Interview With MIT Subway Hacker Zack Anderson 113
longacre writes "In his most extensive interview since the DefCon controversy emerged, MIT subway hacker Zack Anderson talks with Popular Mechanics about what's wrong with the Charlie Card, what happened at DefCon, and what it's like to tango with the FBI and the MBTA. The interview comes on the heels of Tuesday's court ruling denying motions by the MBTA to issue a preliminary injunction aimed at keeping the students quiet for a further five months."
Re:The battle (Score:2, Informative)
You did miss something. (Score:5, Informative)
The US has tons of limits on free speech, including but not limited to restrictions with respect to
* perjury
* profanity
* sealed courtroom/trial
* threats
* slander and libel
* classified information
* treason
Re:Obligatory IANAL (Score:5, Informative)
Re:no, not really (Score:5, Informative)
Very interesting. Further reference:
http://en.wikipedia.org/wiki/Schenck_v._United_States [wikipedia.org]
Re:The real question I want to know... (Score:2, Informative)
Did the MBTA learn a lesson here about making a mountain out of a molehill? They essentially took something that would have received almost no attention and turned it into a national news story and then publicly filed all the details in open court such that anyone with the wherewithal to defraud the MBTA now not only knew about the exploit but had the full details on how to do it.
I doubt they learned anything. If I have noticed one thing about cases like this its that they always seem to make the same mistakes. It's really just a matter (again) of people addressing the symptom, not the problem.
MBNA != MBTA (Score:5, Informative)
Re:You did miss something. (Score:5, Informative)
But no prior restraint here.
Most such restrictions get shot down in court; if it's about profanity in particular, they fall afoul not only of freedom of speech but of religion as well.
Again, no prior restraint here. And what constitutes a threat is reasonably narrowly defined, though prosecutors are always trying to stretch it
You have, perhaps, heard of the Pentagon Papers case? Where the Washington Post and the New York Times could not be enjoined from publishing classified information?
It's awfully hard to commit treason with public speech. Laws against sedition, on the other hand, have a long history of violating freedom of speech.
What now? (Score:2, Informative)
I just don't see this going past "We sure showed those MIT kids what was what..." in the board room.
I use the system at least twice a week, and not even the physical securities have changed since the report was originally filed.
Re:Stored value cards are foolish (Score:3, Informative)
You may have read my comment already but there is an advisory value stored on the card but it's not the authoritative record of the balance. As with the Oyster Card "hacks" in London the cards can be turned off within one day. The central billing system analyzes trending and riders are accepted into the vehicle based on the balance on the card. If that balance doesn't match with the central database the card is turned off within hours. Same happens with cloned cards which can be detected the same way even more quickly as cards are used in impossible locations at impossible time intervals. The vehicle acceptance systems use store-and-forward wireless systems--remember, all the vehicles have onboard radios which will work several times per hour even on routes with the poorest coverage.
Re:You did miss something. (Score:3, Informative)