About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Introduction to Hacking
Hack Attack
Hacker Zines
Hacking LANs, WANs, Networks, & Outdials
Magnetic Stripes and Other Data Formats
Software Cracking
Understanding the Internet
Legalities of Hacking
Word Lists
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Geraldo Rivera Browbeats Craig Neidorf


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

On Sept 30, Geraldo Rivera's show focused on "hackers." Not surprisingly, the commentary was closer to sensationalistic fiction than fact. Those who saw the original airing described Rivera's framing of the issue as reprehensible, and his comments about Craig Neidorf were described as potentially slanderous. Even by Geraldo standards, Craig could not have expected the grotesque insults to which he was subjected and the bullying and inaccuracies that he endured, according to observers, with reserved dignity.

We are indebted to an anonymous reader who provided us with excerpts from the transcripts. They reveal a consistent pattern of sensationalism--not surprising--but they also reflect that Rivera had little interest in accuracy and instead resorted to fabrication bordering on lies to depict Craig as a "Mad Hacker." His task was made considerably easier by Alameda County (California) prosecutor Don Ingraham, who contributed to the misconceptions of Craig and played into the sensationalistic "mad hacker" motif that was the format of the show.

Those who viewed the program report, and the transcripts confirm, that the initial portion focused on the potential dangers of hacking to national security, and skillfully juxtaposed film images of terrorism and military violence with discussions and images of hackers.

Rivera continually referred to Craig as the "Mad Hacker," described him as Ingraham's "arch-rival," and used the term "notorious hacker" to remind the audience that his guest was not some run of the mill evil-doer, but "mad," "notorious," and America's "most wanted" hacker. Ingraham implied that Craig was responsible for breaking into and endangering the nation's E911 system, but backed off slightly while leaving the connection between E911 and national security intact. Ingraham's analogy of rape and hacking was in poor taste, and he seemed to join Rivera in competing for outlandish sound-byte of the day.

The media has played a major role in contributing to hacker hysteria by grossly exaggerating the exploits of suspects and defendants. Rivera has taken hyperbole to a new level by imputing dangers where none exist, by fabricating facts, and by leaving the audience with the impression that--in this case--Craig had actually broken into the E911 system. In a time which Constitutionally protected liberties are threatened, when demogogues enact anti-crime legislation that expands definitions of punishable behavior and increases penalties for offenses, and when the public--still largely technophobic--does not understand hacking, Geraldo's portrayal is recklessly dangerous and unconscionably irresponsible. It is one thing to engage in self-serving sleaze for ratings. It is quite another to distort truth in ways that create false impressions and tarnish reputations by name-calling. We suggest that Geraldo Rivera has far more in common, both in his actions and in his consequences, with terrorists than do hackers. Rivera, like terrorists, seems to have no hesitation in doing violence if it serves his own narrow interests. On balance, society can survive a "hacker menace" far more easily than it can survive callous disregard of truth.

Geraldo: I'm Geraldo rivera. And now, It can be told.

<First part of the program includes comments and interviews with Emmanuel Goldstein, Krista Bradford, Cliff Stoll, Phiber Optik, Winn Schwartau, and other bit players. Focus of discussion is on hacking as "terrorism" and generous film and news clips of terrorism and war scenes interwoven amongst discussion of dangers of hackers to national security. We pick up the dialogue when Don Ingraham (Alameda County (Calif.) prosecutor and Craig Neidorf (former editor of PHRACK) join in>

Geraldo: Joining us now via satellite from Oakland, CA is the Assistant District Attorney Don Ingraham ... for Alameda County and he has been prosecuting computer hackers for years.

<Don is in the TV box, between Geraldo and Craig [KL]>

Geraldo: Don, how do you respond to the feeling common among so many hackers that what they're doing is a public service; they're exposing the flaws in our security systems?

Don: Right, and just like the people who rape a coed on campus are exposing the flaws in our nation's higher education security. It's absolute nonsense. They are doing nothing more than showing off to each other, and satisfying their own appetite to know something that is not theirs to know.

Geraldo: Don, you stand by, Craig as well. And when we come back we'll hear more from prosecutor Ingraham and from, I guess his archrival here, the Mad Hacker Craig Neidorf.

<Commercial>

Geraldo: We're back with Craig Neidorf, a former University of Missouri student who ran a widely distributed electronic newsletter for computer hackers. He is so proud of being America's Most Wanted computer hacker that he has put together this very impressive scrapbook.

<Geraldo holds up a colorful scrapbook..On the left page shows a lightning bolt hitting what looks to be a crown [Knight Lightning] ...And on the right it looks like a graphic saying "Knight Lightning" and below that is a black circle with a white lightning bolt, and next to that is a triangle that looks very similar to the triangle with an eye that appeared on the cover of _GURPS_Cyberpunk_ [which said in it, the book that was seized by the Secret Service! see page 4...- but the one on KL is illegible]>

Geraldo: Knight Lightning I guess that was your code?

KL: It was my editor handle.

Geraldo: That's your handle. OK. And from Oakland, CA we are talking with the Assistant District Attorney Don Ingraham, who is hard driven, you might say, to put people like Craig behind bars. Don, do you think Craig's lucky that he's not behind bars right now?

Don: Yes, I think he's extraordinarily lucky. He was part of a conspiracy, in my opinion, to take property that wasn't his and share it with others. They charged him with interstate transport of stolen property - couldn't make the threshold -and it came out that it had been compromised by, unfortunately, released by another Bellcore subsidiary. But was certainly not through any doing of HIS that he is a free man.

Geraldo: So you think that his activities stink, then.

Don: Absolutely. No Question about it.

Geraldo: Craig, you wanna respond? Are you doing something for the greater good of society?

KL: Well I was merely publishing a newsletter. I didn't go out and find this document. Rather it was sent to me. In many ways it could be compared to Daniel Ellsberg sending the Pentagon Papers to the New York Times.

Geraldo: Do you figure it that way Don? Is he like Daniel Ellsberg?

Don: No, Ellsberg went to court to deal with it. Daniel Ellsberg's release of the Pentagon Papers is the subject of a published court decision to point out it was a matter of national security and national interest. The E911 codes, which is the citizen's link to the police department are not a matter of national security. They're a matter of the central service to the community.......

Geraldo: You broke into the 911 system? He broke into the 911 system!

KL: No, that's not correct. I never entered any 911 telephone system.

Don: I didn't say he entered into it. What I said was that he and Riggs conspired together to take a code that they knew was necessary to 911 and to take it apart to see how it worked. They never had the owner's permission, they never asked for it.

Geraldo: Alright, lemme ask you this....

KL: The court found that there was no conspiracy here.

Geraldo: You were acquitted. You were vindicated at least from criminal responsibility. Lemme just quickly ask you this: hackers have been inside the White House computer.

KL: Yes they have.

Geraldo: And they've been inside the Pentagon computer.

KL: Yes.

Geraldo: And if Saddam Hussein hired some hackers whether they're from Holland or any other place, he could've gotten into these computers, presumably.

KL: Presumably, he could've.

Geraldo: And gotten some valuable information.

KL: It's definitely possible.

Geraldo: And you still think hackers are performing a public service?

KL: That's not what I said. I think that those kind of activities are wrong. But by the same token, the teenagers, or some of the people here that are not performing malicious acts, while they should be punished should not be published as extreme as the law currently provides.

Geraldo: You're response to that Don?

Don: I don't think they're being punished very much at all. We're having trouble even taking away their gear. I don't know one of them has done hard time in a prison. The book, Hafner's book on _Cyberpunk_, points out that even Mitnick who is a real electronic Hannibal Lecter ... did not get near any of the punishment that what he was doing entitled him to.

Geraldo: <laughing> An electronic Hannibal Lecter. OK, stand by, we'll be back with more of this debate in a moment...

<commercials>

Geraldo: Back with Craig Neidorf and prosecutor Don Ingraham. Craig, do you think hackers are voyeurs or are they potentially terrorists?

KL: I think they resemble voyeurs more than terrorists. They are often times looking at places where they don't belong, but most hackers do not intend to cause any damage.

Geraldo: Do you buy that Don?

Don: If they stopped at voyeurism they would be basically sociopathic, but not doing near the harm they do now. But they don't stop at looking, that's the point. They take things out and share them with others, and they are not being accountable and being responsible as to whom they are sharing this information. That is the risk.

Geraldo: Can they find out my credit rating? I know that's not a national security issue, but I'm concerned about it.

Don: Piece of cake.

Geraldo: No problem.

Don: Assuming....

Geraldo: Go ahead. Assuming I have a credit rating...hahahah....

Don: Assume that the credit is not carried by someone who is using adequate security.

Geraldo: But you think Craig it's not problem.

KL: I think it's no problem.

Geraldo: Give me quickly the worst case scenario. Say Abu Nidal had you working for him.

KL: I'm sorry?

Geraldo: Abu Nidal, notorious .....

KL: As far as your credit rating?

Geraldo: No, not as far as my credit rating.. The world, national security.

KL: Well, hackers have gotten into computer systems owned by the government before. At this point they've never acknowledged that it was anything that was ever classified. But even some unclassified information could be used to the detriment of our country.

Geraldo: Like the counter-terrorist strategy on January 15th, the day of the deadline expired in the Persian Gulf.

KL: Perhaps if Saddam Hussein had somehow known for sure that we were going to launch an attack, it might have benefited him in some way, but I'm really not sure.

Geraldo: Don, worst case scenario, 30 seconds?

Don: They wipe out our communications system. Rather easily done. Nobody talks to anyone else, nothing moves, patients don't get their medicine. We're on our knees.

Geraldo: What do you think of Craig, quickly, and people like him?

Don: What do I think of Craig? I have a lot of respect for Craig, I think he's probably going to be an outstanding lawyer someday. But he is contributing to a disease, and a lack of understanding ethically, that is causing a lot of trouble.

Geraldo: One word answer. As the computer proliferate won't hackers also proliferate? Won't there be more and more people like you to deal with?

Knight Lightning: I think we're seeing a new breed of hacker. And some of them will be malicious.

Geraldo: Some of them will be malicious. Yes, well, that's it...for now. I'm Geraldo Rivera.

[End of Program]

----

If you look past the obvious sensationalism (hey, what do you expect from Geraldo?) the ''Now It can Be Told'' program on hackers was actually quite good, and quite informative.

However, as expected, the program served to enhance the stereotypes that hackers are always destroyers of information. Words such as terrorist, thief, mad hacker, notorious, sociopath, et al were often substituted for ''hacker''.

>From a hacker's point of view, the show was great. First we see ''home video'' of Dutch hackers hacking into US Department of Defense (military) computers. Emmanuel Goldstein (editor of 2600) is present among them, and describes in-depth what they are doing, and how they are getting into these computers.

The Dutch hackers success rate was astounding! Goldstein says that they "literally picked a computer at random among a list and used various means to get in". First, they fail with a login of guest. Then, they succeeded in gaining superuser privileges with the sync login and proceeded to create a new account under the name Dan Quayle, and gave him superuser privileges.

I thought Emmanuel Goldstein was an excellent defender of the hacker's position, successfully refuting Cliff Stoll's comment that compared hackers to thieves breaking into someone's house (yaaaaaawwwwwwwnnnnnnnnn) by stating hackers are not interested in personnel files - they're interested in huge databases and computer systems. Hopefully, (however doubtful) Emmanuel Goldstein has forever put the "breaking into a house" argument to rest.

Next we see a scene that is truly cyberpunk: Japanese Kanji characters in neon colors spread over the screen as we hear a voice say "My handle is Phiber Optik. I'm a computer hacker from the East Coast.", standing on a dimly lit street in the middle of the night. The Phiber Optik portion of the program is interesting, and shows (for the first time?) hacking from a pay-phone with a laptop. (Note: if you freeze-frame at the right moment, you can see Emmanuel Goldstein and a g-man type in sunglasses [??] during this segment.)

Phiber Optik: "The Hacker's goal is to become one with the machine"

The next segment features an anonymous hacker (most likely Phiber) who says "we'd just be coexisting with the other users of the machine" and states once again that hackers are not interested in personal files. We also learn that this hackers has most likely entered the White House systems.

What follows the hacker profiles is a segment on computer-terrorism, which focuses on viruses, interception, ''computer guns'', and eavesdropping.

Emmanuel Goldstein: "The computer is a tool. And any tool can be used as a weapon."

A. Hacker: "I wouldn't so much call it a weapon as an extension of one's own mind;"

This segment somewhat vaguely attempts to separate hackers from terrorists, but since the distinction is not made clear, it is obvious that the makers of the show think that some hackers would qualify under this category. Krista Bradford hints that these activities are done by our own government, as well.

A neat demonstration is given by Winn Schwartau, an information security expert, who demonstrates TEMPEST technology (picking up the radio waves from a monitor, and being able to display what's being typed up to 1.5 miles away). In this fake scenario, credit information is being intercepted. It is most unlikely that hackers would use this type of interception, since it requires a lot of expensive equipment. (In case your interested, the frequency the signal was picked up on is 19.9217)

Intermixed in this segment are clips from Die Hard II (remember, the terrorists take over the airport computers).

The third segment involves a 'debate' between Craig Neidorf (Knight Lightning of Phrack fame) and Don Ingraham, an assistant District Attorney in California. Geraldo informs us that Craig Neidorf is a ''mad hacker'' who is proud of his hacking achievements.

Geraldo holds up an interesting portfolio that CRaig Neidorf has created, which hackers might find interesting, if you can get your hands on it.

Geraldo engages in his usual sensationalism. He wrongly assumes that Craig Neidorf 'broke into' the 911 system. He wants to confirm that hackers have broken into the White House and Pentagon, and tries to put terror into the hearts of the masses. One of the great shames of this program is that the host is nothing more than a sensationalist seeking to get ratings, and doesn't care one bit about the truth, which only serves to further the stereotypes all hackers have been stuck with.

Don Ingraham is there, basically representing the Operation Sundevil opinion. He thinks that hackers have not been punished enough, and that their crimes are very serious. It is obvious that Mr. Ingraham has never even considered for a moment the idea that hackers are only interested in knowledge and most of them would not knowingly harm systems or files. He ought to take a look at the other side before forming his ignorant opinions.

In my opinion, Craig Neidorf does not represent the common hacker as well as he is capable of in this program. But, obviously he was constrained by the format of the show and the ignorance he was forced to deal with on behalf of the host and Mr. Ingraham. He is not given opportunity to explain that not all hackers are malicious, and the subject of hackers informing system administrators of security flaws in their systems is not even brought up.

In summary, the Now It Can Be Told program contained sensationalist aspects that was to be expected. However, from a hacker's point of view it was interesting to see the exploits of other hackers. Most interesting was the cyberpunk atmosphere of Phiber Optik hacking, as well as the home video of the Dutch hackers and their exploits. It was encouraging to hear Emmanuel Goldstein's opinions on hackers and he did well to represent them; he did not make them out to be saints, yet he defended them from the stereotype of being destructive. Cliff Stoll got one or two sentences in, which is all he deserved, IMHO. He only spews out the rhetoric we've all heard time and time again. The segment on computer terrorism was interesting, but not of much use to hackers; the demonstration on eavesdroppping was especially worth watching. The final segment, the 'debate' between Craig Neidorf and Don Ingraham was not as interesting as it could've (SHOULD'VE) been. Geraldo succeeded in disallowing Craig Neidorf to make the points it appeared he wished to make, and Mr. Ingraham succeeded in perpetuating stereotypes of hackers.

Craig Neidorf ended the show by saying "We're seeing a new breed of hacker." And if you look past the obvious sensationalism of Now It Can Be Told, that new breed of hacker was well profiled.

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS