homewho are hackers?the riskswho's responsibleprotecting yourselfinterviews

who are hackers?

interview with anonymousarrow
This young hacker was caught breaking into NASA's computers and sentenced to six months in jail. The government says that at one time, he took possession of $1.7 million in software. In his interview he talks about the weaknesses he found in the government's computers and how he had warned them. Because of his age, FRONTLINE is protecting his identity.
interview with reid & count zeroarrow
Reid and Count Zero are members of the Cult of the Dead Cow, a hacker organization which developed "Back Orifice," a computer program which allows the user to remotely view and control any computer running Windows 95 or later. They say the developed the program to demonstrate the weak security in Microsoft products.
interview with raphael gray aka curadorarrow
Curador is a 18-year old hacker from rural Wales who in the winter of 2000 stole an estimated 26,000 credit cards numbers from a group of e-commerce web sites, and posted the numbers on the web. After ex-hacker Chris Davis tracked him down, Curador was arrested in March 2000, and charged under the United Kingdom's computer crime statute.
are hackers outlaws or watchdogsarrow
The views of Bruce Schneier, an expert in cryptography and computer security; Reid and Count Zero, members of the Cult of the Dead Cow hacker organization; Robert Steele of Open Source Solutions; Robert Giovagnoni of iDEFENSE; Martha Stansell-Gamm, chief of the U.S. Justice Dept's Computer Crime section; and Steven Lipner, Microsoft security analyst.
Studying Their Psychologyarrow
Sarah Gordon has done extensive research into the psychology and motivations of virus writers and hackers. Many of her findings are published on her web site, http://www.badguys.org/. In this interview, she describes how she got to know members of the hacker underground and debunks a few popular myths about the hacker personality.
Notable Hacksarrow
The volume of hacking cases and the amorphous definition of the word "hack" makes it difficult to list the biggest or most destructive hacks of all time. But the cases listed here have this in common: each marks a significant step in the evolution of hacking--showing the breakthroughs in what hackers can do and how the laws have had to change to catch up with their activities.
testimony of an ex-hackerarrow
On March 2, 2000, the U.S. Senate Committee on Governmental Affairs held a hearing on the security of federal information systems. Kevin Mitnick, who has been called the most notorious hacker of all time, spoke before the committee. In 1995 Mitnick was arrested for stealing computer code from a number of high-tech companies including Sun Microsystems, Nokia, and Motorola Corporation. He pled guilty, and spent almost five years in jail. Some estimate that his illegal forays into private networks cost the companies involved nearly $300 million. He was released in January 2000, and now considers himself "reformed." He is serving a further three years of probation, during which he may not use a computer or act as a consultant in any computer-related activity without permission. In these excerpts from his testimony, he talks about how, and why, he hacked.
tools of the tradearrow
Descriptions of some of the most popular techniques that hackers use to break into or damage web sites and computers.
links to hacker groups & web sitesarrow
There are numerous sites published by and about hackers, representing a wide range of philosophies, sophistication and respect for the law. This list collects some of the most well-established groups and sites and includes only those that do not advocate illegal or destructive behavior.

home · who are hackers? · risks of the internet · who's responsible · how to be vigilant · interviews
discussion · video excerpts · synopsis · press · tapes · credits
FRONTLINE · wgbh · pbs online

some photos copyright ©2001 photodisc
web site copyright 1995-2014 WGBH educational foundation