WebApp Sec mailing list archives

Re: Re[2]: Hacking/security in main-stream media


From: Morgan Reed <morgan.s.reed () gmail com>
Date: Tue, 26 Oct 2004 13:56:43 +1000

You are correct there is a movie associated with that book but 98% of
it is baseless fabrication, if you want a movie/documentary that
portrays something like the truth try 2600's docufilm "Freedom
Downtime"

I own Kevin Mitnick's book "The Art of Deception : Controlling the
Human Element of Security" I found it an interesting read and I
thouroughly recomend it to anybody involved in computer security as it
provides a valuable insight into the risks presented by social
engineering and presents 'best practises' to help obviate or at least
reduce said risks. He has also just finished editing a new book, "The
Art of Intrusion: The Real Stories Behind the Exploits of Hackers,
Intruders, and Deceivers".

[disclaimer] I am not in any way related to Kevin Mitnick, his company
defensive thinking, or wiley publishing, opinions presented herein are
purely my own. [/disclaimer]

On Mon, 25 Oct 2004 13:11:33 +0200, David Sanchez <dsanchez2k () gmail com> wrote:
Hi,

There is a movie about this book, TAKEDOWN:

   -  Skeet Ulrich (Kevin Mitnick)
   -  Russell Wong (Tsutomu Shimomura)




 http://imdb.com/title/tt0159784/

Shimomura and Markoff wrote a self-agrandizing distortion, which
inflated Mitnick's image as a dangerous criminal.  They contributed to a
hysteria that had Kevin incarcerated in _solitary_confinement_ without
charges for over a year.

Their book may be a good read.  A lot of literary fiction is.  Most
fiction  is not such a callous instrument of injury.

-----Original Message-----
From: Serg Belokamen [mailto:serg () fuzzyit com]
Sent: Thursday, October 21, 2004 7:06 AM
To: webappsec () securityfocus com
Subject: Re: Hacking/security in main-stream media

There is also a  book by Kevin Mitnick (and others imho)
called The Art Of Deception, talking about social engineering.


    Serg

Arun Vishwanathan wrote:

Kevin Mitnick was caught by this guy called Tsutomu
Shimomura. There is a book called "Takedown" by John Markoff
which describes the whole episode. Nice read.

Regards,
Arun
-----Original Message-----
From: Frank Draeger [mailto:fdraeger () csc com]
Sent: Wednesday, October 20, 2004 11:00 PM
To: Chacon, Oscar
Cc: Edward Miller; jasonmerriman11 () aol com; 'Levenglick,
Jeff'; Mike Andrews; webappsec () securityfocus com
Subject: RE: Hacking/security in main-stream media






There is a German TV movie about this story - from the hacker's view.
The name is "23" : http://imdb.com/title/tt0126765/








                     "Chacon, Oscar"


                     <Oscar.Chacon            To:
"'Levenglick, Jeff'" <JLevenglick () fhlbatl com>, Edward Miller

                     @cnb.com>
<EMiller () tax state va us>, jasonmerriman11 () aol com

                                              cc:      Mike
Andrews <mike () se fit edu>, webappsec () securityfocus com

                     19/10/2004 17:18         Subject: RE:
Hacking/security in main-stream media











Its called The Cuckoo's Egg.  My buddy was one of the guys
who investigated
and caught Kevin Mitnick, or was it Kevin Poulsen?  The guy
who disappeared
was most likely killed by German/Russian intelligence.

Oscar Chacon, CISA
Vice President & Manager
Information Security
Information Services Division
City National Bank
555 South Flower Street
Los Angeles, California 90071
Telephone:  213 - 673 - 8051
Facsimile:  213 - 637 - 3915
oscar.chacon () cnb com


-----Original Message-----
From: Levenglick, Jeff [mailto:JLevenglick () fhlbatl com]
Sent: Monday, October 04, 2004 6:08 AM
To: Edward Miller; jasonmerriman11 () aol com
Cc: Mike Andrews; webappsec () securityfocus com
Subject: RE: Hacking/security in main-stream media

This one might be the oldest that I know of.

I can't really remember the movie name. (its on the tip of
my tongue...)
(something egg?)

It is based on the real story of a student who discovers
that the school
was
being
used as a 'pass thru' to US military computers. I think it
was back in the
70's.
I remember bits:

1 - He hooked up line printers to each phone line to trace
the person and
print what he
was doing.
2 - He had each operator on a call and listened as each one
traced and then
call the next operator.
3- They traced it to Germany. (If I remember correctly?)
4 - I think it was 3 hackers. 2 of them disappeared and the
last one, in a
panic, spilled the beans. (He insisted that the govt was covering
everything
up and killed his friends)


Jeffrey

-----Original Message-----
From: Edward Miller [mailto:EMiller () tax state va us]
Sent: Thursday, September 30, 2004 05:12 PM
To: jasonmerriman11 () aol com
Cc: Mike Andrews; webappsec () securityfocus com
Subject: Re: Hacking/security in main-stream media






how about Minority Report - biometric access control by retina scan




            "Jason Merriman"
            <jasonmerriman11@
            aol.com>
           To
                                      "Mike Andrews"
<mike () se fit edu>
            09/30/2004 09:46
           cc
            AM                        webappsec () securityfocus com

      Subject
                                      Re: Hacking/security
in main-stream
            Please respond to         media
            jasonmerriman11@a
                 ol.com








War Games - [Not sure yet, not managed to pickup the film]

Computer creator uses his son's name as the main password
for the system.


Hackers - [Not sure yet, not managed to pickup the film]
Characters dumpster dive to get materials which assist in accessing
systems.


Mike Andrews wrote on 9/29/2004, 4:00 PM:

A bit off the wall, but as good a place to post this as any :)

I'm writing a tutorial/courseware on security (both basic
topics and
programming) and I'm looking for clips from movies or tv
to introduce
subjects - I've found that videos work well with
introductions and short
breaks to getting the audience in the right frame of mind
(as well as
getting them relaxed).  So far I have the following....

Jurassic Park - insider threat (the programmer gets the
system to bypass
security while he steals the DNA/embryos)

Sneakers - Cryptography (when the team discovers it's a
crypto box they
have)

The Net - Personally identifiable information (main
characters personal
information is deleted)

War Games - [Not sure yet, not managed to pickup the film]

Hackers - [Not sure yet, not managed to pickup the film]

Any other suggestions?  I'm only wanting short (5min)
sections, but I'm
willing to edit bit's out if needed.

Cheers,
Mike.


----
Mike Andrews
Florida Institute of Technology




--
----------------------------------------------------
Jason Merriman
Systems Administrator, America Online
aim: jasonmerriman11
----------------------------------------------------




-----------------------------------------
This e-mail message is private and may contain confidential
or privileged
information.










--
Un cordial saludo
David Sánchez



-- 
Microsoft Windows:
A 32-bit extension and graphical shell to a 16-bit patch to an 8-bit
operating system originally coded for a 4-bit microprocessor, written
by a 2-bit company that can't stand 1-bit of competition.


Current thread: