WebApp Sec mailing list archives

RE: Hacking/security in main-stream media


From: "Jeremiah Cornelius" <jeremiah () nur net>
Date: Thu, 21 Oct 2004 00:46:29 -0700

If I'm not mistaken, I went to school with Markus Hess as an exchange student about 79-81.  We learned UCSD Pascal in 
the same classes, on a DEC PDP-11/70.

Small world... 

-----Original Message-----
From: Kevin Poulsen [mailto:klp () securityfocus com] 
Sent: Tuesday, October 19, 2004 6:42 PM
To: 'Chacon, Oscar'; 'Levenglick, Jeff'; 'Edward Miller'; 
jasonmerriman11 () aol com
Cc: 'Mike Andrews'; webappsec () securityfocus com
Subject: RE: Hacking/security in main-stream media



Its called The Cuckoo's Egg.  My buddy was one of the guys who 
investigated and caught Kevin Mitnick, or was it Kevin 
Poulsen?  The 
guy who disappeared was most likely killed by German/Russian 
intelligence.

That was me. (I got better.)


-----Original Message-----
From: Chacon, Oscar [mailto:Oscar.Chacon () cnb com]
Sent: Tuesday, October 19, 2004 9:18 AM
To: 'Levenglick, Jeff'; Edward Miller; jasonmerriman11 () aol com
Cc: Mike Andrews; webappsec () securityfocus com
Subject: RE: Hacking/security in main-stream media


Its called The Cuckoo's Egg.  My buddy was one of the guys who 
investigated and caught Kevin Mitnick, or was it Kevin 
Poulsen?  The 
guy who disappeared was most likely killed by German/Russian 
intelligence.

Oscar Chacon, CISA
Vice President & Manager
Information Security
Information Services Division
City National Bank
555 South Flower Street
Los Angeles, California 90071
Telephone:  213 - 673 - 8051
Facsimile:  213 - 637 - 3915
oscar.chacon () cnb com


-----Original Message-----
From: Levenglick, Jeff [mailto:JLevenglick () fhlbatl com]
Sent: Monday, October 04, 2004 6:08 AM
To: Edward Miller; jasonmerriman11 () aol com
Cc: Mike Andrews; webappsec () securityfocus com
Subject: RE: Hacking/security in main-stream media

This one might be the oldest that I know of.

I can't really remember the movie name. (its on the tip of my
tongue...) (something egg?)

It is based on the real story of a student who discovers that the 
school was being used as a 'pass thru' to US military computers. I 
think it was back in the 70's. I remember bits:

1 - He hooked up line printers to each phone line to trace 
the person 
and print what he was doing. 2 - He had each operator on a call and 
listened as each one traced and then call the next operator.
3- They traced it to Germany. (If I remember correctly?)
4 - I think it was 3 hackers. 2 of them disappeared and the 
last one, 
in a panic, spilled the beans. (He insisted that the govt 
was covering 
everything up and killed his friends)


Jeffrey 

-----Original Message-----
From: Edward Miller [mailto:EMiller () tax state va us]
Sent: Thursday, September 30, 2004 05:12 PM
To: jasonmerriman11 () aol com
Cc: Mike Andrews; webappsec () securityfocus com
Subject: Re: Hacking/security in main-stream media






how about Minority Report - biometric access control by retina scan



                                                              
             
             "Jason Merriman"                                 
             
             <jasonmerriman11@                                
             
             aol.com>                                         
          To 
                                       "Mike Andrews" 
<mike () se fit edu>    
             09/30/2004 09:46                                 
          cc 
             AM                        
webappsec () securityfocus com         
                                                              
     Subject 
                                       Re: Hacking/security 
in main-stream 
             Please respond to         media                  
             
             jasonmerriman11@a                                
             
                  ol.com                                      
             
                                                              
             
                                                              
             
                                                              
             
                                                              
             




 > War Games - [Not sure yet, not managed to pickup the film]

Computer creator uses his son's name as the main password for 
the system.


 > Hackers - [Not sure yet, not managed to pickup the film] 
Characters dumpster dive to get materials which assist in 
accessing systems.


Mike Andrews wrote on 9/29/2004, 4:00 PM:

 > A bit off the wall, but as good a place to post this as 
any :)  >  > I'm writing a tutorial/courseware on security 
(both basic topics and  > programming) and I'm looking for 
clips from movies or tv to introduce  > subjects - I've found 
that videos work well with introductions and short  > breaks 
to getting the audience in the right frame of mind (as well 
as  > getting them relaxed).  So far I have the following.... 
 >  > Jurassic Park - insider threat (the programmer gets the 
system to bypass  > security while he steals the DNA/embryos) 
 >  > Sneakers - Cryptography (when the team discovers it's a 
crypto box they  > have)  >  > The Net - Personally 
identifiable information (main characters personal  > 
information is deleted)  >  > War Games - [Not sure yet, not 
managed to pickup the film]  >  > Hackers - [Not sure yet, 
not managed to pickup the film]  >  > Any other suggestions?  
I'm only wanting short (5min) sections, but I'm  > willing to 
edit bit's out if needed.  >  > Cheers,  > Mike.  >  >  > 
----  > Mike Andrews  > Florida Institute of Technology  >  >  >

--
----------------------------------------------------
Jason Merriman
Systems Administrator, America Online
aim: jasonmerriman11
----------------------------------------------------




-----------------------------------------
This e-mail message is private and may contain confidential 
or privileged information.






Current thread: