Difference between revisions of "Unauthorized Access"

From Anarchivism
Jump to: navigation, search
(Created page with "{{Infobox Film | name = Unauthorized Access | image = 250px|center | image_caption = Unautho...")
 
Line 58: Line 58:
 
|-
 
|-
 
|}
 
|}
 +
 +
==References==
 +
* [https://thesprawl.org/simstim/unauthorized-access/ thesprawl.org]
  
 
==External Links==
 
==External Links==
 
[[Category:Documentaries]]
 
[[Category:Documentaries]]

Revision as of 16:34, 18 January 2015

Unauthorized Access
Unauthorized access.png
Unauthorized Access Title Card
Format Video (Web?)
Genre Documentary
Origin USA
Language English
Release Date 1 December 1994
Running Time 38 min
Production
Created by Annaliza Savage
Directed by Annaliza Savage
Produced by Annaliza Savage
Written by Annaliza Savage
Screenplay by NA
Distributed by Annaliza Savage
Narrated by NA
Starring Felipe Rodriquez, Deth Veggie, Joe Grand aka Dark Tangent, Aleph One, Rop Gonggrijp, Emmanuel Goldstein, Phiber Optik, Agent Steal, Omega, noah, Count Zero, Brian Oblivion, Grandmaster Ratte, Bruce Sterling, Haneke Vermeulen
Music by NA
Cinematography by Annaliza Savage
Edited by Annaliza Savage
Production Company NA
Location(s) Various
Original Channel NA
Additional Information
Based on NA
Topics Technology, Computers, Hacking
Follows NA
Precedes NA
Associated Video NA
Website savage.net/2010/03/12/unauthorized-access/

Unauthorized Access is a documentary produced by Annaliza Savage in 1994. Shot in 15 cities and 4 countries, this documentary offers an impressive array of topics dealing with hacking culture.

Synopsis

The documentary begins with stories of several hackers who had trouble with the law. The first interview is with Mark Abene, aka Phiber Optik, who was just sentenced to a year of imprisonment for unauthorized access to federal interest computers among other charges. Mark describes the indictment as pathetic. According to Mark what is happening to him and other hackers is equivalent to communist witchhunt of McCarthyism. The judge who sentenced Phiber Optik wanted to send a message to other hackers by giving him the harshest sentence among other defendants. Justin Petersen, aka Agent Steal, is featured as another hacker who was on the run at the time. He is described as a very secretive individual who turned evidence to authorities on several other hackers in order to save himself. Agent Steal continued illegal hacking even as an FBI information and went on the run after pulling off a credit card fraud operation. The segment concludes with a story about a 14 year old hacker, Noah, who broke into a Westinghouse computer. He describes how he narrowly escaped prison sentence due to his age.

In a more practical segment, the documentary explores some of the techniques used by hackers. First the viewer learns about a vast database called Information America. Used by lawyers and bounty hackers, Information America offers a wealth of information about American citizens including employment, property information, cohabitants and other sensitive details. Next we jump into a quick Solaris hacking session with Dan Farmer. In a section dedicated to phreaking, we learn about the powers of red and blue boxes. At last we learn how trashing can yield plenty of interesting information by digging through trash of target companies.

The largest segment of the documentary is dedicated to the coverage of various hacker groups and communities. A predecessor of modern hacker spaces, l0pht, is described by its organizers as a club house without a secret handshake. Count Zero shares that l0pht got started as a storage space but turned into a communal phenomenon where hackers come from all over the country to exchange information and play with hardware. In the next section, Emmanuel Goldstein describes the community that has grown around the 2600 magazine as a collective with an attitude that challenges authority, questions things and spreads information. During one of the monthly 2600 meetings, the viewer is presented with a typical information sharing between hackers in Los Angeles. The segment ends with several clips from HoHo con in Austin, Texas. Drunkfux, the organizer of HoHo con, describes the need for law enforcement and private organizations to meet with hackers in order to learn that they are not some anarchists set out to destroy computers but a group of well-spoken and polite individuals.

In its last segment, Unauthorized Access travels to Europe to document Dutch and German hacker scenes. There are several interviews with prominent hackers in Amsterdam. Rop Gonggripjp describes how physical security is inherently interesting to computer hackers due to similarities in the way of thinking how to break it. Felipe Rodriquez talks about his efforts to create the first consumer oriented Internet service provider as well as several side-projects such as Digital City. There is also coverage of Hacking at the End of the Universe hacker congress organized by Dutch Hak-Tic group. The section on German hackers includes a lot of hacktivist projects in former Yugoslavia. Many German hackers were involved in setting up Bulletin-Board Systems (BBS) in Sarajevo in order to allow for communication between the embattled country and the outside world.

Downloads

Film User Format Link Notes
Unauthorized Access (1994) NA MPEG4 Archive.org

References

External Links