📄 rivera.txt
字号:
Winn: A dedicated, motivated group of individuals with proper fundingand a little bit of knowledge of technology.....<another clip from Die Hard II...Workers scrambling around the controltower..Chaos...>Winn: ....has the capability to effectively invade the United Statesvia his computers and communication systems, shut those systems downthat they wish to shut down, and do it invisibly by remote control.<screen shows plane taking off>Krista: The FAA's computerized air traffic control system holds thelives of tens of thousands of travellers in the balance every second.<screen shows fictional computer graphic of air traffic over map ofthe country>Krista: The federal reserve system moves $250 trillion through it'scomputer networks every year. The more computers we have the morevulnerable we become to computer terrorism.<shot of terrorists hijacking TWA plane>Guy in suit in front of microphone: A recent national researchcouncil report says that the modern thief can steal more with acomputer, than with a gun. Tomorrow's terrorists may be able to domore damage with a keyboard, than with a bomb. That's frightening.Krista: Dan Glickman (sp?) sits on the House Science, Space, andTechnology Committee and recently chaired a hearing on computersecurity. Winn Schartau, a leading authority on information securityand author of the novel _Terminal_Compromise_ testified at thishearing.Winn: Terrorism is not necessarily implied by bombs and bullets. Youcan affect massive amounts of people by attacking the right computers.And that's terrorism.<switch back to Emmanuel>Emmanuel: The computer is a tool. And any tool can be used as aweapon.<switch back to A. Hacker - now we see he's with another person (B.hacker?)>A. Hacker: I wouldn't as much call it a weapon as I would call it anextension of one's own mind.<switch back to Winn. He's setting up some sort of satellite receivernext to his terminal and equipment>Krista: For the first time on television we can see just howvulnerable computers are to attack. There are four ways the computercan be used as a weapon. Number one, viruses: programs that copythemselves over and over again. In January, there were 480 virusesIn June, 921. At the current rate there will be 100,000 viruses bythe year 1995.<shows fictional graphic of computers all over the map of the US,apparently supposed to be infected>Winn: There are a new breed of viruses coming out that actually cancause physical damage to the computer. Either cause the monitoritself to blow up, or cause the hard disk to physically crash, thusrendering all the information unusable.Krista: Number 2, interception. Terrorists can intercept phone linesused by computers and faxes. HIgh-tech phone taps.<shows fictional graphic of guy at keyboard intercepting signalstransmitted between two computers>Winn: There are very, very simple, off-the-shelf, products andtechniques that are available to listen in on all your digitalcommunications.Krista: Number 3, electromagnetic eavesdropping. Something our owngovernment has allegedly kept under wraps for 40 years, so it canprotect its military computers while spying on other unprotectedsystems.Winn: You have to view the computer as a miniature radio transmitter.All the information that is being processed on it, and is beingdisplayed on the terminal, your video display terminal, is beingbroadcast into the air just like a radio transmitter.Krista: In an exclusive demonstration of just how easy it is whilesomeone is typing at a computer terminal we can see someone up else toa mile and a half away tune in the radiation with an antenna and readexactly what is being typed.<screen shows one person typing in fictional credit card information,then switches back to Winn's setup, where he tunes in to the frequency19.9217 and is able to see on his terminal the information that wasbeing typed on the other terminal>Krista: And finally number 4, computer guns. These guns are notloaded with bullets but transmit high frequencies or electromagneticpulses, which, when fired, can cause an entire computer system tocrash.<shows fictional graphic of satellite transmitting signal which causescomputer to blow up>Winn: What if I shot your computer with my hertz (sp? unclear word)gun every hour on the hour, forcing your computers down every hour?It takes approximately a half-hour to forty-five minutes to bring oneback up, how long can your company sustain that before you cry uncle?<shows hacker home video again>Krista: Just how real is the threat of computer terrorism? Realenough, according to a GAO report on computer security at theDepartment of Justice. The report identified many disturbing computerflaws which have life and death implications.<shows report>Krista: Real enough according to another GAO report on computersecurity at the stock market. Six of our nation's stock marketcomputers are at risk, which handle 1.8 trillion dollars every year.<shows stock market report>Krista: Real enough that according to a report just this Septemberwhich revealed that top secret bomb designs for every nuclear weaponin the country were left unprotected in the computer system at theRocky Flats Nuclear Weapons Plant.Winn: The current state of affairs is such that we do potentiallyface an electronic Pearl Harbor.<bomb exploding footage>Krista <in front of statue of statue in Washington, apparently>: Justhow many acts of computer terrorism there have been is impossible tosay since our own government refuses to comment. But, the manifestofor the terrorist group The Red Brigade vows that one of its maingoals is to target and destroy computer systems.<shot of Die Hard II again., where Bruce Willis says "This is just thebeginning"><back to the studio...>Geraldo: Joining us now via satellite from Oakland, CA is theAssistant District Attorney Don Ingraham ... for Alameda County and hehas been prosecuting computer hackers for years.<Don is in the TV box, between Geraldo and Craig [KL]>Geraldo: Don, how do you respond to the feeling common among so manyhackers that what they're doing is a public service; they're exposingthe flaws in our security systems?Don: Right, and just like the people who rape a coed on campus areexposing the flaws in our nation's higher education security. It'sabsolute nonsense. They are doing nothing more than showing off toeach other, and satisfying their own appetite to know something thatis not theirs to know.Geraldo: Don, you stand by, Craig as well. And when we come backwe'll hear more from prosecutor Ingraham and from, I guess hisarchrival here, the Mad Hacker Craig Neidorf.<Commercial>Geraldo: We're back with Craig Neidorf, a former University ofMissouri student who ran a widely distributed electronic newsletter[Phrack, duh] for computer hackers. He is so proud of being America'sMost Wanted computer hacker that he has put together this veryimpressive scrapbook.<Geraldo holds up a colorful scrapbook..On the left page shows alightning bolt hitting what looks to be a crown [Knight Lightning]...And on the right it looks like a graphic saying "Knight Lightning"and below that is a black circle with a white lightning bolt, andnext to that is a triangle that looks very similar to the trianglewith an eye that appeared on the cover of _GURPS_Cyberpunk_ [whichsaid in it, the book that was seized by the Secret Service! see page4...- but the one on KL is illegible]>Geraldo: Knight Lightning I guess that was your code?KL: It was my editor handle.Geraldo: That's your handle. OK. And from Oakland, CA we aretalking with the Assistant District Attorney Don Ingraham, who is harddriven, you might say, to put people like Craig behind bars. Don, doyou think Craig's lucky that he's not behind bars right now?Don: Yes, I think he's extraordinarily lucky. He was part of aconspiracy, in my opinion, to take property that wasn't his and shareit with others. They charged him with interstate transport of stolenproperty - couldn't make the threshold -and it came out that it hadbeen compromised by, unfortunately, released by another Bellcoresubsidiary. But was certainly not through any doing of HIS that he isa free man.Geraldo: So you think that his activities stink, then.Don: Absolutely. No Question about it.Geraldo: Craig, you wanna respond? Are you doing something for thegreater good of society?KL: Well I was merely publishing a newsletter. I didn't go out andfind this document. Rather it was sent to me. In many ways it couldbe compared to Daniel Ellsberg sending the Pentagon Papers to the NewYork Times.Geraldo: Do you figure it that way Don? Is he like Daniel Ellsberg?Don: No, Ellsberg went to court to deal with it. Daniel Ellsberg'srelease of the Pentagon Papers is the subject of a published courtdecision to point out it was a matter of national security andnational interest. The E911 codes, which is the citizen's link to thepolice department are not a matter of national security. They're amatter of the central service to the community.......Geraldo: You broke into the 911 system? He broke into the 911system!KL: No, that's not correct. I never entered any 911 telephonesystem.Don: I didn't say he entered into it. What I said was that he andRiggs conspired together to take a code that they knew was necessaryto 911 and to take it apart to see how it worked. They never had theowner's permission, they never asked for it.Geraldo: Alright, lemme ask you this....KL: The court found that there was no conspiracy here.Geraldo: You were acquitted. You were vindicated at least fromcriminal responsibility. Lemme just quickly ask you this: hackershave been inside the White House computer.KL: Yes they have.Geraldo: And they've been inside the Pentagon computer.KL: Yes.Geraldo: And if Saddam Hussein hired some hackers whether they'refrom Holland or any other place, he could've gotten into thesecomputers, presumably.KL: Presumably, he could've.Geraldo: And gotten some valuable information.KL: It's definitely possible.Geraldo: And you still think hackers are performing a public service?KL: That's not what I said. I think that those kind of activitiesare wrong. But by the same token, the teenagers, or some of thepeople here that are not performing malicious acts, while they shouldbe punished should not be published as extreme as the law currentlyprovides.Geraldo: You're response to that Don?Don: I don't think they're being punished very much at all. We'rehaving trouble even taking away their gear. I don't know one of themhas done hard time in a prison. The book, Hafner's book on_Cyberpunk_, points out that even Mitnick who is a real electronicHannibal Lecter ... did not get near any of the punishment that whathe was doing entitled him to.Geraldo: <laughing> An electronic Hannibal Lecter. OK, stand by,we'll be back with more of this debate in a moment...<Commercials>Geraldo: Back with Craig Neidorf and prosecutor Don Ingraham. Craig,do you think hackers are voyeurs or are they potentially terrorists?KL: I think they resemble voyeurs more than terrorists. They areoften times looking at places where they don't belong, but mosthackers do not intend to cause any damage.Geraldo: Do you buy that Don?Don: If they stopped at voyeurism they would be basicallysociopathic, but not doing near the harm they do now. But they don'tstop at looking, that's the point. They take things out and sharethem with others, and they are not being accountable and beingresponsible as to whom they are sharing this information. That is therisk.Geraldo: Can they find out my credit rating? I know that's not anational security issue, but I'm concerned about it.Don: Piece of cake.Geraldo: No problem.Don: Assuming....Geraldo: Go ahead. Assuming I have a credit rating...hahahah....Don: Assume that the credit is not carried by someone who is usingadequate security.Geraldo: But you think Craig it's not problem.KL: I think it's no problem.Geraldo: Give me quickly the worst case scenario. Say Abu Nidal hadyou working for him.KL: I'm sorry?Geraldo: Abu Nidal, notorious .....KL: As far as your credit rating?Geraldo: No, not as far as my credit rating.. The world, nationalsecurity.KL: Well, hackers have gotten into computer systems owned by thegovernment before. At this point they've never acknowledged that itwas anything that was ever classified. But even some unclassifiedinformation could be used to the detriment of our country.Geraldo: Like the counter-terrorist strategy on January 15th, the dayof the deadline expired in the Persian Gulf.KL: Perhaps if Saddam Hussein had somehow known for sure that we weregoing to launch an attack, it might have benefited him in some way,but I'm really not sure.Geraldo: Don, worst case scenario, 30 seconds?Don: They wipe out our communications system. Rather easily done.Nobody talks to anyone else, nothing moves, patients don't get theirmedicine. We're on our knees.Geraldo: What do you think of Craig, quickly, and people like him?Don: What do I think of Craig? I have a lot of respect for Craig, Ithink he's probably going to be an outstanding lawyer someday. But heis contributing to a disease, and a lack of understanding ethically,that is causing a lot of trouble.Geraldo: One word answer. As the computer proliferate won't hackersalso proliferate? Won't there be more and more people like you todeal with?Knight Lightning: I think we're seeing a new breed of hacker. Andsome of them will be malicious.Geraldo: Some of them will be malicious. Yes, well, that's it...fornow. I'm Geraldo Rivera. [End of Program]
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -