#idblacklist #ID #investigação #discovery #dublado #dementes #assassinos #ambição #misogino #misoginiaa #covardia #pedofilia #pedofilo #extorsão #traição #mistérios #pântano #mulheres #assassinas #amantes #filha #filho #mãe #madrasta #verdade #por.trás #do.crime #psíquicos #forense #exame #psicólogos #psiquiatria #jovem #moça #lago #gente #charlesStarkweather #tedbundy #jeffreydammer #btk #palhaço
Categoria
📺
TVTranscrição
00:00Over the last 20 years, a new type of people has developed.
00:13They have their own culture, technology, and language.
00:19Among them are pirates and thieves, celebrities and philosophers, criminals and police officers, heroes and villains.
00:30They operate worldwide, but their home is cyberspace.
00:34And now there is a conflict between their villains and angels.
00:41This is the secret history of the different missions that now guide the people known as hackers.
00:51Hackers, criminals, and angels.
01:0024 hours a day, 7 days a week.
01:07There's a war being waged online.
01:10Dennis Trees leads a front line of defenders, ready to detect and neutralize new attacks.
01:22It looks like the bridge of the Enterprise.
01:46Minute by minute, hour by hour, every attack is analyzed.
01:58Each of these could be the precursor to a larger attack, launched by a hacker anywhere in the world.
02:05Last year, they intercepted 83 million hacker attacks on the networks they protect worldwide.
02:26The emergence of internet whizzes like Dennis is a result of this.
02:56One of the first ones was launched by the legendary Captain Zap.
03:11The man behind the comical images was a teenager when he entered the hacker hall of fame.
03:19You only mentioned Captain Zap and they said...
03:22The story of the old one, oh my God, good!
03:25Captain Zap's target was AT&T's computerized billing system.
03:32To gather the knowledge for the mission, Captain Zap looked for a way to break into the telephone system.
03:48Armed with hacker ammunition, Captain Zap goes to work...
04:12Armed with hacker ammunition, Captain Zap goes to work...
04:16Sit down in front of the terminal, turn it on, and start hacking.
04:21And spend hours and hours trying to get in.
04:24And then once you got in, you were, you know, do you want to play a game?
04:28Well, you would dial into their maintenance ports.
04:31And because there was no protection back then, the maintenance ports would automatically respond.
04:36Captain Zap defined himself as a modern-day Robin Hood, an electronic outlaw.
04:55We decided that we were going to change the clocks and the switches around the country
05:00so that everybody got free long distance or discounted long distance.
05:06He managed to change the clocks in the telephone system, giving discounts to everyone during peak hours.
05:14In hacker terminology, he won.
05:18I knew more about the phone company switches than they did.
05:21In the hands of Captain Zap, on AT&T's computers, days turned into nights.
05:35And nights turned into days.
05:38We changed their clocks so that it was an exact 12-hour difference.
05:49Millions of Americans saved money.
05:53But none of them knew.
05:56Not even the telephone company.
05:58Ian was one of the pioneers.
06:02Ian was one of the first people to recognize the bad things you could do with computers.
06:09He didn't have a lot of people going before him that he had to emulate.
06:14He's sort of an original.
06:15He's one of the first generation of hackers.
06:18The people who figured out how to do it when figuring out how to do it was really difficult.
06:23Captain Zap discovered he could hack Classic, anywhere.
06:35Thus began a career of damage.
06:38According to Wired Magazine, the top hack ever done.
06:44By any hacker, it was the AT&T Time Clock hacking.
06:48They consider that the best hack ever.
06:53His scheme was only discovered when the bills were sent.
07:09And he had already disappeared into cyberspace.
07:14They only caught him 18 months later.
07:17I was naturally.
07:19I could have saved drugs.
07:20Or I could have wrecked the car.
07:23But no, I decided to be a technofreak.
07:27And it was a little easier.
07:28And there was no law against him.
07:32Twenty years later, these laws exist.
07:37The New York Police Department's computer crimes division is growing.
07:41To cope with the weight of your work.
07:43And it has the support of a computer forecasting laboratory.
07:52Their boss is Sergeant Jimmy Doyle, who believes the hackers are using new weapons to fight old crimes.
07:58And there
08:01So, you're going to have a type of computer that will do web defacements.
08:05You're going to have to make some kind of computer.
08:06You're going to have to make some kind of computer.
08:07And then you'll have to make some kind of computer.
08:09artist.
08:10Then you have someone who would break in to steal something, a burglar.
08:13Come up a little bit more, someone who wants to commit crime, he's going to use his skills
08:18to steal money.
08:19And as you see, you're going up and up, and then I guess at the top of the pile would
08:22Be the cyber.
08:23Someone who wants to create a great amount of fear through their skills by taking down
08:26power grids or attacking financial institutions, they would be at the top of the pile.
08:38In the past, criminals hid behind masks.
08:42Today, they use computers.
08:44From crime is way back is when you would have your Western, your Western robberies and someone
08:50would run in, they would try to stay anonymous.
08:52They would put mask on because they'd be hard to identify themselves.
08:56Now if you take that and fast forward it to the year 2002, it's the same basic principle.
09:02I mean, you don't have a person putting on a mask, they're sitting behind a computer.
09:08At least one hacker uses a mask in addition to their computer.
09:13KP fears that the English police may want to talk about an attack on a mobile phone company.
09:20who went beyond Captain Zap and increased the accounts of his adversaries.
09:25I did look up several people that I was having a disagreement with at the time.
09:31I tried them through that database and made several slight changes to the billing records,
09:35but nothing so conspicuous as to be noticed.
09:38Turning their service off, having them blacklisted.
09:43It was great.
09:45I was sitting up until 4 or 5 in the morning just knowing that I was the one person who
09:50was doing what I was doing and nobody could even come close and touch me.
09:56In the fight to track hackers, the prevention group uses the equivalent of fingerprints.
10:01electronics.
10:06In the 21st century, the crime scene is usually a computer's hard drive.
10:11Suspect disks are seized or cloned.
10:15The explosion of online criminals has forced the New York Police Department to increase its task force against online crime.
10:19of computers.
10:20What we do, on occasion, is go there and use those devices to make a copy.
10:22The exact specifications of the hard drive system, and then bring that information for analysis.
10:25They think they are protected by this office, but it's practically like
10:31The invisible man.
10:32Even the invisible man takes a piece or two, a piece or two, and you follow.
10:37The explosion of online criminals has forced the New York Police Department to increase its task force against online crime.
10:45Computer technology is the fastest growing sector.
10:47With the same speed that digital detectives armed themselves, hackers developed software.
10:58which scans for security holes and vulnerable systems.
11:03To stay on top of things, the global internet threat security service meets daily.
11:31They exchange knowledge about hacking activities with colleagues around the world and within the FBI.
11:44They need to stay in touch.
11:46They know there will be new loopholes, and that hackers will discover and exploit them.
11:54After the updates, they discuss the level of threats that the internet and its users will face.
11:59in the next 24 hours.
12:07Today they set the alert level at routine level 1.
12:11Even at this level, they estimate that any unprotected computer that connects to the internet will be attacked in less than a day.
12:19In alert number 1, an unprotected computer will be compromised within 24 hours of connecting it to the internet.
12:29Twenty years after Captain Zap changed the AT&T clocks, Dennis's team fights off a hacker attack.
12:37On average, 2 per second.
12:39In the heart of corporate America, fear of hackers has given rise to a new profession.
12:56Brian Holyfield, 26 years old, has a different career path on Wall Street.
13:01He is an ethical hacker.
13:04He and his team are paid to hack into the computers of large companies.
13:15They are called the Tigers team.
13:18They call themselves ethical hackers, the most angelic kind.
13:44But Brian gets paid to lie and cheat.
13:48To gather as much information as possible.
13:53Today, with the blessing of the board, he prepares to become Will, the hacker.
13:59Hi Jim, this is Will Rogers from IT. How are you?
14:10Okay, okay.
14:12Do you have a few minutes, or did I interrupt?
14:14Is this bad weather?
14:16Okay, great.
14:17Your mission is to get the employees to reveal the password.
14:22He says he's from the technology department.
14:26It pretends to check if the password is valid for changes in the system.
14:31None of that is true.
14:36Surprisingly, the technique always pays off.
14:42What we're going to implement in this system can restrict the type of character,
14:46These can be letters or numbers that you can use.
14:49So, for example, what exactly is the password you use?
14:52And I'll see if this will actually work with the system we're going to implement.
14:57OK.
14:58Brian convinced several employees to hand over the password.
15:13Now you can use them to obtain company secrets.
15:17You can do a lot with the information we see.
15:20And there is a lot of information that we see every day.
15:23So, you really have to have a sense of ethics.
15:26You might be able to, say, gain access to a company's credit card data.
15:32Well, you know, your typical hacker will take the credit cards and try to sell them somewhere.
15:39And to create a benefit.
15:40We don't.
15:41We don't.
15:42We will document how we are able to gain access to this information.
15:45We will recommend to our clients how to fix this.
15:47Ethical hacking is a clean way to make a living.
15:53And it amuses Captain Zap.
15:56A service he would do for free.
15:59Money is a type of...
16:01Money is a type of...
16:03Money is a type of...
16:05The money...
16:07The money you can buy.
16:09Hacking is the most rewarding.
16:11But being paid to be allowed to crime
16:15It's absolutely...
16:17He's American.
16:21It's much harder than you might think.
16:23I mean...
16:25What do you mean...
16:27It's very easy for someone who is honest.
16:31What is a type of...
16:33They don't have the mindset...
16:35They are...
16:37They are...
16:38Good-good-good-good-good.
16:39You choose a guy...
16:41If you want a job done.
16:43The question is, what does this mean...?
16:45Diz-de-deeds are very expensive.
16:47And that's the way it should be.
16:50You can choose a type of...
16:53However, 70% of the attacks...
17:02They are never reported to the police.
17:05Many large companies...
17:07They turn to Alan Brill.
17:12He was an intelligence agent...
17:14And he leads the team against high-tech crime...
17:17At the largest private detective agency...
17:19Kroll.
17:20Again, I would be there...
17:21As soon as I can.
17:22Day and night...
17:23Your team uses mobile kits...
17:25For hacker detection.
17:27It helps companies contain them.
17:29And he keeps the secret of these invasions.
17:32We work for the corporation.
17:34We can help them understand without having to go to the government.
17:40When you go to the government, they really control the case.
17:43Are they going to take the case? Who's going to prosecute?
17:46What kind of publicity will there be about this?
17:48On this volatile day in the markets,
17:52This isn't always something you want to take a chance on.
17:56But you can't be affected by not knowing what happened.
17:59The job here is to defeat the hackers.
18:06Bypassing passwords, cloning hard drives, and attacking suspicious drives.
18:11Allen's IT team consists of people who could have channeled their talents into piracy.
18:29They may be on the side of the angels, but keeping secrets about the attacks is also good for other good guys.
18:45System administrators who defend networks prefer to keep their bosses in the dark.
18:51when they discover that the bandits have clocked in.
18:54The anxiety experienced by this type of professional is so great,
19:21Every year, hundreds of them enroll in courses.
19:28Here, the good guy learns how to defeat the bad guy.
19:32The students come from all over the country.
19:36They must be hand-picked, because this is a school for hackers.
19:40If you don't think like the hackers, then you can't figure out what they're trying to do.
19:50My biggest fear would probably be hackers being on my network.
19:54and publish financial information or anything about my company.
20:00What would happen to me?
20:02I would be very grateful and would probably remain closed.
20:04While James worries about his job,
20:11Pete White, his colleague at Xtreme Hacking, is also anxious about his company.
20:19Throughout, Pete is responsible for preventing patient data from being leaked.
20:24They were leaving a hospital in downtown Houston.
20:26At the Xtreme Hacking school, Brian Hollifield, the ethical hacker, is one of the instructors.
20:53In just a few hours, he and his team turned the students into hackers.
20:59They are hacking, and they have also learned how to protect against every hack they carry.
21:05These are real-world examples, and we are always updating the materials.
21:09so that it accurately covers what is happening on the ground.
21:12Bad guys have to find one way, and good guys have to find all the ways.
21:15Thanks to Brian and his colleagues, after four days, a new team of angels prepares for battle.
21:25The instructors hope that none of the students will change sides.
21:30Using it in a bad way, I don't do that.
21:34I don't understand why you...
21:35What is the wisdom of going and disrupting someone's system?
21:38Unfortunately for the school of hackers, a new generation of criminals thinks it's funny, very funny indeed.
21:54The good guys must be prepared for any attack.
21:59At the Global Treat Center, attention is focused on internet expert Carter Schoenberg.
22:04He saw something strange.
22:09A large electronic system of channels through which the internet travels is being affected by a suspected attack.
22:16It appears to be crossing the Pacific and heading towards the United States.
22:19Perhaps it's an attack on internet infrastructure.
22:37If the attack hits the country during working hours, it could affect millions of people.
22:55Traffic dependent on this network may stop.
23:15Carter checks with the Irmanos station, southwest Asia.
23:18Meanwhile, the two stations are seeing the system recover.
23:27And it all ends as quickly as it began.
23:31It was one of those anomalies, but it's an anomaly that when it happens,
23:35We were on top of things when it happened.
23:37We were able to get everyone's attention.
23:40It was unclear whether it was the work of a hacker.
23:43But, for a few minutes, it was the kind of attack that the good guys fear most.
23:50An electronic Pearl Harbor.
23:53The threat of a true information war.
23:55During the 1990s, the United States military computers
24:21They defended themselves against such an attack, thanks to Bobby Ayers and his team.
24:42There are hackers working for over 100 governments.
24:45In the mid-1990s, one of the United States' most secret military projects,
25:00The Stealth Bomber was targeted by hackers.
25:03Possible leaks could occur.
25:05The secrets of the Stealth technology were in the computers at the Rivers base.
25:27in Rome, New York, headquarters of the Air Force's PED laboratories.
25:32They knew it was a hacker attack on the project, but they didn't know where it was coming from.
25:56It's a classic challenge for the good guys.
26:06Hackers are perfect spies because they hide in the shadows of cyberspace.
26:11The problem is that hackers typically come through multiple launch points,
26:17And then they kind of play hopscotch on the internet.
26:20You usually see the last IP address they come from within your network.
26:28And this will go back to some computer that they've hacked and taken over because of what they really are.
26:37It was very difficult to track down the hopscotch chain to find the true source.
26:44So, the tech-savvy individuals, in terms of the day, spoke up about hacking to find the source.
26:50Who would possibly want such data?
26:54The suspects were hostile foreign forces.
26:58However, the hackers who appeared on the radar of the most sophisticated spy technology that exists.
27:04They were boys who were at home in London.
27:08The young people who launched these attacks, they weren't from London,
27:12which is the environment they were in, live from New York,
27:15They would travel from London to South Africa, then to Mexico, and finally to the United States.
27:21The technology used by the hacker community has expanded rapidly since the Staff Bomber attacks.
27:30At the time, the Department of Defense calculated the number of intrusions into its systems.
27:37The result was extraordinary.
27:40Seven years later, new technology brings new vulnerabilities.
28:02Chris O'Farrell is a good guy who protects the systems of the American government.
28:06and sees himself as a soldier in an endless battle.
28:10There is definitely a battle between Americans and Americans.
28:14It's a battle that's always been overcome.
28:16It's like saying there's chaos in Sandro's world.
28:17The more you work, the crazier you get.
28:20Vulnerabilities are found every day.
28:23Chris is on the side of the angels, but today he will do what hackers call a War Drive.
28:32He's heading to the heart of the federal government to expose a new entry point for hackers.
28:37created by the increasing use of wireless systems.
28:40We use the same techniques, methodologies, and everything else that hackers use.
28:44Basically, to secure networks for government entities.
28:47financial institutions and other types of agencies.
28:52Like countless businesses, various government departments use wireless networks.
28:58Vulnerable hackers on the street, equipped with simple kits.
29:02What Chris calls War Drive is a kind of electronic fishing.
29:30a letter about wireless communication systems.
29:33Looking at the screen, Chris can estimate how much he will need for the job.
29:38Looking at the screen, Chris can gauge how long it will take to hack into these systems.
30:05which announce their presence on the streets of Capitol.
30:11Most aren't even protected by codes.
30:14Now, I have 20 networks on my computer.
30:18Of another 20, only 6 have encryption.
30:22Which would probably take me 20 seconds,
30:24another 14 out of 20 networks,
30:25to reconfigure my security card and access these networks.
30:28They can spend millions of dollars on security.
30:36Having firewalls, having all kinds of internal policies,
30:39but only one person with an access point to an access point can enter.
30:42And who is where I am now, I'm in my car,
30:45You can now open this to a set of announcements.
30:47In about 20 seconds.
30:48But hackers don't need to be physically close to engage in information warfare.
31:18After a Chinese fighter jet collided with an American spy plane, Chinese hackers waged war against the United States.
31:48After the first wave of attacks, a new type of virus was released, apparently launched in China.
31:59It attacked systems made in American English, and was called Code Red.
32:13Code Red mimicked the actions of a hacker and used compromised systems.
32:18Code Red would activate when the computer clock showed certain dates and times.
32:48The invasion originated from a Chinese university.
33:16The White House changed the number in the website address, but the effect of Code Red was lasting.
33:30While cyberterrorism is an unavoidable threat to the future,
33:59The reality is that hackers who break into important websites have less alarming motivations.
34:29This recognition motivated the teenager, who was labeled one of the most notorious hackers.
34:38Online, it's known as Code Fire.
34:42But the real name is a secret.
34:48His face isn't famous yet, but his accomplishments have made him a celebrity.
34:53Code Fire became notorious after hacking into the system of a major telephone company.
35:23And he would transfer calls from his cell phone so that others would pay the bill.
35:30Analyze the behavior of hackers like Code Fire.
35:59This is the work of Eric Raymond.
36:03He calls himself an anthropologist of hackers.
36:06And it reveals a side of their culture and philosophy, which is part of the battle for cyber rights, and how they are viewed by the rest of the world.
36:17Eric is part of the hacker tradition.
36:39They have a clear code of ethics, they exchange programs, and they resist the dominance of large commercial software companies.
36:54Hackers like Eric really do break in uninvited.
36:59He studies the subjects as if they were part of a large tribe.
37:24But he doesn't like what they do.
37:29He tries to dishonor people like Code Fire and Captain Zap, who defame hackers.
37:36Furthermore, instead of hackers, he wants them to be called crackers.
37:40Crackers are people who break into computer systems and commit vandalism and computer crime.
37:46They are generally neither very white nor very skilled.
37:50You can distinguish them from hackers by the fact that they typically use pseudonyms or handles to describe their identities.
37:57Hackers don't do that.
37:59But the real difference is more fundamental.
38:02Hackers do things.
38:04Crackers only know how to break themselves.
38:05The Hacker's Bible, written by Eric, is a New Hackers Dictionary.
38:12It exposes the ethics he wants the world to understand.
38:16But his struggle to give the bandits another name led to a war of words with another dictionary.
38:25In Oxford, England, the use of the term "hacker" is being reviewed for the next edition of the oldest and largest dictionary of the English language.
38:36The Oxford English Dictionary.
38:38As part of his research, Nick Shearing consults Eric's dictionary, but disagrees with him on the definition of hacker.
38:59But that's wrong, according to Eric, who decided to fight for his definition.
39:04Hacers build software, they maintain the internet.
39:11Hacers are the culture that invented the World Wide Web, as we know it today.
39:15We make stuff, and we improve the world.
39:19It's very hard to make people choose a certain word to describe a phenomenon when there is already a word existing,
39:26which, unfortunately, for people who object to hacker being used, is hacker.
39:30A culture of internet hackers owns the word hacker, and a lot of the slang that's associated with it,
39:38and the fact that people outside that culture use it incorrectly is not a warrant to change its meaning.
39:44Despite Eric's mission, the actions of the criminals weigh heavily on all hackers.
39:49Behind the war of terms, there is a serious struggle.
40:10Eric fears for the future of cyber rights if we don't know the difference between hackers and cybercriminals, the crackers.
40:20The fear of lawmakers taking over cyberspace has made hacker John Perry Barlow's life very different.
40:47He wrote the songs for the Grateful Dead and founded the Electronic Frontier Foundation, which lobbies for cyber rights.
40:58What we are dealing with is the battle between the future and the past, between the powers that were and the powers that are yet to come.
41:09For him, the internet is a game-changer in history, just as the industrial revolution gave us the Brooklyn Bridge.
41:17And it sums up this new world in its declaration of independence from cyberspace.
41:25Governors of the industrial world, I come from cyberspace, the new home of my home.
41:35In the name of the future, I asked you from the past to stop us from leaving.
41:40You are not welcome here.
41:43You do not have sovereignty over where we are located.
41:47You don't know us, nor do you know our world.
41:50This philosophy put John in a different fight.
42:15John and his foundation support one of the best-known and most controversial forms of piracy.
42:34The famous one is from stolen films.
42:37The target is Hollywood.
42:39The most anticipated movie of 2002 was Star Wars, Episode II.
42:56When the clock struck midnight on May 16, the ticket booths opened for those who had waited in line for two nights.
43:0327 hours.
43:046 PM.
43:05However, a week earlier, the hackers had already seen the film, which was already available on the internet.
43:17A week before the world premiere, in that chat, the hackers were swapping the movie.
43:25Once they had obtained the stolen film, the hackers distributed it by hacking into the channels that feed the internet.
43:31This isn't just piracy; it's about hacking, because convenience is the main goal.
43:40Pirates need to use what are called the big kites,
43:43Multi-gigabit internet connections are the foundation for transferring data.
43:49I heard a big ISP called internet video because their computers are so fast.
43:56It's so easy to hack, it's the best place to buy movies.
44:03To help in the fight, Hollywood hired a former FBI agent.
44:11Ken Jacobson has a difficult role.
44:14Almost all films released by major studios end up on the internet through hackers.
44:19While the heroes help in the fight on the big screen, the villains of cyberspace fight their own battle.
44:45It's definitely a battle of hackers.
44:48Hackers are the closest thing we have to the troops.
44:53Outside of the lawyers that the EFF employs to take the industry and the industry of the industry and the industry of the industry.
45:01Hackers are the people who are literally going there and breaking into cyberspace codes.
45:07and making available what needs to be accessible to everyone.
45:13This threatens me, because these are people who never, ever, ever consider
45:18go to a cyber-pairs radio station, or another cyber-pairs radio station, or a cyber-pairs radio station
45:24and go out with a CD, DVD, DVD or VCR.
45:30But actually, we're going to go online and get the exact same product.
45:34and decide that it should be free and that it shouldn't be a cyberspace that has occurred.
45:38The struggle continues between the Electronic Frontier Foundation and the studios.
45:46But in a city that has produced so many heroic villains, the modern gang of delinquents seems to be the one having the last laugh.
45:54With the first generation of hackers now in their 40s, the struggle between the angels and the bandits has enabled many to make a living from their skills.
46:14Captain Zap decided to win by switching sides.
46:17The hacker formerly known as Captain Zap is now Ian Murphy, CEO.
46:28The embodiment of Captain Zap is the business perspective.
46:33I'm a hacker. You can, for example, hack life for the most part.
46:36I will create a civilization of the mind in cyberspace.
46:44And let it be more humane and kinder than the world that governments have built before.
46:53He's a hacker, man.
46:56I'm not saying I'd never hacked before, but I can understand life all at once.
47:02If you take a good, clear exam, for your own safety, it's a Black Hat exam.
47:10I mean, in almost all cases.
47:13You still understand the fun.
47:16Some people enjoy resting.
47:18Some like to rest. Some like to rest.
47:20Some like to rest. Some like to rest.
47:22Some like to rest.
47:22But, for example, hackers, it's a rush.
47:26I'm sure they have a relaxing effect.
47:27I think it's a good thing to do.
47:29No.
47:30I want my children to do this.
47:31No.
47:33But can I understand this?
47:36Yes, I think I can.
47:37Your mind is racing at 100,000 miles per hour behind the scenes.
47:39You're thinking, I could be doing this, I could be doing this.
47:42I could explain this, I could be doing this, I could be doing this.
47:45You can't just sit here and not think about it.
47:48It's always there in the back of your mind.
47:49You just need to do this.
47:52The fight between bandits and angels continues.
47:57But hackers on both sides know they're fighting.
48:01against those who speak the same language.
48:04He uses the same weapons and plays the same tricks.
48:07That is great.
48:10It's a wonderful thing to do.
48:11And it's like permanent employment, too.
48:14We're going to drag ourselves all over the planet.
48:23so that no one can steer our thoughts away.
48:27It's a wonderful thing that no one can tamper with our thoughts.
48:30What is that?
49:00What is that?
Seja a primeira pessoa a comentar