
|
|||
|
which revealed that top secret bomb designs for every nuclear weapon
|
|||
|
in the country were left unprotected in the computer system at the
|
|||
|
Rocky Flats Nuclear Weapons Plant.
|
|||
|
|
|||
|
Winn: The current state of affairs is such that we do potentially
|
|||
|
face an electronic Pearl Harbor.
|
|||
|
|
|||
|
<bomb exploding footage>
|
|||
|
|
|||
|
Krista <in front of statue of statue in Washington, apparently>: Just
|
|||
|
how many acts of computer terrorism there have been is impossible to
|
|||
|
say since our own government refuses to comment. But, the manifesto
|
|||
|
for the terrorist group The Red Brigade vows that one of its main
|
|||
|
goals is to target and destroy computer systems.
|
|||
|
|
|||
|
<shot of Die Hard II again., where Bruce Willis says "This is just the
|
|||
|
beginning">
|
|||
|
|
|||
|
<back to the studio...>
|
|||
|
|
|||
|
Geraldo: Joining us now via satellite from Oakland, CA is the
|
|||
|
Assistant District Attorney Don Ingraham ... for Alameda County and he
|
|||
|
has been prosecuting computer hackers for years.
|
|||
|
|
|||
|
<Don is in the TV box, between Geraldo and Craig [KL]>
|
|||
|
|
|||
|
Geraldo: Don, how do you respond to the feeling common among so many
|
|||
|
hackers that what they're doing is a public service; they're exposing
|
|||
|
the flaws in our security systems?
|
|||
|
|
|||
|
Don: Right, and just like the people who rape a coed on campus are
|
|||
|
exposing the flaws in our nation's higher education security. It's
|
|||
|
absolute nonsense. They are doing nothing more than showing off to
|
|||
|
each other, and satisfying their own appetite to know something that
|
|||
|
is not theirs to know.
|
|||
|
|
|||
|
Geraldo: Don, you stand by, Craig as well. And when we come back
|
|||
|
we'll hear more from prosecutor Ingraham and from, I guess his
|
|||
|
archrival here, the Mad Hacker Craig Neidorf.
|
|||
|
|
|||
|
<Commercial>
|
|||
|
|
|||
|
Geraldo: We're back with Craig Neidorf, a former University of
|
|||
|
Missouri student who ran a widely distributed electronic newsletter
|
|||
|
[Phrack, duh] for computer hackers. He is so proud of being America's
|
|||
|
Most Wanted computer hacker that he has put together this very
|
|||
|
impressive scrapbook.
|
|||
|
|
|||
|
<Geraldo holds up a colorful scrapbook..On the left page shows a
|
|||
|
lightning bolt hitting what looks to be a crown [Knight Lightning]
|
|||
|
...And on the right it looks like a graphic saying "Knight Lightning"
|
|||
|
and below that is a black circle with a white lightning bolt, and
|
|||
|
next to that is a triangle that looks very similar to the triangle
|
|||
|
with an eye that appeared on the cover of _GURPS_Cyberpunk_ [which
|
|||
|
said in it, the book that was seized by the Secret Service! see page
|
|||
|
4...- but the one on KL is illegible]>
|
|||
|
|
|||
|
Geraldo: Knight Lightning I guess that was your code?
|
|||
|
|
|||
|
KL: It was my editor handle.
|
|||
|
|
|||
|
Geraldo: That's your handle. OK. And from Oakland, CA we are
|
|||
|
talking with the Assistant District Attorney Don Ingraham, who is hard
|
|||
|
driven, you might say, to put people like Craig behind bars. Don, do
|
|||
|
you think Craig's lucky that he's not behind bars right now?
|
|||
|
|
|||
|
Don: Yes, I think he's extraordinarily lucky. He was part of a
|
|||
|
conspiracy, in my opinion, to take property that wasn't his and share
|
|||
|
it with others. They charged him with interstate transport of stolen
|
|||
|
property - couldn't make the threshold -and it came out that it had
|
|||
|
been compromised by, unfortunately, released by another Bellcore
|
|||
|
subsidiary. But was certainly not through any doing of HIS that he is
|
|||
|
a free man.
|
|||
|
|
|||
|
Geraldo: So you think that his activities stink, then.
|
|||
|
|
|||
|
Don: Absolutely. No Question about it.
|
|||
|
|
|||
|
Geraldo: Craig, you wanna respond? Are you doing something for the
|
|||
|
greater good of society?
|
|||
|
|
|||
|
KL: Well I was merely publishing a newsletter. I didn't go out and
|
|||
|
find this document. Rather it was sent to me. In many ways it could
|
|||
|
be compared to Daniel Ellsberg sending the Pentagon Papers to the New
|
|||
|
York Times.
|
|||
|
|
|||
|
Geraldo: Do you figure it that way Don? Is he like Daniel Ellsberg?
|
|||
|
|
|||
|
Don: No, Ellsberg went to court to deal with it. Daniel Ellsberg's
|
|||
|
release of the Pentagon Papers is the subject of a published court
|
|||
|
decision to point out it was a matter of national security and
|
|||
|
national interest. The E911 codes, which is the citizen's link to the
|
|||
|
police department are not a matter of national security. They're a
|
|||
|
matter of the central service to the community.......
|
|||
|
|
|||
|
Geraldo: You broke into the 911 system? He broke into the 911
|
|||
|
system!
|
|||
|
|
|||
|
KL: No, that's not correct. I never entered any 911 telephone
|
|||
|
system.
|
|||
|
|
|||
|
Don: I didn't say he entered into it. What I said was that he and
|
|||
|
Riggs conspired together to take a code that they knew was necessary
|
|||
|
to 911 and to take it apart to see how it worked. They never had the
|
|||
|
owner's permission, they never asked for it.
|
|||
|
|
|||
|
Geraldo: Alright, lemme ask you this....
|
|||
|
|
|||
|
KL: The court found that there was no conspiracy here.
|
|||
|
|
|||
|
Geraldo: You were acquitted. You were vindicated at least from
|
|||
|
criminal responsibility. Lemme just quickly ask you this: hackers
|
|||
|
have been inside the White House computer.
|
|||
|
|
|||
|
KL: Yes they have.
|
|||
|
|
|||
|
Geraldo: And they've been inside the Pentagon computer.
|
|||
|
|
|||
|
KL: Yes.
|
|||
|
|
|||
|
Geraldo: And if Saddam Hussein hired some hackers whether they're
|
|||
|
from Holland or any other place, he could've gotten into these
|
|||
|
computers, presumably.
|
|||
|
|
|||
|
KL: Presumably, he could've.
|
|||
|
|
|||
|
Geraldo: And gotten some valuable information.
|
|||
|
|
|||
|
KL: It's definitely possible.
|
|||
|
|
|||
|
Geraldo: And you still think hackers are performing a public service?
|
|||
|
|
|||
|
KL: That's not what I said. I think that those kind of activities
|
|||
|
are wrong. But by the same token, the teenagers, or some of the
|
|||
|
people here that are not performing malicious acts, while they should
|
|||
|
be punished should not be published as extreme as the law currently
|
|||
|
provides.
|
|||
|
|
|||
|
Geraldo: You're response to that Don?
|
|||
|
|
|||
|
Don: I don't think they're being punished very much at all. We're
|
|||
|
having trouble even taking away their gear. I don't know one of them
|
|||
|
has done hard time in a prison. The book, Hafner's book on
|
|||
|
_Cyberpunk_, points out that even Mitnick who is a real electronic
|
|||
|
Hannibal Lecter ... did not get near any of the punishment that what
|
|||
|
he was doing entitled him to.
|
|||
|
|
|||
|
Geraldo: <laughing> An electronic Hannibal Lecter. OK, stand by,
|
|||
|
we'll be back with more of this debate in a moment...
|
|||
|
|
|||
|
<Commercials>
|
|||
|
|
|||
|
Geraldo: Back with Craig Neidorf and prosecutor Don Ingraham. Craig,
|
|||
|
do you think hackers are voyeurs or are they potentially terrorists?
|
|||
|
|
|||
|
KL: I think they resemble voyeurs more than terrorists. They are
|
|||
|
often times looking at places where they don't belong, but most
|
|||
|
hackers do not intend to cause any damage.
|
|||
|
|
|||
|
Geraldo: Do you buy that Don?
|
|||
|
|
|||
|
Don: If they stopped at voyeurism they would be basically
|
|||
|
sociopathic, but not doing near the harm they do now. But they don't
|
|||
|
stop at looking, that's the point. They take things out and share
|
|||
|
them with others, and they are not being accountable and being
|
|||
|
responsible as to whom they are sharing this information. That is the
|
|||
|
risk.
|
|||
|
|
|||
|
Geraldo: Can they find out my credit rating? I know that's not a
|
|||
|
national security issue, but I'm concerned about it.
|
|||
|
|
|||
|
Don: Piece of cake.
|
|||
|
|
|||
|
Geraldo: No problem.
|
|||
|
|
|||
|
Don: Assuming....
|
|||
|
|
|||
|
Geraldo: Go ahead. Assuming I have a credit rating...hahahah....
|
|||
|
|
|||
|
Don: Assume that the credit is not carried by someone who is using
|
|||
|
adequate security.
|
|||
|
|
|||
|
Geraldo: But you think Craig it's not problem.
|
|||
|
|
|||
|
KL: I think it's no problem.
|
|||
|
|
|||
|
Geraldo: Give me quickly the worst case scenario. Say Abu Nidal had
|
|||
|
you working for him.
|
|||
|
|
|||
|
KL: I'm sorry?
|
|||
|
|
|||
|
Geraldo: Abu Nidal, notorious .....
|
|||
|
|
|||
|
KL: As far as your credit rating?
|
|||
|
|
|||
|
Geraldo: No, not as far as my credit rating.. The world, national
|
|||
|
security.
|
|||
|
|
|||
|
KL: Well, hackers have gotten into computer systems owned by the
|
|||
|
government before. At this point they've never acknowledged that it
|
|||
|
was anything that was ever classified. But even some unclassified
|
|||
|
information could be used to the detriment of our country.
|
|||
|
|
|||
|
Geraldo: Like the counter-terrorist strategy on January 15th, the day
|
|||
|
of the deadline expired in the Persian Gulf.
|
|||
|
|
|||
|
KL: Perhaps if Saddam Hussein had somehow known for sure that we were
|
|||
|
going to launch an attack, it might have benefited him in some way,
|
|||
|
but I'm really not sure.
|
|||
|
|
|||
|
Geraldo: Don, worst case scenario, 30 seconds?
|
|||
|
|
|||
|
Don: They wipe out our communications system. Rather easily done.
|
|||
|
Nobody talks to anyone else, nothing moves, patients don't get their
|
|||
|
medicine. We're on our knees.
|
|||
|
|
|||
|
Geraldo: What do you think of Craig, quickly, and people like him?
|
|||
|
|
|||
|
Don: What do I think of Craig? I have a lot of respect for Craig, I
|
|||
|
think he's probably going to be an outstanding lawyer someday. But he
|
|||
|
is contributing to a disease, and a lack of understanding ethically,
|
|||
|
that is causing a lot of trouble.
|
|||
|
|
|||
|
Geraldo: One word answer. As the computer proliferate won't hackers
|
|||
|
also proliferate? Won't there be more and more people like you to
|
|||
|
deal with?
|
|||
|
|
|||
|
Knight Lightning: I think we're seeing a new breed of hacker. And
|
|||
|
some of them will be malicious.
|
|||
|
|
|||
|
Geraldo: Some of them will be malicious. Yes, well, that's it...for
|
|||
|
now. I'm Geraldo Rivera.
|
|||
|
|
|||
|
[End of Program]
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
If anyone asks, you didn't get this file from...
|
|||
|
|
|||
|
E X T R E M E
|
|||
|
------------+------------ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
/|\ <20> <20>
|
|||
|
/ | \ <20> Portland Metro All Text BBS <20>
|
|||
|
/ | \ <20> <20>
|
|||
|
/ | \ <20> 14400: 503.775.0374 <20>
|
|||
|
/ | \ <20> SysOp: Thing One <20>
|
|||
|
/ | \ <20> <20>
|
|||
|
/ | \ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
d r e a m e s
|
|||
|
|