1 00:00:04,440 --> 00:00:10,400 Speaker 1: Welcome to tech Stuff, a production from iHeartRadio. 2 00:00:11,800 --> 00:00:13,600 Speaker 2: Hey there, and welcome to tech Stuff. 3 00:00:13,680 --> 00:00:16,720 Speaker 1: I'm your host Jonathan Strickland. I'm an executive producer with 4 00:00:16,800 --> 00:00:19,599 Speaker 1: iHeartRadio and how the tech are you? It is time 5 00:00:19,640 --> 00:00:23,239 Speaker 1: for a tech Stuff classic episode, and the episode we're 6 00:00:23,239 --> 00:00:26,560 Speaker 1: about to listen to, the worst hacking scenes from Hollywood, 7 00:00:26,920 --> 00:00:31,400 Speaker 1: is technically part one of a two parter. Shannon Morse 8 00:00:31,720 --> 00:00:35,640 Speaker 1: joined me to talk about hacking scenes in Hollywood. 9 00:00:36,000 --> 00:00:36,960 Speaker 2: Shannon is. 10 00:00:38,440 --> 00:00:43,280 Speaker 1: She's a hacker. She's been doing the hacking routine for 11 00:00:43,320 --> 00:00:47,800 Speaker 1: several years now. She's been covering hacking for years. She's 12 00:00:47,960 --> 00:00:51,720 Speaker 1: very knowledgeable on the subject and was a great partner 13 00:00:51,800 --> 00:00:55,960 Speaker 1: to have to talk about how Hollywood doesn't always get 14 00:00:56,080 --> 00:01:00,480 Speaker 1: hacking quite right. Sit back and enjoy this episode originally 15 00:01:00,520 --> 00:01:05,440 Speaker 1: published September seventh, twenty sixteen. Guys, we've had Shannon on 16 00:01:05,480 --> 00:01:08,640 Speaker 1: the show a few times, and today it's a real treat, really, 17 00:01:08,880 --> 00:01:13,760 Speaker 1: because we're gonna talk about some examples of hacking in 18 00:01:13,800 --> 00:01:18,160 Speaker 1: pop culture and some of the ones that are incredibly awful, 19 00:01:18,480 --> 00:01:23,920 Speaker 1: just terrible inaccurate ways of showing how hacking works, as 20 00:01:24,000 --> 00:01:26,240 Speaker 1: well as talk about something get it more right than 21 00:01:26,360 --> 00:01:29,000 Speaker 1: not right, which is kind of awesome, and I mean 22 00:01:29,319 --> 00:01:33,959 Speaker 1: the start off, we have to admit the real world 23 00:01:33,959 --> 00:01:38,120 Speaker 1: of hacking. While the results can be quite dramatic and 24 00:01:38,440 --> 00:01:44,400 Speaker 1: have a huge effect, the process itself is not always cinematic. 25 00:01:45,160 --> 00:01:46,319 Speaker 3: Nope, it is not. 26 00:01:47,280 --> 00:01:49,880 Speaker 4: Yeah, it's actually pretty boring. There's just a bunch of 27 00:01:49,880 --> 00:01:51,880 Speaker 4: text on the screen and that's about. 28 00:01:51,600 --> 00:01:55,200 Speaker 2: It, right, I mean it's coding, right. 29 00:01:55,520 --> 00:01:56,280 Speaker 3: Yeah, exactly. 30 00:01:56,320 --> 00:01:58,680 Speaker 4: There's a lot of coding involved, a lot of Python 31 00:01:58,800 --> 00:02:01,920 Speaker 4: and BASS scripts and things of that nature, and a 32 00:02:01,960 --> 00:02:04,960 Speaker 4: lot of terminal work. So you don't see very much 33 00:02:05,040 --> 00:02:09,080 Speaker 4: gooey or graphical user interface usage whenever you're running. 34 00:02:08,880 --> 00:02:11,720 Speaker 3: Some kind of hack implementation. A lot of times it's 35 00:02:11,919 --> 00:02:12,960 Speaker 3: just terminal. 36 00:02:13,200 --> 00:02:17,720 Speaker 1: Right, And you know, I understand the need to stretch 37 00:02:18,040 --> 00:02:21,320 Speaker 1: the truth when you're trying to create a really thrilling 38 00:02:21,760 --> 00:02:24,320 Speaker 1: movie or TV show and you want to have something 39 00:02:24,400 --> 00:02:27,520 Speaker 1: interesting to look at, having your characters look at lines 40 00:02:27,560 --> 00:02:32,239 Speaker 1: of code and going through a process of trying to 41 00:02:33,760 --> 00:02:38,800 Speaker 1: create some sort of exploit for a vulnerability that doesn't 42 00:02:38,840 --> 00:02:41,480 Speaker 1: really hold a lot of people like on the edge 43 00:02:41,520 --> 00:02:43,840 Speaker 1: of their seat. So I get it, but it is 44 00:02:43,960 --> 00:02:47,480 Speaker 1: kind of a problem. And I should also mention we're 45 00:02:47,560 --> 00:02:50,800 Speaker 1: using the word hacker today a lot. But of course, 46 00:02:51,240 --> 00:02:53,760 Speaker 1: as I try to mention every time I talk about hacking, 47 00:02:54,520 --> 00:02:58,440 Speaker 1: hacking is a very broad term, and it doesn't necessarily 48 00:02:58,520 --> 00:03:01,680 Speaker 1: mean that you are doing anything illegal, and it certainly 49 00:03:01,760 --> 00:03:02,440 Speaker 1: doesn't even. 50 00:03:02,240 --> 00:03:04,600 Speaker 2: Mean that you're necessarily working on a computer. 51 00:03:04,760 --> 00:03:07,720 Speaker 1: You could be doing some hardware hacks that aren't related 52 00:03:07,760 --> 00:03:08,520 Speaker 1: to software. 53 00:03:09,880 --> 00:03:11,160 Speaker 2: That's important to remember. 54 00:03:11,200 --> 00:03:13,720 Speaker 1: But as far as Hollywood is concerned, there's really only 55 00:03:13,720 --> 00:03:17,240 Speaker 1: one kind of hacking, and that involves trying to break 56 00:03:17,280 --> 00:03:19,320 Speaker 1: into a place that you're not supposed to be in. 57 00:03:21,120 --> 00:03:24,560 Speaker 4: Of course, because those are the most interesting people, they're 58 00:03:24,600 --> 00:03:27,280 Speaker 4: the scary ones, and people are afraid of what they 59 00:03:27,320 --> 00:03:28,720 Speaker 4: don't understand. 60 00:03:28,720 --> 00:03:32,120 Speaker 1: Right, And I imagine that a lot of screenwriters are 61 00:03:32,160 --> 00:03:36,640 Speaker 1: particularly scared of hackers because it's one it's clear that 62 00:03:36,680 --> 00:03:40,520 Speaker 1: they have no understanding whatsoever about it. And two, I 63 00:03:40,560 --> 00:03:45,240 Speaker 1: mean we've seen, especially recently, we've seen some very big 64 00:03:45,280 --> 00:03:52,320 Speaker 1: stories about the entertainment industry running away from hackers attacking. 65 00:03:52,360 --> 00:03:55,480 Speaker 1: And whether it's a hacker who's actually gaining access to 66 00:03:55,520 --> 00:03:57,920 Speaker 1: a system, or it was someone who was on the 67 00:03:57,920 --> 00:04:01,360 Speaker 1: inside who just managed to exploit access in the first place, 68 00:04:01,360 --> 00:04:04,040 Speaker 1: which I would argue really isn't a hack, it's just 69 00:04:04,120 --> 00:04:08,240 Speaker 1: kind of industrial sabotage at that point. But the Sony 70 00:04:08,320 --> 00:04:10,520 Speaker 1: story would be the big example, right. 71 00:04:10,760 --> 00:04:13,240 Speaker 4: Yeah, the Sony story, I think put a lot of 72 00:04:13,240 --> 00:04:16,719 Speaker 4: fear in the entertainment industry, and I feel like the 73 00:04:16,880 --> 00:04:20,520 Speaker 4: entertainment industry as a whole, with very few exceptions, are 74 00:04:21,240 --> 00:04:24,360 Speaker 4: one of the genres that is the farthest behind when 75 00:04:24,360 --> 00:04:28,200 Speaker 4: it comes to their own security and privacy. They're the 76 00:04:28,279 --> 00:04:30,160 Speaker 4: farthest behind when it comes to a lot of things, 77 00:04:30,200 --> 00:04:33,680 Speaker 4: including how they treat their women. But I think that 78 00:04:33,720 --> 00:04:36,600 Speaker 4: it's something that they really need to start focusing on 79 00:04:36,720 --> 00:04:41,000 Speaker 4: and start understanding, not only for their own security, for 80 00:04:41,040 --> 00:04:44,159 Speaker 4: their employees, for the actors and actresses that work there 81 00:04:44,680 --> 00:04:47,320 Speaker 4: for these different companies, but also because they need to 82 00:04:47,400 --> 00:04:50,960 Speaker 4: understand how to actually portray it so that more people 83 00:04:51,160 --> 00:04:53,720 Speaker 4: understand it as a whole and aren't so afraid. 84 00:04:54,120 --> 00:04:57,719 Speaker 1: Right, And so we're going to dive into a discussion 85 00:04:57,760 --> 00:05:03,960 Speaker 1: of some of the more entertaining and often wildly inaccurate 86 00:05:05,160 --> 00:05:07,320 Speaker 1: versions of hacking in film and TV. 87 00:05:07,920 --> 00:05:09,200 Speaker 2: I should also give a shout out. 88 00:05:09,240 --> 00:05:11,800 Speaker 1: A lot of people on my Twitter feed suggested that 89 00:05:11,839 --> 00:05:16,080 Speaker 1: I check out a subreddit. The subreddit is it's a 90 00:05:16,200 --> 00:05:21,280 Speaker 1: Unix system, which is a reference to Jurassic Park. If 91 00:05:21,279 --> 00:05:23,840 Speaker 1: you remember, the young lady runs up to a computer, 92 00:05:24,000 --> 00:05:25,640 Speaker 1: she takes one look at it, she says. 93 00:05:25,680 --> 00:05:29,640 Speaker 2: It's a Unix system. I know this, And then she's. 94 00:05:29,440 --> 00:05:34,160 Speaker 1: Immediately looking at a graphic user interface and identifying one 95 00:05:34,200 --> 00:05:36,760 Speaker 1: block out of like fifty blocks that are on the screen, 96 00:05:36,800 --> 00:05:40,159 Speaker 1: and immediately makes the conclusion that all the files for 97 00:05:40,240 --> 00:05:44,120 Speaker 1: the entire island are accessible from that one terminal. I 98 00:05:44,160 --> 00:05:47,960 Speaker 1: don't know how she knows. That's amazing. It's amazing that 99 00:05:48,000 --> 00:05:51,640 Speaker 1: you automatically know that everything available on the island is 100 00:05:51,680 --> 00:05:52,719 Speaker 1: on that one drive. 101 00:05:53,360 --> 00:05:55,120 Speaker 2: Somehow, I feel like. 102 00:05:55,120 --> 00:05:57,080 Speaker 4: The only way you would know that is if you 103 00:05:57,160 --> 00:06:01,560 Speaker 4: were the information security professional that is working for that company. 104 00:06:02,440 --> 00:06:06,200 Speaker 1: Yeah, yeah, No, she seemed like she was a little 105 00:06:06,240 --> 00:06:09,320 Speaker 1: too young to be a full time employee at that point. 106 00:06:09,720 --> 00:06:13,560 Speaker 2: Exactly so Jurassic Park. While it lends the. 107 00:06:15,279 --> 00:06:18,599 Speaker 1: Quote it's a Unix system to the subreddit, I didn't 108 00:06:18,600 --> 00:06:21,400 Speaker 1: really include it on this list. There is one other 109 00:06:22,320 --> 00:06:25,880 Speaker 1: incredibly famous example that I've talked about on a previous 110 00:06:25,920 --> 00:06:26,640 Speaker 1: episode of Tech. 111 00:06:26,480 --> 00:06:28,640 Speaker 2: Stuff that we will hit. But first I'm going to 112 00:06:28,640 --> 00:06:30,880 Speaker 2: talk about a movie. I haven't actually seen this movie 113 00:06:30,920 --> 00:06:34,680 Speaker 2: but I have seen the sequences that involve hacking. That 114 00:06:34,760 --> 00:06:35,360 Speaker 2: movie is. 115 00:06:35,279 --> 00:06:38,760 Speaker 1: The Core, And in the first sequence I wanted to 116 00:06:38,760 --> 00:06:42,040 Speaker 1: talk about, there's a character whose handle is RAT, which 117 00:06:42,120 --> 00:06:45,279 Speaker 1: could be you know, like remote access trojan or remote 118 00:06:45,320 --> 00:06:49,240 Speaker 1: access terminal, depending upon what acronem you want to look at. 119 00:06:49,360 --> 00:06:55,200 Speaker 1: Often one that is associated with hacking, and Rat is 120 00:06:55,760 --> 00:06:58,279 Speaker 1: caught by the FBI. The sequence in which he's caught, 121 00:06:58,320 --> 00:07:02,880 Speaker 1: he's trying desperately to erase all traces of his activities. 122 00:07:03,360 --> 00:07:05,600 Speaker 1: He's got tons and tons of computers, and he's using 123 00:07:05,680 --> 00:07:09,720 Speaker 1: massive magnets to try and wipe drives, and he's throwing 124 00:07:11,400 --> 00:07:15,480 Speaker 1: CD ROM discs into a microwave and turning it on high, 125 00:07:15,800 --> 00:07:17,480 Speaker 1: you know, the typical stuff. 126 00:07:17,240 --> 00:07:18,760 Speaker 2: We do when the Feds come knocking. 127 00:07:20,280 --> 00:07:23,240 Speaker 1: But but my favorite bit about this little sequence is 128 00:07:23,600 --> 00:07:27,680 Speaker 1: he then is taken to an interrogation and as he's 129 00:07:27,720 --> 00:07:31,480 Speaker 1: being interrogated, he just casually reaches over and grabs a 130 00:07:31,520 --> 00:07:33,000 Speaker 1: guy's cell phone out of his. 131 00:07:33,000 --> 00:07:35,960 Speaker 2: Little holster or his pocket or whatever. But the guy's 132 00:07:36,120 --> 00:07:37,880 Speaker 2: it's just a cell phone. What can he do with that? 133 00:07:38,520 --> 00:07:41,200 Speaker 1: Well, Shannon, you know what people can do with so 134 00:07:41,280 --> 00:07:43,400 Speaker 1: I mean, if you have physical access to a cell phone. 135 00:07:43,480 --> 00:07:47,600 Speaker 1: It's game over. But oh yeah, but what this guy does. 136 00:07:47,640 --> 00:07:51,000 Speaker 1: He doesn't do something to get hold of the guy's contacts. 137 00:07:51,040 --> 00:07:54,360 Speaker 1: He doesn't and this is also pre smartphone. It's really 138 00:07:54,360 --> 00:07:57,640 Speaker 1: a cell phone. He doesn't do anything like that. What 139 00:07:57,680 --> 00:08:01,680 Speaker 1: he does is he takes a little a little chewing 140 00:08:01,680 --> 00:08:05,200 Speaker 1: gum rapper. He dials a couple of numbers on the phone, 141 00:08:05,640 --> 00:08:08,240 Speaker 1: and then he uses the chewing gum rapper to make 142 00:08:08,360 --> 00:08:13,120 Speaker 1: a weird little whistling, humming noise and then casually closes 143 00:08:13,160 --> 00:08:15,360 Speaker 1: the phone, tosses it back to the guy and says 144 00:08:15,880 --> 00:08:18,720 Speaker 1: that phone's got free long distance on it forever. 145 00:08:21,480 --> 00:08:22,640 Speaker 2: That's uh. 146 00:08:22,760 --> 00:08:23,840 Speaker 3: I love this one. 147 00:08:23,840 --> 00:08:27,120 Speaker 1: Hundred accurate to real life. That's exactly how it works. 148 00:08:27,520 --> 00:08:28,240 Speaker 3: Yeah, totally. 149 00:08:28,600 --> 00:08:32,480 Speaker 4: So I'm pretty sure that this is kind of a 150 00:08:32,720 --> 00:08:35,680 Speaker 4: comparison to what people would actually do, which was called 151 00:08:35,800 --> 00:08:40,040 Speaker 4: phone freaking. And this was like before hacking became a 152 00:08:40,160 --> 00:08:44,320 Speaker 4: really big popular norm that you would see in like 153 00:08:44,440 --> 00:08:45,959 Speaker 4: online media that you see. 154 00:08:46,200 --> 00:08:46,840 Speaker 3: In this day. 155 00:08:47,200 --> 00:08:50,040 Speaker 4: Yeah, so back in the day, this guy named Captain Crunch. 156 00:08:50,720 --> 00:08:54,240 Speaker 4: He got his online screen name from opening up a 157 00:08:54,320 --> 00:08:57,679 Speaker 4: Captain Crunch cereal box and getting out a little I 158 00:08:57,720 --> 00:09:00,000 Speaker 4: believe it was a kazoo or something similar to that, 159 00:09:00,440 --> 00:09:02,680 Speaker 4: like a w and if he was able to recreate 160 00:09:02,760 --> 00:09:05,319 Speaker 4: or reproduce the kind of tone that you could put 161 00:09:05,360 --> 00:09:07,719 Speaker 4: into a payphone to allow you to make free long 162 00:09:07,760 --> 00:09:13,080 Speaker 4: distance calls. So they're using that real life scenario to 163 00:09:13,120 --> 00:09:16,200 Speaker 4: their advantage in this movie The Core and making it 164 00:09:16,200 --> 00:09:17,880 Speaker 4: seem like you can do the same thing with. 165 00:09:17,840 --> 00:09:18,520 Speaker 3: A gum wrapper. 166 00:09:18,880 --> 00:09:21,360 Speaker 4: Now, personally, I don't believe that you can do the 167 00:09:21,360 --> 00:09:23,800 Speaker 4: same thing with a gum wrapper. That seems a little 168 00:09:23,840 --> 00:09:26,480 Speaker 4: bit odd. I know that you can make noises with 169 00:09:26,520 --> 00:09:28,360 Speaker 4: things like that. You can also do the same thing 170 00:09:28,400 --> 00:09:29,960 Speaker 4: with the piece of grass if you want to. 171 00:09:30,160 --> 00:09:32,080 Speaker 2: Yeah, yeah you can. 172 00:09:32,160 --> 00:09:35,440 Speaker 1: You can entertain yourself in like a third grade kind 173 00:09:35,440 --> 00:09:37,440 Speaker 1: of way for hours at a time. 174 00:09:37,559 --> 00:09:41,439 Speaker 2: Yes, yeah. Phone freaking really worked on landlines. 175 00:09:41,520 --> 00:09:45,880 Speaker 1: They worked when the phone system wasn't fully digital yet. 176 00:09:45,960 --> 00:09:48,760 Speaker 1: It was a much different system, I mean, and there's 177 00:09:48,800 --> 00:09:52,960 Speaker 1: some very famous people who got their start as phone freaks. 178 00:09:53,000 --> 00:09:56,360 Speaker 1: I mean, Steve Wozniak was in that world. The Wall 179 00:09:56,520 --> 00:09:59,160 Speaker 1: the Great Wahs was one of the freakers of back 180 00:09:59,200 --> 00:10:03,440 Speaker 1: in the seventies. But it was sort of the same 181 00:10:03,440 --> 00:10:05,320 Speaker 1: thing that you would talk about hackers today. They weren't 182 00:10:05,360 --> 00:10:08,920 Speaker 1: necessarily trying to gain the system. 183 00:10:09,160 --> 00:10:11,440 Speaker 2: They were trying to figure out how does this work? 184 00:10:12,040 --> 00:10:14,800 Speaker 4: Right, They were just messing with things. They were trying 185 00:10:14,840 --> 00:10:17,839 Speaker 4: to reverse engineer them and figure out how they work 186 00:10:17,880 --> 00:10:20,600 Speaker 4: and put them back together and let them let these 187 00:10:21,000 --> 00:10:24,400 Speaker 4: different pieces of technology do things that they weren't necessarily 188 00:10:24,480 --> 00:10:26,520 Speaker 4: supposed to do. Yeah, and that's what I love so 189 00:10:26,600 --> 00:10:27,480 Speaker 4: much about hacking. 190 00:10:28,240 --> 00:10:29,040 Speaker 3: But then you bring it. 191 00:10:28,960 --> 00:10:31,280 Speaker 4: To Hollywood and they're like, oh, these are scary people. 192 00:10:31,360 --> 00:10:33,200 Speaker 4: They're all going to end up in the FBI's hands. 193 00:10:33,240 --> 00:10:35,319 Speaker 4: And that's not necessarily true, right. 194 00:10:35,160 --> 00:10:38,680 Speaker 1: And to take something that worked on landlines on a 195 00:10:38,679 --> 00:10:42,560 Speaker 1: payphone basis using a whistle that had I think he 196 00:10:42,640 --> 00:10:45,120 Speaker 1: even modified it slightly so it would make exactly the 197 00:10:45,120 --> 00:10:48,120 Speaker 1: tone he needed to replicate the tones that the phone 198 00:10:48,160 --> 00:10:50,319 Speaker 1: company was using in order to allow for this kind 199 00:10:50,320 --> 00:10:52,920 Speaker 1: of thing to happen. Yeah, it would never work on 200 00:10:52,960 --> 00:10:54,800 Speaker 1: the cell phone range at all. 201 00:10:55,400 --> 00:10:58,760 Speaker 2: And also just what a weird line. 202 00:10:58,320 --> 00:11:01,800 Speaker 1: Like this phone's got free long distance on it forever, 203 00:11:01,960 --> 00:11:05,600 Speaker 1: and you think there's gotta be multiple ways a phone 204 00:11:05,640 --> 00:11:09,480 Speaker 1: company would say, Hey, something weird's going on with this 205 00:11:09,600 --> 00:11:15,480 Speaker 1: one line. But uh, but the core the Corps also 206 00:11:15,559 --> 00:11:18,360 Speaker 1: has another great scene in it with that same hacker, 207 00:11:18,440 --> 00:11:22,000 Speaker 1: same guy rat h And when I see him, I 208 00:11:22,040 --> 00:11:25,880 Speaker 1: always think, uh, he's he's the he's a character who 209 00:11:25,920 --> 00:11:27,840 Speaker 1: also or he's an actor who also play shows up 210 00:11:27,840 --> 00:11:31,280 Speaker 1: as a character on the show Supernatural as a weird, 211 00:11:31,880 --> 00:11:36,000 Speaker 1: reedy looking, uh demon killer guy that you would just 212 00:11:36,080 --> 00:11:40,040 Speaker 1: expect to get completely obliterated the first time he shows up, 213 00:11:40,040 --> 00:11:42,360 Speaker 1: but he turns out to be more capable than you 214 00:11:42,360 --> 00:11:45,880 Speaker 1: would consider based upon his appearance anyway. 215 00:11:46,760 --> 00:11:50,720 Speaker 2: He walks into a cyber cafe. He's got a. 216 00:11:50,600 --> 00:11:54,640 Speaker 1: CD rom I think it even says Kung Fu on it, 217 00:11:54,679 --> 00:11:57,679 Speaker 1: if I'm not mistaken, and he puts it did puts 218 00:11:57,679 --> 00:12:02,400 Speaker 1: it into a cyber cafe computer, and after like leaning 219 00:12:02,440 --> 00:12:04,400 Speaker 1: back and putting his hand up to his face for 220 00:12:04,440 --> 00:12:11,360 Speaker 1: about five seconds, it ends up completely taking over not 221 00:12:11,480 --> 00:12:15,640 Speaker 1: just his computer, but the entire local network, and all 222 00:12:15,720 --> 00:12:18,520 Speaker 1: of the screens in the cyber cafe pop up with 223 00:12:18,640 --> 00:12:22,240 Speaker 1: this image of his rat network. 224 00:12:22,200 --> 00:12:24,520 Speaker 2: Where he has taken over all the computers. 225 00:12:25,040 --> 00:12:28,000 Speaker 1: I don't even know exactly why he's trying to take 226 00:12:28,040 --> 00:12:30,440 Speaker 1: over all the computers, apart from just seeing lots and 227 00:12:30,480 --> 00:12:34,600 Speaker 1: lots of what appears to be news footage which spoiler 228 00:12:34,640 --> 00:12:37,480 Speaker 1: alert there's a thing we can use to get that 229 00:12:37,520 --> 00:12:38,160 Speaker 1: news footage. 230 00:12:38,200 --> 00:12:41,600 Speaker 2: It's called a TV. You can use that without having 231 00:12:41,640 --> 00:12:42,640 Speaker 2: to hack any systems. 232 00:12:43,160 --> 00:12:47,439 Speaker 1: But it's just a weird little moment where he's taken 233 00:12:47,480 --> 00:12:52,320 Speaker 1: over all the computers in the cyber cafe. Now, let's 234 00:12:52,320 --> 00:12:54,400 Speaker 1: go ahead and make some things clear, Shannon. I know 235 00:12:54,480 --> 00:13:01,199 Speaker 1: that you've addressed this on multiple episodes and ways of 236 00:13:01,400 --> 00:13:04,880 Speaker 1: reaching out to your audience. There are certain things you 237 00:13:04,880 --> 00:13:07,960 Speaker 1: should be concerned about when you go and log into 238 00:13:08,120 --> 00:13:12,080 Speaker 1: any kind of local area network, any kind of open 239 00:13:12,160 --> 00:13:14,920 Speaker 1: Wi Fi. If you're going to a coffee shop and 240 00:13:14,960 --> 00:13:17,400 Speaker 1: you're using that kind of Wi Fi, you need to 241 00:13:17,440 --> 00:13:18,959 Speaker 1: be more. 242 00:13:20,320 --> 00:13:22,680 Speaker 2: Aware of potential security problems. 243 00:13:23,840 --> 00:13:28,559 Speaker 4: Yes, absolutely, it's very easy if you're on your local 244 00:13:28,960 --> 00:13:32,400 Speaker 4: coffee shops network or your local hotels network for anybody 245 00:13:32,400 --> 00:13:36,280 Speaker 4: to snoop on what you're doing. You may be using HTTPS, 246 00:13:36,320 --> 00:13:38,640 Speaker 4: but that's not going to keep somebody from understanding what 247 00:13:38,720 --> 00:13:41,960 Speaker 4: sites you are visiting. But even though that data may 248 00:13:42,000 --> 00:13:45,400 Speaker 4: be encrypted, however, they're still collecting. 249 00:13:44,920 --> 00:13:46,080 Speaker 3: That encrypted information. 250 00:13:46,400 --> 00:13:50,040 Speaker 4: And it really just depends on how a website that 251 00:13:50,080 --> 00:13:52,720 Speaker 4: you're visiting is encrypting that information, whether or not they 252 00:13:52,760 --> 00:13:55,920 Speaker 4: would be able to decrypt it after a specific amount 253 00:13:55,960 --> 00:13:56,240 Speaker 4: of time. 254 00:13:57,000 --> 00:13:58,200 Speaker 3: So I always tell. 255 00:13:58,080 --> 00:14:02,000 Speaker 4: People if they're going to use a hotel Wi Fi 256 00:14:02,120 --> 00:14:05,160 Speaker 4: or a coffee shop WiFi, to use a VPN, use 257 00:14:05,200 --> 00:14:07,760 Speaker 4: some way to tunnel your traffic from point A to 258 00:14:07,800 --> 00:14:10,559 Speaker 4: point B so that nobody else on that network will 259 00:14:10,559 --> 00:14:12,480 Speaker 4: be able to see what you're doing. They may see 260 00:14:12,480 --> 00:14:14,720 Speaker 4: that you're logged on, they may see your IP address, 261 00:14:14,760 --> 00:14:17,719 Speaker 4: but they won't know exactly what's going on with your 262 00:14:17,720 --> 00:14:21,360 Speaker 4: traffic while you're connected. So, and I'm pretty sure that 263 00:14:21,480 --> 00:14:27,040 Speaker 4: everybody who generally uses these Wi Fi networks that are 264 00:14:27,040 --> 00:14:31,440 Speaker 4: available for free aren't necessarily using VPNs, But it's a 265 00:14:31,600 --> 00:14:35,840 Speaker 4: huge security risk for pretty much every consumer out there 266 00:14:35,880 --> 00:14:38,400 Speaker 4: that's using these Wi Fi networks. 267 00:14:38,040 --> 00:14:40,640 Speaker 1: Right, And whereas in the core, you know we were talking, 268 00:14:40,680 --> 00:14:44,440 Speaker 1: it's really hardwired computers that are part of the cyber cafe. 269 00:14:44,480 --> 00:14:46,200 Speaker 1: You just sit down at a terminal and log in 270 00:14:46,280 --> 00:14:48,360 Speaker 1: so that you have access to everything on that machine. 271 00:14:48,640 --> 00:14:51,680 Speaker 1: That's scary too. I mean, it's kind of like using 272 00:14:51,680 --> 00:14:54,280 Speaker 1: a computer at the library. You want to be very 273 00:14:54,320 --> 00:14:56,960 Speaker 1: careful about the kinds of activities you do on that 274 00:14:57,040 --> 00:15:01,240 Speaker 1: machine because it's not really you, and you don't really 275 00:15:01,720 --> 00:15:03,680 Speaker 1: you know, and you don't want to go so far 276 00:15:03,840 --> 00:15:07,000 Speaker 1: to cover your tracks that you're actually causing problems for 277 00:15:07,080 --> 00:15:10,440 Speaker 1: the real purpose of that machine. Still not quite sure 278 00:15:10,480 --> 00:15:11,800 Speaker 1: what he was trying to do. It was like he 279 00:15:11,840 --> 00:15:14,920 Speaker 1: was setting up his own little botnet. Also, if you 280 00:15:15,000 --> 00:15:17,560 Speaker 1: are setting up a botnet, probably a bad idea to 281 00:15:17,600 --> 00:15:20,000 Speaker 1: have a graphic pop up on everyone's screen saying, hey, 282 00:15:20,040 --> 00:15:21,360 Speaker 1: your computer's mine now. 283 00:15:22,080 --> 00:15:27,000 Speaker 4: Yeah, so it's In today's age, it is very popular 284 00:15:27,000 --> 00:15:33,520 Speaker 4: for people to use ransomware, which will basically announces its 285 00:15:33,640 --> 00:15:37,080 Speaker 4: availability on your computer. Yeah, it'll announce its presence on 286 00:15:37,120 --> 00:15:40,360 Speaker 4: your machine to let the user know, Hey, I've just 287 00:15:40,440 --> 00:15:43,680 Speaker 4: encrypted all the information, all the photos, all the documents 288 00:15:43,720 --> 00:15:45,720 Speaker 4: that is on your computer. Now you have to pay 289 00:15:45,760 --> 00:15:48,520 Speaker 4: me like one bitcoin to get your data back, and 290 00:15:48,520 --> 00:15:50,320 Speaker 4: then you pay that bitcoin and you may or may 291 00:15:50,320 --> 00:15:52,960 Speaker 4: not get your data back. So, you know, ransomware it's 292 00:15:52,960 --> 00:15:56,040 Speaker 4: a big thing. But in the case of this one, 293 00:15:56,120 --> 00:15:59,280 Speaker 4: in the case of rat yes, you can install like 294 00:15:59,440 --> 00:16:01,240 Speaker 4: malwares something like that on a CD. 295 00:16:01,400 --> 00:16:02,480 Speaker 3: That's entirely possible. 296 00:16:02,520 --> 00:16:05,040 Speaker 4: You can put pretty much anything on a CD, and 297 00:16:05,080 --> 00:16:09,000 Speaker 4: then it looks like he's he's running this CD through 298 00:16:09,040 --> 00:16:12,960 Speaker 4: the entire network, which you can install malware through pivoting 299 00:16:13,160 --> 00:16:18,040 Speaker 4: a network's open ports or open eyps, so that you 300 00:16:18,120 --> 00:16:21,120 Speaker 4: can put the same power on several different computers. But 301 00:16:21,160 --> 00:16:24,040 Speaker 4: it's it's never a good idea to let everybody know 302 00:16:24,120 --> 00:16:27,040 Speaker 4: what the heck you're doing if you're doing something that 303 00:16:27,080 --> 00:16:29,040 Speaker 4: you shouldn't necessarily be doing. 304 00:16:28,840 --> 00:16:29,520 Speaker 3: In the first place. 305 00:16:29,920 --> 00:16:33,800 Speaker 1: Yeah, yeah, I mean again, it's there for dramatic effect. 306 00:16:34,240 --> 00:16:36,840 Speaker 1: But if you're the one person in the cyber cafe 307 00:16:36,880 --> 00:16:40,600 Speaker 1: who isn't visibly freaking out when all the computers switch over, 308 00:16:41,720 --> 00:16:44,000 Speaker 1: here's a here's a little hint, they're going to figure 309 00:16:44,000 --> 00:16:48,600 Speaker 1: out it was you, right, I mean, that's kind of like, 310 00:16:48,640 --> 00:16:51,040 Speaker 1: if you're the one guy not surprised that everything's on fire, 311 00:16:51,280 --> 00:16:52,720 Speaker 1: you probably set the fire. 312 00:16:53,200 --> 00:16:54,120 Speaker 2: I'm just saying. 313 00:16:55,080 --> 00:16:57,640 Speaker 1: Shannon and I will be back to talk more about 314 00:16:57,880 --> 00:17:10,320 Speaker 1: the worst hacking scenes from Hollywood this quick break. Our 315 00:17:10,359 --> 00:17:13,040 Speaker 1: next example comes from one of my favorite movies of 316 00:17:13,080 --> 00:17:13,760 Speaker 1: all time. 317 00:17:14,040 --> 00:17:16,359 Speaker 3: Oh my gosh, me too. I love this movie, The Net. 318 00:17:17,119 --> 00:17:22,040 Speaker 2: Yes, Oh it's so great. It's so cheesy and wonderful. 319 00:17:22,480 --> 00:17:25,200 Speaker 1: The Net also is a movie in which a character 320 00:17:25,240 --> 00:17:29,639 Speaker 1: actually has her identity stolen, and very prescient for its time. 321 00:17:29,720 --> 00:17:31,680 Speaker 1: It's not like it got everything wrong. Some of the 322 00:17:31,680 --> 00:17:35,360 Speaker 1: stuff it actually predicted quite well. For example, best prediction 323 00:17:35,520 --> 00:17:37,960 Speaker 1: of any movie ever it predicted being able to order 324 00:17:38,000 --> 00:17:45,320 Speaker 1: pizza online. This was before the dot com bubble even began. 325 00:17:45,480 --> 00:17:47,760 Speaker 1: This the movie came out in the mid nineties, so 326 00:17:48,640 --> 00:17:52,600 Speaker 1: this was actually pretty advanced. The people behind the film said, 327 00:17:52,760 --> 00:17:57,240 Speaker 1: we wanted to be able to let our character make 328 00:17:57,280 --> 00:18:03,000 Speaker 1: an activity online that would stress how she was distancing 329 00:18:03,000 --> 00:18:04,000 Speaker 1: herself from other people. 330 00:18:04,040 --> 00:18:05,480 Speaker 2: She was trying her best to. 331 00:18:05,520 --> 00:18:09,160 Speaker 1: Limit the amount of interaction she had with other human beings. 332 00:18:09,520 --> 00:18:14,000 Speaker 1: It stresses her loneliness, also her paranoia to some extent, 333 00:18:14,560 --> 00:18:16,720 Speaker 1: and it was a neat way of doing it, and 334 00:18:16,720 --> 00:18:21,240 Speaker 1: it also ended up being accurate. However, that being said, 335 00:18:21,840 --> 00:18:24,600 Speaker 1: there's a bit in the very beginning. It's right when 336 00:18:24,600 --> 00:18:27,320 Speaker 1: she's going to order pizza, when she's on the phone 337 00:18:27,359 --> 00:18:30,320 Speaker 1: with a client and she does essentially tech support and 338 00:18:30,760 --> 00:18:34,520 Speaker 1: really helps people who have been attacked by a virus 339 00:18:34,600 --> 00:18:39,000 Speaker 1: recover their systems, and it takes her like no time 340 00:18:39,000 --> 00:18:41,359 Speaker 1: at all to identify what the virus is on this 341 00:18:41,480 --> 00:18:44,119 Speaker 1: customer's computer, which she does not have access to. 342 00:18:44,840 --> 00:18:46,240 Speaker 2: She's accessing it remotely. 343 00:18:47,640 --> 00:18:51,159 Speaker 1: She identifies the virus, she sequesters the virus. She removes 344 00:18:51,200 --> 00:18:55,480 Speaker 1: the virus, plus apparently does repairs to the system so 345 00:18:55,040 --> 00:18:58,240 Speaker 1: it so it starts working again, and that takes her 346 00:18:58,880 --> 00:19:00,600 Speaker 1: less time than it would take for her to order 347 00:19:00,640 --> 00:19:06,760 Speaker 1: the pizza. That's incredible. I mean, she should Every security 348 00:19:06,800 --> 00:19:07,720 Speaker 1: firm should hire her. 349 00:19:08,880 --> 00:19:10,240 Speaker 3: She's a genius apparently. 350 00:19:10,400 --> 00:19:12,600 Speaker 2: Yeah, so I like making. 351 00:19:12,320 --> 00:19:15,480 Speaker 4: The comparison between Sandra Bullock's character in the Net to 352 00:19:15,760 --> 00:19:18,640 Speaker 4: an actual penetration tester that we have in the two 353 00:19:18,680 --> 00:19:22,320 Speaker 4: thousands or in the twenty tens. In the twenty tens, 354 00:19:22,440 --> 00:19:26,480 Speaker 4: penetration testers go through contracts. They go through a company. 355 00:19:26,520 --> 00:19:30,320 Speaker 4: They're usually hired on by a large firm to go 356 00:19:30,400 --> 00:19:33,280 Speaker 4: through their security and make sure everything's okay. They have 357 00:19:33,320 --> 00:19:37,000 Speaker 4: to write reports, everything has to go through a financial 358 00:19:37,200 --> 00:19:40,560 Speaker 4: financialist before they're actually paid for any of their work. 359 00:19:41,040 --> 00:19:44,320 Speaker 4: They don't actually discuss how much they're getting paid with 360 00:19:44,640 --> 00:19:47,399 Speaker 4: the client. They discuss how much they're getting paid with 361 00:19:47,480 --> 00:19:51,280 Speaker 4: the company that they are salaried through. So in the 362 00:19:51,320 --> 00:19:55,080 Speaker 4: case of Sandra Bullock's character here, she's talking about you know, 363 00:19:55,600 --> 00:19:58,680 Speaker 4: oh yeah, I mean he's like, yeah, I'm gonna pay 364 00:19:58,880 --> 00:20:00,560 Speaker 4: X amount of money and he's like, I don't care 365 00:20:00,600 --> 00:20:02,520 Speaker 4: how much it costs, it's worth it, and that's not 366 00:20:02,560 --> 00:20:06,080 Speaker 4: necessarily something that you would talk to the penetration tester about, right, 367 00:20:06,440 --> 00:20:09,960 Speaker 4: because when you do, they're going to make their they're 368 00:20:09,960 --> 00:20:11,720 Speaker 4: going to make their time with you as a client 369 00:20:11,840 --> 00:20:14,280 Speaker 4: much longer to make it seem like a much more 370 00:20:14,320 --> 00:20:15,080 Speaker 4: important case. 371 00:20:15,640 --> 00:20:18,520 Speaker 1: Yeah, so if you if you do, uh, you know, 372 00:20:18,880 --> 00:20:20,879 Speaker 1: it's kind of like what Scotty would say is that 373 00:20:20,960 --> 00:20:23,520 Speaker 1: he'd say he'd figure out how long it was going 374 00:20:23,600 --> 00:20:26,560 Speaker 1: to take him to do a task, and then he 375 00:20:26,640 --> 00:20:29,240 Speaker 1: would then he would give the captain a time that 376 00:20:29,400 --> 00:20:31,359 Speaker 1: was longer than what it would take him to do. 377 00:20:32,119 --> 00:20:34,320 Speaker 1: In that case, it wasn't so that he could get overtime. 378 00:20:34,359 --> 00:20:36,320 Speaker 1: It was so that he could impress the captain by 379 00:20:36,359 --> 00:20:37,320 Speaker 1: finishing early. 380 00:20:37,920 --> 00:20:38,120 Speaker 4: Right. 381 00:20:38,200 --> 00:20:39,679 Speaker 1: It's like I told you it was going to take 382 00:20:39,720 --> 00:20:42,399 Speaker 1: me three days, but I really put my nose to 383 00:20:42,440 --> 00:20:44,320 Speaker 1: the grindstone and got it done in a day and 384 00:20:44,359 --> 00:20:48,359 Speaker 1: a half and the Captain's and pressed like, wow, you're amazing. 385 00:20:48,480 --> 00:20:50,919 Speaker 2: In this case, it would be yeah, that's probably going 386 00:20:51,000 --> 00:20:51,439 Speaker 2: to take me. 387 00:20:51,760 --> 00:20:53,879 Speaker 1: You know, I don't know a week's worth of work 388 00:20:53,920 --> 00:20:56,320 Speaker 1: and you're done in you know, five hours, then you're 389 00:20:56,359 --> 00:20:58,840 Speaker 1: just billing the time, right. 390 00:20:59,040 --> 00:21:02,199 Speaker 4: So so during the conversation that needs two have, it 391 00:21:02,320 --> 00:21:05,080 Speaker 4: sounds like she's a like she's a red teamer, Like 392 00:21:05,119 --> 00:21:08,280 Speaker 4: she's a penetration tester that works for a big security firm, 393 00:21:08,720 --> 00:21:12,320 Speaker 4: and she's she's talking to her client though, but but 394 00:21:12,520 --> 00:21:15,360 Speaker 4: her actions make me think that she's a freelancer. 395 00:21:15,760 --> 00:21:17,600 Speaker 3: So I'm not sure what's going on here. 396 00:21:17,640 --> 00:21:20,320 Speaker 4: I think that they that it was produced a little 397 00:21:20,320 --> 00:21:25,040 Speaker 4: bit confusingly, But now that I understand how penetration testing works, 398 00:21:25,520 --> 00:21:28,280 Speaker 4: even though I am not one myself, I was quite 399 00:21:28,280 --> 00:21:30,040 Speaker 4: confused by this scene. 400 00:21:30,240 --> 00:21:33,800 Speaker 1: Yeah, I I I think it was. Out of all 401 00:21:33,840 --> 00:21:36,879 Speaker 1: the errors that we're talking about today, it's one of 402 00:21:36,480 --> 00:21:40,320 Speaker 1: the less egregious, because, again, unless you were to show 403 00:21:40,440 --> 00:21:44,040 Speaker 1: like that time had obviously passed a significant amount so 404 00:21:44,080 --> 00:21:46,560 Speaker 1: that she had had time to really identify what was 405 00:21:46,560 --> 00:21:49,960 Speaker 1: happening and then respond to it, it's not that big 406 00:21:50,000 --> 00:21:53,280 Speaker 1: a deal compared to some of the other versions that 407 00:21:53,320 --> 00:21:57,120 Speaker 1: we've got in this episode. So I'm I'm gonna I'm 408 00:21:57,160 --> 00:21:59,800 Speaker 1: gonna give this one a pass. It's not as bad 409 00:21:59,800 --> 00:22:02,680 Speaker 1: as could have been. It's certainly not as bad as 410 00:22:02,680 --> 00:22:03,440 Speaker 1: the next one. 411 00:22:04,000 --> 00:22:06,399 Speaker 3: Oh my gosh, can you just talk about ncis. 412 00:22:06,720 --> 00:22:09,200 Speaker 1: Yeah, let's talk about n CIS for a bit, because 413 00:22:10,040 --> 00:22:13,960 Speaker 1: you know, in CIS, first of all, it has one 414 00:22:14,000 --> 00:22:19,239 Speaker 1: of the most infamous awful hacking scenes in Hollywood, and 415 00:22:19,359 --> 00:22:23,040 Speaker 1: so much so that there are multiple versions of the 416 00:22:23,080 --> 00:22:26,000 Speaker 1: clip we're going to talk about on YouTube. My favorite 417 00:22:26,080 --> 00:22:30,600 Speaker 1: title too Idiots One Keyboard. But yeah, let's talk about 418 00:22:30,680 --> 00:22:34,240 Speaker 1: n CIS for a second here. So we've got a 419 00:22:34,359 --> 00:22:38,880 Speaker 1: character in NCIS who is sort of she's the young 420 00:22:39,080 --> 00:22:44,560 Speaker 1: hip hacker character who is the one responding in this 421 00:22:44,600 --> 00:22:47,760 Speaker 1: particular scene to an attack that's coming in that attack 422 00:22:47,840 --> 00:22:51,359 Speaker 1: is being represented by lots and lots of pop ups 423 00:22:51,359 --> 00:22:56,280 Speaker 1: of just strings of characters meaninglessly appearing all over her 424 00:22:56,880 --> 00:23:01,199 Speaker 1: her computer monitor, and her response is that each one 425 00:23:01,240 --> 00:23:04,960 Speaker 1: of these is absolutely meaningful, and she knows exactly what's happening, 426 00:23:05,040 --> 00:23:08,320 Speaker 1: that the hacker is attacking their systems and trying. 427 00:23:08,040 --> 00:23:08,919 Speaker 2: To get at very. 428 00:23:11,119 --> 00:23:16,000 Speaker 1: Very secure data and is quickly winnowing through all the 429 00:23:16,000 --> 00:23:19,560 Speaker 1: different security and so she's just furiously typing on her 430 00:23:19,640 --> 00:23:23,879 Speaker 1: keyboard in response, and her coworker, who's standing next to 431 00:23:23,920 --> 00:23:27,119 Speaker 1: her and asking her questions and giving her suggestions that 432 00:23:27,160 --> 00:23:30,720 Speaker 1: don't necessarily mean very much, ends up deciding to help 433 00:23:30,760 --> 00:23:35,280 Speaker 1: her out by simultaneously typing on the same keyboard she's 434 00:23:35,359 --> 00:23:37,879 Speaker 1: typing on, So you have four hands typing on the 435 00:23:37,920 --> 00:23:42,280 Speaker 1: same keyboard at the same time. So bad, dear Hollywood. 436 00:23:42,800 --> 00:23:48,400 Speaker 1: That is not how keyboards work. A computer can't tell 437 00:23:48,480 --> 00:23:51,840 Speaker 1: which person is typing which thing. It would just come 438 00:23:51,880 --> 00:23:53,960 Speaker 1: out as a super garbled mess. 439 00:23:54,560 --> 00:23:57,160 Speaker 4: Not to mention the frustration, like, have you ever had 440 00:23:57,200 --> 00:24:01,080 Speaker 4: somebody come up and just like start pressing on your keyboard, 441 00:24:01,240 --> 00:24:02,679 Speaker 4: because it's very irritating. 442 00:24:03,000 --> 00:24:04,440 Speaker 2: Is there's no way. 443 00:24:04,359 --> 00:24:06,320 Speaker 4: That these two characters would be able to type on 444 00:24:06,320 --> 00:24:07,760 Speaker 4: the same keyboard at the same time. 445 00:24:07,880 --> 00:24:08,880 Speaker 3: That's ridiculous. 446 00:24:08,960 --> 00:24:11,840 Speaker 1: It feels like a violation when someone does that to me, 447 00:24:12,119 --> 00:24:15,520 Speaker 1: Like if they're like move, even if it if it's 448 00:24:15,560 --> 00:24:18,520 Speaker 1: preceded by move, I'll show you. I'm like, no, no, 449 00:24:18,600 --> 00:24:22,600 Speaker 1: you'll tell me and then I'll do it. This is 450 00:24:22,840 --> 00:24:25,359 Speaker 1: my computer and I don't let you touch it. 451 00:24:25,800 --> 00:24:26,000 Speaker 2: Yeah. 452 00:24:26,040 --> 00:24:28,400 Speaker 1: This was one of those sequences where really the whole 453 00:24:28,400 --> 00:24:32,439 Speaker 1: purpose of this scene was to show how a non 454 00:24:32,600 --> 00:24:36,120 Speaker 1: tech savvy, pragmatic guy has a solution to a problem 455 00:24:36,200 --> 00:24:40,720 Speaker 1: that the two tech wizards completely overlook. So in a way, 456 00:24:40,760 --> 00:24:45,199 Speaker 1: it's it's about taking down the tech wizard folks. A 457 00:24:45,240 --> 00:24:48,760 Speaker 1: peg or two because they're not thinking practically, they're too 458 00:24:48,800 --> 00:24:49,639 Speaker 1: filled with panic. 459 00:24:49,840 --> 00:24:50,639 Speaker 2: So you've got these. 460 00:24:50,520 --> 00:24:53,399 Speaker 1: Two characters who are responding in real time to a 461 00:24:53,440 --> 00:24:58,159 Speaker 1: security threat as if they're doing battle with the hacker. 462 00:24:58,359 --> 00:24:59,840 Speaker 2: And this is a common. 463 00:24:59,520 --> 00:25:02,119 Speaker 1: Thread in a lot of television and movies. It's not 464 00:25:02,480 --> 00:25:08,680 Speaker 1: terribly accurate in the real world scenarios, but they are 465 00:25:08,800 --> 00:25:12,520 Speaker 1: acting like the keystrokes they're doing are going to end 466 00:25:12,600 --> 00:25:15,280 Speaker 1: up either booting the hacker out or securing some of 467 00:25:15,320 --> 00:25:18,400 Speaker 1: the data away from the hacker, and they're just furiously 468 00:25:18,440 --> 00:25:22,480 Speaker 1: typing when the pragmatic guy walks behind the computer system 469 00:25:22,520 --> 00:25:26,920 Speaker 1: and unplugs it, thus saving them from the hack because 470 00:25:26,960 --> 00:25:30,119 Speaker 1: now there's no connection for the hacker to exploit. 471 00:25:30,880 --> 00:25:33,800 Speaker 4: Except what he did was actually make it worse because 472 00:25:33,840 --> 00:25:36,760 Speaker 4: now they don't have a computer that they can work 473 00:25:36,840 --> 00:25:41,720 Speaker 4: through to hopefully find the hack, find the open port 474 00:25:41,760 --> 00:25:43,160 Speaker 4: that this guy is coming through. 475 00:25:43,000 --> 00:25:44,920 Speaker 3: This attacker, and close it off. 476 00:25:45,320 --> 00:25:50,199 Speaker 4: So he's unplugging a computer as opposed to going to 477 00:25:50,320 --> 00:25:53,639 Speaker 4: the server and cutting that off and turning off the server. 478 00:25:53,800 --> 00:25:57,160 Speaker 4: He's just unplugging one of the open PCs, right, And 479 00:25:57,200 --> 00:26:00,879 Speaker 4: that just drives me nuts. This int okay, I wanted 480 00:26:00,880 --> 00:26:02,399 Speaker 4: to throw things at my TV when I was. 481 00:26:02,400 --> 00:26:04,680 Speaker 3: Watching this scene, because I was like, this is so bad. 482 00:26:04,880 --> 00:26:05,639 Speaker 2: It's so bad. 483 00:26:06,440 --> 00:26:09,000 Speaker 1: Yeah, this one, this one's probably out of all the 484 00:26:09,000 --> 00:26:12,960 Speaker 1: ones that we have, this one's probably maybe not the worst, 485 00:26:13,080 --> 00:26:17,199 Speaker 1: but it's way up there, and it's it's clearly played 486 00:26:17,240 --> 00:26:19,680 Speaker 1: for laughs, at least a little bit for laughs. Maybe 487 00:26:19,720 --> 00:26:23,119 Speaker 1: not like outright belly laughs, like you know, anyone who 488 00:26:23,200 --> 00:26:27,600 Speaker 1: knows what a computer is is probably chuckling, but it's 489 00:26:27,600 --> 00:26:31,920 Speaker 1: obviously played for this little moment where the pragmatic character 490 00:26:32,320 --> 00:26:35,280 Speaker 1: can kind of be a smug jerkface and be like, 491 00:26:35,520 --> 00:26:37,720 Speaker 1: huh see, I thought of it first, and the other 492 00:26:37,720 --> 00:26:40,119 Speaker 1: two characters like why didn't we think of that? 493 00:26:40,880 --> 00:26:42,680 Speaker 2: And as as Shannon points out. 494 00:26:42,720 --> 00:26:47,720 Speaker 1: Because it doesn't solve the problem, No, it does not. 495 00:26:48,359 --> 00:26:49,359 Speaker 2: Yeah. 496 00:26:48,680 --> 00:26:52,520 Speaker 1: I highly recommend if anyone is unfamiliar with this go 497 00:26:52,560 --> 00:26:55,520 Speaker 1: look for NCIS two it hits one keyboard and watch 498 00:26:55,600 --> 00:26:57,480 Speaker 1: this scene and really appreciate it. 499 00:26:57,480 --> 00:26:59,080 Speaker 2: I also liked when I was reading. 500 00:26:58,760 --> 00:27:00,920 Speaker 1: Comments about this one, one of the comments I read 501 00:27:00,920 --> 00:27:04,720 Speaker 1: in that subreddit was the part of the scene that 502 00:27:04,800 --> 00:27:07,000 Speaker 1: completely pulls me out of it is the fact that 503 00:27:07,040 --> 00:27:09,200 Speaker 1: when the guy takes a bite of his sandwich, it's 504 00:27:09,200 --> 00:27:13,720 Speaker 1: such a tiny little bite. It lost all credibility with me. 505 00:27:13,760 --> 00:27:15,280 Speaker 2: There. No one needs a sandwich like that. 506 00:27:15,840 --> 00:27:16,960 Speaker 3: Oh it's so funny. 507 00:27:17,680 --> 00:27:18,840 Speaker 2: Redditors are great. 508 00:27:20,160 --> 00:27:20,360 Speaker 3: Now. 509 00:27:20,520 --> 00:27:23,160 Speaker 1: Next on our list is Swordfish, which actually has quite 510 00:27:23,200 --> 00:27:27,320 Speaker 1: a few awful, awful hacking scenes, some of which involve 511 00:27:27,600 --> 00:27:28,720 Speaker 1: material not. 512 00:27:28,800 --> 00:27:32,360 Speaker 2: Appropriate for this podcast, and so I did not include 513 00:27:32,400 --> 00:27:34,000 Speaker 2: those scenes when I wrote. 514 00:27:35,280 --> 00:27:38,080 Speaker 1: There's one in particular where a guy is being tested 515 00:27:38,640 --> 00:27:41,679 Speaker 1: to see if his hacking skills are laite enough to 516 00:27:41,800 --> 00:27:43,840 Speaker 1: join Travolta scene. 517 00:27:44,359 --> 00:27:45,200 Speaker 2: It is awful. 518 00:27:45,720 --> 00:27:48,960 Speaker 1: It is terrible in so many ways, but that one 519 00:27:49,040 --> 00:27:50,919 Speaker 1: was so bad that I was like, no, I can't 520 00:27:51,119 --> 00:27:53,640 Speaker 1: that's not going on the list. So instead I looked 521 00:27:53,640 --> 00:27:56,439 Speaker 1: at a different one. And Hugh Jackman's playing the hacker 522 00:27:56,880 --> 00:28:00,400 Speaker 1: and he's trying to get access to a system, and 523 00:28:00,440 --> 00:28:02,600 Speaker 1: the way that they decided to depict this was they 524 00:28:02,640 --> 00:28:06,840 Speaker 1: show a little cube on the screen and he's building 525 00:28:06,880 --> 00:28:09,760 Speaker 1: onto this cube with other cubes to make what looks 526 00:28:09,800 --> 00:28:15,360 Speaker 1: like essentially a Rubik's cube sized digital construct. It's all virtual, 527 00:28:15,400 --> 00:28:19,320 Speaker 1: there's no actual physical cubes, and this is what represents 528 00:28:19,960 --> 00:28:24,320 Speaker 1: getting access to a system somehow, building a three dimensional 529 00:28:24,400 --> 00:28:28,240 Speaker 1: virtual object out of smaller three dimensional virtual objects. Now, Shannon, 530 00:28:29,520 --> 00:28:33,480 Speaker 1: is that, in fact, how that looks like when you're 531 00:28:33,480 --> 00:28:38,360 Speaker 1: trying to access a system you're confronted with a Rubik's 532 00:28:38,360 --> 00:28:39,719 Speaker 1: cube that you have to construct virtually. 533 00:28:40,680 --> 00:28:44,960 Speaker 4: Yeah, so I'm gonna say no shucks. So for me, 534 00:28:45,360 --> 00:28:49,640 Speaker 4: this looks like they are trying to show their viewers 535 00:28:49,760 --> 00:28:54,280 Speaker 4: a graphical compilation of what coding would look like once 536 00:28:54,320 --> 00:28:57,600 Speaker 4: you finally compile your code and you get the aok 537 00:28:57,960 --> 00:29:00,440 Speaker 4: that everything is okay and there are no errors. So 538 00:29:00,480 --> 00:29:03,280 Speaker 4: that's what it looks like to me. If you see 539 00:29:03,320 --> 00:29:05,680 Speaker 4: actual code, if you see somebody building a virus or 540 00:29:05,680 --> 00:29:09,000 Speaker 4: building a worm, or like in this case, Hugh Jackman's 541 00:29:09,080 --> 00:29:12,800 Speaker 4: character is building a worm, you'll see lines and line 542 00:29:12,880 --> 00:29:15,320 Speaker 4: hundreds of lines of code, and then at the end 543 00:29:15,360 --> 00:29:18,600 Speaker 4: they'll probably choose, like going to the guy and choose 544 00:29:18,640 --> 00:29:22,160 Speaker 4: to compile code, and then the interface that they're using 545 00:29:22,160 --> 00:29:24,000 Speaker 4: will give them the okay and tell them that there 546 00:29:24,000 --> 00:29:26,480 Speaker 4: are no errors. But in this case, he's building a 547 00:29:26,520 --> 00:29:30,160 Speaker 4: Rubik's cube on his computer, and it looks nothing like 548 00:29:30,200 --> 00:29:32,280 Speaker 4: what actual compilation looks like. 549 00:29:32,760 --> 00:29:33,240 Speaker 2: Yeah. 550 00:29:33,320 --> 00:29:37,840 Speaker 1: Yeah, compiling code is so to give you guys a 551 00:29:37,880 --> 00:29:41,200 Speaker 1: little bit of an insight into how computers quote unquote think. 552 00:29:41,800 --> 00:29:46,320 Speaker 1: We use computer languages in order to construct programs, and 553 00:29:46,400 --> 00:29:48,240 Speaker 1: the computer languages are written in such a way that 554 00:29:48,280 --> 00:29:51,960 Speaker 1: a computer understands what operation it needs to perform in 555 00:29:52,080 --> 00:29:55,760 Speaker 1: order to progress through the program. Ultimately, that stuff gets 556 00:29:56,000 --> 00:29:59,640 Speaker 1: compiled and you have like high level computer languages and 557 00:29:59,680 --> 00:30:03,320 Speaker 1: low lane computer languages, and then you eventually get down 558 00:30:03,320 --> 00:30:05,320 Speaker 1: to the point where you get to machine code, and 559 00:30:05,320 --> 00:30:09,080 Speaker 1: that's where you're getting into the binary codes zeros and ones, 560 00:30:09,120 --> 00:30:14,840 Speaker 1: where most humans, the vast majority of humans, nearly all humans, 561 00:30:15,520 --> 00:30:19,040 Speaker 1: are not capable of reading that, at least not with 562 00:30:19,120 --> 00:30:22,920 Speaker 1: a whole lot of time on their hands, right. So 563 00:30:23,120 --> 00:30:25,240 Speaker 1: that's why we have these programming languages to kind of 564 00:30:25,240 --> 00:30:28,840 Speaker 1: bridge the gap between the language that computers speak and 565 00:30:28,880 --> 00:30:32,480 Speaker 1: the languages that we speak. So, if you're completely unfamiliar 566 00:30:32,520 --> 00:30:35,200 Speaker 1: with coding languages or programming languages. 567 00:30:34,880 --> 00:30:36,360 Speaker 2: And you take a look at it, it. 568 00:30:36,240 --> 00:30:41,160 Speaker 1: Looks like nonsense, right it For someone who is completely unschooled, 569 00:30:41,720 --> 00:30:44,640 Speaker 1: it looks like you would have to be a genius 570 00:30:44,640 --> 00:30:46,600 Speaker 1: in order to use it. But in fact, it follows 571 00:30:46,760 --> 00:30:49,880 Speaker 1: very specific rules. So once you learn those rules, you 572 00:30:49,880 --> 00:30:51,880 Speaker 1: know it does take there is a learning curve, but 573 00:30:52,080 --> 00:30:53,760 Speaker 1: you do get to a point where you start feeling 574 00:30:53,800 --> 00:30:56,400 Speaker 1: a little confident with that stuff exactly. 575 00:30:56,600 --> 00:30:59,760 Speaker 4: And there's plenty of programmers that I know who never 576 00:31:00,080 --> 00:31:03,600 Speaker 4: are in every single rule in a specific language that 577 00:31:03,640 --> 00:31:07,080 Speaker 4: they know, but they have books and books, they have, 578 00:31:07,320 --> 00:31:10,280 Speaker 4: you know, definitions and posters and things of this nature 579 00:31:10,320 --> 00:31:12,560 Speaker 4: so that they always have a reminder, so they're able 580 00:31:12,560 --> 00:31:14,600 Speaker 4: to write different kinds of programs. 581 00:31:14,640 --> 00:31:15,440 Speaker 3: But as long as. 582 00:31:15,360 --> 00:31:18,840 Speaker 4: You know a few general rules for any language that 583 00:31:18,880 --> 00:31:22,600 Speaker 4: you're working with, you can write a programs. It's very hard, 584 00:31:22,800 --> 00:31:24,720 Speaker 4: it is very complicated, but it's possible. 585 00:31:24,920 --> 00:31:25,160 Speaker 2: Yeah. 586 00:31:25,400 --> 00:31:29,040 Speaker 1: Yeah, So it's not going to look like you're building 587 00:31:29,040 --> 00:31:34,200 Speaker 1: a cube, unless, of course, your program, once executed, is 588 00:31:34,200 --> 00:31:38,000 Speaker 1: a cube building program, in which case, if it looks 589 00:31:38,040 --> 00:31:40,960 Speaker 1: like you're building a cube, congratulations you coded it correctly. 590 00:31:41,880 --> 00:31:44,360 Speaker 1: We're going to take another quick break from the episode 591 00:31:44,360 --> 00:31:47,080 Speaker 1: and we'll be right back after these messages from our sponsors. 592 00:31:56,880 --> 00:31:59,440 Speaker 1: Our next one is one of my favorite examples of 593 00:31:59,760 --> 00:32:02,160 Speaker 1: that because it takes me back to my childhood. I 594 00:32:02,160 --> 00:32:05,960 Speaker 1: had a discussion with some of my coworkers here about 595 00:32:05,960 --> 00:32:09,640 Speaker 1: this particular movie, and some of them couldn't remember ever 596 00:32:09,680 --> 00:32:11,720 Speaker 1: seeing it. Some of them remembered seeing it as a 597 00:32:11,800 --> 00:32:13,920 Speaker 1: kid on video. I remember seeing. 598 00:32:13,680 --> 00:32:18,320 Speaker 2: This in the theater because I'm old. Superman three. So 599 00:32:18,480 --> 00:32:19,480 Speaker 2: in Superman three. 600 00:32:19,320 --> 00:32:22,680 Speaker 1: You've got a character played by Richard Pryor who is 601 00:32:22,880 --> 00:32:25,560 Speaker 1: a computer programmer, and he goes to work for a 602 00:32:25,600 --> 00:32:26,880 Speaker 1: company and. 603 00:32:27,400 --> 00:32:29,120 Speaker 2: He's a data entry guy. 604 00:32:29,160 --> 00:32:31,680 Speaker 1: For some reason, the data entry folks at this company 605 00:32:31,720 --> 00:32:33,880 Speaker 1: all have to wear like slippers and stuff. It's almost 606 00:32:33,920 --> 00:32:36,840 Speaker 1: like it's a clean room, like kind of a clean room, 607 00:32:36,880 --> 00:32:41,160 Speaker 1: but not really a clean room. And he finds out 608 00:32:41,360 --> 00:32:45,840 Speaker 1: that everyone in the company is paid. Their payment involves 609 00:32:45,960 --> 00:32:48,760 Speaker 1: fractions of a cent that end up getting rounded down. 610 00:32:48,800 --> 00:32:51,480 Speaker 1: So if this sounds like office space, it's very much 611 00:32:51,520 --> 00:32:54,320 Speaker 1: the same sort of plot. He figures out, Hey, what 612 00:32:54,400 --> 00:32:56,560 Speaker 1: if I took all the fractions of a cent that 613 00:32:56,760 --> 00:33:00,680 Speaker 1: otherwise go unaccounted. They're just floating around out there, and 614 00:33:00,720 --> 00:33:03,880 Speaker 1: I pay myself all those fractions of a cent, so 615 00:33:03,920 --> 00:33:07,440 Speaker 1: that I make a real huge amount of money, because 616 00:33:07,640 --> 00:33:10,640 Speaker 1: once you accumulate all of them, it actually amounts to 617 00:33:10,680 --> 00:33:15,840 Speaker 1: something significant. But because each individual little appearance of it, 618 00:33:15,840 --> 00:33:18,840 Speaker 1: it's tiny, no one takes notice of it. Right Like 619 00:33:18,880 --> 00:33:22,560 Speaker 1: if I took a halfpenny, no one is going to 620 00:33:22,680 --> 00:33:27,360 Speaker 1: care if I take a billion half pennies suddenly it matters. 621 00:33:27,720 --> 00:33:31,160 Speaker 2: But he does this by staying late. 622 00:33:30,960 --> 00:33:34,360 Speaker 1: One day and turning on his computer and he does 623 00:33:35,240 --> 00:33:38,560 Speaker 1: type some stuff with one hand on a little bit 624 00:33:38,600 --> 00:33:44,000 Speaker 1: of keyboard that then I'll make texts start to disappear 625 00:33:44,040 --> 00:33:46,680 Speaker 1: and appear like one letter at a time, to a 626 00:33:46,720 --> 00:33:49,160 Speaker 1: point where it's a very common thing in Hollywood, right 627 00:33:49,480 --> 00:33:53,280 Speaker 1: that the display has some sort of weird effect to 628 00:33:53,400 --> 00:33:57,960 Speaker 1: it that indicates that, yes, something is happening, like a 629 00:33:58,000 --> 00:34:03,480 Speaker 1: hacker is attacking or the is being compromised. Once he 630 00:34:03,520 --> 00:34:08,239 Speaker 1: does that, he types in a command that essentially just says, hey, 631 00:34:08,400 --> 00:34:11,279 Speaker 1: pay all the fractions of a cent to me, and 632 00:34:11,320 --> 00:34:15,520 Speaker 1: it's written out in more or less natural language, and 633 00:34:15,520 --> 00:34:18,880 Speaker 1: then he hits enter and it works. A lot of 634 00:34:18,880 --> 00:34:22,759 Speaker 1: problems with this, the big one being natural language. Like 635 00:34:22,800 --> 00:34:25,160 Speaker 1: we just said just a second ago, computers do not 636 00:34:25,280 --> 00:34:29,080 Speaker 1: understand the languages that we communicate with to each other, 637 00:34:29,560 --> 00:34:30,520 Speaker 1: not on their own. 638 00:34:31,120 --> 00:34:32,640 Speaker 2: They have to be taught how to do that. 639 00:34:33,880 --> 00:34:35,960 Speaker 3: They don't automatically speak English. 640 00:34:36,320 --> 00:34:39,360 Speaker 1: Yeah, if you ever open up a command line on 641 00:34:39,719 --> 00:34:43,640 Speaker 1: any kind of computer, doesn't matter what operating system pick one, 642 00:34:43,880 --> 00:34:46,520 Speaker 1: whether it's Linux or DOS or whatever. You get to 643 00:34:46,560 --> 00:34:49,120 Speaker 1: that command line and you try and type in full 644 00:34:49,200 --> 00:34:51,800 Speaker 1: English sentences to see if you can make your computer 645 00:34:51,880 --> 00:34:55,839 Speaker 1: to do stuff. You're going to be sorely disappointed. It 646 00:34:55,880 --> 00:34:59,919 Speaker 1: doesn't work that way. It's not like a search bar 647 00:35:00,560 --> 00:35:04,160 Speaker 1: with Google. I mean, the Web has really spoiled us, 648 00:35:04,880 --> 00:35:07,759 Speaker 1: and that anyone who has not had experience with computers 649 00:35:08,120 --> 00:35:12,239 Speaker 1: before the web was a thing doesn't really understand that 650 00:35:12,320 --> 00:35:14,640 Speaker 1: when you get to the command line, it's not like 651 00:35:14,800 --> 00:35:17,560 Speaker 1: a search field like you're. 652 00:35:16,920 --> 00:35:18,879 Speaker 3: Not has spoiled us. 653 00:35:19,160 --> 00:35:24,320 Speaker 1: Yes, yeah, I side note again, I'm old enough where 654 00:35:24,600 --> 00:35:29,399 Speaker 1: DOS was the way to interface with a computer when 655 00:35:29,400 --> 00:35:32,440 Speaker 1: I was a kid, or Apple Basic, but I was 656 00:35:32,480 --> 00:35:36,200 Speaker 1: mostly using DASS at that point. And then you had 657 00:35:36,200 --> 00:35:39,040 Speaker 1: the Mac come out in nineteen eighty four. They took 658 00:35:39,320 --> 00:35:42,480 Speaker 1: the Guy. They didn't create the guy, the graphic user interface. 659 00:35:42,520 --> 00:35:45,640 Speaker 1: They actually kind of took that from Xerox Park. Xerox 660 00:35:45,640 --> 00:35:50,000 Speaker 1: Park really kind of pioneered that. Then Microsoft came out 661 00:35:50,000 --> 00:35:56,239 Speaker 1: with Windows, and I resisted switching to Windows for a 662 00:35:56,360 --> 00:35:59,520 Speaker 1: very long time and eventually broke down to get Windows 663 00:35:59,560 --> 00:36:02,200 Speaker 1: when it became clear that all the software coming out 664 00:36:03,120 --> 00:36:05,720 Speaker 1: only would be supported through Windows and not through DOS. 665 00:36:06,400 --> 00:36:11,360 Speaker 1: And to this day I'm bitter about that because I 666 00:36:11,440 --> 00:36:13,240 Speaker 1: taught myself all the tree commands. 667 00:36:13,320 --> 00:36:13,719 Speaker 2: Darn it. 668 00:36:15,840 --> 00:36:17,640 Speaker 4: I grew up with Windows since I was a kid, 669 00:36:17,719 --> 00:36:20,640 Speaker 4: so it was always I started in the gooey graphical 670 00:36:20,719 --> 00:36:21,360 Speaker 4: user interface. 671 00:36:21,400 --> 00:36:23,120 Speaker 3: I didn't start with commands. 672 00:36:23,440 --> 00:36:25,719 Speaker 2: Yeah, but this is where Shannon makes me feel old. 673 00:36:26,200 --> 00:36:28,160 Speaker 4: Yeah, I was born in the eighties, so I think 674 00:36:28,200 --> 00:36:28,920 Speaker 4: that's the difference. 675 00:36:29,160 --> 00:36:31,960 Speaker 2: That's that's fair. That's that's fair. Go ahead. 676 00:36:32,719 --> 00:36:33,560 Speaker 3: I love you, Jonathan. 677 00:36:33,880 --> 00:36:37,279 Speaker 2: I love you too, Shannon. It's fine. Every every every 678 00:36:37,320 --> 00:36:38,160 Speaker 2: co host I have. 679 00:36:38,120 --> 00:36:41,000 Speaker 1: Makes me feel old because I'm older than everyone but 680 00:36:41,280 --> 00:36:43,240 Speaker 1: one podcaster at this company. 681 00:36:43,320 --> 00:36:46,120 Speaker 2: So pray continue. 682 00:36:47,680 --> 00:36:52,719 Speaker 4: So I actually liked this Superman three scene because back 683 00:36:52,760 --> 00:36:56,279 Speaker 4: in the day before I was born, it was very 684 00:36:56,320 --> 00:37:01,360 Speaker 4: popular among people all over the place, no matter what 685 00:37:01,520 --> 00:37:04,239 Speaker 4: company you were working with, to deal with fractions of 686 00:37:04,239 --> 00:37:08,520 Speaker 4: a penny, because even a penny as a change in 687 00:37:08,600 --> 00:37:12,160 Speaker 4: pricing would be a lot of money. So people would 688 00:37:12,200 --> 00:37:13,840 Speaker 4: be like, Okay, well it's a penny and a half. 689 00:37:14,200 --> 00:37:16,960 Speaker 4: And I believe at one point there was even a 690 00:37:17,000 --> 00:37:22,000 Speaker 4: half cent coin that was distributed in the United States. 691 00:37:22,360 --> 00:37:23,399 Speaker 3: So this was a thing. 692 00:37:23,760 --> 00:37:25,439 Speaker 4: You can still see it in this day and age 693 00:37:25,520 --> 00:37:28,160 Speaker 4: at gas stations. Whenever you go to a gas station, 694 00:37:28,239 --> 00:37:30,040 Speaker 4: you see on the sign it says like gas is 695 00:37:30,040 --> 00:37:34,400 Speaker 4: two ninety five and nine tenths of a penny. That's 696 00:37:34,800 --> 00:37:38,520 Speaker 4: from back in the day one they would use these exact, 697 00:37:38,640 --> 00:37:42,960 Speaker 4: precise measurements for gasoline distribution at gas stations. 698 00:37:43,680 --> 00:37:49,120 Speaker 3: So that really is a thing. But the whole hacking 699 00:37:49,200 --> 00:37:52,080 Speaker 3: scenario of this scene is very false. 700 00:37:52,840 --> 00:37:58,400 Speaker 4: You can't do a specific distribution of money in that nature, 701 00:37:58,560 --> 00:38:00,920 Speaker 4: and anybody who has act sus to that kind of 702 00:38:00,920 --> 00:38:04,920 Speaker 4: information who is working for a company should not have 703 00:38:04,960 --> 00:38:07,759 Speaker 4: that access in the first pace, especially if they're they're 704 00:38:07,800 --> 00:38:13,160 Speaker 4: getting paid and they're not like a chief operating manager 705 00:38:13,480 --> 00:38:14,280 Speaker 4: of that company. 706 00:38:14,440 --> 00:38:14,640 Speaker 2: Right. 707 00:38:14,760 --> 00:38:19,960 Speaker 1: Yeah, it's the idea that you would have these dumb terminals, 708 00:38:20,239 --> 00:38:22,640 Speaker 1: like i am assuming they were dumb terminals. I'm assuming 709 00:38:22,640 --> 00:38:27,160 Speaker 1: they were all connected to a main system as opposed 710 00:38:27,200 --> 00:38:29,880 Speaker 1: to each being individual computers. But either in either case 711 00:38:30,520 --> 00:38:33,280 Speaker 1: you would have limitations on what any of those terminals 712 00:38:33,320 --> 00:38:38,560 Speaker 1: could access. But because of his leap programming skills, he's 713 00:38:38,640 --> 00:38:42,719 Speaker 1: able to bypass that and get access to the mainframe. 714 00:38:43,120 --> 00:38:45,239 Speaker 2: I'm pretty sure they use it as a mainframe. 715 00:38:45,800 --> 00:38:49,239 Speaker 1: Mainframe, by the way, is also a great general term 716 00:38:49,280 --> 00:38:53,319 Speaker 1: that Hollywood has misused throughout all the computer films. But 717 00:38:55,840 --> 00:38:57,839 Speaker 1: it's one of the things that's never explained how he 718 00:38:57,880 --> 00:38:59,960 Speaker 1: does it. It's just it's just a thing that happens 719 00:39:00,040 --> 00:39:01,279 Speaker 1: in the movie. 720 00:39:01,400 --> 00:39:03,359 Speaker 2: Doesn't you know. They're not drawing attention to it. 721 00:39:03,360 --> 00:39:05,400 Speaker 1: It's not an important thing other than the fact to 722 00:39:05,600 --> 00:39:10,480 Speaker 1: illustrate that one he is smart. Two he doesn't see 723 00:39:10,480 --> 00:39:15,240 Speaker 1: anything ethically wrong with bending the rules because in his mind, 724 00:39:15,680 --> 00:39:18,359 Speaker 1: these fractions of a cent, they're not doing anything right. 725 00:39:18,400 --> 00:39:21,920 Speaker 1: They're not they're not in an account, they're not being 726 00:39:22,040 --> 00:39:24,440 Speaker 1: used by the company. They're just they're just kind of 727 00:39:24,560 --> 00:39:29,200 Speaker 1: loose somehow. They're they're they're in the company's ownership, but 728 00:39:29,239 --> 00:39:31,680 Speaker 1: no one's doing anything with it. So therefore, if no 729 00:39:31,680 --> 00:39:33,399 Speaker 1: one's doing anything with it, no one's going to miss 730 00:39:33,400 --> 00:39:35,359 Speaker 1: them when they're gone. So that's kind of how he 731 00:39:35,480 --> 00:39:40,080 Speaker 1: justifies it, and eventually he becomes one of the he's 732 00:39:40,120 --> 00:39:42,440 Speaker 1: more of a reluctant villain in the movie, but he's 733 00:39:42,480 --> 00:39:45,560 Speaker 1: one of the villains in Superman three. Ah Okay, that's 734 00:39:45,600 --> 00:39:48,800 Speaker 1: a If you have not seen Superman three, good job. 735 00:39:48,960 --> 00:39:52,400 Speaker 1: Continue on that track. Don't feel tempted to change that. 736 00:39:52,920 --> 00:39:54,200 Speaker 2: It is not a good movie. 737 00:39:55,280 --> 00:39:58,600 Speaker 1: It's better than Superman four. Although my coworker Joe would 738 00:39:58,640 --> 00:40:03,360 Speaker 1: probably trounce me for saying, so, uh, Superman four is awful. 739 00:40:04,280 --> 00:40:04,960 Speaker 2: The next move. 740 00:40:05,400 --> 00:40:07,719 Speaker 1: The next example we have is Numbers, which I love 741 00:40:07,840 --> 00:40:13,160 Speaker 1: just because of the way it mischaracterizes IRC, which is, 742 00:40:13,400 --> 00:40:15,239 Speaker 1: there's a scene in which people are trying to figure 743 00:40:15,239 --> 00:40:17,640 Speaker 1: out what these what these hackers, these two different hackers 744 00:40:17,680 --> 00:40:20,279 Speaker 1: are trying to do, and they don't know, and they 745 00:40:20,320 --> 00:40:22,560 Speaker 1: aren't sure how they're going to track down the hackers 746 00:40:22,840 --> 00:40:25,520 Speaker 1: and learn what they're trying to do. But then one 747 00:40:25,520 --> 00:40:27,840 Speaker 1: of the characters says, oh, we got to go on 748 00:40:27,880 --> 00:40:30,879 Speaker 1: I R C because that's where all the hackers go 749 00:40:31,040 --> 00:40:34,239 Speaker 1: to chat. And they use handles, you know, they don't 750 00:40:34,320 --> 00:40:36,960 Speaker 1: use the real name they use. They use handles on 751 00:40:37,040 --> 00:40:39,480 Speaker 1: I RC and that way they can secretly chat to 752 00:40:39,520 --> 00:40:44,080 Speaker 1: each other. And then they use this weird meaningless analogy 753 00:40:44,160 --> 00:40:48,040 Speaker 1: talking about two ships that are sailing across the ocean 754 00:40:48,360 --> 00:40:50,279 Speaker 1: and they meet in the middle of the ocean and 755 00:40:50,320 --> 00:40:53,400 Speaker 1: they exchange illegal goods and then they sail away, and 756 00:40:53,440 --> 00:40:57,239 Speaker 1: because the wake of a ship fades so quickly, they 757 00:40:57,320 --> 00:40:58,600 Speaker 1: leave no trace behind. 758 00:40:58,719 --> 00:41:00,440 Speaker 2: That's the same thing as I R C. 759 00:41:01,360 --> 00:41:01,520 Speaker 3: Uh. 760 00:41:01,560 --> 00:41:04,840 Speaker 1: They actually do this whole sequence where that that ship 761 00:41:04,920 --> 00:41:10,520 Speaker 1: analogy I just talked about is visualized on screen because folks, 762 00:41:10,600 --> 00:41:13,200 Speaker 1: I r C is boring, Like showing I r C 763 00:41:13,640 --> 00:41:17,320 Speaker 1: on screen is incredibly dull, So it's way more exciting 764 00:41:17,360 --> 00:41:20,560 Speaker 1: to have a visualization of a meaningless ship analogy. 765 00:41:21,760 --> 00:41:22,000 Speaker 3: Yeah. 766 00:41:22,120 --> 00:41:25,400 Speaker 4: I r C is super boring to look at, but 767 00:41:25,480 --> 00:41:27,600 Speaker 4: it's very fun. You can make lots of friends in 768 00:41:27,680 --> 00:41:30,920 Speaker 4: I r C, so it's it is called Internet relay chat, 769 00:41:31,400 --> 00:41:34,680 Speaker 4: so that is a sure thing. People do use lead 770 00:41:34,760 --> 00:41:37,440 Speaker 4: speak in I r C, uh, even though lead speak 771 00:41:37,520 --> 00:41:40,960 Speaker 4: is not that hard to read, right, And her definition 772 00:41:41,480 --> 00:41:44,640 Speaker 4: going into the ships made absolutely no sense to me 773 00:41:44,880 --> 00:41:48,479 Speaker 4: as an I r C user, because when I pop 774 00:41:48,520 --> 00:41:51,560 Speaker 4: into I r C and then when I leave, my 775 00:41:51,719 --> 00:41:54,279 Speaker 4: chats are still there, and they are still there for 776 00:41:54,320 --> 00:41:56,480 Speaker 4: anybody to see who was also logged in at the 777 00:41:56,480 --> 00:41:57,040 Speaker 4: same time. 778 00:41:57,360 --> 00:41:57,600 Speaker 2: Yep. 779 00:41:58,000 --> 00:42:01,160 Speaker 4: So saying that they disappear after X amount of time 780 00:42:01,280 --> 00:42:04,520 Speaker 4: is not necessarily true because anybody with a very very 781 00:42:04,560 --> 00:42:08,239 Speaker 4: simple script can capture everything that was said in an 782 00:42:08,239 --> 00:42:10,640 Speaker 4: IRC for X amount of time, for whatever time that 783 00:42:10,680 --> 00:42:13,680 Speaker 4: they want to save a file for, and then they 784 00:42:13,680 --> 00:42:16,320 Speaker 4: can upload that file anywhere that they want to. Yeah, 785 00:42:16,360 --> 00:42:19,360 Speaker 4: so that this information disappears is completely false. 786 00:42:19,600 --> 00:42:22,200 Speaker 1: I love that there's a I'm pretty sure it's the 787 00:42:22,200 --> 00:42:24,399 Speaker 1: same one. I'm not watching the clips as i'm going 788 00:42:24,440 --> 00:42:26,120 Speaker 1: through them, so I'm not entirely certain. 789 00:42:26,160 --> 00:42:27,480 Speaker 2: But I think there's a moment in this. 790 00:42:27,520 --> 00:42:30,680 Speaker 1: Where they have a desperate like take a screen shot, 791 00:42:30,920 --> 00:42:33,839 Speaker 1: take a screen shot, and she does it like at 792 00:42:33,840 --> 00:42:36,480 Speaker 1: the last second before the connection's broken, and I was 793 00:42:36,560 --> 00:42:41,239 Speaker 1: laughing so hard that the idea of oh, yeah, you 794 00:42:41,239 --> 00:42:45,279 Speaker 1: got to take a screenshotter it's gone forever. Yeah, it's 795 00:42:45,320 --> 00:42:49,120 Speaker 1: pretty ridiculous. And there is a funny little exchange where 796 00:42:49,160 --> 00:42:51,960 Speaker 1: the lady says like they'll be speaking in lait, but 797 00:42:52,000 --> 00:42:58,359 Speaker 1: don't worry, I also speak leaked, like, oh, screenwriter, you're 798 00:42:58,480 --> 00:42:59,640 Speaker 1: so adorable. 799 00:43:00,239 --> 00:43:02,719 Speaker 3: Oh so funny. Yeah, Lea, it's easy to speak, so 800 00:43:02,800 --> 00:43:03,600 Speaker 3: anybody can do it. 801 00:43:03,719 --> 00:43:07,200 Speaker 1: Yeah, I mean, it's really it's really just replacing certain 802 00:43:07,280 --> 00:43:10,359 Speaker 1: characters with other characters that look similar to the ones 803 00:43:10,400 --> 00:43:15,080 Speaker 1: you're replacing, and then sometimes purposefully misspelling words because someone 804 00:43:15,200 --> 00:43:18,040 Speaker 1: some at some point misspelled things people thought was funny 805 00:43:18,360 --> 00:43:19,439 Speaker 1: and they went with it, like. 806 00:43:19,400 --> 00:43:22,200 Speaker 2: Poone pone is a great example. Pwn. 807 00:43:22,480 --> 00:43:24,920 Speaker 1: It's supposed to be owned, but someone just did a 808 00:43:25,000 --> 00:43:29,400 Speaker 1: typo and then that typo became the word yep. 809 00:43:30,120 --> 00:43:31,399 Speaker 2: That's the lovely thing about it. 810 00:43:31,960 --> 00:43:33,800 Speaker 1: And that's it for the first part of the Worst 811 00:43:33,840 --> 00:43:40,320 Speaker 1: Hacking Scenes from Hollywood. Sadly, there's no shortage of subsequent 812 00:43:40,440 --> 00:43:43,279 Speaker 1: terrible hacking scenes out of Hollywood. It's one of those 813 00:43:43,320 --> 00:43:46,480 Speaker 1: things that admittedly can be a little tricky to portray 814 00:43:46,640 --> 00:43:49,799 Speaker 1: in an exciting and dramatic fashion, and so a lot 815 00:43:49,880 --> 00:43:52,800 Speaker 1: of liberties are taken when it comes to showing hacking 816 00:43:52,840 --> 00:43:57,160 Speaker 1: on screen. Next Friday, we will have part two of 817 00:43:57,200 --> 00:44:00,799 Speaker 1: this little two part series. Shannon again will be on 818 00:44:00,840 --> 00:44:04,080 Speaker 1: the show and we'll talk more about the worst scenes 819 00:44:04,440 --> 00:44:07,560 Speaker 1: well hacking scenes from Hollywood. Those the worst scenes from 820 00:44:07,600 --> 00:44:10,600 Speaker 1: Hollywood would be a much longer show. I hope you 821 00:44:10,640 --> 00:44:13,200 Speaker 1: are all well, and I'll talk to you again really soon. 822 00:44:18,239 --> 00:44:22,880 Speaker 1: Tech Stuff is an iHeartRadio production. For more podcasts from iHeartRadio, 823 00:44:23,200 --> 00:44:26,919 Speaker 1: visit the iHeartRadio app, Apple Podcasts, or wherever you listen 824 00:44:26,960 --> 00:44:31,839 Speaker 1: to your favorite shows.