LongCut logo

The Genius of the Louvre Heist

By Hank Green

Summary

## Key takeaways - **High-visibility vests increase invisibility**: Appearing highly visible, like wearing high-visibility vests and hard hats, can paradoxically make criminals less suspicious to security. This tactic was used to distract from the actual act of theft, prioritizing the appearance of legitimacy over stealth. [01:46] - **Intrinsic value vs. historical value**: Criminals targeted items with intrinsic value, like jewels and metals, which can be cut down and melted, rather than priceless art like the Mona Lisa. While art is priceless in its original form, its value diminishes significantly if damaged, whereas jewels retain substantial monetary worth even when altered. [01:53] - **Exploiting known security vulnerabilities**: The criminals likely exploited known security vulnerabilities, possibly stemming from leaked security audit reports. The Louvre, having undergone security overhauls and having had past thefts, presented a known target with potential weaknesses that were not yet fully addressed. [03:34], [13:54] - **Speed is paramount in heists**: A key lesson from penetration testing is that speed is critical for a successful heist. The criminals were smart about the speed of their operation, emphasizing a quick in-and-out approach, which is crucial for minimizing detection and escape. [07:44] - **Historical buildings present unique security challenges**: The Louvre, originally built as a defensive fortress in 1190, presents unique security challenges due to its age. While historically secure, its outdated structure and the need to balance security with accessibility create vulnerabilities that modern criminals can exploit. [08:36] - **Security resources focused on common threats**: Museum security often prioritizes resources for everyday issues like crowd control or vandalism, overlooking large-scale, low-likelihood, high-impact events. The Louvre's security staff were likely trained for common threats, not for a coordinated, vehicle-based attack. [16:13]

Topics Covered

  • Vehicle-Based Attacks: The Next Unpatched Security Exploit?
  • Attackers Copy Success: What are Security TTPs?
  • Why Security Often Prepares for the Last Threat
  • Audits vs. Penetration Tests: What's the Difference?

Full Transcript

This video is brought to you by one of

my day jobs, which is that I work at a

company called Complexly. Complexly is a

company that I co-founded with my

brother. We make a bunch of different

shows like Sihow and Crash Course and

Eons and Bizarre Beasts. It's all over

YouTube. And the goal is to have like a

team of people who work really hard to

make sure that there's good information

that people want to get. So they're not

stuck with the bad information that

happens to be on the platforms where

people are. Complexity is a bunch of

people and our budget is quite a diverse

pie. But the biggest piece of that pie

is audience support. people who buy the

Crash Course Coin or their Patreon

patrons or they get the sideshow

postcards. This is a really big part of

how Complexity is able to do its work.

And right now is the Learnathon, the

Complexitywide Fundraiser so that we

have money that isn't confined to a

show. We can spend it on new projects.

We can put it where it's most needed. We

can use it to try and do interesting and

exciting things that I can't tell you

about. I'm sorry, but if you want to

check it out, complexity.com, there's a

link in the description because that

stuff just does not work without

audience support. Okay, now to the

video. I saw some folks on the internet

saying that the people who robbed the

Louv were idiots. And I also saw people

saying that the people in charge of the

museum security were idiots. And I was

like, what a surprise. People on the

internet have opinions. But I did kind

of want to figure out what I actually

thought about it cuz ultimately, you

know, I hope everybody has a good time.

That's the take I really believe in. I

just hope everybody has a good time with

the heists. Nobody got hurt. You know, a

little bit of French history may have

been lost, but we lose history. That

happens. But as I looked more and more

into it, I started to think maybe the

criminals were kind of geniuses here.

Like they did all kinds of things that I

would not have expected. I imagine a

heist as like a black clothes under the

cover of night repelling from skylights,

blowdarting security guards, splinter

cell type situation. And this was the

exact opposite. It was timed for there

to be people in the building so that

security would have a first priority

beyond the jewels. They pulled up in a

ladder truck wearing high visibility

outfits because sometimes visible is

more invisible. And they also, I have

thought about this, they went after

items that had intrinsic value. Like the

Mona Lisa, obviously priceless, but if

you cut it into a bunch of little pieces

until it's unrecognizable, that's trash.

Jewels and metals can be cut down and

melted, resulting in objects that are

obviously far less valuable than they

would be in their original form, but

still might be worth tens of millions of

dollars. And then I started thinking

like maybe these high-v value targets

were kept in a very distant part of the

museum far away from the entrance so

that they wouldn't be easy to like grab

and run away with. Maybe that resulted

in security being a little lax about it.

Maybe they hadn't even considered

somebody coming in through the wall.

Maybe the dofes and the Paris police

didn't understand the security

vulnerability they had and the criminals

sound like a kind of unpatched exploit.

Turns out I was wrong about all of that

cuz you know what I did? I thought I

have no idea how any of this works. I do

know somebody who does. Sherry David off

is a friend of mine. Weirdly, we live in

the same Montana town, but she is also a

security expert, the head of LMG

security and the subject of the book,

Breaking and Entering the Extraordinary

Story of a Hacker called Alien. And like

being the subject of a book is so much

more cool than like writing a book.

Until that book came out, Alien was

wellknown in some circles, but no one

knew that Sherry and Alien were the same

person, which I find very cool. So I

texted her and I asked if she had Louve

thoughts and she said yes, she certainly

did. And so I had a conversation with

her and during that conversation I

discovered that there was an unpatched

exploit, but it was not at all the one I

thought it would be. More than that

though, there was a network of tradeoffs

completely out of my view that both

criminals and security experts are well

aware of. And the biggest mistake

security made might have been something

I heard no one talk about at all, the

leak of a security audit. So hacking

back at MIT started off as something you

like physically went and did. There was

a midnight coffee house club. We all met

at the coffee house and we would go

essentially find places to break into.

And this card is actually really useful

for carding a door open. But I had to

dig it up because I remembered the very

first method of entry is knock first.

>> Absolutely. And in a lot of ways, I feel

like that relates to what's happening at

the Louv because literally these guys

are out there with like high visibility

vests and hard hats and they're like,

"La, we're going to drive up to the

building." They're not like dressed in

black with ski masks going in the dark

of night because that looks really

suspicious.

>> I started to think to myself like, what

was genius about what happened here?

Like what was a failure on the part of

security and what was genius on the part

of the thieves? And I kept having ideas

and then I kept thinking to myself, I

know nothing about this but I know

someone who does. So one of the things

that you do or have done in your job is

actually testing the physical safety of

a space by breaking into it not with

permission like no one knows you're

about to do it but you have been given

the task of test our our security. Don't

tell us how you're going to do it. Just

get us. So you've done this a lot and I

wildly enough you live in my town. I

know you. We're friends. We're not in

the same We could have recorded this in

the same room, but it's actually easier

just to do it online.

>> That's harder.

>> I I could walk to your office right now.

So, I wanted to to test out some of my

thinking on you so you could tell me how

I'm thinking about things wrong. And

also, I wanted to sort of ask you this

first question, which is why do I love

this so much?

>> Oh, because

>> I likeiting.

>> Yeah. I want

>> It's so fun to steal things, Hank. You

should try it sometime.

>> Yeah. Like the first time. And by the

way, these days I do only steal things

with permission.

>> Yeah.

>> And these days, um, when I break into

things, they're mostly digital. Yeah. Um

or we also do on-site social

engineering. We have actually broken

into some really famous buildings here

at LMG. I mean, not here at LMG, but our

team has um around the country. Yeah.

>> Uh but primarily through social

engineering because, you know, for

exactly that reason, it's easier to

break in when things are open and when

people are walking around and it looks

less suspicious. I did start off as a

physical penetration tester though and

that sounds dirty but it isn't. It is

where you physically break into

buildings and write reports about it

which is half really interesting and

half you know a boring report writing

job.

>> Is it not terrifying?

>> I yeah no it's not.

>> I would be so scared.

>> I mean I guess it could be for some

people but I find it fun. Okay.

>> First of all, you always have a limited

amount of time. So it's really different

than being a real robber. I think that's

the part that's nerve-wracking because

I'm like, "All right, I have like eight

hours in this city where I can stake

this place out and make my plan." And

the more I did it, the more I realized I

could spend more and more time on

reconnaissance because if I do a good

job, breaking in and getting out has to

be best. Yeah. And there were times

where I'd break in and get out and I'd

be like, "Wow, it's 9:05. I have the

whole rest of the day." And they picked

my favorite time. Like when people go in

is like the best time in my opinion to

rob a place that people go into and out

of. I once tried to get to to tailgate

at Google headquarters just because I

didn't have a way to get into a place

where there was a phone charger entirely

uh without any interest in industrial

espionage. Um but I was just like I look

like a Google employee, right? And I

tried I tried to tailgate this person

and they they immediately got me.

>> Oo, I just needed to charge my phone. I

need to get a Uber and I didn't know how

to get home otherwise. See, you could

have been getting paid for that if you

were in my industry.

>> Yeah, I'm sure that they do lots of

that, which is why they're so good at

stopping. Tailgating is when you like

don't have a badge and you just sort of

walk in after someone. I saw a TikTok

that was like, you know, whatever's

going on at the Lou right now, I wish

everyone the best. I hope that the

criminals have a good time. I hope that

the police have a good time.

>> Oh, how nice.

>> This is kind of how I feel about it. The

the French government and police are not

feeling that way about this. Let's start

with what went right here for the

criminals. Like what what were they

smart about? Okay. Well, they were smart

about the speed.

>> Gotcha.

>> I'd say that's number one. And that was

that is the number one lesson I've

learned in my life um as a penetration

tester is you got to be in and out. Um

so I think that was really smart. And

they also capitalized on inherent

weaknesses that I'm sure the Louve team

themselves had wrestled with. They knew

that the Lou was not impenetrable. They

knew that it had security weaknesses and

they were balancing that with the need

for traffic to go down that road in

front and the need for the Lou to be

beautiful and accessible to people as

well

>> and safe like too. I always think about

security door or like uh fire doors

where you're like, "Oh my god, I got to

put a door leg every certain number of

feet and like how what does that do to

security?"

>> Yeah. But I keep hearing over and over

that uh the Louv wasn't built for

security. And that actually has made me

laugh because the Louv was built for

security. It

>> sure was a palace.

>> Yeah. It was a defensive fortress. It

was just built for security in 1190. So

it's a little bitty bit dated.

>> Yeah.

>> And there's actually a whole exhibit

about the Louv's original structure. And

that actually gives you I mean I would

be shocked if the criminals didn't go

through that exhibit taking notes about

you know just the whole structure of the

L. How do you know whether or not you

can buzzaw through the side of a

building? It seem that seems a little

tricky to me. It's probably It's a It's

a old defensive fortress. They So, they

went in by cutting through the building,

right?

>> But they did it very quickly. I mean, my

guess is we do know two of the criminals

were apprehended. My expectation is we

will learn more about their backgrounds.

Yeah. Um but the fact that their DNA was

on file somewhere suggests to me that

they may be experienced criminals.

Perhaps they have a track record.

Perhaps they've tried these things

before.

>> Um certainly if I were the criminals, I

would test it out on something first.

>> You just build a wall and start cutting

through it. I mean, this movie is going

to be so good, Sherry. I'm going to love

this movie.

>> I feel like Joel Heist maybe have been

done. I don't know.

>> Oh, but like it's always it's there's

always another way to do it. Another

question I have what I hadn't considered

is the target. So, you think about

stealing the Mona Lisa. M

>> this is a terrible idea.

>> How are you going to make money?

>> What what's what good is the Mona Lisa?

How do you sell that to someone? It's

only like good as like collateral for

some international crime boss, you know?

>> Yeah.

>> It's only like it's only bragging

rights. I recognize that like uh you

know the crown jewels of Napoleon's wife

or whatever it is that got stolen uh are

more valuable in situ. Like they're more

valuable with the providence with like

the story of what they are. But like you

can melt down that stuff and it's worth

money. You can cut gems into other sizes

and they're worth money. Do you think

that the people who do this, they think

about the difference between the kinds

of things they have to protect? Like I

if there is something that on its own

could be worth tens of millions of

dollars even for parts regardless of its

historical uh background, do they think

about that differently and do they like

keep it in parts of the museum that are

less accessible?

>> That's exactly the question I think that

a lot of experts have been asking. Is

that really the gallery you want to keep

the crown jewels in? Yes, it's valuable,

but we know it's less protected. Um, in

fact, in 1976, there was already a theft

from the same gallery in a very similar

way because it's right out there on the

street and it's not like in some

interior part of the building. So, I

think that's a really good point. Um,

and yeah, I mean, if you were the

criminal, what would you steal? You

probably wouldn't go for the awesome but

not as valuable on the black market

pottery. Um, the Monisa might be, you

know, maybe you could sell that to like

Vladimir Putin or somebody. I don't

know.

>> I'm not selling anything to Vladimir

Putin because I value my life.

>> Good. Yeah. Okay, that's good. I'm glad

we have this on record. But yeah,

they're going to cut down those jewels.

They may already have started the

process of melting things down. Um, and

I was talking to my colleague, uh, Dev.

Olaf, who by the way has written three

books on lockpicking. He's amazing. and

he was wondering if, you know, this will

start a trend of like microscopic

etching into jewels so that they're

easier to identify. Yeah. He was like, I

wonder if they've already been etched.

Probably not. So, I think we're going to

see some security trends coming out of

this as we have seen in past events as

well.

>> This also happened, I think, to some

people's surprise, while the museum was

open. But now that I'm thinking about

it, I'm like, what a great exploit.

Because now you have a bunch of stuff

that matters a lot that isn't the

jewels, which are the people, the

tourists, the people walking around. And

so security has a first priority that is

not the thing that you want.

>> Yeah. And the first thing they did was

they closed that gallery. And the idea

was the thieves can't escape that way.

And it keeps the people safe, but it

also makes it harder for security to

come in that way,

>> you know. So there's that tug of war.

>> Yeah. But they also could escape because

there was a hole in the building.

>> Yes, exact. That's exactly the problem.

Yes, they made a hole.

>> I just think about like the time it

takes to get down the truck cuz you know

those things don't move fast.

>> That was amazing.

>> Those little those lifts.

>> Did you see the video?

>> Oh no, there's a video of it like going

down.

>> Oh yeah. And they're like did you It's

like that scene in the Blues Brothers

where they run and run and run and they

get in the elevator. It's like

>> listening to the girl from Ebana. All of

this to me is is adding up to so like

some smart things going on here. Number

one, get stuff that that like the value

isn't contingent upon it being in the

current shape or form that it is in.

>> Yes, 100%.

>> Two, do it during daylight hours so that

there's like a screen. You know, they

get you got security worrying more about

the people, which I think is, you know,

the correct thing. Very 2025. Probably

maybe in 1950 or 1920, screw the

tourists, start shooting uh immediately.

But but nowadays, uh we we value the

lives of the of the people. maybe more

than we once did. So, when I was talking

to you about this, I was like, man, they

must have thought these jewels are so

far from any entrance or exit, there's

no way for you to get them. And you were

like, no, no, no, no. They knew about

this vulnerability.

>> Yeah, absolutely. And they've had

multiple security audits, in fact, since

the new director came on board in 2021.

So, not only have they known their

issues, they actually made an

announcement that the Lou would be going

through security overhauls. And to me, I

wonder if that triggered the criminals

to act now. Like, oh, okay, we know

there's security issues. We know they're

not implemented yet, uh, or that the

solutions aren't implemented. Let's act

now and strike before there's new

security, right? I mean, wouldn't you do

that if you were the criminal with our

bad guy hats on here?

>> Yes. I got to put my bad guy hat on.

Absolutely. I would do the jewel thief.

I think that I'd be the kind of criminal

who would do things very quietly and

make sure I was not make sure I felt

safe the whole time uh until getting

caught and then suddenly being in

trouble.

>> I've seen you get up on stage and I bet

that was very scary for you to talk

about cancer for the first time.

>> Yeah, I think that's to that's totally

the same.

>> You like to push yourself. Push

yourself.

>> Right. I'll I'll imagine myself holding

a concrete saw and threatening a

security guard with it.

>> Yes.

>> Am I missing anything else in terms of

what was smart here? and like what maybe

like what has changed in the last 20 or

30 years that the security audits didn't

pick up on or anything like that?

>> Oh, I mean there's so much. One thing to

note also though is that the criminals

were not equal in their skills. And in

fact, eyewitness reports say one of the

criminals cut very easily into one of

the boxes with the jewels in it. And the

other one kind of like hacked away at it

and then one of the criminals, you know,

leaped into the getaway box thing that

went down the ladder and the other one

just kind of dove really fast. There's

push and pull that the Louve staff, they

had to make some important decisions

because on the one hand, they could have

made it even harder for criminals to

break into those boxes, but they also

wanted to make sure that firefighters

could smash them in the event of a fire

and take out the jewels. And we have

that challenge with security all the

time. You mentioned fire doors and

safety, and there's always a push and

pull between safety measures and

security, keeping keeping people out and

letting them out. Because one thing that

somebody who runs a library or a museum

or any anywhere where important stuff

is, you're much more likely to lose

stuff to a fire or uh some other sort of

destructive thing than you are to lose

it to theft.

>> Yeah, absolutely. And we have to plan

for all of those disasters, not just one

kind.

>> I assume that the the Louve security

folk know about a lot of different

potential vulnerabilities they have and

they have to weigh those

vulnerabilities. How are they going to

deal with those individual things? Do

you think that this ranked fairly high

on their list of worries?

>> I mean, that's an interesting question.

You know, they have invested a lot in

security staff who are mostly focused on

the central entrance and I had the

opportunity to be there in May of this

year and saw that, you know, they did a

pretty good job.

>> Wow. I immediately suspect you're

involved.

>> No, no, not involved.

>> Yeah. I mean, watching how they coraled

large masses of people was is actually

really helpful for understanding where

they were investing their resources

because I'm sure their their security

staff are probably trained to deal with

the homeless, to deal with people who

are drunk, to deal with people who are

trying to touch the statues or graffiti

something. You know, there's the pop and

crackle and all the everyday lower

security issues,

>> but something of this magnitude doesn't

happen nearly as often. And so they're

not investing as much in dealing with

the trained crew that comes up in a

bucket truck from outside. We're always

evaluating risk. And risk is a factor um

that involves likelihood of something

happening and the potential impact if it

happens. So this was higher impact, low

likelihood. And they see a lot of low

impact, high likelihood things all the

time, if that makes sense.

>> Yeah. You mostly think about

penetration, but less about sort of like

what you do once the heist is done. I

imagine like how much planning goes into

what happens after

>> I have a surprise for you. I'm also a

certified forensic investigator.

>> Okay.

>> Um and have spent a lot of time at least

on the network side analyzing how you

respond and what happens next. That

certainly applies here. Number one,

>> I thought a lot about the fact that the

things have changed so much in the past

decade. the fact that they got a helmet

and a vest and they extracted strands of

hair and they got the DNA and they were

able to look in a database and find two

of the criminals.

>> They didn't have to trace the path. They

didn't have to find, you know, a license

plate or whatever. They were literally

able to say, "We're going to identify

this person." Yeah.

>> And then find where the person with that

identity is before they leave the

country. So, I think that's going to

have some ripple effects as to how

criminals behave in the aftermath. Um, I

think we're going to see criminals

focusing more on getting away even more

quickly because they did have time. They

could have left the country in the time

that they had and I'm guessing they just

didn't feel like they needed to.

>> But do you think that the first step is

to start disassembling the gems and

stuff?

>> Again, let's put our bad guy hats on.

You probably want to make those those

stolen items as untraceable as possible

as quickly as you can. So my guess is

they're already thinking and they

probably planned ahead. How are they

going to cut those gems? How are they

going to melt down, you know, whatever

metals they can so that they're not

recognizable? Because the last thing you

want is to be flying to a

non-extradition country with like a

crown in your suitcase.

>> Yeah. I think probably security would

catch the crown.

>> Yeah. No, I just wear that for fun.

>> It's really It's pure gold though.

>> I'm going to mail it FedEx to my friend

Vladimir Putin. I mean, another

interesting exploit is like scooters in

Paris.

>> Yes.

>> You know, everything's got cameras all

over it now, but you can go a lot faster

on a scooter than you can go on anything

else. Very hard to chase someone. And

then also very easy to switch from one

vehicle to another or, you know, go to

some blind spot. I was shocked um when

the CEO of that uh health insurance

company was murdered in New York City

that it took as long as it did to track

down the attacker because of the network

of cameras that we have. Yeah, I am sure

there have been a lot of postmortem

meetings about that. Um but you're

right, the scooter can go really fast

and certainly if it's possible for a man

to escape on foot, I would imagine it's

possible for a scooter to escape as

well. And you know, at some point your

criminal is going to ditch it. But can

we talk about vehicles more because I

think that's maybe the most interesting

piece of this. Oh, okay. Hit me with

vehicle stuff.

>> Okay. So, when I was talking to Deviant,

he mentioned the Oklahoma City bombing

uh when Timothy McVey drove a vehicle up

to a federal building um in Oklahoma

City and blew it up. He pointed out that

since that time, you know, if you go to

a federal building now, what do you see?

Barriers, barricades. You can't drive a

truck up to a federal building. It just

created this whole new process where if

there's a federal building, they have

now installed barricades. Um and so I

agree with him. I think we're going to

start to see major landmarks, including

museums, looking at doing that. Um,

because if it's possible, you know,

again, it's hard. It's on a really big

street. But the fact that they were able

to drive a vehicle up to the museum,

especially with the a freaking ladder, a

bucket truck all the way up, and I'm

actually a little bit shocked that there

weren't more concerns about that, that

that was not immediately causing some

kind of warning. Um because you want to

make sure any vehicle in an environment

like that is clearly identifiable. It's

not just like dudes in hard hats, cool,

we're all good. You know, it should have

been a very visible permit. And ideally,

you want to have that gated off and

somebody has to, you know, let them in

if they genuinely have to do work.

>> Um so I think we've already seen that

happening at federal buildings in the US

and I wouldn't be surprised if we start

to see that at major museums as well. I

mean, do you think of these things kind

of in the same context like like

physical penetration versus um you know,

like what what is traditionally now

thought of as hacking where uh it's all

about access to computer systems often

and usually remotely. Do do you think of

this as as like you know Timothy McVey

kind of found a zero day exploit? All

you got to do is buy a bunch of

fertilizer that's available. All you got

to do is drive up to the side of the

building. That's no nobody's thought

that somebody might do this yet. And

then once that exploit is known, you

start to see the patches roll out with

new barriers etc.

>> Yeah, I think that's a great analogy. In

cyber security, we would call that TTP.

So that's um the attackers tactics and

often we see a new tactic uh getting

tried out and attackers will start to

use that once they see that it's

effective. So all of a sudden they're

calling you as an IT scammer and hey

that worked. They're going to call you

again and again and again and all of a

sudden you see a rash of those. So don't

be surprised if we see another bucket

truck incident. You know, if it worked

once, maybe it'll work again. And

attackers are going to copy that.

They're not afraid to steal ideas.

>> I think about this with 911 all the time

where it was like, wow, that was just

there box cutters and uh no, like

everybody thought that a hijacked plane

meant they were going to ransom off the

plane, not that the plane would become a

weapon.

>> Yeah. You know, I find 911 interesting

as well. I don't know if you know this,

but my first job out of high school was

working for the Bank of New York. And

so, and I grew up in New Jersey. So, I

would take the PATH train into the World

Trade Center. I would come up and then I

would walk like a block to my office on

Barkplate Street and every morning I

would pass these security guards at the

World Trade Center and they were

guarding the garage. I don't know if you

remember why they were guarding the

garage. Yeah. Because I was just talking

to a colleague of mine who didn't. She's

27, I think.

>> Um, but back in around 93, um, the World

Trade Center was bombed or they tried to

bomb it. uh someone drove a vehicle in

and tried to um tried to set off a bomb.

And so now or then they had guards to

prevent the underground bombing. And so

we're always kind of responding to the

last threat unfortunately. Um that was a

big concern at the time. That's very

similar to what happened in Oklahoma

City as well. So there was that rash of

you know vehicle related issues that we

now know how to protect against. What

are the things that you think might come

out of this heist in terms of uh ad

adapting to the tactics that we're

learning about right now?

>> Well, I think number one, we're going to

see other museums starting to look at

their infrastructure. Whoa.

>> I don't know why that happened.

>> Did you just do that?

>> Yeah, I just had balloons come up and I

don't know why. I I don't know how to

turn it off.

>> Oh my god, I got fireworks about that.

>> The AI was like, he's right.

>> Are you filming this on a on your Mac

camera?

>> Yeah. I'm filming it through the Mac

operating system and it does that. Yeah,

>> if you do certain hand gestures and I

can't I don't know what they are.

>> Happy birthday to us.

>> Well, number one, I think we're going to

start to see museums really thinking

about vehicle-based attacks. And to be

honest, I'm I'm surprised they hadn't

already been. Again, there is a

difference between the US and Europe um

and culture and of course our

experiences, but the Lou was built as a

fortress.

>> Yeah. Um, and we just need to be

thinking about, you don't need to be

obsessed with security. I think the New

York Times, someone in the New York

Times said it wasn't built with an

obsession for security. Actually, it

was. Yeah.

>> Um,

>> but there are some basics we need to

think about. And so an easy one is just

keeping vehicles, especially those that

can reach higher floors, away from the

side of the building, away from the

perimeter of that building, putting up

some physical barriers, and then

tracking and making it really obvious if

there's an unauthorized building or an

unauthorized vehicle there, if that

makes sense.

>> Do you think that they may have come by

before to test and see whether or not

people would question them?

>> Oh, that's interesting. So, you're

wondering if they showed up in

construction outfits to question?

>> No. If they if they like several times

or like once before they did like a test

where they pulled their little bucket

truck up next to the building and and

didn't do anything just to see if anyone

cuz it seems to me if I saw a bucket

truck and somebody doing construction or

like even putting a saw on the outside

of the Lou, I'd be like, "There they go

again. They're doing construction on a

building." Because that's what happens

in cities. If I worked for the Louv, I

probably uh would even say, "Oh, you

know, I didn't hear about the

construction that they're doing.

Everybody's there. Somebody is

authorizing someone somewhere." If I was

security at the Louve, I would assume

then that I would know whether or not

there was going to be construction on

that wing of the building.

>> Well, it's interesting you say that

because the security teams themselves

have said there was so much happening.

In fact, I think it was the labor union

that said there was so much construction

happening in that area. It was on a

regular basis very difficult for

security to tell what vehicles were

authorized, what people were authorized,

and what weren't. So, I think that was a

common problem.

>> Maybe maybe one of the like cleverest

things is looking at seeing how like how

often this is going on and how normal

will it look.

>> Absolutely. And honestly, there are a

lot of similarities between network

penetration testing and physical

penetration testing because if you have

the time to put into reconnaissance, you

can really plan a very effective attack

strategy. And just being there for a few

days, I could see we were actually

staying very by the lof.

Um I could see how busy it was, how much

construction there that was going on.

There's millions of visitors every year.

Um, and I think it was probably

overwhelming for any normal human and

security guards are humans just like

everybody else.

>> Do you think that the thieves had a like

a first thing that they realized when

they were like, I think this might be

possible.

>> It'll be interesting to find out their

structure. Um, if it's an organized

crime group, the people who were on the

ground might have just been hired by

other people, you know, and maybe they

were promised a percentage like, "Hey, I

know a really good burglar. I know

someone with experience in jewel heist.

they did this jewelry store and that

jewelry store. People who steal things

regularly, you know, there are

professionals and they may work as

contractors for different organized

crime groups. That's certainly what we

see on the network side of things. So,

my guess and I don't know, my guess is

that this was probably organized in some

way and that the folks who were the

boots on the ground may have a

percentage, but it might not be, you

know, they may not be an isolated group.

They may be part of a bigger group.

That's very much uh not in line with how

Oceans 11 works, you know?

>> Oh dear.

>> It's always these like uh rogue

individuals who just want to do the one

last heist versus it being like a

Russian mafia would just make me sad.

>> Well, I mean it doesn't have to be

Russia. Um, but no, I mean to access

some of the resources and knowledge or

maybe it was just very talented and

experienced individuals that were like,

"Cool, let's fill up our one last heist

and then go flee the country and live on

a beach." You never know. But in order

to move Jewels like that, it's probably

helpful to have a network and to piece

it together. To answer your original

question, my guess is they probably

visited multiple times, if not many

times. Uh there were also some reports

that there was a known security issue on

that door and that makes me wonder if

they had already done a little testing

or already jimmied the door somehow or

at least taken a very close look to

understand the materials.

>> It's so human, you know, like locked in

this room there's billions of dollars

and everybody gets to go see and look at

it. And so you all like you're just

walking by you think like man like I

could I like I could get this and but

also to do it in a way where like nobody

gets hurt. It feels like a story.

>> Yeah. You sound impressed by the

criminals. You really do.

>> I am impressed by the criminals. Should

I Is that okay?

>> Yeah. No, I mean it's true. Like it's

it's a work of art in and of itself to

commit a an effective heist. Yeah. and

to get away with it, which some of some

of them didn't quite

>> Doesn't seem like they uh all have. And

indeed, if they get two of them, you

know, maybe they will find the other the

others fairly quickly,

>> maybe,

>> though. I don't know if it's a mafia

thing. I probably would keep my mouth

shut.

>> Good to know, Hank. Seems like you lean

that direction anyway.

>> I really don't like organized crime. As

someone who is bumped up against it very

lightly, um it is not a vibe.

>> Gotcha. Okay.

>> I bet I got assume that you've bumped up

against organized crime a lot. Yeah, I

mean organized crime um is penetrating

networks day in and day out. And so as

we're advising our clients um our team

is constantly like monitoring what

they're doing, trying to track different

threat actor groups. We actually have a

laboratory here in Missoula, Montana. I

don't know if you know this. We have a

laboratory where we experiment and we

run these little sting operations and

we're monitoring the the evolution of

the tactics and techniques. Um so I

think it's fascinating. They've really

the bad guys in terms of network

security uh they've really kind of grown

up over the years kind of at the same

time that businesses like mine have

grown up as well. So we are now

professional penetration testers and

they are now professional cyber

criminals.

>> Yeah. I came to visit your office once

and I uh met a ransom negotiator and uh

was just very impressed by the fact that

there is just a ransom negotiator and

that's a job people have.

>> We have a chief ransom negotiator.

>> You have several. How how big is your

ransom negotiation department?

>> Well, these days we decided to get out

of emergencies. So, we actually wound

down for the most part and we now hand

things off to another partner team that

we work with. Thank goodness because it

was getting exhausting.

>> I bet. Yeah. She said like the the most

I've ever done in one day is three. And

I was like, I hate that for you. That

sounds very stressful.

>> Ransomware is not going away, but that's

a topic for another day.

>> What do you think the failures were? To

what extent was this a low probability

exploit and it was probably known and

they they probably just missed it or do

you think cuz I think that everybody

like wants there to be a big failure. Do

you think there was a big failure here?

>> Well, I mean I don't look at security as

big failures. Everyone is always taking

risks. Walking around on the street is

taking a risk and sometimes you pay the

price. Um, one big decision they made

was putting the jewels in that specific

room, the Apollo Gallery. Um, which we

know has some weaknesses, but at the

same time, it's gorgeous.

>> It's a beautiful place for the public.

There is so much benefit to being in

that room.

>> Um, and choosing to put them in the

center of the room instead of maybe up

against a wall where they might be a

little bit more protected. I mean, it

feels when you're in that room like

they're yours, too. Like you could

almost reach out and touch them. And I'm

sure that's what the criminals wanted as

well. So, putting the jewels in that

room, which honestly if I were advising

them, I probably would have advised them

to think twice, especially given there

had already been another theft and they

hadn't really made any huge changes. I

certainly would have wanted more

monitoring in that wing. I think the

vehicle security was a big gap as we've

discussed. Um, and I'm sure that's an

area where they will invest more. Um,

it's relatively it's a relatively

lowcost investment compared with like

installing a huge camera system and

monitoring it regularly and it tends to

be more effective than just trying to

add guards. You know, I think that

vehicle security and making sure you

understand who's on site and who's near

the building is really critical.

>> Yeah. I mean, I imagine that there

there's a certain amount of adding

guards can be its own vulnerability

because then you have because humans,

you know, you have more potential inside

men.

>> Yeah. you have more potential confusion

like if if not everybody knows

everybody. Um then that that can be

confusing. You have a different guy show

up one day who's not the guy who was

supposed to show up. I've seen the

movies. Um

>> you know when I started off as a

penetration tester, um one of the first

bank branches I did, I got in, I got in

the whole back area, you know, was able

to get keys and all that stuff. And this

is like a little bank branch, so that's

actually a harder job in some cases than

a big office building. And one of my

recommendations, silly me, was um

consider a security guard. And the bank

was like, "No way." Because you have to

pay for a full-time security guard. It's

not going to pay for itself. They just

use things like die packs and stuff like

that and try to reduce the amount of

cash on hand so that there's less for

people to get away with and timed entry

into vaults and things like that. So,

security guards are are not always an

investment that people are willing to

spring for because the ROI can be lower

than you might think. Do you think that

they do security audits like you do

where it's like they actually like hire

a team to be like break into the loop or

like how how do they do their audits

there?

>> Yeah, that's an interesting question and

it it also gets to the distinction

between a security audit and a

penetration test. Okay.

>> Um I like to do a penetration test with

a security audit. So a pentest is where

somebody's going to actually try to

break into your building. Um and that

way you kind of get that creativity. you

see exactly where your weak points are

and um I think it's important to try to

understand the root cause of any

vulnerabilities that are exploited. A

security audit is more of a

comprehensive methodical process where

you're literally going through door by

door or section by section thinking, oh,

the hinges are on the wrong side here or

you know, whatever the case may be.

>> Um I think the two are important. They

serve different purposes. So with a

penetration test, you might want to

demonstrate risks to upper management so

they know what they need to invest in

and why they need to invest in that. It

can help you prioritize. Um there really

there isn't a great substitute for that

comprehensive security audit, but I

would suggest doing it after you've

addressed the root causes of a

penetration test. From what I can tell,

they've done security audits. I haven't

seen any mention in the media of a

penetration test at all, which did

surprise me. The other thing to mention,

Hank, is that one of their recent

security audit reports was leaked to the

media.

>> Oh.

>> And to me, that is a huge red flag.

That's a huge black eye for them. Um,

anytime a company gets hacked, if I see

people talking to the media and leaking

reports or leaking information, they

have a bigger problem. They might have

an employee problem. They might have

somebody still in their network. Um, but

that in and of itself is a security

problem that's going to make the PR just

blow up. And I think that's part of what

happened here.

>> Well, would that also be a vulnerability

if like your audit is out there so

everybody knows your weaknesses?

>> Oh, 100%. You know, the New York Times

said that they'd seen a copy. I

absolutely would be concerned and be

wondering who leaked this to the media.

Um, unless it was deliberately leaked

for some reason, but I don't see any

evidence of that. So, I think that's the

big takeaway. I think that a penetration

test of the Lou would be very hard

though because as we saw that the the

the penetration that happened here was

not non-destructive. So like they're

they're not going to hire you to go into

the Louv and then you pull a bucket

truck up bucket truck up next to the

Apollo gallery and get your buzz saw

out.

>> No, that's one of the problems with

physical penetration tests is that they

never want you to smash anything. And

also we're always limited on time. So,

you know, I've definitely had times

where I've been like, I would just smash

that window and open the door, but I'm

not allowed, so I'll have to pick the

locks, which takes longer and I'm more

likely to be detected. So, yeah, I think

that is a challenge with physical

penetration testing for sure.

>> Do you think that big organizations like

the Louves should allow destructive

penetration tests?

>> Hank, that's a hard question. I don't

think they needed to for this. I don't

think they need to allow destructive

penetration tests to get the bang for

their buck. If they come up with a clean

pentest report or a clean security audit

report, great. Maybe consider taking it

to the next level.

>> They're far away from having from from

being perfect enough to need that.

>> Yeah. I mean, from what we've seen,

these issues had already been called

out, except I don't know about the

vehicle one, but a lot of the other

issues had already been called out. I am

curious to turn the tables for a second.

If you were going to rob the lube, how

would you do it?

>> Um, you know what I'd do? But I think

that I would make sure that about 2,000

of the people in the Louve are on my

team. So the when you ask me that, the

first thing I I think is like, okay,

what's what are the unique skills that I

have that a security audit might not

have thought of? So like what zero day

exploit might I have? And what I have is

that like I have a lot of fans.

>> You have followers. Oh my god. So, could

I create like a be like, "Okay,

everybody, if you're up for something

very weird, come join this Discord." We

join the Discord together. I vet these

people for how crazy they are. And then

we all fly to Paris. We all are

different folks. We don't look like

we're together. We're all from America,

but so are all the other tourists. We

all go into the Louv like, and then we

time it so that we all get there and

we're all in the line at the same time.

We time it so that we're all in this in

this room at the same time. and and and

fill up that room so that nobody else

can get in. And the people at the Lou

are like, "Oh my god, the Apollo Gallery

is so full." Then Smash um and then as a

unit we run, we run out as a big crowd

and everybody's just a guy and we're

panicked and like maybe, you know,

somebody sets off some firecrackers so

they think there's like gunshots going

on. That's that's how I do it.

>> I love it. I want to hear more about

your getaway.

>> More firecrackers. I don't know. You

should use Telegram on the dark web, but

otherwise

>> Okay. Sorry.

>> I'm I'm amazed that you have thought

this through, Hank.

>> I hadn't thought it through. That was

from scratch.

>> Well, this is your superpower, though.

You do have followers.

>> I have to tell you, a friend of mine is

making a role playing game. And he was

like, "What do you want your power to

be?" And I was like, "I want you to

invent a new power swarm where I can

just turn myself into a swarm of

thousands of things." And I like that

we're on the same wavelength here.

>> Yeah. That's brilliant.

>> Well, I'm glad you asked. It made me

nervous thinking about it.

>> I want to cut

>> and then everybody everybody gets and we

give away all the jewels and then we

return the money to the countries from

whence they came.

>> Oh, you're such a prophet.

>> That's the only way I could get them on

board. All these people would never do

it if it was just for for crime.

>> Someday there will be a dark hank on the

dark web.

>> How do you know there isn't already?

>> Sherry,

>> on that note,

>> thank you so much for spending a little

time with me. Uh because there was a

bunch of stuff that I had wrong. Um

unsurprisingly because um I don't Yeah,

I I don't know that much about this

stuff.

>> Thank you for reaching out to your

friendly neighborhood security geek.

>> Yeah. And uh you can check out LMG

Security if you ever need uh security

cuz they're the best in the business.

>> Thanks, Hank.

>> And here's the situation. I'm going to

play Connections now, but you can only

watch it if you just click on the

learnathon link in the description. You

don't have to donate, but like for me

and for you, we've got a pact here. The

honest thing is to click on the link and

check out what we're doing for the

learnathon. There's a bunch of cool

stuff going on. You can find out about

it and participate in all the different

ways you want to. It doesn't have to

cost you any money, but just click on

it, look at the website, and then you

can come back and watch connections.

That's the deal that we have with each

other right now. I've established it and

you've agreed. Okay.

Are have you done it? Let's do

connections. We got Ouija board.

Backbone platform. Backbone platform.

Seance. That can't be it. Spirit.

Scrabble.

Medium. Satan. Isn't that like Isn't

that like a kind of fake meat? Backbone.

Sacrum. These are all chakras. Are they

chakras or are they or are they just

like parts of the body? Seells. Seells.

Well, what I did notice was Ouija board,

computer keyboard, and Scrabble all have

uh letters and maybe abacadarium. I

don't know what that is, but it sounds

like it has letters. But I don't Yeah, I

don't think that I think that the uh the

like mystical the mystical communication

with spirit category is a red flag. So

like spirit and seance, they like feel

connected, but like Ouija board and

spirit and and seance, they're much more

connected than that. Is a Satan is that

also a piece of furniture? I'm like whi

like which one is it that I'm thinking

of? Medium spirit outlet. Courage.

Courage. Courage sounds promising to me.

Okay, let's get these together. Courage.

Heart backbone. Yes. And spirit, you

know, a little bit of you they you got

the ability. That's Yeah. Okay. Great.

Courage was really a door into that.

Made it made that one pretty pretty

easier. Backbone and spirit I wouldn't

have put together if uh hadn't had

courage and heart to tie them together.

That means that backbone heart and

sacrum aren't a thing. Sacrum seells

satan seance.

What is that a thing? That would mean

that it was outlet, medium, venue and

platform which is a category. So it is

in fact seance sacrum seells and satan

which is just like it starts with say

but doesn't look like it should maybe

like this would be sacum and this would

be shant. What are you What are you

going to call this category connections?

What are you going to call? It's just

words starting with a safe sound, which

is a infuriating that that's the blue,

you know, since they since they

introduced purple as like a thing that

you get a little extra like badge for.

It's much much more angering for me when

I don't get the purple first. Even

though I've always said I don't win if I

don't get the purple first. But that is

that is I mean I guess I don't know.

This was just much easier. This was the

first one I got. That's the purple

things featuring letters A through Z.

Great. I don't know what an abacadarium

is. An inscription consisting of the

letters of the alphabet listed in order

for practice exercises. Okay. Well, I

didn't know that. I love that we had

them a long time ago, though. I I guess

I'm thinking of like children using

these, but that would not have been the

case. This would have been for like a

like a scribe in training. This guy

sucked. He was he was bad at his job.

Yeah. And then who knows what's next?

Probably uh uh medium outlet venue and

platform. So like a place from which you

can speak,

I guess. What's that going to say? A

channel. Yeah, just like a way. Okay,

great. Well, that's frustrating, but

we're okay everybody. Thank you for your

time. I got a perfect puzzle, but I

didn't get perfect purple first.

And we're just going to be at peace with

Loading...

Loading video analysis...