1 00:00:00,520 --> 00:00:05,280 Speaker 1: Ridiculous Crime is a production of My Heart Radio Elizabeth Dot. 2 00:00:05,840 --> 00:00:10,240 Speaker 1: Uh you know it's ridiculous, Yes, I do. Okay, it's 3 00:00:10,240 --> 00:00:13,720 Speaker 1: almost Thanksgiving and I was thinking back about the Macy's 4 00:00:13,800 --> 00:00:17,040 Speaker 1: Day Thanksgiving Day parade, which is a big family favorite. 5 00:00:17,040 --> 00:00:19,040 Speaker 1: Do you guys watch it now? Okay? Well, my family 6 00:00:19,079 --> 00:00:20,560 Speaker 1: used to always watch it, and I was thinking back. 7 00:00:20,840 --> 00:00:23,080 Speaker 1: It's like, well, I remember there being some crazy things. 8 00:00:23,160 --> 00:00:27,840 Speaker 1: I looked it up in there was an absolutely hectic 9 00:00:28,160 --> 00:00:32,080 Speaker 1: Macy's Day Thanksgiving Day parade. So what happens is there's 10 00:00:32,159 --> 00:00:34,760 Speaker 1: winds whipping around. The winds are like at forty three 11 00:00:34,800 --> 00:00:37,080 Speaker 1: miles an hour that day, they decide we're gonna do 12 00:00:37,120 --> 00:00:41,000 Speaker 1: it anyway. Now, these are huge, exactly, and it takes 13 00:00:41,000 --> 00:00:43,159 Speaker 1: like teams of people to hold them down. So I 14 00:00:43,159 --> 00:00:46,440 Speaker 1: watched the footage right, and this was like amazing because 15 00:00:46,479 --> 00:00:50,479 Speaker 1: they lost multiple floats in the parade. The Pink Panther 16 00:00:50,720 --> 00:00:54,040 Speaker 1: goes out like a street the Quick Bunny, the cat 17 00:00:54,080 --> 00:00:56,240 Speaker 1: and the hat they both go down at thirty six Street. 18 00:00:56,440 --> 00:00:58,840 Speaker 1: But the one that I loved the most happened to 19 00:00:58,880 --> 00:01:03,160 Speaker 1: be Barney the Big Purple Dinosaur. So after the Pink 20 00:01:03,200 --> 00:01:06,279 Speaker 1: Panther had been you know, taken out with a knife 21 00:01:06,280 --> 00:01:10,360 Speaker 1: by the NYPD. Barney comes down the path and Barney 22 00:01:10,400 --> 00:01:13,200 Speaker 1: is like getting whipped around and the handlers have to 23 00:01:13,200 --> 00:01:16,640 Speaker 1: lose control of him, right, and it comes this menace 24 00:01:16,640 --> 00:01:18,640 Speaker 1: where the wind is going so fast the handlers are 25 00:01:18,680 --> 00:01:21,679 Speaker 1: literally lying down on the street. Another handler is lying 26 00:01:21,680 --> 00:01:23,600 Speaker 1: on top of them trying to hold them down because 27 00:01:23,600 --> 00:01:26,639 Speaker 1: the wind is lifting them. Wondering if anyone got flung 28 00:01:26,760 --> 00:01:31,920 Speaker 1: over on the roape completely not that good, but there 29 00:01:31,920 --> 00:01:34,400 Speaker 1: were some people like things fell and stuff people got 30 00:01:34,560 --> 00:01:37,600 Speaker 1: actually hurt. But aside from that, there was when Barney 31 00:01:37,640 --> 00:01:41,720 Speaker 1: goes down and I quote one lady said, everything turned purple. Right, 32 00:01:41,800 --> 00:01:44,880 Speaker 1: So what happens is like as the balloon handles are 33 00:01:44,920 --> 00:01:47,520 Speaker 1: trying to fight to hold Barney, he hits this like 34 00:01:47,720 --> 00:01:49,720 Speaker 1: light post and then all of a sudden rips open 35 00:01:49,760 --> 00:01:53,560 Speaker 1: his side. So now Barney the kind of story's eviscerated 36 00:01:53,560 --> 00:01:56,000 Speaker 1: in the air, flailing away and the wind is going 37 00:01:56,080 --> 00:01:59,280 Speaker 1: right into his torn open side, and so people are screaming. 38 00:01:59,360 --> 00:02:02,960 Speaker 1: Children's yeah, the families are screaming, And so what did 39 00:02:02,960 --> 00:02:05,440 Speaker 1: people do? Because now also the wind is starting to 40 00:02:05,440 --> 00:02:07,640 Speaker 1: whip this thing around like a kite. Handlers are trying 41 00:02:07,640 --> 00:02:10,240 Speaker 1: to hold it down, so they're able to cut the 42 00:02:10,320 --> 00:02:13,079 Speaker 1: ropes that are tied around one lamp post. Now Barney's 43 00:02:13,080 --> 00:02:15,960 Speaker 1: flapping around and he's down at like street level, so 44 00:02:16,000 --> 00:02:18,480 Speaker 1: he's getting close to like hitting people. Then White Pet 45 00:02:18,639 --> 00:02:21,160 Speaker 1: once again rushes in. Someone's like, give me a knife, 46 00:02:21,200 --> 00:02:22,880 Speaker 1: and then so they get a knife and they go 47 00:02:23,000 --> 00:02:25,680 Speaker 1: at Barney with knives and they cut a heart. Stop it. 48 00:02:25,960 --> 00:02:27,640 Speaker 1: They cut a heart Barney in front of all the 49 00:02:27,720 --> 00:02:29,880 Speaker 1: children who were there, and then all the children watching 50 00:02:29,880 --> 00:02:31,880 Speaker 1: the millions at home. And it is one of the 51 00:02:31,880 --> 00:02:35,400 Speaker 1: funniest things I've ever seen. Is there a documentary about this? No, 52 00:02:35,520 --> 00:02:36,880 Speaker 1: you can find it on YouTube. Oh I don't really. 53 00:02:36,919 --> 00:02:38,720 Speaker 1: I don't know that. I think there should be. And 54 00:02:38,760 --> 00:02:41,080 Speaker 1: I wanted to be very solemn the day that Barney 55 00:02:41,080 --> 00:02:43,800 Speaker 1: went down. Oh it's insane. Yeah, I would watch that 56 00:02:44,120 --> 00:02:45,919 Speaker 1: if you want to see it, it's on YouTube. Okay, 57 00:02:45,919 --> 00:02:49,000 Speaker 1: Well that's ridiculous. Do you know what else is ridiculous? 58 00:02:49,480 --> 00:02:53,359 Speaker 1: Hit me with it. Two kids hacking major military installations 59 00:02:53,400 --> 00:02:56,440 Speaker 1: in search of UFO intel. Oh, I love these kids. 60 00:03:16,520 --> 00:03:20,560 Speaker 1: This is ridiculous. Crime A podcast about absurd and outrageous capers, 61 00:03:20,600 --> 00:03:27,440 Speaker 1: heists and cons It's always murder free and one ridiculous. 62 00:03:28,600 --> 00:03:34,320 Speaker 1: I am not particularly computer literate. I mean, I'm proficient 63 00:03:34,440 --> 00:03:38,680 Speaker 1: in Microsoft Office Suite applications, says right there on my resume. 64 00:03:40,320 --> 00:03:43,960 Speaker 1: But I'm kind of I'm in awe of hackers. Well, 65 00:03:44,400 --> 00:03:47,080 Speaker 1: I'm in all of the nineties version of them, you know, 66 00:03:47,160 --> 00:03:50,800 Speaker 1: like they were more adventurous than now. It's like malicious 67 00:03:50,840 --> 00:03:53,600 Speaker 1: and financial, right, but like to know the back door 68 00:03:53,760 --> 00:03:56,400 Speaker 1: operations of things like that, and back in the day 69 00:03:56,440 --> 00:03:58,280 Speaker 1: with people would be cracking in just because they wanted to. 70 00:03:58,480 --> 00:04:00,480 Speaker 1: I could get in if they wanted to see what 71 00:04:00,560 --> 00:04:03,200 Speaker 1: was being held in there, and that stayed these UFO 72 00:04:04,600 --> 00:04:06,960 Speaker 1: to know how to do that rather than only know 73 00:04:07,040 --> 00:04:10,280 Speaker 1: the front facing things. Um, I'm going to focus on 74 00:04:10,320 --> 00:04:13,880 Speaker 1: the golden age of hacking, late eighties early nineties. Do 75 00:04:13,920 --> 00:04:17,880 Speaker 1: you remember that Angelina Jolie film Hackers, Yes, the one 76 00:04:17,920 --> 00:04:20,360 Speaker 1: you mentioned often. It had a really good theme song, 77 00:04:20,480 --> 00:04:24,760 Speaker 1: hacking on a Star Really yeah, Randy Newman sang. It 78 00:04:26,320 --> 00:04:29,400 Speaker 1: had other classics on the soundtrack, Nights of hackst Asia 79 00:04:30,000 --> 00:04:33,839 Speaker 1: Are you serious? And then Computer Pooper You're not kidding? 80 00:04:34,320 --> 00:04:37,640 Speaker 1: Disc is how we do it? I t are you kidding? 81 00:04:37,640 --> 00:04:43,080 Speaker 1: I'm completely kidding. I had I could have believed you. Yeah, 82 00:04:43,200 --> 00:04:45,840 Speaker 1: you know what, Well, okay, I shouldn't joke. But in 83 00:04:45,920 --> 00:04:49,120 Speaker 1: all honesty, there were three soundtracks for that movie. Did 84 00:04:49,120 --> 00:04:52,400 Speaker 1: you know that? So? And that's a hundred percent true. 85 00:04:52,400 --> 00:04:55,320 Speaker 1: They just couldn't stop. Do you know what was songs 86 00:04:55,360 --> 00:04:58,039 Speaker 1: written the movie? Well, I don't know what. There's track one, 87 00:04:58,080 --> 00:05:03,960 Speaker 1: Disc one is called Original Bedroom Rockers by Cruder and Dorfmeister. Okay, 88 00:05:04,000 --> 00:05:05,800 Speaker 1: so now I have to assume you're telling the truth. 89 00:05:06,040 --> 00:05:08,760 Speaker 1: I hadn't heard of it, but I listened to that 90 00:05:08,800 --> 00:05:11,560 Speaker 1: song for the sake of research. It's the music that 91 00:05:11,600 --> 00:05:13,560 Speaker 1: you play when you're like in the nineties and it's 92 00:05:13,680 --> 00:05:16,360 Speaker 1: dark and it's wet, and you're in the city scape 93 00:05:16,680 --> 00:05:20,920 Speaker 1: and you're sneaking. That's what that it's for. You're like 94 00:05:21,000 --> 00:05:24,680 Speaker 1: wearing a choker and thick sold Doc Martins and you're 95 00:05:24,680 --> 00:05:28,040 Speaker 1: just hacking it at That's what that's for, Just poking 96 00:05:28,080 --> 00:05:31,839 Speaker 1: around and you have tiny bangs of course male female, 97 00:05:31,880 --> 00:05:35,160 Speaker 1: none of the above, tiny banks. Do you know? It 98 00:05:35,200 --> 00:05:38,800 Speaker 1: was track one on disc two? Um, this is how 99 00:05:38,960 --> 00:05:44,680 Speaker 1: we do it? Firestarter by the Prodigy. Like, if that 100 00:05:44,720 --> 00:05:48,600 Speaker 1: doesn't take you back, I don't know that. So in 101 00:05:48,640 --> 00:05:52,320 Speaker 1: the movie, they talk about the essay Hacker Manifesto, which 102 00:05:52,320 --> 00:05:55,479 Speaker 1: is also known as the Conscience of a Hack. It 103 00:05:55,600 --> 00:05:59,599 Speaker 1: defined the whole hacker business that you know, the biz 104 00:06:00,200 --> 00:06:02,800 Speaker 1: as we like to call it. Yeah, it was written 105 00:06:02,839 --> 00:06:06,800 Speaker 1: by a hacker, a hacker named the Mentor. Yes, he 106 00:06:07,000 --> 00:06:10,680 Speaker 1: was a hacker. His MoMA named him Lloyd Blankenship. He 107 00:06:10,800 --> 00:06:13,520 Speaker 1: called himself the Mentor. Can I read you the very 108 00:06:13,640 --> 00:06:16,080 Speaker 1: end of it? Um? Should I do it? In my 109 00:06:16,160 --> 00:06:19,320 Speaker 1: junior high drama kid voice, I was going to ask, 110 00:06:21,080 --> 00:06:24,440 Speaker 1: this is our world now, the world of the electron 111 00:06:24,520 --> 00:06:27,920 Speaker 1: and the switch, the beauty of the bad. We make 112 00:06:28,040 --> 00:06:31,160 Speaker 1: use of a service already existing without paying for what 113 00:06:31,240 --> 00:06:35,679 Speaker 1: could be dirt cheap if it wasn't run by profiteering gluttons, 114 00:06:35,720 --> 00:06:40,240 Speaker 1: and you call us criminals. We explore, and you call 115 00:06:40,440 --> 00:06:45,360 Speaker 1: us criminals. We seek after knowledge, and you call us criminals. 116 00:06:45,839 --> 00:06:50,880 Speaker 1: We exist without skin color, without nationality, without religious bias, 117 00:06:51,160 --> 00:06:55,280 Speaker 1: and you call us criminals. You build atomic bombs, you 118 00:06:55,360 --> 00:06:58,800 Speaker 1: wage wars, you murder, cheat and lie to us and 119 00:06:58,839 --> 00:07:01,159 Speaker 1: try to make us believe if it's for our own good. 120 00:07:01,600 --> 00:07:07,039 Speaker 1: Yet we're the criminals. Yes, I am a criminal. My 121 00:07:07,240 --> 00:07:10,600 Speaker 1: crime is that of curiosity. My crime is out of 122 00:07:10,720 --> 00:07:13,760 Speaker 1: judging people by what they say and think, not what 123 00:07:13,800 --> 00:07:17,120 Speaker 1: they look like. My crime is that about smarting you 124 00:07:17,360 --> 00:07:20,240 Speaker 1: something that you will never forgive me for. I'm a 125 00:07:20,280 --> 00:07:24,760 Speaker 1: hacker and this is my manifesto. You may stop this individual, 126 00:07:24,800 --> 00:07:28,640 Speaker 1: but you cannot stop us all. After all, we're all alike. 127 00:07:30,400 --> 00:07:33,680 Speaker 1: Reminds me of the Simpsons. Joker Ed Bakley drives a 128 00:07:33,760 --> 00:07:38,080 Speaker 1: car that's powered off of his sense of self satisfaction. Yes, 129 00:07:38,640 --> 00:07:43,200 Speaker 1: there's like serious Jean Valjean and doesn't make you want 130 00:07:43,200 --> 00:07:45,400 Speaker 1: to go to coding class and just pop off once 131 00:07:45,400 --> 00:07:48,480 Speaker 1: I get done. Waiving this flag over my head makes 132 00:07:48,520 --> 00:07:50,160 Speaker 1: me want to go back to seventh grade and do 133 00:07:50,200 --> 00:07:56,600 Speaker 1: a play. So Hackers, that was a real star turn 134 00:07:56,680 --> 00:07:59,760 Speaker 1: for all. Angelina Jolie, Oh yeah, I think guess how 135 00:07:59,760 --> 00:08:02,400 Speaker 1: she met and married Johnny Lee Miller sick boy. I 136 00:08:02,440 --> 00:08:08,880 Speaker 1: think you're actually right about that. I'm right about hackers. 137 00:08:08,880 --> 00:08:12,720 Speaker 1: It came out. It was in the public consciousness. Hacken. Yeah, 138 00:08:14,160 --> 00:08:15,560 Speaker 1: it'd been there for a while. You know. He had 139 00:08:15,600 --> 00:08:21,600 Speaker 1: Matthew Broderick in wargames the Net, that's right. Yeah, that 140 00:08:21,720 --> 00:08:25,200 Speaker 1: was like the sanitized version. That was like the Kelly 141 00:08:26,000 --> 00:08:31,880 Speaker 1: her out or visit her outlook, Hello Microsoft Excel and 142 00:08:32,000 --> 00:08:36,920 Speaker 1: proficient Microsoft Office Suite. Um, yeah, no, that was the 143 00:08:37,040 --> 00:08:41,720 Speaker 1: net is like the panera version of hackers and hackers 144 00:08:41,800 --> 00:08:50,679 Speaker 1: is like the hot topic everything. So hackers. In six June, 145 00:08:51,080 --> 00:08:55,319 Speaker 1: there was a U. S. Senate Permanent Subcommittee on Investigations 146 00:08:55,559 --> 00:08:59,880 Speaker 1: that held a hearing on security in cyberspace. So you know, 147 00:09:00,040 --> 00:09:03,640 Speaker 1: let's protecting as internet we got to. UM. Hearing was 148 00:09:03,679 --> 00:09:07,960 Speaker 1: really all about the National Information Infrastructure as well as 149 00:09:07,960 --> 00:09:13,120 Speaker 1: America's dependency on said infrastructure, the NII. It's basically, according 150 00:09:13,120 --> 00:09:17,800 Speaker 1: to Senate staffers, quote, the advanced computer systems, databases, and 151 00:09:17,880 --> 00:09:22,520 Speaker 1: telecommunications networks throughout the United States that make electronic information 152 00:09:22,600 --> 00:09:30,199 Speaker 1: widely available and accessible. Start talking about like the Internet, cable, wire, satellite. 153 00:09:30,360 --> 00:09:33,360 Speaker 1: So this was the telecommunications follow up act. I guess 154 00:09:33,440 --> 00:09:38,479 Speaker 1: cell phones. Um, it's just a part of the global infrastructure, 155 00:09:38,520 --> 00:09:42,280 Speaker 1: just the US. And so this this subcommittee, they put 156 00:09:42,280 --> 00:09:44,520 Speaker 1: together a report and they figured out like what the 157 00:09:44,600 --> 00:09:50,040 Speaker 1: vulnerabilities were for this infrastructure weakness in hardware and software. 158 00:09:50,440 --> 00:09:56,960 Speaker 1: This week weeksauce human factor and then a lack of 159 00:09:57,080 --> 00:10:02,199 Speaker 1: security culture. Ah, that's like the whole my passwords passwords. Yeah, 160 00:10:02,240 --> 00:10:04,400 Speaker 1: it's like the I have the people who put a 161 00:10:04,440 --> 00:10:07,920 Speaker 1: post it note with their password under their keyboard or 162 00:10:08,520 --> 00:10:11,760 Speaker 1: people do that. You you don't work in office. Yeah, 163 00:10:11,840 --> 00:10:14,240 Speaker 1: I don't know anything about office. That's like if you, yeah, 164 00:10:14,480 --> 00:10:17,000 Speaker 1: you just lift a keyboard, you're probably on a on 165 00:10:17,120 --> 00:10:20,160 Speaker 1: some people's Yeah, you're probably going to find there. But 166 00:10:20,200 --> 00:10:22,240 Speaker 1: I don't even tape it underneath their desk draw They 167 00:10:22,320 --> 00:10:24,280 Speaker 1: might do that too. I mean, if I were really 168 00:10:24,320 --> 00:10:26,160 Speaker 1: trying to look for someone, that's what I would do, 169 00:10:27,240 --> 00:10:31,280 Speaker 1: not that I would. Um So. In an example, the 170 00:10:31,280 --> 00:10:35,880 Speaker 1: congressional staffers, they said, quote, the staff requested from various 171 00:10:35,960 --> 00:10:38,800 Speaker 1: agencies the name of the individual or office in charge 172 00:10:38,800 --> 00:10:42,200 Speaker 1: of computer safety. Most agencies responded that they did not 173 00:10:42,320 --> 00:10:44,800 Speaker 1: know who that individual was, or that they did not 174 00:10:44,920 --> 00:10:47,960 Speaker 1: know if such a position existed, or that the position 175 00:10:48,000 --> 00:10:51,000 Speaker 1: was spread over numerous departments. Like who's in charge of 176 00:10:51,040 --> 00:10:55,840 Speaker 1: security at the State Department? They're like department like like 177 00:10:55,960 --> 00:10:59,800 Speaker 1: security security and the front door diversity. He plays a 178 00:10:59,840 --> 00:11:03,959 Speaker 1: lot of games. Um so, but this is lot's changed 179 00:11:04,000 --> 00:11:07,959 Speaker 1: since then. But still, um so, this subcommittee, were they 180 00:11:08,000 --> 00:11:14,080 Speaker 1: just reacting to the smash hit movies hackers? Likely? No, 181 00:11:14,440 --> 00:11:17,719 Speaker 1: there was a specific hack that was detailed in Appendix 182 00:11:17,720 --> 00:11:22,160 Speaker 1: B to the report, and this is a cautionary tale, um, 183 00:11:22,200 --> 00:11:24,880 Speaker 1: they said, quote the following case study is a good 184 00:11:24,880 --> 00:11:27,520 Speaker 1: illustration of the type of threat facing our Department of 185 00:11:27,559 --> 00:11:32,319 Speaker 1: Defense information infrastructure. Although the incident has been fully investigated 186 00:11:32,320 --> 00:11:36,000 Speaker 1: by the Air Force Office of Special Investigations, numerous questions 187 00:11:36,000 --> 00:11:41,119 Speaker 1: remain unanswered. So now we're not just talking like random 188 00:11:41,160 --> 00:11:44,079 Speaker 1: business at at the at the government level. We're talking 189 00:11:44,080 --> 00:11:46,679 Speaker 1: about Air Force. So it's like some war games kind 190 00:11:46,720 --> 00:11:48,480 Speaker 1: of stuff, like the attacked into the d D and 191 00:11:48,520 --> 00:11:51,679 Speaker 1: they're like getting nuclear. Do you want to play a game? 192 00:11:52,360 --> 00:11:57,240 Speaker 1: So let's talk hackers. My story today. What's important is 193 00:11:57,240 --> 00:12:00,160 Speaker 1: what I'm going to talk about. It's a grouse him 194 00:12:00,200 --> 00:12:03,360 Speaker 1: to some a buddy story. Two young hackers taken on 195 00:12:03,440 --> 00:12:06,360 Speaker 1: the world. The first guy someone you've already heard of, 196 00:12:07,000 --> 00:12:12,600 Speaker 1: Angelina Jolie, Yes, her, No, it's Matthew Bevan. He was 197 00:12:13,200 --> 00:12:15,240 Speaker 1: the name sounds familiar. He was, Yeah, he was on 198 00:12:15,240 --> 00:12:20,560 Speaker 1: that British TV show The Heist, starring our Personal Savior. Um. 199 00:12:20,559 --> 00:12:23,600 Speaker 1: He was a Welshman, or is a Welshman internationally known. 200 00:12:23,720 --> 00:12:29,680 Speaker 1: He's still he's permanently internationally known. Hacker started young, he 201 00:12:29,760 --> 00:12:32,880 Speaker 1: eventually became a white hat security expert who knows what 202 00:12:32,920 --> 00:12:35,960 Speaker 1: he's doing today, we're hoping for his best life. But 203 00:12:36,040 --> 00:12:40,960 Speaker 1: let's go back to the start. Born four Whales, Europe. 204 00:12:43,679 --> 00:12:47,360 Speaker 1: His dad was a cop. So he gets his first computer, 205 00:12:47,720 --> 00:12:51,360 Speaker 1: first real six during when he's twelve, and when he's 206 00:12:51,400 --> 00:12:56,240 Speaker 1: fifteen he gets his first real mode M from my 207 00:12:56,320 --> 00:13:00,319 Speaker 1: fellow math deficients. Right, okay, so it seems kind early 208 00:13:00,360 --> 00:13:03,080 Speaker 1: for modems in such eight nine, at least for like 209 00:13:03,080 --> 00:13:05,480 Speaker 1: the average person. Yeah. I had a friend whose father 210 00:13:05,559 --> 00:13:07,720 Speaker 1: was a journalist and he used a modem to send 211 00:13:07,760 --> 00:13:09,880 Speaker 1: his newspaper column in and we thought that was why 212 00:13:10,200 --> 00:13:12,520 Speaker 1: had put a phone on this thing? Yeah, the little 213 00:13:12,520 --> 00:13:15,880 Speaker 1: cradle thing. Well there there's little Matthew scouting and computing. 214 00:13:16,440 --> 00:13:20,800 Speaker 1: You know. I mentioned it in the heist episode that 215 00:13:20,880 --> 00:13:25,120 Speaker 1: he got his modem and he started freaking freaking out 216 00:13:25,240 --> 00:13:29,320 Speaker 1: with the girl, free phone calls, hacking the phone, mainframe 217 00:13:29,400 --> 00:13:32,920 Speaker 1: and the so on the week. So that then got 218 00:13:33,000 --> 00:13:35,760 Speaker 1: him internet access. And since it's the early days, not 219 00:13:35,880 --> 00:13:40,160 Speaker 1: everything is online, everything college networks. Yeah, but the stuff 220 00:13:40,200 --> 00:13:44,560 Speaker 1: that is connected, he's just tuting right on in now. Um, 221 00:13:44,679 --> 00:13:50,200 Speaker 1: he picked his hacker name Cougie. Yeah, comes from cougi kiri. 222 00:13:50,400 --> 00:13:53,400 Speaker 1: Are you familiar with that? Hell? No, that's I'm ashamed 223 00:13:53,400 --> 00:13:56,120 Speaker 1: for you. Um as we as the rest of us 224 00:13:56,120 --> 00:13:59,480 Speaker 1: all know it's ninja sign language. Is it really that is? 225 00:14:00,360 --> 00:14:02,640 Speaker 1: I'm not making that one up. It's hand signs that 226 00:14:02,760 --> 00:14:07,160 Speaker 1: ninja's used to call upon their powers when they're in danger. So, 227 00:14:07,720 --> 00:14:10,840 Speaker 1: according to my new favorite website, Way of the Ninja 228 00:14:10,920 --> 00:14:16,040 Speaker 1: dot Com, kuji means nine symbols, and kirie refers to 229 00:14:16,080 --> 00:14:22,920 Speaker 1: the cutting motion, and the nine symbols are written pyo, toe, shah, kai, jin, retzu, zai, 230 00:14:23,120 --> 00:14:25,320 Speaker 1: and zen. I know I'm saying things wrong and I 231 00:14:25,520 --> 00:14:29,880 Speaker 1: deep apologies for that. Each symbol, according to this website quote, 232 00:14:29,920 --> 00:14:32,560 Speaker 1: each symbol has a specific meaning, so to invoke a 233 00:14:32,640 --> 00:14:36,760 Speaker 1: specific ability, you have to perform the correct symbol. For example, 234 00:14:37,040 --> 00:14:40,200 Speaker 1: if a ninja gets injured, he'd performed the kujie symbol 235 00:14:40,240 --> 00:14:43,480 Speaker 1: for healing while in a meditative state. In other words, 236 00:14:43,560 --> 00:14:46,800 Speaker 1: kuji kiri is like a meditative prayer. The combination of 237 00:14:46,840 --> 00:14:51,080 Speaker 1: hand signs, breath and visualization induces a powerful mental state. 238 00:14:51,640 --> 00:14:55,240 Speaker 1: There's no proof of people gaining extraordinary senses or healing powers. 239 00:14:55,480 --> 00:14:58,720 Speaker 1: What cougie does is to trigger a specific mental state. 240 00:14:58,760 --> 00:15:02,120 Speaker 1: For a shinobi, this optimal state of mine helps him 241 00:15:02,120 --> 00:15:04,600 Speaker 1: function well under stress. It may also create the ideal 242 00:15:04,600 --> 00:15:08,120 Speaker 1: conditions for his body to recover tad faster. I'm kind 243 00:15:08,120 --> 00:15:10,600 Speaker 1: of embarrassed to admit, but at one time I did 244 00:15:10,680 --> 00:15:12,160 Speaker 1: know this when I was a twelve year old boy, 245 00:15:12,200 --> 00:15:16,240 Speaker 1: and I was like, oh, I know, you can't. You 246 00:15:16,280 --> 00:15:18,720 Speaker 1: know you can't be a twelve year old boy and 247 00:15:18,720 --> 00:15:20,800 Speaker 1: I have a little bit of ninja. Oh my god, 248 00:15:20,800 --> 00:15:22,640 Speaker 1: I had a lot of ninja and like folding up 249 00:15:22,680 --> 00:15:25,360 Speaker 1: throwing stars. Yeah, we used to go down to Chinatown 250 00:15:25,360 --> 00:15:27,200 Speaker 1: and buy them. In fact, one of my favorite memories 251 00:15:27,240 --> 00:15:29,240 Speaker 1: is coming back from Chinatown throwing them up in the 252 00:15:29,240 --> 00:15:31,560 Speaker 1: air and we were wearing, you know, flip flops, and 253 00:15:31,600 --> 00:15:33,560 Speaker 1: the ninja star fell and hit my friend in the 254 00:15:33,560 --> 00:15:35,560 Speaker 1: foot and blood spread it up higher than his head. 255 00:15:35,720 --> 00:15:37,600 Speaker 1: Can we talk about how that's here one of your 256 00:15:37,640 --> 00:15:40,200 Speaker 1: favorite memories, you said, because we were so happy to 257 00:15:40,200 --> 00:15:42,400 Speaker 1: get the ninja stars, And it's about the ninja stars, 258 00:15:42,440 --> 00:15:44,720 Speaker 1: not about the blood, not about the guys are of blood. 259 00:15:44,880 --> 00:15:47,560 Speaker 1: But he was impressive. He was impressed. It sounds it well. 260 00:15:47,560 --> 00:15:52,720 Speaker 1: So Matthew called himself, Guji go on um, I need 261 00:15:52,720 --> 00:15:56,400 Speaker 1: to take a break right now and practice my cog kitty. Um, 262 00:15:56,480 --> 00:15:58,560 Speaker 1: let's listen to some ads. When we come back, I'm 263 00:15:58,600 --> 00:16:00,800 Speaker 1: going to tell you about Cougie served from the Web 264 00:16:00,840 --> 00:16:25,520 Speaker 1: in search of alien life. All right, Saron. When we 265 00:16:25,640 --> 00:16:30,040 Speaker 1: left off, Matthew Bevan a k a. Cougi was crafting 266 00:16:30,120 --> 00:16:33,160 Speaker 1: a mission, my favorite hacking in Ninja. Yes, he's doing 267 00:16:33,160 --> 00:16:37,160 Speaker 1: a hacking mission. He started small colleges businesses because not 268 00:16:37,200 --> 00:16:40,640 Speaker 1: a lot of stuff was online like the Prodigy network 269 00:16:40,680 --> 00:16:43,280 Speaker 1: back then. Yeah, he and his hacker pals, they'd race 270 00:16:43,320 --> 00:16:45,360 Speaker 1: each other to see who could hack the most systems 271 00:16:45,360 --> 00:16:50,480 Speaker 1: in two hours. So that's fun. In an interview at 272 00:16:50,480 --> 00:16:54,160 Speaker 1: the BBC, he said that hacking was quote perhaps the 273 00:16:54,240 --> 00:16:56,360 Speaker 1: feeling that a parent might get if they find their 274 00:16:56,440 --> 00:16:59,400 Speaker 1: child's diary. They know they should not read it, they 275 00:16:59,400 --> 00:17:03,080 Speaker 1: know it's wrong, but they just can't help themselves. Wow. Right, 276 00:17:03,400 --> 00:17:06,000 Speaker 1: kind of an apt analogy, I think. Yeah. But also 277 00:17:06,119 --> 00:17:09,000 Speaker 1: it's like, so he has a cop for a dad, 278 00:17:09,119 --> 00:17:11,840 Speaker 1: he probably doesn't have a whole lot of like privacy 279 00:17:11,920 --> 00:17:13,760 Speaker 1: and homes. He's like, I know my parents are going 280 00:17:13,800 --> 00:17:16,560 Speaker 1: to get off reading this. Um, they know they shouldn't, 281 00:17:16,760 --> 00:17:20,200 Speaker 1: but they can help themselves. So he and his pals 282 00:17:20,560 --> 00:17:25,440 Speaker 1: hacking it up hack in the USA, well, uk, okay. 283 00:17:25,760 --> 00:17:28,240 Speaker 1: One of his pals is a teenage boy and he's like, 284 00:17:28,440 --> 00:17:30,440 Speaker 1: you know, Matthews and his early twenties at this point, 285 00:17:30,520 --> 00:17:34,760 Speaker 1: teenage boy named Richard Price who called himself data stream cowboy, 286 00:17:35,320 --> 00:17:38,960 Speaker 1: data stream cowboy. Huh. Now what I love is that 287 00:17:39,040 --> 00:17:41,360 Speaker 1: the government kind of insults him and only calls him 288 00:17:41,400 --> 00:17:45,320 Speaker 1: data stream. How can you drop the cowboy, dude? I mean, 289 00:17:45,359 --> 00:17:47,320 Speaker 1: it reminds me of drug Store Cowboy, one of my 290 00:17:47,440 --> 00:17:50,160 Speaker 1: favorite nineties movies. I can never hear the words drug 291 00:17:50,200 --> 00:17:53,120 Speaker 1: store that. Secretly my head, I think they're just dropping 292 00:17:53,119 --> 00:17:55,760 Speaker 1: it so that first of all, it makes him feel 293 00:17:55,760 --> 00:17:57,840 Speaker 1: a little familiar and he's a kid, and then they're 294 00:17:57,880 --> 00:18:01,840 Speaker 1: like insulting him. But I'll so maybe because in those 295 00:18:01,920 --> 00:18:04,280 Speaker 1: days you had to print things up in hard copy, 296 00:18:04,400 --> 00:18:06,479 Speaker 1: if you took the word cowboy out, it would reduce 297 00:18:06,600 --> 00:18:09,399 Speaker 1: over time the page count and you could save money. 298 00:18:09,720 --> 00:18:15,000 Speaker 1: Really No, we're going to talk about all data stream 299 00:18:15,080 --> 00:18:18,960 Speaker 1: seed later, but um, it was the nineties. Matthew was 300 00:18:19,000 --> 00:18:21,280 Speaker 1: a young man, not a whole lot of real life friends. 301 00:18:21,280 --> 00:18:23,040 Speaker 1: So of course he's a big fan of the X 302 00:18:23,080 --> 00:18:27,119 Speaker 1: Files and he's fascinated with the Roswell incident. I'm not 303 00:18:27,240 --> 00:18:31,320 Speaker 1: capping on him for that at all. Fascinated right, and 304 00:18:31,359 --> 00:18:36,040 Speaker 1: I loved the x He'd hear about hackers breaking into 305 00:18:36,119 --> 00:18:39,080 Speaker 1: army and navy bases to find information about UFOs. He's like, 306 00:18:39,119 --> 00:18:41,120 Speaker 1: you know what, I'm gonna give it a try. Why 307 00:18:41,119 --> 00:18:46,560 Speaker 1: not me? So so I want in. So there were 308 00:18:46,680 --> 00:18:51,840 Speaker 1: rumors of forty previous hackers who tried this to get 309 00:18:51,880 --> 00:18:56,080 Speaker 1: into all these military things, and then they disappeared. They disappeared, 310 00:18:56,560 --> 00:18:59,359 Speaker 1: get out. But you know what, Matthew, how did they 311 00:18:59,359 --> 00:19:01,840 Speaker 1: know the hackers disappear? Like did hacker community say like 312 00:19:01,840 --> 00:19:03,719 Speaker 1: they stopped all of a sudden, they're not logging on. 313 00:19:03,800 --> 00:19:06,040 Speaker 1: They're like, well, yeah, but is that okay? I don't know. 314 00:19:06,240 --> 00:19:09,520 Speaker 1: They weren't like disappeared, disappeared like black helicopters. It's a rumor. 315 00:19:09,640 --> 00:19:11,680 Speaker 1: So I'm sure that some people heard that, yeah, black 316 00:19:11,720 --> 00:19:13,960 Speaker 1: helicopters came or they were thrown in vans. Other people 317 00:19:14,000 --> 00:19:15,560 Speaker 1: are like, I haven't seen them online in a while, 318 00:19:16,160 --> 00:19:21,199 Speaker 1: so you know yeah. Um, Matthew took my informal motto 319 00:19:21,240 --> 00:19:23,080 Speaker 1: who knows who cares? And he just went with it. 320 00:19:23,240 --> 00:19:25,960 Speaker 1: Who knows who cares, I'm going to try it. So 321 00:19:26,080 --> 00:19:29,359 Speaker 1: he summons data stream Cowboy, and I just like to 322 00:19:29,400 --> 00:19:32,120 Speaker 1: imagine they're both wearing like crushed velvet capes. I don't 323 00:19:32,119 --> 00:19:34,880 Speaker 1: know why. And then they get their freak on. Okay, 324 00:19:34,960 --> 00:19:37,040 Speaker 1: so there's just a couple of freaks off the leash. 325 00:19:37,080 --> 00:19:40,320 Speaker 1: Am I right? People, is this thing on? Um? They 326 00:19:40,400 --> 00:19:42,560 Speaker 1: wanted to know what the FEDS had on the UFOs, 327 00:19:42,600 --> 00:19:45,639 Speaker 1: the UFOs, as we say in the biz. It was 328 00:19:45,680 --> 00:19:49,240 Speaker 1: the nineties X files, the rage Internet spreading out like 329 00:19:49,280 --> 00:19:54,919 Speaker 1: a cancer across the globe. And there's kan data stream here, 330 00:19:55,600 --> 00:19:59,880 Speaker 1: cancer totally righting the cancer. He ha, Okay, so Matthew, 331 00:20:00,000 --> 00:20:03,119 Speaker 1: a web of cancer, a couple of freaks off the leash. 332 00:20:03,359 --> 00:20:06,680 Speaker 1: Matthew hacks into the computer network at Air Forces Rome 333 00:20:06,800 --> 00:20:10,280 Speaker 1: Laboratory at what was then Griffith's Air Force Base in Rome, 334 00:20:10,320 --> 00:20:12,760 Speaker 1: New York. Did you know I've been to that Air 335 00:20:12,760 --> 00:20:14,720 Speaker 1: Force base? I did, and I wanted to talk to 336 00:20:14,720 --> 00:20:16,520 Speaker 1: you about that. No, I had no idea. How would 337 00:20:16,560 --> 00:20:19,280 Speaker 1: I know about? Because, my good dude, that's where they 338 00:20:19,320 --> 00:20:25,440 Speaker 1: held with stock yours truly right there. The whole time 339 00:20:25,600 --> 00:20:29,400 Speaker 1: I forgot you suffered through I was working for Mother 340 00:20:29,480 --> 00:20:32,400 Speaker 1: Jones magazine at the time, and we're doing like marketing 341 00:20:32,440 --> 00:20:35,480 Speaker 1: stuff there but also very loosely covering it for the 342 00:20:35,560 --> 00:20:39,119 Speaker 1: Mojo website and as a whole other story for a 343 00:20:39,119 --> 00:20:45,200 Speaker 1: whole other time. You've written about this medium, ye, so 344 00:20:45,320 --> 00:20:47,960 Speaker 1: that Yeah, I've been to this Air Force base. I 345 00:20:47,960 --> 00:20:51,199 Speaker 1: haven't been in like the brain center of it, the 346 00:20:51,240 --> 00:20:54,280 Speaker 1: computer because it was decommissioned when I was there. You 347 00:20:54,400 --> 00:20:59,040 Speaker 1: just suffered anyway, Oh yeah, smelled terrible anyway. Time in 348 00:20:59,080 --> 00:21:02,680 Speaker 1: the hack Row Lab was quote the Air Forces Premier 349 00:21:02,720 --> 00:21:08,159 Speaker 1: Command and Control research facility. Its projects included artificial intelligence system, 350 00:21:08,280 --> 00:21:12,360 Speaker 1: radar guidance system, and target detection and tracking system. Why 351 00:21:12,480 --> 00:21:14,480 Speaker 1: is this description side? It comes with a slow gin 352 00:21:14,600 --> 00:21:20,119 Speaker 1: fizz like it happens when you when you go into 353 00:21:20,160 --> 00:21:22,560 Speaker 1: the Internet now and you type it in. That's what 354 00:21:22,680 --> 00:21:26,120 Speaker 1: comes out of your computer. That sound the voice anytime 355 00:21:26,119 --> 00:21:28,359 Speaker 1: you want a description of anything important. Did you ever 356 00:21:28,400 --> 00:21:29,920 Speaker 1: notice now if you go to look at anything for 357 00:21:29,960 --> 00:21:31,600 Speaker 1: the Internet when you research it's like, oh, did you 358 00:21:31,600 --> 00:21:34,640 Speaker 1: want to buy that? I'll go and research anything. It's like, oh, hey, 359 00:21:34,640 --> 00:21:36,520 Speaker 1: did you want to buy that Air Force base? I'm like, Oh, 360 00:21:36,640 --> 00:21:38,680 Speaker 1: I just wanted would you like to buy a black 361 00:21:38,720 --> 00:21:44,440 Speaker 1: hole hook me up, So Maddie bevans uh, he said. 362 00:21:44,520 --> 00:21:48,040 Speaker 1: His quote soul tool was a Commodore Amiga loaded with 363 00:21:48,119 --> 00:21:51,760 Speaker 1: blue boxing program called rocks Box Hell. Yes, shout out 364 00:21:51,800 --> 00:21:54,280 Speaker 1: to the Amiga I had. My brother and I had 365 00:21:54,280 --> 00:21:56,840 Speaker 1: an Amiga when we were growing up. Yeah, my neighbor 366 00:21:56,920 --> 00:21:59,560 Speaker 1: Ja had when we loved it are it was so 367 00:22:00,119 --> 00:22:04,159 Speaker 1: way too sophisticated for our use, Like we played kids 368 00:22:04,320 --> 00:22:06,959 Speaker 1: educational games like he had to solve math problems and 369 00:22:07,000 --> 00:22:10,600 Speaker 1: collect carmins to like navigate a castle. That was what 370 00:22:10,760 --> 00:22:13,600 Speaker 1: I did on there. My grandma got us that computer 371 00:22:13,720 --> 00:22:17,600 Speaker 1: at this craziest store in Berkeley that was half computer 372 00:22:17,680 --> 00:22:22,600 Speaker 1: store half tennis store. It was called it was called 373 00:22:22,640 --> 00:22:28,640 Speaker 1: Winner's Circle. It legitimately sold computers and tennis gear interests. 374 00:22:28,800 --> 00:22:31,399 Speaker 1: I think, Yeah, I thought I was misremembering it and 375 00:22:31,440 --> 00:22:34,280 Speaker 1: like confusing two stores, and I was like, hold on 376 00:22:34,320 --> 00:22:36,520 Speaker 1: a second. I had to look it up their old 377 00:22:36,600 --> 00:22:39,720 Speaker 1: YELP reviews at this place that it doesn't exist anywhere, 378 00:22:39,760 --> 00:22:42,960 Speaker 1: but it existed. Then I got my rackets restrung there. 379 00:22:43,200 --> 00:22:44,879 Speaker 1: But then we'd also be like can I get a 380 00:22:44,920 --> 00:22:50,280 Speaker 1: cool educational game like popular kids would do? Like I 381 00:22:50,320 --> 00:22:53,400 Speaker 1: may have been wearing orthoped or like orthodontic net gear 382 00:22:54,640 --> 00:22:56,040 Speaker 1: when I went in there. I don't know who's to 383 00:22:56,080 --> 00:22:59,600 Speaker 1: say whatever. So Matthew, he had an Amiga shout out 384 00:22:59,640 --> 00:23:02,800 Speaker 1: to him. He goes um he hacked the Rome Lab. 385 00:23:03,400 --> 00:23:05,480 Speaker 1: He said he was doing it because he wanted to 386 00:23:05,600 --> 00:23:09,320 Speaker 1: like prove UFO conspiracy stuff. He said, I was not 387 00:23:09,480 --> 00:23:15,120 Speaker 1: interested in weapons codes, just the UFOs um. He thought 388 00:23:15,200 --> 00:23:17,760 Speaker 1: that they were totally hiding UFO information. He wanted to 389 00:23:17,760 --> 00:23:20,040 Speaker 1: find out what it was. He said, quote. There were 390 00:23:20,080 --> 00:23:22,879 Speaker 1: a lot of weird coincidences which add up to the 391 00:23:22,920 --> 00:23:26,280 Speaker 1: possibility of it most likely being true. I like to 392 00:23:26,320 --> 00:23:30,479 Speaker 1: think what I saw was not misinformation. He saw some stuff. 393 00:23:31,600 --> 00:23:33,320 Speaker 1: Did he tell the blink when a D two guy? 394 00:23:33,520 --> 00:23:37,199 Speaker 1: That's my question. So the Air Force figured out pretty 395 00:23:37,200 --> 00:23:39,480 Speaker 1: soon that there were two people they didn't know who 396 00:23:39,800 --> 00:23:42,280 Speaker 1: who had hacked into seven of the computer systems at 397 00:23:42,359 --> 00:23:46,720 Speaker 1: Rome Labs and gained complete access to all the information 398 00:23:46,720 --> 00:23:51,000 Speaker 1: in their systems. Just waltzed right in. They downloaded data files. 399 00:23:51,480 --> 00:23:55,440 Speaker 1: They installed sniffer software programs on each of the seven systems, 400 00:23:55,720 --> 00:23:59,000 Speaker 1: which meant they were able to read, copy and delete emails, 401 00:23:59,720 --> 00:24:05,600 Speaker 1: read and copy sensitive unclassified battlefield simulation programmed data like 402 00:24:05,640 --> 00:24:07,800 Speaker 1: they were just poking around where they really shouldn't have been. 403 00:24:08,200 --> 00:24:11,560 Speaker 1: So the Air Force realizes, okay, we got to two 404 00:24:11,560 --> 00:24:14,040 Speaker 1: creepers in here. They figure, we're going to leave a 405 00:24:14,040 --> 00:24:17,080 Speaker 1: couple of these hacked systems open, but secure the other 406 00:24:17,119 --> 00:24:19,320 Speaker 1: one so that we can trace them if they come 407 00:24:19,320 --> 00:24:24,880 Speaker 1: in again. So April four, the Air Force they see 408 00:24:25,000 --> 00:24:28,840 Speaker 1: Cougie Sneak Sneak Sneak doing little hand signs into the 409 00:24:28,920 --> 00:24:34,199 Speaker 1: Goddard Space Flight Center at green Belt, Maryland, and they 410 00:24:34,200 --> 00:24:36,280 Speaker 1: said they were able to cut his connection before he 411 00:24:36,320 --> 00:24:40,200 Speaker 1: could take any information. That same day, the Air Force 412 00:24:40,240 --> 00:24:43,040 Speaker 1: said he also attempted to hack into Write Patterson Air 413 00:24:43,080 --> 00:24:46,199 Speaker 1: Force Base. Now Right Patterson is where a lot of 414 00:24:46,280 --> 00:24:50,760 Speaker 1: UFOs allegedly stored. So the next day, on April fifteen, 415 00:24:50,880 --> 00:24:53,480 Speaker 1: the Air Force said that they saw him trying to 416 00:24:53,520 --> 00:24:57,280 Speaker 1: break into Right Patterson again, as well as NATO headquarters 417 00:24:57,280 --> 00:25:02,679 Speaker 1: in Brussels. You know why listen, It's like you're wandering around. 418 00:25:02,720 --> 00:25:05,760 Speaker 1: You see a nice little shop, like, oh, I will 419 00:25:05,800 --> 00:25:09,040 Speaker 1: go in there for a second. You know. It's like 420 00:25:09,080 --> 00:25:10,480 Speaker 1: you go to the store and when they're like did 421 00:25:10,520 --> 00:25:12,440 Speaker 1: you find everything? Okay? You know what actually I found 422 00:25:12,480 --> 00:25:17,000 Speaker 1: more than I needed. That's him poking around. So there's 423 00:25:17,000 --> 00:25:20,240 Speaker 1: this guy named Ryan Sprague, and he's a regular on 424 00:25:20,359 --> 00:25:24,480 Speaker 1: such hit shows as Mysteries Decoded Ancient Aliens, one of 425 00:25:24,520 --> 00:25:28,439 Speaker 1: your favorites, hard hitting stuff. He wrote a piece on 426 00:25:28,600 --> 00:25:33,320 Speaker 1: medium about this, so well vetted um. He said that 427 00:25:33,400 --> 00:25:36,879 Speaker 1: Matthew realized, after spending some time on those computers that 428 00:25:36,960 --> 00:25:40,640 Speaker 1: he quote had the potential to single handedly launched missiles 429 00:25:40,640 --> 00:25:44,119 Speaker 1: from the base. Wisely, he decided to veer his focus 430 00:25:44,200 --> 00:25:47,280 Speaker 1: away from warfare and concentrated solely on trying to find 431 00:25:47,320 --> 00:25:51,520 Speaker 1: any information related to highly advanced aircraft searching for space 432 00:25:51,560 --> 00:25:54,679 Speaker 1: related activity. He first looked at Goddard Space Center. He 433 00:25:54,760 --> 00:25:57,199 Speaker 1: began to download and copy dozens of files that he 434 00:25:57,200 --> 00:26:00,040 Speaker 1: had found about space related technology. But this did and 435 00:26:00,080 --> 00:26:03,080 Speaker 1: seemed to satisfy his appetite, and then he shifted his 436 00:26:03,200 --> 00:26:06,199 Speaker 1: focus to a base that held a hefty reputation for 437 00:26:06,240 --> 00:26:10,840 Speaker 1: supposedly storing the wreckage of a down UFO Right Patterson 438 00:26:10,880 --> 00:26:14,760 Speaker 1: Air Force Base. So Matthew admits, you know what, I'm 439 00:26:14,800 --> 00:26:17,400 Speaker 1: just doing it out of curiosity. But my call, Lee, 440 00:26:17,440 --> 00:26:20,440 Speaker 1: it's so easy. That's the other reason. It's like takes 441 00:26:20,480 --> 00:26:24,359 Speaker 1: no effort. There's this website great spacing dot com. I 442 00:26:24,480 --> 00:26:31,440 Speaker 1: found the Yeah, they said that Matthew found information from 443 00:26:31,560 --> 00:26:35,119 Speaker 1: Right Patterson because they're the ones who supposedly had the 444 00:26:35,280 --> 00:26:40,240 Speaker 1: Roswell incident stuff. And then he also supposedly found a 445 00:26:40,240 --> 00:26:44,080 Speaker 1: description about um the powerful engine that was in the 446 00:26:44,200 --> 00:26:50,600 Speaker 1: Roswell Incident Technology vehicle UFO Space Sky thing is so 447 00:26:50,720 --> 00:26:54,800 Speaker 1: much fun. So he also found files about Room eighteen, 448 00:26:55,720 --> 00:27:00,480 Speaker 1: and he was heavily questioned about what he knew about 449 00:27:00,520 --> 00:27:02,760 Speaker 1: Room eighteen when they finally caught him. Did you know 450 00:27:02,800 --> 00:27:06,680 Speaker 1: there's a Megadeth song called Hangar eighteen that is about 451 00:27:06,680 --> 00:27:09,320 Speaker 1: it's about this place. Yeah, Hangar eight teen, Room eighteen. 452 00:27:09,400 --> 00:27:12,600 Speaker 1: It's supposedly an area fifty one where they keep all 453 00:27:12,600 --> 00:27:19,920 Speaker 1: the special all the alien interstellar I'm sorry, but if 454 00:27:19,960 --> 00:27:23,439 Speaker 1: Mega Death wrote a song about it, it's Legit has 455 00:27:23,480 --> 00:27:25,480 Speaker 1: never lied once, and it's not only knows is the 456 00:27:25,480 --> 00:27:29,119 Speaker 1: truth and guitar licks. Yeah, that's it. Pure. So the 457 00:27:29,200 --> 00:27:32,040 Speaker 1: Air Force they finally figure out who these people are, right, 458 00:27:32,440 --> 00:27:35,920 Speaker 1: and they figure they're working together. Cougie data stream cowboy 459 00:27:36,080 --> 00:27:39,320 Speaker 1: or just data stream to the overly familiar FETs or 460 00:27:39,400 --> 00:27:43,760 Speaker 1: Mr Cowboys. You're nasty, So they figured that Cougie was 461 00:27:43,840 --> 00:27:48,080 Speaker 1: like coaching data Stream via online chat sessions when he 462 00:27:48,119 --> 00:27:50,880 Speaker 1: would have a trouble and then data Stream would try 463 00:27:50,880 --> 00:27:56,280 Speaker 1: again successfully. So per the Senate Subcommittee hearing a few 464 00:27:56,359 --> 00:27:59,840 Speaker 1: years later, quote Cougie was a far more sophisticated hacker 465 00:27:59,840 --> 00:28:03,040 Speaker 1: than the sixteen year old data Stream. Air Force investigators 466 00:28:03,040 --> 00:28:05,199 Speaker 1: were able to observe that Cougie would only stay on 467 00:28:05,200 --> 00:28:07,399 Speaker 1: a telephone line is short time, not long enough to 468 00:28:07,440 --> 00:28:10,639 Speaker 1: be traced successfully. So he's just you know, pushing him 469 00:28:10,640 --> 00:28:12,560 Speaker 1: and go on out there. You you poke around, You 470 00:28:12,560 --> 00:28:16,040 Speaker 1: tell me what you find, uh, data Stream, though he wasn't. 471 00:28:16,200 --> 00:28:19,040 Speaker 1: He did big dog stuff on his own too. He 472 00:28:19,119 --> 00:28:24,240 Speaker 1: hacked into a couple of NASA's systems, Lockheed Martin and 473 00:28:24,280 --> 00:28:29,320 Speaker 1: then allegedly another NATO computer. Um. But his next hack 474 00:28:29,440 --> 00:28:33,680 Speaker 1: is what really got him on the radar for US officials. 475 00:28:34,440 --> 00:28:38,440 Speaker 1: He somehow got into a system in Korea and obtained 476 00:28:38,520 --> 00:28:43,560 Speaker 1: all the data stored on the Korean Atomic Research Institute system, 477 00:28:43,640 --> 00:28:47,000 Speaker 1: and then he took it and deposited it in Rome 478 00:28:47,160 --> 00:28:53,360 Speaker 1: Labs files. So, like the people of Rome, all this 479 00:28:53,520 --> 00:28:56,080 Speaker 1: Korean stuff pops up, and at first they don't know 480 00:28:56,240 --> 00:29:00,160 Speaker 1: North Korean, South Korean. It just says Korean, and I mean, 481 00:29:00,200 --> 00:29:02,640 Speaker 1: I I don't understand how they get confused by this, 482 00:29:02,720 --> 00:29:05,800 Speaker 1: but what have you? Um. They were probably waiting on 483 00:29:05,840 --> 00:29:08,640 Speaker 1: a translator. They're like, Okay, this is Korean, but I 484 00:29:08,640 --> 00:29:11,160 Speaker 1: don't know what stripe so um. But the problem is 485 00:29:11,160 --> 00:29:13,640 Speaker 1: if it's North Korea, the North Koreans are going to 486 00:29:13,720 --> 00:29:16,760 Speaker 1: think that this is like an aggressive act of war. Luckily, 487 00:29:17,440 --> 00:29:20,480 Speaker 1: a few hours later, I suppose they wrestled up a translator, 488 00:29:20,560 --> 00:29:22,520 Speaker 1: they figured out that he had hacked into the South 489 00:29:22,600 --> 00:29:26,240 Speaker 1: Korean Atomic Research Institute, so they're able to smooth it over, like, hey, look, 490 00:29:26,240 --> 00:29:29,600 Speaker 1: we had a problem on our end. Uh. The US 491 00:29:30,240 --> 00:29:33,600 Speaker 1: believed that that these hacks had quote caused more harm 492 00:29:33,600 --> 00:29:36,360 Speaker 1: than the KGB and made him a number one threat 493 00:29:36,400 --> 00:29:41,200 Speaker 1: to the world. Were they being a little hyperbol slightly slightly, 494 00:29:41,240 --> 00:29:44,880 Speaker 1: but I mean because they're thinking, he has all this 495 00:29:45,000 --> 00:29:48,280 Speaker 1: free access. If he did this under our noses, totally unexpectedly, 496 00:29:48,280 --> 00:29:52,440 Speaker 1: what else could he do? According to Matthew, Special agent 497 00:29:52,520 --> 00:29:55,760 Speaker 1: Jim Christie at the Air Force Office of Special Investigations 498 00:29:55,800 --> 00:29:58,160 Speaker 1: claimed that the work of Kujie and Dad Stream quote 499 00:29:58,560 --> 00:30:02,400 Speaker 1: nearly started a Third World War and then a Pentagon 500 00:30:02,480 --> 00:30:06,200 Speaker 1: source allegedly said that he was possibly the single biggest 501 00:30:06,240 --> 00:30:10,160 Speaker 1: threat to world peace since Adolf Hitler. Don't hope her stated, 502 00:30:10,480 --> 00:30:14,720 Speaker 1: I mean like a couple of other candidates, but whatever, 503 00:30:15,160 --> 00:30:18,800 Speaker 1: a couple a few. So in a twenty six day period, 504 00:30:19,800 --> 00:30:22,480 Speaker 1: these two then unknown hackers, they struck more than a 505 00:30:22,560 --> 00:30:26,040 Speaker 1: hundred and fifty times. So they're just one after another. 506 00:30:26,400 --> 00:30:30,000 Speaker 1: Military didn't know who they were, where they were, and 507 00:30:30,040 --> 00:30:34,080 Speaker 1: then an informant steps up. I would love to know 508 00:30:34,120 --> 00:30:36,320 Speaker 1: who that was and what their motivation. If we don't 509 00:30:36,320 --> 00:30:39,160 Speaker 1: know who this niche was, it's probably like a you know, 510 00:30:39,400 --> 00:30:42,120 Speaker 1: a hacker who wasn't invited into this cool hacker was 511 00:30:42,120 --> 00:30:44,080 Speaker 1: somebody who knew them. It was like, oh yeah, I'll 512 00:30:44,120 --> 00:30:46,960 Speaker 1: watch this, tell everybody what you're doing. It'll see how 513 00:30:46,960 --> 00:30:50,880 Speaker 1: long that last. Well, thanks to this snitch the FEDS, 514 00:30:51,400 --> 00:30:55,000 Speaker 1: they get pointed towards datastream Cowboy, who is a sixteen 515 00:30:55,080 --> 00:30:57,520 Speaker 1: year old boy named Richard Price lives in the UK. 516 00:30:58,280 --> 00:31:00,840 Speaker 1: He said he liked to attack military sites because of 517 00:31:00,840 --> 00:31:03,560 Speaker 1: how insecure they were. A man named Dick Price, who 518 00:31:03,560 --> 00:31:06,680 Speaker 1: is going to talk about he's bullying the mill. He's like, oh, 519 00:31:06,680 --> 00:31:09,320 Speaker 1: you're insecure, I'm gonna attack you. He's a bully. Let's 520 00:31:09,320 --> 00:31:13,080 Speaker 1: just put it that way. Now, let's take a little 521 00:31:13,080 --> 00:31:16,520 Speaker 1: look at old the data stream cowboy teen in North London. 522 00:31:16,640 --> 00:31:21,200 Speaker 1: He got a d in computer science, which says a lot. 523 00:31:21,600 --> 00:31:23,200 Speaker 1: I mean, is what it tells me? Is that like? 524 00:31:23,360 --> 00:31:25,200 Speaker 1: Is that a good metric? Well? Is that a good 525 00:31:25,240 --> 00:31:28,920 Speaker 1: metric of your abilities? His family said he'd only been 526 00:31:28,960 --> 00:31:31,760 Speaker 1: like hacking and scooting and rebooting for like six months. 527 00:31:33,480 --> 00:31:36,920 Speaker 1: That's a quote as a direct. I don't want to 528 00:31:36,960 --> 00:31:39,600 Speaker 1: get to. Yeah, I'm sorry. I got two technical there 529 00:31:39,640 --> 00:31:44,440 Speaker 1: pretty second scutin freaking. I'm just learning so much. Everything 530 00:31:44,480 --> 00:31:49,680 Speaker 1: then comes crashing down. Zareny close your eyes, Okay, I 531 00:31:49,720 --> 00:31:56,800 Speaker 1: want you to picture it. It's May of by the 532 00:31:56,840 --> 00:31:59,600 Speaker 1: Crash to stummies somehow clinging to the middle of the 533 00:31:59,720 --> 00:32:05,480 Speaker 1: UK pop shirts shoot by Salt Pepper has just been released. 534 00:32:06,080 --> 00:32:09,520 Speaker 1: It's that time. You live in Collingdale, a suburban district 535 00:32:09,600 --> 00:32:12,040 Speaker 1: in the north of London. You're you're a retired woman, 536 00:32:13,400 --> 00:32:17,600 Speaker 1: You're a handsome woman. You're outside of your semi detached house. 537 00:32:17,640 --> 00:32:20,440 Speaker 1: You sweep in the walkway when a bunch of unmarked 538 00:32:20,440 --> 00:32:22,520 Speaker 1: cars comes screeching to a hall in front of your 539 00:32:22,480 --> 00:32:26,600 Speaker 1: neighbor's house across the street. They're a nice family, Nick 540 00:32:26,640 --> 00:32:29,560 Speaker 1: and Allison. They have a boy named Richard. He's a 541 00:32:29,680 --> 00:32:32,719 Speaker 1: quiet sort. He's tall and slender, with that like grown 542 00:32:32,760 --> 00:32:35,920 Speaker 1: out nineties Prince Valiant Bob haircut. You know what I'm 543 00:32:35,920 --> 00:32:39,240 Speaker 1: talking about? It right, I'm gonna grow my hair. Um, 544 00:32:39,400 --> 00:32:43,120 Speaker 1: you wonder what in the world could be going on here? 545 00:32:43,200 --> 00:32:46,360 Speaker 1: But you're not ashamed of your curiosity. What you're like 546 00:32:46,440 --> 00:32:48,320 Speaker 1: one of those hackers you might have read about in 547 00:32:48,360 --> 00:32:53,400 Speaker 1: the paper. Your only crime is curiosity, Mrs dar You 548 00:32:53,600 --> 00:32:56,720 Speaker 1: lean against your broom, you adjust your glasses. The men 549 00:32:56,840 --> 00:33:00,280 Speaker 1: knock on the door. When Allison answers, they enter. Deuced 550 00:33:00,320 --> 00:33:04,280 Speaker 1: themselves as investigators with the Scotland Yard Computer Crime Unit. 551 00:33:04,560 --> 00:33:08,880 Speaker 1: I was hoping for Flying Squad Allison. Yeah, Allison seems confused. 552 00:33:08,960 --> 00:33:13,240 Speaker 1: She invites him in. But you're criminally curious, remember right, 553 00:33:13,440 --> 00:33:16,280 Speaker 1: So you hike up your nylons and scurry across the road. 554 00:33:16,400 --> 00:33:19,480 Speaker 1: You like leap over the low brick walls around their 555 00:33:19,560 --> 00:33:21,760 Speaker 1: back garden, just like take it with one hand on 556 00:33:21,800 --> 00:33:24,600 Speaker 1: the wall and jump over. Um. You I mean, like 557 00:33:24,720 --> 00:33:27,120 Speaker 1: you clear that sprit thing and you just like spring 558 00:33:27,160 --> 00:33:30,960 Speaker 1: down like a lynx. You are. You creep over to 559 00:33:31,000 --> 00:33:33,400 Speaker 1: the window to Richard's room. I don't want to know 560 00:33:33,440 --> 00:33:36,400 Speaker 1: how you know that's his window and he doesn't have curtains, 561 00:33:36,440 --> 00:33:37,920 Speaker 1: and I don't want to know how you knew that. 562 00:33:39,480 --> 00:33:42,280 Speaker 1: You're so creepy, oldy, So you peek in and you 563 00:33:42,320 --> 00:33:45,280 Speaker 1: see as Allison leads the cops into Richard's room, he 564 00:33:45,360 --> 00:33:48,280 Speaker 1: looks up at him. One says data stream cowboy. I 565 00:33:48,360 --> 00:33:53,920 Speaker 1: presume that's not what he said. Uh, it was probably 566 00:33:53,920 --> 00:33:59,320 Speaker 1: way more clumsy than that. But we're having an imagination exercise. Richard, 567 00:33:59,400 --> 00:34:01,600 Speaker 1: just like Crump, was to the floor whaling and crying. 568 00:34:01,800 --> 00:34:05,440 Speaker 1: That part not that is true. Um so you old 569 00:34:05,520 --> 00:34:07,960 Speaker 1: ladyes Saron, you you fear the net is closing on 570 00:34:08,040 --> 00:34:12,560 Speaker 1: YouTube if they caught data Stream, maybe they're after your 571 00:34:12,640 --> 00:34:16,400 Speaker 1: hacker persona giga juice, and then you'd be next. So 572 00:34:16,480 --> 00:34:19,239 Speaker 1: you go sprinting off towards your secret bunker. I've got 573 00:34:19,880 --> 00:34:23,600 Speaker 1: machine back to data Stream. Okay. So his family totally confused. 574 00:34:23,640 --> 00:34:25,800 Speaker 1: They can't imagine that he'd be a hacker. He's on 575 00:34:25,840 --> 00:34:30,759 Speaker 1: the floor crying. He's charged Bundle and he's charged with 576 00:34:30,760 --> 00:34:34,440 Speaker 1: twelve counts of gaining unauthorized access to computer systems, all 577 00:34:34,480 --> 00:34:37,680 Speaker 1: of them US sites. He go on to plead guilty, 578 00:34:37,719 --> 00:34:40,840 Speaker 1: pay a fine, but he wasn't the mastermind. That was Coogee. 579 00:34:41,080 --> 00:34:44,360 Speaker 1: And where's Cougie Right when we come back, I'll let 580 00:34:44,400 --> 00:35:06,840 Speaker 1: you know if Cougie Ninja Power is kicked in. He's Aaron. 581 00:35:08,280 --> 00:35:10,719 Speaker 1: You like those ads. I'm sorry I was adjusting my nylons. 582 00:35:12,080 --> 00:35:14,719 Speaker 1: You miss out. There's those Those commercials are really good 583 00:35:14,760 --> 00:35:16,719 Speaker 1: this time. Oh nice, Well, you can tell me about 584 00:35:16,719 --> 00:35:18,520 Speaker 1: them later. We'll just you know, we'll play him over 585 00:35:18,520 --> 00:35:22,400 Speaker 1: and over. When we left off datas Stream Cowboy he 586 00:35:22,480 --> 00:35:26,160 Speaker 1: got pinched for hacking, but Cougie a k a. Matthew 587 00:35:26,200 --> 00:35:29,520 Speaker 1: Bevan still in the wind US and UK officials have 588 00:35:29,640 --> 00:35:33,160 Speaker 1: no idea who Coogi is, so they get well, they 589 00:35:33,200 --> 00:35:36,359 Speaker 1: got the informant on data Stream, but they didn't have 590 00:35:36,400 --> 00:35:40,040 Speaker 1: any informants for Matthew. I'm guessing datas Dream told one 591 00:35:40,080 --> 00:35:41,839 Speaker 1: of his young friends, and a young friend told their 592 00:35:41,880 --> 00:35:44,520 Speaker 1: parents and their parents cops or something or you rat 593 00:35:44,560 --> 00:35:46,359 Speaker 1: it him out or me. Yeah, because I didn't want 594 00:35:46,360 --> 00:35:48,200 Speaker 1: to find my machine and I was like to take 595 00:35:48,239 --> 00:35:54,840 Speaker 1: a kid exactly. So at first all of the FEDS 596 00:35:54,880 --> 00:35:57,799 Speaker 1: they think it's an Eastern European spy. Of course, that's 597 00:35:58,000 --> 00:36:01,640 Speaker 1: always blame the Eastern Europeans, or that they were working 598 00:36:01,640 --> 00:36:06,440 Speaker 1: for Chinese intelligence. Again, always just go right there. By 599 00:36:06,520 --> 00:36:08,879 Speaker 1: the end of the summer of ninety four, Matthew had 600 00:36:08,920 --> 00:36:12,640 Speaker 1: quit the game, though he stopped hacking on his own volition. 601 00:36:13,000 --> 00:36:15,879 Speaker 1: As we talked about in our heist episode. He said 602 00:36:15,880 --> 00:36:17,919 Speaker 1: it was because he met a girl and that he'd 603 00:36:17,920 --> 00:36:20,400 Speaker 1: be more interested in spending time with her than on 604 00:36:20,440 --> 00:36:24,759 Speaker 1: the computer. Which, you know, that's fair enough. Um. Why 605 00:36:24,800 --> 00:36:26,600 Speaker 1: he couldn't find a girl who was into hacking and 606 00:36:26,600 --> 00:36:28,200 Speaker 1: then they could sit next to each other and hold 607 00:36:28,239 --> 00:36:32,840 Speaker 1: hands while hacking. I don't try it out romantic, not really. 608 00:36:32,880 --> 00:36:37,680 Speaker 1: So within a few years he married the girl he 609 00:36:37,719 --> 00:36:40,160 Speaker 1: met online. He didn't find a girl. He found a wife. Yeah, 610 00:36:40,280 --> 00:36:44,200 Speaker 1: fifty six days after their first chat they got married. Um, 611 00:36:44,239 --> 00:36:47,080 Speaker 1: and he got a job as a computer programmer for 612 00:36:47,120 --> 00:36:51,359 Speaker 1: an insurance company. You know, he went straight. I'm sure 613 00:36:51,560 --> 00:36:54,680 Speaker 1: British and American intelligence officials, though they had not stopped 614 00:36:54,680 --> 00:36:58,440 Speaker 1: looking for him. June of ninety six, a British official 615 00:37:00,200 --> 00:37:02,840 Speaker 1: was sorting through the documents that they found on data 616 00:37:02,880 --> 00:37:08,880 Speaker 1: Stream's hard drive. God only knows. There were enough documents 617 00:37:08,920 --> 00:37:12,680 Speaker 1: to fill forty filing cabinets, and so it took him 618 00:37:12,680 --> 00:37:14,920 Speaker 1: like three weeks to get through it. But like three weeks, 619 00:37:15,200 --> 00:37:18,560 Speaker 1: I'm going to guess it wasn't all interesting hacking stuff. 620 00:37:19,000 --> 00:37:22,239 Speaker 1: I bet a lot of it was not putting recipes basically. 621 00:37:22,880 --> 00:37:25,960 Speaker 1: Um So, at the bottom of one file they finally 622 00:37:26,040 --> 00:37:29,319 Speaker 1: find a name, Cougie and a phone number, and that's 623 00:37:29,360 --> 00:37:33,000 Speaker 1: how they were able to find Matthew Bevan. Data stream 624 00:37:33,080 --> 00:37:36,920 Speaker 1: dropped the ball. He Matthew gave him a pudding recipe 625 00:37:37,640 --> 00:37:39,799 Speaker 1: and he put a note at the bottom. Cougie gave 626 00:37:39,840 --> 00:37:42,759 Speaker 1: this to me, call if you have questions. Um So, 627 00:37:42,800 --> 00:37:47,799 Speaker 1: they arrest Matthew Bevan June. He's in his office. That's 628 00:37:47,840 --> 00:37:52,279 Speaker 1: got to be fun. The insurance company here, the computer program. 629 00:37:52,480 --> 00:37:55,080 Speaker 1: Um they brought him in due to the hacks of 630 00:37:55,120 --> 00:37:58,719 Speaker 1: the U. S. Air Force, NASA and NATO. That's another one. 631 00:37:58,760 --> 00:38:00,560 Speaker 1: Like you know, you get a rest, did it work? 632 00:38:00,600 --> 00:38:02,600 Speaker 1: But then that's that's a big arrest. So you're kind 633 00:38:02,600 --> 00:38:04,600 Speaker 1: of thinking like, yeah, this is this is cool. Like 634 00:38:04,640 --> 00:38:06,719 Speaker 1: when I get back, I should ask for more money, right, look, 635 00:38:06,719 --> 00:38:09,080 Speaker 1: how good I am? Come on, So he's held in 636 00:38:09,200 --> 00:38:13,120 Speaker 1: question for thirty six hours, charged with two counts of conspiracy, 637 00:38:13,360 --> 00:38:17,480 Speaker 1: which his alleged partner in data stream um conspiracy to 638 00:38:17,800 --> 00:38:21,040 Speaker 1: access and modified data held on US Air Force and 639 00:38:21,200 --> 00:38:24,880 Speaker 1: Lockheed Computer Systems, and then later for installing the sniffer 640 00:38:24,920 --> 00:38:28,720 Speaker 1: program into computers to collect login information, and then also 641 00:38:28,840 --> 00:38:33,360 Speaker 1: intent to impair operations. So polking and hacken scooting and 642 00:38:33,360 --> 00:38:36,040 Speaker 1: computing and rebooting. Thank you for putting that in technical terms. 643 00:38:36,160 --> 00:38:37,880 Speaker 1: You know, I just want to be precise. I like 644 00:38:38,000 --> 00:38:41,440 Speaker 1: specificity of language. I'm learning so much. I appreciate you 645 00:38:41,680 --> 00:38:45,240 Speaker 1: so in that Kevin Sprague medium piece, he said quote. 646 00:38:45,680 --> 00:38:49,920 Speaker 1: Bevin complied with every question, spouting answers about the information 647 00:38:50,000 --> 00:38:54,640 Speaker 1: he had uncovered about supposed anti gravity propulsion technology. He 648 00:38:54,719 --> 00:38:57,080 Speaker 1: was asked if he had any political motivations, in which 649 00:38:57,080 --> 00:39:00,279 Speaker 1: he replied he had none. Clearly this was boiling down 650 00:39:00,320 --> 00:39:05,040 Speaker 1: to a case of espionage and possible military implications. Bevan 651 00:39:05,120 --> 00:39:08,560 Speaker 1: remained truthful, explaining that he was simply searching for information 652 00:39:08,640 --> 00:39:12,479 Speaker 1: pertaining the UFOs. With this, the authorities began to ease down, 653 00:39:12,600 --> 00:39:14,839 Speaker 1: their tone, becoming a bit more light as they began 654 00:39:14,960 --> 00:39:17,400 Speaker 1: to peg this hacker is nothing more than an x 655 00:39:17,400 --> 00:39:23,520 Speaker 1: files idiot is one Scotland yard number one status, so 656 00:39:23,560 --> 00:39:26,200 Speaker 1: he's actually going for really interesting things like all this 657 00:39:26,280 --> 00:39:28,840 Speaker 1: crazy technolog Oh he's an X files idiot. He's not 658 00:39:28,880 --> 00:39:33,840 Speaker 1: a threat. One of those telling Devin gets threatened with 659 00:39:33,880 --> 00:39:37,680 Speaker 1: fifteen years in prison. He tells David Glover, remember one 660 00:39:37,680 --> 00:39:40,520 Speaker 1: of the producers of the heist um, that he would 661 00:39:40,520 --> 00:39:43,640 Speaker 1: have pleaded guilty to his exact hacking crimes, but they 662 00:39:43,640 --> 00:39:47,440 Speaker 1: were trying to tie him to bigger conspiracies that didn't exist. 663 00:39:47,520 --> 00:39:49,600 Speaker 1: And he's like, why would I plead guilty? That's not 664 00:39:49,800 --> 00:39:52,799 Speaker 1: you know what's going to happen. Eighteen months later, case 665 00:39:52,880 --> 00:39:57,560 Speaker 1: dropped smart the crowd decided quote, it was not any 666 00:39:57,640 --> 00:40:00,919 Speaker 1: public interest to prosecute him. I bet the thoughts about 667 00:40:00,920 --> 00:40:04,560 Speaker 1: the internet changed. So the prosecutor on the case said, 668 00:40:04,600 --> 00:40:07,200 Speaker 1: the court's hands are tied as to sentence and the 669 00:40:07,320 --> 00:40:10,080 Speaker 1: role of this defendant was secondary to that of another 670 00:40:10,120 --> 00:40:12,840 Speaker 1: who was dealt with by a fine. So like we 671 00:40:12,840 --> 00:40:17,040 Speaker 1: we find data stream, this isn't worth it. I think 672 00:40:17,280 --> 00:40:19,439 Speaker 1: they just they would bring out too much in court. 673 00:40:19,640 --> 00:40:22,719 Speaker 1: That's what I imagine. I mean the discovery alone, Yeah, so, 674 00:40:22,840 --> 00:40:25,480 Speaker 1: and then the exposure of all these all the ideas 675 00:40:25,480 --> 00:40:26,840 Speaker 1: of the secrets and how you got there, and the 676 00:40:26,880 --> 00:40:29,120 Speaker 1: fact that they were there too. You did basically give 677 00:40:29,160 --> 00:40:31,880 Speaker 1: a wish list to more hackers to come front exactly. 678 00:40:32,440 --> 00:40:35,640 Speaker 1: So when this it's all over, Matthew keeps a low profile. 679 00:40:35,719 --> 00:40:39,120 Speaker 1: He worked as a security expert. He also possibly helped 680 00:40:39,160 --> 00:40:43,800 Speaker 1: on viral marketing campaigns for companies like Nintendo or a 681 00:40:43,880 --> 00:40:47,520 Speaker 1: TV channel E for their digital site. At the time 682 00:40:47,520 --> 00:40:50,320 Speaker 1: of the heist, he was working as a computer security 683 00:40:50,360 --> 00:40:52,520 Speaker 1: and I T consultant, and he had his own company 684 00:40:52,560 --> 00:40:56,720 Speaker 1: called Kuge Media Corporation. But I looked and in public 685 00:40:56,760 --> 00:40:59,640 Speaker 1: filings it looks like that was dissolved in I have 686 00:40:59,760 --> 00:41:02,600 Speaker 1: no idea what he does now bets with computers. I'm 687 00:41:02,600 --> 00:41:07,719 Speaker 1: sure he's listening. What's up, dude? Uh A stream cowboy. 688 00:41:08,120 --> 00:41:12,880 Speaker 1: He flew straight right away, like he had a lot 689 00:41:12,960 --> 00:41:15,799 Speaker 1: of like. So he goes to the Royal College of 690 00:41:15,920 --> 00:41:19,440 Speaker 1: Music in London, studies double bass and he's currently a 691 00:41:19,480 --> 00:41:25,120 Speaker 1: member of the London Tango Quintet. Oh he's a tango musician. No, 692 00:41:26,040 --> 00:41:28,480 Speaker 1: let me read you the bio from his from the website. 693 00:41:28,960 --> 00:41:31,640 Speaker 1: Richard was awarded a scholarship to study at the Royal 694 00:41:31,680 --> 00:41:34,440 Speaker 1: College of Music, where he won the Eugene Croft Solo 695 00:41:34,520 --> 00:41:37,120 Speaker 1: Double Bass Prize and went on to do the post 696 00:41:37,200 --> 00:41:40,440 Speaker 1: graduate Jazz course at the Guildhall School of Music and Drama. 697 00:41:40,960 --> 00:41:43,920 Speaker 1: Since then, he's been in demand as classical studio and 698 00:41:44,000 --> 00:41:47,480 Speaker 1: jazz musician, appearing at venues from Ronnie Scott's to the 699 00:41:47,560 --> 00:41:50,920 Speaker 1: Royal Opera House. Richard has worked with artists including the 700 00:41:51,120 --> 00:41:56,600 Speaker 1: Dixie Chicks, Jamie Cullum, Nitt and Sonny and Shirley Bassie 701 00:41:57,840 --> 00:41:59,000 Speaker 1: and he I thought you were going to say that 702 00:41:59,040 --> 00:42:02,080 Speaker 1: about the Dixie Chicks, and he regularly invited although there's 703 00:42:02,080 --> 00:42:05,200 Speaker 1: just the Chicks now, Yeah, yeah, I was impressed. I 704 00:42:05,280 --> 00:42:08,640 Speaker 1: was just yeah. And he's regularly invited to play electric 705 00:42:08,680 --> 00:42:11,920 Speaker 1: bass with ensembles such as the London Symphony Orchestra and 706 00:42:11,960 --> 00:42:15,640 Speaker 1: the Philharmonia. Richard was a member of the improvising string 707 00:42:15,719 --> 00:42:21,080 Speaker 1: court Quintent Basquiat Strings, which which was nominated for a 708 00:42:21,120 --> 00:42:24,000 Speaker 1: Mercury Award in two thousand seven. During the past five years, 709 00:42:24,000 --> 00:42:27,360 Speaker 1: he said, he has been busy in London's top studios, 710 00:42:27,400 --> 00:42:30,360 Speaker 1: recording film scores and working with artists such as Sam Smith, 711 00:42:30,880 --> 00:42:37,680 Speaker 1: Ellie Goulding and Kanye West. He is currently working not 712 00:42:37,800 --> 00:42:40,520 Speaker 1: with Kanye West, because Kanye West and not currently working 713 00:42:40,800 --> 00:42:46,080 Speaker 1: with the operatic baritone Simon keenly Side performing jazz standards 714 00:42:46,120 --> 00:42:49,080 Speaker 1: to opera fans across Europe. So there you go. The 715 00:42:49,160 --> 00:42:55,279 Speaker 1: whole basque that bothers me, but whatever sounds same, like 716 00:42:55,320 --> 00:43:00,280 Speaker 1: oh Banks the keys. Basically I wanted to investigate further 717 00:43:00,320 --> 00:43:02,560 Speaker 1: as to what baskuiat strings is and then I thought, 718 00:43:02,600 --> 00:43:06,960 Speaker 1: you know what, don't hold anger in your heart. I 719 00:43:07,080 --> 00:43:09,799 Speaker 1: just don't need that right now. Um. So that's that 720 00:43:09,840 --> 00:43:12,680 Speaker 1: there's these two hacker boys. I have no idea what 721 00:43:12,760 --> 00:43:15,520 Speaker 1: they eventually learned, but I'm sure that it was like 722 00:43:16,080 --> 00:43:20,680 Speaker 1: they have the key to endless energy transportation. Well we 723 00:43:20,719 --> 00:43:22,920 Speaker 1: now kind of know what they must have learned because 724 00:43:23,040 --> 00:43:25,279 Speaker 1: like the basically, the Navy has come out and said, yeah, 725 00:43:25,320 --> 00:43:27,560 Speaker 1: there's all the footage you've seen like off of like 726 00:43:27,600 --> 00:43:29,840 Speaker 1: the Nimits and some of these ships. It's real and 727 00:43:30,040 --> 00:43:32,000 Speaker 1: there's UFOs and we don't know what they are. And 728 00:43:32,400 --> 00:43:36,120 Speaker 1: it's been pretty much like I would say, admitted by 729 00:43:35,480 --> 00:43:39,480 Speaker 1: the US military machine that there are things out there 730 00:43:39,480 --> 00:43:41,400 Speaker 1: and they want to go. It could be Russian though, Chinese, 731 00:43:41,480 --> 00:43:44,160 Speaker 1: you know, unmanned vehicles that we don't know about, but 732 00:43:44,239 --> 00:43:46,520 Speaker 1: show I have that it's most likely something that is 733 00:43:46,520 --> 00:43:49,200 Speaker 1: in her cause or cause. But they'll say, yeah, we 734 00:43:49,200 --> 00:43:51,920 Speaker 1: don't know what that is. But Matthew Bevans seems to 735 00:43:52,000 --> 00:43:54,400 Speaker 1: have stumbled into that they do know what some of 736 00:43:54,400 --> 00:43:57,319 Speaker 1: the technology. That's that's what everybody's always wanted to get 737 00:43:57,400 --> 00:44:00,720 Speaker 1: the warp engine, understand. I want to warp engine, basically 738 00:44:00,800 --> 00:44:03,040 Speaker 1: want anti graph. I just want to be able to 739 00:44:03,080 --> 00:44:04,759 Speaker 1: like I've always had the dream of being able to 740 00:44:04,760 --> 00:44:07,759 Speaker 1: repel myself against the gravitational field of the Earth. I 741 00:44:07,760 --> 00:44:10,160 Speaker 1: would like to do that. Okay, let's let's get on that. 742 00:44:10,400 --> 00:44:12,120 Speaker 1: I'm just going to boot up the computer, get me 743 00:44:12,160 --> 00:44:15,520 Speaker 1: an Amiga, and I'll look into it for you. I'm 744 00:44:15,520 --> 00:44:17,800 Speaker 1: happy to help you. Why why didn't you ask earlier? 745 00:44:17,920 --> 00:44:19,279 Speaker 1: I just didn't know if you would be willing to 746 00:44:19,280 --> 00:44:21,919 Speaker 1: boot and scoot for me. And as long as it 747 00:44:21,960 --> 00:44:25,240 Speaker 1: involves Excel and maybe a little power point on the side, 748 00:44:25,800 --> 00:44:29,480 Speaker 1: you know, just a little dablins um. That's it. That's enough. 749 00:44:29,560 --> 00:44:34,080 Speaker 1: Stop talking about this. You can find us online at 750 00:44:34,160 --> 00:44:38,080 Speaker 1: Ridiculous Crime on both Twitter and Instagram, and you can 751 00:44:38,160 --> 00:44:40,160 Speaker 1: use the I Heart app to leave us a talkback 752 00:44:40,280 --> 00:44:46,080 Speaker 1: voicemail don't don't email us at ridiculous email took or 753 00:44:46,160 --> 00:44:48,680 Speaker 1: do you know who? Am I to say? Just don't 754 00:44:48,719 --> 00:44:53,520 Speaker 1: hack us? Wouldn't that be terrible our emails? Get into 755 00:44:53,560 --> 00:44:56,319 Speaker 1: my network, get out of my network? Tune in next time. 756 00:45:01,920 --> 00:45:04,840 Speaker 1: Ridiculous Crime is hosted by Elizabeth Dutton and Zarin Burnett. 757 00:45:04,920 --> 00:45:07,960 Speaker 1: That's being produced and edited by Dave Kusten. The Freak 758 00:45:07,960 --> 00:45:10,759 Speaker 1: of the Week Digital Diva research is by head of 759 00:45:10,800 --> 00:45:14,439 Speaker 1: Area fifty one Misinformation from Morris and Brown. The theme 760 00:45:14,480 --> 00:45:18,320 Speaker 1: song is by Thomas Hackadoodle Lee and Travis B. Dutton. 761 00:45:18,960 --> 00:45:23,440 Speaker 1: Executive producers are Ben Keyboard Dancer Bowland and Noel Silent 762 00:45:23,480 --> 00:45:36,640 Speaker 1: Mouse Brown Say It one More Time? Dequeous. Ridiculous Crime 763 00:45:36,760 --> 00:45:39,239 Speaker 1: is a production of iHeart Radio. Four more podcasts to 764 00:45:39,280 --> 00:45:42,319 Speaker 1: my heart Radio, visit the iHeart Radio app, Apple Podcasts, 765 00:45:42,400 --> 00:45:44,240 Speaker 1: or wherever you listen to your favorite shows.