Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:36,680 --> 00:00:37,680
Okay.
2
00:01:22,120 --> 00:01:26,160
Less than 48 hours ago, that sound had
never been heard on this earth.
3
00:01:26,660 --> 00:01:30,600
Suddenly, it has become as much a part
of American life as the sound of your
4
00:01:30,600 --> 00:01:31,499
vacuum cleaner.
5
00:01:31,500 --> 00:01:37,360
It's a report from outer space, a radio
signal transmitted by the Soviet Union's
6
00:01:37,360 --> 00:01:42,340
Sputnik, the first man -made satellite
as it passes over New York earlier this
7
00:01:42,340 --> 00:01:47,680
evening. This is now the satellite which
surrounds all of us. In the competition
8
00:01:47,680 --> 00:01:50,960
for leadership in space, where is it?
9
00:01:51,210 --> 00:01:52,210
the finish line.
10
00:02:02,310 --> 00:02:06,070
In the Cold War, it's pretty clear who
shot a nuclear missile at you.
11
00:02:06,410 --> 00:02:07,410
You can see it.
12
00:02:08,030 --> 00:02:11,890
But in today's world, it's pretty
unclear who just launched the cyber
13
00:02:11,890 --> 00:02:12,890
against you.
14
00:02:16,840 --> 00:02:20,260
People have always been robbing banks.
People have always been embezzling
15
00:02:20,400 --> 00:02:22,360
People have always been lying and
cheating.
16
00:02:22,740 --> 00:02:27,760
And the Internet just gives people
another avenue to lie and cheat and
17
00:02:27,920 --> 00:02:31,880
The nation's largest credit rating
bureau may have been the target of a
18
00:02:31,880 --> 00:02:34,120
attack by amateur computer wizards.
19
00:02:34,620 --> 00:02:38,740
TRW's Information Services Division has
computer records on 90 million
20
00:02:38,740 --> 00:02:42,040
Americans, 85 % of the breadwinners in
this country.
21
00:02:42,490 --> 00:02:47,950
They look at data as ones and zeros that
should be liberated and are free for
22
00:02:47,950 --> 00:02:51,570
everybody. And they don't see the
boundaries that we all have.
23
00:02:51,930 --> 00:02:55,770
Privacy is one of those things that you
don't really notice it until it's gone.
24
00:02:56,630 --> 00:03:01,010
We're entering in a world where all data
is now saved.
25
00:03:01,390 --> 00:03:07,650
And this is the end of prehistory. Now
your kids are going to have everything
26
00:03:07,650 --> 00:03:08,650
saved.
27
00:03:09,670 --> 00:03:11,650
And that's a real different world.
28
00:03:14,890 --> 00:03:15,890
Good evening, America.
29
00:03:16,250 --> 00:03:21,890
It troubles me to tell you that your
personal and private information is in
30
00:03:21,890 --> 00:03:26,690
hands of thousands of people who you
never met and will never know.
31
00:03:27,030 --> 00:03:30,790
The stereotype is it's the kid who
didn't have a girlfriend, right? And so
32
00:03:30,790 --> 00:03:32,950
spending all of his time down there in
the basement, right?
33
00:03:34,350 --> 00:03:38,190
There was something to that. There's
sometimes stereotypes at the core of the
34
00:03:38,190 --> 00:03:39,730
stereotype. There's a little bit of
truth.
35
00:03:39,990 --> 00:03:41,390
So we had all of these.
36
00:03:41,690 --> 00:03:47,230
kids who were bored and they were
exploring and you started to see this
37
00:03:47,230 --> 00:03:53,500
phenomenon where the anonymity of the
network let people feel entitled to do
38
00:03:53,500 --> 00:03:55,500
things that they probably wouldn't do
otherwise.
39
00:03:55,940 --> 00:03:59,540
The physical morphology of the hacker is
something that I think that people have
40
00:03:59,540 --> 00:04:03,000
made a lot of jokes about. And I don't
think that the stereotype is necessarily
41
00:04:03,000 --> 00:04:08,500
wrong, that it's somebody with a black t
-shirt, drinking a Jolt Cola with a
42
00:04:08,500 --> 00:04:12,100
kind of pale complexion because they
haven't been out that much and they
43
00:04:12,100 --> 00:04:15,900
all day and they're up all night. But if
you go to hacker conferences like I do,
44
00:04:16,060 --> 00:04:17,760
while that description may...
45
00:04:18,000 --> 00:04:23,240
fit a majority of the people at the
conference, there's still ample other
46
00:04:23,240 --> 00:04:26,300
of people who are interested in
computers and computer security.
47
00:04:26,680 --> 00:04:28,680
Sometimes hackers mean computer
criminals.
48
00:04:29,560 --> 00:04:33,600
I'm using hackers in the term, the old
Stephen Levy sense of hackers are
49
00:04:33,600 --> 00:04:39,120
explorers. Just like you have criminal
plumbers and non -criminal plumbers, you
50
00:04:39,120 --> 00:04:42,740
have criminal hackers and non -criminal
hackers. The media loves to jump on.
51
00:04:43,310 --> 00:04:48,050
The stereotype of a hacker is some
little teenager in his basement who's
52
00:04:48,050 --> 00:04:52,190
at midnight on his little computer and
breaking into the Pentagon and launching
53
00:04:52,190 --> 00:04:53,550
ICBMs at Russia.
54
00:04:53,810 --> 00:04:55,790
I mean, that's Hollywood.
55
00:04:56,050 --> 00:05:00,270
It makes a good story, but that is not
true. A hacker basically is somebody.
56
00:05:00,510 --> 00:05:03,370
They're not necessarily malicious.
They're just curious.
57
00:05:03,910 --> 00:05:10,830
I first heard the term hacker in the
80s, and it was in reference to
58
00:05:11,450 --> 00:05:15,070
hacking their way through something in
other words someone learning something
59
00:05:15,070 --> 00:05:21,690
that was difficult in context of
computer programming you were just
60
00:05:21,690 --> 00:05:25,250
together to get it to work you weren't
making it beautiful you weren't doing it
61
00:05:25,250 --> 00:05:27,680
necessarily right you were hacking it
together.
62
00:05:27,920 --> 00:05:31,120
Basically what you're seeing here is a
modern day hacker space.
63
00:05:31,700 --> 00:05:34,880
You'll find things not just about
computers, you'll find people doing
64
00:05:35,180 --> 00:05:39,260
lock picking, computer hacking, cyber
security, physics, chemistry, a whole
65
00:05:39,260 --> 00:05:42,980
bunch of stuff. A hacker is a person who
pushes the boundaries of their form and
66
00:05:42,980 --> 00:05:47,120
art. And basically you find people here
that are polymaths, like people that
67
00:05:47,120 --> 00:05:50,880
actually do multiple things and they're
jack of all trades, master of none, but
68
00:05:50,880 --> 00:05:52,640
more often better than a master of one.
69
00:05:52,940 --> 00:05:57,180
The first time I ever heard the term
hacker, I was... As a teenager, I was
70
00:05:57,180 --> 00:06:00,820
living in Raleigh, North Carolina, and
they had just apprehended Kevin Mitnick.
71
00:06:01,260 --> 00:06:07,140
So, you know, I grew up associating
computer hacker with computer criminal.
72
00:06:07,400 --> 00:06:11,820
My early impressions of the word before
I really could have lived any of it were
73
00:06:11,820 --> 00:06:17,980
just someone who had the power to work
with computers in a way that was kind of
74
00:06:17,980 --> 00:06:21,280
like magic. So they were basically
wizards of the computer world.
75
00:06:22,160 --> 00:06:23,600
Mathematician Claude E. Shannon.
76
00:06:24,090 --> 00:06:29,250
of the massachusetts institute of
technology designed this electronic maze
77
00:06:29,250 --> 00:06:35,590
to prove any special point but mostly
for fun the movable walls of the maze
78
00:06:35,590 --> 00:06:39,390
be arranged to make millions of
different patterns through which the
79
00:06:39,390 --> 00:06:45,590
mouse must travel to reach its goal to
find its way through the pattern the
80
00:06:45,590 --> 00:06:48,730
mouse proceeds as we would by trial and
error
81
00:06:50,730 --> 00:06:53,950
The Pentagon was accused today of not
paying enough attention to the security
82
00:06:53,950 --> 00:06:57,630
its computer system. Earlier this year,
a network of foreign computer hackers
83
00:06:57,630 --> 00:07:02,150
broke the code of a number of Defense
Department computers giving them access
84
00:07:02,150 --> 00:07:03,650
information on American weapons.
85
00:07:03,970 --> 00:07:09,930
We're going to use this modified phone
to attack and take over a Windows
86
00:07:09,930 --> 00:07:10,930
computer.
87
00:07:11,720 --> 00:07:16,460
A white hat hacker is doing hacking for
a good purpose.
88
00:07:16,720 --> 00:07:20,840
Sometimes they're hired to go in and do
what's called a penetration test of a
89
00:07:20,840 --> 00:07:24,660
company and expose any vulnerabilities
and report that back.
90
00:07:24,880 --> 00:07:28,820
Other times they're doing research that
can benefit the Internet community. On
91
00:07:28,820 --> 00:07:32,980
the other end of the spectrum is black
hat hacking, which is malicious.
92
00:07:33,530 --> 00:07:37,890
and it tends to benefit the individual,
or sometimes it's for profit of an
93
00:07:37,890 --> 00:07:40,770
organization, or it can be a political
expression.
94
00:07:42,450 --> 00:07:45,410
Do you ever come comfortable with the
idea of actually serving a little time
95
00:07:45,410 --> 00:07:46,249
what you were doing?
96
00:07:46,250 --> 00:07:47,249
No.
97
00:07:47,250 --> 00:07:50,210
But you still kept doing it. Oh, yeah,
of course.
98
00:07:50,730 --> 00:07:51,730
It's an addiction.
99
00:07:53,270 --> 00:07:54,270
It's a complete addiction.
100
00:07:54,650 --> 00:07:57,250
So the prospect of jail wasn't enough to
stop you?
101
00:07:57,490 --> 00:07:58,490
No.
102
00:08:03,530 --> 00:08:05,330
Don't have too much time to think about
that, actually.
103
00:08:06,450 --> 00:08:07,870
I think part of it is the obsession.
104
00:08:09,110 --> 00:08:12,330
It's the obsession of, I have to make
this work. It's kind of like a chess
105
00:08:12,610 --> 00:08:13,610
I have to win.
106
00:08:14,090 --> 00:08:18,450
And it's not like playing, you know, tic
-tac -toe. Nobody ever wins, right?
107
00:08:18,910 --> 00:08:20,830
When you play chess, it's very
strategic.
108
00:08:21,790 --> 00:08:25,250
Attacking computer systems is also very
strategic, and it can take days and
109
00:08:25,250 --> 00:08:27,430
weeks to physically get what you want.
110
00:08:27,750 --> 00:08:31,690
So you have to target it out and figure
out where the weak point is. How do I
111
00:08:31,690 --> 00:08:36,090
move there to get... over there under
that system it literally i mean i can't
112
00:08:36,090 --> 00:08:40,870
even tell you how long i've stayed up in
periods of like time to like hit a
113
00:08:40,870 --> 00:08:45,650
system that i wanted i think when i was
younger i just didn't care if i got
114
00:08:45,650 --> 00:08:49,830
caught i mean i still worked really hard
not to leave any traces the
115
00:08:49,830 --> 00:08:56,510
ramifications were just never more
intimidating than the thrill of doing a
116
00:08:56,510 --> 00:09:00,110
attack and it was always really exciting
117
00:09:01,260 --> 00:09:04,800
The hack that I spent considerable
amount of time on, I had to have some
118
00:09:04,800 --> 00:09:10,160
reason that I really cared about that
data. If someone tries to keep some data
119
00:09:10,160 --> 00:09:16,300
closed, and it's not some ethical rule
that's stopping you, it's just their
120
00:09:16,300 --> 00:09:22,260
-up rule and their attempt at secure
technology, then it's almost a moral
121
00:09:22,260 --> 00:09:23,820
imperative to take that data.
122
00:09:24,060 --> 00:09:29,020
The question really is, is the law
right? Do we need that particular law?
123
00:09:29,790 --> 00:09:34,610
So even though there's a law that says
you can't do something, hackers are
124
00:09:34,610 --> 00:09:36,790
really questioning should it even exist.
125
00:09:37,090 --> 00:09:41,250
For most people that I consider to be
hackers, the innovators or
126
00:09:41,350 --> 00:09:47,210
it is a desire to know and a desire to
learn, often coupled with a slightly
127
00:09:47,210 --> 00:09:53,070
antisocial belief that the man has been
lying to you and that what they're
128
00:09:53,070 --> 00:09:54,710
telling you isn't all there is.
129
00:09:55,050 --> 00:09:55,989
to life.
130
00:09:55,990 --> 00:09:59,890
I think always about the Matrix movie,
which I think of as one of the
131
00:09:59,890 --> 00:10:05,830
quintessential hacker movies where
there's so much more going on under the
132
00:10:05,830 --> 00:10:08,850
surface and you can choose to blind
yourself to it or you can choose to
133
00:10:09,050 --> 00:10:12,090
And the hacker is always going to choose
to know.
134
00:10:28,750 --> 00:10:32,870
In October 1957, the United States was
losing the Cold War.
135
00:10:35,890 --> 00:10:42,770
Russia announcing she had shot
136
00:10:42,770 --> 00:10:48,150
a man -made moon 560 miles into space
where it was circling the Earth at the
137
00:10:48,150 --> 00:10:50,690
dizzy speed of 18 ,000 miles per hour.
138
00:10:54,320 --> 00:10:59,060
The launching of Sputnik and what
happened subsequent to that radically
139
00:10:59,060 --> 00:11:03,500
the American attitudes towards their own
personal safety or the safety of this
140
00:11:03,500 --> 00:11:08,040
country. When it was reported, it
shocked the American people absolutely
141
00:11:08,040 --> 00:11:13,440
belief. For them to pull off this feat
sending the first satellite into space
142
00:11:13,440 --> 00:11:17,740
created a kind of atmosphere of
questioning.
143
00:11:18,350 --> 00:11:23,330
As to what we were, where we were going,
Americans had always prided themselves
144
00:11:23,330 --> 00:11:29,090
on being by far the advanced
technological culture of the world. So
145
00:11:29,090 --> 00:11:33,830
really two shocks, in a sense. A culture
shock, namely how could these backward
146
00:11:33,830 --> 00:11:38,210
peoples have produced something that we
were incapable of doing, but also a
147
00:11:38,210 --> 00:11:42,570
shock in terms of our own national
safety, because if they could put a
148
00:11:42,570 --> 00:11:46,970
into orbit, into space, surely they
could hit any American city.
149
00:11:47,470 --> 00:11:53,250
that they chose to. As a primary
deterrent to war, maintain a strong
150
00:11:53,250 --> 00:11:54,490
retaliatory power.
151
00:11:55,190 --> 00:12:00,610
The Soviets must be convinced that any
attack on us and our allies would
152
00:12:00,870 --> 00:12:05,310
regardless of damage to us, in their own
national destruction.
153
00:12:05,750 --> 00:12:11,130
Now we were part of a globe in which no
one was protected by physical barriers.
154
00:12:12,620 --> 00:12:17,880
In a purely strategic sense, it meant we
had to advance so much that we would
155
00:12:17,880 --> 00:12:20,980
have an unavailable advantage over the
Soviet Union.
156
00:12:21,200 --> 00:12:26,860
The Soviet Union now has, in the
combined category of scientists and
157
00:12:27,160 --> 00:12:29,780
a greater number than the United States.
158
00:12:30,780 --> 00:12:36,520
And it is producing graduates in these
fields at a much faster rate. And the
159
00:12:36,520 --> 00:12:39,080
result was the National Defense
Education Act.
160
00:12:39,660 --> 00:12:43,880
which called for spending billions of
dollars into the sciences, into
161
00:12:43,880 --> 00:12:48,660
engineering. So it seemed to be that we
were moving into a world that was
162
00:12:48,660 --> 00:12:54,700
totally unfamiliar to us, a world,
again, of computers and of missiles and
163
00:12:54,700 --> 00:12:57,580
sort of thing, just a very confusing
period for Americans.
164
00:12:57,840 --> 00:13:03,820
Indeed, according to my scientific
advisors, this is, for the American
165
00:13:04,060 --> 00:13:06,000
the most critical problem of all.
166
00:13:07,530 --> 00:13:13,030
Let me begin by taking you back into
time to the origins of the Internet.
167
00:13:13,350 --> 00:13:17,170
Before there was an Internet, the
Advanced Research Projects Agency and
168
00:13:17,170 --> 00:13:22,810
Defense Department started a project
that they called the ARPANET to try out
169
00:13:22,810 --> 00:13:27,610
this idea called packet switching, which
is a very distinct way of switching
170
00:13:27,610 --> 00:13:30,950
data around than the traditional
telephone system, which uses what's
171
00:13:30,950 --> 00:13:31,950
circuit switching.
172
00:13:32,460 --> 00:13:36,860
So we built a four -node network, and I
was lucky enough to be a graduate
173
00:13:36,860 --> 00:13:38,660
student at UCLA at the time.
174
00:13:39,000 --> 00:13:43,360
I wrote the software that connected the
Sigma -7 computer to the first packet
175
00:13:43,360 --> 00:13:48,400
switch of the ARPANET that was installed
at UCLA in September of 1969.
176
00:13:48,620 --> 00:13:52,520
And by December, we had four nodes up
and running. And then by landline across
177
00:13:52,520 --> 00:13:57,000
the United States, and actually a
portion of it went into Europe.
178
00:14:08,080 --> 00:14:10,240
That's just for rich men and gabby
women.
179
00:14:10,800 --> 00:14:11,800
Nothing but a gadget.
180
00:14:12,700 --> 00:14:13,900
Oh, he says that, does he?
181
00:14:14,560 --> 00:14:16,040
Will you listen to me, Mr. Kendall?
182
00:14:16,820 --> 00:14:19,400
You've got an uncle who's a fool, and
you can quote me.
183
00:14:19,960 --> 00:14:22,900
You're talking to a man who helped
install one of the very first
184
00:14:22,900 --> 00:14:26,700
there ever was, back in New Haven in 78,
who helped string the first line
185
00:14:26,700 --> 00:14:28,740
between cities, from Boston to
Providence.
186
00:14:29,000 --> 00:14:31,980
A man who's seen what this telephone has
done for the country already in 25
187
00:14:31,980 --> 00:14:36,480
years. A gadget is it? One thing to keep
in mind as you're talking about the
188
00:14:36,480 --> 00:14:40,820
phone company in the 1960s and 70s and
even up into the early 80s, for the most
189
00:14:40,820 --> 00:14:45,200
part, it really is one giant company. It
was all run by AT &T. American
190
00:14:45,200 --> 00:14:48,920
Telephone and Telegraph was a monopoly.
It was, in fact, the largest company on
191
00:14:48,920 --> 00:14:49,920
Earth.
192
00:14:50,720 --> 00:14:54,700
Today's telephone network far exceeds
Mr. Bell's grandest dream.
193
00:14:55,500 --> 00:15:00,000
And every last inch of it can be linked
together to serve the home, business, or
194
00:15:00,000 --> 00:15:01,040
continental defense.
195
00:15:01,850 --> 00:15:05,570
The very size and diversity of this
network helped to make it strong.
196
00:15:05,790 --> 00:15:09,050
The telephone system was the closest
thing that anybody got to a computer,
197
00:15:09,050 --> 00:15:12,310
the sophistication of the telephone
system and the telephone network was
198
00:15:12,310 --> 00:15:13,910
approaching that of a computer.
199
00:15:14,110 --> 00:15:17,970
And so the phone company was really sort
of the forerunner of a lot of
200
00:15:17,970 --> 00:15:21,660
computing. Phone freaks were, you know,
today they'd be called network hackers,
201
00:15:21,900 --> 00:15:23,880
right? The only difference is they're
playing around with the telephone.
202
00:15:24,140 --> 00:15:29,420
Finally tonight we have a report on
phone freaks, underground hobbyists who
203
00:15:29,420 --> 00:15:33,940
illegal phone calls around the country
by confounding the technology of the
204
00:15:33,940 --> 00:15:37,640
telephone companies with technology of
their own. For this phone freaking
205
00:15:37,640 --> 00:15:40,660
business to make any sense at all, you
almost have to get in a time machine
206
00:15:40,660 --> 00:15:44,960
because you have to go back in time to a
time that is really unlike today.
207
00:15:50,180 --> 00:15:53,460
that in the very old days, when you
wanted to make a long -distance call,
208
00:15:53,460 --> 00:15:55,720
you did was you picked up the telephone
and you talked to an operator.
209
00:15:56,120 --> 00:15:59,160
And you said, I want to call Chicago,
and here's my phone number.
210
00:15:59,420 --> 00:16:03,160
That operator would get another operator
on the line, which might involve maybe
211
00:16:03,160 --> 00:16:06,120
a couple intermediate cities, and you'd
eventually get to Chicago. So there were
212
00:16:06,120 --> 00:16:08,020
human beings in the loop all the way
through.
213
00:16:08,640 --> 00:16:11,180
What made phone phreaking possible
was...
214
00:16:11,520 --> 00:16:14,660
When that started to get automated,
where operators started to get out of
215
00:16:14,660 --> 00:16:19,300
loop so that you could actually use
automated equipment to place a call from
216
00:16:19,300 --> 00:16:20,300
Francisco to Chicago.
217
00:16:20,540 --> 00:16:23,480
And what that meant, the automated
equipment had some vulnerabilities in
218
00:16:23,540 --> 00:16:28,060
which allowed somebody with a little bit
of technical skill to be able to place
219
00:16:28,060 --> 00:16:31,600
their own calls or reroute the calls or
otherwise play with things.
220
00:16:36,739 --> 00:16:41,440
John Draper, who's known as his phone
freak handle as Captain Crunch, was the
221
00:16:41,440 --> 00:16:44,720
guy who discovered something really
interesting about Captain Crunch cereal.
222
00:16:45,240 --> 00:16:48,440
Back in the day, Captain Crunch cereal
came with a little prize, and one of the
223
00:16:48,440 --> 00:16:52,040
prizes was a little tiny whistle, a
little plastic whistle. And it turned
224
00:16:52,040 --> 00:16:55,040
that if you covered up one of the holes
in the whistle, it actually allowed you
225
00:16:55,040 --> 00:16:59,140
to generate a perfect 2600 hertz tone,
and that you could use to whistle your
226
00:16:59,140 --> 00:17:00,340
way into free phone calls.
227
00:17:08,240 --> 00:17:12,520
So if you were good at whistling and you
could whistle 2 ,600 hertz, you could
228
00:17:12,520 --> 00:17:16,099
actually whistle your way to free phone
calls. And there were several people who
229
00:17:16,099 --> 00:17:19,760
could do that. The most famous was a
phone freak at the time known as Joe
230
00:17:19,760 --> 00:17:25,160
Ingresia, later known as Joy Bubbles,
who was a blind fellow gifted with
231
00:17:25,160 --> 00:17:27,960
pitch and able to whistle free phone
calls.
232
00:17:36,650 --> 00:17:38,070
Let's see if I make it this time.
233
00:17:40,750 --> 00:17:44,110
This is really hard to do. It sounded
like all the tones were present, so the
234
00:17:44,110 --> 00:17:46,010
phone should be ringing about now.
235
00:17:47,510 --> 00:17:53,970
Okay, it hit the phone. It just takes a
little while to... From his one phone to
236
00:17:53,970 --> 00:17:58,310
a town in Illinois and back to his other
phone. A thousand mile phone call by
237
00:17:58,310 --> 00:17:59,310
whistling.
238
00:17:59,820 --> 00:18:03,560
So this is a huge problem because we're
not talking about software today where
239
00:18:03,560 --> 00:18:06,920
you just patch a few lines of code and
mail out a CD -ROM or have people
240
00:18:06,920 --> 00:18:08,160
download updates from the Internet.
241
00:18:08,860 --> 00:18:13,760
This is physical plant. This is central
offices all throughout the country that
242
00:18:13,760 --> 00:18:18,900
are using big, huge racks of equipment
that this has got to change if you want
243
00:18:18,900 --> 00:18:19,900
to patch this whole.
244
00:18:21,420 --> 00:18:22,700
Phone calls were really expensive.
245
00:18:22,940 --> 00:18:28,880
It might cost, you know, the equivalent
in today's dollars of $55 for a 10
246
00:18:28,880 --> 00:18:32,180
-minute phone call from San Francisco to
New York, right? It was really
247
00:18:32,180 --> 00:18:34,620
expensive. Long distance was a big deal
back then.
248
00:18:34,860 --> 00:18:37,780
Everyone knows long -distance rates are
lowest at night.
249
00:18:37,980 --> 00:18:43,760
But did you know those same low rates
are in effect all day on Sunday? You can
250
00:18:43,760 --> 00:18:47,740
make a three -minute station -to
-station call to any of 48 states.
251
00:18:48,220 --> 00:18:51,200
For 90 cents or less, anytime on Sunday.
252
00:18:56,880 --> 00:19:00,880
The way a blue box works is it was based
on the observation that when a line is
253
00:19:00,880 --> 00:19:04,020
idle, there's this 2 ,600 hertz tone on
it. So the first thing you do with a
254
00:19:04,020 --> 00:19:07,360
blue box is once you've dialed a long
-distance call and the call is starting
255
00:19:07,360 --> 00:19:10,660
go through, you would send a burst of 2
,600 down the line.
256
00:19:11,280 --> 00:19:14,260
And that 2 ,600 hertz would confuse the
remote central office.
257
00:19:14,520 --> 00:19:17,500
And now they're again listening for
those, they're called multi -frequency
258
00:19:17,500 --> 00:19:21,020
digits. So a blue box is kind of like a
touch -tone generator that can generate
259
00:19:21,020 --> 00:19:22,020
these special digits.
260
00:19:22,060 --> 00:19:24,340
And with those, you can now dial your
own call.
261
00:19:25,290 --> 00:19:29,590
So if you were a bookmaker as part of
organized crime, you spent a lot of time
262
00:19:29,590 --> 00:19:33,610
on the telephone. That cost you a lot of
money in the 1960s. And even worse, it
263
00:19:33,610 --> 00:19:36,850
left telephone records that the FBI
could later get to figure out who your
264
00:19:36,850 --> 00:19:40,570
associates were. If you were using a
blue box, you didn't have to do that.
265
00:19:40,570 --> 00:19:45,250
problem the phone company had is that
they had, from the 1940s on, based
266
00:19:45,250 --> 00:19:46,250
their...
267
00:19:47,010 --> 00:19:51,110
entire network and infrastructure around
this multi -frequency signaling system.
268
00:19:51,370 --> 00:19:54,270
They had been rolling this out across
the entire United States. They'd spent a
269
00:19:54,270 --> 00:19:57,650
lot of money on this. And then it turns
out that, well, it's got this problem
270
00:19:57,650 --> 00:20:01,510
that, you know, a guy with a blue box
and a tone generator, or even a guy who
271
00:20:01,510 --> 00:20:06,490
can whittle, can make free phone calls.
And some estimates at the time were that
272
00:20:06,490 --> 00:20:09,510
it would be, you know, upwards of a
billion dollars, and this was back when
273
00:20:09,510 --> 00:20:12,010
billion dollars was real money, to fix
this whole thing.
274
00:20:12,390 --> 00:20:13,690
So you've got this vulnerability.
275
00:20:14,470 --> 00:20:15,510
What do you do about it?
276
00:20:15,740 --> 00:20:17,300
You can't make it go away overnight.
277
00:20:17,680 --> 00:20:20,740
Even if you had a billion dollars, you
couldn't make it go away overnight.
278
00:20:21,040 --> 00:20:25,040
So then you get into this problem of,
well, we're obviously going to have to
279
00:20:25,040 --> 00:20:26,040
live with this for a while.
280
00:20:26,380 --> 00:20:30,660
But at the same time, we want to keep
this as quiet as possible so that it
281
00:20:30,660 --> 00:20:32,180
doesn't get out that we have this
problem.
282
00:20:33,360 --> 00:20:37,360
But then what do you do when you catch
somebody, when you catch a college kid
283
00:20:37,360 --> 00:20:40,060
who's figured out how to make a blue
box? You've got a blue box outbreak
284
00:20:40,060 --> 00:20:41,140
someplace, right?
285
00:20:41,360 --> 00:20:44,300
What do you do about that? Because if
you prosecute and it gets into the
286
00:20:44,300 --> 00:20:47,600
newspapers, you might well have just
done yourself more harm than good. Now
287
00:20:47,600 --> 00:20:50,360
everybody in that area reads about it
and says, oh, what's the blue box?
288
00:20:50,560 --> 00:20:53,100
That sounds pretty good. I'd like to be
able to make free phone calls.
289
00:21:04,140 --> 00:21:08,380
So in 1971, there was an article in
Esquire magazine by Ron Rosenbaum, which
290
00:21:08,380 --> 00:21:11,920
called Secrets of the Little Blue Box,
which elevated phone frequency and
291
00:21:11,920 --> 00:21:12,920
national attention.
292
00:21:13,290 --> 00:21:17,750
It was so well written and so
intriguingly written, it made what was
293
00:21:17,750 --> 00:21:22,230
a boring and geeky hobby of playing
around with the telephone system seem
294
00:21:22,230 --> 00:21:23,930
it was something out of an espionage
novel.
295
00:21:24,190 --> 00:21:27,170
And it really captured the imagination
of so many people.
296
00:21:27,530 --> 00:21:31,050
The phone company now has a real problem
because they still haven't fixed their
297
00:21:31,050 --> 00:21:34,690
network. They've got a fix on the
horizon, but that fix was going to take
298
00:21:34,690 --> 00:21:35,689
to deploy.
299
00:21:35,690 --> 00:21:39,730
And now you've got all these people who
know about it. When phone freaks have a
300
00:21:39,730 --> 00:21:43,780
convention... As they did in the
ballroom of a seedy New York hotel
301
00:21:44,760 --> 00:21:46,360
Masks are given out at the door.
302
00:21:46,900 --> 00:21:48,880
People don't give their right names.
303
00:21:49,320 --> 00:21:53,740
And the illegal electronic devices which
phone freaks use to defraud the
304
00:21:53,740 --> 00:21:56,040
telephone companies are nowhere to be
seen.
305
00:21:56,560 --> 00:21:59,340
So the cat's out of the bag at this
point. So at that point, starting right
306
00:21:59,340 --> 00:22:03,600
after, around 1970, 1971, right after
the Esquire article, the phone company
307
00:22:03,600 --> 00:22:07,600
started to adopt much more of a
prosecutorial stance, where every time
308
00:22:07,600 --> 00:22:09,780
this, we're going to prosecute it, we're
going to go to law enforcement.
309
00:22:10,160 --> 00:22:13,200
And now at this point, it has to be just
pure deterrence. We have to scare
310
00:22:13,200 --> 00:22:14,260
people into not doing this.
311
00:22:18,600 --> 00:22:22,120
One of the things that the phone company
did when it became aware of blue and
312
00:22:22,120 --> 00:22:27,060
black boxes was it started an internal
investigation unit. And from 1964 to
313
00:22:27,060 --> 00:22:31,140
1970, they randomly monitored some 33
million long -distance calls.
314
00:22:31,540 --> 00:22:36,960
And of those 33 million calls, they
actually tape -recorded between 1 .5 and
315
00:22:36,960 --> 00:22:37,960
.8 million calls.
316
00:22:38,590 --> 00:22:42,450
So in some sense, it's probably the
largest warrantless wiretapping campaign
317
00:22:42,450 --> 00:22:46,170
that anybody has ever undertaken, and it
was done entirely without any approval
318
00:22:46,170 --> 00:22:50,270
from anyone, the government or anything
else. It was simply AT &T doing this.
319
00:22:51,530 --> 00:22:54,950
Keep your eye on that bell, son, and
mark my words.
320
00:22:55,470 --> 00:22:59,790
That as this nation grows, the telephone
will grow with it, and it will play a
321
00:22:59,790 --> 00:23:01,130
strong part in that growing.
322
00:23:02,470 --> 00:23:07,450
And the future that lies ahead is beyond
the belief of any man.
323
00:23:09,640 --> 00:23:13,240
Much of what we've learned about the
universe has actually come from radio
324
00:23:13,240 --> 00:23:17,760
telescopes because they can see things
that optical telescopes can't.
325
00:23:18,260 --> 00:23:23,160
And behind me is one such amateur radio
telescope here in my backyard.
326
00:23:23,720 --> 00:23:29,140
This is a 12 -foot satellite dish that's
been repurposed to operate as a
327
00:23:29,140 --> 00:23:33,840
telescope. If you're a professional
astronomer, you usually are using very
328
00:23:33,840 --> 00:23:35,980
instruments and you have limited...
329
00:23:37,000 --> 00:23:40,780
time to use them because you're
competing with other folks for the
330
00:23:41,440 --> 00:23:45,280
If you have your own system, you can run
it as much as you want and observe
331
00:23:45,280 --> 00:23:46,280
anything you wish.
332
00:23:47,600 --> 00:23:51,320
And the people who do this are hardware
hackers.
333
00:23:52,240 --> 00:23:59,020
These are folks who, just like in the
Homebrew Computer Club, want access to
334
00:23:59,020 --> 00:24:02,160
something that ordinary people normally
can't have.
335
00:24:02,380 --> 00:24:06,000
Well, there's no question that what came
out of the Homebrew Computer Club
336
00:24:06,570 --> 00:24:08,430
changed the world in a major way.
337
00:24:08,730 --> 00:24:14,150
Some may wonder, when did the computer
begin to really compete with television
338
00:24:14,150 --> 00:24:16,670
and radio for our personal attention?
339
00:24:17,010 --> 00:24:21,890
I'd say that for members of the Homebrew
Computer Club, that competition began
340
00:24:21,890 --> 00:24:23,510
back in 1975.
341
00:24:23,910 --> 00:24:27,990
Folks building their own systems became
obsessed with what they were doing to
342
00:24:27,990 --> 00:24:31,050
the point where not only were they not
necessarily watching much TV,
343
00:24:32,320 --> 00:24:37,740
but they were probably not spending much
time with their families because it was
344
00:24:37,740 --> 00:24:41,900
very time consuming to design and
construct and code your own machine.
345
00:24:42,160 --> 00:24:46,680
One of the most well -known members of
the Homebrew Computer Club was Steve
346
00:24:46,680 --> 00:24:47,680
Wozniak.
347
00:24:48,080 --> 00:24:52,720
I was there the night that Steve brought
in a circuit board that he said he was
348
00:24:52,720 --> 00:24:57,020
going to call the Apple and wanted to
know what we all thought about it. It
349
00:24:57,020 --> 00:25:01,240
pretty cool. He had mounted a circuit
board onto a piece of wood and had a
350
00:25:01,240 --> 00:25:03,860
keyboard on it, and it was a self
-contained computer.
351
00:25:04,680 --> 00:25:08,720
A lot of the folks in the club were
making systems that were somewhat
352
00:25:09,760 --> 00:25:12,980
No one at the time had any idea where
his system was going to go.
353
00:25:13,340 --> 00:25:17,280
Nobody in the large corporate
environment really saw much use for the
354
00:25:17,280 --> 00:25:18,119
in the home.
355
00:25:18,120 --> 00:25:22,800
In fact, when we first developed these
systems, there was a lot of skepticism
356
00:25:22,800 --> 00:25:25,980
that we had heard from people on the
outside saying, why do you want a
357
00:25:26,180 --> 00:25:27,179
Who needs a computer?
358
00:25:27,180 --> 00:25:29,060
What good would it be to have one in
your house?
359
00:25:29,720 --> 00:25:32,840
And they just didn't get it.
360
00:25:33,950 --> 00:25:37,830
Comes as no surprise to say that it's
all but impossible to conduct any kind
361
00:25:37,830 --> 00:25:41,130
business these days without a computer.
What is new is that computers are
362
00:25:41,130 --> 00:25:43,310
suddenly becoming a factor beyond
business.
363
00:25:43,870 --> 00:25:47,990
Overnight, manufacturing personal
computers has become a half -billion
364
00:25:47,990 --> 00:25:50,570
business, one that's doubling every two
years.
365
00:25:50,870 --> 00:25:55,730
Stephen Jobs is a 27 -year -old
multimillionaire whose large fortune is
366
00:25:55,730 --> 00:25:57,410
something little, the personal computer.
367
00:25:57,730 --> 00:25:59,030
How many calculators do you own?
368
00:25:59,680 --> 00:26:03,040
Two, maybe? Right. And you have to use
the automatic bank telling machines?
369
00:26:03,320 --> 00:26:06,580
Sure. So life is already seducing you
into learning this stuff.
370
00:26:06,840 --> 00:26:11,620
Random access memory is internal memory
that's built inside of this computer.
371
00:26:12,140 --> 00:26:15,680
They talk their own language here. At
trade shows across the country, when
372
00:26:15,680 --> 00:26:18,980
manufacturers show off their wares, the
house is usually packed.
373
00:26:19,630 --> 00:26:24,750
Small personal computers, selling from
$500 to $5 ,000, are fast becoming a
374
00:26:24,750 --> 00:26:25,990
multi -billion dollar business.
375
00:26:26,230 --> 00:26:29,410
And if words like bits and bytes mean
nothing, try this one.
376
00:26:29,710 --> 00:26:35,270
Money. I have seen the future, said one
industry observer, and it computes.
377
00:26:35,920 --> 00:26:40,620
It is becoming so commonplace that many
of us are becoming dependent on it.
378
00:26:40,760 --> 00:26:45,640
Something that didn't exist a few years
ago to a very large business today. And
379
00:26:45,640 --> 00:26:49,100
in the future, of course, personal
computers, a lot of people anticipate,
380
00:26:49,100 --> 00:26:51,120
be as ubiquitous as the telephone.
381
00:26:51,520 --> 00:26:55,800
Computers have become personal tools as
prices dropped and components shrank.
382
00:26:55,900 --> 00:27:00,460
This personal computer costs about $1
,400 and fits nicely on a desk corner.
383
00:27:00,660 --> 00:27:04,940
The idea of the small computer has
become so big that the giant of computer
384
00:27:04,940 --> 00:27:08,960
companies... IBM is busy marketing its
new small computer.
385
00:27:09,160 --> 00:27:14,140
IBM spending an estimated $13 million on
TV this year alone. Wall Street hit a
386
00:27:14,140 --> 00:27:17,180
record high again today. One of the
better performers was IBM.
387
00:27:17,400 --> 00:27:22,100
The first reliable computer was built by
an American about 50 years ago. Since
388
00:27:22,100 --> 00:27:24,220
then, computers have multiplied like
puree.
389
00:27:24,420 --> 00:27:28,400
Big Mac Day, the day Apple unveiled its
new Macintosh computer to shareholders.
390
00:27:31,420 --> 00:27:34,980
Suddenly, personal computers have become
the business of at least 25
391
00:27:34,980 --> 00:27:40,400
manufacturers, RadioShack, Apple, and
Commodore, grabbing three -quarters of
392
00:27:40,400 --> 00:27:44,600
market. For weeks, the Macintosh has
been rolling off the line, one every 27
393
00:27:44,600 --> 00:27:49,420
seconds. A whole generation is being
weaned on computers, and manufacturers
394
00:27:49,420 --> 00:27:54,360
that guarantees that computers will
become the household appliance of the
395
00:27:54,360 --> 00:27:58,640
future. In more and more schools, small
computers are taking over the job of
396
00:27:58,640 --> 00:28:02,620
teaching reading or math or foreign
language. A generation of children is
397
00:28:02,620 --> 00:28:04,180
becoming comfortable with computers.
398
00:28:04,480 --> 00:28:08,000
Steve Wozniak co -founded Apple, the
most successful of all home computer
399
00:28:08,000 --> 00:28:11,720
companies. In just six years, Apple has
become a half billion dollar a year
400
00:28:11,720 --> 00:28:14,700
corporation, leaving Wozniak worth more
than $50 million.
401
00:28:15,540 --> 00:28:20,500
Retired now at 32, Wozniak had never
been to an outdoor rock concert, so he
402
00:28:20,500 --> 00:28:22,920
$12 .5 million of his dollars and bought
one.
403
00:28:23,940 --> 00:28:28,680
The significance of the emergence of the
personal computer really can't be
404
00:28:28,680 --> 00:28:34,420
understated. Its impact has been
profound and reaches almost every corner
405
00:28:34,420 --> 00:28:35,420
lives.
406
00:28:39,540 --> 00:28:43,420
The big changeover came when people
started getting modems on their home
407
00:28:43,420 --> 00:28:49,320
computers. So you got the home computer,
and you can play your game on it or
408
00:28:49,320 --> 00:28:53,200
whatever, and there were these bulletin
board systems out there.
409
00:28:53,630 --> 00:28:57,590
In the bulletin board systems, you'd
have somebody who was a hobbyist also
410
00:28:57,590 --> 00:29:01,110
get a computer and put a couple of
modems on it and write a bulletin board
411
00:29:01,110 --> 00:29:05,670
package that allowed people to dial in
and yell at each other, make friends,
412
00:29:05,870 --> 00:29:08,310
fight, talk about whatever their hobby
was.
413
00:29:08,630 --> 00:29:12,370
200 years ago in this country, notices
were tacked up on a tree in the village
414
00:29:12,370 --> 00:29:14,610
square which served as a community
bulletin board.
415
00:29:14,830 --> 00:29:18,710
And in the years since, when people
wanted to post a bill, they've used
416
00:29:18,950 --> 00:29:21,370
barns, walls, and buses, not to mention
newspapers.
417
00:29:22,380 --> 00:29:24,360
But now the village bulletin board has
gone electronic.
418
00:29:24,760 --> 00:29:28,880
Generally in your neighborhood or in
your dialing area, there'd be maybe 50,
419
00:29:28,980 --> 00:29:32,200
80 bulletin boards for you to call. And
in a really small town, there might only
420
00:29:32,200 --> 00:29:33,200
be 5 or 10.
421
00:29:33,380 --> 00:29:37,220
And each bulletin board had a different
sort of group of follower.
422
00:29:37,440 --> 00:29:40,460
Like the engineers might like this one,
the hackers might like that one, the
423
00:29:40,460 --> 00:29:43,200
game people might like this one, the
hobbyists might like that one.
424
00:29:43,420 --> 00:29:44,420
And so...
425
00:29:44,720 --> 00:29:47,660
you'd get accounts on a bunch of systems
locally to figure out what the local
426
00:29:47,660 --> 00:29:51,160
scene was like. Phone long distance kept
getting cheaper, so it went from the
427
00:29:51,160 --> 00:29:54,000
standalone island bulletin boards to a
network.
428
00:29:54,220 --> 00:29:58,240
And some of these networks had thousands
and thousands of other bulletin boards.
429
00:29:58,520 --> 00:30:02,800
Back then, it was probably 83 or
something, and computers were just
430
00:30:02,820 --> 00:30:06,540
We were in San Francisco near Silicon
Valley, and my dad decided it was time
431
00:30:06,540 --> 00:30:07,880
get the family a computer.
432
00:30:08,810 --> 00:30:12,250
My sister had no interest in it, so
therefore it ended up in my room. And
433
00:30:12,250 --> 00:30:14,190
when I got hooked, addicted to
computers.
434
00:30:14,390 --> 00:30:18,830
And one guy I was totally jealous of, he
had a modem. He had a 110 -bot acoustic
435
00:30:18,830 --> 00:30:23,010
coupler modem, which is what you see in
old movies now. But through that, he'd
436
00:30:23,010 --> 00:30:27,010
dial up the phone, stick it on the
coupler, and dial up bulletin boards in
437
00:30:27,010 --> 00:30:31,450
San Francisco Bay Area. And through my
friend's computer, a whole new universe
438
00:30:31,450 --> 00:30:33,130
opened up for me. It was unbelievable.
439
00:30:33,750 --> 00:30:36,770
You could be on a bulletin board chat
system.
440
00:30:37,340 --> 00:30:38,500
It's a 14 -year -old kid.
441
00:30:38,820 --> 00:30:42,400
Nobody knows your name. Nobody knows
your age. Nobody knows your education,
442
00:30:42,400 --> 00:30:46,140
ethnicity, anything about you. All they
know about is what you type on the
443
00:30:46,140 --> 00:30:51,200
keyboard. So their entire opinion of you
is based on how logical or how
444
00:30:51,200 --> 00:30:52,200
intelligent you sound.
445
00:30:52,380 --> 00:30:56,300
So you could have these great debates
about music or movies or whatever it is,
446
00:30:56,360 --> 00:30:59,540
and for all they know that you could be
a professor at Berkeley.
447
00:30:59,740 --> 00:31:03,420
And that was really liberating because
it taught me it was all about what you
448
00:31:03,420 --> 00:31:07,020
know. It wasn't about what you looked
like or where you were from or any of
449
00:31:07,020 --> 00:31:08,900
because that just didn't come into the
picture.
450
00:31:09,120 --> 00:31:11,880
And the other thing is that it opened up
this whole other adult universe.
451
00:31:12,180 --> 00:31:15,300
You know, you're like 13, 14 years old.
You're kind of sheltered. You know, you
452
00:31:15,300 --> 00:31:19,160
can't drive a car. You're not watching R
-rated movies. And here you are talking
453
00:31:19,160 --> 00:31:23,300
about drugs or movies or sex or whatever
it is, adult concepts.
454
00:31:24,730 --> 00:31:28,290
You're like 14 years old. The whole
world opened up through the computer for
455
00:31:28,310 --> 00:31:31,630
It was awesome. Because in those days,
it really did feel like exploring. There
456
00:31:31,630 --> 00:31:34,870
was no standard addressing, the WWF,
whatever.
457
00:31:35,090 --> 00:31:39,030
You kind of just got this phone number,
and you would get in there, and then
458
00:31:39,030 --> 00:31:42,450
you'd see what was on the other side of
that computer and where it led to.
459
00:31:42,590 --> 00:31:47,090
Because there were people who really
weren't Internet users. You couldn't
460
00:31:47,090 --> 00:31:51,050
track them back and figure out what
machine they were coming from because
461
00:31:51,050 --> 00:31:52,009
were some kid.
462
00:31:52,010 --> 00:31:54,790
sitting in their parents' basement with
a modem attached to a computer.
463
00:31:55,170 --> 00:32:01,150
And they were on this fairly small sea
of information, but they were completely
464
00:32:01,150 --> 00:32:05,370
anonymous, and they had no vested
interest in behaving because they could
465
00:32:05,370 --> 00:32:07,870
misbehave all that they wanted, and then
all they had to do was turn off their
466
00:32:07,870 --> 00:32:08,870
connection and disappear.
467
00:32:09,030 --> 00:32:13,170
And I remember back then, you would
start to get the first generation of the
468
00:32:13,170 --> 00:32:18,430
games dialers or war dialers who would
call all of the telephones in an entire
469
00:32:18,430 --> 00:32:20,530
urban area and see if a modem picked up.
470
00:32:30,800 --> 00:32:34,480
And then when they got a pickup, they
would try to log in as guest, password
471
00:32:34,480 --> 00:32:39,920
guest, admin, password admin. And
sometimes they'd get in, and it was
472
00:32:39,920 --> 00:32:44,320
shocking. When it makes contact with the
wall of the maze and discovers it
473
00:32:44,320 --> 00:32:49,800
cannot go straight ahead, it turns and
keeps on turning until it has found its
474
00:32:49,800 --> 00:32:50,499
way again.
475
00:32:50,500 --> 00:32:53,980
It explores each step of the way with
its copper whiskers.
476
00:32:54,400 --> 00:32:58,080
Those of us who were running the
machines on the administrative side, the
477
00:32:58,080 --> 00:33:01,480
problem that we were seeing was we would
just see in our system logs that, you
478
00:33:01,480 --> 00:33:05,020
know, someone had tried to log in as a
guest 800 times, and we'd laugh because
479
00:33:05,020 --> 00:33:08,760
maybe we didn't have a guest account,
and we'd know that somebody was playing
480
00:33:08,760 --> 00:33:13,620
around. And it was all seen as kind of
fairly benign activity because we hadn't
481
00:33:13,620 --> 00:33:17,620
really started to see a downstream cost
for all of this kind of activity.
482
00:33:17,960 --> 00:33:21,520
In the mid-'80s, a lot of the hackers
would launch physical attacks.
483
00:33:21,960 --> 00:33:26,720
They would go find a phone company
office, and they would walk in with a
484
00:33:26,720 --> 00:33:29,720
clipboard and try to look official, and
they would look around, and they'd try
485
00:33:29,720 --> 00:33:30,720
to find a modem.
486
00:33:31,040 --> 00:33:34,960
If you found a computer sitting
someplace and it had a modem connected
487
00:33:35,040 --> 00:33:38,560
frequently if you turned the modem over,
there'd be a little plastic tag with
488
00:33:38,560 --> 00:33:41,440
the phone number that the modem was
sitting on, and sometimes there'd be
489
00:33:41,440 --> 00:33:42,440
usernames and passwords.
490
00:33:42,680 --> 00:33:47,200
And some of the hackers had no qualms
whatsoever about just walking into a
491
00:33:47,200 --> 00:33:48,200
building.
492
00:33:48,820 --> 00:33:52,800
coming out with whatever information
they could. Pretty much every kid who's
493
00:33:52,800 --> 00:33:56,440
interested in science and technology at
some point or another goes over the edge
494
00:33:56,440 --> 00:33:59,320
of the dumpster. But there were always
people who would be going in there and
495
00:33:59,320 --> 00:34:02,880
looking for printouts, and it was really
pretty shocking some of the stuff that
496
00:34:02,880 --> 00:34:04,400
you would find getting thrown away.
497
00:34:04,680 --> 00:34:08,840
Oh, wow, look, it's billing information
from the hospital from five years ago.
498
00:34:09,400 --> 00:34:12,820
There wasn't really a model for how to
make money off of that stuff. And we
499
00:34:12,820 --> 00:34:16,920
didn't realize at the time how much it
was going to wind up costing us in the
500
00:34:16,920 --> 00:34:21,000
long run. It was kind of a hobby
environment where people didn't really
501
00:34:21,000 --> 00:34:25,060
like there was anything wrong with going
and diving in somebody's dumpster and
502
00:34:25,060 --> 00:34:28,120
trying to come out with whatever you
could find.
503
00:34:28,340 --> 00:34:31,760
But things were a little bit more Wild
West in those days.
504
00:34:33,420 --> 00:34:34,820
In the early days...
505
00:34:35,280 --> 00:34:37,159
You couldn't own a computer. It was too
expensive.
506
00:34:37,500 --> 00:34:40,600
You couldn't get on the Internet. It was
only for universities and governments.
507
00:34:40,940 --> 00:34:45,480
You couldn't get a computer programming
manual generally, and you couldn't learn
508
00:34:45,480 --> 00:34:48,880
anything about security because there
wasn't anything really written. So
509
00:34:48,880 --> 00:34:52,920
everything was closed, and you had to
break into it. You had to find a way in.
510
00:34:53,340 --> 00:34:57,560
You had to break into a university to
get access on a computer, and then you'd
511
00:34:57,560 --> 00:35:00,600
read all the manual pages learning how
did the computer actually work because
512
00:35:00,600 --> 00:35:01,600
there was no...
513
00:35:01,660 --> 00:35:04,980
material available. And then you had to
find somebody that knew something about
514
00:35:04,980 --> 00:35:06,700
security and convince them to teach you.
515
00:35:06,960 --> 00:35:10,260
And then maybe you would teach someone
else. And then you'd build this
516
00:35:10,260 --> 00:35:12,200
around sharing information.
517
00:35:12,780 --> 00:35:16,780
I think it would have been unheard of in
the mid -1980s that if you found some
518
00:35:16,780 --> 00:35:20,300
kid wandering around in a telephone
company building that they'd call the
519
00:35:20,300 --> 00:35:24,240
and have the guy hauled off. Nowadays,
in the days of Homeland Security, the
520
00:35:24,240 --> 00:35:27,600
would be at Gitmo being waterboarded or
something. What were you doing in the
521
00:35:27,600 --> 00:35:29,160
phone company office? All this kind of
thing.
522
00:35:30,640 --> 00:35:34,840
But in the 80s, it was kind of cute. And
that's how you get these guys like
523
00:35:34,840 --> 00:35:39,920
Kevin Mitnick, who are basically loser
sociopaths, but the entire community
524
00:35:39,920 --> 00:35:43,220
them as cute and interesting people. We
love you, Kevin!
525
00:35:44,820 --> 00:35:48,120
Kevin Mitnick is arguably the most
famous former hacker.
526
00:35:48,580 --> 00:35:49,558
You got me, dude!
527
00:35:49,560 --> 00:35:53,480
At a hacker gathering in Las Vegas,
where he now lives and works as a
528
00:35:53,480 --> 00:35:56,580
consultant, he's treated like a
celebrity.
529
00:35:56,800 --> 00:36:00,060
He served nearly five years in federal
prison for break...
530
00:36:02,140 --> 00:36:05,800
If the 80s was the Wild West, the 90s
would have been the gold rush.
531
00:36:06,340 --> 00:36:10,120
That was when things really started to
get interesting, and that's when the
532
00:36:10,120 --> 00:36:14,460
knives came out as well, because
suddenly you were injecting value into
533
00:36:14,780 --> 00:36:19,820
As soon as the money comes, then you get
these streams of parasites coming in
534
00:36:19,820 --> 00:36:20,820
after the money.
535
00:36:20,840 --> 00:36:27,080
And the innocence of the Internet really
ended around
536
00:36:27,080 --> 00:36:28,080
1994.
537
00:36:29,640 --> 00:36:33,880
Can't afford a computer at home? It's
okay if you have some spare change.
538
00:36:34,340 --> 00:36:39,320
Coin -operated computer terminals have
started popping up in public places like
539
00:36:39,320 --> 00:36:40,960
this San Francisco coffee house.
540
00:36:41,320 --> 00:36:44,440
Users send electronic mail all over the
globe.
541
00:36:44,700 --> 00:36:46,700
Cost, two bits for four minutes.
542
00:36:46,940 --> 00:36:51,120
Connecting people in new ways has become
a major business in this country.
543
00:36:51,740 --> 00:36:56,460
Commercial services like Prodigy,
CompuServe, and America Online, which
544
00:36:56,460 --> 00:37:00,740
information into people's computers
through regular phone lines, now have 4
545
00:37:00,740 --> 00:37:01,740
million subscribers.
546
00:37:02,380 --> 00:37:07,520
The fastest growing of these services,
America Online, charges $9 .95 a month
547
00:37:07,520 --> 00:37:11,380
plus $3 .50 an hour after the first five
hours of use.
548
00:37:11,720 --> 00:37:16,640
Soon as the Internet hit, I'm saying
within two years, within two years
549
00:37:16,640 --> 00:37:20,280
probably, Dial -up bulletin boards went
away. I mean, they died that quickly.
550
00:37:20,620 --> 00:37:24,200
What was the point of dialing up and
having the slow interaction where you
551
00:37:24,200 --> 00:37:25,200
get online immediately?
552
00:37:25,540 --> 00:37:29,000
So what happened there is information
sharing took a great leap forward, but
553
00:37:29,000 --> 00:37:33,060
community collapsed because anybody
could come to your system now on the
554
00:37:33,060 --> 00:37:34,100
Internet from anywhere.
555
00:37:34,300 --> 00:37:38,220
So you got a whole lot of idiots, people
that you couldn't filter them out. I
556
00:37:38,220 --> 00:37:39,480
mean, they used to call it the AOL
effect.
557
00:37:40,780 --> 00:37:44,560
Dial -up system hit the Internet, and
all those people, millions of users,
558
00:37:44,700 --> 00:37:50,040
flooded into the early Internet. It was
just, you know, the IQ level just
559
00:37:50,040 --> 00:37:54,180
dropped like a rock. And so that forced
the people that were trying to have
560
00:37:54,180 --> 00:37:59,260
serious conversations on the net into
the corners, into private groups, and it
561
00:37:59,260 --> 00:38:00,360
stratified the Internet.
562
00:38:00,780 --> 00:38:06,620
AOL was a really interesting aspect of
the early history of the Internet.
563
00:38:07,360 --> 00:38:11,360
They used their huge dial -up
infrastructure to become this portal to
564
00:38:11,360 --> 00:38:17,440
Internet for millions of people. And
that's part of why AOL got so rich, that
565
00:38:17,440 --> 00:38:19,780
they were able to buy Time Warner, if
you think about that.
566
00:38:20,040 --> 00:38:25,520
That moment epitomized the early stage
of the Internet gold rush.
567
00:38:25,740 --> 00:38:31,160
Here you have an old -school mainline
media company, which is used to kind of
568
00:38:31,160 --> 00:38:36,400
shaping American popular culture, gets
bought by a bunch of computer kids who
569
00:38:36,400 --> 00:38:40,810
just... appear out of no place. And it
was, as we all know now, it was a merger
570
00:38:40,810 --> 00:38:45,590
made in hell. But that was really kind
of the symbol of the early stage of the
571
00:38:45,590 --> 00:38:48,110
gold rush. From a security standpoint...
572
00:38:48,780 --> 00:38:52,360
AOLs coming on the Internet brought us
millions of new users.
573
00:38:52,620 --> 00:38:57,360
And I think that was really when you
first started to see people doing scams
574
00:38:57,360 --> 00:39:00,060
get people's passwords, people doing
online fraud.
575
00:39:01,380 --> 00:39:05,520
Millions of new users means millions of
new victims. People were literally just
576
00:39:05,520 --> 00:39:09,300
kind of buying machines and plugging
them in as fast as they could. And
577
00:39:09,300 --> 00:39:12,300
everybody was saying, well, we'll worry
about securing it later.
578
00:39:12,780 --> 00:39:15,080
And now for a traffic report of sorts.
579
00:39:15,320 --> 00:39:20,440
This one is from the Information
Superhighway. In a word, it is jammed.
580
00:39:20,440 --> 00:39:21,860
online jams the Internet.
581
00:39:22,240 --> 00:39:26,720
And for some, the World Wide Web becomes
the World Wide Wait.
582
00:39:26,960 --> 00:39:30,920
Hacking really changed when money got
involved, when computers became free,
583
00:39:30,920 --> 00:39:35,000
AOL gave away free Internet access, when
everybody has a spare computer. The
584
00:39:35,000 --> 00:39:39,160
things that were motivating you in the
first place are no longer there.
585
00:39:39,690 --> 00:39:43,230
So you have to find a new reason. What's
the new thing that motivates you if all
586
00:39:43,230 --> 00:39:44,370
the old motivations are gone?
587
00:39:44,610 --> 00:39:48,210
All of the systems, all of the software,
all the components on which the first
588
00:39:48,210 --> 00:39:53,090
couple of years of the big commercial
Internet were built, none of it was
589
00:39:53,090 --> 00:39:55,630
designed really with good security in
mind.
590
00:39:55,890 --> 00:40:02,390
I'm informed that you think that within
30 minutes, the seven of you could
591
00:40:02,390 --> 00:40:05,230
make the Internet unusable for the
entire nation.
592
00:40:05,900 --> 00:40:06,799
Is that correct?
593
00:40:06,800 --> 00:40:10,840
That's correct. It would definitely take
a few days for people to figure out
594
00:40:10,840 --> 00:40:14,640
what was going on. This will be an
ongoing effort to try to make sure we
595
00:40:14,640 --> 00:40:18,380
all the benefits of the Internet, all
the benefits of the computer revolution,
596
00:40:18,680 --> 00:40:21,880
but we develop better defenses and
better defenders.
597
00:40:22,200 --> 00:40:28,280
Hacking has changed a lot over the
years. It used to be almost an
598
00:40:28,280 --> 00:40:32,800
pursuit. I heard it likened to a
spelunking one.
599
00:40:33,190 --> 00:40:35,230
where you're just kind of exploring.
600
00:40:35,450 --> 00:40:41,350
And in the late 80s, early 90s, it very
much felt like that. There was this
601
00:40:41,350 --> 00:40:44,210
cavernous, dark internet.
602
00:40:45,070 --> 00:40:50,670
And you could find things in there if
you went looking. And most of the people
603
00:40:50,670 --> 00:40:57,030
that I knew at the time that did that
were out for access. They were out for
604
00:40:57,030 --> 00:41:01,870
exploration, for learning, that sort of
thing. Very few people were out for
605
00:41:01,870 --> 00:41:07,290
profit. Police say they've arrested the
cyber mastermind responsible for
606
00:41:07,290 --> 00:41:12,170
infecting 12 million computers around
the world. Today, it's very, very
607
00:41:12,170 --> 00:41:14,110
different. Even the hacker mentality.
608
00:41:14,380 --> 00:41:18,920
is a much different breed. Some of the
younger kids have a moral flexibility
609
00:41:18,920 --> 00:41:22,740
that would make a Fortune 500 CEO blush.
610
00:41:23,140 --> 00:41:26,360
The hackers nowadays are oftentimes
professionals.
611
00:41:26,880 --> 00:41:31,700
They've been trained to do this. They
work for organizations that do this.
612
00:41:31,920 --> 00:41:36,640
You yourself sitting at home, you know,
shopping online and reading your email,
613
00:41:36,680 --> 00:41:41,240
you are the target. And they're after
you and they're after your financial
614
00:41:41,240 --> 00:41:43,300
information. They're after your money.
615
00:41:43,600 --> 00:41:48,260
in Eastern Europe, you have a lot of
individuals that are very intelligent
616
00:41:48,260 --> 00:41:53,220
underemployed. And that may sound
cliche, but that is the circumstance
617
00:41:53,220 --> 00:41:55,900
they're in. And so they become
entrepreneurs.
618
00:41:56,840 --> 00:42:02,200
And they create companies. However, the
motivation of the company is not to make
619
00:42:02,200 --> 00:42:04,660
money for the common good. It's to make
money for themselves.
620
00:42:04,880 --> 00:42:09,160
And so they remain black hats and they
remain hackers.
621
00:42:09,540 --> 00:42:13,880
Computer hackers in Russia reportedly
succeeded in breaking into the
622
00:42:13,880 --> 00:42:18,720
money transfer system of Citibank.
Organized hacker groups, primarily from
623
00:42:18,720 --> 00:42:23,140
Russia and Ukraine, are said to be
targeting U .S. companies, stealing
624
00:42:23,140 --> 00:42:26,020
of dollars in credit card numbers.
There's a lot of bias.
625
00:42:26,250 --> 00:42:27,009
that exists.
626
00:42:27,010 --> 00:42:32,370
When I work with U .S. representatives,
you know, they will say that, oh, this
627
00:42:32,370 --> 00:42:36,910
other country is attacking us. And then
I go to the other country and they're
628
00:42:36,910 --> 00:42:38,590
saying, oh, the Americans are attacking
us.
629
00:42:38,850 --> 00:42:42,390
And they're more technologically
advanced. So every country is panicking
630
00:42:42,390 --> 00:42:43,049
each other.
631
00:42:43,050 --> 00:42:46,770
The newspaper gets all upset, you know,
North Korea or China is hacking into our
632
00:42:46,770 --> 00:42:49,030
computers. Well, yeah, they are.
633
00:42:49,580 --> 00:42:53,580
But the other side is the United States
is doing that to Russia and China and
634
00:42:53,580 --> 00:42:57,540
Japan and France is doing it to us and
England's doing it to Norway and
635
00:42:57,540 --> 00:43:02,700
everyone's doing it. The advantage that
I have is I'm, in a sense, neutral.
636
00:43:02,920 --> 00:43:08,480
I'm in the business of tech, media,
cyber security.
637
00:43:09,120 --> 00:43:12,520
I don't particularly represent any
government or...
638
00:43:13,210 --> 00:43:14,210
any corporation.
639
00:43:22,590 --> 00:43:29,350
Growing up, being a little boy, I
640
00:43:29,350 --> 00:43:33,690
always looked at technology and media as
a means to
641
00:43:34,410 --> 00:43:36,150
Look, a window to the outside.
642
00:43:36,490 --> 00:43:41,790
And my father was the first person who
brought a personal computer into the
643
00:43:41,790 --> 00:43:46,130
Soviet Union. And I remember being a
little boy, playing on this massive
644
00:43:46,130 --> 00:43:51,750
machine, typing like this, big keys. And
all of this made me realize how
645
00:43:51,750 --> 00:43:54,490
important and how fast this technology
grows.
646
00:43:54,690 --> 00:43:56,550
It really, truly is a fascinating place.
647
00:43:56,770 --> 00:44:01,610
Three, two, one, zero. All engines on.
648
00:44:06,060 --> 00:44:10,220
You have air, land, space, and maritime.
649
00:44:10,460 --> 00:44:14,440
Cyber is the new sphere. It's the fifth
common domain.
650
00:44:15,640 --> 00:44:17,080
It's not just internet.
651
00:44:17,280 --> 00:44:21,740
Cyber is your cell phone, your mobile
phone connected to your PC.
652
00:44:22,520 --> 00:44:27,220
which is connected to the grid, which is
connected, the grid's connected to the
653
00:44:27,220 --> 00:44:31,900
traffic lights, to the air traffic
control, to the satellites, to the
654
00:44:31,900 --> 00:44:34,580
weapons, to the nuclear power station
and the arms forces.
655
00:44:34,780 --> 00:44:39,480
So suddenly you have this massive
connection everywhere.
656
00:45:25,770 --> 00:45:30,570
It is kind of amazing the
transformations that have occurred even
657
00:45:30,570 --> 00:45:35,990
lifetime, and I'm not that old. We've
seen just an increase in data being
658
00:45:35,990 --> 00:45:39,110
everywhere and the ability to access
things on the Internet.
659
00:45:39,410 --> 00:45:43,070
Whenever my kids ask me a question and I
don't know the answer, they say, well,
660
00:45:43,190 --> 00:45:44,690
we should just ask Google. Google knows.
661
00:45:45,110 --> 00:45:48,670
And they just kind of take for granted
that information is out there and
662
00:45:48,670 --> 00:45:54,520
available. Privacy was sort of de facto
protected in the olden days just by
663
00:45:54,520 --> 00:45:57,740
virtue of how difficult it was to
collect information.
664
00:45:57,980 --> 00:46:02,240
And now with computer technology, what's
happened is that it's really made the
665
00:46:02,240 --> 00:46:03,640
collection of this information.
666
00:46:04,350 --> 00:46:08,050
Very cheap and easy because primarily a
lot of companies have interest in
667
00:46:08,050 --> 00:46:12,390
collecting information about you, and
consumers have an interest in giving up
668
00:46:12,390 --> 00:46:15,770
this information about themselves,
whether it be to a social network that
669
00:46:15,770 --> 00:46:20,630
who your friends are or to Amazon that
knows what books you're interested in or
670
00:46:20,630 --> 00:46:22,650
to Google that knows what you're
searching for.
671
00:46:22,930 --> 00:46:27,790
I remember at one point when I was
traveling in China and in the gift shops
672
00:46:27,790 --> 00:46:31,510
they like to bring American tourists
into, they actually do follow you
673
00:46:31,630 --> 00:46:34,700
and every time you look at something,
they're like, They offer a suggestion
674
00:46:34,700 --> 00:46:37,500
that, oh, very nice product, you should
purchase it.
675
00:46:37,980 --> 00:46:40,140
And it was kind of a creepy feeling.
676
00:46:40,380 --> 00:46:42,840
And that's sort of what happens online.
677
00:46:43,280 --> 00:46:48,380
When you use a bookseller like Amazon
.com, they're keeping information not
678
00:46:48,380 --> 00:46:51,540
about what books you buy and where your
house is that they have to ship the
679
00:46:51,540 --> 00:46:52,780
books to, but about what books you
browse.
680
00:46:53,040 --> 00:46:57,120
All that information gets collected and
stored and is potentially available to
681
00:46:57,120 --> 00:47:01,780
civil litigants and to the government
later on. This is some of the most
682
00:47:01,780 --> 00:47:05,380
kinds of information, what books you're
interested in, what you search on
683
00:47:05,380 --> 00:47:09,060
Google. You know, Google looks at your
search histories and they use that
684
00:47:09,060 --> 00:47:10,500
information for all sorts of purposes.
685
00:47:10,840 --> 00:47:14,460
Think about how you would feel if
somebody could get access to...
686
00:47:14,700 --> 00:47:17,660
What you're searching for is basically
what are you thinking? What are you
687
00:47:17,660 --> 00:47:21,980
interested in? Some of the most intimate
personal information that's out there.
688
00:47:22,160 --> 00:47:26,880
As we move around with our mobile
phones, we move from cell tower to cell
689
00:47:26,980 --> 00:47:28,240
and this creates records.
690
00:47:28,560 --> 00:47:32,880
And these records are retained by the
service carriers for many years,
691
00:47:33,040 --> 00:47:34,840
ostensibly for billing disputes.
692
00:47:35,240 --> 00:47:40,140
But they can also be used later to
figure out where you were at any given
693
00:47:40,140 --> 00:47:40,859
in time.
694
00:47:40,860 --> 00:47:44,200
Every time you have your cell phone on,
not even when you're making a call. But
695
00:47:44,200 --> 00:47:47,880
just when you have your cell phone on,
that enables them to find out physically
696
00:47:47,880 --> 00:47:52,340
where you are. It's something that I
think is really of concern to people.
697
00:47:52,580 --> 00:47:56,420
People think that that information
should be private. And we understand
698
00:47:56,420 --> 00:47:59,140
could be followed on the public street,
but we think that that requires the
699
00:47:59,140 --> 00:48:03,740
government to have a good reason and to
be worth the money for them to appoint
700
00:48:03,740 --> 00:48:08,160
an officer to follow us. In the U .S.,
we actually don't have very many privacy
701
00:48:08,160 --> 00:48:12,980
laws, which comes as a surprise to a lot
of people who just sort of assume that
702
00:48:12,980 --> 00:48:15,140
the government maybe is protecting them.
703
00:48:15,660 --> 00:48:19,640
There is no right to privacy in this
country. Let me just say that out loud.
704
00:48:20,260 --> 00:48:21,620
It's not in the Constitution.
705
00:48:22,080 --> 00:48:26,960
It's not in any of the Bill of Rights or
any other amendment. There is no right
706
00:48:26,960 --> 00:48:30,560
to privacy. The way it is now, I don't
own my own identity. If I give it to
707
00:48:30,560 --> 00:48:33,800
Facebook, they own it. I can't go back
to them and say, you know what?
708
00:48:34,140 --> 00:48:37,120
I want to change that. I don't want that
to be visible anymore. They say, too
709
00:48:37,120 --> 00:48:39,180
bad. You gave it to us. It's in our
systems. It's there forever.
710
00:48:39,900 --> 00:48:42,780
We're going to sell it. We're going to
monetize it. We're going to create like
711
00:48:42,780 --> 00:48:47,380
graphic analysis of who our users are so
we can better target advertising to
712
00:48:47,380 --> 00:48:50,960
them. People think that they're the
customers of Facebook or Google or
713
00:48:50,960 --> 00:48:52,160
LiveJournal or Twitter.
714
00:48:52,440 --> 00:48:53,740
In fact, they're not.
715
00:48:55,040 --> 00:48:59,520
They're the products of these companies
that they sell to their customers who
716
00:48:59,520 --> 00:49:00,520
are the advertisers.
717
00:49:01,080 --> 00:49:06,700
The reason Facebook is free, the reason
Gmail is free, is not because the
718
00:49:06,700 --> 00:49:07,720
company likes you.
719
00:49:08,200 --> 00:49:10,720
It's because you are their product.
720
00:49:10,960 --> 00:49:15,340
And by making it free, they get a better
product they can sell to their
721
00:49:15,340 --> 00:49:20,100
advertisers. Over the last few years,
we've heard the CEOs of several major
722
00:49:20,100 --> 00:49:22,220
technology companies talk about the
death of privacy.
723
00:49:22,780 --> 00:49:26,240
Eric Schmidt of Google talks about it.
Larry Ellison of Oracle.
724
00:49:27,230 --> 00:49:31,590
We're hearing it from Mort Zuckerberg of
Facebook that the rules of privacy are
725
00:49:31,590 --> 00:49:33,570
changing and people expect less privacy.
726
00:49:33,810 --> 00:49:38,890
What's interesting is those are the very
CEOs that are deliberately undermining
727
00:49:38,890 --> 00:49:44,600
privacy. At a presentation to
advertisers in 2007, Mark Zuckerberg
728
00:49:44,600 --> 00:49:46,980
benefits of Facebook's vast database.
729
00:49:47,360 --> 00:49:51,060
On Facebook, we know exactly what gender
someone is and exactly how old they are
730
00:49:51,060 --> 00:49:54,900
and exactly what they're interested in.
We're finding a very slow and deliberate
731
00:49:54,900 --> 00:50:01,720
ratcheting down of privacy from all of
these companies because they make
732
00:50:01,720 --> 00:50:06,440
money from people sharing, from
information being visible, from
733
00:50:06,440 --> 00:50:08,660
being collated and networked.
734
00:50:09,420 --> 00:50:13,380
and being seen by others. A lot of my
friends have grown up with nothing but
735
00:50:13,380 --> 00:50:15,200
computers. That's all they know are
computers.
736
00:50:15,760 --> 00:50:19,740
Well, starting with them, there's an
electronic digital record of everything
737
00:50:19,740 --> 00:50:20,860
they've ever done online.
738
00:50:21,460 --> 00:50:25,180
Now, whether or not the record is kept,
somebody deletes the hard drive or
739
00:50:25,180 --> 00:50:26,620
throws away the backup tapes, fine.
740
00:50:27,120 --> 00:50:29,180
But records are being kept.
741
00:50:29,440 --> 00:50:32,560
Hard drives, data storage is cheap.
It'll be around forever.
742
00:50:33,550 --> 00:50:36,730
So can you imagine the implications? How
does that change your behavior if
743
00:50:36,730 --> 00:50:39,150
everything you've ever done is recorded
somewhere?
744
00:50:39,650 --> 00:50:43,250
Can you imagine what the presidential
debates will be like 20, 30 years from
745
00:50:43,250 --> 00:50:47,890
when they're pulling up your first
tweet, your first Facebook love note,
746
00:50:47,890 --> 00:50:51,270
first status change on Google Talk where
you said you were going to go get
747
00:50:51,270 --> 00:50:56,050
hammered? I mean, it's fundamentally
going to change the way that people
748
00:50:56,230 --> 00:50:59,210
There's a common myth that privacy is
about something to hide. I don't have
749
00:50:59,210 --> 00:51:00,450
anything to hide, so I don't need
privacy.
750
00:51:00,990 --> 00:51:02,410
But you know that's not true.
751
00:51:02,840 --> 00:51:08,500
I mean, we don't have anything to hide
when we sing in the shower or write a
752
00:51:08,500 --> 00:51:10,020
love letter and then tear it up.
753
00:51:10,700 --> 00:51:14,760
Privacy is about us as individuals.
754
00:51:15,060 --> 00:51:21,080
It's about our ability to be who we are
without necessarily telling everybody.
755
00:51:21,460 --> 00:51:25,000
I mean, when someone says I have nothing
to hide, just ask them, what's your
756
00:51:25,000 --> 00:51:26,840
salary? What are your sexual fetishes?
757
00:51:27,540 --> 00:51:29,840
What kind of diseases do you have?
758
00:51:30,250 --> 00:51:33,210
I mean, it's not about hiding. It's
about personal dignity.
759
00:51:33,630 --> 00:51:36,130
This baby is just one second old.
760
00:51:37,330 --> 00:51:42,390
Here in the delivery room of Mount Sinai
Hospital in New York, he has just won
761
00:51:42,390 --> 00:51:45,330
his first fight, the fight to life.
762
00:51:46,630 --> 00:51:48,570
His footprints are taken for
identification.
763
00:51:49,330 --> 00:51:52,490
He is still less than a minute old, and
this is his first record.
764
00:51:53,070 --> 00:51:58,250
This newborn boy and all the others of
his generation face a new and serious
765
00:51:58,250 --> 00:52:03,380
battle. which they may not win the right
to privacy.
766
00:52:05,300 --> 00:52:09,620
Data is a fundamental byproduct of every
computer -mediated interaction.
767
00:52:10,860 --> 00:52:15,420
You used to throw a quarter into a toll
booth. Now you use an E -ZPass, and a
768
00:52:15,420 --> 00:52:16,420
record is saved.
769
00:52:16,860 --> 00:52:22,560
You used to chat with someone over a
water cooler or across a partition in
770
00:52:22,560 --> 00:52:26,940
office, but now that's done over IM or
SMS, and that data is being saved.
771
00:52:28,020 --> 00:52:33,880
Right? So things that used to be
ephemeral are now permanent.
772
00:52:34,520 --> 00:52:39,520
And more and more of that data is being
saved and sifted through and used by
773
00:52:39,520 --> 00:52:41,820
government, by corporations, by
marketers.
774
00:52:42,240 --> 00:52:47,500
I mean, you can find, if you go on the
net and you start searching for, maybe
775
00:52:47,500 --> 00:52:50,700
you're going to buy a new house or move
in and get a new apartment, start
776
00:52:50,700 --> 00:52:54,420
looking at real estate or rental
listings, you go on Facebook and
777
00:52:54,420 --> 00:52:55,420
you're going to see ads.
778
00:52:56,240 --> 00:52:57,860
For real estate companies or rental
companies.
779
00:52:58,940 --> 00:53:02,440
And that sometimes feels a bit icky.
780
00:53:03,880 --> 00:53:08,280
We're finding more and more that as
people surf on the net, they're being
781
00:53:08,280 --> 00:53:13,800
followed. They're being followed and a
profile about them is being collected
782
00:53:13,800 --> 00:53:14,800
then sold to others.
783
00:53:15,100 --> 00:53:17,320
And this is without people's knowledge
or consent.
784
00:53:17,580 --> 00:53:20,280
You might sort of know what's going on,
but not really.
785
00:53:21,280 --> 00:53:24,500
A meeting of the American Civil
Liberties Union in Washington.
786
00:53:25,340 --> 00:53:30,040
These men are fearful that the National
Data Center poses a threat to privacy
787
00:53:30,040 --> 00:53:31,800
and the American way of life.
788
00:53:32,060 --> 00:53:38,840
All we can expect is to hold off the
data bank for a while, to get in our
789
00:53:38,840 --> 00:53:44,060
links, because there are not only
governmental data banks, there are
790
00:53:44,060 --> 00:53:47,840
data banks. The data center is not just
here and now.
791
00:53:48,260 --> 00:53:52,480
You build it with the best intentions
now, you build it with limitations now,
792
00:53:52,580 --> 00:53:53,700
and tomorrow those...
793
00:53:53,950 --> 00:53:56,810
intentions may pass and the limitations
may dissolve.
794
00:53:57,270 --> 00:53:59,670
We always talk about security versus
privacy.
795
00:53:59,890 --> 00:54:01,110
There's some sort of balance.
796
00:54:01,670 --> 00:54:06,010
And the government likes to use that
trade -off. How much privacy would you
797
00:54:06,010 --> 00:54:07,010
up for security?
798
00:54:07,390 --> 00:54:09,970
Being secure requires you to give up
some privacy.
799
00:54:10,230 --> 00:54:12,490
I think it's a false dichotomy. I think
it's actually a red herring.
800
00:54:12,750 --> 00:54:14,650
Security and privacy go hand in hand.
801
00:54:15,390 --> 00:54:20,850
We do not feel more secure when our
private data is released.
802
00:54:21,090 --> 00:54:23,010
We don't feel more secure.
803
00:54:23,630 --> 00:54:25,910
in a police state with its ubiquitous
surveillance.
804
00:54:26,470 --> 00:54:29,350
That privacy is essential for security.
805
00:54:30,150 --> 00:54:33,010
And good security provides for privacy.
806
00:54:33,550 --> 00:54:37,150
It's only bad security that goes in
opposition to privacy.
807
00:54:37,410 --> 00:54:38,950
A great example is airplane security.
808
00:54:39,430 --> 00:54:42,910
After 9 -11, there have been exactly two
things that have improved security.
809
00:54:43,290 --> 00:54:47,210
The first one is reinforcing the cockpit
door. And the second is passengers
810
00:54:47,210 --> 00:54:48,710
knowing they have to fight back.
811
00:54:49,330 --> 00:54:52,070
Those two measures have nothing to do
with privacy.
812
00:54:52,940 --> 00:54:57,760
If you think about the airplane security
measures that affect privacy, the photo
813
00:54:57,760 --> 00:55:02,040
ID check, the full body scanners, they
actually don't improve security.
814
00:55:03,040 --> 00:55:04,760
They're what I call security theater.
815
00:55:05,680 --> 00:55:08,580
Real security goes hand in hand with
privacy.
816
00:55:09,240 --> 00:55:14,440
How do we create a world where freedom
and expression is still valued and
817
00:55:14,440 --> 00:55:21,240
protected at the same time as security
is maintained?
818
00:55:21,820 --> 00:55:28,240
So there will always be a battle, a
battle between privacy, security, and
819
00:55:28,240 --> 00:55:29,240
essence of the Internet.
820
00:56:04,840 --> 00:56:08,020
This is Harry Butler, a real great guy.
821
00:56:08,320 --> 00:56:12,920
Harry's a very busy man, and he's
conscientious and hardworking.
822
00:56:14,400 --> 00:56:19,140
But security -wise, Harry is naive.
823
00:56:19,720 --> 00:56:23,460
What? You heard me. You don't know what
security is.
824
00:56:23,780 --> 00:56:24,780
What do you mean?
825
00:56:25,120 --> 00:56:29,280
Information security has a physical
component. There's no doubt about it.
826
00:56:29,560 --> 00:56:35,100
It's not just someone from overseas
trying to get in with an exploit.
827
00:56:35,360 --> 00:56:38,240
That's kind of the trick shot of
hacking.
828
00:56:40,980 --> 00:56:46,240
There's a physical aspect to it,
especially at a local level, where if
829
00:56:46,240 --> 00:56:51,040
can access your data networks, they can
steal your data. And we're often paid to
830
00:56:51,040 --> 00:56:52,640
test that.
831
00:56:53,040 --> 00:56:57,720
One of my favorite ways into a company
is the smoking door. You'll find like a
832
00:56:57,720 --> 00:56:59,100
car swipe to get in and out.
833
00:56:59,340 --> 00:57:04,380
So all you have to do is find the
smoking door, walk up to the door when
834
00:57:04,380 --> 00:57:06,360
one's there, and have a lit cigarette.
835
00:57:09,140 --> 00:57:14,720
When the door opens, just quickly crush
out your cigarette and say thank you,
836
00:57:14,780 --> 00:57:18,180
grab the door and walk in, and it works
every time.
837
00:57:19,580 --> 00:57:26,040
Another really clever way that I like
getting in is a USB key, which
838
00:57:26,040 --> 00:57:31,500
I've written some very simple software
that will use the computer it's plugged
839
00:57:31,500 --> 00:57:34,780
into to tunnel out and give us control
of that computer.
840
00:57:35,060 --> 00:57:40,100
And then we take that key and we label
it, usually something to the effect of
841
00:57:40,100 --> 00:57:42,080
your company's name and HR.
842
00:57:42,670 --> 00:57:47,390
you know, something tempting to plug in.
And then we have someone walk that into
843
00:57:47,390 --> 00:57:51,310
the receptionist and explain that they
found it in the parking lot or they
844
00:57:51,310 --> 00:57:55,070
it in the lobby of the building and it's
got your name on it, it must be yours.
845
00:57:55,330 --> 00:58:00,850
Of course, minutes after the person
drops the key, we're waiting for this
846
00:58:00,850 --> 00:58:05,770
get the hookup from the computer when
they plug it in and then we're in and
847
00:58:05,770 --> 00:58:06,770
and running.
848
00:58:07,610 --> 00:58:11,190
Would it be dangerous for everyone to
walk around with the knowledge I have? I
849
00:58:11,190 --> 00:58:12,210
would worry about that.
850
00:58:12,560 --> 00:58:18,040
Throughout my career, I've made a lot of
difficult choices. The temptation to
851
00:58:18,040 --> 00:58:22,640
just do something that goes over the
line is always there. I've been working
852
00:58:22,640 --> 00:58:27,120
this for many, many years. I have a lot
of experience, and I've been offered
853
00:58:27,120 --> 00:58:28,520
some pretty tempting...
854
00:58:29,720 --> 00:58:35,820
In one case, a briefcase full of cash to
do something that was very wrong would
855
00:58:35,820 --> 00:58:39,680
have been very easy to do, probably
wouldn't have gotten caught. But you
856
00:58:39,680 --> 00:58:43,400
make a decision in life because once you
go to that side and get caught, you can
857
00:58:43,400 --> 00:58:44,600
never really come back.
858
00:58:46,460 --> 00:58:48,960
People can't protect what they don't
understand.
859
00:58:49,500 --> 00:58:53,640
How do you evaluate the risk around
what's the risk of having a computer
860
00:58:53,640 --> 00:58:54,640
-controlled car?
861
00:58:54,960 --> 00:58:58,780
Well... People don't really know. We've
never had computer -controlled cars
862
00:58:58,780 --> 00:59:01,800
before, and it's not something that we
sort of intuitively understand.
863
00:59:02,280 --> 00:59:05,920
You know, if you're at the ATM and
there's a shady guy next to you, you get
864
00:59:05,920 --> 00:59:10,420
that, like viscerally. Your brain, your
little reptile part of your brain says,
865
00:59:10,500 --> 00:59:12,120
danger, danger, something weird here.
866
00:59:12,780 --> 00:59:16,340
But your brain doesn't necessarily pick
up that the keypad looks a little
867
00:59:16,340 --> 00:59:19,660
unusual. because somebody swapped it
with a keyboard capturing device.
868
00:59:19,920 --> 00:59:23,400
Or where you put your card into the ATM,
that looks a little fatter than it
869
00:59:23,400 --> 00:59:26,120
normally does. Well, that's because
somebody's put a capture device over it.
870
00:59:26,340 --> 00:59:30,200
We don't get that intuitively, not like
a shady character right there.
871
00:59:30,440 --> 00:59:36,120
And so as humans, we just aren't good at
estimating and managing risk when it
872
00:59:36,120 --> 00:59:39,100
comes to computers. And that's going to
get us into all kinds of trouble.
873
00:59:39,320 --> 00:59:45,460
I see people that will go out to a
public, free public Wi -Fi cafe.
874
00:59:46,280 --> 00:59:50,480
And they'll access their banking
information or they'll make a purchase
875
00:59:50,740 --> 00:59:55,680
And they won't stop and think, is this a
safe place for me to be conducting a
876
00:59:55,680 --> 00:59:58,720
transaction? Is this something I should
be doing out in public?
877
00:59:59,140 --> 01:00:03,920
Until we start thinking in those terms,
I think we're going to find that the
878
01:00:03,920 --> 01:00:09,060
problem of identity theft and cybercrime
is going to be with us for a while.
879
01:00:09,560 --> 01:00:12,560
A lot of people who are on the network,
people we want to have on the network,
880
01:00:12,620 --> 01:00:17,520
like my mom and dad, aren't really
capable of securing their own computer
881
01:00:17,520 --> 01:00:21,660
or maybe even of understanding why it is
that they shouldn't be checking their
882
01:00:21,660 --> 01:00:25,440
email or their bank statement in the
coffee shop or something like that.
883
01:00:25,900 --> 01:00:27,600
Or they may just simply...
884
01:00:28,040 --> 01:00:31,340
They misassess the risk. They may
understand that there's a risk that
885
01:00:31,340 --> 01:00:34,460
might be using a sniffer and they look
around the room and they think everybody
886
01:00:34,460 --> 01:00:37,840
looks pretty busy, you know, reading the
paper and drinking their coffee and
887
01:00:37,840 --> 01:00:40,880
they really need to get their email and
they take that chance.
888
01:00:41,180 --> 01:00:46,040
I just don't think that it's fair to put
the full burden of that on the
889
01:00:46,040 --> 01:00:49,600
individual. There's a whole hobby called
war driving, which is just driving
890
01:00:49,600 --> 01:00:53,180
around and accessing other people's
wireless networks and seeing how many
891
01:00:53,180 --> 01:00:53,959
can rack up.
892
01:00:53,960 --> 01:00:56,960
It's really easy to just drive around
the neighborhood and get into people's
893
01:00:56,960 --> 01:01:01,580
networks. And even if they have basic
wireless encryption, that's usually not
894
01:01:01,580 --> 01:01:04,860
preventing people because most of those
protocols have been hacked and you don't
895
01:01:04,860 --> 01:01:08,020
even need to do any work to get in. Once
you're in someone's wireless network,
896
01:01:08,200 --> 01:01:10,020
then you're seeing all the traffic
that's getting sent across.
897
01:01:10,520 --> 01:01:15,260
So if they're typing credit card
information or social security numbers,
898
01:01:15,260 --> 01:01:17,920
data can be sniffed right out of the air
by anyone.
899
01:01:18,430 --> 01:01:22,030
within range of that network. And there
are people driving around just trying to
900
01:01:22,030 --> 01:01:25,730
do that for fun. So if someone wants to
steal your private information, they're
901
01:01:25,730 --> 01:01:28,810
probably going to get it. Years ago,
you'd have to have a complete computer
902
01:01:28,810 --> 01:01:31,970
system with you to do any hacking or
access to a complete computer system.
903
01:01:32,410 --> 01:01:36,410
Nowadays, you can make a complete
hacking system out of a cell phone.
904
01:01:36,910 --> 01:01:41,450
This looks like a fairly typical iPhone,
or at least it would appear so. This
905
01:01:41,450 --> 01:01:46,630
iPhone has been modified, though, to run
applications that are not approved by
906
01:01:46,630 --> 01:01:51,730
Apple. In this case, specifically one
designed to remotely take over other
907
01:01:51,730 --> 01:01:55,870
computers from either across the
Internet or, in our case, across an open
908
01:01:55,870 --> 01:01:58,350
wireless network. It's actually a cafe.
909
01:01:59,000 --> 01:02:03,220
So we'll start by pulling up a terminal.
And in the terminal, what we're going
910
01:02:03,220 --> 01:02:08,840
to do is run an application called
Metasploit that will allow us to run an
911
01:02:08,840 --> 01:02:14,100
exploit and take over a machine. You can
look at the exploit as how you get into
912
01:02:14,100 --> 01:02:15,100
the vulnerable application.
913
01:02:16,200 --> 01:02:19,700
So having identified a specific
computer,
914
01:02:20,440 --> 01:02:25,140
From across the street, over an open
wireless network, we'll collect our
915
01:02:25,140 --> 01:02:31,680
first. In our case, we're going to
choose a Microsoft exploit, since our
916
01:02:31,680 --> 01:02:37,500
computer that we're looking at appears
to be quite behind on its patches. We're
917
01:02:37,500 --> 01:02:44,080
going to choose a payload that causes
that machine to give us control of it.
918
01:02:44,300 --> 01:02:47,820
And a payload is what you want the
machine to do.
919
01:02:48,680 --> 01:02:51,160
once you've exploited a vulnerable
service.
920
01:02:51,540 --> 01:02:54,660
All right, now we're ready to go. Let's
give it a try.
921
01:02:55,660 --> 01:02:58,380
We type exploit and enter.
922
01:03:04,200 --> 01:03:08,940
And we have successfully exploited our
target. We now have control of it. At
923
01:03:08,940 --> 01:03:12,200
this point, we would set software on
this computer so that when the person
924
01:03:12,200 --> 01:03:13,200
leaves the cafe,
925
01:03:14,080 --> 01:03:17,060
The machine would report all user
activity.
926
01:03:17,360 --> 01:03:23,120
That activity would include website
visited, login ID, and password pair.
927
01:03:23,320 --> 01:03:28,480
We could even activate the camera or the
microphone on the particular computer
928
01:03:28,480 --> 01:03:33,800
at will. So we'd have complete control
over it. So, I mean, that right there is
929
01:03:33,800 --> 01:03:35,060
pretty cool.
930
01:03:35,640 --> 01:03:36,640
Yeah.
931
01:03:38,760 --> 01:03:42,560
Hacking and causing disruption.
932
01:03:44,850 --> 01:03:47,770
is sipping into the mainstream, into the
general public.
933
01:03:47,990 --> 01:03:54,290
You no longer have to be an MIT or
Cambridge computer science graduate to
934
01:03:54,290 --> 01:03:58,370
how to hack into a system. You can just
be a kid from around the block, go buy a
935
01:03:58,370 --> 01:04:04,230
computer for 400 bucks, have a
connection for 30 bucks, and go online
936
01:04:04,230 --> 01:04:05,610
out how to hack into different systems.
937
01:04:14,380 --> 01:04:18,600
Having been through the maze just once,
the mechanical mouse is able to remember
938
01:04:18,600 --> 01:04:19,640
the correct path.
939
01:04:20,000 --> 01:04:25,360
Set down anywhere along that path, it
takes the most direct route without
940
01:04:25,360 --> 01:04:28,920
a single false turn on through to the
end of the trail.
941
01:04:31,080 --> 01:04:37,320
As the crime continues to be effective
and make money,
942
01:04:37,440 --> 01:04:43,920
and the victims become more numerous,
that you're going to get... the effect
943
01:04:43,920 --> 01:04:47,180
where people start saying, well, someone
should do something about that.
944
01:04:47,420 --> 01:04:52,400
And the victim there is going to be
freedom on the Internet.
945
01:04:52,820 --> 01:04:54,600
All right, all right.
946
01:04:55,360 --> 01:04:57,820
I'll abide by your red tape regulations.
947
01:04:59,240 --> 01:05:01,320
Red tape regulations?
948
01:05:02,320 --> 01:05:05,800
I'll wear a badge and lock my desk when
I go home at night.
949
01:05:07,300 --> 01:05:10,500
But I still say we've got guards for
that sort of thing.
950
01:05:11,100 --> 01:05:13,720
We'd have to put a permanent guard on
everyone in the business.
951
01:05:14,440 --> 01:05:18,600
We probably could build a society in
which it was impossible for people to
952
01:05:18,600 --> 01:05:22,620
from each other, but the consequences of
building that society are probably a
953
01:05:22,620 --> 01:05:24,680
society none of us would want to live
in.
954
01:05:24,920 --> 01:05:27,880
There'd be a tremendous amount of
surveillance. There would be a
955
01:05:27,880 --> 01:05:30,480
amount of onerous security on top of us.
956
01:05:30,700 --> 01:05:34,420
We could build an Internet where there
were no hackers.
957
01:05:35,220 --> 01:05:38,880
The downside of building an Internet
where there were no hackers would be an
958
01:05:38,880 --> 01:05:40,540
Internet where there was no anonymity.
959
01:05:41,550 --> 01:05:45,030
There was no ability to post anything
that was not subject to censorship.
960
01:05:45,590 --> 01:05:49,750
You might find yourself being held
liable for anything that you said
961
01:05:49,750 --> 01:05:53,870
could be proven to be having come from
you. If we built a perfect internet that
962
01:05:53,870 --> 01:05:57,290
was completely hacker -proof, we have
built a perfect surveillance system for
963
01:05:57,290 --> 01:05:59,010
Big Brother that you can never evade.
964
01:06:05,210 --> 01:06:07,930
We meet today at a transformational
moment.
965
01:06:08,950 --> 01:06:09,970
A moment...
966
01:06:10,240 --> 01:06:15,440
in history when our interconnected world
presents us at once with great promise,
967
01:06:15,620 --> 01:06:17,120
but also great peril.
968
01:06:17,420 --> 01:06:22,680
The very technologies that empower us to
create and to build also empower those
969
01:06:22,680 --> 01:06:24,700
who would disrupt and destroy.
970
01:06:25,200 --> 01:06:30,820
This world, cyberspace, is a world that
we depend on every single day.
971
01:06:31,360 --> 01:06:33,160
It's our hardware and our software.
972
01:06:33,630 --> 01:06:38,490
Our desktops and laptops and cell phones
and BlackBerrys that have become woven
973
01:06:38,490 --> 01:06:40,630
into every aspect of our lives.
974
01:06:41,090 --> 01:06:46,050
The broadband networks beneath us and
the wireless signals around us. The
975
01:06:46,050 --> 01:06:51,110
networks in our schools and hospitals
and businesses and the massive grids
976
01:06:51,110 --> 01:06:52,110
power our nation.
977
01:06:52,330 --> 01:06:55,750
The classified military and intelligence
networks that keep us safe.
978
01:06:56,010 --> 01:07:00,770
And the World Wide Web that has made us
more interconnected than at any time in
979
01:07:00,770 --> 01:07:01,770
human history.
980
01:07:01,900 --> 01:07:05,460
The vast majority of our critical
information infrastructure in the United
981
01:07:05,460 --> 01:07:09,880
States is owned and operated by the
private sector. Traditionally,
982
01:07:09,880 --> 01:07:12,080
military stuff and civilian stuff were
different.
983
01:07:12,740 --> 01:07:16,180
Both had planes, the avionics would be
different.
984
01:07:16,380 --> 01:07:19,100
Both had computers, they would work
differently.
985
01:07:19,360 --> 01:07:20,360
That's changing.
986
01:07:20,520 --> 01:07:23,960
Technology is moving so fast that
government can't keep up.
987
01:07:24,580 --> 01:07:28,860
They're forced to buy the same stuff
that we use. That's a very interesting
988
01:07:28,860 --> 01:07:29,860
situation.
989
01:07:29,960 --> 01:07:34,240
Everybody is using the same operating
systems, the same networking
990
01:07:34,600 --> 01:07:36,620
the same hardware, the same software.
991
01:07:37,120 --> 01:07:44,060
And whether it's a person or a bank or a
military or a foreign military, we're
992
01:07:44,060 --> 01:07:45,060
all using the same stuff.
993
01:07:46,080 --> 01:07:51,100
And yes, this is different and we're not
used to it. It's not going away.
994
01:07:52,160 --> 01:07:55,800
We're never going to go back to the
military being on the leading edge.
995
01:07:56,320 --> 01:08:00,820
Because leading edge moves so fast and
only industry has that distributed
996
01:08:00,820 --> 01:08:04,660
ability to try every option and have the
correct one succeed.
997
01:08:04,940 --> 01:08:07,920
Only the market can do that. Government
can't.
998
01:08:08,440 --> 01:08:13,120
The government is forced to rely on
corporate security.
999
01:08:13,500 --> 01:08:18,060
We've just come out with the Cyberscope,
which is this probe right here.
1000
01:08:18,750 --> 01:08:23,310
And as far as network security, it takes
it to a new level. We have over 140
1001
01:08:23,310 --> 01:08:27,710
federal agencies that use this, from the
intelligence community, Department of
1002
01:08:27,710 --> 01:08:30,250
Defense, as well as civilian agencies.
1003
01:08:30,649 --> 01:08:35,189
We sell a bit to the military and U .S.
government, but we also sell to
1004
01:08:35,189 --> 01:08:38,069
organizations that are just trying to
audit their system.
1005
01:08:38,350 --> 01:08:40,470
So all of a sudden you have the military
with...
1006
01:08:40,830 --> 01:08:45,149
Next generation cellular communications
in an area that typically wasn't
1007
01:08:45,149 --> 01:08:51,710
available. The private industry owns at
least 85 % of the digital
1008
01:08:51,710 --> 01:08:54,050
infrastructure that we are all so
dependent upon.
1009
01:08:54,330 --> 01:08:58,510
When you mention cybersecurity to most
members of Congress, they just kind of
1010
01:08:58,510 --> 01:08:59,510
glaze over.
1011
01:08:59,649 --> 01:09:04,649
And they don't really get it. They don't
want to get it. My administration will
1012
01:09:04,649 --> 01:09:09,050
pursue a new comprehensive approach to
securing America's digital
1013
01:09:09,050 --> 01:09:13,680
infrastructure. I think there is a lack
of understanding among the politicians,
1014
01:09:13,819 --> 01:09:20,180
and it might be due to the fact that the
know -how has moved to the younger
1015
01:09:20,180 --> 01:09:23,439
generation, and they are not very eager
to move to politics.
1016
01:09:23,840 --> 01:09:29,060
I get the phone call, and, you know, hi,
I'm from the White House. Well,
1017
01:09:29,080 --> 01:09:32,100
actually, I'm really from DHS. Well,
actually, I'm the liaison between the
1018
01:09:32,180 --> 01:09:35,420
so, you know, I have a couple different
titles. But anyway, there's this
1019
01:09:35,420 --> 01:09:38,460
Homeland Security Advisory Council we
want you to be a part of.
1020
01:09:39,149 --> 01:09:42,390
And I'm thinking, oh, that's not so bad.
I can read white papers. I can provide
1021
01:09:42,390 --> 01:09:44,689
my advice. Sure, yeah, sure. Yeah, I'll
take it.
1022
01:09:45,029 --> 01:09:49,130
The next day I come into work and I've
got all these ethics disclosure forms
1023
01:09:49,130 --> 01:09:52,790
Office of Professional Responsibility
and security clearance.
1024
01:09:53,050 --> 01:09:53,988
I call them back.
1025
01:09:53,990 --> 01:09:56,250
How is this really working? What are my
responsibilities?
1026
01:09:56,670 --> 01:10:00,750
But as a technologist, I get to deal
with a lot of questions that touch our
1027
01:10:00,750 --> 01:10:03,990
lives every day because almost every
government initiative depends on IT
1028
01:10:03,990 --> 01:10:06,810
systems. Anything to do with border
crossing, that's technology.
1029
01:10:07,310 --> 01:10:11,070
Air traffic control, FEMA, emergency
communications, all of this stuff relies
1030
01:10:11,070 --> 01:10:11,949
computer networks.
1031
01:10:11,950 --> 01:10:13,830
But there's never been an overarching
coordination.
1032
01:10:14,130 --> 01:10:17,830
And to me, that's an acknowledgment that
there has never been a recognition on
1033
01:10:17,830 --> 01:10:21,270
the part of the federal government that
this is a really serious thing.
1034
01:10:22,770 --> 01:10:23,910
Nations want secrets.
1035
01:10:24,210 --> 01:10:28,150
They're going to break into governments
and companies and try to steal plans and
1036
01:10:28,150 --> 01:10:32,870
chemical formulas and troop movements
and how we route airplanes.
1037
01:10:33,390 --> 01:10:35,950
things that might help them at a very
strategic level or might give their
1038
01:10:35,950 --> 01:10:37,510
companies a competitive advantage.
1039
01:10:38,250 --> 01:10:42,510
China's interests have been long -term
to look at our government.
1040
01:10:42,860 --> 01:10:47,440
And to look at what our military is
doing, looking at what various agencies
1041
01:10:47,440 --> 01:10:52,040
the federal government are up to, and
also what our academic institutions are
1042
01:10:52,040 --> 01:10:56,340
capable of doing, stealing research and
the intellectual property associated
1043
01:10:56,340 --> 01:10:57,380
with universities.
1044
01:10:57,940 --> 01:11:02,420
And they even go so far as to look at
individual companies and trying to
1045
01:11:02,420 --> 01:11:06,040
out what their business plans might be
and how they might impact Chinese
1046
01:11:06,040 --> 01:11:09,880
companies. CBS News has learned that
there are factories in China and
1047
01:11:09,880 --> 01:11:14,380
Asia. that are exact replicas of plants
in the United States, built with
1048
01:11:14,380 --> 01:11:18,560
everything from hacked blueprints and
supplier lists down to the settings used
1049
01:11:18,560 --> 01:11:21,280
to regulate valve pressures for
individual machines.
1050
01:11:21,800 --> 01:11:25,820
Two years ago, hackers stole top -secret
exploration data from oil and gas
1051
01:11:25,820 --> 01:11:31,300
industry giants ExxonMobil,
ConocoPhillips, and Marathon Oil. In
1052
01:11:31,300 --> 01:11:34,840
Systems of Central Command, the State
Department, Department of Commerce, and
1053
01:11:34,840 --> 01:11:37,440
NASA were successfully hacked. They
lost.
1054
01:11:37,790 --> 01:11:40,030
Millions of pages of classified
information.
1055
01:11:40,350 --> 01:11:45,030
This country is completely under attack
24 -7. And not just our country,
1056
01:11:45,090 --> 01:11:46,068
everybody's country.
1057
01:11:46,070 --> 01:11:48,150
And not just governments, but companies
and corporations.
1058
01:11:48,490 --> 01:11:51,450
It's a giant feeding frenzy out there.
Here's another question.
1059
01:11:51,990 --> 01:11:57,030
And this might have an interesting
perspective from the various areas that
1060
01:11:57,030 --> 01:11:59,370
come from, the various nations they come
from.
1061
01:12:00,930 --> 01:12:02,790
What's your nightmare scenario?
1062
01:12:03,710 --> 01:12:06,710
In other words, the event that you fear
the most.
1063
01:12:07,130 --> 01:12:09,030
I live in a world of nightmares.
1064
01:12:09,370 --> 01:12:15,930
In fact, I'm in charge of the cyber
defense agency in France, and I'm paid
1065
01:12:15,930 --> 01:12:16,930
imagine nightmares.
1066
01:12:17,330 --> 01:12:21,690
In addition to the attacks on the
nation's telecommunications
1067
01:12:21,690 --> 01:12:26,930
are also now receiving alarming reports
of significant and growing power outages
1068
01:12:26,930 --> 01:12:31,470
in major metropolitan areas in the
eastern half of the United States.
1069
01:12:31,770 --> 01:12:35,290
You're going to see planes being
grounded now. You're going to see trains
1070
01:12:35,290 --> 01:12:36,850
taking to the track.
1071
01:12:37,250 --> 01:12:38,690
People are going to stop moving.
1072
01:12:38,910 --> 01:12:44,010
Do we have a declared policy in the
cyber realm in the same way we had for
1073
01:12:44,010 --> 01:12:46,590
decades in the realm of nuclear weapons?
1074
01:12:51,230 --> 01:12:53,150
So I want to answer a question from this
morning.
1075
01:12:53,510 --> 01:12:54,670
What's your nightmare scenario?
1076
01:12:55,550 --> 01:12:58,430
My nightmare scenario is that we spend
our time thinking about nightmare
1077
01:12:58,430 --> 01:12:59,430
scenarios.
1078
01:12:59,630 --> 01:13:03,330
This is important. There's a certain
blindness that comes to worst -case
1079
01:13:03,330 --> 01:13:07,590
thinking. It leads to bad decisions, it
leads to bad system design, and it leads
1080
01:13:07,590 --> 01:13:08,509
to bad security.
1081
01:13:08,510 --> 01:13:12,090
And you all know an example of this,
airline security and the TSA.
1082
01:13:12,590 --> 01:13:15,350
That's what you get when you think about
nightmare scenarios.
1083
01:13:15,570 --> 01:13:17,610
That's what you get from worst -case
decision -making.
1084
01:13:17,810 --> 01:13:20,970
We will take action against that nation
-state. Now, specifically what that is,
1085
01:13:21,030 --> 01:13:23,870
I don't think you should say publicly,
but we have ways to do that. What
1086
01:13:23,870 --> 01:13:27,210
everybody in this room will be judged
on, and trust me, you'll all be judged.
1087
01:13:27,630 --> 01:13:33,070
when this is all over for years to come,
is did we carve out every absolute
1088
01:13:33,070 --> 01:13:35,350
option, every piece of power we had?
1089
01:13:36,630 --> 01:13:38,370
Cyber war is largely hype.
1090
01:13:38,810 --> 01:13:42,730
I mean, it's hype by the media because
it's cool and interesting, but it's
1091
01:13:42,730 --> 01:13:45,790
really hype by the government trying to
seize more control.
1092
01:13:46,390 --> 01:13:49,550
I mean, there's a huge power struggle
going on in government right now. It's
1093
01:13:49,550 --> 01:13:55,090
the NSA, Homeland Security, FBI, over
who gets control over the Internet and
1094
01:13:55,090 --> 01:13:55,809
Internet security.
1095
01:13:55,810 --> 01:13:57,070
And the NSA is winning.
1096
01:13:57,840 --> 01:14:04,560
And they're winning by pushing this
cyber war fear, this fear of cyber
1097
01:14:04,560 --> 01:14:08,640
attacking us. It's largely nonsense.
It's largely hype. It doesn't hold up to
1098
01:14:08,640 --> 01:14:10,980
scrutiny. But it's big and scary.
1099
01:14:11,280 --> 01:14:14,840
And when people are scared, they're much
more willing to give up their
1100
01:14:14,840 --> 01:14:17,580
liberties, their privacy, their freedoms
to someone who will make them feel
1101
01:14:17,580 --> 01:14:19,980
safer. Is the public scared?
1102
01:14:20,900 --> 01:14:22,560
Yes, and that's a good thing.
1103
01:14:23,760 --> 01:14:25,620
Now the maze has changed again.
1104
01:14:26,190 --> 01:14:31,810
near its very end. Things go smoothly
enough at first as the mouse proceeds on
1105
01:14:31,810 --> 01:14:33,970
the basis of information it remembers.
1106
01:14:35,250 --> 01:14:37,010
Now it's running into trouble.
1107
01:14:38,770 --> 01:14:42,890
But fortunately, it is able to adapt to
this new situation.
1108
01:14:43,290 --> 01:14:49,150
It resorts once more to trial and error
and acquires reliable new information to
1109
01:14:49,150 --> 01:14:50,150
replace the old.
1110
01:14:53,290 --> 01:14:58,250
My doomsday scenario is a single EMP
bomb above the country.
1111
01:14:58,710 --> 01:15:05,150
If you can build one nuke and you can
blow it up 200 to 500 miles above the
1112
01:15:05,150 --> 01:15:11,330
country, the resulting electromagnetic
pulse is enough to basically stop almost
1113
01:15:11,330 --> 01:15:13,790
all electronics in the United States,
Canada, and Mexico.
1114
01:15:14,070 --> 01:15:16,770
And when that happens, you're screwed.
1115
01:15:17,630 --> 01:15:18,770
There's no fixing that.
1116
01:15:18,990 --> 01:15:21,150
It would take us back to the 1920s.
1117
01:15:21,500 --> 01:15:24,820
with the resulting population of the
1920s, because that's all our
1118
01:15:24,820 --> 01:15:29,060
infrastructure would be. And I think
about 180 million people would die in
1119
01:15:29,060 --> 01:15:30,080
country within six months.
1120
01:15:30,380 --> 01:15:31,880
It's pretty severe.
1121
01:15:32,180 --> 01:15:34,340
And that's how dependent we are on
technology.
1122
01:15:35,520 --> 01:15:40,480
Is there anything that East West or
government institutes around the world
1123
01:15:40,480 --> 01:15:45,400
working with education programs to help
close that divide, make it part of the
1124
01:15:45,400 --> 01:15:48,840
mandatory curriculum to help educate
kids?
1125
01:15:49,580 --> 01:15:51,700
on the foundation of technology?
1126
01:15:52,080 --> 01:15:55,820
So I think that's kind of backwards. I
think the kids need to educate us. I
1127
01:15:55,820 --> 01:15:58,680
mean, the thing about generation gaps is
the younger generation always wins
1128
01:15:58,680 --> 01:16:00,080
because the older generation dies.
1129
01:16:01,240 --> 01:16:06,180
And the way the kids are doing it is the
correct way. We're doing it wrong.
1130
01:16:06,240 --> 01:16:10,240
We're doing it old, right? Emails for
old people, not for kids.
1131
01:16:10,540 --> 01:16:14,840
And that's the way it's going to be. So
I think better than us educating...
1132
01:16:15,050 --> 01:16:19,410
the younger generation, is let them
educate us on how they use the net, how
1133
01:16:19,410 --> 01:16:23,210
want the net to work, how it fits into
their lives so we can build
1134
01:16:23,210 --> 01:16:24,710
infrastructure that benefits them.
1135
01:16:25,150 --> 01:16:27,250
Because the education is not going to go
the other way.
1136
01:16:27,690 --> 01:16:30,030
I mean, the internet is the greatest
generation gap since rock and roll.
1137
01:16:30,730 --> 01:16:35,430
You know, younger people are using these
technologies in ways that the older
1138
01:16:35,430 --> 01:16:37,330
people can't even fathom.
1139
01:16:38,130 --> 01:16:42,430
Regularly, I get people asking me, what
can I do to convince my kids not to do
1140
01:16:42,430 --> 01:16:45,030
these things on the net? And I tell
them, You can't.
1141
01:16:45,510 --> 01:16:48,830
And more importantly, they're right and
you're wrong.
1142
01:16:49,510 --> 01:16:53,750
But the younger generation gets to
decide how technology will be used.
1143
01:16:54,130 --> 01:16:59,170
I mean, they're going to build the
social systems that will be used in the
1144
01:16:59,170 --> 01:17:06,030
10, 20, 30, 40 years. Because Internet's
about people, about connecting people,
1145
01:17:06,210 --> 01:17:10,290
about people being able to find other
people of common interest.
1146
01:17:10,800 --> 01:17:14,120
We're being able to communicate with
their family or friends in ways that
1147
01:17:14,120 --> 01:17:15,360
impossible before.
1148
01:17:15,600 --> 01:17:19,440
Be able to bring information into
communities that didn't have access to
1149
01:17:19,440 --> 01:17:26,020
before. To democratize knowledge and
information and communication. The
1150
01:17:26,020 --> 01:17:30,560
value of this information is so great
that it's changing the planet.
1151
01:17:37,550 --> 01:17:40,630
But sometimes there's a problem without
a solution.
1152
01:17:44,930 --> 01:17:48,330
And even a mechanical mouse must have a
helping hand.
1153
01:17:49,710 --> 01:17:54,070
I'm not sure if I know how to end this
story.
1154
01:17:54,870 --> 01:17:59,550
Where does this story end? Does it
happen anywhere? The problem with ending
1155
01:17:59,550 --> 01:18:03,030
we're still in the middle of it. We are
in the middle of the information age
1156
01:18:03,030 --> 01:18:04,030
revolution.
1157
01:18:04,040 --> 01:18:07,940
In 50 years, you can do this
documentary, and you know how it ends.
1158
01:18:09,020 --> 01:18:13,600
Now, in the middle, we can just guess,
and not even very well.
1159
01:18:14,220 --> 01:18:16,960
When you're riding the ride, you don't
know how it ends.
1160
01:18:17,320 --> 01:18:18,320
That's just the way it goes.
1161
01:18:18,520 --> 01:18:20,500
On the plus side, it's kind of a fun
ride.
1162
01:18:22,580 --> 01:18:27,140
This agile, three -wheeled little mouse
contains a small bar magnet.
1163
01:18:28,000 --> 01:18:32,440
100 relays and electrical circuits.
Remember the directions for the mouse.
1164
01:18:34,030 --> 01:18:38,730
Dr. Shannon's mechanical mouse
demonstrates that machines can learn by
1165
01:18:38,730 --> 01:18:43,850
experience and can revise what they've
learned when it no longer works. Two
1166
01:18:43,850 --> 01:18:47,350
important characteristics, at least, of
intelligent behavior.
1167
01:19:15,280 --> 01:19:18,940
Lives are being rapidly changed by the
development of large computing machines.
1168
01:19:19,920 --> 01:19:23,920
A complete computer system weighs 22
,000 pounds.
1169
01:19:24,540 --> 01:19:31,280
When the hero of any science fiction
show has a problem, he usually turns to
1170
01:19:31,280 --> 01:19:37,180
trusty computer for an answer.
Sometimes, they think so hard, they get
1171
01:19:37,720 --> 01:19:39,500
They blow their cool.
1172
01:19:41,780 --> 01:19:46,710
Around the world, Economic factors will
continue to stimulate the application of
1173
01:19:46,710 --> 01:19:47,910
computers to new areas.
1174
01:19:48,310 --> 01:19:53,190
But advancing computer hardware
technology is just one part of the
1175
01:19:53,190 --> 01:19:57,090
to Ken Jennings now. Bram Stoker is what
we're looking for, and we find.
1176
01:19:57,350 --> 01:20:01,610
Who is Stoker? I, for one, welcome our
new computer overlord.
1177
01:20:07,350 --> 01:20:09,390
Accurately and tirelessly.
1178
01:20:09,750 --> 01:20:10,990
Electronic computers.
1179
01:20:11,640 --> 01:20:16,680
can trace out the consequences of a
thousand possible actions, can pick out
1180
01:20:16,680 --> 01:20:21,980
best design among thousands of possible
designs, thus providing a better base
1181
01:20:21,980 --> 01:20:24,640
for the informed exercise of human
judgment.
113322
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.