Return to Video

36C3 - The KGB Hack: 30 Years Later

  • 0:00 - 0:19
    36C3 preroll music
  • 0:19 - 0:24
    Herald Angel: Good evening, everyone. Our
    next speaker is a historian and she is
  • 0:24 - 0:29
    rolling back time for us, 30 years to the
    very beginnings of the Chaos Computer Club
  • 0:29 - 0:37
    and taking a closer look at the KGB hack,
    the infamous KGB hack and what Karl Koch
  • 0:37 - 0:43
    did back them. So let's journey
    back to the 80s with Anja Drephal.
  • 0:43 - 0:54
    Applause
  • 0:54 - 1:03
    Anja Drephal: Thank you. I was hoping to
    see my presentation.
  • 1:03 - 1:04
    laughter
    Drephal: Why am I not seeing my
  • 1:04 - 1:08
    presentation, my slides?
  • 1:18 - 1:21
    Yes. Thank you.
  • 1:37 - 2:01
    Dial-up noises
  • 2:14 - 2:24
    Drephal: Thank you.
    Applause.
  • 2:25 - 2:31
    Drephal: That applause, guys, goes to my
    amazing hacker who did this little video
  • 2:31 - 2:33
    as a start to my presentation. Thank you.
  • 2:39 - 2:44
    Why? No ...
    Laughter
  • 2:44 - 2:45
    Drephal: I guess we'll have to do it again.
  • 2:45 - 2:48
    No, no. What is happening?
  • 2:53 - 2:55
    No, no, no, no, no.
  • 2:56 - 2:59
    Okay, okay. Welcome to 1989.
  • 2:59 - 3:06
    Before I start, I have to say, when you
    start researching a topic like the KGB hack,
  • 3:06 - 3:12
    you suddenly find out there are so many
    sources, not just books that have been
  • 3:12 - 3:17
    written, movies that have been made,
    documentaries. There's articles in
  • 3:17 - 3:23
    newspapers, on the internet. There's
    podcasts you can listen to that go into
  • 3:23 - 3:29
    every little detail of this case, every
    little detail of the early history of the
  • 3:29 - 3:36
    CCC, the early history of the Internet as
    it is, and due to time constraints that we
  • 3:36 - 3:43
    have, I'm going to have to simplify quite
    a few things to just, you know, give you
  • 3:43 - 3:49
    an overview and tell you a story about
    this topic. And I'm counting on you to
  • 3:49 - 3:56
    raise questions, in the end, at our Q&A,
    to maybe go into more detail if you find
  • 3:56 - 4:00
    out, OK, there is something that should
    have been a little more detailed is
  • 4:00 - 4:05
    something that, hey, I know about -
    something about this because I'm sure a
  • 4:05 - 4:12
    lot of you know maybe more than me about
    this story. So that's something that I'm
  • 4:12 - 4:19
    hoping we can do in 45 minutes, 40
    minutes. First of all, I'd like to ask a
  • 4:19 - 4:29
    question - two questions to the audience.
    Does anyone here think that this talk
  • 4:29 - 4:32
    might mention their name?
  • 4:36 - 4:39
    Yes. Who are you?
  • 4:39 - 4:43
    Laughter
    Drephal: Well, I'm not going to mention
  • 4:43 - 4:50
    any real names except for one. So maybe
    you would like to join us in the end. Or
  • 4:50 - 4:55
    you know, if not, then not. Second
    question, is anyone here who attended
  • 4:55 - 5:05
    Congress in the 1980s? Excellent. Well,
    personally, I did not because I was busy
  • 5:05 - 5:12
    with kindergarten and elementary school
    and stuff. My first Congress was in 2012
  • 5:12 - 5:19
    when a friend of mine introduced me to the
    Chaos Computer Club. I went to Hamburg.
  • 5:19 - 5:25
    I spent four amazing days at Congress, and
    in the end I thought, oh my God, this is
  • 5:25 - 5:31
    so great. And I thought, OK, what could I
    give back to this amazing community? What
  • 5:31 - 5:39
    could I add to this experience? And I'm
    not a hacker or very much into tech, but
  • 5:39 - 5:44
    I'm a historian. I can tell you history,
    and I'm very thankful that the content
  • 5:44 - 5:51
    team has now invited me for the fourth
    time to tell you about history. I'm very
  • 5:51 - 5:56
    thankful that this talk has gotten a slot
    on day one, because I think it's the
  • 5:56 - 6:04
    perfect time to take a look back at what
    was, to take a look at what has changed,
  • 6:04 - 6:12
    to remember those who unfortunately cannot
    be here today and then spend three more
  • 6:12 - 6:22
    days in the present, at this Congress. So
    let me set the scene for you. It's 1989,
  • 6:22 - 6:30
    especially it's March 1989. In March,
    1989, the world was still very much
  • 6:30 - 6:35
    divided. Germany was still divided into
    West Germany and the German Democratic
  • 6:35 - 6:47
    Republic. And looking at Leipzig in March
    1989, we had the spring fair. Not here,
  • 6:47 - 6:54
    but in the old fairgrounds. And the German
    Democratic Republic proudly presented
  • 6:54 - 7:00
    their latest and greatest in technology.
    They had just developed a four megabit
  • 7:00 - 7:07
    hybrid memory - four megabits.
    Unfortunately, it was way too expensive to
  • 7:07 - 7:17
    make it on the world market. But they were
    proud. West Germany had its own issues.
  • 7:17 - 7:24
    Laughter
    Drephal: Difficult times. People had to
  • 7:24 - 7:29
    wear stone washed jeans and pastel colored
    sweaters. Number one hit in the West
  • 7:29 - 7:35
    German charts in March was David
    Hasselhoff, Looking for Freedom. And Bill
  • 7:35 - 7:40
    and Ted were going on an excellent
    adventure. Sequel is coming out next year,
  • 7:40 - 7:43
    don't miss it.
    Laughter
  • 7:43 - 7:47
    Drephal: Speaking about television,
    private television in West Germany was
  • 7:47 - 7:52
    still very much in its infancy. Most
    people still had three television channels
  • 7:52 - 7:58
    first, second, third and they got their
    information from the television. The first
  • 7:58 - 8:05
    program showed the news every night at
    8:00. People watched it, much more than
  • 8:05 - 8:11
    today. And sometimes the first German
    television had a special program called Im
  • 8:11 - 8:18
    Brennpunkt, In Focus. That always came out
    when something was so exciting, so
  • 8:18 - 8:22
    newsworthy that it couldn't be
    sufficiently dealt with in the normal
  • 8:22 - 8:30
    news. So on March 2nd, 1989, the first
    German television showed this.
  • 8:30 - 8:35
    Music
  • 8:35 - 8:40
    Drephal: Why isn't it moving? Oh, come on,
  • 8:40 - 8:46
    please. It's moving on my screen.
    TV moderator speaking in German
  • 8:55 - 8:58
    Drephal: Would have been nice, if...
    TV moderator speaking in German
  • 9:07 - 9:10
    Drephal: Well, okay, if it had been
    moving, you would have seen a dude in a
  • 9:10 - 9:17
    suit telling you that the biggest spy case
    since Günter Guillaume has just been
  • 9:17 - 9:22
    uncovered. Günter Guillaume was an East
    German spy who worked closely in the
  • 9:22 - 9:29
    offices of German Chancellor Willy Brandt
    in the 1970s. He worked for the East
  • 9:29 - 9:33
    German Secret Service, and when he was
    uncovered, the Chancellor had to step
  • 9:33 - 9:42
    down. So apparently in March 1989, we have
    a spy case of German hackers working for
  • 9:42 - 9:51
    the KGB that is as big as Günter
    Guillaume. Spoiler: It was not. But
  • 9:51 - 9:55
    anyway. How is that even possible? How can
    you, how can German hackers work for the
  • 9:55 - 10:02
    KGB in 1989? How can they hack anything
    over the Internet? Well, there is no
  • 10:02 - 10:14
    Internet. What there is, is basically
    this. Let's say, in the mid 1980s, you're
  • 10:14 - 10:21
    a teenager and you've got a computer for
    Christmas. Lucky you. So what can you do
  • 10:21 - 10:29
    with it? There's no Internet. There are
    computers that are connected. Big
  • 10:29 - 10:34
    computers made by IBM and by VAX that are
    standing in universities, research
  • 10:34 - 10:43
    institutions, military institutions, big
    companies. And you have, in the 1980s, a
  • 10:43 - 10:49
    network that you can actually dial in to
    from your home. So you have a phone that's
  • 10:49 - 10:54
    connected to a wall, usually, if it's not
    cut off, and you have a computer and if
  • 10:54 - 11:01
    you're lucky, you have a sort of modem.
    It's called an acoustic coupler. We have
  • 11:01 - 11:09
    one here for the C64. The most famous one
    was the data phone, it's bigger, but this
  • 11:09 - 11:15
    one basically works the same. You strap
    your phone to it and you call your local
  • 11:15 - 11:25
    post office. And your local post office in
    the 1980s has a network called Data XP,
  • 11:25 - 11:33
    which stands for data exchange packet
    based. It's based on the X.25 protocol and
  • 11:33 - 11:42
    it gives you the opportunity to connect to
    computers all over Germany and all over
  • 11:42 - 11:46
    Europe and actually all over the world.
    What you need is a network user
  • 11:46 - 11:53
    identification, a so-called new NUI, which
    is expensive. The call to your local post
  • 11:53 - 11:57
    office, not so much, especially in West
    Berlin, which was known as sort of a
  • 11:57 - 12:03
    hacker's paradise because local calls cost
    only twenty three Pfennig, twenty three
  • 12:03 - 12:10
    cents, not per minute, but per call. So if
    you had a network user identification from
  • 12:10 - 12:18
    somewhere, you could just call your local
    data XP office and connect. These NUIs
  • 12:18 - 12:25
    were expensive, but you could find them,
    for example, at the computer fair in
  • 12:25 - 12:30
    Hanover because people weren't watching
    their screens, their terminals, and maybe
  • 12:30 - 12:35
    you could look over somebody's shoulder
    and see their log in and use it and run up
  • 12:35 - 12:41
    charges of thousands of marks and then you
    can connect to message boards, which is a
  • 12:41 - 12:48
    bit, well, not so exciting. Much more
    exciting is the big computers standing at
  • 12:48 - 12:59
    institutions and companies. And so,
    through this, possibility, these
  • 12:59 - 13:09
    possibilities, this network comes a hacker
    scene in the 1980s of mostly young people,
  • 13:09 - 13:16
    teenagers, young guys, not so many girls,
    who connect to these big computers because
  • 13:16 - 13:21
    they can, because they're there and
    they're interesting. And you just want to
  • 13:21 - 13:34
    see what's on them. Especially infamous
    was CERN, the nuclear research
  • 13:34 - 13:40
    organization in Switzerland,
    where at some point hackers were actually
  • 13:40 - 13:46
    having kind of parties in the system
    connecting to the computers and chatting
  • 13:46 - 13:55
    with the systems managers who were a bit
    annoyed because they had work to do, but
  • 13:55 - 14:01
    not that bothered because it wasn't really
    seen as anything that could harm them. And
  • 14:01 - 14:07
    the point was to go into these computers
    because you can to show that you can and
  • 14:07 - 14:13
    to have some fun and not because you're a
    criminal or you want to take some data or
  • 14:13 - 14:28
    make money off it, but just as a sport.
    And now... and in this scene, the Chaos
  • 14:28 - 14:38
    Computer Club also established itself as
    sort of a mediator between these hackers
  • 14:38 - 14:46
    and the institutions and companies that
    were being broken into. Always stressing
  • 14:46 - 14:53
    that when you're hacking, you should do it
    with an ethical approach. Never, you know,
  • 14:53 - 14:58
    doing any harm. Being excellent. Not
    making any money. And for God's sake,
  • 14:58 - 15:03
    staying away from military or Secret
    Service computers, don't touch those.
  • 15:03 - 15:10
    Here's a quote on one of the first
    Congresses, which I think sounds pretty
  • 15:10 - 15:18
    much like today. This amazing experience
    and the news crews interested and
  • 15:18 - 15:28
    reporting on what's happening with these
    sort of harmless tech freaks and hackers
  • 15:28 - 15:37
    that were just having fun. And this is the
    scene where a group of young men met in
  • 15:37 - 15:44
    the mid 1980's and started hanging out,
    started sitting in front of computers,
  • 15:44 - 15:49
    hacking together, talking, consuming
    drugs, also, and just, you know, having
  • 15:49 - 15:59
    fun. And these are their nicknames. They
    were all, sort of, some were programmers,
  • 15:59 - 16:06
    some were teenagers who were into hacking.
    One of them, the last one here, wasn't
  • 16:06 - 16:12
    really a hacker. He worked at a casino and
    he made some money on his side selling
  • 16:12 - 16:17
    drugs. And they were just hanging out and
    and just feeling like they were the
  • 16:17 - 16:25
    greatest. They were... Someone has
    compared them to sort of graffiti kids.
  • 16:25 - 16:29
    They did it because they could, just
    leaving their mark everywhere in the
  • 16:29 - 16:38
    computers. And... Well, they were just, you
    know, talking and somebody had the idea,
  • 16:38 - 16:43
    OK, what can we do to get recognized as
    the greatest hackers or how can we make
  • 16:43 - 16:50
    something off it? There's always the issue
    of money problems that you might have,
  • 16:50 - 16:58
    stupid ideas that you have when you're a
    teenager or a young kid. And one of them
  • 16:58 - 17:01
    came up with the idea, Hey, I know
    somebody in East Berlin who might be
  • 17:01 - 17:07
    interested in what we're doing and maybe
    we could sell that. I know someone, a
  • 17:07 - 17:12
    Russian, and it might be, you know, it
    might actually be a contribution to world
  • 17:12 - 17:16
    peace because the Russians need technology
    that they don't have and we have it. We
  • 17:16 - 17:24
    could kind of equalize the scales a bit.
    It's a stupid idea, of course. But this
  • 17:24 - 17:32
    guy, Pedro, his name was Peter, he
    actually went to East Berlin, walked into
  • 17:32 - 17:37
    the Soviet trade mission and said he
    wanted to talk someone about a deal, super
  • 17:37 - 17:47
    stupid, walking in the front door and
    someone actually listened to him. A guy
  • 17:47 - 17:52
    who introduced himself as Sergei, who
    officially worked at the trade mission,
  • 17:52 - 18:03
    which in my opinion means KGB, was willing
    to listen and our hackers offered, OK, we
  • 18:03 - 18:08
    can get you like log-ins to computers in
    West Germany and even America. We can even
  • 18:08 - 18:14
    teach you how to hack, you know, for like
    a million marks. How about that? And
  • 18:14 - 18:20
    Sergei was like, Okay, that's nice, but I
    need something else. Because he had a
  • 18:20 - 18:32
    shopping list which came pretty much
    directly from the embargo list made by the
  • 18:32 - 18:39
    Coordinating Committee on Multilateral
    Export Controls. There was an embargo,
  • 18:39 - 18:47
    technology and, yeah, electronic parts.
    Computers weren't allowed to be sold into
  • 18:47 - 18:53
    the Soviet Union or the Eastern Bloc in
    general. And that was basically his
  • 18:53 - 18:58
    shopping list. What the Soviets wanted was
    not so much, you know, log-ins to military
  • 18:58 - 19:04
    computers. They wanted source code, for
    example... According to the sources, he
  • 19:04 - 19:09
    actually had a list that said, OK, UNIX
    source code, twenty five thousand marks,
  • 19:09 - 19:14
    maybe a compiler for this and that, five
    thousand marks. And our hackers were able
  • 19:14 - 19:20
    to provide. They didn't exactly make a
    million, but about ninety thousand marks
  • 19:20 - 19:24
    exchanged hands in the following months.
  • 19:24 - 19:30
    Until a systems administrator in
  • 19:30 - 19:36
    California noticed something. And now I
    have to tell you, the legend of Clifford
  • 19:36 - 19:45
    Stoll. Clifford Stoll has become famous
    for uncovering the KGB hackers, and a sort
  • 19:45 - 19:51
    of legend has been built around him,
    telling his story again and again. He,
  • 19:51 - 19:57
    there was a funny documentary made. He had
    a book coming out. And there are some
  • 19:57 - 20:04
    weird aspects in this story, but maybe we
    can talk about them later. So, first of
  • 20:04 - 20:10
    all, I'm just going to give you the story
    as he tells it. And I would like to show
  • 20:10 - 20:18
    you, because you can describe this man,
    but you just have to see him. And if this
  • 20:18 - 20:23
    video isn't working again, then I'm gonna
    be a really, really sad. Please.
  • 20:23 - 20:27
    TV announcer: Tonight, on Nova...
    Drephal: Are you fucking kidding me?
  • 20:27 - 20:31
    TV character 1: Where's Decker again?
    TV character 2: He's in an Army Base.
  • 20:31 - 20:36
    Gibberish
    TV announcer: A lone scientist is on the
  • 20:36 - 20:39
    trail of a computer spy...
    Drephal: Yeah, because that would be
  • 20:39 - 20:44
    really awesome if we could actually watch
    it.
  • 20:44 - 21:03
    Shouting
    Drephal: Huh? Oh, man. Um, can we just go
  • 21:03 - 21:14
    to the slide that we need, maybe? This
    is... okay. Should we try it? Well, it
  • 21:14 - 21:24
    shows a picture at least. That's good.
    Yeah. Let's just try this. Do some-thing.
  • 21:24 - 21:26
    Technical Angel: You have to start the
    presentation.
  • 21:26 - 21:39
    Drephal: Yeah, I'm trying. Here, right?
    Oh, no. Come on, come on. Well, we're
  • 21:39 - 21:43
    going to get there.
  • 21:43 - 21:46
    TV announcer: Tonight, on Nova...
  • 21:46 - 21:49
    Drephal: Yes!
    Applause
  • 21:49 - 21:56
    TV announcer: A lone scientist on the
    trail of a computer spy. The hacker is out
  • 21:56 - 21:59
    there somewhere, raiding computers,
    stealing government files.
  • 21:59 - 22:02
    Clifford Stoll: Hi, Manny. Some computer
    hacker's looking for him.
  • 22:02 - 22:06
    TV announcer: The true story of Cliff
    Stoll's real life adventure, featuring the
  • 22:06 - 22:12
    actual participants recreating the events
    is The KGB, The Computer and Me.
  • 22:12 - 22:14
    Laughter
  • 22:14 - 22:19
    Drephal: I like his hair. Okay, so,
  • 22:19 - 22:26
    Clifford Stoll's story is that he was a
    systems administrator at Lawrence Berkeley
  • 22:26 - 22:32
    Laboratory and he noticed in his
    accounting system 75 cents missing because
  • 22:32 - 22:39
    some user had accrued 75 cents of computer
    time and not paid for it. And he found out
  • 22:39 - 22:45
    that there was a weird user he didn't
    know. And he just deleted him. A couple of
  • 22:45 - 22:49
    days later, somebody else was on his
    computer and had system privileges. And he
  • 22:49 - 22:54
    says, he just got interested. He didn't
    want to shut this person out, he wanted to
  • 22:54 - 23:01
    know who it was and what they were doing.
    So he started tracking whoever was coming
  • 23:01 - 23:07
    into his computers for months, actually a
    whole year in the end, that he was
  • 23:07 - 23:17
    tracking this person. He got help from a
    friendly district attorney who got him a
  • 23:17 - 23:26
    warrant to trace the phone lines. And,
    long story short... Can you actually see
  • 23:26 - 23:34
    something? That's nice. He found out that
    his intruder came in through TimeNet, the
  • 23:34 - 23:40
    equivalent, the American equivalent of
    Data XP. And he wasn't even in the US. He
  • 23:40 - 23:47
    was in Germany. He came in through Data XP
    at the University of Bremen. And the trace
  • 23:47 - 23:51
    ended in Hanover. And in Hanover, the
    problem was that they had really old
  • 23:51 - 23:59
    switches from the 1950s, and it would have
    taken about an hour to track the hacker
  • 23:59 - 24:08
    back to his own phone at home. And the
    problem was the hacker never stayed long
  • 24:08 - 24:13
    enough on Stoll's computers. He used them
    as a gateway to get into much more
  • 24:13 - 24:22
    interesting computers. For example, the
    Pentagon database at the Pentagon, the Air
  • 24:22 - 24:31
    Force, the Navy, the Army, even Army
    computers in Japan. Computers in the
  • 24:31 - 24:39
    Ramstein, Germany. So Stoll was at a loss:
    How to keep him in a system long enough so
  • 24:39 - 24:45
    he could actually, or the German post
    could actually track this person back to
  • 24:45 - 24:52
    his own phone line. So he says that his
    girlfriend came up with the idea: If
  • 24:52 - 24:56
    there's nothing on your computer that
    interests him, then then put something
  • 24:56 - 25:01
    there. Put some files there that look
    super secret and are super big so that he
  • 25:01 - 25:10
    needs time to look at them. And that
    actually worked. They made up a bunch of
  • 25:10 - 25:14
    Big Data and they even put in a mailing
    list that said, OK, if you want more
  • 25:14 - 25:20
    information about Strategic Defense
    Initiative, also known as Star Wars, send
  • 25:20 - 25:26
    us a letter because it's so much data, we
    have to send it through the post. And
  • 25:26 - 25:32
    surprisingly enough, that worked. First of
    all, The German post was able to track
  • 25:32 - 25:40
    Clifford Stoll's hacker back to the house
    of one of our KGB hackers, Urmel.
  • 25:40 - 25:44
    His apartment was searched, his office was
    searched, but the police didn't really
  • 25:44 - 25:48
    know what they were looking for because
    they didn't find any disk that said Super
  • 25:48 - 25:55
    Secret SDInet Files or something and
    nothing much came of it. And the second
  • 25:55 - 25:59
    thing that happened was that somebody
    actually answered this mailing list.
  • 25:59 - 26:04
    A Hungarian immigrant in Pittsburgh sent a
    letter to Clifford Stoll asking for
  • 26:04 - 26:11
    information on SDInet files. Was he
    working for the KGB or was he working for
  • 26:11 - 26:14
    somebody else? It's a weird story.
  • 26:14 - 26:21
    In any case, so, in the summer of 1987,
    Clifford
  • 26:21 - 26:26
    Stoll finally knew, OK, there's some dude
    in Germany who's been hacking my computer,
  • 26:26 - 26:31
    but nothing much happened of it. And it
    kind of calmed down a bit until the media
  • 26:31 - 26:38
    got interested. Who got the media
    interested is another interesting
  • 26:38 - 26:45
    question. But in any case, in April of
    1988, German magazine Quick reported on
  • 26:45 - 26:53
    the case using Clifford Stoll's notes. In
    May 1988, he published a paper suggesting
  • 26:53 - 26:58
    that this hacker in his system had
    something to do with the KGB and our
  • 26:58 - 27:07
    hackers got a bit nervous. At this point,
    we have to talk about about Hagbard. His
  • 27:07 - 27:14
    name, his real name was Karl Koch. And in
    1988, he was in a difficult place. He had
  • 27:14 - 27:21
    psychological issues, he had drug issues,
    he had money problems. And he started
  • 27:21 - 27:26
    talking to journalists, offering to tell
    wild stories about the KGB and what he
  • 27:26 - 27:32
    could do, offering to hack into nuclear
    reactors, which obviously was not
  • 27:32 - 27:40
    possible. But he just wanted to get a lot
    of money for it. And the others got a bit
  • 27:40 - 27:49
    nervous. And in July, the youngest in the
    group went to the authorities and offered
  • 27:49 - 27:55
    to be a witness if he got immunity for
    anything that he might have done. And this
  • 27:55 - 28:02
    led to the video I wanted to show you in
    the beginning when in March 1989, arrests
  • 28:02 - 28:06
    were made, all five of them were arrested.
    Two had to stay in jail because they had
  • 28:06 - 28:12
    prior convictions. Houses were searched
    and the media descended on the Chaos
  • 28:12 - 28:19
    Computer Club because these five guys were
    somehow related. And suddenly, the Chaos
  • 28:19 - 28:25
    Computer Club was not this harmless group
    anymore. But the media portrayed them as,
  • 28:25 - 28:34
    you know, working for the KGB, hacking
    basically everything. And dramatizing the
  • 28:34 - 28:37
    whole situation.
  • 28:37 - 28:44
    What actually came out of
    it was not so much. The process, in early
  • 28:44 - 28:51
    1990, focused on questions like if any
    classified information was actually
  • 28:51 - 28:57
    transferred or stored anywhere,
    downloaded. Nobody could prove that.
  • 28:57 - 29:03
    If the USA or Germany were actually
    compromised in any way. Not really. And
  • 29:03 - 29:10
    how... The main question was how did this
    Hungarian immigrant get this mailing list?
  • 29:10 - 29:16
    Because only Clifford Stoll and the hacker
    could have had access to it. And the
  • 29:16 - 29:23
    question is, did he actually get it from
    the KGB or was it, as one of, one of our
  • 29:23 - 29:30
    hackers suggested a couple of years ago in
    a podcast, maybe it might have been, he
  • 29:30 - 29:35
    might have been an agent provocateur, he
    might have been set up by somebody to push
  • 29:35 - 29:41
    these investigations after the German
    authorities didn't really do much with it.
  • 29:41 - 29:44
    That's the question.
  • 29:44 - 29:53
    So this biggest spy case since
    Guillaume ended with probation
  • 29:53 - 30:00
    sentences and some fines because there was
    no proof that any real harm had been done.
  • 30:00 - 30:10
    The most tragic outcome maybe was the
    death of Karl Koch, who was our hacker
  • 30:10 - 30:19
    Hagbard. He was a very troubled young man.
    He was orphaned early. He inherited a lot
  • 30:19 - 30:24
    of money when he was young, which is
    always difficult. He bought a computer. He
  • 30:24 - 30:30
    had a nice apartment. He had parties with
    his friends. He consumed drugs. And he was
  • 30:30 - 30:37
    from a young age obsessed with the novel
    Illuminatus!, and the number 23. A movie
  • 30:37 - 30:44
    was made about him in 1998, it's nice, you
    can find it on YouTube. I didn't include
  • 30:44 - 30:49
    it in my links because I'm not sure about
    the copyright situation. But it's
  • 30:49 - 30:59
    interesting, nice soundtrack. And this
    whole situation in 1989, the media
  • 30:59 - 31:06
    pressing down on him and him having these
    illusions... He thought the Illuminati
  • 31:06 - 31:10
    were in his head controlling his thoughts.
    He thought they were controlling the
  • 31:10 - 31:17
    international networks and he had to do
    something about it. Ended on May 23rd,
  • 31:17 - 31:22
    1989, when he was 23 years old.
  • 31:22 - 31:26
    He officially committed suicide by burning
  • 31:26 - 31:33
    himself. And that is such a gruesome way
    to die that immediately there were
  • 31:33 - 31:39
    conspiracy theories that maybe he didn't
    commit suicide, maybe he had help doing
  • 31:39 - 31:42
    it. And that's something I
    cannot answer, obviously.
  • 31:42 - 31:50
    The much more lasting result of
  • 31:50 - 31:56
    this whole case was the image loss that
    the Chaos Computer Club suffered. Because
  • 31:56 - 32:04
    suddenly they weren't harmless pranksters
    joyriding through computers and, you know,
  • 32:04 - 32:13
    showing companies flaws in their systems,
    showing the post flaws in their BTX
  • 32:13 - 32:21
    system, for example. Suddenly they were
    portrayed as dangerous hackers, selling
  • 32:21 - 32:30
    secrets, being spies, and, you know, they
    can't be trusted. And as far as I read,
  • 32:30 - 32:40
    the club almost dissolved about this issue
    in 1990, but luckily survived. But this is
  • 32:40 - 32:45
    an image that is still lingering today.
    And I think this image of hackers being
  • 32:45 - 32:50
    somehow untrustworthy and being somehow
    dangerous, you don't know really what they
  • 32:50 - 32:56
    do and why they do it, but they're
    dangerous, that is still lingering today.
  • 32:59 - 33:04
    Whenever the media tells you something
    about hackers, they always show you
  • 33:04 - 33:11
    something like, hi. Something like this.
    An anonymous, Anonymous dude with a hoodie
  • 33:11 - 33:16
    sitting in front of a computer. Some
    random numbers flashing. They don't make
  • 33:16 - 33:22
    any sense, but it looks dangerous. And,
    oh, yeah. And these hackers, they're
  • 33:22 - 33:26
    everywhere. They won't stop at anything.
  • 33:26 - 33:28
    Laughter
  • 33:28 - 33:31
    Drephal: Just two days ago on Christmas.
  • 33:31 - 33:40
    Laughter and applause
  • 33:40 - 33:42
    German supermarket chain REWE had to call
  • 33:42 - 33:50
    back their chopped almonds because they've
    been hacked. Beware. And so I was
  • 33:50 - 33:57
    interested in taking a look at how the
    media portrays hackers these days.
  • 33:57 - 34:02
    So I did some Google searches. I thought,
    okay, what are famous hacking groups
  • 34:02 - 34:07
    that you read about a lot? And for
    example, you know, we were talking about
  • 34:07 - 34:15
    the KGB. So what about Russian hackers? So
    the first results I saw was Russian
  • 34:15 - 34:20
    hacking: How did it affect the 2016
    elections? So apparently Russian hackers
  • 34:20 - 34:26
    are still very much busy with the United
    States and the elections leaking
  • 34:26 - 34:31
    documents, supporting Trump for some
    reason. That's what you find on the media
  • 34:31 - 34:37
    about Russian hackers. And then I thought,
    OK, what else is there today? What about
  • 34:37 - 34:42
    China? Chinese hackers sounds dangerous.
    What are they doing? So Chinese hackers
  • 34:42 - 34:49
    apparently are busy hacking two factor
    authentication these days. They're in your
  • 34:49 - 34:57
    phone, beware. Hacking you, right now, as
    I speak. But what about German hackers?
  • 34:57 - 35:01
    We've been talking about these German
    hackers who basically crashed the image of
  • 35:01 - 35:08
    hacking forever. So what are they up to
    today? When you google German hackers, the
  • 35:08 - 35:12
    first result is Clifford Stoll.
    Laughing
  • 35:12 - 35:20
    Drephal: After 30 years, really, still?
    That's the news? I don't know, maybe it's
  • 35:20 - 35:22
    time to make German Hacking Great Again.
  • 35:22 - 35:29
    Laughter and applause
  • 35:31 - 35:40
    Drephal: Very good. So. And finally, what
    about the Chaos Computer Club? What has
  • 35:40 - 35:47
    changed in the past 30 years? Here's
    another quote that I've found of a
  • 35:47 - 35:54
    Congress and the issues that were
    discussed at Congress. Someone standing up
  • 35:54 - 36:02
    and telling the audience that he was
    unhappy with where he saw Chaos going. The
  • 36:02 - 36:06
    political direction is unacceptable.
    Concentrating on things like environmental
  • 36:06 - 36:12
    protection, climate change or something,
    is diverting the group from its technical
  • 36:12 - 36:17
    origins. And it's little wonder that truly
    talented hackers are beginning to abandon
  • 36:17 - 36:21
    the club. This is from 1988.
  • 36:23 - 36:28
    So are we still having the same
    issues today? Are we
  • 36:28 - 36:34
    still discussing the same thing? Where is
    the CCC going? Is it too political? Should
  • 36:34 - 36:43
    it focus more on real hacking, on the
    technology or what? But fortunately, a lot
  • 36:43 - 36:48
    has changed. For example, when you think
    about those guys who were at the Congress
  • 36:48 - 36:56
    in the 1980s, how many people were there,
    like 400? At a Congress in 85? How many
  • 36:56 - 37:01
    people are here today? 16.000? I mean, not
    in this room, but I think last year was
  • 37:01 - 37:08
    16.000. That's amazing. And something else
    I mentioned, when I was this big, I didn't
  • 37:08 - 37:13
    attend Congress. But today you walk around
    and there's tiny hackers whizzing on
  • 37:13 - 37:20
    scooters everywhere, which is awesome.
    People are bringing their kids and you
  • 37:20 - 37:27
    have a much wider cross section of society
    today. And something else... I don't know
  • 37:27 - 37:31
    if you noticed, but when I told you the
    story about the KGB hack, what was
  • 37:31 - 37:36
    missing? There was something
    that did not show up.
  • 37:36 - 37:38
    Women. The only women, the only
  • 37:38 - 37:43
    woman in this story is Clifford Stoll's
    girlfriend, who allegedly came up with the
  • 37:43 - 37:47
    idea of planting a honey pot in his
    system. There is no other woman in this
  • 37:47 - 37:54
    story. It's all young dudes hacking away.
    And that certainly has changed. There
  • 37:54 - 38:00
    are... I don't know the percentage. I
    can't tell. But there's so many women and
  • 38:00 - 38:07
    other non male participants that, like I
    said, it's a much wider cross-section of
  • 38:07 - 38:14
    society today. But apart from these
    issues, what else what do you think are
  • 38:14 - 38:20
    the issues we have today and we're going
    to have in the future? That's my question
  • 38:20 - 38:26
    to you. And I would like some answers. And
    if you want to confess about hacking
  • 38:26 - 38:35
    something, my DECT is 6623. You can
    telegram me or tell us now.
  • 38:35 - 38:44
    Applause
  • 38:47 - 38:51
    Herald: Thank you very much for this
    excellent talk. We do have six microphones
  • 38:51 - 38:56
    here in the hall. Please line up there.
    Are there questions from the Internet via
  • 38:56 - 38:58
    our Signal Angel?
    Signal Angel: No, there are none.
  • 38:58 - 39:04
    Herald: There are no questions from the
    Internets. Do we have questions here?
  • 39:04 - 39:09
    We have question at microphone three.
    Question: Yes. Oh, my goodness. Thanks a
  • 39:09 - 39:15
    lot for a talk. It was amazing. Can you
    please just show us the first video?
  • 39:15 - 39:21
    Laughter
    Drephal: Oh, yeah. I hope so.
  • 39:21 - 39:24
    Herald: Yes, we have plenty of time.
    Drephal: Yeah. Let's just try to...
  • 39:24 - 39:28
    Herald: In the meantime, if you have
    questions, please line up at the
  • 39:28 - 39:33
    microphones.
    Drephal: I don't want to... Okay, getting
  • 39:33 - 39:40
    close. Getting close. Getting close. Okay.
    You mean this one?
  • 39:40 - 39:47
    Audience: No!
    Drephal: Yeah, that one doesn't work. Oh,
  • 39:47 - 39:54
    not this one? Oh, yeah. The next one.
    Let's try.
  • 39:55 - 39:57
    Intro music
  • 39:57 - 40:00
    Ah!
    Applause
  • 40:07 - 40:09
    Laughter
  • 40:09 - 40:13
    TV announcer: Guten Abend, meine Damen und
    Herren, zu so später Stunde. Sie haben es
  • 40:13 - 40:17
    ja gerade eben schon gehört. Laut Programm
    sollten sie jetzt einen Wirtschaftskrimi
  • 40:17 - 40:21
    mit dem Titel Tanker sehen, den bringen
    wir heute abend nicht. Dafür aber einen
  • 40:21 - 40:26
    Spionagekrimi, und zwar einen echten.
    Einen authentischen Report über den
  • 40:26 - 40:30
    schwersten Spionagefall seit der
    Enttarnung des Kanzleramtsagenten Günter
  • 40:30 - 40:34
    Guillaume.
    Drephal: You can find the whole Brennpunkt
  • 40:34 - 40:42
    on YouTube. It's very interesting. It's
    like 30 minutes. There's a lot of the same
  • 40:42 - 40:51
    images as in the other documentation I
    showed. Dudes in black sunglasses, the CIA
  • 40:51 - 40:56
    and stuff. Also, this documentation about
    Clifford Stoll is hilarious. Not just the
  • 40:56 - 41:01
    scene where where he runs out the shower
    in his towel to his computer because the
  • 41:01 - 41:05
    hacker is on. It's hilarious.
    Herald: So do we have any more questions
  • 41:05 - 41:08
    from the Internet, from the hall.
    Drephal: No?
  • 41:08 - 41:14
    Herald: No, it does not... Well, then
    there is something up at microphone 5.
  • 41:14 - 41:18
    Question: Can you hear me? Yeah.
    Drephal: Where? Ah, there!
  • 41:18 - 41:20
    Q: Do we know anything about the rest of
    the group?
  • 41:20 - 41:24
    Drephal: Yes.
    Q: Working today, for example?
  • 41:24 - 41:34
    Drephal: Yes. Well, about... let me, go
    back or go front. Well, I did... I looked
  • 41:34 - 41:41
    into them. DOB, I could not find anything
    about him. He was actually one of the two
  • 41:41 - 41:45
    who had to stay in prison for almost a
    year because he was fleeing the army
  • 41:45 - 41:50
    service and they were looking for him.
    I couldn't find anything about what he's
  • 41:50 - 41:56
    doing today. Pengo is very active. He has
    a Twitter. He's into vintage computing.
  • 41:56 - 42:01
    And he's, he's the one who's always been
    interviewed. You know, every 10 years, 10
  • 42:01 - 42:07
    years after the KGB hack, 20 years after
    the KGB hack, he's been on TV, he's been
  • 42:07 - 42:11
    on podcasts. You can find a lot about him.
  • 42:11 - 42:16
    But, about 10 years ago, he was on Tim
  • 42:16 - 42:23
    Pritlove's podcast. Very interesting. It's
    two hours long, but it's super
  • 42:23 - 42:29
    interesting, very detailed in, into the
    beginnings of the Internet. And there he
  • 42:29 - 42:34
    said, OK. He's being asked about this
    again and again. And sometimes you just
  • 42:34 - 42:39
    don't want to talk about it anymore. I can
    totally understand that. Well, you know
  • 42:39 - 42:43
    what happened about, what happened with
    Hagbard. Urmel, I couldn't find out
  • 42:43 - 42:46
    anything either.
  • 42:47 - 42:53
    Also, Pedro, no.
    Not so much.
  • 42:53 - 42:56
    Herald: So we have another question on
    microphone three.
  • 42:56 - 43:02
    Question: Hi. Well, first of all, thank
    you very much. I did read The Kuckuck's
  • 43:02 - 43:04
    Egg.
    Drephal: Excellent!
  • 43:04 - 43:09
    Q: And thank you for posing the German
    perspective towards it. It really
  • 43:09 - 43:14
    elaborates the story quite a lot. You
    finished your presentation with the
  • 43:14 - 43:19
    question, what is missing, currently, at
    the Chaos Computer Club. I love it
  • 43:19 - 43:22
    probably as much as you do.
  • 43:22 - 43:26
    I come from the Netherlands and
    I have the feeling that in
  • 43:26 - 43:29
    Holland, hackers collaborate much more
    with governments and companies.
  • 43:29 - 43:32
    Drephal: Okay.
    Q: It's good to be critical against
  • 43:32 - 43:37
    government, but to criticize everything
    and to shut out government for everything
  • 43:37 - 43:42
    doesn't solve the problem. So what I'm
    hoping for is a more constructive
  • 43:42 - 43:46
    collaboration with the German government
    and I hope I'm not making myself very
  • 43:46 - 43:50
    impopular here. I perhaps do, but I'm
    Dutch.
  • 43:51 - 43:53
    Laughter
    Drephal: Thank you.
  • 43:53 - 43:58
    Applause
  • 43:58 - 44:04
    Herald: Another question, microphone one.
    Question: Hi. Just to get the facts
  • 44:04 - 44:10
    straight. So, I mean, I guess we all know
    here the story, the development of the
  • 44:10 - 44:17
    term hacking since the IT hacks, et
    cetera. Would you say that explicitly, the
  • 44:17 - 44:23
    story with the German hacking is the thing
    that stained the name of hacking in our
  • 44:23 - 44:28
    mainstream consciousness?
    Drephal: Not, not alone. I mean, there's
  • 44:28 - 44:34
    obviously when you look at the US, there's
    cases of hacking. I mean, talking about
  • 44:34 - 44:40
    Kevin Mitnick, for example, Robert Tappan
    Morris, who shut down all the computers in
  • 44:40 - 44:48
    the US for days. That's something that,
    obviously, formed the image of hacking in
  • 44:48 - 44:53
    the US and I, I'm not sure about other
    countries to be, to be honest. But I'm
  • 44:53 - 45:00
    thinking that it was around the same time,
    so end of the 80s, hacking kind of lost
  • 45:00 - 45:06
    its innocence through various infamous
    hacks like the KGB hack.
  • 45:06 - 45:08
    Q: Thank you very much.
    Drephal: Thank you.
  • 45:08 - 45:12
    Herald: Next question, microphone three.
    Question: Yes. Thank you, interesting
  • 45:12 - 45:17
    talk. And is there a list or has...
    Herald: Please talk a bit closer to the
  • 45:17 - 45:20
    microphone. Thank you.
    Q: Has anyone a list of which kind of
  • 45:20 - 45:26
    information has been leaked or which kind
    of facilities have been compromised? And
  • 45:26 - 45:31
    second questions, have the Russians ever
    confirmed this hack?
  • 45:31 - 45:39
    Drephal: First question. Yes. Well,
    there's the official documents that came
  • 45:39 - 45:47
    out in, in the process. There's actually,
    if you, if you read German, there is an
  • 45:47 - 45:53
    interesting book that came out in 1990
    about this case. And it has very detailed
  • 45:53 - 45:59
    information about what kind of
    institutions have been hacked and what
  • 45:59 - 46:08
    kind of information has been given to the
    Soviets. But most of it, I guess, is, is,
  • 46:08 - 46:14
    comes from confessions, because there was
    no proof. The Russians did never confirm
  • 46:14 - 46:20
    that, yeah, OK, We got this and we got
    that. No, of course not. And so most of it
  • 46:20 - 46:30
    is what the hackers actually confessed.
    Herald: Do we have any more questions? It
  • 46:30 - 46:35
    does not look like that. So for anyone who
    left already. You're going to miss out on
  • 46:35 - 46:37
    the outro video.
    Drephal: Yeah.
  • 46:37 - 46:44
    Herald: Take it away.
    Drephal: If I can actually do that because
  • 46:44 - 46:51
    there's no more questions. Are we seeing
    this? Excellent. It's just one thing, for
  • 46:51 - 46:54
    me, left to do.
  • 46:58 - 47:00
    Why am I...
  • 47:10 - 47:12
    Drephal: Thank you!
  • 47:12 - 47:15
    Applause
    Herald: Thank you. Big one, round of
  • 47:15 - 47:20
    applause.
    Applause
  • 47:20 - 47:24
    postroll music
  • 47:24 - 47:47
    subtitles created by c3subtitles.de
    in the year 2019. Join, and help us!
Title:
36C3 - The KGB Hack: 30 Years Later
Description:

more » « less
Video Language:
English
Duration:
47:47

English subtitles

Revisions