{"id":40607,"date":"2022-07-19T18:05:16","date_gmt":"2022-07-19T16:05:16","guid":{"rendered":"https:\/\/foreignrights.debezigebij.nl\/?page_id=40607"},"modified":"2022-07-19T18:05:16","modified_gmt":"2022-07-19T16:05:16","slug":"sample-translation-hackers","status":"publish","type":"page","link":"https:\/\/foreignrights.debezigebij.nl\/foreignrights\/authors\/gerard-janssen\/gerard-janssen-hackers-the-freedom-fighters-of-the-internet\/sample-translation-hackers\/","title":{"rendered":"Sample translation &#8211; <em>Hackers<\/em>"},"content":{"rendered":"<p style=\"text-align: left;\">Gerard Janssen &#8211; <em>Hackers: The Freedom Fighters of the Internet<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Prologue<\/strong><br \/>\n[pp. 7-9]<\/p>\n<p>Underground passageways In the mausoleum of the Pantheon in Paris there hangs a clock that dates back to 1850, a mechanical work of art with cogs of varying sizes. For more than a century the clock kept time well. Every day a French attendant wound up the timepiece by hand. This was a hellish task. It was so tiresome that one day an attendant decided to sabotage the clock. A broken clock doesn\u2019t need winding up, so that saved a load of work each day. The clock has therefore stood still since the 1960s.<\/p>\n<p>But over Christmas 2006 to everyone\u2019s surprise the clock sounded again. No one knew how it was possible, but from one day to the next the hands began to turn again.<\/p>\n<p>The story of this mysterious repair begins in the 1980s. Six teenagers set off on an adventure. They lifted up a manhole cover, not far from the Eiffel Tower, lowered a ladder into the hole and, armed with torches, they climbed down. They found themselves in an underground tunnel. On the ground was a cable. They followed the cable, which led to a passageway shut off with horizontal bars. But the skinny teenagers were able to wriggle between them. This brought them to a new room, where they found keys. The keys fitted a door to another chamber, where they found a cabinet. In a drawer they found maps of the secret and forbidden system of passages beneath Paris.<\/p>\n<p>Since then various groups have moved in the passageways under the city. They furnished underground rooms as cinemas, caf\u00e9s and secret chambers. The Mouse House is a club consisting exclusively of women, La Mexicaine de Perforation organises film showings, and Untergunther consists of urban explorers who enjoy restoring old rooms.<\/p>\n<p>One of the underground tunnels led to a cellar under the Pantheon. From there the adventurers succeeded in surfacing via a stairway. In the attic of the building, where the mausoleum was situated, the group La Mexicaine de Perforation set up a secret club house. Hidden behind a wall of wooden crates they built a lounge, a library and even a bar.<\/p>\n<p>The club house also contained the mechanics of the clock. One of the Untergunther members was the professional clockmaker Jean-Baptiste Viot. He saw that the clock had rusted. But it was not yet too late to clean and restore it. The repair work took a year. Other members of Untergunther assisted with simple tasks, such as polishing the cogs. Finally the clock was working again and could be linked up to the mechanism that made it chime. A member of Untergunther proudly contacted the Centre des Monuments Nationaux (CMN), the department responsible for the Pantheon, to let them know that the clock had been repaired.<\/p>\n<p>The authorities, however, were not pleased with the illegal restoration and all the work that a repaired clock would bring with it. They broke the clock again, and began legal proceedings against the clockmaker and other members of Untergunther, charging them with forcing a lock. But the judge acquitted Untergunther, because it could not be proven that the lock had previously been intact.<\/p>\n<p>The underground passageways connecting government buildings and museums are the perfect metaphor for the internet. Just as urban explorers know the way in the tunnels below Paris, hackers find their way along the fibre optic cables which lie like tunnels beneath our world. They sometimes do things that are not permitted, but most of the time there are no ill intentions.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Barnaby Jack<\/strong><br \/>\n[pp. 17-24]<\/p>\n<p>It was at this time that I stumbled across the story of Barnaby Jack. It\u2019s 26 July 2013, the day after his death, when I first hear about him. Online I come across articles with titles such as:<\/p>\n<p>\u2018Famed hacker Barnaby Jack dies a week before hacking convention.\u2019 \u2018Hacker Barnaby Jack\u2019s cause of death could remain unknown for months: Celebrated hacker who infiltrated implanted medical devices and ATMs was found dead Thursday in San Francisco.\u2019<\/p>\n<p>A guy who hacks cash machines and has died in mysterious circumstances? That sounds like a good story to me. On the internet I search for all the information I can find.<\/p>\n<p>Barnaby Jack turns out to be a hacker from New Zealand. As a child he couldn\u2019t focus his attention, he wasn\u2019t getting anywhere at school, but in his bedroom he dismantled electronic appliances and found inner peace in exploring the early internet on his computer. His sister Amberleigh remembers once asking as a joke if he could erase her student debt. She recounts how Barnaby became genuinely nervous at the question. A worried look came into his eyes and replied that he could do it, but then he\u2019d have to delete thousands of other student debts too, otherwise he\u2019d be caught.<\/p>\n<p>Using bulletin boards \u2013 computers on which messages are left, and which therefore serve as digital pin boards \u2013 using his nickname Dark Spyrit, Barnaby kept in touch with other hackers, such as the American computer child prodigy Marc Maiffret, who at the age of sixteen hacked into the American government\u2019s computers. Maiffret had woken up one morning with an FBI pistol to his temple. It gave him the idea of starting up a legal company: eEye Digital Security, in Aliso Viejo, California. Around the turn of the millennium, Maiffret tried to persuade Barnaby to help him in his new company, but Jack kept his distance at that point. In 1999 the twenty-two-year-old Jack made a name for himself discovering vulnerabilities in servers using the Microsoft Windows operating system. In the legendary hackers\u2019 magazine Phrack he describes how he used what is known as a buffer overflow for the purpose. The article in Phrack is a patchwork of profound quotes, level-headed texts and incomprehensible technical jargon. Magic spells, in a manner of speaking, which lend the article a mysterious aura of freemasonry. Not only does it raise the subject of taking over Microsoft computers, but also of protecting the internet, which is characterised as the last great bastion of freedom of thought, ideas and expression.<\/p>\n<p>In Jack\u2019s view the internet was at risk because it was increasingly controlled by companies and governments. Governments are interested in control. Large businesses are interested in money. They will always choose new functionality over security.<\/p>\n<p>Hackers are the freedom fighters who should stand guard over the internet. They research the secret software of large businesses and governments, investigating precisely what the software does, with the aim of protecting the internet. Like a kind of digital samurai.<\/p>\n<p>In 2003, when his father dies at the age of fifty-nine of prostate cancer, Jack gets onto a plane to San Jose to go to work for Maiffret\u2019s company eEye after all. Later Jack moves to the company ioActive, specialised in the security of the Windows operating system. There he starts work on a special project. Something he has been dreaming of ever since he saw the film Terminator 2, where the young John Connor hacks a cash machine with a credit card linked to an Atari computer. The image has remained in Jack\u2019s mind.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Hacking cash machines<\/strong><\/p>\n<p>On 28 July 2010 he is the sensation of the Black Hat annual hackers\u2019 conference in Las Vegas. The clip of this conference can still be viewed on YouTube. When Jack comes onto the stage, there\u2019s cheering from the room, as there would be for a stand-up comedian. He\u2019s sporting a buzz cut and wearing a black shirt. There\u2019s something of the actor Colin Farrell about him, perhaps the actor\u2019s nicer, kinder brother, his lively eyes emanating a mixture of shyness and cheekiness.<\/p>\n<p>Speaking with a strong New Zealand accent, Jack explains how you can simply rent ATMs: \u2018Add to cart.\u2019 He recounts how a man with a hand truck delivered the machines to his house. What on earth do you need an ATM in your house for?\u2019 the man asked.<\/p>\n<p>\u2018Oh, I don\u2019t like the transaction fees, mate,\u2019 said Jack.<\/p>\n<p>Loud laughter form the auditorium.<\/p>\n<p>In the clip Jack also recounts the eight-hour drive to Las Vegas, and the fear of being stopped by the police. With two ATMs and six thousand notes of novelty currency in the boot. \u2018The whole time I\u2019m thinking \u201cPlease don\u2019t get pulled over, please don\u2019t get pulled over\u201d,\u2019 he says.<\/p>\n<p>After a bit of Googling, Jack finds a web shop selling a universal key for a couple of dollars with which you can open the cabinet. He orders the key. When it arrives in the post, he opens the window in the ATM and gains access to a small computer with a USB port. Using a USB cable he connects the computer in the cash machine with his laptop. He investigates how cash machine software works. For days on end he presses the buttons on the little keyboard, and looks at the signals the computer sends back. As if defusing a bomb. When he inserts his card into the machine, it sends a different signal along the cable from when he presses the twenty-dollar button. He plays with it until he understands how the computer processor controls the cash machine. In the end the firmware \u2013 the machine\u2019s operating system \u2013 no longer holds any secrets for him. He also finds a way of making wireless contact and circumventing the passwords it requests. This way he can \u2018update\u2019 an ATM without opening it with a key.<\/p>\n<p>In Jack\u2019s view, the ATM problem generalises to society as a whole. The cash is stored in a bulky safe. But the computer\u2019s motherboard, which controls the computer, is easy to get your hands on. Once you have control of the computer, you have control of the safe. Then the money is no longer secure in the safe. It\u2019s that simple.<\/p>\n<p>The highlight of the presentation is the moment when one of the ATMs begins to play an 8- bit Nintendo tune and spews out all the banknotes one by one. At the end of his talk he receives a standing ovation from the entire room, apart from two men. They are the original programmers of the cash machines (who later became good friends with Jack). \u2018The goal definitely isn\u2019t to give a cookbook recipe on how to hack ATMs,\u2019 says Jack with a twinkle in his eye, it\u2019s \u2018to design better and safer products in the future.\u2019 The hackers in the room laugh.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Homeland<\/strong><\/p>\n<p>Everything about the story fascinates me. It\u2019s funny, but it\u2019s also about real things, such as good stand-up comedy. Coming up with the idea of renting a cash machine online and ordering the universal key from the internet. Having the technical knowledge to adapt the computer\u2019s software. To me it\u2019s a form of art. I watch more clips of Jack.<\/p>\n<p>A year after hacking the cash machine, Barnaby Jack shows how he can manipulate pacemakers and ICDs (implantable cardioverter-defibrillators) remotely using radio waves. In the case of a defibrillator he is able to make the device deliver a shock of 830 volts, using the same radio waves you use to unlock your car doors remotely. Handy for a patient, who doesn\u2019t require an operation every time the settings of an internal medical device need adjusting, but dangerous if you\u2019re the vice president of America and an evil genius is capable of giving you a shock of more than 800 volts.<\/p>\n<p>On 2 December 2012 the TV series Homeland reveals how an Al Qaida hacker sitting in front of two computer screens types in incomprehensible code at lightning speed.<\/p>\n<p>File_source<br \/>\nTherapies_off<br \/>\nRemote$vsup;\/jenMart&gt;&gt;<br \/>\nRTS422256H_EPTEST_FIBRILLATION_ON_1.0s<\/p>\n<p>In the next scene we see an office with hardcover books on the shelves and expensive paintings on the wall. An elderly man in a suit clutches at his chest and collapses.<\/p>\n<p>Messages crop up online immediately after the show. Is this possible? Can a hacker get into the vice president\u2019s pacemaker by a wireless connection and give him a shock of a couple of hundred volts? Of course not, say doctors. Homeland is fiction. In reality this is absolutely impossible! But never tell a hacker something is impossible.<\/p>\n<p>Within a couple of weeks Jack has succeeded in taking control of an ICD from a distance of thirty metres and loading it with a charge of more than 800 volts, enough to deliver a fatal electric shock. Jack is genuinely curious as to where the makers of Homeland got the idea. The answer seems simple. The scriptwriters probably spoke to (former) staff of the American intelligence services, as this scenario really was planned for.<\/p>\n<p>Dick Cheney \u2013 vice president under George Bush from 2001 to 2009 \u2013 had an ICD in his chest. A 2013 interview for the CBS programme 60 Minutes revealed that his doctors had switched off the wireless function in 2007, fearing a possible attack.<\/p>\n<p>Barnaby Jack jokes that the defibrillator scene in Homeland is ridiculous, because \u2018You don\u2019t need a serial number!\u2019<\/p>\n<p>Hacking is easier in the real world than in fiction. Jack immediately realises that it\u2019s not only defibrillators that are vulnerable, but other medical devices too.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Conspiro<\/strong><\/p>\n<p>In 2013 Barnaby Jack is back on the Black Hat programme. This time to demonstrate that you can hack into insulin pumps wirelessly and give someone a fatal shot of insulin from a distance. In theory it\u2019s even possible to commit a terrorist attack. With a strong antenna you can attack all insulin pumps within a radius of half a kilometre. In a busy place like a station, or on Brooklyn Bridge, you could hit dozens, perhaps even hundreds of victims.<\/p>\n<p>\u2018Implantable Medical Devices. Hacking Humans\u2019, is the title of his talk. But shortly before the conference his girlfriend Layne Cross finds him dead in his apartment in Nob Hill, San Francisco. He\u2019s lying in bed, surrounded by beer and champagne bottles.<\/p>\n<p>Jack\u2019s sudden death gave rise to conspiracy theories. On the \u2018conspiro\u2019 subreddit, a digital community focused on conspiracy theories (\u2018meta-conspiracy with intelligent discussion\u2019), various scenarios do the rounds. Jack was murdered because vulnerabilities in the medical devices had to be kept secret, so that the CIA could continue to use them to murder people. Others believe his death was staged, and that Jack is now secretly working for the CIA. A third theory links Jack with the death of Michael Hastings, a journalist who died a month earlier in a car accident on a long straight road involving no other vehicles. Barnaby Jack\u2019s last Tweet is about the work of two colleagues who showed how you can remotely take over control of a car. Hastings was working on a story about CIA director John Brennan. Five months after Jack\u2019s passing comes the official cause of death. According to the forensic investigation he probably died from a combination of heroin, cocaine, Benadryl and Xanax.<\/p>\n<p>I read everything I can find about it. What happened to Barnaby Jack? And all that hacking of cash machines and insulin pumps, how did he do that?<\/p>\n<p>When I write a story about Barnaby Jack for the Dutch magazine Vrij Nederland, the editor compliments me on it. But he also tells me that the editor-in-chief would like to know exactly where I sourced all the details. I suspect he\u2019s afraid I\u2019ve made up parts of the story, so I send him a list of my sources; articles from the New Zealand press, YouTube clips, and so on.<\/p>\n<p>I realise that the hacker stories are more fantastic than people can imagine. At the same time I\u2019m aware that my story is nothing other than a collection of established facts. It would have been great if I\u2019d been there in Las Vegas. If I\u2019d been on the road with Barnaby Jack. If I\u2019d watched over his shoulder as he hacked a cash machine. I\u2019d have liked to interview him. It would have been amazing to follow him for a while. But sadly that\u2019s no longer possible. I decide to go in search of today\u2019s Barnaby Jacks.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><em>Translated by Anna Asbury<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gerard Janssen &#8211; Hackers: The Freedom Fighters of the Internet &nbsp; Prologue [pp. 7-9] Underground passageways In the mausoleum of the Pantheon in Paris there hangs a clock that dates back to 1850, a mechanical work of art with cogs of varying sizes. For more than a century the clock kept time well. Every day&#8230;<\/p>\n","protected":false},"author":3251,"featured_media":0,"parent":40569,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-40607","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/foreignrights.debezigebij.nl\/wpg-api\/wp\/v2\/pages\/40607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/foreignrights.debezigebij.nl\/wpg-api\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/foreignrights.debezigebij.nl\/wpg-api\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/foreignrights.debezigebij.nl\/wpg-api\/wp\/v2\/users\/3251"}],"replies":[{"embeddable":true,"href":"https:\/\/foreignrights.debezigebij.nl\/wpg-api\/wp\/v2\/comments?post=40607"}],"version-history":[{"count":0,"href":"https:\/\/foreignrights.debezigebij.nl\/wpg-api\/wp\/v2\/pages\/40607\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/foreignrights.debezigebij.nl\/wpg-api\/wp\/v2\/pages\/40569"}],"wp:attachment":[{"href":"https:\/\/foreignrights.debezigebij.nl\/wpg-api\/wp\/v2\/media?parent=40607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}