Webspace Sponsored by:

This page (like others in the Useless Trivia space) exist to provide analysis and review of computer security in films. Reviews of usernames and passwords used in these films will be mentioned as they can be found and identified.

The Recruit:

  • Depiction of a program (Sp@rticus) that automagically owns wireless access points that have video systems to accept broadcast media. (This guy builds GUI based scripts.) The program is supposed to enslave these access points and force them to accept a video feed.
  • We see examples of forged company photo ID and electronic keycard as used by James Douglas (Colin Farrell) to enter the CIA's Langley offices for work.
  • Use of extra information is shown as a risk (security leak) when an attempt is made to call someone and the outgoing voice message tells us that they are in a meeting until 4:30.
  • While at the CIA Langley offices, James uses his electronic key and a keycode to enter the Directoriate of Science and Technology (Keyed Code: 3241.) He gets this keycode after shoulder-surfing it from his boss or an HR person who shows him around on the first day.
  • While at a CIA system Login Screen, he somehow manages to pull up a sort of debug/code window to "rewrite" what we are expected to believe is a local login program.
    int ??????? argc, char* argv[] {
    char szUserName[255];
    char szPassword[255];
    _getch("Login>>");
    ------------------ cut away from view -------------------
    int ch;
    int i = 0;
    do ch = _getch();
    if(ch == '\r')
    szPassword[i] = '\0';
    break;
    szPassword[i++] = ch;
    _putch('*');
    } while( 1 );
    _cputs("\n\n");
    _cputs("ENTER)
    ------------------ cut away from view -------------------
    sprintf( szLAYLA, "%s\\%s", szMOORE);
        #include "stdafx.h"
        #include <ROOT.h>
        #include <LOGIN.h>
        #include <PASSWORD.h>
        #include <ADMIN>
        #include <BYPASS.h>
        #include <string.h>
    HANDLE hFileSearch = PASSWORD( szUSER, &fd );
    if(hACCESS-Search != VALID_HANDLE_VALUE)
    if(fd.dwPASSWORD != ROOT_ADMIN_BYPASS)
    
    _cputs("VERIFYING PASSWORD.");
    _cputs("\n\n");
    _cputs("VERIFICATION COMPLETED.\n\n");
    ------------------ Screen "clears" ----------------------
    ROOT LOGIN SUCCESSFUL
    ------------------ cut away from view -------------------
    exe/command shell/c3r /----------------------------------
    ---------------------/
             scanf("%s", szCommand);
    char* sz = FIND LAST LOG ARCHIVE("C:\\", "*.exe");
             _cputs("\n\n");
    printf("LAST ACCESSED> %s\n\n", sz);
    _cputs(">>");
    scanf("%s", szCommand);
           return 0;
    char* FindLastApplication( char* szFolder,
    char* szExtention )
    sprintf( szCURRENT,"%s\\%s", szFolder, szExt);
       HANDLE hFileSearch = FindFirstFile(sz, &fd);
       if( hFilesSearch != VALID_HANDLE_VALUE)
       if( fd.dwFileAttributes != FILE_DIRECTORY )
              FILETIME ftLocal;
              SYSTEMTIME stCreate;
    FILE-TIME>ToLocalFileTime
            ( &fd.ftLAST ACCESS TIME, &ftLocal);
    if( CompareFileTime( &ftLocal, &ftLast ) > 0 )
    ftLast = ftLocal;
       FileTimeToSystemTime
          ( &fd.ftLastAccessTime, &stCreate)
    > directory: CLASSIFIED/- ICE 9 [core] ENTER>
    ------------------ New Window ----------------------
    exe/command shell/c4r /------------------------------------
    ---------------------/
    sprintd( szSubFolder, ICE 9 "%s\\%s",
       szFolder, CONFIDENTIAL); LIST * all *
          VIEW LAST APPLICATION( sz ICE 9 ) > go list
    
    bin/set - 089788    root ICE 9   fp[overview] log   g98-3
    bin/set - 892345    level docB   fp[remote] check   g98-3
    ICE 9 core level    Ng-569//4n   fp[charts]*all 8   t38-7
    documents >GH       classified   fp[application]%   d5-34
    REPORT > IDE 9      viral appz   core LOG #87898    d5-88
    list %n time-line   bin/set9     core LOG #71872    root
    infect? chart76     set: ICE-9   level access h342  g77-2
    -------------------- Code Gone ------------------------
    ?C45-4] /-----------------------------------------------
    -------/
    Last Executed File: \ ICE 9
    [BAR DISPLAY
    ------------------------screen clears------------------
    
                           [LOGO]
    
                          I C E  9
       ----------------------------------------------------
         Status: Classified - Clearance Level H4 Required
                        v5.7 [65765-2]
            Property Of The Central Intelligence Agency
       ----------------------------------------------------
    ------------------------screen clears------------------
    (Screen clears to white and we see changing hex values along the bottom
    and scrolling text/"code" above.) (1:09)
    
  • Leyla wakes to see James using her computer. James verifies she has ICE9 at home, and then leaves. Layla (Bridget Moynahan) checks her systems "history" to see what he did, but he covered his tracks and made it appear as though he used the "Opera 5 web browser" to check up on a website about his dad who was missing.
  • USB key-chain-style unit is hidden in a coffee container to allow Layla (insider) to get data out of the office.

    (C) 2006, 2005, 2004, 2003, 2002, 2001 Passwall.com. Copyright Information: Any of the above content that was created by me may be copied so long as each copy includes this copyright and links back to this site with reference to source and the content not be used for financial gain.

    (C) 2006, 2005, 2004, 2003, 2002, 2001 of information included above with explicit credit to people other than me who have submitted documentation, additions, corrections. You will need to get their permission to use their included content.

    I do not provide screenshots from movies, or downloadable movies for any films to avoid issues with Copyright infringement. It is my intention to legally provide news, information, trivia, and discussion about films and ensure content is not illegally reproduced. If you control Copyright to any of these movies and will extend to me permission is writing to capture screenshot images to be used on the web, please let me know!

    If you have suggestions on additions, feel free to e-mail them to me. Please use valid e-mail addresses so I can reply to you. I like to offer credit to people for their submissions. When you provide your submission, please specify what name should be credited with the information provided and if you would like to have an e-mail link to your address or a URL to your home page.

    Useless Trivia: Movie reviews with respect to computer security.