The KGB, the Computer and Me (TV Movie 1990) Poster

User Reviews

Review this title
6 Reviews
Sort by:
Filter by Rating:
8/10
Wonder Moving Showing Beginnings of Hacking & Tracking
just_tere13 October 2015
Warning: Spoilers
The movie uses, according to the beginning, the actual characters from the entire "spy" chasing. I doubt the CIA agents who show up are really the actual ones, however.

An astronomer at Berkley labs whose grant has run out gets a job in the IT department. His boss finds a $.75 problem in billing -- no account to charge it to -- and the chase is on. The actual events take place in the early 80's. The boss gives it to our hapless hero, who finds an account with no account number. This piques his interest, so he starts tracing it down.

At one point, there are 50 stolen printers in action, to trace the hacker, who is finally discovered in Hanover, Germany. The Hacker was selling information he found while hacking to the KGB. Remember, this is before the wall fell, and while the KGB still existed.

Additionally, the names the hacker used are quite a blast. Using a librarian to figure them out is a masterpiece!

It is quite fun to watch how hard this young man had to work to trace the spy/hacker. Today, all this can be done in almost seconds. Then, it took two years, getting warrants from each state the hacker traveled through.

While the movie is pretty old -- at the time of my review, 25 years -- it is exceptionally interesting, informative, and FUN to watch. Mr. Stoll, a hippie if ever there was one still left in the '80s, reenact his role, is fantastic. You can tell this was the highlight of his life (up to then, I hope). His animation, his enthusiasm, his good story telling are all worth watching.

I do wonder if he married that girlfriend.
2 out of 2 found this helpful. Was this review helpful? Sign in to vote.
Permalink
7/10
Nice one!
abrunfthirsch17 April 2017
I do security response for a living. It is amazing how this guy was doing the same sorts of things almost 30 years ago as we do today. The technology has changed but the thought process hasn't. The way he hooked a logic analyzer to a tty, and set it to page him when it saw a certain word was essentially an early network intrusion detection system.

The hackers were similar too. They set up shop on a series of vulnerable intermediary machines (Berkley, MITRE) to mask their activities from their actual target (military).

I'm just really glad my job has never required an oscilloscope to measure round trip times for packets.
1 out of 1 found this helpful. Was this review helpful? Sign in to vote.
Permalink
WELL worth seeing if you get a chance!
RodMorgan5 February 2003
How this terrific PBS/Nova film could possibly have been allowed to go off sale is impossible to understand. This documentary/reenactment manages to tell most of the story of Clifford Stoll's best selling "The Cuckoo's Egg" with Clifford portraying himself. It is as lively and entertaining as the book itself, if not more so, and clearly articulates many of the issues associated with computer-based spying. A terrific example of how much energy a documentary can have - it will be worth the search at your local library or public school. Good luck!
8 out of 9 found this helpful. Was this review helpful? Sign in to vote.
Permalink
10/10
Best movie I ever watched in school...
looking4ahandout11 May 2002
The KGB, CIA, Computer and Me tells the true story of a computer nerd, Cliff, who is brought in by a company to find a hacker who's been using a companies computer. One thing leads to another and Cliff finds himself on the hunt for a hacker with the CIA.

I believe this was a short created for the TV series "Nova". The acting isn't very good at all but the story is pretty good and the film is overall pretty funny. I can honestly say this is one of the most enjoyable movies I have ever got to watch in school.
6 out of 7 found this helpful. Was this review helpful? Sign in to vote.
Permalink
10/10
The Computer Freaks (Programmers) would love it.
askrahul12 July 2008
This based on true story how an astronomer turned computer scientist hunted down THE HACKER all way from Germany who was reading all important information in US government computers even CIA. The concepts an the ways that are applied to catch the hacker can only people who are in this field.

So if you don have any interest in computers or hacking stuff, don't watch it. u will never like it.

Myself being computer Engineer, enjoyed this movie. I also saw the other version that is the hackers story which is in German, thats also nice.
4 out of 5 found this helpful. Was this review helpful? Sign in to vote.
Permalink
10/10
An accounting enigma
Bernie444415 March 2024
This is a great Nova program with Clifford Stoll reenacting his role from his famous book "The Cuckoo's Egg."

I saw this TV program in this story before reading the book. Coming from a UNIX background it was fun to see a system I recognized. It could have been titled "The story of Ping" oops that title has been taken. I remember being billed for time on the computer and could only gain access at 2 AM. Many of these skills are now lost to people that do not have a shell account. I especially like how they kept the intruder on the line long enough to track. The hunt was intriguing, and it makes you wonder what is happening today. While this book deals with such things as passwords, the many new avenues created on today's Internet may afford a newer mystery. Until then this is the classic.

A student, Clifford Stoll, managing the computer at Berkley notices an unusual charge, $0.75, to an account. He finds that someone is hacking before it was fashionable; probably before there was Veronica. To track down the culprit(s) he must first learn the tracking skills. This process is in its infancy, so he must even invent a few of the skills himself. The use of timing and knowledge of the speed of light allows for a good guess at the distance. The only way to go through the old timing switching stations was to hold the intruder online long enough. This required the creation of a dummy database with intriguing information.

Who is the mysterious intruder(s)?

Will they be caught?
0 out of 0 found this helpful. Was this review helpful? Sign in to vote.
Permalink

See also

Awards | FAQ | User Ratings | External Reviews | Metacritic Reviews


Recently Viewed