'Hackers' at 20
Loading...
It鈥檚 the 20th anniversary of 鈥淗ackers,鈥 one of only a handful of movies in the cybersecurity film canon. It occupies a strange place in an information security community that doesn鈥檛 traditionally suffer technical inaccuracy 鈥 鈥淗ackers鈥 is both beloved and technologically ridiculous. Two decades after characters Crash Override went swimming with Acid Burn, we鈥檝e asked actual hackers, engineers, social critics, filmmakers, and even 鈥淗ackers鈥 director Iain Softley to reflect on the movie鈥檚 influence and lasting听appeal.
Quotes have been edited for听clarity.
Dave Kennedy, founder and principal security consultant, TrustedSec, and developer of the Social Engineering Toolkit:
For security people, it鈥檚 a classic. It鈥檚 a movie that captured that curiosity drives most hackers 鈥 that most hackers are interested in the challenge of hacking but ultimately only want to do the right thing and protect people, rather than be a danger. 鈥淗ackers鈥 turned me into who I am today. It captures the excitement of hacking, the ability to figure out systems, and to turn things that haven鈥檛 been done before into big puzzles. It鈥檚 near and dear to a lot of our hearts because it was our entrance into hacking.
Julie Bush, screenwriter for 鈥淪ons of Anarchy鈥 and the upcoming Robert Ludlum film adaptation 鈥淭he Sigma Protocol鈥:
I had never seen it when it first came out, and I watched it just for this. It鈥檚 one of those things where I should have seen it 鈥 it鈥檚 totally in my space 鈥 and I was thrilled to have an excuse to watch it.
This movie is incredible.
Iain Softley, director of 鈥淗ackers鈥:
If you told me 12 months ago I would be doing screenings in Germany, New York, and the West End of London celebrating the 20th anniversary, I wouldn鈥檛 believe you. None of this was orchestrated by me or a studio 鈥 the 20th anniversary has been far more successful than I could have expected. It was all done organically, underground by fans. Which, when you think of it, is a very hacker like way of it coming to happen.
Julie Bush:
It anticipates not only every major trope that exists in film and television for hackers, but also in the real world. These people who made this film were geniuses. I don鈥檛 know who Iain Softley is, but I鈥檓 pretty sure that鈥檚 because he鈥檚 been locked deep in the basement of Google and he鈥檚 working on the technology of 2100. These people, they invented everything. They anticipate the idea of an anonymous like decentralized hacker army 鈥 Hackers of the World unite! They have a Google Glass-type device, hackers reading manifestos on viral videos while wearing anime get-ups, SWAT teams sent to pick up hackers at home. I thought all this stuff started three years ago. It鈥檚 a movie from 1995.
'The pool on the roof has sprung a leak'
Seven years after an 11-year-old Dade Murphy (Jonny Lee Miller) was convicted of programming a virus that simultaneously crashed 1,507 computers and the stock market, he moves to New York with his mother, where he connects with his high-school鈥檚 electronic dance music-loving crew of untouchably cool hackers, who wore futuristic clothing, including rollerblades. Lots of rollerblades. 听
Dave Kennedy:
We used to screen this at the nerd group for hackers at our high school, and the movie was one of the first things that said, 鈥淗ey, it鈥檚 cool to know computers.鈥 Culturally, I mean, computer people are no longer uncool 鈥 I suppose some of them are.
Iain Softley:
The last movie I had done was 鈥淏ackbeat,鈥 about the early days of the Beatles. I wanted to portray hacking as the new underground culture that parents didn鈥檛 understand.
Chris Wysopal, chief technology officer of Veracode, former member of hacker think-tank 鈥淭he L0pht鈥:
Even though the L0pht were from Boston, we were friendly with the people from New York 鈥 People like Emmanuel Goldstein [The pseudonym of Eric Corely, the publisher of the hacker magazine and meet-up group 2600] and Phiber Optik [celebrity hacker Mark Abene]. We heard about 鈥淗ackers鈥 from them when they told us some guy making a movie about hackers came to a 2600 meeting to talk about what hackers do, what hackers are like. So there was all this anticipation that the movie was going to be good because we knew the people who were consulting on it.
I think the point that the movie got right was the hacker mentality. It鈥檚 curiosity; a cat and mouse game with the adversary, the fact that the hackers were in it for a challenge and not for criminal activity. That鈥檚 some of the core hacker values. But some of the fashion things were kind of ridiculous 鈥 especially everyone traveling everywhere by rollerblades. Hackers wore black jeans and black T-shirts, occasionally someone would add some flair by wearing a mechanic jumpsuit. But nothing flamboyant. No one ever saw a hacker on rollerblades.
Iain Softley:
The clothing and the rollerblades were meant to separate the hackers from their time. It connected them with a cyberpunk future beyond what people they interacted with were doing, and at the same time gave the hackers a way of identifying each other by sight. We had gone to hacker conventions. We knew what hackers were actually wearing.
Rebekah Farrugia, associate professor of media studies at Oakland University, author 鈥淏eyond the Dance Floor鈥:
It was also one of the first movies that used an EDM soundtrack.
Chris Wysopal:
It definitely captures the music the hacker community listened to 鈥 techno, Prodigy, stuff like that.
Iain Softley:
鈥淏ackbeat鈥 had a soundtrack that was done with a grunge all-star band covering the Beatles-era songs 鈥 Dave Grohl who was in Nirvana at the time on drums, Thurston Moore from Sonic Youth, Mike Mills from REM, so I surprised the studio by using the electronic music when they thought it would be more of the grunge people were listening to at the time. Nowadays, those types of bands, like Massive Attack, do a lot of soundtracks. At the time, no one thought that teenagers would go for the music we chose. We could only get a small British label to put out a soundtrack. It was so successful, that we needed to put out a 鈥淗ackers鈥 soundtrack part two and part three.
搁别产别办补丑听贵补谤谤耻驳颈补:
If you think about the way electronic music was being made, especially by the pioneers at that time in the 80s and early 90s who dealt in the Afrofuturism style, it was very much, 鈥淗ere鈥檚 this machine that鈥檚 meant to do one thing, but I鈥檓 totally going to disregard that and turn it into a whole different kind of instrument that reflects me and how I think and my goals.鈥 So there is some conceptual overlap between hacker culture and electronic music culture.
听
'Congratulations, man ... you just made an enemy for life'
The hackers meet at a high tech, psychedelic teen dance club where Dade sees the girl of his dreams playing a video game. In an attempt to impress her, he defeats her high score at the game 鈥 only to be told by his friends that that girl is accustomed to winning battles of one-upmanship. 鈥淗ackers,鈥 the movie, had similar troubles impressing both critics and hackers, the people 鈥 groups that, like Dade鈥檚 dream girl, would eventually come around to love it.
Iain Softley:
I remember critics being mixed about the movie when it came out. There were some positive reviews, but I don鈥檛 think critics really knew what to do with it. More recently, whenever I talk to the press about new projects, I get the sense that people more grounded in the Digital Era are much more enthusiastic about it.
One thing that critics had trouble with was that the movie was targeted toward teenagers. There wasn鈥檛 鈥淭wilight鈥 back then. My niece was 13 at the time, and told me that everyone in her class had seen the movie multiple times.
Rob Vincent, producer and panelist of hacker radio show 鈥淥ff The Hook鈥:
In the hacker community, there was a division around the movie. The scene in general was still trying to be shadowy and mysterious and preserve this mystique we still had. People took themselves very, very seriously.
When the film came out there was this big sense of 鈥淥h, God, look at the zooming graphics. It鈥檚 all cheesy. Look at what they鈥檙e telling people that hackers can do. It鈥檚 going to get all the posers who see this film to try to become hackers.鈥 And it did, to an extent. Any fad brings in people who see it as easy rebellion. But one thing that was undeniable 鈥 one thing that would get a lot of people, looking back in retrospect, was that it while it did get a lot of people who wanted to be in the glamour of the movie, it also brought a lot of people who ended up actually contributing to the hacker community. It鈥檚 much the same you hear people who became real life scientists and astronauts say they did it because they watched 鈥淪tar Trek鈥 as a kid.
Iain Softley:
I wasn鈥檛 trying to make a technically accurate movie. I was trying to make an urban fairy tale. In the end, I think the reasons 鈥淗ackers鈥 had such staying power were some of the reasons people were put off by it in the first place 鈥 the nonliteral view of technology ages better than realism.
Rob Vincent:
MTV did a special about hacker culture in 1999. They sent someone to the 2600 meeting to interview people. There was a lot of clenching about whether or not we should talk to her. Some people did. But what happened was that they basically got punked by a couple of individuals who dressed up like they were in Hackers. They even arranged a swap of a floppy disk in an alley at night, and all kinds of ridiculous stuff. MTV focused on those people, because it鈥檚 really good television. There was a huge collective groan throughout the community 鈥 there was even a panel at the next Hope [hacker] conference called something like 鈥淢TV: How did that happen?鈥
Chris Wysopal:
Over time, it鈥檚 a lot easier to be forgiving of the parts I didn鈥檛 like about it. People really didn鈥檛 want people to think hackers were really like that. But the things they got right stood the test of time. And the ridiculous stuff is so over the top now, because now it鈥檚 ridiculous, futuristic, and dated.
Rob Vincent:
Pretty much every 2600 meeting that I鈥檝e been at over the past 18 years has had one quote from the movie belted around at it.
'RISC architecture is going to change everything'
Dade Murphy is overconfident, but Kate 鈥淎cid Burn鈥 Libby, played by a young Angelina Jolie, provides the perfect foil. She challenges him in video games, escalating pranks, and battles of wits. One night, at a party, they flirt while arguing over which one of them has the computing skills to fully take advantage of Libby鈥檚 high-end laptop. In their first moment of solidarity, they agree the laptops futuristic RISC [reduced instruction set computing] processor is the way of the future, leading to Libby giving what has become one of the movie鈥檚 most derided lines of technobabble: 鈥淩ISC architecture is going to change everything.鈥
Karu Sankaralingam, associate professor and principal investigator, University of Wisconsin Vertical Research Group:
RISC changed a lot, but I don鈥檛 know if it ever dominated the landscape the way people thought it was going to. At the time, Intel had 486 processors and Pentiums, which were both CISC [complex instruction set computing] but people thought it would be really hard to build a high performance processor that used that ISA [instruction set architecture]. They predicted you needed a new ISA with more efficient instructions 鈥 a reduced instruction set ISA. Companies that had a RISC ISA were supposed to take over. What happened was people figured out they could build a high-performance processor that internally incorporated a RISC-like ISA and still get all of the benefits of a RISC ISA.
RISC processors do dominate the mobile and tablet markets, but the reason is not necessarily that it is easier to build low-powered processors in RISC. Our lab compared the two architectures and found that, for most uses, it really didn鈥檛 make a difference in terms of performance or power usage. We didn鈥檛 investigate the really, really low-performance processors that go into devices like your fridge 鈥 those are places that a very simple ISA could make a difference. But in terms of real computing, RISC鈥檚 advantages are more that ARM, a company that makes RISC processors, makes it easier to license their technology for integrated circuits and ARM has always focused on low power processors rather than high-performance ones like Intel and AMD.
Rebekah Farrugia:
What resonated most with me was seeing a young woman who鈥檚 an active agent with technology. That lead me to become more interested in gender in technology, those representations and assumptions that we make. From there, I thought 鈥淚 want to learn video production,鈥 and 鈥淚 want to talk to women DJs and producers and see why they do what they do and why there aren鈥檛 more of them.鈥
听
'Remember, hacking is more than just a crime. It鈥檚 a survival trait.'
The kids watch their favorite hacker TV talk show, 鈥淩azor and Blade,鈥 who introduce the first instance of 鈥減hone phreaking,鈥 the art of manipulating land line phone systems to place free calls. Though hacker culture was distinct from phone phreak culture, the two overlapped.
Rob Vincent:
When I was in the scene back in the in 鈥90s, I was definitely a phone phreak, and there definitely was a division between the cultures.
We all generally accepted we were in the same group and we all knew some of each other鈥檚 things. In those days, message boards where people discussed hacking were still hosted in BBSs [鈥淏ulletin Board Services,鈥 dial up computer services located across the country], and phone calls were still expensive, so if you wanted to learn about hacking you needed to call around the country, and you were probably a little bit of a phreak as well. We did a lot of the same things. But they did it in their cubbyhole and we did it in ours.
In the early days, computers were still very much an extravagance. Even at the time of this film, not everyone had a computer. The people that had computers, not all of them knew what the hell to do with it. There was the sense that, okay, these things are going to be really important. We鈥檙e seeing them more in day to day lives, probably using them at work or at school, but to have your own computer was still not everyone could do that, whereas the phone system was basically the biggest computer in the world and everyone could connect to it just by picking up an appliance that everyone owned.
I remember explaining it to one person I was hanging around with in the 90s, maybe 鈥96 or so, and trying to explain phone phreaking. She knew hacking from TV and what not, but she was like, 鈥淲hat do you mean exploring the phones? It鈥檚 just the phone.鈥 It鈥檚 like what next? Are you going to explore the plumbing? 听That I think right there is the mindset that you had to have. Until cellphones, this was something that connected all of us.
'A virus planted in the Gibson computer system claimed responsibility.
'What? It left a note?'
Elsewhere in New York, an oil exploration company is hit by the 鈥淒a Vinci鈥 virus, which threatens to capsize oil tankers unless a ransom is paid. It also threatened to strain real world hackers鈥 suspension of disbelief 鈥 many of the brightly colored visualizations, from the animated virus display to a psychedelic look at the transmission of data through the Internet did not play well with audiences.
Julie Bush:
People make fun of the movie because the parts where they try and visualize anything computery is laughable. That was a mistake, but I get it. As someone else who does this for a living, it鈥檚 really difficult to make computers and tech cinematic, and this was the dawn of doing it. It鈥檚 2015, and it鈥檚 still difficult, believe me.
Dave Kennedy:
To show what actually has to go one, somebody sitting in front of a Kali terminal 听for hours, it鈥檚 not quite as exciting as a talking virus. We hack into computer systems to show companies how to defend against it, and we always have customers who say 鈥淥h, we want to come on site and see how it鈥檚 done.鈥 And we have to say 鈥淟isten, you鈥檙e literally going to be sitting there for eight hours a day watching a terminal screen.鈥 That is our life. We are processing an exorbitant amount of information, taking that in, trying to figure out how to break the defenses people have built in, or configuration flaws. It takes analysis. It takes a lot of time, and it鈥檚 not fun.
Julie Bush:
Showing technology is deadly on screen. Writing a script with technology is almost like dealing with a new form of the Hayes Code. In early Hollywood, they couldn鈥檛 visually show sex on screen, and had to work on creative dialogue and character ways of dancing around it. One thing we knew going into to 鈥淪igma鈥 was that we would absolutely not be showing anything technological onscreen. But we only know to do that because pioneers were brave, and tried to do these giant visual metaphors, and we got to see what works and what doesn鈥檛.
Iain Softley:
We emphasized the use of psychedelic colors that the world of hacking was a mind-expanding experience for the kids. The club the kids go to was actually called Cyberdelia for that reason. It took two weeks to film the visualizations. Computer graphics hadn鈥檛 really advanced to that point yet, so we had to film them with what were basically stop motion cameras. I wanted to make the databases and the circuits look like New York, like a replacement of the physical space they were in and show it like a continuation of the connectedness 听of the real space and the Internet.
People didn鈥檛 experience computers the way these kids experienced computers. I wanted to show how they did.
'You inquired about an employee of ours, an Agent Richard Gill? Our records indicate he鈥檚 deceased.'
Agent Gill: 'I鈥檓 what?'
After their friend Joey is arrested for the Da Vinci virus, and with their competition flirtation hitting its peak, Murphy and Libby compete in a battle of hacking skill to see who can cause the most chaos in the life of Joey鈥檚 arresting officer, Richard Gill. They cancel his credit cards, get him arrested, and even have him declared dead.
Chris Rock, chief executive of Kustodian:
In the scene where the hacker changes the secret service agent鈥檚 status from living to dead, it looks like he鈥檚 hacked into an accounting database to do it 鈥 he only kills him in accounting. There鈥檚 an easier and more thorough way to 鈥渒ill鈥 someone: Get the government to declare them officially dead.
You need two parties to get the certificate of death, a doctor and a funeral director. Both of those parties can register themselves online with very little oversight, using information they can either find online or just make up.
In America, every time you get a job you鈥檝e got to provide your Social Security Number, and all those other details. If you want to get a bank loan, credit card, passport, anything you鈥檝e got to provide those details. After a death certificate, once they do the lookup, Social Security says you鈥檙e being scrubbed off the system. It鈥檚 a living nightmare. You can鈥檛 do anything. You鈥檙e pretty much stuck.
Rob Vincent:
The back and forth scene where they are competing on how to best make the secret service agent鈥檚 life hell, that鈥檚 a really fun scene because it involves a lot of pranks that were easy to pull back then. We really did things like putting up classified ads in somebody鈥檚 name, saying all kinds of things and doing things to shut off people鈥檚 credit cards or phone service or whatever.
Chris Wysopal:
In the movie, The hackers attacking the law enforcement that were trying to capture them reminded me of how, around the same time 鈥淗ackers鈥 came out听听was actually really doing that with the FBI agents who were trying to track him own.
Rob Vincent:
When the movie came out, the bumbling Service guy was still how we saw the authorities. There was still this sense that you were hacking, the police and feds have no idea this is going on. Now they have people who know just as much as you, so the battlefield is completely different now.
But then, there wasn鈥檛 as much fear of the authorities. The view at the time is very much in line of the film: It wasn鈥檛 the secret service agents that was the antagonist 鈥 he thought he was just doing his job 鈥 it was the evil hacker who was pulling the puppet strings on the secret service agent, The Plague, Fisher Stevens鈥 character, who was actually the bad guy. The hackers weren鈥檛 directly fighting the police or the feds. They were fighting an evil hacker. It鈥檚 the secret service agent himself that arrests the bad hacker because he finds out that鈥檚 what鈥檚 been going on all along.
Even in the Kevin Mitnick case, there was the sense of it wasn鈥檛 the feds going after him, it was this other hacker who had it in for Kevin. I think that very probably inspired the film in some ways.
听
'A wake-up call for the Nintendo Generation'
Realizing that their crew is being set up as the cause of the Da Vinci virus, the hackers race to expose the real villains. They tap the oil companies phones and go dumpster diving to gain intel. Then race to a meet up location to hack their adversary, evading the police by hacking the traffic signals and causing crashes to trap police in traffic jams as they rollerblade on by.
Cesar Cerrudo, chief technology officer at IOActive:
Traffic hacking was not possible when the movie came out. But some things that you couldn鈥檛 do in the past are now possible now that software has been put in several places that had never used software before. It still isn鈥檛 possible to cause accidents the way they do in the movie by putting green lights in every direction at an intersection, but my research and research at the University of Michigan show that there are many ways to disrupt traffic. So now, that is something that is completely possible to do.
I researched sensors that detect cars waiting at red lights, which are used to determine the timing of the lights changing. For example, it can tell which roads have a lot of traffic and which ones don鈥檛, and adjust the red lights accordingly. But the devices are insecure, so it鈥檚 possible to cheat the system to make it think there was no traffic when there was a lot of traffic, and trap people at red lights. The sensors are wireless, but they don鈥檛 use encryption. So anyone who knows how that information is sent can intercept it and modify it.
The vendor who makes these sensors says they have released a patch - I鈥檓 not sure about that. They didn鈥檛 allow me to test the patch. But that doesn鈥檛 matter if cities don鈥檛 install the patch. After the vendor said they released the patch, I tested the sensors in San Francisco, and they were still open to attack.
'Crash and burn'
鈥淗ackers鈥 cost $20 million to film. It鈥檚 box office returns were under $8 million. By traditional movie metrics, that would make it a flop. But it鈥檚 also one of the few movies that year to get a fully decked out nostalgia Blu-ray release: The 20th Anniversary Edition. In 20 years, it has gone from being a movie that only earned a 32 percent fresh rating on Rotten Tomatoes to being described by geek hub Nerdist as 鈥渟eminal.鈥 As always, the good guys win.
Dave Kennedy:
When the new Blu-ray came out we had a big, big party. All my friends from work and on-off. It was great. We had popcorn; we were all telling stories of what we were doing when the movie came out and what we were trying to accomplish, and a lot of us started just after them movie. A few people say, 鈥淥h, this movie鈥檚 stupid,鈥 but most of us respond, 鈥淗ey, this is what kind of got us started.鈥
听