Continuing from last week’s article on the accuracy of security concepts in Mr. Robot, I watched the latest episode with great interest to see what new themes might pop up.
This one wasn’t nearly as tech-heavy as the previous episode, but there was nevertheless a technological explosion and some hacking references to sink our teeth into.
WARNING: SPOILERS AHEAD – SCROLL DOWN TO READ ON
Phreaking came before hacking
We got confirmation in this episode that long-time fsociety member Romero was in fact a phreaker.
Phreaking was the predecessor to hacking: instead of computers and networks, phreakers worked on accessing and manipulating telecom systems, often to evade hefty calling costs.
There had already been speculation that Romero was a phreaker given that he was significantly older than the rest of the fsociety members, and thus had probably cut his hacking teeth on the telephone network.
Phreaking to evade paying for phone calls was and is, of course, illegal – which is why it’s no surprise that S2E2 mentioned that Romero had spent some time in jail.
There are a lot of fantastic stories about the exploits pulled off by phone phreaks back in the golden age of phreaking.
John Draper, for example, figured out that the toy whistle included in a box of children’s cereal played the same frequency as the tone used by a major phone system, allowing him unfettered access.
Draper become famous, or perhaps infamous, as Cap’ Crunch – the name of the cereal that provided the whistle.
Other freakers, such as Joe Engressia, known as Joybubbles, could even whistle the right signal tones themselves.
In S2E2, a law enforcement agent plugged something into Romero’s computer, and the computer spat out some very angry flames.
I was a little surprised to see an investigator make such a n00b mistake and not even check to see if the computer was booby-trapped first, but for the sake of the story we’ll allow it.
So what happened exactly?
It wasn’t terribly clear, because it was only about three seconds on screen.
It may have been a booby-trap of some kind of port using thermite; I thought it might also be a wink to the Etherkiller and USB Killer: both will rather quickly ruin the computers they’re plugged in to with a jolt of voltage.
Here’s USB Killer in action:
Blink and you’ll miss it
There were two smaller references worth mentioning:
- “The FBI files were leaked a few months back, every hacker has them.” I’m guessing that’s allusion to a recent data breach in the US public service, when millions of records of government employees were leaked. (The breach happened at the Office of Personnel Management, not in the FBI.) It could also be a reference to Lauri Love, the UK hacktivist currently fighting extradition to the US for allegedly breaking into various US government agencies.
- There was some mention of Bitcoin, and moving money to “hot” and “cold” wallets. That’s realistic jargon, at least. In the cryptocurrency ecosystem, “hot wallets” are essentially bitcoins that are accessible online, so you can spend them easily. “Cold” wallets are stored offline. A hot wallet is like the cash in your pocket, or hidden under your mattress, where it’s safe for the most part; a cold wallet is more like a safe deposit box at the bank, which is a much harder nut to crack.
Did you catch this week’s episode, or are you still waiting for it to be available where you live? (Will you ever be able to look at cream of wheat the same way again? I know I won’t.)
Sound off in the comments. Until next week!
Image courtesy of USA Network.
“Hunted” schoolgirls’ nude images and personal info published online
More than 2,000 sexual images of underage girls and women have been shared by teen boys and young men, on an...August 17, 2016
Why you STILL can’t trust password strength meters
I’m worried about password strength meters. In March 2015 I tested five popular password strength meters in a simple experiment that...August 17, 2016
Facebook’s unblockable-ads push is a “big bluff”
Facebook, the adblocker ball’s back in your court, but researchers seem to have punched some holes in your racket. I’ve just...August 17, 2016
Did “The Shadow Brokers” hack NSA cyberweapons worth $500M?
A self-styled hacking group going by The Shadow Brokers have started a tongue-in-cheek media campaign claiming that they’ve penetrated the NSA...August 16, 2016
US hotels hit by payment card slurping malware
The chain that owns Westin, Starwood, Marriott, Hyatt, Intercontinental and Le M?ridien hotels – HEI Hotels & Resorts – on Friday...August 16, 2016
People like using passwords way more than biometrics
A new survey shows that we’ll give up our passwords only when they’re pried from our cold, dead hands. That’s more...August 16, 2016
“You dirty RAT” – Spy versus Spy in the cybercrime underworld
Thanks to Gabor Szapannos of SophosLabs, who did the hard work behind this article. Not all malware is ransomware, even though...August 16, 2016
Silk Road suspect “Libertas” can be extradited to US, says court
Back in December 2013, the US Department of Justice (DoJ) charged three individuals with three different offences stemming from the now-defunct...August 15, 2016
Tech support scammer tricked into installing ransomware
First things first, we do not recommend that you screw around with crooks. That includes fake support calls, 419 scammers and...August 15, 2016