WebApp Sec mailing list archives

RE: Hacking/security in main-stream media


From: Edward Miller <EMiller () tax state va us>
Date: Mon, 4 Oct 2004 10:32:21 -0400





That's The Cuckoo's Egg



                                                                           
             "Levenglick,                                                  
             Jeff"                                                         
             <JLevenglick@fhlb                                          To 
             atl.com>                  "Edward Miller"                     
                                       <EMiller () tax state va us>,          
             10/04/2004 09:08          <jasonmerriman11 () aol com>           
             AM                                                         cc 
                                       "Mike Andrews" <mike () se fit edu>,   
                                       <webappsec () securityfocus com>       
                                                                   Subject 
                                       RE: Hacking/security in main-stream 
                                       media                               
                                                                           
                                                                           
                                                                           
                                                                           
                                                                           
                                                                           




This one might be the oldest that I know of.

I can't really remember the movie name. (its on the tip of my tongue...)
(something egg?)

It is based on the real story of a student who discovers that the school
was being
used as a 'pass thru' to US military computers. I think it was back in the
70's.
I remember bits:

1 - He hooked up line printers to each phone line to trace the person and
print what he
was doing.
2 - He had each operator on a call and listened as each one traced and then
call the next operator.
3- They traced it to Germany. (If I remember correctly?)
4 - I think it was 3 hackers. 2 of them disappeared and the last one, in a
panic, spilled the beans. (He insisted that the govt was covering
everything up and killed his friends)


Jeffrey

-----Original Message-----
From: Edward Miller [mailto:EMiller () tax state va us]
Sent: Thursday, September 30, 2004 05:12 PM
To: jasonmerriman11 () aol com
Cc: Mike Andrews; webappsec () securityfocus com
Subject: Re: Hacking/security in main-stream media






how about Minority Report - biometric access control by retina scan




             "Jason Merriman"
             <jasonmerriman11@
             aol.com>                                                   To
                                       "Mike Andrews" <mike () se fit edu>
             09/30/2004 09:46                                           cc
             AM                        webappsec () securityfocus com
                                                                   Subject
                                       Re: Hacking/security in main-stream
             Please respond to         media
             jasonmerriman11@a
                  ol.com








War Games - [Not sure yet, not managed to pickup the film]

Computer creator uses his son's name as the main password for the system.


Hackers - [Not sure yet, not managed to pickup the film]
Characters dumpster dive to get materials which assist in accessing
systems.


Mike Andrews wrote on 9/29/2004, 4:00 PM:

A bit off the wall, but as good a place to post this as any :)

I'm writing a tutorial/courseware on security (both basic topics and
programming) and I'm looking for clips from movies or tv to introduce
subjects - I've found that videos work well with introductions and short
breaks to getting the audience in the right frame of mind (as well as
getting them relaxed).  So far I have the following....

Jurassic Park - insider threat (the programmer gets the system to bypass
security while he steals the DNA/embryos)

Sneakers - Cryptography (when the team discovers it's a crypto box they
have)

The Net - Personally identifiable information (main characters personal
information is deleted)

War Games - [Not sure yet, not managed to pickup the film]

Hackers - [Not sure yet, not managed to pickup the film]

Any other suggestions?  I'm only wanting short (5min) sections, but I'm
willing to edit bit's out if needed.

Cheers,
Mike.


----
Mike Andrews
Florida Institute of Technology




--
----------------------------------------------------
Jason Merriman
Systems Administrator, America Online
aim: jasonmerriman11
----------------------------------------------------




-----------------------------------------
This e-mail message is private and may contain confidential or privileged
information.




Current thread: