Browse content similar to Meet the Hackers. Check below for episodes and series from the same categories and more!
Line | From | To | |
---|---|---|---|
Those are the headlines. It is now time for Our World. We have an | :00:03. | :00:13. | |
:00:13. | :00:15. | ||
exclusive insight into the life of Greeting citizens of the world, we | :00:15. | :00:20. | |
are Anonymous. The summer of 2011 and the world is getting to grips | :00:20. | :00:25. | |
with a new form of protest. revolution has begun. We are legion. | :00:25. | :00:30. | |
We do not forgive, we do not forget. A revolution conducted online by | :00:30. | :00:36. | |
hackers, people who carry out attacks in cyberspace. It is not a | :00:36. | :00:41. | |
game. This is a crime. It is purely using technology to commit that | :00:41. | :00:51. | |
crime on a global scale. I don't feel like a criminal. I do like a | :00:51. | :00:54. | |
kid who put his career did to it -- creativity into the wrong place at | :00:54. | :01:01. | |
the wrong time. This revolution involved attacks on computers and | :01:01. | :01:06. | |
websites. Carried out by so-called hacktivists, leaderless but grouped | :01:06. | :01:16. | |
:01:16. | :01:18. | ||
under the name of the Anonymous. Then, LulzSec appears. A jokey | :01:18. | :01:24. | |
splinter group, more chaotic than Anonymous. Was it acted like a rock | :01:24. | :01:31. | |
band. The members were like rock stars. They were entertainers. | :01:31. | :01:35. | |
Anonymous, they said they wanted information on the internet are to | :01:35. | :01:42. | |
be free, but LulzSec also wanted to have a laugh. So was LulzSec just a | :01:42. | :01:47. | |
bunch of cyber jokers or a threat that had to be taken seriously? In | :01:47. | :01:51. | |
an exclusive interview, we speak to one of the group's key members | :01:51. | :01:56. | |
before he was imprisoned. A rare glimpse into the secretive world of | :01:56. | :02:06. | |
:02:06. | :02:35. | ||
The LulzSec hacking group held the online world and role as they | :02:35. | :02:43. | |
wanted went on at -- went on a hacking spree. The name derives | :02:43. | :02:48. | |
from the internet would for laughs. They caused chaos, hacking media | :02:48. | :02:53. | |
companies, security firms, police, the CIA and the FBI. There were | :02:53. | :02:58. | |
many associates, but half a dozen or so central characters. Each had | :02:58. | :03:04. | |
their own role and online name. In the real world, the members of | :03:04. | :03:08. | |
LulzSec never met. They lived continents apart. This small group | :03:08. | :03:11. | |
of individuals, most of whom have now been arrested, lived out their | :03:11. | :03:17. | |
lives online. They adopted colourful characters as they | :03:17. | :03:23. | |
crashed Web sites and published the data they act. The oldest of the | :03:23. | :03:28. | |
group was Hector Montsegur, known as Sabu. He was New York-based and | :03:28. | :03:33. | |
the closest the group had to a leader. Worcester Fire I'll buy | :03:33. | :03:40. | |
some was the youngest. Based in the UK and known as T Flo -- Tflow. | :03:40. | :03:48. | |
Ryan agreed was also based in the UK. His name was Kayla. AVUnit, the | :03:48. | :03:54. | |
identity of them remains unknown to this day. And finally the group's | :03:54. | :03:59. | |
head of communications and unlikely PR man. Jake Davis, also known as | :04:00. | :04:04. | |
Topiary. This is the first time he has agreed to a television | :04:04. | :04:10. | |
interview. Aspects of myself went into it. It was an exaggerated | :04:10. | :04:16. | |
version of the things I couldn't be. I think Topiary is a lot more | :04:16. | :04:26. | |
:04:26. | :04:35. | ||
confident than I am. I'm speaking At the time, Jake was 17 and living | :04:35. | :04:40. | |
on the remote Shetland Islands off the north coast of Scotland. His | :04:40. | :04:45. | |
parents split up when he was very young and then when Jake was just | :04:45. | :04:51. | |
13 his stepfather died in a car school, he became a near recluse. | :04:51. | :04:57. | |
His mother and brother moved to England and Jake was alone. He | :04:57. | :05:01. | |
rejected the real world for internet chat rooms. I literally | :05:01. | :05:06. | |
just made friends of mine. The computer screen was like a God's | :05:06. | :05:13. | |
eye view of the world to me. Utter isolation day and night, so that | :05:13. | :05:20. | |
sleeping patterns were all over the place. When your friend based its | :05:20. | :05:29. | |
existent only through the internet, time-zones 11 become kind of | :05:29. | :05:35. | |
irrelevant. I would sleep during the day and feel no responsibility. | :05:35. | :05:38. | |
It was a very limited world. It is a world that you can see and hear, | :05:38. | :05:46. | |
but that's it. You cannot feel it ought touch it or censored. It is a | :05:46. | :05:52. | |
world devoid of empathy. It is a very cynical world and I became | :05:52. | :05:57. | |
very cynical inside it. Parmy Olson is a journalist who wrote about | :05:57. | :06:01. | |
many of LulzSec's attacks. She has since spoken to the key players | :06:01. | :06:06. | |
about the time they spent planning and discussing hacks online in chat | :06:06. | :06:11. | |
rooms. Like-minded communities were conversations are fast moving, | :06:11. | :06:16. | |
often intense and introspective. They can be very lively 1 minute | :06:16. | :06:21. | |
but also very negative the next. There can be a lot of backbiting | :06:21. | :06:27. | |
and bitchiness as well. It is very up and down. If you imagine the | :06:27. | :06:31. | |
kind of office politics that you experience in a normal office, | :06:31. | :06:36. | |
multiply that by three and that is what you get. These guys get | :06:37. | :06:40. | |
distressed and very emotional, even though they are just sitting there. | :06:41. | :06:44. | |
The thing they are connected to is an incredibly dramatic world. It is | :06:44. | :06:54. | |
:06:54. | :06:57. | ||
The attacks took two forms. The first of faded an organisation's | :06:57. | :07:02. | |
security to infiltrate, then extract data. Sometimes come today | :07:02. | :07:12. | |
:07:12. | :07:12. | ||
told. They then published that for the world to see. The second, known | :07:12. | :07:19. | |
as a DDoS, used thousands of commuters to fund a website until | :07:19. | :07:24. | |
it crashed. The group used -- discussed these attacks on hidden | :07:24. | :07:28. | |
parts of the internet but most of us are not aware of it. In London | :07:28. | :07:33. | |
they might beat areas which you know have more crime. You do not go | :07:33. | :07:37. | |
there unless you have a reason. The same thing applies to the internet. | :07:37. | :07:42. | |
There are shady areas of the internet. Areas completely outside | :07:42. | :07:47. | |
of the normal weather. Services and systems were you need special | :07:47. | :07:51. | |
clients to even see the discussions going on. It means normal people | :07:51. | :07:55. | |
have no idea about the dark side of the internet existing, but it | :07:55. | :07:59. | |
certainly does. The internet is just a reflection of the real world, | :07:59. | :08:04. | |
so it probably will always exist. LulzSec's targets were an eclectic | :08:04. | :08:09. | |
mix, only loosely political, often prankish in nature. Members of the | :08:10. | :08:13. | |
group had been indicted in the US for allegedly stealing and | :08:13. | :08:16. | |
publishing a database containing details of 70,000 potential | :08:16. | :08:21. | |
contestants for the X Factor. In the UK, some have pleaded guilty to | :08:21. | :08:24. | |
hacking the website of the Sun and replacing its front page with a | :08:24. | :08:29. | |
false story that Rupert Murdoch had been found dead in his garden. The | :08:29. | :08:33. | |
name is also linked to a tax on Sony, when the games company was or | :08:33. | :08:37. | |
under fire from hackers across the internet, angry about what they saw | :08:37. | :08:46. | |
as the company's blase approach to keeping people status secured. -- | :08:46. | :08:51. | |
people's data. The way the group spoke to the world to find the | :08:51. | :08:55. | |
personality of it. There was an element of spin as well. There were | :08:55. | :08:59. | |
a lot of other splinter groups like LulzSec that were around at the | :08:59. | :09:03. | |
time that have come out since then that didn't get anywhere near the | :09:03. | :09:07. | |
kind of notoriety that they did. It is not just because LulzSec was | :09:07. | :09:11. | |
great and communicating and was witty and funny on Twitter and put | :09:11. | :09:16. | |
at prolific press releases. The Chatterjee journalists and whatever | :09:16. | :09:22. | |
else. -- they chatted to. It was because they had one or two very | :09:22. | :09:27. | |
skilled hackers within the group. It was a convoy once of the | :09:27. | :09:33. | |
circumstances. This meeting of minds and a small group of people | :09:33. | :09:37. | |
who were getting closer and closer until what they made -- made what | :09:37. | :09:42. | |
they thought was an elite team to inspire Anonymous. Definitely the | :09:42. | :09:49. | |
issue of communicating and PR was so important in creating this | :09:49. | :09:56. | |
mirage of a dangerous organisation and a threatening group. LulzSec | :09:56. | :10:00. | |
had grabbed the attention of the world's media with the taunting, | :10:00. | :10:04. | |
light-hearted tone of the publicity around their attacks. Taking a shot | :10:04. | :10:09. | |
at big companies was one thing, but in among their targets were several | :10:09. | :10:15. | |
law enforcement agencies. On that we their feet, LulzSec boasted | :10:15. | :10:20. | |
about bringing down the website linked to the FBI. They crashed the | :10:20. | :10:23. | |
CIA's home side and sought to embarrass those whose job it is to | :10:23. | :10:31. | |
investigate insider crime, the UK's serious crime -- Serious Organised | :10:31. | :10:34. | |
Crime Agency, by forcing the website of line. Attacking the | :10:34. | :10:37. | |
police was a step too far, according to Mikko Hirvonen, who | :10:37. | :10:45. | |
spent the last 20 use tracking viruses and looking for the people | :10:45. | :10:50. | |
who create them. It is clear that law-enforcement LulzSec personally, | :10:50. | :10:55. | |
for a reason. It was very brazenly going after more enforcement | :10:55. | :11:00. | |
targets. They were attacking law- enforcement starts in the US, | :11:00. | :11:08. | |
recording their conference calls between Europe and the USA. A low. | :11:08. | :11:13. | |
It is Bruce. This is what he is talking about. A packed conference | :11:13. | :11:18. | |
call between Scotland Yard and the FBI, recorded and published in the | :11:18. | :11:23. | |
name of Anonymous. We set back the further arrests of Kayla and Tflow. | :11:24. | :11:28. | |
The fact that the world could tune in and listen to the cyber crime | :11:28. | :11:32. | |
teams as they discussed pursuit of LulzSec was acutely embarrassing | :11:32. | :11:38. | |
for law enforcement. I just saw the information about the big cyber | :11:38. | :11:44. | |
conference in Sheffield. I'm going to be able to come? I think so, yes. | :11:44. | :11:49. | |
I have never been to Sheffield. you have missed nothing. Really? | :11:49. | :11:59. | |
I'm afraid so. It is not really a Jo Hall in England's crown. | :11:59. | :12:07. | |
jewel. The police in that call did meet up in Sheffield, where local | :12:07. | :12:09. | |
academics keen to encourage young enthusiasts to take an interest in | :12:09. | :12:15. | |
computer coding by deliver -- developing their own computer games. | :12:15. | :12:19. | |
What we need to do is we need to go into here and we need to pull an | :12:19. | :12:29. | |
:12:29. | :12:32. | ||
Here at Sheffield Hallam University's against Britannia | :12:32. | :12:36. | |
event, schoolchildren are being taught how to use standard games | :12:36. | :12:46. | |
:12:46. | :12:51. | ||
One of the academics at the same university briefed the police on | :12:51. | :12:55. | |
cyber security and was then asked to get involved in the LulzSec case. | :12:55. | :12:59. | |
This is a visual interpretation of the data which allows us to know | :12:59. | :13:04. | |
where the attacks are coming from. This is basically the hackers who | :13:04. | :13:11. | |
have breached the system using an overflow attack. Dr David Day was | :13:11. | :13:15. | |
unpicking evidence on the computer hard drive or Tflow, one of the | :13:15. | :13:19. | |
most technically competent of the loss of hackers. How good a hacker | :13:19. | :13:26. | |
was he? He was very good. He was using the appropriate tools for | :13:26. | :13:31. | |
performing this kind of activity. He was well versed in their use. He | :13:31. | :13:37. | |
knew how to write code and right malicious scripts to a level which | :13:37. | :13:43. | |
far exceeds somebody of his age. surprised many did eventually find | :13:43. | :13:50. | |
out how young he was? I was very surprised. Well wouldn't have | :13:50. | :13:52. | |
imagine somebody of that age would have had the time to accumulate | :13:52. | :13:57. | |
that level of knowledge and expertise. Did you yourself find | :13:57. | :14:02. | |
you are becoming immersed in this world? Totally absorbed. For | :14:02. | :14:07. | |
probably about two weeks. I didn't do an awful lot else. I spent a lot | :14:07. | :14:13. | |
of my time hold up working long hours. On occasions where I found | :14:13. | :14:18. | |
something but I thought was exciting, I got animated and baby | :14:18. | :14:22. | |
stayed up till the early hours of the morning or sometimes in the | :14:22. | :14:25. | |
night I would wake up with an idea and have no option other to get up | :14:25. | :14:31. | |
and test my hypothesis. I totally understand how hacking can be | :14:31. | :14:40. | |
thrilling. I can identify with the thrill of the challenge of it and | :14:40. | :14:50. | |
:14:50. | :14:53. | ||
the sort of emotional reward but The challenge is to convince young | :14:53. | :14:57. | |
people that being on the right side of the internet can be as rewarding | :14:57. | :15:04. | |
as being on the dark side of the Internet. Jake pleaded guilty to an | :15:04. | :15:12. | |
agency that he says is based on an exchange and a chat room. That page | :15:12. | :15:16. | |
was the first thing that was presented to me in terms of giving | :15:16. | :15:26. | |
:15:26. | :15:28. | ||
evidence. Conspiracy to commit computer abuse in two lines of text | :15:28. | :15:36. | |
on a computer screen. I tight thousands of lines of text per day. | :15:36. | :15:43. | |
And these two lines stick with you. They are a separate charge that is | :15:43. | :15:48. | |
punishable by up to ten years in prison. I guess it does not matter | :15:48. | :15:58. | |
:15:58. | :15:59. | ||
about how long it is, it is what it says. I completely agree.Do you | :15:59. | :16:04. | |
regret getting involved? I regret 95% of the things I have ever typed | :16:04. | :16:11. | |
on the internet. Especially those lines of going after this people, | :16:11. | :16:20. | |
why not? It obviously did hurt. still come across individuals who | :16:20. | :16:25. | |
do not appreciate that committing an attack on the internet is | :16:26. | :16:31. | |
exactly the same as committing a physical type of attack. It has | :16:31. | :16:36. | |
real world impact at the end of the day. Whether that his financial | :16:36. | :16:43. | |
loss, reputation no harm or emotional harm. It is using | :16:43. | :16:49. | |
technology to commit that crime. It actually makes the attacks easier | :16:49. | :16:59. | |
:16:59. | :17:03. | ||
to commit on a larger scale, on a global scale. At the time of the | :17:04. | :17:08. | |
attack, the identities of the crew were still unknown. But it is | :17:08. | :17:14. | |
possible that Chick had already let down his defences. His voice was | :17:14. | :17:17. | |
recognisable in a life had performed on the West radio show | :17:18. | :17:23. | |
against the Westborough Baptist Church, an outspoken fundamentalist | :17:23. | :17:32. | |
group with anti-gay views. This was really 2011. Just as they were | :17:32. | :17:40. | |
getting started. It appears to be from Anonymous. You are being quite | :17:40. | :17:45. | |
carefree. What is the worst thing that can happen? The worst thing | :17:45. | :17:55. | |
:17:55. | :17:57. | ||
that happens, it gets 500,000 be used in 12 hours. -- be used. I had | :17:57. | :18:05. | |
a cold sweat after that. Tonight, inside the almost impenetrable | :18:05. | :18:12. | |
world of hacking. On 24th June, 2011, on Newsnight, we spoke to | :18:12. | :18:20. | |
Topiary. He came across as is usual on Mansell. In reality, he was in | :18:20. | :18:28. | |
turmoil. That is because earlier in the US, members had attacked the | :18:28. | :18:34. | |
Arizona state police. In protest against new laws on immigration. | :18:34. | :18:37. | |
They released private intelligence material common names, addresses | :18:37. | :18:45. | |
and phone numbers of officers. was the big turning point for | :18:45. | :18:51. | |
myself and others. There was no point to this. It is harming police | :18:51. | :18:59. | |
officers. It does not entertain or help anyone. I am not this person, | :18:59. | :19:09. | |
I decided. I am just some kid in a bedroom. I decided to leave it. I | :19:09. | :19:19. | |
:19:19. | :19:21. | ||
shut down my laptop. I decided to live a simple, normal teenage life. | :19:21. | :19:28. | |
I found it hard to get this across to other hackers. The group was | :19:28. | :19:34. | |
falling apart. America's Federal Bureau of Investigation had a new | :19:34. | :19:41. | |
weapon. Just prior to the abyss and hack, one of the founders and the | :19:41. | :19:48. | |
closest the group had to a leader had been arrested. He was living in | :19:48. | :19:53. | |
New York at the time. He was responsible for his nieces. He was | :19:53. | :19:59. | |
fearful of what Huck might happen to them if he was imprisoned. He | :19:59. | :20:06. | |
turned into an informer for the F B I. I had my suspicions after he | :20:06. | :20:11. | |
disappeared from the internet for 24 hours. He came back to the | :20:11. | :20:21. | |
internet and was beginning to act a little bit different. You are not | :20:21. | :20:28. | |
come to be able to uphold the same personality. There were a few that | :20:28. | :20:33. | |
suspected immediately, within the first ten minutes. Why are we | :20:33. | :20:38. | |
speaking to this person, why are we allowing him to goad us? There must | :20:38. | :20:48. | |
:20:48. | :20:56. | ||
be something. But some people thought, who cares if he is? Jake | :20:56. | :21:06. | |
:21:06. | :21:08. | ||
was arrested in the UK on 27th July, 2011. He said: you are obviously a | :21:08. | :21:14. | |
bright person. You told us you were isolated. You must have been able | :21:14. | :21:19. | |
to think that there were consequences. At the time and in | :21:19. | :21:24. | |
the context I was 17. Quite mentally unstable and in a bad | :21:24. | :21:31. | |
place. At times I could see through the internet. Hauser pressed | :21:31. | :21:37. | |
everything else was. I thought there was consequences, but who | :21:37. | :21:45. | |
cares? I was just enjoying the attention. Experts have little | :21:45. | :21:50. | |
doubt that Lulzsec will be remembered. They achieved notoriety | :21:50. | :21:55. | |
online and in the real world in the brief time they existed. But the | :21:55. | :22:02. | |
outcome has not been a happy one for any of the Lulzsec crew. Sadhu | :22:02. | :22:09. | |
is awaiting trial in the US, charged with crimes that include | :22:09. | :22:16. | |
not just hacking, but bank fraud. He could face 124 years behind bars. | :22:16. | :22:22. | |
Another man was given a 120 month suspended sentence. He will serve | :22:22. | :22:28. | |
no time, but will have to carry out 300 hours of unpaid work. Bryan | :22:28. | :22:33. | |
Ackroyd was jailed for 30 months and is expected to serve half of | :22:33. | :22:42. | |
that. A unit remains unidentified. Anyone committing a crime, whether | :22:42. | :22:50. | |
it is a physical crime or a crime on the internet, potentially using | :22:50. | :22:55. | |
Global Associates or infrastructure abroad, using proxies to hide their | :22:55. | :23:01. | |
identity, that will be investigated. They will be investigated and they | :23:01. | :23:05. | |
will be prosecuted. That is the message that needs to go out there. | :23:05. | :23:09. | |
We will work with global partners and Industry to bring these | :23:09. | :23:19. | |
individuals to justice. When you have these groups like Anonymous or | :23:19. | :23:23. | |
Lulzsec, yesterday broke the law, yes they should be punished, but I | :23:23. | :23:27. | |
am more worried about organised criminal gangs from Russia, from | :23:27. | :23:32. | |
the Ukraine, from new mania, from China, gangs that are stealing | :23:32. | :23:40. | |
money. -- Romania. Gangs that are making millions. I have spoken to | :23:40. | :23:45. | |
hackers who have been caught. Many feel they could have been useful in | :23:45. | :23:49. | |
securing systems. But for one reason or another, they went on the | :23:49. | :23:53. | |
wrong path would did not have the opportunities for made some | :23:53. | :23:58. | |
mistakes. They keep telling me the same thing over and over. If they | :23:58. | :24:06. | |
could change what happens, they would rather be on the other side. | :24:06. | :24:10. | |
So should we be trying harder to steer young people away from the | :24:10. | :24:13. | |
seemingly glamourous world of hacking and harnessing their | :24:13. | :24:21. | |
skills? The irony is that we need the people who have the skill sets | :24:21. | :24:30. | |
and the kind of personalities that enjoy hacking to come over and join | :24:30. | :24:34. | |
us on the forensic side. We need people with the skills, abilities | :24:34. | :24:38. | |
and the desire for a puzzle solving to be put on the other side of the | :24:38. | :24:42. | |
fence. Do you have a message for people to look at what you have | :24:42. | :24:48. | |
done and in some way copy that? hope it would not result in | :24:48. | :24:54. | |
copycats. If you have the passion to do something and have nothing | :24:54. | :25:01. | |
else to do, try and find something beyond the front door. If you get | :25:01. | :25:05. | |
sucked into the computer world, you get dependent on it. It is very | :25:05. | :25:11. | |
hard to say no to some things that you will later come to regret. | :25:11. | :25:17. | |
Davies was given a 24 months' sentence. He had been given police | :25:17. | :25:23. | |
restrictions that counted against this time. Some Lulzsec members in | :25:23. | :25:29. | |
the UK have been indicted in the US. But so far there has been no | :25:29. | :25:34. | |
request for extradition. Lulzsec may have thought of themselves as | :25:34. | :25:37. | |
latter-day pirates, whose online antics highlighted the inadequacies | :25:37. | :25:44. | |
of internet security professionals. Prosecutors saw them as a cowardly | :25:44. | :25:49. |