123
123
Jan 28, 2012
01/12
by
CSPAN3
tv
eye 123
favorite 0
quote 0
so with just over 30 years ago when the first famous cyber criminal, a gentleman named john draper nicknamed cap'n crunch became a famous cyber criminal. we were transitioning from the rotary dial phones to tone-based phones, and he found that with a whistle he got out of a cap'n crunch box, he could blow that into the phone and with the right tone and pitch he got access to the phone's administrative systems. from there, about 100 individuals around the world learned how the use the tones, and basically do things like free long distance calls, play jokes on the operators, nothing really serious. two of them are famous guys, steve wozniak and steve jobs of apple computers were two of the original phone freaks. i find interesting that steve jobs who learned how to hack into phones made one of our latest great phones that we all use. but that was really the start of it. if you actually fast forward and we started to put computers
so with just over 30 years ago when the first famous cyber criminal, a gentleman named john draper nicknamed cap'n crunch became a famous cyber criminal. we were transitioning from the rotary dial phones to tone-based phones, and he found that with a whistle he got out of a cap'n crunch box, he could blow that into the phone and with the right tone and pitch he got access to the phone's administrative systems. from there, about 100 individuals around the world learned how the use the tones, and...
87
87
Jan 28, 2012
01/12
by
CSPAN3
tv
eye 87
favorite 0
quote 0
much like that very first hack that john draper did or cap'n crunch of using a whistle to get administrative access. who would have thought of that? so these application flaws are also being used. so you get into the enterprise you want to target and then that's methods of jumping off and covering your tracks. the next thing you do is you're now inside the organization and you're trying to get access to sensitive data or sensitive systems. and you do what's called privileged access. you become an internal user on that system. you're no longer an external user. you have compromised someone's internal accounts. you infiltrate that information. you can cover your tracks and you want to go uncovered for a long period of time. get in, get access, exfiltrate. let's look at the most sophisticated attack that happened last year. the most sophisticated attack. mind you, this attack went against the company that has e the -- that produces the algorithms and it generates that random number. if you could get access to the generator of random numbers and you can figure out customers of this company's, so
much like that very first hack that john draper did or cap'n crunch of using a whistle to get administrative access. who would have thought of that? so these application flaws are also being used. so you get into the enterprise you want to target and then that's methods of jumping off and covering your tracks. the next thing you do is you're now inside the organization and you're trying to get access to sensitive data or sensitive systems. and you do what's called privileged access. you become...
130
130
Jan 30, 2012
01/12
by
CSPAN2
tv
eye 130
favorite 0
quote 0
so it was just a little over 30 years ago when the first famous cyber criminal, john draper nicknamed captain crunch, became a famous cyber criminal. and this was a time we were transitioning from rotary dial phones to tone-based phones, and he found that with a whistle l he got out of a captain crunch box he could blow that into the phone, and with the right tone and pitch, he got access to the phone's administrative systems. from there about 100 individuals around the world became what are called phone freak, and they learned how to use these tones and basically do things like free long distance calls, they played jokes on 411 operators. nothing really serious. two of them were very famous guys, steve wozniak and steve jobs of apple computers were two of the original phone freaks. i find it interesting that steve jobs who learned how to hack into phones made one of our latest great phones that we all use. but that was really the start of it. if you actually fast forward, and we started putting computers on our home desktops and at work and what have you, it goes more sophisticated b
so it was just a little over 30 years ago when the first famous cyber criminal, john draper nicknamed captain crunch, became a famous cyber criminal. and this was a time we were transitioning from rotary dial phones to tone-based phones, and he found that with a whistle l he got out of a captain crunch box he could blow that into the phone, and with the right tone and pitch, he got access to the phone's administrative systems. from there about 100 individuals around the world became what are...
152
152
Jan 7, 2012
01/12
by
CSPAN2
tv
eye 152
favorite 0
quote 0
of blackhawk down who is here with microsoft x new book, the first digital world war with john markof. bill draper with kqed's david irishman and microsoft, peter nor back of google, two of the leading aig experts of the world. this is quite a line of. we feel very privileged to have had every single one of these people on our stage in the last 12 months and we are looking forward to kicking off season 2 in january. keep an eye on your mailbox, e-mail and the museum news mail because we will talk about more about lecture series to come. now on to our program. steve jobs was on stage in san francisco making one of his legendary presentations. the kindle the reader comes up and steve jobs said this will go nowhere. being and characteristically blunt. he said it would go nowhere because americans have stopped reading. it doesn't matter how good or bad the project is. people don't read anymore. 40% of people in the united states read one book or less last year. the whole concept is totally flawed. is it true that people are only read one book this year? we know which book it is. [applause] despite its
of blackhawk down who is here with microsoft x new book, the first digital world war with john markof. bill draper with kqed's david irishman and microsoft, peter nor back of google, two of the leading aig experts of the world. this is quite a line of. we feel very privileged to have had every single one of these people on our stage in the last 12 months and we are looking forward to kicking off season 2 in january. keep an eye on your mailbox, e-mail and the museum news mail because we will...
238
238
Jan 28, 2012
01/12
by
CSPAN
tv
eye 238
favorite 0
quote 0
much like that very first hack that john draper did of using a whistle to get administrative access -- who would have thought of that? these applications are also being used. you get into the enterprise you want to target. then there are methods of jumping off and covering your tracks. the next thing you do is you are now inside the organization, trying to get access to sensitive data or sensitive systems. you do that through what is called privileged access, and you become a user on the system, and you are no longer an external user. you have compromised some once internal accounts. you can cover your tracks, and you want to go undercover for the longest time. get in, get access, axel trade. that is the modern steps. sounds simple. let's take a look at the most sophisticated attack that happened last year. the most sophisticated attack. mind you, this went against a company that has -- that produces the algorithms and has the system to generate that ran a number, right? if you can get access to the generator of random numbers and you can figure out customers of this company -- some o
much like that very first hack that john draper did of using a whistle to get administrative access -- who would have thought of that? these applications are also being used. you get into the enterprise you want to target. then there are methods of jumping off and covering your tracks. the next thing you do is you are now inside the organization, trying to get access to sensitive data or sensitive systems. you do that through what is called privileged access, and you become a user on the...
117
117
Jan 28, 2012
01/12
by
CSPAN3
tv
eye 117
favorite 0
quote 0
so with just over 30 years ago when the first famous cyber criminal, a gentleman named john draper nicknamed cap'n crunch became a famous cyber criminal. we were transitioning from the rotary dial phones to tone-based phones, and he found that with a whistle he got out of a cap'n crunch box, he could blow that into the phone and with the right tone and pitch he got access to the
so with just over 30 years ago when the first famous cyber criminal, a gentleman named john draper nicknamed cap'n crunch became a famous cyber criminal. we were transitioning from the rotary dial phones to tone-based phones, and he found that with a whistle he got out of a cap'n crunch box, he could blow that into the phone and with the right tone and pitch he got access to the