0:01

welcome to checkpoint real talk a podcast for security folks who want less

0:07

Fu and more Fu n in each episode we'll have light-hearted conversations about

0:14

security people processes and Technology as we react to how they're portrayed in

0:20

film and TV we'll bring in experts from inside and outside checkpoint to break it down what was accurate what wasn't

0:28

and what can you apply to real world cyber events on today's episode host seea

0:35

gorra checkpoint manager security engineer team Kristoff Losi incident

0:40

response lead Tom DEET and incident response analyst tone the coke react to

0:47

the 1995 movie hackers good morning good afternoon and

Welcome

0:53

good evening welcome to checkpoint real talk today we are going to be going over a movie that has been multiple like

1:01

thousands of people just requesting hackers and so who could I get but the coolest guys out of Belgium that are

1:08

going to be uh our experts to talk about why hackers with Angelina Jolie in her

1:13

you younger years as has been stated um she looks the same to me but uh guys

1:19

welcome so we've got Kristoff Tom and tone welcome welcome welcome checkpoint Real Talk

1:25

guys thanks for the welcome welcome to be here fun to be here

1:31

okay so that remains to be seen if it's F to be here yeah yes I know oh no pressure on my part now great guys I

1:38

throw I throw down once to say it's okay guys have personality and all of a sudden all of your faces drop at me like

1:45

what it's okay yeah so okay so real quick question have raise your hand who

1:50

has seen hackers oh this is going to be good this is going to be very good all right so I

1:57

have actually seen hackers but many many moon cycles so it's almost as if I haven't seen it in a long long time so

2:03

this will be really interesting um the premise of it is basically uh is the

2:09

early years of the internet and you had a group of people that were literally hacking uh into uh networks so I don't

2:17

remember beyond that so Kristoff do you remember beyond that I just

2:23

remember I just remember being like a bunch of like cool kids and they were all cute that was I think all I remember

2:30

well what I remember because indeed for me it's also many many many mons ago since I saw this movie uh it was a

2:39

typical 90s movie both in dress code as well as in way of acting and um there

2:47

was a lot of Hysteria about something happening on a computer screen and if I'm not

2:54

mistaken uh they weren't really the cool kids because they were actually into

3:00

computers and stuff which back in those days were only for the nerdy ones that's true hasn't been changing

3:06

much I see no do yes yes I know okay so that's funny

3:12

you should mention that because uh there is this assumption stereotypically you see it all the time in social media that

3:19

like hackers are wearing like hoodies and they're like in a dart basement somewhere or they parents basement

3:24

somewhere or you get this like land where like everyone's got like a bunch of computers All In one room and space

3:31

that's like far from the truth maybe that back then it might have been but today doesn't feel like uh that's the

3:37

case or is it are we still wearing hoodies as hackers well s we sometimes wear hoodies

3:43

true but we indeed need to step away from that how do you stereotype depicting of the of the hacker true

3:50

probably just work in cubicles and be miserable about their cies too they're

3:57

basically especially the the black hackers The ransomware Operators I do think they are just as miserable as we

4:04

are and trying to make their wages at the end of the months to get their bonuses in and things like that are you

4:12

miserable I'm not are you miserable there anything you want well my my team

4:18

lead is on here so Tom I'm I'm not feeling very fine I might do with a with

4:24

significant raise at the moment it would help yes oh I love it I love it it so okay

4:31

well guys are we ready to jump in and then check out uh the first first scene

4:36

all right let's do it sure it isn't a virus it's a worm what's

The Worm

4:41

this one e it nibbles you see all of this this is every financial transaction Ellingson conducts yeah from million

4:48

dooll deals to the 10 bucks that some guy pays for gas the worm eats a few cents from each transaction no one's

4:54

caught it because the money isn't really gone it's just data being shifted around and when the worm's ready it zips out

5:00

with the money and erases its track Joey got cut off before he got to that part check it out by this point it's already

5:06

running at what twice the speed is when it started and at this rate it ends its run in 2 days judging by this segment

5:13

alone man it's already eaten about 21.8 million bucks man whoever wrote This

5:19

needs somebody to take the fall and that's freak and that's Joey and that's us we got to get the rest of the file so

5:25

we can find out where the money is going before the worm disappears so we can find out who created it all right

5:33

guys we're talking about a worm here and the way they described it right they

5:39

kind of put it in like um civilian terms where it was already encoded in there

5:44

and it it will pull it out when it's ready and then erase its uh presence

5:50

help me understand you guys is that accurate of what a worm

5:56

is uh no it's ACC modern malware things but the the distinction between virus

6:03

and worm uh takes back quite a few years I think Kristoff might remember those

6:09

times still yep and yeah the idea of having a literal worm nibbling away it's

6:16

just I mean it makes for a good movie line but it's not what actually happens

6:23

the actual difference is the virus needs a human to trigger it like the I love you virus where people actually needed

6:28

to execute it uh that's a virus and the worm is basically the virus which doesn't need

6:34

the interaction to propagate he can't propagate himself uh but there do are some very

6:40

cool takes in this clip as I see this guy reading hexad decimal at a speed I

6:46

can only be jealous of and his forensic skills are through the roof the the way

6:52

he is reading that and analyzing that and piecing that thing together yeah that that's just not realistic what

6:59

could be realistic is indeed having some malware doing exactly this and underneath under the radar trying to

7:06

exfiltrate some in this case money uh because it's indeed data that's just

7:11

being shifted around but uh the whole way that he gets to that conclusion by just looking at a screen that it's going

7:18

so fast that no human can ever read it ever that's just ridiculous it's just

7:24

the funniest thing I I will give them credit though at least actually showing like uh it's

7:31

scrolling as far as like in other movies we see them like have a graphics like they'll do these crazy looking Graphics

7:38

that are flashing all over the place this is a little bit more accurate in the context that it is some of the

7:43

earliest attempts to somewhat be accurate and not have the website saying

7:49

enter password firewall hacked you've entered the Pentagon something like that in other

7:54

movies yeah okay give him credit for that or the or the hacking progress bar I'm I'm always a fan of the hacking

8:01

progress bar what where where there is like 100% hack like that one that's come

8:08

on hurry up they're almost in just hit the keyboard a little bit harder and you will find it y but does

8:15

crate for good drama no it it does Hollywood gets away with a lot of things

8:23

I like the fact they were actually doing forensics in this case because they were analyzing the malware to see what it did

8:28

and what itcap abilities where um they did it in Ultra fast forward but they

8:33

were doing forensics so I like him yeah because nobody wants to see a scene of

8:38

three hours going through the data figuring out what's actually happening nobody wants to see that in a movie I

8:45

maybe you guys but you are you are the analyst so you you maybe get a kick out of it but I sure wouldn't yeah the movie

8:53

would be called case study yeah stud that's funny okay so um so with

9:00

that portion of the depiction of of of them knowing about this for and again I don't know this movie either I just

9:06

thought it was a really cool scene um let's let's continue on because this next portion of it uh cracks me up

9:12

because I think there's something about notoriety of being a hacker I know I know who wrote it what this Ellingson

Zero Cool

9:19

security creep I gave him a copy of the disc you gave me you what didn't know what was on it

9:27

oh man it's universally stupid man yo man you an amateur

9:33

man why did he come to you I got a record I was Zero cool zero cool crash

9:41

157 systems in one day biggest crash in history Front Page New York Times August

9:47

10th 1988 I thought you was black man yo man

9:52

this is zero cool oh [ __ ] that's far out this is zero cool man oh

9:59

y That's great there goes MIT I'll make it up yeah how I'll hack the Gibson dude

10:07

they'll Trace you like that man the cops are going to find you they're going to find you with a Smoking Gun [ __ ] if I care man look even if you had the

10:14

password take you 10 minutes to get in and you still got to find the files man I mean the cops will have you in 5

10:20

minutes oh wow we are fried never send a boy to do a woman's job with me we can

10:27

do it in seven both I help we do it in six Jesus I got to

10:32

save all your asses I help we could do it in 5 minutes man okay let's go

10:38

shopping all right so first of all zero cool that is just yeah this whole idea

10:46

of having hacker Alias and then the best thing you can come up with is zero cool

10:52

I like I said it's the 90s okay okay if we're going to be if

10:59

we're gonna be making fun of zero Cool's name what would your hacker name be H

11:04

that's a very good question depends if I'm going to get

11:10

discovered by the cops or not want throw just throw one out I'm

11:15

intrigued now well I would pick the first and last

11:22

name of somebody I really do not like if I'm C I can have some fun with

11:28

someone yeah that that would work that would work that's funny I'll not go on

11:33

record and and name people but no no but I can think of of a few yeah for sure

11:40

that is funny yeah all right tone you win on that one first and last name of

11:45

the person I don't like I like that one you win all right so zero cool just in case

11:51

Zero cool he made a mistake you guys he uh took a I'm guessing it was like maybe

11:57

a drive or something and and gave it to someone and he didn't know what was on it so he took he made a fundamental I

12:05

think now today uh a common mistake which is oh I found a random USB I guess

12:10

I'll just shove it into my laptop and see what's on there is that basically what he's admitted

12:16

to no I think he he found something that he gave a copy to someone that he

12:21

shouldn't have given that copy too so Random USB would be the other way around

12:27

you find something and you plug it in and then it has some malware on it which is very common by the way um but uh no

12:34

this is actually something he shared that he shouldn't have shared and back in those days uh it was on a dis because

12:41

yeah that's what we used that that's what we had it's not just what we used that's what we had there was nothing

12:48

else uh speaking of those little discs like they actually interviewed a bunch of gen Z's and took a poll to say like

12:56

do you know what this is and they're like oh yeah the same button button the save 3D print a save button right yeah

13:03

3D printed a save button it's like next time oh that's funny they find a music

13:10

guet they're going to think it's from the Civil War or something yeah well okay I I've said this before and I know

13:17

I upset a lot of my friends but I was like guys you know the music in the 80s

13:22

like when we you you think Back 40 years it would be World War II the 40s right

13:29

that's the same equivalent of the kids in the 2020s the 80s is 40 years ago and all my

13:35

friends were like why did you have to put it in those contacts I'm like it is we're the equivalent of World War II to

13:40

these kids right now so anyway I know I digress but okay so feeling that the

13:46

music like I said was that 40-year Gap right this movie feels really dated in a lot of ways so how with zero cool and

13:54

the fact that he shared information with someone he shouldn't have I didn't understand that last scene where they're

14:00

like I can do it in seven you need my help I can do it in six five what were they talking about there I think they

Timeframe

14:06

were talking about how much time they needed to hack in some system and steal something uh which is an hilarious thing

14:13

that you can put a time frame on there to see how much minutes he going to take yeah guess that's always completely ear

14:21

not realistic in any movie is the time frame yeah that's like the number one

14:27

thing like I we've seen many good movies uh in the past um like especially things

14:33

like uh uh Mr Robot was a very good example of of things that could really

14:39

happen but never in the time frame that they show in the movie like never okay so you can't call it out and

14:47

say I can solve this issue in two minutes no no no no also solving a case

14:54

in in that many hours is most most cases it's very well it's it's an educated

15:00

guess you can do uh whenever we have to help a client we also have to guess how

15:05

much hours how many hours we need for that uh but it's we get pretty good at

15:11

guessing but it's still guessing because you never know what you're going to get always going to be surprises coming your

15:16

way in order to well solve the puzzle interesting thing in this sorry uh I st

15:23

but the interesting thing in this is that he basically said I gave the dis to him and I didn't know was on it yeah and

15:30

that has a very good analogy as we are um well our laptops and our mobile

15:36

phones contain our entire life and once we get a new one what we what do we do with the old one might be bit of um

15:44

what's correct English term where you have some uh influence of your professional life and your private life

15:50

but I might might be misformed by that but I drill holes in all my old hard drives and I try to destroy my phones

15:57

physically before I throw away but people are well their laptops getting stolen their data is getting stolen

16:03

because they don't do any full dis encryption which they actually should on every device they have uh but but they

16:10

they're giving away things which contain important data which they have no idea what's still on there so hot take for

16:17

the for the Watchers make sure you have full dis encryption on everything and be careful when you throw away your

Final Thoughts

16:24

phone I haven't thrown any of my phones away I have like it's horrible like I've got this like massive box of all of our

16:30

equipment over time just because I'm so paranoid about it even though we've cleaned it and all that good stuff my boyfriend's actually in used to be in

16:37

cyber security so like I get it I trust him I still won't throw things away I could be hoarding tendencies but that's

16:43

a different issue all the together yeah as long as you don't start displaying things like old Hardware then

16:51

then you're fine no I I'll try not I'll try not okay so any any final thoughts

16:56

on this particular scene you guys a that stood out to you yeah I just wanted to add on the timing thing was that uh what

17:03

is kind of realistic is when when you have like a certain window of getting something done that is that is that is

17:10

true but you can't figure it out in time in that window no you need to be able to

17:15

plan ahead create some sort of attack that fits in that window so that part

17:21

can be really like we only have five minutes in they until they can something gets triggered that kind of could be a

17:29

realistic but then two other two other things that popped up here as well like he in in in this days day of age uh in

17:37

that case he gave a dis to somebody else uh now uh when like ton already

17:42

mentioned sometimes they're also discr employees those hackers though those those hacking groups are often how do

17:49

use midsized companies they do not get enough pay or leave and then something happens like the con Leakes for example

17:56

which C did decent analysis about so that is something true as well data can leak also in those watch out then

18:03

for Tony just mentioned that he wants to pay I'll be monitoring him very closely just making

18:10

sure the idea you should be paying me more and the other the other thing next

18:15

to the the leaking of the data was although it was a very successful zero cool hacker apparently with a lot of

18:22

notoriety uh these guys do make a lot of mistakes often that we see we see that as well in those in our invest vations

18:29

uh so they're not all o very well oiled industrial uh hacking groups uh

18:36

sometimes we see them doing the initial breach and then testing something it fails because endpoint triggers

18:42

something they fa they try again they fail then suddenly it exceeds you see them uh typing in commands and then

18:50

Googling new commands copy pasting so it's it's actually Al fun it's also

18:55

almost a movie on its own to do the investigation so basically it's every other software engineer ever out there

19:02

is doing just exactly the same thing yes and there are theop the copy pasting the

19:09

searching the trying the failing the trying again until it kind of works and

19:15

then we're good enough I had no idea I am not technical I just was in uh I just

19:22

sold the stuff I affectionally call myself a groupy of cyber security like I get the concepts so you're telling me

19:29

they just copy and paste off of Google like in real time they're like searching that's really yeah from time to time

19:36

yeah go ahead go go go yeah but I insist that you go ahead first sir all right so

19:42

uh actually this is kind of of a big problem in development these days is that nobody's writing something from

19:48

scratch so they're reusing what's called libraries left and right and nobody

19:54

really verifies whether those libraries are actually milici even not not even badly written but actually malicious and

20:02

published because of it so an hacker could publish something that you could

20:08

use as an as an um as an engineer to build software oh this is an easy

20:13

function that I could use but it's actually a back door into your soft using your software into whatever it's

20:19

installed on and that's very common these days oh wow okay had no idea it it's

20:28

something you just don't think about that's crazy well okay so now now you're

20:33

really making me think and I have to move on to the next clip but before we close out this little moment on a scale

20:39

of 1 to 10 accuracy 10 being the most accurate how would you rate the

20:46

scene I'm giving it a seven wow they had a seven they were

20:51

looking in hexadecimal form to things they were talking about digital forensics uh good enough for a 1995 move

21:00

yeah yeah I would I would go with a six or so because the timing thing is just

21:06

ridiculous but I do like the fact that they're doing their analysis uh like

21:11

even if it's at lightning speed it is still an analysis I was going for a three

21:20

so fair enough oh okay somebody need to keep up the standards Tom is going to be the tough

21:27

one in this uh this group here okay we we always everyone needs a Simon cowl in the group so we're okay so that's is it Simon C I

21:35

need to Google that you don't know him oh

21:45

[Music]

21:57

wow [Music] so-called American Indians Latinos and

22:03

blacks come from a genetically mediocre stock yak yak y being aware of racial

22:09

division get a j I [Music]

22:22

am say I'm a

22:29

[Music]

22:37

[Music]

22:44

now I'm Mr Simpson I'm subbing from his bis who was arrested at the anti-fur

22:49

rally all right all right so what's the thing this one there

22:57

there's some good there's some bad true so true true true to be frankly

23:04

honest when I when I when I saw the first inter the the the the picture on the screen uh what is it with the tape

23:10

robot I think that that it should have meant I was thinking about IC and skada

23:15

systems being approachable uh publicly available actually that was my first uh

23:20

yeah well there goes of fun in this in this episode

23:26

on no I thought look in back in those days

23:32

those um clips that were aired those were probably vide taped and to have some sort of robot to manage those tapes

23:39

is not uncommon and the fact that you could hack it and put a different uh tape in there without someone noticing

23:48

because it's probably the off hours that to me is realistic what is actually what

23:54

I find very funny is that he was typing on and looking at a scen screen and the screen was just doing something random

23:59

that has nothing to do with what he was typing and that that part is just like what is he doing like usually when you

24:07

use any kind of interface it actually does something to to the the viewing

24:13

whatever it is and this was definitely not the case fun thing was he was looking at a 13inch monitor with yeah

24:21

three columns and all moving in a different direction yeah was cool but I

24:27

did like the thing robot yeah the tape robot was awesome cool and actually

24:32

still actual uh in this case it was with video cassette for video recordings but

24:38

uh from nowadays we still see them in in some cases with the backup tapes where

24:43

the tapes are in a in a robot uh we even have a ransomware case we had a

24:48

ransomware case once where basically the tape robot was also hacked and they the

24:54

attacker went in there and they actually deleted all the the back updates and they could access all the backup tapes

24:59

because the tapes were still physically in the robot and the robot could access them one of the most cool cases ever but

25:06

uh that's why when we're talking to client who fell victim to a ransomware attack that we now ask do you have a

25:11

copy do you have an offline copy of your backups and then yes yes we have the own tape and then the next question is

25:17

always going to be are these tapes in a tape robot because we have seen cases

25:23

where actually the tape robot was leveraged for that um so offline backups

25:29

remains an important thing and apparently a 1995 movie brings us right on to the top of a current

25:36

case o i i I just assumed that was like Antiquated but the fact that you're

25:41

talking about backups that does make absolute sense O Okay so okay that

25:46

little snippet that you saw there guys uh scale of one to 10 I'm just curious how accurate That was cuz didn't we just

25:53

talk about how we were impressed that they didn't use some random goey to show being ha and then of course this next

25:59

scene is exactly that some random imagery that says welcome to whatever system that

26:06

was yeah and and like even even if that that that would never have been the

26:11

interface for the actual programming running the robot so that that in itself looks nobody would make something that

26:19

is so elaborate and that doesn't show anything except an animation of of tapes being switched that would not that would

26:25

not happen uh so like I said everything about the hack is realistic but

26:31

everything visualizing it in the movie is absolutely

26:36

worthless so I'm guessing it's you're you're gonna give it less than like what five six is that my guess how you'd give

The Score

26:43

the scene yeah I would I would give it higher remarks because it it is very

26:50

realistic the hack itself is realistic so I would even go as far as an eight I

26:55

think for this one uh oh and Tomy is giving it a two

27:02

probably go ahead guy something like that yeah true

27:08

the imagery was awful yeah okay the top the tape Rob brings you to a topic that is that might be still on point or or

27:14

currently these days but these movies I'm not very fond of these movies because they don't do the uh the real

27:21

life justice so no no no also very bad score for this all right so what was this if you

27:29

guys are being so severe I I I'll do a four out of 10 for the stupid animation but then go up to a six out of 10 by the

27:37

coolness of the tape robot being used okay all right I we roll with that

School Property

27:43

okay so let's go on to the next clip here now I'm Mr Simpson and I'm subbing from his bis who was arrested at the

27:49

anti-fur rally I know some of you kids got

27:55

computers at home but these these are school property people and I don't want to see any gum

28:04

Stu chapter one designing graphical

28:19

interface the ominous music

28:26

yeah

28:32

what's

28:38

up oh

28:49

my okay guys so those were two scenes actually

28:55

right yeah well I think it was two two scenes yeah the first one was where he

29:00

was changing his score or something or changing his class and then the second was was the spr sprinkler system that he

29:08

hacked this scene I liked okay the scoring will be better for this

29:14

one because it's it's talk to me Goose why do you like this uh well well the first one uh

29:22

indeed changing points or whatever I couldn't uh distinct what he was

29:27

changing but uh well that is something that it's can be very true of course but

29:32

the especially the second part of the of the of the scene having access to an internal well in this uh fire

29:39

extinguishing system brings me back to the topic I I said uh being IC and SCA

29:44

being publicly available you see those that often these interfaces are public e publicly available and not not enough

29:51

well protected or even inside uh an environment a lot of people can access those kind of things so this actually is

29:57

very well it's not possible this is reality yeah um once inside a network you often have access to these kind of

30:03

things because they're really bad default wise really bad secured and then you can do stuff like

30:10

that so I like this this is very um it's very plausible indeed very plausible did

30:16

did any of you guys did any of you guys pick up that he basically makes him graduate to Advanced English

30:24

which allow himself to graduate to Advanced English playing around with his grades that

30:29

doesn't seem realistic at all um but yes uh especially in the 1995 time frame

30:36

database Securities and the the interfaces were really really bad so it

30:42

was easy toble for students to from time to time break into one of these databases yeah it wouldn't even be

30:49

called a hack you would just access the database and change it and you as long

30:55

as you knew where it was you could easily do it well that brings up what

31:00

is yeah like it didn't break anything it just changed some records to A system

31:07

that was probably just accessible from anywhere and and and in the second scene

31:12

Tom with just the other week we were on a team building and we were staying in this house that had a Wi-Fi and we

31:20

wanted to do something with a chomecast and the Wi-Fi had some security feature

31:25

enabled so that two devices in the same network couldn't connect and we simply

31:31

tried the the admin portal of the Wi-Fi which had the default password on it we

31:36

just logged on changed the setting all done so and that was in like publicly

31:43

available place where you would didn't expect it but it was still default password like that kind of stuff and it

31:50

still happens today do you think that's because of uh

31:57

uh ignorance of maintaining good policy or laziness what do you guys think would

32:03

use these words that's easy to have I

32:08

will yeah an inse um or forgetting about

32:15

it uh it we we say that often it's not

32:20

it's it's not ignorance or laziness um it it Dives right into the topic of skills shortages don't have don't

32:26

doesn't people or companies don't don't having the band with or the people to manage these systems you

32:32

buy the ecosystem nowadays is you need tons of different security vendors or

32:37

just infrastructure type of vendors you have tons of tools nobody is fully educated on them so no it's default out

32:43

of the box you place it you don't configure you don't update and then these things happen it's it's one of

32:49

have the complexity for the party setting it up and then saying to the guys who are going to have to work with

32:54

it afterwards saying hey guys I set this up with a default password so you guys can change it later and the other guys say yes we'll do that and they forget

33:01

about it because they're overtasked and have 3,000 other things to do in the company uh also one of these things we

33:07

see a lot there's a lot of non sexy cool things of a partner go yeah sorry sorry

33:14

um from from uh because I used to work at a partner doing these installations of tons of these systems and I can tell

33:21

you that you indeed are there like guys it's finished now you need to change it and yeah

33:28

you do you do your best and then yeah and always the same thing with

33:33

security products you have the the quality of the product and you have the quality of the um configuration of the

33:39

product and just plain things like forgetting to reset default credentials the product might be topnotch if you

33:46

forget to do the basics like res setting the default passwords it's going to be breach

33:52

sometimes it it feels like a human aspect right the human element if there's going to be that one step it's

33:57

going to be the human right like I I I usually is it usually is at some point

34:04

and even if it's the system someone made a mistake somewhere that allows some hacker to use misuse a system so at the

34:12

end it's all human but yeah most of it if when it comes down to configuration usually yeah and like Tom said it it's

34:20

not really their fault in the sense that they are overworked they don't have enough resources so they need to

34:25

prioritize on the most important an things and most businesses still prioritize availability over security at

34:32

any time and that usually bites them in the rear end at some

34:39

point T and Tom can can go and fix the problem when that there you go it's

34:45

called job security guys yes yeah there's PL plenty of that for us true

34:50

sadly enough of course but no it's a sad fact but I tell everyone if you want to

Home Run

34:55

if you want job security go into the Cyber cuz that's just where it's going to

35:01

[Applause]

35:20

[Music]

35:25

go

35:31

[Music]

35:55

f yes home run home run all right let's okay okay what a great visual depiction

36:03

of yeah this with no link to reality whatsoever no nope this this is just an

36:12

Hollywood attempt to make things that look literally look very boring make make it look interesting that that's

36:19

just it there's nothing this this to me gets a two a one a zero out of 10 like

36:25

this is worthless I also like the fact that they at one time they zoomed in on the CCTV thingies

36:32

which at in 1995 I'm pretty sure we're 100% analog and it's also a closed loop

36:38

system not a network system and they jump through there into the network uh

36:44

it's not getting that many points for realism this Cas yeah and then the the the 2001 Space Odyssey Twilight Zone

36:51

things where everything is flashing and going like weird Clips just Stitch

36:56

together like doesn't make any sense but yeah they had to fill the seconds and minutes I guess yes no I thought that

37:04

was funny of I I get what they're trying to do with a visual depiction of like data going through a system I think

37:11

that's they're getting artistic license I think is what I would call that um

37:16

yeah I I don't know if anything else to say other than I think that was just a visual depiction of data running through

37:21

a network that was my guess of how to read that that is indeed what it was and

37:28

it has no basis in reality whatsoever our jobs are much more boring

37:35

to look at from a visual perspective you don't it was no I wish it was would be

37:42

cool too no it's also I think it Al also a bit of a this is 95 so it's like this

37:49

is what we can generate with a computer when it comes to 3D images back in the

37:56

day cuz that that scene with the the green cubes that would have taken

38:01

probably days of rendering back in the day like this is CGI from

38:08

95 so yeah they wanted to show off what they could do back then which probably

38:15

back then looked really cool butou yeah but uh to today standards not

38:23

so much so are you're saying that ERS is aging itself a little bit is that what you guys are saying it's dated a little

38:30

bit that scene definitely tiny bit Yeah tiny bit yes

ACC Counting

38:38

okay awesome okay so um I'd like if we can I would like to see if we can do one more

38:43

[Music]

38:55

okay [Music]

39:15

they [Music]

39:25

go [Music]

39:41

this is ACC counting sir uh you inquired about an employee of ours agent Richard Gil yes our records indicate he's

39:48

deceased um

39:53

what yeah oh I there's so much about this scene that just cracked me up okay

39:59

so I don't know if anyone has the ability to take someone's property and

40:05

destroy it first off so I don't know if that was a policy back in the day but just seeing how nonchalant that waiter

40:13

was to carry back that credit card and just be like boop boop boop Deuces it's like no explanation no do have any other

40:21

cards none of that so I thought that was really funny yeah that was that was quite funny

Magnetic Strip

40:28

but it was not for me it wasn't the funniest thing in the clip but yeah definitely funny there as

40:33

well also the thing that well that were magnetic the magnetic strip was the only

40:38

thing on that card at the time now we all have cards with chips and the chip basically has some basic security in it

40:45

uh that was the the old times where you could just copy some somebody's magnetic

40:50

strip which was basically just a string of data was enough to yeah and that indeed cutting the the

40:57

strip into was good enough to basically protect you from abuse I like plenty of things in here

41:05

the the fact they were on a on a public telephone boot kids probably don't know

41:11

what it was but at the time before mobiles was a thing uh us as mere mortals we made arrangements with people

41:17

and we were on the certain time at a certain place to meet each other and things like that but well the phone

41:24

boots to basically link up with a computer uh with a thing called the modem which made a very distinct sound

41:31

uh when you try to dial into a network uh I like that one really really really

Modem

41:37

yeah and it would would have made them less traceable because they were on a public phone and they could leave and

41:43

there was no trace of them being there so that was really good um would also cost them quite a few pennies to keep

41:50

the the phone line open yeah especially knowing which internet speeds at that time we had and things like that yeah of

41:58

course the amount of data was not that much what what was again completely ridiculous was the the visual

42:05

representation if you would edit data when you hack something it would not

42:10

look like that you wouldn't have a nice graphical interface and like ton said with the speeds that you had back then

42:17

it would take too long to just load the graphical interface to begin with so

42:23

that that that again Hollywood doing what Hollywood does

42:29

best well it might be a bit of artistic freedom to to make a SQL injection look

42:36

a bit cooler yep but then again you and I would find it much cooler if it was

42:43

actual real injection yep like you had again in The

42:50

Matrix movie there's a scene where they where they actually use an exploit that was a real exploit back in the day uh

42:56

and they actually show you the the oh cool The Prompt was an SSH hacked

43:03

something uh vulnerability and they actually used the real one that was valid in that

43:11

time that's cool movie to review I didn't know that one no nether oh I've

43:16

added I made a mental note to add that to our review list so thank you everyone loves Matrix though so I get

43:23

it and Tom you've been a little quiet there my friend yeah well the um

43:29

actually I was I was thinking about a book I read on Kevin mnik it was ghost in the wires um this scene reminded me

43:35

about that it wasn't it's a really awesome book I've um only been playing

43:40

in the Dig digital realm uh uh doing this but if you see how he explains um in very much in detail how

43:49

we uh deceived FBI by by uh leveraging the the phone system back in the days

43:55

and hacking into companies and universities uh awesome book to read if you want to dive into that uh that Tech

44:03

subject ghost in the wires what was it was the correct term for that for Pham

44:08

line hacks fracking no fracking fracking Fring fracking fracking is it it has a specific

44:15

term oh interesting not to be confused with the term used in Battle Star Galactica which is also that's

44:23

completely different thing Series yeah um yeah and what's relevant today also I

Digital Identity

44:30

think is that how much of our Lives is digital so if there is Mees if they mess

44:36

with that data um yeah it can have real life consequences like if someone puts

44:43

somewhere that you are actually deceased it can be hard to get those errors out

44:48

of the system that is prove it right that is something that we don't deal

44:53

with of course that type of uh incidents or cyber crime that that's more for

44:59

police um but it is I I can't remember also auth I can't remember the name when

45:06

somebody takes your identity there's a an um takes over your kinds yeah yeah

45:11

there's something else as well I didn't well wanted to go to identity theft of

45:16

course um it's uh to have that uh if they take your identity well um because

45:23

there's also very little you can do about it um it can mess up your life

45:30

and the more we move into the digital world the the more important it is to protect your digital identity too uh on

45:38

all sorts of forms because well the probably is going to be the case already

45:43

that your digital self is more important than your physical self uh at least for everything what the states or the place

45:50

you live that the authorities are concerned about yeah

45:56

it makes 100% sense so okay I love this last scene here because I do think it's

46:01

a great reminder of how vulnerable this Richard Gil apparently they're definitely targeting him for whatever

46:07

reason because obviously they don't know the movie but he he did he definitely did something to earn it right so if you

46:13

get on the target of an ey of a hacker that really wants to go after your personal life identity theft or whatever

46:19

purpose they want to go after um it's it's very real in this day and age is that fair to say it doesn't matter who

46:26

you are if you've got an IP address somewhere with your identity you can't get tracked and you can't get hacked is

46:32

that the positive message I guess we should take away if it talks to to

46:37

internet it can get hacked yes and even if it doesn't talk to internet it might still end up being

46:43

hacked reversal but and this is what we tell customers as well I mean they

46:48

always say yeah but why would someone hack us yeah but if someone does and then we have the the angry ex employee

46:57

or or even still employee or there are many reasons why they would be a Target

47:05

and um and once they target you she bad

47:10

luck you have targeted attacks but there's a lot of automation automated scanners who report on hey we have a

47:16

vulnerability here and they just fenter into that so y well okay so it sounds

47:23

like to me I apologize uh tone go ahead I was just going to add that's not

47:30

like the uh proverbial worm that's nibbling away if you sents of your bank accounts that that's not what they're

47:36

after they're not as nice than that they leave something in your bank accounts they try to empty it as a whole that's a

47:43

very true statement so guys I know we can keep going and I know hackers has been requested like I said so many

47:50

people are like you guys got to do hackers you guys got to do it so uh I I know we didn't actually play the

47:56

movie thematically speaking but of the scenes that you have seen so far knowing that's a 1995 movie on a scale of 1 to

48:04

10 what did you think of your experience of uh watching the hacker scenes overall I'll go for a three and a

48:13

half I don't yeah not my kind of movie I think no not going to spend my time on

48:18

it it's got like that all right tone I go for a seven because I have some

48:24

interesting concept which are still valid today and I I'll go for a six because I

48:31

think it is good entertainment at least uh and it has some points of truth but

48:37

it's just fun to watch well guys I appreciate your feedback and Tom you cracked me up

48:44

you're like it's a two or a three on a good day you might be surprised I I me a

48:49

lot of a lot of guys uh and gals in cyber security have said hackers has actually got them interested in and

48:55

going into the field so it's like one of those early you know predecessor I guess what you call OG movies so um I might

49:03

check it out myself I haven't seen in like so many eons but uh yeah I gotta

49:08

say it is entertaining it's probably more accurate than I think some other movies that we've seen of depiction of of hacking but yes I mean come on you

49:16

guys if they actually if Hollywood actually filmed us accurately of what you guys all do all day I'd imagine it

49:22

would be a very short movie with a very small niche of people thatd be interested uh just because it's so not

49:29

exciting visually speaking as you guys have said is that accurate very long movie very long sometimes a very long

49:36

and boring movie long and boring movie with like at the very end Eureka moment

49:42

and that's it and it's a and end and scene well guys that kind of well

49:48

Kristoff tone Tom I really appreciate your time and uh I really loved your guys' Insight so um you know what I

49:56

think we could just go ahead and wrap this up because I have a feeling we could keep going and going on this so I want to say thank you so much for your

50:01

time you guys have been rock stars and uh you're always welcome back but let's go ahead and wrap this up for another

50:07

episode of checkpoint real talk we'll see you next time that's a wrap on today's episode of checkpoint real talk

50:15

if you like this video hit that subscribe button and some of those other buttons to show us your appreciation and

50:21

if you want to learn more or have any questions please let us know in the comments we'll see you next time for

50:27

another episode of checkpoint real [Music]

50:35

talk