-
36C3 preroll music
-
Herald Angel: Good evening, everyone. Our
next speaker is a historian and she is
-
rolling back time for us, 30 years to the
very beginnings of the Chaos Computer Club
-
and taking a closer look at the KGB hack,
the infamous KGB hack and what Karl Koch
-
did back them. So let's journey
back to the 80s with Anja Drephal.
-
Applause
-
Anja Drephal: Thank you. I was hoping to
see my presentation.
-
laughter
Drephal: Why am I not seeing my
-
presentation, my slides?
-
Yes. Thank you.
-
Dial-up noises
-
Drephal: Thank you.
Applause.
-
Drephal: That applause, guys, goes to my
amazing hacker who did this little video
-
as a start to my presentation. Thank you.
-
Why? No ...
Laughter
-
Drephal: I guess we'll have to do it again.
-
No, no. What is happening?
-
No, no, no, no, no.
-
Okay, okay. Welcome to 1989.
-
Before I start, I have to say, when you
start researching a topic like the KGB hack,
-
you suddenly find out there are so many
sources, not just books that have been
-
written, movies that have been made,
documentaries. There's articles in
-
newspapers, on the internet. There's
podcasts you can listen to that go into
-
every little detail of this case, every
little detail of the early history of the
-
CCC, the early history of the Internet as
it is, and due to time constraints that we
-
have, I'm going to have to simplify quite
a few things to just, you know, give you
-
an overview and tell you a story about
this topic. And I'm counting on you to
-
raise questions, in the end, at our Q&A,
to maybe go into more detail if you find
-
out, OK, there is something that should
have been a little more detailed is
-
something that, hey, I know about -
something about this because I'm sure a
-
lot of you know maybe more than me about
this story. So that's something that I'm
-
hoping we can do in 45 minutes, 40
minutes. First of all, I'd like to ask a
-
question - two questions to the audience.
Does anyone here think that this talk
-
might mention their name?
-
Yes. Who are you?
-
Laughter
Drephal: Well, I'm not going to mention
-
any real names except for one. So maybe
you would like to join us in the end. Or
-
you know, if not, then not. Second
question, is anyone here who attended
-
Congress in the 1980s? Excellent. Well,
personally, I did not because I was busy
-
with kindergarten and elementary school
and stuff. My first Congress was in 2012
-
when a friend of mine introduced me to the
Chaos Computer Club. I went to Hamburg.
-
I spent four amazing days at Congress, and
in the end I thought, oh my God, this is
-
so great. And I thought, OK, what could I
give back to this amazing community? What
-
could I add to this experience? And I'm
not a hacker or very much into tech, but
-
I'm a historian. I can tell you history,
and I'm very thankful that the content
-
team has now invited me for the fourth
time to tell you about history. I'm very
-
thankful that this talk has gotten a slot
on day one, because I think it's the
-
perfect time to take a look back at what
was, to take a look at what has changed,
-
to remember those who unfortunately cannot
be here today and then spend three more
-
days in the present, at this Congress. So
let me set the scene for you. It's 1989,
-
especially it's March 1989. In March,
1989, the world was still very much
-
divided. Germany was still divided into
West Germany and the German Democratic
-
Republic. And looking at Leipzig in March
1989, we had the spring fair. Not here,
-
but in the old fairgrounds. And the German
Democratic Republic proudly presented
-
their latest and greatest in technology.
They had just developed a four megabit
-
hybrid memory - four megabits.
Unfortunately, it was way too expensive to
-
make it on the world market. But they were
proud. West Germany had its own issues.
-
Laughter
Drephal: Difficult times. People had to
-
wear stone washed jeans and pastel colored
sweaters. Number one hit in the West
-
German charts in March was David
Hasselhoff, Looking for Freedom. And Bill
-
and Ted were going on an excellent
adventure. Sequel is coming out next year,
-
don't miss it.
Laughter
-
Drephal: Speaking about television,
private television in West Germany was
-
still very much in its infancy. Most
people still had three television channels
-
first, second, third and they got their
information from the television. The first
-
program showed the news every night at
8:00. People watched it, much more than
-
today. And sometimes the first German
television had a special program called Im
-
Brennpunkt, In Focus. That always came out
when something was so exciting, so
-
newsworthy that it couldn't be
sufficiently dealt with in the normal
-
news. So on March 2nd, 1989, the first
German television showed this.
-
Music
-
Drephal: Why isn't it moving? Oh, come on,
-
please. It's moving on my screen.
TV moderator speaking in German
-
Drephal: Would have been nice, if...
TV moderator speaking in German
-
Drephal: Well, okay, if it had been
moving, you would have seen a dude in a
-
suit telling you that the biggest spy case
since Günter Guillaume has just been
-
uncovered. Günter Guillaume was an East
German spy who worked closely in the
-
offices of German Chancellor Willy Brandt
in the 1970s. He worked for the East
-
German Secret Service, and when he was
uncovered, the Chancellor had to step
-
down. So apparently in March 1989, we have
a spy case of German hackers working for
-
the KGB that is as big as Günter
Guillaume. Spoiler: It was not. But
-
anyway. How is that even possible? How can
you, how can German hackers work for the
-
KGB in 1989? How can they hack anything
over the Internet? Well, there is no
-
Internet. What there is, is basically
this. Let's say, in the mid 1980s, you're
-
a teenager and you've got a computer for
Christmas. Lucky you. So what can you do
-
with it? There's no Internet. There are
computers that are connected. Big
-
computers made by IBM and by VAX that are
standing in universities, research
-
institutions, military institutions, big
companies. And you have, in the 1980s, a
-
network that you can actually dial in to
from your home. So you have a phone that's
-
connected to a wall, usually, if it's not
cut off, and you have a computer and if
-
you're lucky, you have a sort of modem.
It's called an acoustic coupler. We have
-
one here for the C64. The most famous one
was the data phone, it's bigger, but this
-
one basically works the same. You strap
your phone to it and you call your local
-
post office. And your local post office in
the 1980s has a network called Data XP,
-
which stands for data exchange packet
based. It's based on the X.25 protocol and
-
it gives you the opportunity to connect to
computers all over Germany and all over
-
Europe and actually all over the world.
What you need is a network user
-
identification, a so-called new NUI, which
is expensive. The call to your local post
-
office, not so much, especially in West
Berlin, which was known as sort of a
-
hacker's paradise because local calls cost
only twenty three Pfennig, twenty three
-
cents, not per minute, but per call. So if
you had a network user identification from
-
somewhere, you could just call your local
data XP office and connect. These NUIs
-
were expensive, but you could find them,
for example, at the computer fair in
-
Hanover because people weren't watching
their screens, their terminals, and maybe
-
you could look over somebody's shoulder
and see their log in and use it and run up
-
charges of thousands of marks and then you
can connect to message boards, which is a
-
bit, well, not so exciting. Much more
exciting is the big computers standing at
-
institutions and companies. And so,
through this, possibility, these
-
possibilities, this network comes a hacker
scene in the 1980s of mostly young people,
-
teenagers, young guys, not so many girls,
who connect to these big computers because
-
they can, because they're there and
they're interesting. And you just want to
-
see what's on them. Especially infamous
was CERN, the nuclear research
-
organization in Switzerland,
where at some point hackers were actually
-
having kind of parties in the system
connecting to the computers and chatting
-
with the systems managers who were a bit
annoyed because they had work to do, but
-
not that bothered because it wasn't really
seen as anything that could harm them. And
-
the point was to go into these computers
because you can to show that you can and
-
to have some fun and not because you're a
criminal or you want to take some data or
-
make money off it, but just as a sport.
And now... and in this scene, the Chaos
-
Computer Club also established itself as
sort of a mediator between these hackers
-
and the institutions and companies that
were being broken into. Always stressing
-
that when you're hacking, you should do it
with an ethical approach. Never, you know,
-
doing any harm. Being excellent. Not
making any money. And for God's sake,
-
staying away from military or Secret
Service computers, don't touch those.
-
Here's a quote on one of the first
Congresses, which I think sounds pretty
-
much like today. This amazing experience
and the news crews interested and
-
reporting on what's happening with these
sort of harmless tech freaks and hackers
-
that were just having fun. And this is the
scene where a group of young men met in
-
the mid 1980's and started hanging out,
started sitting in front of computers,
-
hacking together, talking, consuming
drugs, also, and just, you know, having
-
fun. And these are their nicknames. They
were all, sort of, some were programmers,
-
some were teenagers who were into hacking.
One of them, the last one here, wasn't
-
really a hacker. He worked at a casino and
he made some money on his side selling
-
drugs. And they were just hanging out and
and just feeling like they were the
-
greatest. They were... Someone has
compared them to sort of graffiti kids.
-
They did it because they could, just
leaving their mark everywhere in the
-
computers. And... Well, they were just, you
know, talking and somebody had the idea,
-
OK, what can we do to get recognized as
the greatest hackers or how can we make
-
something off it? There's always the issue
of money problems that you might have,
-
stupid ideas that you have when you're a
teenager or a young kid. And one of them
-
came up with the idea, Hey, I know
somebody in East Berlin who might be
-
interested in what we're doing and maybe
we could sell that. I know someone, a
-
Russian, and it might be, you know, it
might actually be a contribution to world
-
peace because the Russians need technology
that they don't have and we have it. We
-
could kind of equalize the scales a bit.
It's a stupid idea, of course. But this
-
guy, Pedro, his name was Peter, he
actually went to East Berlin, walked into
-
the Soviet trade mission and said he
wanted to talk someone about a deal, super
-
stupid, walking in the front door and
someone actually listened to him. A guy
-
who introduced himself as Sergei, who
officially worked at the trade mission,
-
which in my opinion means KGB, was willing
to listen and our hackers offered, OK, we
-
can get you like log-ins to computers in
West Germany and even America. We can even
-
teach you how to hack, you know, for like
a million marks. How about that? And
-
Sergei was like, Okay, that's nice, but I
need something else. Because he had a
-
shopping list which came pretty much
directly from the embargo list made by the
-
Coordinating Committee on Multilateral
Export Controls. There was an embargo,
-
technology and, yeah, electronic parts.
Computers weren't allowed to be sold into
-
the Soviet Union or the Eastern Bloc in
general. And that was basically his
-
shopping list. What the Soviets wanted was
not so much, you know, log-ins to military
-
computers. They wanted source code, for
example... According to the sources, he
-
actually had a list that said, OK, UNIX
source code, twenty five thousand marks,
-
maybe a compiler for this and that, five
thousand marks. And our hackers were able
-
to provide. They didn't exactly make a
million, but about ninety thousand marks
-
exchanged hands in the following months.
-
Until a systems administrator in
-
California noticed something. And now I
have to tell you, the legend of Clifford
-
Stoll. Clifford Stoll has become famous
for uncovering the KGB hackers, and a sort
-
of legend has been built around him,
telling his story again and again. He,
-
there was a funny documentary made. He had
a book coming out. And there are some
-
weird aspects in this story, but maybe we
can talk about them later. So, first of
-
all, I'm just going to give you the story
as he tells it. And I would like to show
-
you, because you can describe this man,
but you just have to see him. And if this
-
video isn't working again, then I'm gonna
be a really, really sad. Please.
-
TV announcer: Tonight, on Nova...
Drephal: Are you fucking kidding me?
-
TV character 1: Where's Decker again?
TV character 2: He's in an Army Base.
-
Gibberish
TV announcer: A lone scientist is on the
-
trail of a computer spy...
Drephal: Yeah, because that would be
-
really awesome if we could actually watch
it.
-
Shouting
Drephal: Huh? Oh, man. Um, can we just go
-
to the slide that we need, maybe? This
is... okay. Should we try it? Well, it
-
shows a picture at least. That's good.
Yeah. Let's just try this. Do some-thing.
-
Technical Angel: You have to start the
presentation.
-
Drephal: Yeah, I'm trying. Here, right?
Oh, no. Come on, come on. Well, we're
-
going to get there.
-
TV announcer: Tonight, on Nova...
-
Drephal: Yes!
Applause
-
TV announcer: A lone scientist on the
trail of a computer spy. The hacker is out
-
there somewhere, raiding computers,
stealing government files.
-
Clifford Stoll: Hi, Manny. Some computer
hacker's looking for him.
-
TV announcer: The true story of Cliff
Stoll's real life adventure, featuring the
-
actual participants recreating the events
is The KGB, The Computer and Me.
-
Laughter
-
Drephal: I like his hair. Okay, so,
-
Clifford Stoll's story is that he was a
systems administrator at Lawrence Berkeley
-
Laboratory and he noticed in his
accounting system 75 cents missing because
-
some user had accrued 75 cents of computer
time and not paid for it. And he found out
-
that there was a weird user he didn't
know. And he just deleted him. A couple of
-
days later, somebody else was on his
computer and had system privileges. And he
-
says, he just got interested. He didn't
want to shut this person out, he wanted to
-
know who it was and what they were doing.
So he started tracking whoever was coming
-
into his computers for months, actually a
whole year in the end, that he was
-
tracking this person. He got help from a
friendly district attorney who got him a
-
warrant to trace the phone lines. And,
long story short... Can you actually see
-
something? That's nice. He found out that
his intruder came in through TimeNet, the
-
equivalent, the American equivalent of
Data XP. And he wasn't even in the US. He
-
was in Germany. He came in through Data XP
at the University of Bremen. And the trace
-
ended in Hanover. And in Hanover, the
problem was that they had really old
-
switches from the 1950s, and it would have
taken about an hour to track the hacker
-
back to his own phone at home. And the
problem was the hacker never stayed long
-
enough on Stoll's computers. He used them
as a gateway to get into much more
-
interesting computers. For example, the
Pentagon database at the Pentagon, the Air
-
Force, the Navy, the Army, even Army
computers in Japan. Computers in the
-
Ramstein, Germany. So Stoll was at a loss:
How to keep him in a system long enough so
-
he could actually, or the German post
could actually track this person back to
-
his own phone line. So he says that his
girlfriend came up with the idea: If
-
there's nothing on your computer that
interests him, then then put something
-
there. Put some files there that look
super secret and are super big so that he
-
needs time to look at them. And that
actually worked. They made up a bunch of
-
Big Data and they even put in a mailing
list that said, OK, if you want more
-
information about Strategic Defense
Initiative, also known as Star Wars, send
-
us a letter because it's so much data, we
have to send it through the post. And
-
surprisingly enough, that worked. First of
all, The German post was able to track
-
Clifford Stoll's hacker back to the house
of one of our KGB hackers, Urmel.
-
His apartment was searched, his office was
searched, but the police didn't really
-
know what they were looking for because
they didn't find any disk that said Super
-
Secret SDInet Files or something and
nothing much came of it. And the second
-
thing that happened was that somebody
actually answered this mailing list.
-
A Hungarian immigrant in Pittsburgh sent a
letter to Clifford Stoll asking for
-
information on SDInet files. Was he
working for the KGB or was he working for
-
somebody else? It's a weird story.
-
In any case, so, in the summer of 1987,
Clifford
-
Stoll finally knew, OK, there's some dude
in Germany who's been hacking my computer,
-
but nothing much happened of it. And it
kind of calmed down a bit until the media
-
got interested. Who got the media
interested is another interesting
-
question. But in any case, in April of
1988, German magazine Quick reported on
-
the case using Clifford Stoll's notes. In
May 1988, he published a paper suggesting
-
that this hacker in his system had
something to do with the KGB and our
-
hackers got a bit nervous. At this point,
we have to talk about about Hagbard. His
-
name, his real name was Karl Koch. And in
1988, he was in a difficult place. He had
-
psychological issues, he had drug issues,
he had money problems. And he started
-
talking to journalists, offering to tell
wild stories about the KGB and what he
-
could do, offering to hack into nuclear
reactors, which obviously was not
-
possible. But he just wanted to get a lot
of money for it. And the others got a bit
-
nervous. And in July, the youngest in the
group went to the authorities and offered
-
to be a witness if he got immunity for
anything that he might have done. And this
-
led to the video I wanted to show you in
the beginning when in March 1989, arrests
-
were made, all five of them were arrested.
Two had to stay in jail because they had
-
prior convictions. Houses were searched
and the media descended on the Chaos
-
Computer Club because these five guys were
somehow related. And suddenly, the Chaos
-
Computer Club was not this harmless group
anymore. But the media portrayed them as,
-
you know, working for the KGB, hacking
basically everything. And dramatizing the
-
whole situation.
-
What actually came out of
it was not so much. The process, in early
-
1990, focused on questions like if any
classified information was actually
-
transferred or stored anywhere,
downloaded. Nobody could prove that.
-
If the USA or Germany were actually
compromised in any way. Not really. And
-
how... The main question was how did this
Hungarian immigrant get this mailing list?
-
Because only Clifford Stoll and the hacker
could have had access to it. And the
-
question is, did he actually get it from
the KGB or was it, as one of, one of our
-
hackers suggested a couple of years ago in
a podcast, maybe it might have been, he
-
might have been an agent provocateur, he
might have been set up by somebody to push
-
these investigations after the German
authorities didn't really do much with it.
-
That's the question.
-
So this biggest spy case since
Guillaume ended with probation
-
sentences and some fines because there was
no proof that any real harm had been done.
-
The most tragic outcome maybe was the
death of Karl Koch, who was our hacker
-
Hagbard. He was a very troubled young man.
He was orphaned early. He inherited a lot
-
of money when he was young, which is
always difficult. He bought a computer. He
-
had a nice apartment. He had parties with
his friends. He consumed drugs. And he was
-
from a young age obsessed with the novel
Illuminatus!, and the number 23. A movie
-
was made about him in 1998, it's nice, you
can find it on YouTube. I didn't include
-
it in my links because I'm not sure about
the copyright situation. But it's
-
interesting, nice soundtrack. And this
whole situation in 1989, the media
-
pressing down on him and him having these
illusions... He thought the Illuminati
-
were in his head controlling his thoughts.
He thought they were controlling the
-
international networks and he had to do
something about it. Ended on May 23rd,
-
1989, when he was 23 years old.
-
He officially committed suicide by burning
-
himself. And that is such a gruesome way
to die that immediately there were
-
conspiracy theories that maybe he didn't
commit suicide, maybe he had help doing
-
it. And that's something I
cannot answer, obviously.
-
The much more lasting result of
-
this whole case was the image loss that
the Chaos Computer Club suffered. Because
-
suddenly they weren't harmless pranksters
joyriding through computers and, you know,
-
showing companies flaws in their systems,
showing the post flaws in their BTX
-
system, for example. Suddenly they were
portrayed as dangerous hackers, selling
-
secrets, being spies, and, you know, they
can't be trusted. And as far as I read,
-
the club almost dissolved about this issue
in 1990, but luckily survived. But this is
-
an image that is still lingering today.
And I think this image of hackers being
-
somehow untrustworthy and being somehow
dangerous, you don't know really what they
-
do and why they do it, but they're
dangerous, that is still lingering today.
-
Whenever the media tells you something
about hackers, they always show you
-
something like, hi. Something like this.
An anonymous, Anonymous dude with a hoodie
-
sitting in front of a computer. Some
random numbers flashing. They don't make
-
any sense, but it looks dangerous. And,
oh, yeah. And these hackers, they're
-
everywhere. They won't stop at anything.
-
Laughter
-
Drephal: Just two days ago on Christmas.
-
Laughter and applause
-
German supermarket chain REWE had to call
-
back their chopped almonds because they've
been hacked. Beware. And so I was
-
interested in taking a look at how the
media portrays hackers these days.
-
So I did some Google searches. I thought,
okay, what are famous hacking groups
-
that you read about a lot? And for
example, you know, we were talking about
-
the KGB. So what about Russian hackers? So
the first results I saw was Russian
-
hacking: How did it affect the 2016
elections? So apparently Russian hackers
-
are still very much busy with the United
States and the elections leaking
-
documents, supporting Trump for some
reason. That's what you find on the media
-
about Russian hackers. And then I thought,
OK, what else is there today? What about
-
China? Chinese hackers sounds dangerous.
What are they doing? So Chinese hackers
-
apparently are busy hacking two factor
authentication these days. They're in your
-
phone, beware. Hacking you, right now, as
I speak. But what about German hackers?
-
We've been talking about these German
hackers who basically crashed the image of
-
hacking forever. So what are they up to
today? When you google German hackers, the
-
first result is Clifford Stoll.
Laughing
-
Drephal: After 30 years, really, still?
That's the news? I don't know, maybe it's
-
time to make German Hacking Great Again.
-
Laughter and applause
-
Drephal: Very good. So. And finally, what
about the Chaos Computer Club? What has
-
changed in the past 30 years? Here's
another quote that I've found of a
-
Congress and the issues that were
discussed at Congress. Someone standing up
-
and telling the audience that he was
unhappy with where he saw Chaos going. The
-
political direction is unacceptable.
Concentrating on things like environmental
-
protection, climate change or something,
is diverting the group from its technical
-
origins. And it's little wonder that truly
talented hackers are beginning to abandon
-
the club. This is from 1988.
-
So are we still having the same
issues today? Are we
-
still discussing the same thing? Where is
the CCC going? Is it too political? Should
-
it focus more on real hacking, on the
technology or what? But fortunately, a lot
-
has changed. For example, when you think
about those guys who were at the Congress
-
in the 1980s, how many people were there,
like 400? At a Congress in 85? How many
-
people are here today? 16.000? I mean, not
in this room, but I think last year was
-
16.000. That's amazing. And something else
I mentioned, when I was this big, I didn't
-
attend Congress. But today you walk around
and there's tiny hackers whizzing on
-
scooters everywhere, which is awesome.
People are bringing their kids and you
-
have a much wider cross section of society
today. And something else... I don't know
-
if you noticed, but when I told you the
story about the KGB hack, what was
-
missing? There was something
that did not show up.
-
Women. The only women, the only
-
woman in this story is Clifford Stoll's
girlfriend, who allegedly came up with the
-
idea of planting a honey pot in his
system. There is no other woman in this
-
story. It's all young dudes hacking away.
And that certainly has changed. There
-
are... I don't know the percentage. I
can't tell. But there's so many women and
-
other non male participants that, like I
said, it's a much wider cross-section of
-
society today. But apart from these
issues, what else what do you think are
-
the issues we have today and we're going
to have in the future? That's my question
-
to you. And I would like some answers. And
if you want to confess about hacking
-
something, my DECT is 6623. You can
telegram me or tell us now.
-
Applause
-
Herald: Thank you very much for this
excellent talk. We do have six microphones
-
here in the hall. Please line up there.
Are there questions from the Internet via
-
our Signal Angel?
Signal Angel: No, there are none.
-
Herald: There are no questions from the
Internets. Do we have questions here?
-
We have question at microphone three.
Question: Yes. Oh, my goodness. Thanks a
-
lot for a talk. It was amazing. Can you
please just show us the first video?
-
Laughter
Drephal: Oh, yeah. I hope so.
-
Herald: Yes, we have plenty of time.
Drephal: Yeah. Let's just try to...
-
Herald: In the meantime, if you have
questions, please line up at the
-
microphones.
Drephal: I don't want to... Okay, getting
-
close. Getting close. Getting close. Okay.
You mean this one?
-
Audience: No!
Drephal: Yeah, that one doesn't work. Oh,
-
not this one? Oh, yeah. The next one.
Let's try.
-
Intro music
-
Ah!
Applause
-
Laughter
-
TV announcer: Guten Abend, meine Damen und
Herren, zu so später Stunde. Sie haben es
-
ja gerade eben schon gehört. Laut Programm
sollten sie jetzt einen Wirtschaftskrimi
-
mit dem Titel Tanker sehen, den bringen
wir heute abend nicht. Dafür aber einen
-
Spionagekrimi, und zwar einen echten.
Einen authentischen Report über den
-
schwersten Spionagefall seit der
Enttarnung des Kanzleramtsagenten Günter
-
Guillaume.
Drephal: You can find the whole Brennpunkt
-
on YouTube. It's very interesting. It's
like 30 minutes. There's a lot of the same
-
images as in the other documentation I
showed. Dudes in black sunglasses, the CIA
-
and stuff. Also, this documentation about
Clifford Stoll is hilarious. Not just the
-
scene where where he runs out the shower
in his towel to his computer because the
-
hacker is on. It's hilarious.
Herald: So do we have any more questions
-
from the Internet, from the hall.
Drephal: No?
-
Herald: No, it does not... Well, then
there is something up at microphone 5.
-
Question: Can you hear me? Yeah.
Drephal: Where? Ah, there!
-
Q: Do we know anything about the rest of
the group?
-
Drephal: Yes.
Q: Working today, for example?
-
Drephal: Yes. Well, about... let me, go
back or go front. Well, I did... I looked
-
into them. DOB, I could not find anything
about him. He was actually one of the two
-
who had to stay in prison for almost a
year because he was fleeing the army
-
service and they were looking for him.
I couldn't find anything about what he's
-
doing today. Pengo is very active. He has
a Twitter. He's into vintage computing.
-
And he's, he's the one who's always been
interviewed. You know, every 10 years, 10
-
years after the KGB hack, 20 years after
the KGB hack, he's been on TV, he's been
-
on podcasts. You can find a lot about him.
-
But, about 10 years ago, he was on Tim
-
Pritlove's podcast. Very interesting. It's
two hours long, but it's super
-
interesting, very detailed in, into the
beginnings of the Internet. And there he
-
said, OK. He's being asked about this
again and again. And sometimes you just
-
don't want to talk about it anymore. I can
totally understand that. Well, you know
-
what happened about, what happened with
Hagbard. Urmel, I couldn't find out
-
anything either.
-
Also, Pedro, no.
Not so much.
-
Herald: So we have another question on
microphone three.
-
Question: Hi. Well, first of all, thank
you very much. I did read The Kuckuck's
-
Egg.
Drephal: Excellent!
-
Q: And thank you for posing the German
perspective towards it. It really
-
elaborates the story quite a lot. You
finished your presentation with the
-
question, what is missing, currently, at
the Chaos Computer Club. I love it
-
probably as much as you do.
-
I come from the Netherlands and
I have the feeling that in
-
Holland, hackers collaborate much more
with governments and companies.
-
Drephal: Okay.
Q: It's good to be critical against
-
government, but to criticize everything
and to shut out government for everything
-
doesn't solve the problem. So what I'm
hoping for is a more constructive
-
collaboration with the German government
and I hope I'm not making myself very
-
impopular here. I perhaps do, but I'm
Dutch.
-
Laughter
Drephal: Thank you.
-
Applause
-
Herald: Another question, microphone one.
Question: Hi. Just to get the facts
-
straight. So, I mean, I guess we all know
here the story, the development of the
-
term hacking since the IT hacks, et
cetera. Would you say that explicitly, the
-
story with the German hacking is the thing
that stained the name of hacking in our
-
mainstream consciousness?
Drephal: Not, not alone. I mean, there's
-
obviously when you look at the US, there's
cases of hacking. I mean, talking about
-
Kevin Mitnick, for example, Robert Tappan
Morris, who shut down all the computers in
-
the US for days. That's something that,
obviously, formed the image of hacking in
-
the US and I, I'm not sure about other
countries to be, to be honest. But I'm
-
thinking that it was around the same time,
so end of the 80s, hacking kind of lost
-
its innocence through various infamous
hacks like the KGB hack.
-
Q: Thank you very much.
Drephal: Thank you.
-
Herald: Next question, microphone three.
Question: Yes. Thank you, interesting
-
talk. And is there a list or has...
Herald: Please talk a bit closer to the
-
microphone. Thank you.
Q: Has anyone a list of which kind of
-
information has been leaked or which kind
of facilities have been compromised? And
-
second questions, have the Russians ever
confirmed this hack?
-
Drephal: First question. Yes. Well,
there's the official documents that came
-
out in, in the process. There's actually,
if you, if you read German, there is an
-
interesting book that came out in 1990
about this case. And it has very detailed
-
information about what kind of
institutions have been hacked and what
-
kind of information has been given to the
Soviets. But most of it, I guess, is, is,
-
comes from confessions, because there was
no proof. The Russians did never confirm
-
that, yeah, OK, We got this and we got
that. No, of course not. And so most of it
-
is what the hackers actually confessed.
Herald: Do we have any more questions? It
-
does not look like that. So for anyone who
left already. You're going to miss out on
-
the outro video.
Drephal: Yeah.
-
Herald: Take it away.
Drephal: If I can actually do that because
-
there's no more questions. Are we seeing
this? Excellent. It's just one thing, for
-
me, left to do.
-
Why am I...
-
Drephal: Thank you!
-
Applause
Herald: Thank you. Big one, round of
-
applause.
Applause
-
postroll music
-
subtitles created by c3subtitles.de
in the year 2019. Join, and help us!