The KGB Hack: 30 Years Later
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Subtitle |
| |
Title of Series | ||
Number of Parts | 254 | |
Author | ||
License | CC Attribution 4.0 International: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/53106 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
| |
Keywords |
00:00
Hacker (term)Hecke operatorMultiplication signComputerHacker (term)Computer animationLecture/Conference
00:46
Presentation of a groupJSONXMLComputer animation
01:32
Hacker (term)Lecture/Conference
02:20
VideoconferencingPresentation of a groupHacker (term)CASE <Informatik>Internetworking40 (number)Multiplication signArmConstraint (mathematics)Lecture/ConferenceComputer animation
04:21
Multiplication signDemoscenePresentation of a groupHacker (term)GodComputerElementary arithmeticSemiconductor memoryContent (media)Term (mathematics)19 (number)Chaos (cosmogony)2 (number)Hybrid computerException handlingVideo gameSpring (hydrology)DivisorLecture/Conference
07:15
Adventure gameComputer programmingFocus (optics)NumberSequelInformationComputer animation
08:09
Touchscreen2 (number)CASE <Informatik>Service (economics)19 (number)Suite (music)Office suiteHacker (term)Lie groupSinc functionComputer animation
09:46
Computer networkWhiteboardMessage passingComputerHacker (term)InternetworkingComputerInternetworkingHacker (term)19 (number)QuicksortUniverse (mathematics)SoftwareNeuroinformatikAcoustic couplerConnected spaceModemLecture/ConferenceComputer animation
10:55
SoftwareSystem identificationNeuroinformatikOffice suiteCommunications protocolLocal ringAcoustic couplerData exchange
11:40
InternetworkingComputer networkWhiteboardMessage passingComputerHacker (term)SoftwareSystem callOffice suiteConnected spaceSystem identificationLocal ringHacker (term)QuicksortComputerRadical (chemistry)TouchscreenMessage passingDemosceneSelf-organizationNeuroinformatikInternet forumComputer animationLecture/Conference
13:31
Hacker (term)DatabaseChaos (cosmogony)Symbol tableMetreColor confinementGUI widgetLoginSystem administratorNeuroinformatikHacker (term)Game controllerQuicksortGroup actionProgrammer (hardware)ArmComputerDemosceneTouch typingTraffic reportingGodService (economics)Chaos (cosmogony)Point (geometry)Physical systemSelf-organizationMetropolitan area networkElectronic mailing listSource codeMereologyMultilaterationComputerEmbargoBitGame theoryClifford algebraOffice suiteScaling (geometry)Inheritance (object-oriented programming)CompilerLecture/Conference
20:11
Hacker (term)ComputerVideoconferencingVideo gameResultantGoodness of fitNeuroinformatikMetropolitan area networkSlide ruleXMLLecture/Conference
21:47
Hacker (term)Menu (computing)NeuroinformatikSystem administratorReal numberPentagonForcing (mathematics)Arm19 (number)Gateway (telecommunications)Equivalence relationUniverse (mathematics)Multiplication signHacker (term)ComputerLine (geometry)Term (mathematics)Event horizonPhysical systemOnline helpWhiteboardTorusVideo gameAdventure gameLecture/Conference
24:05
Universe (mathematics)Physical systemLine (geometry)DatabaseInsertion lossGateway (telecommunications)NeuroinformatikData storage deviceLecture/Conference
24:48
Inheritance (object-oriented programming)Computer fileInformationHacker (term)TrailEmailElectronic mailing listComputerMultiplication signClifford algebraComputer fileXMLComputer animation
25:36
HypermediaClifford algebraCartesian closed categoryHypermediaHacker (term)ComputerComputer filePoint (geometry)CASE <Informatik>Physical system19 (number)ArmBitElectronic mailing listGroup actionChaos (cosmogony)MereologyAuthorizationInformationVideoconferencingWeightEmailOffice suiteInheritance (object-oriented programming)MiniDiscComputer animation
28:18
InformationEmailElectronic mailing listAuthorizationInformationHacker (term)HypermediaHeat transferClifford algebraComputer animation
29:42
Koch, KarlHypermediaSoftwareNumberLink (knot theory)Disk read-and-write headMetropolitan area networkYouTubeSinc functionProof theoryCASE <Informatik>19 (number)ArmComputerHacker (term)Film editingComputer animation
31:19
Cartesian closed categoryComputerHacker (term)InformationChaos (cosmogony)Hacker (term)Medical imagingHypermediaCASE <Informatik>Physical lawArmResultantComputerTheoryPhysical systemNeuroinformatikBildschirmtextOnline helpInsertion lossComputer animation
33:08
Uniformer RaumCurve fittingHacker (term)Point (geometry)ExplosionBlogFactory (trading post)Hacker (term)HypermediaMultiplication signComputerResultantRandom number generationMedical imagingAuthenticationGoogolChaos (cosmogony)Group actionChainComputer animation
35:28
Hacker (term)Chaos (cosmogony)Integrated development environmentCartesian closed categoryExecutive information systemIntegrated development environmentHacker (term)Group actionGoodness of fitChaos (cosmogony)MathematicsCross section (physics)Direction (geometry)19 (number)Computer animation
37:27
Physical systemCross section (physics)Line (geometry)InternetworkingLecture/Conference
38:52
Multiplication signLine (geometry)VideoconferencingInternetworkingInsertion lossLecture/Conference
39:51
FreewareHacker (term)InternetworkingComputer programmingComputerGroup actionElectronic mailing listBitMultiplication signClifford algebraCASE <Informatik>Arithmetic meanTerm (mathematics)CollaborationismSoftware developerInformationNeuroinformatikPresentation of a groupComputerPerspective (visual)Service (economics)TwitterMedical imagingDemoscenePrisoner's dilemmaHookingPoint (geometry)Proof theoryRoundness (object)YouTubeVideoconferencingComputer animationLecture/Conference
47:22
Computer animation
Transcript: English(auto-generated)
00:21
speaker is a historian and she is rolling back time for us 30 years to the very beginnings of the Chaos Computer Club and taking a closer look at the KGB hack, the infamous KGB hack and what Carl Koch did back then. So let's journey back to the 80s with Anja Dreval. Thank you. I was hoping to see
00:57
my presentation. Why am I not seeing my presentation, my slides? Yes, thank you.
02:14
Thank you. That applause goes to my amazing hacker who did this little
02:30
video as a start to my presentation. Thank you. Why? No. Guess we'll have to do
02:45
it again? No, no. What is happening? No, no, no, no, no. Okay, okay. Welcome to 1989. Before I start, I have to say when you start researching a topic like the KGB
03:05
hack, you suddenly find out there's so many sources, not just books that have been written, movies that have been made, documentaries, there's articles in newspapers, on the internet, there's podcasts you can listen to that go
03:22
into every little detail of this case, every little detail of the early history of the CCC, the early history of the internet as it is and due to time constraints that we have, I am going to have to simplify quite a few things to just, you know, give you an overview and tell you a story
03:46
about this topic and I'm counting on you to raise questions in the end that are Q&A to go maybe into more detail if you find out, okay, there's something that should have been a little more detailed, there's something
04:01
that, hey, I know about something about this because I'm sure a lot of you know maybe more than me about this story. So that's something that I'm hoping we can do in 45 minutes, 40 minutes. First of all, I'd like to ask a question, two questions to the audience. Does anyone here think that
04:28
this talk might mention their name? Yes? Who are you?
04:42
Well, I'm not going to mention any real names except for one, so maybe you would like to join us in the end or, you know, if not, then not. Second question, is anyone here who attended Congress in the 1980s? Excellent. Well, personally, I did not because I was busy with kindergarten
05:06
and elementary school and stuff. My first Congress was in 2012 when a friend of mine introduced me to the Chaos Computer Club. I went to Hamburg spent four amazing days at Congress and in the end I thought, oh my god, this is
05:25
so great and I thought, okay, what could I give back to this amazing community? What could I add to this experience? And I'm not a hacker or very much into tech, but I'm a historian. I can tell you history. And I'm very thankful that
05:44
the content team has now invited me for the fourth time to tell you about history. I'm very thankful that this talk has gotten a slot on day one because I think it's the perfect time to take a look back at what was, to take a
06:02
look at what has changed, to remember those who unfortunately cannot be here today, and then spend three more days in the present at this Congress. So let me set the scene for you. It's 1989, especially it's March 1989.
06:25
In March 1989, the world was still very much divided. Germany was still divided into West Germany and the German Democratic Republic. And looking at Leipzig, in March 1989, we had the spring fair in Leipzig, not here, but in the
06:47
old fairgrounds. And the German Democratic Republic proudly presented their latest and greatest in technology. They had just developed a four megabit hybrid memory. Four megabits. Unfortunately, it was way too
07:07
expensive to make it on the world market, but they were proud. West Germany had its own issues, difficult times. People had to wear stonewashed jeans
07:25
and pastel colored sweaters. Number one hit in the West German charts in March was David Hasselhoff looking for freedom. And Bill and Ted were going on an excellent adventure. Sequel is coming out next year, don't miss it.
07:43
Speaking about television, private television in West Germany was still very much in its infancy. Most people still had three television channels, first, second, third, and they got their information from the television. The first program showed the news every night at eight.
08:02
People watched it, much more than today. And sometimes the first German television had a special program called Imbrenpunkt, in focus, that always came out when something was so exciting, so newsworthy, that it couldn't be sufficiently dealt with in a normal news. So on March 2nd, 1989, the first German
08:28
television showed this. Why isn't it moving? Oh, come on, please. It's moving on my screen.
09:07
Okay, if it had been moving, you would have seen a dude in a suit telling you that the biggest spy case since Günter Guillaume has just been uncovered. Günter Guillaume was an East German spy who
09:21
worked closely in the offices of German Chancellor Willy Brandt in the 1970s. He worked for the East German Secret Service and when he was uncovered, the chancellor had to step down. So apparently, in March 1989, we have a spy case of German hackers working for the KGB that is as big as Günter Guillaume.
09:46
Spoiler, it was not. But anyway, how is that even possible? How can German hackers work for the KGB in 1989? How do they hack anything over the internet? Well, there's no internet.
10:04
What there is, is basically this. Let's say in the mid-1980s, you were a teenager and you got a computer for Christmas. Lucky you. So what can you do with it? There's no internet. There are computers that are connected.
10:27
Big computers made by IBM and by VAX that are standing in universities, research institutions, military institutions, big companies.
10:40
And you have in the 1980s a network that you can actually dial into from your home. So you have a phone that's connected to a wall, usually, if it's not cut off. And you have a computer and if you're lucky, you have a sort of modem. It's called an acoustic coupler.
11:00
We have one here for the C64. The most famous one was the data phone. It's bigger. But this one basically works the same. You strap your phone to it and you call your local post office. And your local post office in the 1980s has a network called DataXP, which stands for Data Exchange Packet Based.
11:30
It's based on the X25 protocol and it gives you the opportunity to connect to computers all over Germany and all over Europe and actually all over the world.
11:43
What you need is a network user identification, a so-called NUI, which is expensive. The call to your local post office, not so much, especially in West Berlin, which was known as sort of a hacker's paradise because local calls cost only 23 pfennig.
12:02
23 cents. Not per minute, but per call. So if you had a network user identification from somewhere, you could just call your local DataXP office and connect. These NUI's were expensive, but you could find them.
12:22
For example, at the computer fair in Hanover because people weren't watching their screens, their terminals, and maybe you could look over somebody's shoulder and see their login and use it and run up charges of thousands of marks. And then you can connect to message boards, which is a bit, well, not so exciting.
12:43
Much more exciting is the big computers standing at institutions and companies. And so through this possibility, these possibilities, this network, comes a hacker scene
13:04
in the 1980s of mostly young people, teenagers, young guys, not so many girls, who connect to these big computers because they can. Because they're there and they're interesting and you just want to see what's on them.
13:24
Especially infamous was CERN, the nuclear research organization in Switzerland, where at some point hackers were actually having kind of parties in the system,
13:42
connecting to the computers and chatting with the systems managers, who were a bit annoyed because they had work to do, but not that bothered because it wasn't really seen as anything that could harm them.
14:01
And the point was to go into these computers because you can, to show that you can, and to have some fun. And not because you're a criminal or you want to take some data or make money off it, but just as a sport. And now...
14:24
And in this scene, the Chaos Computer Club also established itself as sort of a mediator between these hackers and the institutions and companies that were being broken into.
14:44
Always stressing that when you're hacking, you should do it with an ethical approach. Never, you know, doing any harm, being excellent, not making any money, and for God's sake, staying away from military or secret service computers.
15:01
Don't touch those. Here's a quote on one of the first Congresses, which I think sounds pretty much like today. This amazing experience and the news crews interested in reporting on what's happening
15:20
with these sort of harmless tech freaks and hackers that were just having fun. And this is the scene where a group of young men met in the mid-1980s and started hanging
15:41
out, started sitting in front of computers, hacking together, talking, consuming drugs also, and just, you know, having fun. And these are their nicknames. They were all sort of, some were programmers, some were teenagers who were into hacking.
16:03
One of them, the last one here, wasn't really a hacker. He worked at a casino and he made some money on his side selling drugs. And they were just hanging out and just feeling like they were the greatest. They were, someone has compared them to sort of graffiti kids.
16:25
They did it because they could, just leaving their mark everywhere in the computers. And, well, they were just, you know, talking and somebody had the idea, okay, what can we do to get recognized as the greatest hackers or how can we make something of it?
16:46
There's always the issue of money problems that you might have, stupid ideas that you have when you're a teenager, young kid. And one of them came up with the idea, hey, I know somebody in East Berlin who might be interested in what we're doing and maybe we could sell it.
17:04
I know someone, a Russian, and it might be, you know, it might actually be a contribution to world peace because the Russians need technology that they don't have and we have it. We could kind of equalize the scales a bit. It's a stupid idea, of course.
17:24
But this guy, Pedro, his name was Peter. He actually went to East Berlin, walked into the Soviet trade mission and said he wanted to talk to someone about a deal. Super stupid. Walking in the front door. And someone actually listened to him.
17:46
A guy who introduced himself as Sergei, who officially worked at the trade mission, which in my opinion means KGB, was willing to listen. And our hackers offered, okay, we can get you like logins to computers in West Germany and even America.
18:06
We can even teach you how to hack, you know, for like a million marks. How about that? And Sergei was like, okay, that's nice, but I need something else. Because he had a shopping list, which came pretty much directly from
18:26
the embargo list made by the coordinating committee on multilateral export controls. There was an embargo. Technology and electronic parts, computers weren't allowed to be sold into the Soviet Union or the Eastern Bloc in general.
18:51
And that was basically his shopping list. What the Soviets wanted was not so much logins to military computers. They wanted source code. For example, according to the sources, he actually had a list that said, okay, Unix
19:07
source code 25,000 marks, maybe a compiler for this and that 5,000 marks. And our hackers were able to provide. They didn't exactly make a million, but about 90,000 marks exchanged hands in the following months.
19:25
Until a systems administrator in California noticed something. And now I have to tell you the legend of Clifford Stoll. Clifford Stoll has become famous for uncovering the KGB hackers.
19:44
And a sort of legend has been built around him telling his story again and again. There was a funny documentary made. He had a book coming out. And there are some weird aspects in this story, but maybe we can talk about them later.
20:03
So first of all, I'm just going to give you the story as he tells it. And I would like to show you, because you couldn't describe this man, but you just have to see him. And if this video isn't working again, then I'm going to be really, really sad.
20:26
Please. Are you fucking kidding me? What is with my own videos? Yeah, because that would be really awesome if we could actually watch it.
20:49
Huh? Oh, man. Can we just go to the slide that we need, maybe?
21:08
This is... okay. Should we try it? Well, it shows a picture at least. That's good. Yeah, let's just try this.
21:23
Do something. Yeah, I'm trying. Here, right? Oh, no, come on. Come on. We're going to get there.
22:06
Featuring the actual participants recreating the events is the KGB, the computer, and me. I like his hair. Okay, so Clifford Stoll's story is that he was a systems administrator at Lawrence Berkeley Laboratory,
22:27
and he noticed in his accounting system 75 cents missing, because some user had accrued 75 cents of computer time and not paid for it. And he found out that there was a weird user he didn't know, and he just deleted him.
22:44
A couple days later, somebody else was in his computer and had system privileges. And he says he just got interested. He didn't want to shut this person out. He wanted to know who it was and what they were doing. So he started tracking whoever was coming into his computers for months.
23:04
Actually, a whole year in the end that he was tracking this person. He got help from a friendly district attorney who got him a warrant to trace the phone lines. And long story short, he found out that his intruder came in through TimeNet,
23:34
the American equivalent of DataXP, and he wasn't even in the US. He was in Germany. He came in through DataXP at the University of Bremen,
23:45
and the trace ended in Hannover. And in Hannover, the problem was that they had really old switches from the 1950s, and it would have taken about an hour to track the hacker back to his own phone at home.
24:04
And the problem was the hacker never stayed long enough on Stoll's computers. He used them as a gateway to get into much more interesting computers. For example, the Pentagon, a database at the Pentagon, the Air Force, the Navy, the Army,
24:25
even Army computers in Japan, computers in Ramstein, Germany. So Stoll was at a loss how to keep him in a system long enough so he could actually, or the German post could actually track this person back to his own phone line.
24:47
So he says that his girlfriend came up with the idea, if there's nothing on your computer that interests him, then put something there. Put some files there that look super secret and are super big so that he needs time to look at them.
25:05
And that actually worked. They made up a bunch of big data, and they even put in a mailing list that said, okay, if you want more information about Strategic Defense Initiative, also known as Star Wars, send us a letter because it's so much data, we have to send it through the post.
25:24
And surprisingly enough, that worked. First of all, the German post was able to track Clifford Stoll's hacker back to the house of one of our KGB hackers, Ormel. His apartment was searched, his office was searched,
25:43
but the police didn't really know what they were looking for because they didn't find any disk that said super secret SDI net files or something. And nothing much came of it. And the second thing that happened was that somebody actually answered this mailing list. A Hungarian immigrant in Pittsburgh sent a letter to Clifford Stoll asking for information on SDI net files.
26:08
Was he working for the KGB or was he working for somebody else? It's a weird story. In any case, in the summer of 1987, Clifford Stoll finally knew,
26:22
okay, there's some dude in Germany who's been hacking my computer, but nothing much happened of it. And it kind of calmed down a bit until the media got interested. Who got the media interested is another interesting question. But in any case, in April of 1988,
26:42
German magazine Quick reported on the case using Clifford Stoll's notes. In May 1988, he published a paper suggesting that this hacker in his system had something to do with the KGB. And our hackers got a bit nervous.
27:02
At this point, we have to talk about Hagbart. His real name was Kalkoch. And in 1988, he was in a difficult place. He had psychological issues, he had drug issues, he had money problems. And he started talking to journalists,
27:22
offering to tell wild stories about the KGB and what he could do, offering to hack into nuclear reactors, which obviously was not possible, but he just wanted to get a lot of money for it. And the others got a bit nervous.
27:41
And in July, the youngest in the group went to the authorities and offered to be a witness if he got immunity for anything that he might have done. And this led to the video I wanted to show you in the beginning, when in March 1989, arrests were made.
28:03
All five of them were arrested. Two had to stay in jail because they had prior convictions. Houses were searched and the media descended on the Chaos Computer Club because these five guys were somehow related. And suddenly, the Chaos Computer Club was not this harmless group anymore,
28:22
but the media portrayed them as working for the KGB, hacking basically everything, and dramatizing the whole situation. What actually came out of it was not so much.
28:41
The process in early 1990 focused on questions like if any classified information was actually transferred or stored anywhere, downloaded. Nobody could prove that. If the USA or Germany were actually compromised in any way, not really.
29:03
And the main question was how did this Hungarian immigrant get this mailing list because only Clifford Stoll and the hacker could have had access to it. And the question is did he actually get it from the KGB or was it as one of our hackers suggested a couple years ago in a podcast,
29:28
maybe he might have been an agent provocateur, he might have been set up by somebody to push these investigations after the German authorities didn't really do much with it.
29:41
That's the question. So this biggest spy case since Guillaume ended with probation sentences and some fines because there was no proof that any real harm had been done.
30:01
The most tragic outcome, maybe, was the death of Karl Koch, who was our hacker, Hackbard. He was a very troubled young man. He was orphaned early. He inherited a lot of money when he was young, which is always difficult.
30:22
He bought a computer, he had a nice apartment, he had parties with his friends, he consumed drugs, and he was, from a young age, obsessed with the novel Illuminatos and the number 23. A movie was made about him in 1998.
30:40
It's nice, you can find it on YouTube. I didn't include it in my links because I'm not sure about the copyright situation. But it's interesting, nice soundtrack. And this whole situation in 1989, the media pressing down on him and him having these illusions.
31:04
He thought the Illuminati were in his head controlling his thoughts. He thought they were controlling the international networks and he had to do something about it. It ended on May 23, 1989, when he was 23 years old.
31:21
He officially committed suicide by burning himself. And that is such a gruesome way to die that immediately there were conspiracy theories that maybe he didn't commit suicide, maybe he had help doing it. And that's something I cannot answer, obviously.
31:46
The much more lasting result of this whole case was the image loss that the Chaos Computer Club suffered. Because suddenly they weren't harmless pranksters joyriding through computers
32:01
and showing companies flaws in their systems, showing the post-flaws in their BTX system, for example. Suddenly they were portrayed as dangerous hackers selling secrets, being spies and they can't be trusted.
32:27
As far as I read, the club almost dissolved about this issue in 1990. But luckily, survived. But this is an image that is still lingering today.
32:43
And I think this image of hackers being somehow untrustworthy and being somehow dangerous, you don't know really what they do and why they do it, but they're dangerous. That is still lingering today. Whenever the media tells you something about hackers,
33:02
they always show you something like this. An anonymous dude with a hoodie sitting in front of your computer, some random numbers flashing, they don't make any sense, but it looks dangerous. And these hackers, they're everywhere, they won't stop at anything.
33:26
Just two days ago on Christmas, German supermarket chain Räwe had to call back their chopped almonds
33:45
because they've been hacked. Beware! So I was interested in taking a look at how the media portrays hackers these days. So I did some Google searches, I thought, okay, what are famous hacking groups that you read about a lot?
34:04
And for example, we were talking about the KGB, so what about Russian hackers? So the first result I saw was Russian hacking. How did it affect the 2016 elections? So apparently Russian hackers are still very much busy with the United States
34:23
and the elections, leaking documents, supporting Trump for some reason. That's what you find on the media about Russian hackers. And then I thought, okay, what else is there today? What about China? Chinese hackers? Sounds dangerous. What are they doing?
34:41
So Chinese hackers apparently are busy hacking two-factor authentication these days. They're in your phone. Beware! Hacking you right now as I speak. But what about German hackers? We've been talking about these German hackers who basically crashed the image of hacking forever.
35:03
So what are they up to today? When you Google German hackers, the first result is Clifford Stoll. After 30 years, really, still, that's the news? I don't know, maybe it's time to make German hacking great again.
35:32
Very good. And finally, what about the Chaos Computer Club? What has changed in the past 30 years?
35:42
Here's another quote that I found of a Congress and the issues that were discussed at Congress. Someone standing up and telling the audience that he was unhappy with where he saw chaos going.
36:01
The political direction is unacceptable. Concentrating on things like environmental protection, climate change or something is diverting the group from its technical origins. And it's little wonder that truly talented hackers are beginning to abandon the club. This is from 1988.
36:23
So are we still having the same issues today? Are we still discussing the same thing? Where is the CCC going? Is it too political? Should it focus more on real hacking, on the technology or what?
36:41
Fortunately, a lot has changed. For example, when you think about those guys who were at the Congress in the 1980s, how many people were there? Like 400? At a Congress in 1985? How many people are here today? 16,000? I mean, not in this room, but I think last year was 16,000?
37:03
That's amazing. And something else. I mentioned when I was this big, I didn't attend Congress. But today, you walk around and there's tiny hackers whizzing on scooters everywhere, which is awesome. People are bringing their kids and you have a much wider cross-section of society today.
37:25
And something else, I don't know if you noticed, but when I told you the story about the KGB hack, what was missing? There was something that did not show up. Women. The only woman in this story is Clifford Stoll's girlfriend, who allegedly came up with the idea of planting a honeypot in his system.
37:46
There is no other woman in this story. It's all young dudes hacking away. And that certainly has changed. There are, I don't know, the percentage, I can't tell, but there are so many women and other non-male participants
38:04
that, like I said, it's a much wider cross-section of society today. But apart from these issues, what else? What do you think are the issues we have today and we're going to have in the future? That's my question to you.
38:22
And I would like some answers. And if you want to confess about hacking something, my deck is 6623. You can telegram me. Or tell us now.
38:47
Thank you very much for this excellent talk. We do have six microphones here in the hall. Please line up there. Are there questions from the internet via our signal intro? No, there are no. There are no questions from the internet.
39:02
Do we have questions here? We have questions at microphone three. Yes. Thanks a lot for your talk. It was amazing. Show us the first video. Oh yeah, I hope so.
39:21
Yes, we have plenty of time. Yeah, let's just try to because I don't want to... In the meantime, if you have questions, please line up at the microphones. I don't want to... Okay. Getting close, getting close, getting close. Okay. You mean this one?
39:45
Yeah, that one doesn't work. Not this one? Oh yeah, the next one. Let's try.
40:08
Ladies and gentlemen, and ladies and gentlemen, please stand up. The program is now a virtual program with the title TANKA-ZINE. This will not work for you. There you have it.
40:21
You can find the whole Brandpoint on YouTube. It's very interesting. There's a lot of the same images as in the other documentation I showed.
40:47
Dudes in black sunglasses, the CIA and stuff. Also, this documentation about Clifford Stoll is hilarious. Not just the scene where he runs out the shower in his towel to his computer because the hacker is on.
41:02
It's hilarious. So, do we have any more questions from the internet, from the hall? No? It does not. There is something at microphone 5. Can you hear me? Do we know anything about the rest of the group?
41:22
Yes. Well, about... Let me go back or go front. Well, I did, I looked into them. Dobb, I could not find anything about him. He was actually one of the two who had to stay in prison almost a year
41:43
because he was fleeing the army service and they were looking for him. I couldn't find anything about what he's doing today. Pengo is very active. He has a Twitter, he's into vintage computing, and he's the one who's always been interviewed. You know, every 10 years, 10 years after the KGB hack, 20 years after the KGB hack,
42:05
he's been on TV, he's been on podcasts. You can find a lot about him. About 10 years ago, he was on Tim Pritlov's podcast.
42:20
Very interesting. It's two hours long, but it's super interesting, very detailed into the beginnings of the internet. And there he said, okay, he's being asked about this again and again, and sometimes you just don't want to talk about it anymore. I can totally understand that. Well, you know what happened with Hackbart.
42:42
I couldn't find out anything either. Also, Pedro, no, not so much. So, we have another question on microphone 3. Hi. Well, first of all, thank you very much. I did read the cuckoo's egg.
43:03
Excellent. And thank you for posing the German perspective towards it. It really elaborates the story quite a lot. You finished your presentation with the question, what is missing currently at the Chaos Computer Club? I love it probably as much as you do.
43:22
I come from the Netherlands, and I have the feeling that in Holland, hackers collaborate much more with governments and companies. It's good to be critical against governments, but to criticize everything and to shut out government for everything doesn't solve the problem. So what I'm hoping for is a more constructive collaboration
43:42
with the German government. And I hope I'm not making myself very unpopular here. I perhaps do, but I'm Deutsch. Thank you. Another question, microphone 1.
44:01
Hi. Just to get the facts straight, I guess we all know here the story, the development of the term hacking since the MIT hacks, etc. Would you say that explicitly the story with the German hacking is the thing that stained the name of hacking in our mainstream consciousness?
44:25
Not alone. I mean, there's obviously, when you look at the US, there's cases of hacking. I mean, talking about Kevin Mitnick, for example, Robert Tappan Morris, who shut down all the computers in the US for days,
44:42
that's something that obviously formed the image of hacking in the US. And I'm not sure about other countries, to be honest. But I'm thinking that it was around the same time. By the end of the 80s, hacking kind of lost its innocence
45:00
through various infamous hacks like the KGB hack. Thank you very much. Thank you. Next question, microphone 3. Yes, thank you. Interesting talk. And is there a list? Please talk a bit closer into the microphone, thank you. Has anyone a list of which kind of information has been leaked
45:22
or which kind of facilities have been compromised? And second question, have the Russians ever confirmed this hack? First question, yes. Well, there's the official documents that came out in the process.
45:43
There's actually, if you read German, there's an interesting book that came out in 1990 about this case. And it has very detailed information about what kind of institutions have been hacked and what kind of information has been given to the Soviets.
46:03
But most of it, I guess, comes from confessions because there was no proof. The Russians did never confirm that, yeah, okay, we got this and we got that. No, of course not. And so most of it is what the hackers actually confessed.
46:27
Do we have any more questions? It does not look like that. So for anyone who left already, you're going to miss out on the outro video. Yeah. Take it away. If I can actually do that because there's no more questions.
46:47
Are we seeing this? Excellent. There's just one thing for me left to do. Why am I?
47:10
Thank you. Thank you. Pick one round of applause.